Technology Safety Practices  @ Home and Work Presented by Shireen Mitchell Executive Officer, Digital Sisters
Technology Literacy Wows <ul><li>The first “computers” were mostly women! </li></ul><ul><li>Great technology designers wer...
Technology Literacy Woes <ul><li>Misunderstandings about technology  (solves anything?)‏ </li></ul><ul><li>Stereotypes  (w...
Privacy and Protection <ul><li>Cell and Cordless phones  </li></ul><ul><li>Global Positioning System </li></ul><ul><li>Dig...
Data Security and Backups <ul><li>Avoiding Computer & Network Crashes </li></ul><ul><li>Surge protectors & uninterrupted p...
Connections <ul><li>Always on DSL, Cable & Satellite </li></ul><ul><li>Dial up, internal modems </li></ul><ul><li>Wireless...
WWW - Wows <ul><li>Physicist sharing research  (web)‏ </li></ul><ul><li>E-Commerce </li></ul><ul><li>Online Banking </li><...
Web Sites Woes <ul><li>Cookies </li></ul><ul><li>Remembering passwords </li></ul><ul><ul><li>Using letters and #’s combos ...
Children Online <ul><li>Homework help </li></ul><ul><li>Online and video games </li></ul><ul><li>Project research </li></u...
Email <ul><li>Instant communication </li></ul><ul><li>Transfer work files, resumes, & get community info </li></ul><ul><li...
Telephone Wows <ul><li>Major source of communication </li></ul><ul><li>Transfers voice, data & fax  (images)‏ </li></ul><u...
Telephone Woes <ul><li>Traditional “corded” phones are more private than cell or cordless phones. </li></ul><ul><li>Always...
Cell Phones and Children <ul><li>Instant access to children while away from home </li></ul><ul><li>Safety tool including e...
Other Technology <ul><li>Data tracking of your children </li></ul><ul><li>Positioning Systems </li></ul><ul><ul><li>Global...
Technology and Domestic Violence <ul><li>Survivors map roads to new lives on the Web by reaching out to shelters, research...
Resources <ul><li>National Network to End Domestic Violence: Technology Safety Project   http://www.nnedvfund.org </li></u...
Digital Sisters, Inc. <ul><ul><li>PO Box 76528 </li></ul></ul><ul><ul><li>Washington, DC 20013 </li></ul></ul><ul><ul><li>...
Upcoming SlideShare
Loading in...5
×

Technology Safety Practices

1,108
-1

Published on

A presentation given at the 2004 Digital Edge Expo in Washington DC. Public forum discussion about issues of abuse with technology and what individuals could do about it.

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,108
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Technology Safety Practices

  1. 1. Technology Safety Practices @ Home and Work Presented by Shireen Mitchell Executive Officer, Digital Sisters
  2. 2. Technology Literacy Wows <ul><li>The first “computers” were mostly women! </li></ul><ul><li>Great technology designers were artists including musicians. </li></ul><ul><li>Medical technology breakthrough </li></ul><ul><li>The “bug” in the computer was really a moth. </li></ul><ul><li>The computerized home and car. </li></ul><ul><li>Produce your own Media project </li></ul>
  3. 3. Technology Literacy Woes <ul><li>Misunderstandings about technology (solves anything?)‏ </li></ul><ul><li>Stereotypes (who are tech gurus)‏ </li></ul><ul><li>Privacy and Protection </li></ul><ul><li>Abuse of Technology </li></ul><ul><li>Production of hazardous materials (environmental concerns)‏ </li></ul>
  4. 4. Privacy and Protection <ul><li>Cell and Cordless phones </li></ul><ul><li>Global Positioning System </li></ul><ul><li>Digital Tracking of Children </li></ul><ul><li>Viruses, Worms & Hackers, Oh My! </li></ul><ul><li>Pop-ups and Spammers </li></ul><ul><li>Being “Googled” </li></ul><ul><li>The availability of information </li></ul>
  5. 5. Data Security and Backups <ul><li>Avoiding Computer & Network Crashes </li></ul><ul><li>Surge protectors & uninterrupted power supplies. </li></ul><ul><li>Once a month backup </li></ul><ul><li>Store duplicates @ locations away from the computer </li></ul><ul><li>Logins & password protect folders </li></ul>
  6. 6. Connections <ul><li>Always on DSL, Cable & Satellite </li></ul><ul><li>Dial up, internal modems </li></ul><ul><li>Wireless & Encryption </li></ul><ul><li>Networks, Servers @ work </li></ul><ul><li>Hacker proof </li></ul><ul><li>Firewalls </li></ul>
  7. 7. WWW - Wows <ul><li>Physicist sharing research (web)‏ </li></ul><ul><li>E-Commerce </li></ul><ul><li>Online Banking </li></ul><ul><li>Instant messaging & Chat Rooms </li></ul><ul><li>Support groups & discussion boards </li></ul><ul><li>Work from Home </li></ul><ul><li>Distant Learning </li></ul>
  8. 8. Web Sites Woes <ul><li>Cookies </li></ul><ul><li>Remembering passwords </li></ul><ul><ul><li>Using letters and #’s combos (more than six)‏ </li></ul></ul><ul><ul><li>Do not tape it to the computer </li></ul></ul><ul><li>Histories and Caching </li></ul><ul><li>Downloads, Pop-ups & blasters </li></ul>
  9. 9. Children Online <ul><li>Homework help </li></ul><ul><li>Online and video games </li></ul><ul><li>Project research </li></ul><ul><li>Filters </li></ul><ul><li>Online rules </li></ul><ul><li>Screen names & email </li></ul><ul><li>School levels but no names </li></ul><ul><li>Chat rooms </li></ul><ul><li>Games </li></ul>
  10. 10. Email <ul><li>Instant communication </li></ul><ul><li>Transfer work files, resumes, & get community info </li></ul><ul><li>Two accounts: work vs personal email </li></ul><ul><li>Email is not a safe or confidential way to talk to someone </li></ul><ul><li>Spam and viruses </li></ul><ul><li>Chain letters </li></ul>
  11. 11. Telephone Wows <ul><li>Major source of communication </li></ul><ul><li>Transfers voice, data & fax (images)‏ </li></ul><ul><li>Voice mail </li></ul><ul><li>Automated systems </li></ul>
  12. 12. Telephone Woes <ul><li>Traditional “corded” phones are more private than cell or cordless phones. </li></ul><ul><li>Always have at least one corded phone in the home </li></ul><ul><li>Cells are traceable </li></ul><ul><li>Hands free and driving </li></ul><ul><li>Phone recording & echos </li></ul><ul><li>Vital info, no echos, corded phone </li></ul>
  13. 13. Cell Phones and Children <ul><li>Instant access to children while away from home </li></ul><ul><li>Safety tool including emergencies </li></ul><ul><li>Internet access & digital cameras </li></ul><ul><li>Bullies by cell phones </li></ul><ul><li>Text messaging or calling gives away the telephone number </li></ul>
  14. 14. Other Technology <ul><li>Data tracking of your children </li></ul><ul><li>Positioning Systems </li></ul><ul><ul><li>Global Positioning Systems </li></ul></ul><ul><ul><li>Mapping systems/data </li></ul></ul><ul><ul><li>Verizon online yellow pages </li></ul></ul><ul><li>Electronic Voting </li></ul><ul><li>Jury Technology </li></ul>
  15. 15. Technology and Domestic Violence <ul><li>Survivors map roads to new lives on the Web by reaching out to shelters, researching restraining orders, and finding housing and employment opportunities. </li></ul><ul><li>Secure computers or public access </li></ul><ul><li>Cell phone and GPS Tracking </li></ul><ul><li>Video and Cyber stalking </li></ul>
  16. 16. Resources <ul><li>National Network to End Domestic Violence: Technology Safety Project http://www.nnedvfund.org </li></ul><ul><li>Safekids.com </li></ul><ul><li>Cyberbullying.org </li></ul><ul><li>Antivirus.com ~ housecall </li></ul>
  17. 17. Digital Sisters, Inc. <ul><ul><li>PO Box 76528 </li></ul></ul><ul><ul><li>Washington, DC 20013 </li></ul></ul><ul><ul><li>202.722.6881 </li></ul></ul><ul><ul><li>info@digital-sistas.org ~ digital-sistas.org </li></ul></ul>

×