• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Technology Safety Practices
 

Technology Safety Practices

on

  • 1,958 views

A presentation given at the 2004 Digital Edge Expo in Washington DC. Public forum discussion about issues of abuse with technology and what individuals could do about it.

A presentation given at the 2004 Digital Edge Expo in Washington DC. Public forum discussion about issues of abuse with technology and what individuals could do about it.

Statistics

Views

Total Views
1,958
Views on SlideShare
1,957
Embed Views
1

Actions

Likes
1
Downloads
0
Comments
0

1 Embed 1

http://www.slideshare.net 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Technology Safety Practices Technology Safety Practices Presentation Transcript

    • Technology Safety Practices @ Home and Work Presented by Shireen Mitchell Executive Officer, Digital Sisters
    • Technology Literacy Wows
      • The first “computers” were mostly women!
      • Great technology designers were artists including musicians.
      • Medical technology breakthrough
      • The “bug” in the computer was really a moth.
      • The computerized home and car.
      • Produce your own Media project
    • Technology Literacy Woes
      • Misunderstandings about technology (solves anything?)‏
      • Stereotypes (who are tech gurus)‏
      • Privacy and Protection
      • Abuse of Technology
      • Production of hazardous materials (environmental concerns)‏
    • Privacy and Protection
      • Cell and Cordless phones
      • Global Positioning System
      • Digital Tracking of Children
      • Viruses, Worms & Hackers, Oh My!
      • Pop-ups and Spammers
      • Being “Googled”
      • The availability of information
    • Data Security and Backups
      • Avoiding Computer & Network Crashes
      • Surge protectors & uninterrupted power supplies.
      • Once a month backup
      • Store duplicates @ locations away from the computer
      • Logins & password protect folders
    • Connections
      • Always on DSL, Cable & Satellite
      • Dial up, internal modems
      • Wireless & Encryption
      • Networks, Servers @ work
      • Hacker proof
      • Firewalls
    • WWW - Wows
      • Physicist sharing research (web)‏
      • E-Commerce
      • Online Banking
      • Instant messaging & Chat Rooms
      • Support groups & discussion boards
      • Work from Home
      • Distant Learning
    • Web Sites Woes
      • Cookies
      • Remembering passwords
        • Using letters and #’s combos (more than six)‏
        • Do not tape it to the computer
      • Histories and Caching
      • Downloads, Pop-ups & blasters
    • Children Online
      • Homework help
      • Online and video games
      • Project research
      • Filters
      • Online rules
      • Screen names & email
      • School levels but no names
      • Chat rooms
      • Games
    • Email
      • Instant communication
      • Transfer work files, resumes, & get community info
      • Two accounts: work vs personal email
      • Email is not a safe or confidential way to talk to someone
      • Spam and viruses
      • Chain letters
    • Telephone Wows
      • Major source of communication
      • Transfers voice, data & fax (images)‏
      • Voice mail
      • Automated systems
    • Telephone Woes
      • Traditional “corded” phones are more private than cell or cordless phones.
      • Always have at least one corded phone in the home
      • Cells are traceable
      • Hands free and driving
      • Phone recording & echos
      • Vital info, no echos, corded phone
    • Cell Phones and Children
      • Instant access to children while away from home
      • Safety tool including emergencies
      • Internet access & digital cameras
      • Bullies by cell phones
      • Text messaging or calling gives away the telephone number
    • Other Technology
      • Data tracking of your children
      • Positioning Systems
        • Global Positioning Systems
        • Mapping systems/data
        • Verizon online yellow pages
      • Electronic Voting
      • Jury Technology
    • Technology and Domestic Violence
      • Survivors map roads to new lives on the Web by reaching out to shelters, researching restraining orders, and finding housing and employment opportunities.
      • Secure computers or public access
      • Cell phone and GPS Tracking
      • Video and Cyber stalking
    • Resources
      • National Network to End Domestic Violence: Technology Safety Project http://www.nnedvfund.org
      • Safekids.com
      • Cyberbullying.org
      • Antivirus.com ~ housecall
    • Digital Sisters, Inc.
        • PO Box 76528
        • Washington, DC 20013
        • 202.722.6881
        • info@digital-sistas.org ~ digital-sistas.org