Your SlideShare is downloading. ×
Technology Safety Practices
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Technology Safety Practices

1,031

Published on

A presentation given at the 2004 Digital Edge Expo in Washington DC. Public forum discussion about issues of abuse with technology and what individuals could do about it.

A presentation given at the 2004 Digital Edge Expo in Washington DC. Public forum discussion about issues of abuse with technology and what individuals could do about it.

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,031
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Technology Safety Practices @ Home and Work Presented by Shireen Mitchell Executive Officer, Digital Sisters
  • 2. Technology Literacy Wows
    • The first “computers” were mostly women!
    • Great technology designers were artists including musicians.
    • Medical technology breakthrough
    • The “bug” in the computer was really a moth.
    • The computerized home and car.
    • Produce your own Media project
  • 3. Technology Literacy Woes
    • Misunderstandings about technology (solves anything?)‏
    • Stereotypes (who are tech gurus)‏
    • Privacy and Protection
    • Abuse of Technology
    • Production of hazardous materials (environmental concerns)‏
  • 4. Privacy and Protection
    • Cell and Cordless phones
    • Global Positioning System
    • Digital Tracking of Children
    • Viruses, Worms & Hackers, Oh My!
    • Pop-ups and Spammers
    • Being “Googled”
    • The availability of information
  • 5. Data Security and Backups
    • Avoiding Computer & Network Crashes
    • Surge protectors & uninterrupted power supplies.
    • Once a month backup
    • Store duplicates @ locations away from the computer
    • Logins & password protect folders
  • 6. Connections
    • Always on DSL, Cable & Satellite
    • Dial up, internal modems
    • Wireless & Encryption
    • Networks, Servers @ work
    • Hacker proof
    • Firewalls
  • 7. WWW - Wows
    • Physicist sharing research (web)‏
    • E-Commerce
    • Online Banking
    • Instant messaging & Chat Rooms
    • Support groups & discussion boards
    • Work from Home
    • Distant Learning
  • 8. Web Sites Woes
    • Cookies
    • Remembering passwords
      • Using letters and #’s combos (more than six)‏
      • Do not tape it to the computer
    • Histories and Caching
    • Downloads, Pop-ups & blasters
  • 9. Children Online
    • Homework help
    • Online and video games
    • Project research
    • Filters
    • Online rules
    • Screen names & email
    • School levels but no names
    • Chat rooms
    • Games
  • 10. Email
    • Instant communication
    • Transfer work files, resumes, & get community info
    • Two accounts: work vs personal email
    • Email is not a safe or confidential way to talk to someone
    • Spam and viruses
    • Chain letters
  • 11. Telephone Wows
    • Major source of communication
    • Transfers voice, data & fax (images)‏
    • Voice mail
    • Automated systems
  • 12. Telephone Woes
    • Traditional “corded” phones are more private than cell or cordless phones.
    • Always have at least one corded phone in the home
    • Cells are traceable
    • Hands free and driving
    • Phone recording & echos
    • Vital info, no echos, corded phone
  • 13. Cell Phones and Children
    • Instant access to children while away from home
    • Safety tool including emergencies
    • Internet access & digital cameras
    • Bullies by cell phones
    • Text messaging or calling gives away the telephone number
  • 14. Other Technology
    • Data tracking of your children
    • Positioning Systems
      • Global Positioning Systems
      • Mapping systems/data
      • Verizon online yellow pages
    • Electronic Voting
    • Jury Technology
  • 15. Technology and Domestic Violence
    • Survivors map roads to new lives on the Web by reaching out to shelters, researching restraining orders, and finding housing and employment opportunities.
    • Secure computers or public access
    • Cell phone and GPS Tracking
    • Video and Cyber stalking
  • 16. Resources
    • National Network to End Domestic Violence: Technology Safety Project http://www.nnedvfund.org
    • Safekids.com
    • Cyberbullying.org
    • Antivirus.com ~ housecall
  • 17. Digital Sisters, Inc.
      • PO Box 76528
      • Washington, DC 20013
      • 202.722.6881
      • info@digital-sistas.org ~ digital-sistas.org

×