SlideShare a Scribd company logo
1 of 11
The aim of the next three learning coach sessions
• is to gain an understanding of the dangers when using technology to
communicate.
• be able to discuss the subject sensibly and responsibly.
• to know measures that can be taken to avoid the dangers.

The objectives of these sessions are to develop a deeper understanding of
the dangers of using technology to communicate and to produce an A3
poster detailing tips on how to stay safe when using technology.
Knowing the
              risks



Understanding
     the          Changing our
 technologies      behaviours
Somebody may get hold of your
                                   private details and misuse them.
                                                                       Viruses, malware, adware and
        Identity Theft.                                                          spyware.



                                                                       Cyber-bullying using various
Paedophiles using chat rooms or   What are the risks when              different technology; mobile
    other means to groom                                               phones, email, chat rooms &
         youngsters.                using technology?                     social networking sites.


                                                                       Copyright Law – illegal copying
    Indecent material being                                             and distributing of software,
         distributed.                                                    films, music and any other
                                     Sexting – the term given when                materials.
                                      someone sends a picture of
                                     themselves or explicit details.
Click on the link below to watch the video about identity theft




                        Identity Theft.




After watching the video, spend 5 minutes discussing the topic
and then write down some tips on how to avoid being a victim
of identity theft.
Click on the link below to watch the video about grooming



                   Paedophiles using chat rooms or
                       other means to groom
                            youngsters.



After watching the video, spend 5 minutes discussing the topic
and then write down some tips on how to avoid being a victim
within a chat room.
Click on the link below to watch the video about sexting



                   Sexting – the term given when
                    someone sends a picture of
                   themselves or explicit details.




After watching the video, spend 5 minutes discussing the topic
and then write down what advice you would give someone
about the topic
Click on the link below to watch the video about viruses.



                     Viruses, malware, adware and
                               spyware.




After watching the video, spend 5 minutes discussing the topic
and then write down what advice you would give someone
about the topic
Click on the link below to watch the video about copyright.


                     Copyright Law – illegal copying
                      and distributing of software,
                       films, music and any other
                                materials.



After watching the video, spend 5 minutes discussing the topic
and then write down what advice you would give someone
about the topic
After spending some time watching the videos,
        discussing and writing notes about the topics listed
        below you now need to work in small groups to create
        an A3 poster. The poster should explain the dangers and
        then give advice on how to avoid the dangers when
        using technology.


           Paedophiles using chat rooms or
                                                       Viruses, malware, adware and
               other means to groom
                                                                 spyware.
                    youngsters.



                                Sexting – the term given when
                                                                       Viruses, malware, adware and
Identity Theft.                  someone sends a picture of
                                                                                 spyware.
                                themselves or explicit details.
Present your posters to share how much you have
                       learnt about the different topics.

Take the quiz to find out what you have learnt about the
different topics.




                         Who wants to be a millionaire?

More Related Content

What's hot

L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingtarab1133
 
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizėGuillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizėTEO LT, AB
 
An Underground education
An Underground educationAn Underground education
An Underground educationgrugq
 
An Underground education
An Underground educationAn Underground education
An Underground educationgrugq
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
Web Yourself Sew 2009
Web Yourself Sew 2009Web Yourself Sew 2009
Web Yourself Sew 2009Maegan.Slaten
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit pptapieper
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
My protection plan
My protection planMy protection plan
My protection planShakena12
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slidesEric Castro
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Ben Woelk, CISSP, CPTC
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersRajesh Soundararajan
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1sabrinacotta
 
Online communication per 4
Online communication per 4Online communication per 4
Online communication per 4MsEisman
 
WALT be Cyber smart
WALT be Cyber smartWALT be Cyber smart
WALT be Cyber smartwiggit
 
Protection of privacy on the internet
Protection of privacy on the internetProtection of privacy on the internet
Protection of privacy on the internetLidija Kralj
 

What's hot (20)

L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizėGuillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
Guillaume Lovet. Kibernetinių nusikaltimų daugėja: grėsmių įmonėms analizė
 
An Underground education
An Underground educationAn Underground education
An Underground education
 
An Underground education
An Underground educationAn Underground education
An Underground education
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Online safety
Online safetyOnline safety
Online safety
 
Web Yourself Sew 2009
Web Yourself Sew 2009Web Yourself Sew 2009
Web Yourself Sew 2009
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit ppt
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
My protection plan
My protection planMy protection plan
My protection plan
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slides
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
Online communication per 4
Online communication per 4Online communication per 4
Online communication per 4
 
WALT be Cyber smart
WALT be Cyber smartWALT be Cyber smart
WALT be Cyber smart
 
Protection of privacy on the internet
Protection of privacy on the internetProtection of privacy on the internet
Protection of privacy on the internet
 

Viewers also liked

3.pathway plan
3.pathway plan3.pathway plan
3.pathway planjacksoc19
 
Sport On T V
Sport On  T VSport On  T V
Sport On T Vjacksoc19
 
The hollywood studios 2
The hollywood studios 2The hollywood studios 2
The hollywood studios 2jacksoc19
 
Lcd y9 me and my future
Lcd y9   me and my futureLcd y9   me and my future
Lcd y9 me and my futurejacksoc19
 
Mainstrean and independent
Mainstrean and independentMainstrean and independent
Mainstrean and independentjacksoc19
 
The film industry outside of hollywood
The film industry outside of hollywoodThe film industry outside of hollywood
The film industry outside of hollywoodjacksoc19
 
Fowles !5 basic needs
Fowles  !5 basic needsFowles  !5 basic needs
Fowles !5 basic needsjacksoc19
 
Jobs around us
Jobs around usJobs around us
Jobs around usProsv
 

Viewers also liked (9)

3.pathway plan
3.pathway plan3.pathway plan
3.pathway plan
 
Sport On T V
Sport On  T VSport On  T V
Sport On T V
 
The hollywood studios 2
The hollywood studios 2The hollywood studios 2
The hollywood studios 2
 
Lcd y9 me and my future
Lcd y9   me and my futureLcd y9   me and my future
Lcd y9 me and my future
 
Mainstrean and independent
Mainstrean and independentMainstrean and independent
Mainstrean and independent
 
The film industry outside of hollywood
The film industry outside of hollywoodThe film industry outside of hollywood
The film industry outside of hollywood
 
Fowles !5 basic needs
Fowles  !5 basic needsFowles  !5 basic needs
Fowles !5 basic needs
 
Paradigma
ParadigmaParadigma
Paradigma
 
Jobs around us
Jobs around usJobs around us
Jobs around us
 

Similar to E safety lc yr10&11[2]

Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette007rgmel
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Expert spam research
 Expert  spam research Expert  spam research
Expert spam researchheidirobison
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final21_zaheer
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrSurajGurushetti
 
Deepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming ConcernsDeepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming ConcernsbluetroyvictorVinay
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfExtremelyDarkness2
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimesmarkgernale24
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Legal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfLegal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfkenneth218994
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship projectfig2381
 

Similar to E safety lc yr10&11[2] (20)

Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Hacking And Virus.pptx
Hacking And Virus.pptxHacking And Virus.pptx
Hacking And Virus.pptx
 
online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Expert spam research
 Expert  spam research Expert  spam research
Expert spam research
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
 
Deepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming ConcernsDeepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming Concerns
 
Spyware
SpywareSpyware
Spyware
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Legal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfLegal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdf
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
 
Users guide
Users guideUsers guide
Users guide
 
Soft piracy
Soft piracySoft piracy
Soft piracy
 
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
 

More from jacksoc19

The hollywood studios
The hollywood studiosThe hollywood studios
The hollywood studiosjacksoc19
 
Caption competition christmas activity
Caption competition christmas activityCaption competition christmas activity
Caption competition christmas activityjacksoc19
 
Making decisions lcd y9
Making decisions lcd y9Making decisions lcd y9
Making decisions lcd y9jacksoc19
 
Starter happy and successful
Starter   happy and successfulStarter   happy and successful
Starter happy and successfuljacksoc19
 
Independent learning year 9
Independent learning year 9Independent learning year 9
Independent learning year 9jacksoc19
 
Media jobs presentation
Media jobs presentationMedia jobs presentation
Media jobs presentationjacksoc19
 
The film industry
The film industryThe film industry
The film industryjacksoc19
 
Narrativeflip
NarrativeflipNarrativeflip
Narrativeflipjacksoc19
 
Onershiip and film
Onershiip and filmOnershiip and film
Onershiip and filmjacksoc19
 
Reps + music hce
Reps + music hceReps + music hce
Reps + music hcejacksoc19
 
Institutions tv
Institutions tvInstitutions tv
Institutions tvjacksoc19
 
Representation of violence in the media complete
Representation of violence in the media   completeRepresentation of violence in the media   complete
Representation of violence in the media completejacksoc19
 

More from jacksoc19 (20)

The hollywood studios
The hollywood studiosThe hollywood studios
The hollywood studios
 
Caption competition christmas activity
Caption competition christmas activityCaption competition christmas activity
Caption competition christmas activity
 
Making decisions lcd y9
Making decisions lcd y9Making decisions lcd y9
Making decisions lcd y9
 
Starter happy and successful
Starter   happy and successfulStarter   happy and successful
Starter happy and successful
 
Stereotypes
StereotypesStereotypes
Stereotypes
 
Independent learning year 9
Independent learning year 9Independent learning year 9
Independent learning year 9
 
Media jobs presentation
Media jobs presentationMedia jobs presentation
Media jobs presentation
 
Webshareeg
WebshareegWebshareeg
Webshareeg
 
The film industry
The film industryThe film industry
The film industry
 
Narrativeflip
NarrativeflipNarrativeflip
Narrativeflip
 
Job roles 1
Job roles 1Job roles 1
Job roles 1
 
Job roles
Job rolesJob roles
Job roles
 
Audience
AudienceAudience
Audience
 
Onershiip and film
Onershiip and filmOnershiip and film
Onershiip and film
 
Referencing
ReferencingReferencing
Referencing
 
Reps + music hce
Reps + music hceReps + music hce
Reps + music hce
 
Institutions tv
Institutions tvInstitutions tv
Institutions tv
 
Ben a
Ben aBen a
Ben a
 
Year 11
Year 11Year 11
Year 11
 
Representation of violence in the media complete
Representation of violence in the media   completeRepresentation of violence in the media   complete
Representation of violence in the media complete
 

Recently uploaded

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Recently uploaded (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

E safety lc yr10&11[2]

  • 1.
  • 2. The aim of the next three learning coach sessions • is to gain an understanding of the dangers when using technology to communicate. • be able to discuss the subject sensibly and responsibly. • to know measures that can be taken to avoid the dangers. The objectives of these sessions are to develop a deeper understanding of the dangers of using technology to communicate and to produce an A3 poster detailing tips on how to stay safe when using technology.
  • 3. Knowing the risks Understanding the Changing our technologies behaviours
  • 4. Somebody may get hold of your private details and misuse them. Viruses, malware, adware and Identity Theft. spyware. Cyber-bullying using various Paedophiles using chat rooms or What are the risks when different technology; mobile other means to groom phones, email, chat rooms & youngsters. using technology? social networking sites. Copyright Law – illegal copying Indecent material being and distributing of software, distributed. films, music and any other Sexting – the term given when materials. someone sends a picture of themselves or explicit details.
  • 5. Click on the link below to watch the video about identity theft Identity Theft. After watching the video, spend 5 minutes discussing the topic and then write down some tips on how to avoid being a victim of identity theft.
  • 6. Click on the link below to watch the video about grooming Paedophiles using chat rooms or other means to groom youngsters. After watching the video, spend 5 minutes discussing the topic and then write down some tips on how to avoid being a victim within a chat room.
  • 7. Click on the link below to watch the video about sexting Sexting – the term given when someone sends a picture of themselves or explicit details. After watching the video, spend 5 minutes discussing the topic and then write down what advice you would give someone about the topic
  • 8. Click on the link below to watch the video about viruses. Viruses, malware, adware and spyware. After watching the video, spend 5 minutes discussing the topic and then write down what advice you would give someone about the topic
  • 9. Click on the link below to watch the video about copyright. Copyright Law – illegal copying and distributing of software, films, music and any other materials. After watching the video, spend 5 minutes discussing the topic and then write down what advice you would give someone about the topic
  • 10. After spending some time watching the videos, discussing and writing notes about the topics listed below you now need to work in small groups to create an A3 poster. The poster should explain the dangers and then give advice on how to avoid the dangers when using technology. Paedophiles using chat rooms or Viruses, malware, adware and other means to groom spyware. youngsters. Sexting – the term given when Viruses, malware, adware and Identity Theft. someone sends a picture of spyware. themselves or explicit details.
  • 11. Present your posters to share how much you have learnt about the different topics. Take the quiz to find out what you have learnt about the different topics. Who wants to be a millionaire?

Editor's Notes

  1. When using digital technology, you need to make sure that you keep up to date with the changes in technology and understand the growing risks. When using digital technology make sure that you change your behaviour accordingly to ensure that you are not at risk.
  2. Ask students what they believe are the risks when using technology? See how many they come up with.
  3. Watch the video, discuss as a whole group and make notes
  4. Watch the video, discuss as a whole group and make notes
  5. Watch the video, discuss as a whole group and make notes
  6. Watch the video, discuss as a whole group and make notes
  7. Watch the video, discuss as a whole group and make notes