• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Cybersafety Preso
 

Cybersafety Preso

on

  • 3,940 views

 

Statistics

Views

Total Views
3,940
Views on SlideShare
3,870
Embed Views
70

Actions

Likes
1
Downloads
4
Comments
0

2 Embeds 70

http://mhsstudent.wikispaces.com 66
https://mhsstudent.wikispaces.com 4

Accessibility

Categories

Upload Details

Uploaded via as Apple Keynote

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Cybersafety Preso Cybersafety Preso Presentation Transcript

  • Cyber Safety 2009
  • 6 to 7 Teams of People
  • ONE Each person does section
  • Each person does 6 SLIDES
  • Each person does 6 SLIDES Not 5, not 7
  • Each preso will have: 1. Title Slide 1. “What it is” Slide 2. News Slides 1. Slide about being safe 1.Citation slide (EasyBib & Evernote) 6 Slides Total
  • Each person has 2 Minutes
  • Each person has 2 Minutes Not 1, not 3
  • Each Person Does One Section
  • Each Person Does One Section Identity Theft
  • Each Person Does One Section Not Identity Being Theft Bullied Online
  • Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading
  • Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Social Networking
  • Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Filtering Social Bad Networking Content
  • Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Filtering School Social Bad Rules Networking Content & AUP
  • Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Filtering School Social Bad Rules Networking Content & AUP Bonus if you have 7 people:
  • Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Filtering School Social Bad Rules Networking Content & AUP Bonus if you have 7 Cyberpredators people:
  • Take notes in EVERNOTE We’ll show you how
  • Rewrite the notes in Google Docs DO NOT COPY/PASTE....we’ll know
  • Build the preso in Google Preso Collaborate!
  • DON’T!!!
  • Each slide will have A Title Capitalize!
  • Each slide will have A Subtitle Summarize!
  • Each slide will have 5 facts In a paragraph or bullets
  • Each slide will have 1 picture Not 2, or 3 or 4 pictures Get your pictures LAST (hint: they are likely on the research page!!)
  • Each slide will have 1 quote A comment about the page.....
  • Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
  • Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
  • Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
  • Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
  • Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
  • This:
  • This:
  • This:
  • This:
  • This:
  • Becomes: What are Social Networks? Places to hang out! Most Social Network Sites are aimed at teens and young adults What kids do on social networks: Disney and Nick.com have services dedicated for children, like Club Penguin “about 60% talking about Sites for young children, under 14, require education-related topics moderation and more permissions to sign up and 50% discussing their schoolwork” http://www.digizen.org/socialnetworking/what.aspx The National School Board Association research says kids spend 9 hours online a week, almost as much as TV
  • This:
  • This:
  • This:
  • This:
  • This:
  • Want a lappy? Do the Preso Bring mom & dad....
  • When? Sept 22, 23 Get a grade, a lappy and a new lifestyle!
  • Bottom Line: Group size? _____ How many slides? ____ How much time? ____ How many facts per slide? ____ Who does the research? ____ What preso tool? ____