Your SlideShare is downloading. ×
0
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Cybersafety Preso
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cybersafety Preso

2,866

Published on

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,866
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
6
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transcript

    • 1. Cyber Safety 2009
    • 2. 6 to 7 Teams of People
    • 3. ONE Each person does section
    • 4. Each person does 6 SLIDES
    • 5. Each person does 6 SLIDES Not 5, not 7
    • 6. Each preso will have: 1. Title Slide 1. “What it is” Slide 2. News Slides 1. Slide about being safe 1.Citation slide (EasyBib & Evernote) 6 Slides Total
    • 7. Each person has 2 Minutes
    • 8. Each person has 2 Minutes Not 1, not 3
    • 9. Each Person Does One Section
    • 10. Each Person Does One Section Identity Theft
    • 11. Each Person Does One Section Not Identity Being Theft Bullied Online
    • 12. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading
    • 13. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Social Networking
    • 14. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Filtering Social Bad Networking Content
    • 15. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Filtering School Social Bad Rules Networking Content & AUP
    • 16. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Filtering School Social Bad Rules Networking Content & AUP Bonus if you have 7 people:
    • 17. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Filtering School Social Bad Rules Networking Content & AUP Bonus if you have 7 Cyberpredators people:
    • 18. Take notes in EVERNOTE We’ll show you how
    • 19. Rewrite the notes in Google Docs DO NOT COPY/PASTE....we’ll know
    • 20. Build the preso in Google Preso Collaborate!
    • 21. DON’T!!!
    • 22. Each slide will have A Title Capitalize!
    • 23. Each slide will have A Subtitle Summarize!
    • 24. Each slide will have 5 facts In a paragraph or bullets
    • 25. Each slide will have 1 picture Not 2, or 3 or 4 pictures Get your pictures LAST (hint: they are likely on the research page!!)
    • 26. Each slide will have 1 quote A comment about the page.....
    • 27. Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
    • 28. Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
    • 29. Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
    • 30. Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
    • 31. Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
    • 32. This:
    • 33. This:
    • 34. This:
    • 35. This:
    • 36. This:
    • 37. Becomes: What are Social Networks? Places to hang out! Most Social Network Sites are aimed at teens and young adults What kids do on social networks: Disney and Nick.com have services dedicated for children, like Club Penguin “about 60% talking about Sites for young children, under 14, require education-related topics moderation and more permissions to sign up and 50% discussing their schoolwork” http://www.digizen.org/socialnetworking/what.aspx The National School Board Association research says kids spend 9 hours online a week, almost as much as TV
    • 38. This:
    • 39. This:
    • 40. This:
    • 41. This:
    • 42. This:
    • 43. Want a lappy? Do the Preso Bring mom & dad....
    • 44. When? Sept 22, 23 Get a grade, a lappy and a new lifestyle!
    • 45. Bottom Line: Group size? _____ How many slides? ____ How much time? ____ How many facts per slide? ____ Who does the research? ____ What preso tool? ____

    ×