Your SlideShare is downloading. ×
Cybersafety Preso
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Cybersafety Preso

2,864
views

Published on

Published in: Business, Technology

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,864
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
6
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transcript

    • 1. Cyber Safety 2009
    • 2. 6 to 7 Teams of People
    • 3. ONE Each person does section
    • 4. Each person does 6 SLIDES
    • 5. Each person does 6 SLIDES Not 5, not 7
    • 6. Each preso will have: 1. Title Slide 1. “What it is” Slide 2. News Slides 1. Slide about being safe 1.Citation slide (EasyBib & Evernote) 6 Slides Total
    • 7. Each person has 2 Minutes
    • 8. Each person has 2 Minutes Not 1, not 3
    • 9. Each Person Does One Section
    • 10. Each Person Does One Section Identity Theft
    • 11. Each Person Does One Section Not Identity Being Theft Bullied Online
    • 12. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading
    • 13. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Social Networking
    • 14. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Filtering Social Bad Networking Content
    • 15. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Filtering School Social Bad Rules Networking Content & AUP
    • 16. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Filtering School Social Bad Rules Networking Content & AUP Bonus if you have 7 people:
    • 17. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Filtering School Social Bad Rules Networking Content & AUP Bonus if you have 7 Cyberpredators people:
    • 18. Take notes in EVERNOTE We’ll show you how
    • 19. Rewrite the notes in Google Docs DO NOT COPY/PASTE....we’ll know
    • 20. Build the preso in Google Preso Collaborate!
    • 21. DON’T!!!
    • 22. Each slide will have A Title Capitalize!
    • 23. Each slide will have A Subtitle Summarize!
    • 24. Each slide will have 5 facts In a paragraph or bullets
    • 25. Each slide will have 1 picture Not 2, or 3 or 4 pictures Get your pictures LAST (hint: they are likely on the research page!!)
    • 26. Each slide will have 1 quote A comment about the page.....
    • 27. Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
    • 28. Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
    • 29. Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
    • 30. Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
    • 31. Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
    • 32. This:
    • 33. This:
    • 34. This:
    • 35. This:
    • 36. This:
    • 37. Becomes: What are Social Networks? Places to hang out! Most Social Network Sites are aimed at teens and young adults What kids do on social networks: Disney and Nick.com have services dedicated for children, like Club Penguin “about 60% talking about Sites for young children, under 14, require education-related topics moderation and more permissions to sign up and 50% discussing their schoolwork” http://www.digizen.org/socialnetworking/what.aspx The National School Board Association research says kids spend 9 hours online a week, almost as much as TV
    • 38. This:
    • 39. This:
    • 40. This:
    • 41. This:
    • 42. This:
    • 43. Want a lappy? Do the Preso Bring mom & dad....
    • 44. When? Sept 22, 23 Get a grade, a lappy and a new lifestyle!
    • 45. Bottom Line: Group size? _____ How many slides? ____ How much time? ____ How many facts per slide? ____ Who does the research? ____ What preso tool? ____