• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Internet safety
 

Internet safety

on

  • 781 views

 

Statistics

Views

Total Views
781
Views on SlideShare
781
Embed Views
0

Actions

Likes
0
Downloads
3
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Internet safety Internet safety Presentation Transcript

    • Staying Safe in Cyberspace
      • Jessica Kohler
      • ITC 525
    • Table of Contents
      • Safety Rules
      • Cyber Bullying Netiquette
      • Email Safety
      • Standards Credits
      • Cybersmart Video
      • License to Surf the Web
    • Safety Rules HOME More Info. *Only use the Internet when there is an adult home. *Don’t answer email from strangers. *Tell an adult when you feel unsafe. *Keep passwords private. *Don’t meet someone in person whom you met online. *Don’t send your picture to anyone online. Even More Info.
    • Are you safety savvy? HOME BACK What are some ways you can stay safe on the Internet? a. Share your password with others. b. Don’t send your picture to anyone online. c. Use the Internet when no one is home.
    • Let’s try again! HOME Keep your password private. Others can hack into your accounts using your password.
    • Let’s try again! HOME Make sure there is an adult at home when using the Internet. Who else will you tell if something goes wrong?
    • Correct! HOME Make sure you don’t send pictures to people over the Internet (even if you know them.)
    • Cyber Bullying HOME What is it? *When a child is tormented, threatened, harassed, humiliated, embarrassed, or targeted by another child using the Internet or cell phones. How it Works: *Direct attacks *Using others as accomplices Take Action! Keep personal information private. Stop, Block, and Tell. Take 5! VIDEO
    • Are you safety savvy? HOME BACK What actions can you take to stop Cyper Bullying? a. Keep personal information private. b. Help spread the rumors. c. Text harmful information about another person. True or False ? Cyber bullying is talking with a friend over the Internet.
    • Let’s look at that again! HOME Simply talking with a friend over the Internet is not Cyber Bullying.
    • Let’s look at that again! HOME Helping to spread rumors is being an accomplice to the bullying.
    • Let’s look at that again! HOME Texting harmful information about another person is Cyber Bullying.
    • Great Thinking! HOME Cyber Bullying is when a child is tormented, threatened, harassed, humiliated, embarrassed, or targeted by another child using the Internet or cell phones. Bullies could be a friend or just an acquaintance.
    • Great Thinking! HOME Make sure you keep your personal information private. Bullies could be a friend or just an acquaintance.
    • Email Safety HOME Email Dangers: *Chain Letters *Hoaxes, rumors and urban legends *Phishing *Scams and fraud *Spam *Spoofing *Viruses What are these? Safety Tips: *Change password often *Keep password private *Log off when done *Don’t reply to spam, harassing, or offensive email. *Don’t forward chain letters *Delete emails, UNREAD, from people you don’t know *Use anti-virus programs before opening attachments. Even more Information!
    • Are you safety savvy? HOME BACK What are some email dangers? a. Chain Letters b. Phishing c. Spam d. All of the above
    • Not Quite! HOME Take another look at that list.
    • Way To Go! HOME Spam, Phishing, and Chain Letters can be dangerous. Watch Out for these too: * Hoaxes, rumors and urban legends *Scams and fraud *Spoofing *Viruses
    • Netiquette HOME Respect all other users! Be patient with newcomers. Be careful to not use rude or bad language online. Make a good impression. Do not TYPE IN ALL CAPITAL LETTERS. Don’t break any laws. Do to others as you would have them do to you. More Info. Even More Info. What is it? Internet etiquette or guidelines for proper behavior on the Internet.
    • Are you safety savvy? HOME BACK What is an example of good Internet behavior? a. TYPE IN ALL CAPITAL LETTERS b. Use rude or bad language c. Do to others as you would have them do to you.
    • Do you need a redo? HOME Typing in all capital letters makes people think you are yelling at them. This is not good Internet behavior.
    • Do you need a redo? HOME Using rude or bad language anywhere, whether on the Internet or not is inappropriate behavior. Many Internet providers will terminate your account if you use this type of language.
    • Absolutely! HOME Doing to others as you would like them to do to you is a rule you should use throughout your life. This is wonderful Internet behavior to have.
    • Get Cybersmart with Phineas and Ferb HOME
    • Earn Your License to Surf the Web HOME “ Rules of the Road”
    • PA State Standards HOME Science and Technology and Engineering Education 3.4.B: Technology and Society 3.4.5.B1: Explain how the use of technology can have unintended consequences. 3.4.D: Abilities for a Technological World 3.4.5.D3: Determine if the human use of a product or system creates positive or negative results. National Educational Technology Standards 5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior. Students: a. advocate and practice safe, legal, and responsible use of information and technology. c. demonstrate personal responsibility for lifelong learning. d. exhibit leadership for digital citizenship.
    • Credits
      • Sites
      • http://www.protectkids.com/youthsafety/safteytipskids.htm
      • http://www.ccmostwanted.com/kids/iguide.htm
      • http://www.stopcyberbullying.org/index2.html
      • http://www.youtube.com/watch?v=o0W_tEUMzuk
      • http://www.wiredsafety.org/safety/email_safety/
      • http://www.commonsensemedia.org/get-cybersmart-phineas-and-ferb#
      • http://www.ccmostwanted.com/kids/inetiquette.htm
      • http://www.kidsdomain.com/brain/computer/surfing/netiquette_kids.html
      • http://pbskids.org/license/
      • Images
      • http://dynasium.files.wordpress.com/2008/12/6a00d8341c7bc453ef00e5505e03c48833-800wi.jpg
      • http://www.clker.com/clipart-13158.html
      • http://reallessons4reallearning.wikispaces.com/file/view/computer-clipart.gif/131750119/computer-clipart.gif
      • http://cdnet.myxer.com/tn/c/1943197/big/?t=20090522165142
      • http://www.chairvilleschool.org/webquests/internet_safety1_check.gif
      • http://www.villageofworth.com/Police/email/envelope-circle-clipart.gif
      • http://www.graphicsfactory.com/clip-art/image_files/tn_image/0/755640-tn_BIB0101.gif
      • http://www.urenco.com/uploads/images/safety%20sign.JPG
      • http://glma.files.wordpress.com/2007/12/cyberbullying.jpg
      • http://scorpion1333.files.wordpress.com/2009/06/phineas-and-ferb-300a071708.jpg
      • http://www.gpl.lib.me.us/movie.gif
      HOME