Cyber Safety for Kids
Upcoming SlideShare
Loading in...5
×
 

Cyber Safety for Kids

on

  • 334 views

 

Statistics

Views

Total Views
334
Views on SlideShare
333
Embed Views
1

Actions

Likes
0
Downloads
6
Comments
0

1 Embed 1

https://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as Apple Keynote

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Understanding the responsibilities of cyber citizenship. [1] Using the internet for school work\n. [2] Using the internet to download media. [3] Using the internet to deal with others.\n
  • Using the internet for school work.\n
  • Using the internet for school work.\n
  • What is Plagiarism? Plagiarism is passing off somebody else’s work and ideas as one’s own. \n
  • What is Plagiarism? Plagiarism is passing off somebody else’s work and ideas as one’s own. \n
  • What is Plagiarism? Plagiarism is passing off somebody else’s work and ideas as one’s own. \n
  • How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  • How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  • How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  • How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  • How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  • How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  • How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  • How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  • How NOT to plagiarize: (1) Use multiple sources, (2) Write it in your own words, and (3) Cite ALL sources.\n
  • Using the internet for entertainment.\n
  • Using the internet for entertainment.\n
  • Using the internet for entertainment.\n
  • Using the internet for entertainment.\n
  • Using the internet for entertainment.\n
  • Like plagiarism, copyright infringement is stealing.\n\nCopyright Infringement: Piracy is a crime. You violate copyright laws when you upload, download, copy and/or distribute copyrighted files (i.e. music, movies, books, software, etc.) without permission from the copyright owner and outside the realm of fair use. \n
  • Beware of downloading files from peer-to-peer applications. Some downloaded files are different from what they appear to be. They can be malicious software that pretend to be music or video files. These files are so-called Trojan Horses, which are malicious software that aim to infiltrate a host computer, either to merely corrupt the system or be used as a vehicle for crime.\n
  • Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  • Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  • Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  • Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  • Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  • Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  • Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  • Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  • Download from legal sites. A good rule of thumb is to be cautious if it’s free. There are many legal and established sites that offer games, music, video and applications for a minimal fee (sometimes, even for free!). Stick with these sites. If unsure about where to download legally, ask help from a responsible adult.\n
  • Using the internet to connect with others.\n
  • What’s wrong with this picture? [1] Dan gave out his personal information.\n
  • Your personal information is very important. Do not give out your personal information online (your name, phone number, address and school) and NEVER give your password to anybody, not even your friends. \n
  • Like plagiarism, copyright infringement is stealing.\n\nCopyright Infringement: Piracy is a crime. You violate copyright laws when you upload, download, copy and/or distribute copyrighted files (i.e. music, movies, books, software, etc.) without permission from the copyright owner and outside the realm of fair use. \n
  • There’s a time and place for everything. Do not allow your phones to serve as distractions. Concentrate on school work when in school. Do not use your mobile phones while walking or crossing the street. Do not reply to texts or calls from strangers. Do not give out your number to anyone--do not post them in public bulletins or online. Do not Mind your texting and calling use--they can cost your parents a lot of money!\n
  • You don’t want this to happen to you, do you? The teen allegedly sent and received about 20,000 text messages in a month, sent mostly during school hours. Her grades dropped from A’s and B’s to F’s. After losing her mobile phone rights, her grades went up again.\n\n
  • Sexting, meeting up with strangers\n
  • \n
  • Cyberbullying is bullying carried out in the internet through chat, email and messages in social networking sites, AND through mobile phones (SMS or phone calls). \n
  • Cyberbullying is bullying carried out in the internet through chat, email and messages in social networking sites, AND through mobile phones (SMS or phone calls). \n
  • Cyberbullying is bullying carried out in the internet through chat, email and messages in social networking sites, AND through mobile phones (SMS or phone calls). \n
  • Cyberbullying is bullying carried out in the internet through chat, email and messages in social networking sites, AND through mobile phones (SMS or phone calls). \n
  • Cyberbullying is bullying carried out in the internet through chat, email and messages in social networking sites, AND through mobile phones (SMS or phone calls). \n
  • Studies have shown that more than half of kids have bullied peers online.\n
  • Cyberbullying is a big deal. In serious cases, it will involve law enforcement and court authorities.\n
  • \n
  • If you’re being bullied, you’re not alone. A 2003 study by I-Safe America revealed that 42% of kids get bullied online. \n
  • Block anyone who sends you malicious and hurtful messages. It will do you no good to reply and fight back.\n
  • Keep copies of all hurtful messages sent to you. This will serve as evidence of harassment.\n
  • Tell a responsible adult. Let your parents or guardians know at the first sign of bullying. Let your ISP (internet service provider), email provider and the abuse desk of social networking sites you are a member of about the harassment. Send them copies of the malicious messages sent to you. \nIf the harassment spills over to school, let your teacher and school authorities know.\n
  • But if the bully threatens bodily harm or encourages suicide, report to law enforcement authorities right away. \n
  • But if the bully threatens bodily harm or encourages suicide, report to law enforcement authorities right away. \n
  • Speak no evil. See no evil. Hear no evil.\nDo not insult anybody. Do not respond to insults. Do not read flame messages about you or about anybody else. Do not listen to or participate in gossip.\n

Cyber Safety for Kids Cyber Safety for Kids Presentation Transcript

  • Be aResponsibleC yber itizen
  • School Work
  • A Report on Endangered Species by David Humphrey Endangered Species An endangered species is a population of organisms which is at risk of becoming extinctMain Page because it is either few inContentsFeatured Content numbers, or threatened byCurrent Events changing environmental orRandom Article predation parameters. Also it could mean that due to deforestation there may be a lack of food and/or water.
  • A Report on Endangered Species by David Humphrey Endangered Species An endangered species is a population of organisms which is at risk of becoming extinctMain Page because it is either few inContentsFeatured Content numbers, or threatened byCurrent Events changing environmental orRandom Article predation parameters. Also it could mean that due to deforestation there may be a lack of food and/or water.
  • A Report on Endangered Species by David Humphrey Endangered Species An endangered species is a population of organisms which is at risk of becoming extinctMain Page because it is either few inContentsFeatured Content numbers, or threatened byCurrent Events changing environmental orRandom Article predation parameters. Also it could mean that due to deforestation there may be a lack of food and/or water. Plagiarism is ! Cheating
  • A Report onEndangered Species by David Humphrey Learn how to research
  • Use A Report on Endangered Species many by David Humphrey sources. AnimalInfo.orgEndangeredSpecies.orgNationalGeographic.com Learn how to research
  • Use A Report on Endangered Species Write in many by David Humphrey your own sources. Endangered species are organisms at risk of becoming words. extinct because they are either few in numbers [1], or because environmental changes and AnimalInfo.org predatory circumstances putEndangeredSpecies.org them at risk[2]. The lack of food and/or water, caused by drout orNationalGeographic.com famine may also be culprits[3]. Learn how to research
  • Use A Report on Endangered Species Write in many by David Humphrey your own sources. Endangered species are organisms at risk of becoming words. extinct because they are either few in numbers [1], or because environmental changes and AnimalInfo.org Mention all predatory circumstances putEndangeredSpecies.org them at risk[2]. The lack of food and/or water, caused by drout orNationalGeographic.com famine may also be culprits[3]. [1] EndageredSpecies.org references. [2] AnimalInfo.org [3] NationalGeographic.com Learn how to research
  • Downloading ... Music Videos Games Apps
  • Piracyis a! Crime
  • Bewarethe! Virus
  • Download from siteslegal
  • iTunes AmazonDownload from Hulu siteslegal imeem Napster Zune Netflix Yahoo Playstation
  • InstantMessaging Email Social Networks SMS
  • facebook David Healy wants to be your friend. Wall Info Photos Basic Information Sex: Male Birthday: December 16, 1999 Hometown: New York, New York Contact Information Email: David1999@gmail.com IM: Dan1999 Education Information School: James H Vernon School
  • facebook David Healy wants to be your friend. Wall Info Photos Basic Information Sex: Male Birthday: December 16, 1999 Hometown: New York, New York Contact Information Email: David1999@gmail.com IM: Dan1999 Education Information School: James H Vernon School
  • Keepinfoprivate
  • Don’t talk to! Strangers
  • Textresponsively
  • Dad smashes cellphone after teenracks up texting bill. April 2009 Headline (United States)
  • Dad smashes cellphone after teen $5,000racks up texting bill. April 2009 Headline (United States)
  • Sextingis dangerous.
  • Sextingis dangerous. It is NOT cool.
  • Areyouacyberbully?
  • Ever sent a hurtful message online or viaSMS?
  • Ever sent a hurtful message online or viaSMS?Ever cursed somebody online or via SMS?
  • Ever sent a hurtful message online or viaSMS?Ever cursed somebody online or via SMS?Ever impersonated anyone online or viaSMS?
  • Ever sent a hurtful message online or viaSMS?Ever cursed somebody online or via SMS?Ever impersonated anyone online or viaSMS?Ever embarrassed anyone online or via SMS?
  • Ever sent a hurtful message online or viaSMS?Ever cursed somebody online or via SMS?Ever impersonated anyone online or viaSMS?Ever embarrassed anyone online or via SMS?Ever insulted somebody online or via SMS?
  • Kids who bullyother kids 53%online? 2003-2004 Study by I-Safe America
  • SeriousDeal
  • Areyoubullied?
  • 42% of kids get bullied online. 2003-2004 Study by I-Safe America
  • Block
  • Document
  • Report
  • You betterwatch out.We will hurtand hit youif you arenot careful,you little #$!+*!!!
  • Tellthepolice
  • Rules ofCyber Citizenship