Your SlideShare is downloading. ×
Internet Safety For Kids
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Internet Safety For Kids

691
views

Published on


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
691
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
35
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Reading Detectives Have A Clue … … About Internet Safety Mrs. Bentheim, 6 th Grade Reading
  • 2. Objective
    • The student will explore meaningful information about Internet Safety and create an action plan to protect himself or herself.
  • 3. Let’s See What You Know …
    • True or False?
    • When you set your MySpace profile to private, only you can see what’s on it.
    • It’s impossible to track your computer’s location over the Internet.
    • People are not kidnapped or murdered by someone they met on the Internet very often.
    • You can’t be hurt by using the Internet—it’s just words.
  • 4. How Did You Do?
    • When you set your MySpace profile to private, only you can see what’s on it.
      • FALSE
    • It’s impossible to track your computer’s location over the Internet.
      • FALSE
    • People are not kidnapped or murdered by someone they met on the Internet very often.
      • FALSE
    • You can’t be hurt by using the Internet—it’s just words.
      • FALSE
  • 5. Let’s Break it Down …
    • The reality is that a private setting is not private. Anyone with simple decryption software can see anything you post.
    • So what can you infer?
      • It’s simple. DO NOT POST IDENTIFYING INFORMATION ABOUT YOURSELF: class schedule, photo of house, name of school, suggestive photos of yourself, etc.
  • 6. Let’s Break it Down …
    • Your computer has something called an IP address. This IP is paired up with a physical location that can be tracked by police—or by predators. You may think you’re talking to a cute boy from English class, but it might really be a 40-year-old ex-convict who wants to hurt you.
    • So what can you infer?
      • Only talk to people you KNOW well. If you’ve never met them in person, don’t bother. Even if you THINK you know who they are. Be smart. Be safe.
  • 7. Let’s Break it Down …
    • Look at these images. These are MySpace murder victims that thought they knew the person they were talking to:
  • 8.  
  • 9. Let’s Break it Down …
    • Words hurt. It’s simple. Poor choices of words can come back to get you when you look for a job. Poor choices of words can come back to get you when you cyberbully a student from school.
        • Kids commit suicide.
        • Kids and adults commit murder.
    • So what can you infer?
      • These are people’s lives ripped apart by irresponsible choices.
  • 10. Think. Pair. Share.
    • Think: Write down as many things you do that place you in harm’s way on the Internet.
    • Pair: When directed, pair up with the person next to you and discuss the similarities and differences in your lists. If time, create a venn diagram.
    • Share: Be prepared to share your findings with the class.
  • 11. One Final Thought …
  • 12. Take Action!
    • Look at the list you created a few minutes ago. Use that information to create a one-page action plan to help protect yourself from online predators.
      • If you already think you’re safe and don’t need to change anything about the way you behave online, write an action plan for a friend who is in danger.
  • 13.  

×