2.02 Rememberl the rules of online safety. Slide Watch the video “Tracking Teresa” at http://www.netsmartz.org/resources/reallife.htm Watch the video Teens PSA: “Promises” at http://www.netsmartz.org/resources/psas.htm . Why?
According to the article published by Scott J. Cech, “ . . ., a significant percentage of colleges and universities sometimes dig into would-be undergraduates’ social networking profiles.”
The article describes how some college admissions officers research a potential student’s Internet information to assist in the careful and limited selection of students. “No school wants to give a very prestigious scholarship to some [student] who’s going to show up in the newspaper the next day with pictures of [student] standing on a beer keg.”
Employers are also investigating social networking profiles of potential employees.
2.02 Rememberl the rules of online safety. Slide
View the article at http://www.edweek.org/ew/articles/2007/12/19/16applicants.h27.html?tmp=582024897
What should you do if someone is yelling at you online?
What is a cyberbully?
What should you do if you are bullied online?
What should you do if someone sends you explicit materials?
2.02 Rememberl the rules of online safety. Slide Watch the cyberbullying videos at http://www.netsmartz.org/resources/reallife.htm View the article about the fatal result of bullying at http://stcharlesjournal.stltoday.com/articles/2007/11/26/news/sj2tn20071110-1111stc_pokin_1.ii1.txt
Viruses – software that attaches to programs installed on a computer or that are programmed to load when an email is opened.
Spam – unwanted emails from advertisers and users that contain malicious and explicit material or try to sell products or services .
Spyware – malicious software designed to take partial control of a computer’s operation without the knowledge or consent of the user. Often used to track a user’s browsing and spending habits while online and also to mine for personal information.