Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Finally brothers, whatever istrue, whatever is noble, whatever isright, whatever is pure, whatever islovely, whatever is a...
Physical Safety –      freedom from physical harmPsychological Safety –     freedom from cruelty, harassment,     exposure...
 It can be Public and Permanent You have no control who sees it and what  they do with it Information can be copied, pa...
   Stranger danger   Viewing inappropriate content   Posting inappropriate content   Cyber-bullying   Privacy and rep...
 Like it or not, personal information sites continue to be more accurate, dig deeper and reveal more and more of your dig...
 Lost in the rapid progress of technology is a consistent, safe code of use Most digital users do not realize how quickl...
 Poor digital decision-making starts in  the mind of the user Abusing technology, such as sexting  and cyber-bullying ar...
 Development of a “Digital Consciousness” Golden Rule for the 21st century“Develop and maintain a mindset that you are p...
 Report: Teen gets 15 years for Facebook    blackmail   Nude picture on phone lost in McDonald’s    ends up online   Se...
 Provide you with information necessary to understand that you are accountable and responsible for maintaining a Digital ...
Concerns: People may not be who they say they are so have a  parent approve anyone you meet online before you  talk to th...
 Your online life is a reflection of you Insist that you and people around  you are treated respectfully Respect other ...
 Protect your passwords Create secure passwords Use phrases that are easy to    remember but hard to guess Don’t sue t...
 Make sure that you have security  software Be careful of WiFi hotspots – hotel  lobbies, airports, etc. Don’t download...
 It’s up to you to control what other  people know about you If it’s private, don’t post it online, even  email Anythin...
 Do not give out personal informationName                 Where you livePhone number         BirthdateHome Address       ...
 Cyber-bullying – the use of technology to harm  another person in a deliberate, repeated and  hostile manner Cyber-Mobb...
 Sexting – The act of sending an image, video,    text, etc. of a sexual nature to another    individual (digital), smart...
 It is against the law It could haunt you later Don’t let provocative pictures be  made of you Don’t send them online,...
 Bullying has been around a long time  but cyber-bullying is a recent  phenomenon Bullies can be invisible – victims don...
 Don’t respond or retaliate Talk to someone you trust especially  an adult Save the evidence; it could be a police  mat...
I want you to be wise about what isgood and innocent about what is evil.Romans 16:10With great power comes great responsib...
 Sources: “Social media snares” Safe surfing kids Safe kids.com
1. Which screen name is best to have?    A. cheergirl9393    B. chrisp1990    C. sandysmith999    D. horseluvr01    E. tph...
2. While surfing the internet, you get an error  message from your internet provider; it says  that it will delete your ac...
8. While surfing the internet, you see a   website that makes you feel   uncomfortable. What should you do?    A. Write do...
1. I HAVE A PERSONAL SOCIAL WEBPAGE (Facebook Linked in, etc)(yes is 10 points)2. I have posted my personal phone or   cel...
4. I have posted my school/work name   on my social website.(yes – 10 points)5. I post current and future status   updates...
7. I have anti-virus and anti-spyware   programs installed on my computer.(no – 10 points)8. I run my anti-virus and anti-...
11. I have taken digital pictures/video   of myself which I would not feel   comfortable showing my parents.(yes – 50 poin...
14. I have, for what ever  reason, harassed or bullied others  through digital technology.(yes – 100 points)1-30appear to ...
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
Upcoming SlideShare
Loading in …5
×

Cyber-Safety and Digital Citizenship

2,704 views

Published on

Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

Cyber-Safety and Digital Citizenship

  1. 1. Finally brothers, whatever istrue, whatever is noble, whatever isright, whatever is pure, whatever islovely, whatever is admirable – if thereis anything excellent or worthy ofpraise, think on these things.Phil. 4:8
  2. 2. Physical Safety – freedom from physical harmPsychological Safety – freedom from cruelty, harassment, exposure to potentially disturbing materialReputational Safety – freedom from unwanted social or professional consequences that could affect a careerIdentity or Property Safety – freedom from theft of identity and property
  3. 3.  It can be Public and Permanent You have no control who sees it and what they do with it Information can be copied, pasted and modified It may not be received in the way it was intended Unlike face to face when tone, expression give clues, there are none with the net
  4. 4.  Stranger danger Viewing inappropriate content Posting inappropriate content Cyber-bullying Privacy and reputation Online addiction Online inappropriate activities Device security
  5. 5.  Like it or not, personal information sites continue to be more accurate, dig deeper and reveal more and more of your digital life These entities gather information about you, your digital activities and your contacts
  6. 6.  Lost in the rapid progress of technology is a consistent, safe code of use Most digital users do not realize how quickly their online activities can be public and permanent
  7. 7.  Poor digital decision-making starts in the mind of the user Abusing technology, such as sexting and cyber-bullying are the effects of poor digital choices There will be consequences that usually creates a chain reaction that is very difficult to take back
  8. 8.  Development of a “Digital Consciousness” Golden Rule for the 21st century“Develop and maintain a mindset that you are preparedfor your digital actions to be “public and permanent” Realize that you must operate powerful digital tools and technologies with the same preventative mindset that you would use for other things like fire or the automobile This mindset would have you evaluate risk vs. reward before you post information
  9. 9.  Report: Teen gets 15 years for Facebook blackmail Nude picture on phone lost in McDonald’s ends up online Sexting in Maryland school gets student expelled Teen sentenced to 12 months in jail for sexual bullying on Facebook Weiner resigns after sexting scandal
  10. 10.  Provide you with information necessary to understand that you are accountable and responsible for maintaining a Digital Consciousness
  11. 11. Concerns: People may not be who they say they are so have a parent approve anyone you meet online before you talk to them If the conversation turns to sex or starts to make you uncomfortable, get off immediately If someone tries to meet you, contact an adult immediately Never meet up with someone you first meet online If you must take a parent or group of friends and meet in a very public place
  12. 12.  Your online life is a reflection of you Insist that you and people around you are treated respectfully Respect other people’s digital property Stuff you created belongs to you and you should control what is done with it Be original or cite your sources Have your work reflect excellence
  13. 13.  Protect your passwords Create secure passwords Use phrases that are easy to remember but hard to guess Don’t sue the same password for multiple sites
  14. 14.  Make sure that you have security software Be careful of WiFi hotspots – hotel lobbies, airports, etc. Don’t download anything from a source you don’t trust Always back up your data
  15. 15.  It’s up to you to control what other people know about you If it’s private, don’t post it online, even email Anything can be copied, pasted and forwarded Once it is posted, you cannot take it back Don’t post information that could get you in trouble now or in the future
  16. 16.  Do not give out personal informationName Where you livePhone number BirthdateHome Address School/church You can give out impersonal informationSports teams you like favoritemovies(Other likes and dislikes)
  17. 17.  Cyber-bullying – the use of technology to harm another person in a deliberate, repeated and hostile manner Cyber-Mobbing – a form of cyber bullying involving a group sharing the same malicious mindset or intent to harm Flaming – hostile interaction between internet users usually in a internet forum or chat room Cyber-stalking – using electronic means to gather information for the purpose of harass an individual or group; false accusations, threats
  18. 18.  Sexting – The act of sending an image, video, text, etc. of a sexual nature to another individual (digital), smart phone, etc. Outing – Publically revealing personal information without the person’s consent Impersonation – pretending to be another person in order to deceive Phishing – attempting to acquire sensitive information such as usernames, passwords, credit cart information through faking authenticity Malware – deliberate attempt to send a virus crippling the computer’s ability to call up data
  19. 19.  It is against the law It could haunt you later Don’t let provocative pictures be made of you Don’t send them online, even to someone you care about If you get them, don’t share them Don’t carry them around in your phone
  20. 20.  Bullying has been around a long time but cyber-bullying is a recent phenomenon Bullies can be invisible – victims don’t know who the bully is or why they are being targeted Viral – hurtful actions of the bully can spread to a large group of people, the school, the city,.. The perception is everyone is in on the joke
  21. 21.  Don’t respond or retaliate Talk to someone you trust especially an adult Save the evidence; it could be a police matter Be a friend not a bystander Ancomm
  22. 22. I want you to be wise about what isgood and innocent about what is evil.Romans 16:10With great power comes great responsibility.Ben Parker – Spiderman
  23. 23.  Sources: “Social media snares” Safe surfing kids Safe kids.com
  24. 24. 1. Which screen name is best to have? A. cheergirl9393 B. chrisp1990 C. sandysmith999 D. horseluvr01 E. tphscheergrl
  25. 25. 2. While surfing the internet, you get an error message from your internet provider; it says that it will delete your account unless you type in your password again, should you send the information? A. Yes B. No3. If someone online tells you they are a sophomore in high school, and they are taking Driver’s Education classes, they are probably how old? A. 14 B. 15 C. 16 D. No way to tell
  26. 26. 8. While surfing the internet, you see a website that makes you feel uncomfortable. What should you do? A. Write down its name and don’t go there again B. Tell you friends so that they can avoid it to C. Tell a parent, guardian or teacher D. Shut down the computer
  27. 27. 1. I HAVE A PERSONAL SOCIAL WEBPAGE (Facebook Linked in, etc)(yes is 10 points)2. I have posted my personal phone or cell number on my social website or chat room.(yes is 10 points)3. I have posted my home address on my social website.(yes is 10 points)
  28. 28. 4. I have posted my school/work name on my social website.(yes – 10 points)5. I post current and future status updates (going on vacation, going to the mall, etc).(yes – 10 points)6. My understanding is that deleting a pictureor test file from my Digital Tools removes them permanently.(yes – 10 points)
  29. 29. 7. I have anti-virus and anti-spyware programs installed on my computer.(no – 10 points)8. I run my anti-virus and anti- spyware programs daily.(no – 10 points)9. In the digital world, I feel that I am anonymous.(yes – 20 points)10. My social website passsword is truly able to keep my contents private.(yes – 10 points)
  30. 30. 11. I have taken digital pictures/video of myself which I would not feel comfortable showing my parents.(yes – 50 points)12. I shared pictures, video, texts about myself that I would not show my parents.(yes – 100 points)13. I so and say things in front of my webcam that I would not show my parents.(yes – 50 points)
  31. 31. 14. I have, for what ever reason, harassed or bullied others through digital technology.(yes – 100 points)1-30appear to be using digitaltechnology responsibly; chances arelow of being involved in an issue40 – 120 moderately high risk ofidentity theft or exploitation130 – high risk to face a severe ordangerous situation

×