This document discusses communication technologies and some of the negative effects of their use. It covers mobile phones, radiation, cyberbullying, online abuse, malware, and risks of public networks. The key points are: ionizing radiation from technologies can damage cells and cause health issues depending on dose; mobile phone overuse can impact health and social life; cyberbullying and online abuse like sexting are problems, especially for women and children; viruses and malware spread through emails and infect devices; and public networks pose man-in-the-middle risks without encryption through VPNs. Throughout, it provides safety tips like using antivirus software and reporting issues to trusted adults.
4. · Ionizing radiation is a flow of energy that is able to change an atom’s structure
(by freeing atoms thus creating ions or charged atoms). Key facts:
- Ionizing radiation can take form of waves (X and gamma rays) of particles (Alpha
and Beta subatomic particles).
- It can damage our cells depending on the
intensity of the radiation and the absorbed
dose. It can cause burns, cancer, mutations…
- It has beneficial medical uses (diagnose,
radiotherapy, agriculture…) and also present
in nature (rocks like granite, dead
organisms…). This video
explains it better.
· Non-ionizing radiation is not able to change an atom’s structure, thus it doesn’t
have negative biological effects.
• KINDS OF RADIATION THAT HAVE NEGATIVE BIOLOGICAL EFFECTS
5. • ALPHA AND BETA PARTICLES, GAMMA RAYS
· Alpha particles are Helium atoms that have lost their electrons and are positively
charged.
· Beta particles are high-speed electrons or positrons emitted in a nuclear fission
process.
· Gamma rays are electromagnetic radiation of short wavelength and high energy
produced in the disintegration of a radioactive atom’s nucleus.
7. • MOBILE PHONE ABUSE
· Some undesired consequences of the abuse of mobile phones and other
communication portable devices are:
- Decrease in IQ
- Concentration problems
- Muscular problems (neck and fingers)
- Headaches
- Social isolation
- Accidents
- Sleeping and anxiety problems related with the blue light
- Sight problems (increase of 35% of cases of myopia since the launch of
mobile phones)
- Stress and anxiety when you can’t check your phone inmediately
- Addiction
- Loss of self esteem related to social networks
- Abandoning other hobbies that are more enriching
- More time indoors Less exposure to sunlight (vitamins, endorphins)
8. · Cybercrime and online abuse are not the same.
- Cybercrime is an ilegal act that happens in the Internet.
- Online abuse is a humiliating, threatening or intimidating behaviour in the
Internet. Online abuse can turn into a crime when it breaks a law.
• CYBERCRIME AND ONLINE ABUSE
· Cyber-bullying is an individual or
group behaviour that occurs repeatedly
and a harming intention, where the
victim is harassed by rumours, treats,
pejorative labels, sexual remarks, private
photos… normally in social networks or
other Internet environments.
What to do: Save evidences and tell an adult
9. A study made 2 years ago in US population between 13 and 24 years old…
10. Link to the video
To retaliate = fighting back, tomar represalias
11. · Image-based abuse occurs when someone uses private images of a person for
harming, humilliating or threatening them.
· Sexting is sending sexually explicit phots or videos though the Internet. It can
become a problem when that content is shared beyond the recipient. Sharing this
type of content without the creator’s consent can become a crime for possessing
and distributing child pornography.
· Cyber-stalking / Trolling is a constant and obsesive investigation about
someone in chats or social networks with the objective to steal information and use
it for threatening that person or stealing their identity. This affects women, children
and minorities the most ans it’s normally exerted by someone they know.
• SOME ONLINE ABUSES OR RISKS
What to do: Save evidences, be very careful with
what you share and tell an adult
12. · Grooming is building a relationship with someone (normally a kid or young
person). The victim has an emotional connection with the abuser and trusts them
so later the abuser can manipulate, exploit and abuse them.
• MAIN RISKS OF ONLINE NAVIGATION
What to do: Don’t talk to people you don’t know
in the Internet, save evidences and tell an adult
· Spoofing is a fraudulent act where an
unknown font pretends to be familiar to you
so that you share private data or do
something for them. Spoofing is only a crime
if it’s used for ilegal acts.
Link to the video
13. · Grooming, spoofing and other techniques can have the final objective that you
give out personal data (like an account number or a password) or click on links that
later will bring problems. This is called phishing.
· Spam are email sent massively to a huge number of recipients normally with
publicitary purposes. Behind many spam emails there are fraudulent bots that try
to get personal data from you, access your contacts to resend spam, make you
click on links that will download malware to your device…
• MAIN RISKS OF ONLINE NAVIGATION
What to do: Check the spelling of websites you
visit and emails you open. Put filters to your inbox.
Unscribe from undesired mailing lists and DELETE
strange emails without opening!
14. Intro video
· A virus is a malicious program installed in your computer without your knowledge
that may or not harm your computer. Viruses spread to other computers easily and
can:
1- change your booting options
2- delete your hard drive’s information
3- scan your contacts to resend them viruses
4- hijack your browser so you are directed to a specific website
5- cause programs malfunctioning
6- read what you type to steal passwords or data
7- … and many new things day after day!!
• MALICIOUS SOFTWARE
What to do: Install a good antivirus + antimalware and keep them
updated, don’t click on pop-ups, avoid email attachments from unknown
senders, check your URL…
Symantec
Norton
Panda
AVG
McAfee
Avast
Kaspersky
Avira
Malware bytes
Bitdefender
Total AV…
15. · Adware are legal programs that are installed in your computer and show
advertisements while other applications are being used. Adware can be linked to
spyware, which is dangerous because it can collect personal data, redirect your
online navigation, install undesired software or take control of programs.
· Spam or junk email is a way for all these malware to get in
your systems. It’s an unsolicited email sent to thousands of
recipients normally with comercial purposes but that can be linked to adware,
spyware or viruses.
• MALICIOUS SOFTWARE
What to do: Install a good antiadware and keep them updated, read
before you click!!
Spybot search and destroy
Spysweeper
Ad-aware
What to do: Have filters to your inbox, check the sender’s email spelling,
delete without reading, block
16. · While connected to public wireless networks, man-in-the-middle attacks can
happen. This is when the user’s communication with a web server is intercepted by a
cracker to steal personal information (it’s a phishing technique).
Link to the video
· A VPN (Virtual Private Network) is a tunnel within a network along which all the
information travels encrypted. There are apps that help you set up a VPN.
· If you are sharing devices, Incognito browsing will delete your cookies, navigation
history, passwords…
• RISKS IN PUBLIC NETWORKS