SlideShare a Scribd company logo
Topic: - CYBER SAFETY
Lesson Objectives
1. At the end of the lesson the students should be able to define cyber-safety.
2. At the end of the lesson the student should to identify ways to keep safe online.
3. At the end of the lesson the student should be able to enumerate the ethical
issues in the use of web 2.0 in education.
INTRODUCTTION
cybersafety Internetsafetyoronline safetyorE-Safetyistryingtobe safe on the internetandisthe act
of maximizingauser'sawarenessof personal safetyandsecurityriskstoprivate informationand
propertyassociatedwithusingthe internet,andthe self-protectionfromcomputercrime.
cybersafetymeansbeingsecure online.The online environmentisrife withthreatstooursafetyand
security.Naturally,we wishtomitigate thesethreatswhere possible,notonlyasan organizationbut
alsoin ourindividual capacities.Thesethreatsare everythingthatcanprove a risk,e.g.a publically
accessible internetconnection,phishingemails,suspiciouslinks,downloadable documentsorapps.
Cybersafetyhelpstoavoidthose risksbutalsohelpstoprotectagainsttheirconsequences,becauseitis
impossible toavoidall hazards.Evenwhensomeonecomplieswithall customarysecurityrequirements,
theycouldstill become the targetof an attack.
The followingare the waystokeepsafe online:
1. Network securityisthe practice of securinga computernetworkfromintruders,whether
targetedattackersor opportunisticmalware.
2. Applicationsecurityfocusesonkeepingsoftware and devicesfree of threats.A compromised
applicationcouldprovideaccesstothe data itsdesignedtoprotect.Successful securitybegins
inthe designstage,wellbeforeaprogramor device isdeployed.
3. Informationsecurity protectsthe integrityandprivacyof data, bothinstorage and in transit.
4. Operational security includesthe processesanddecisionsforhandlingandprotectingdata
assets.The permissionsusershave whenaccessinganetworkandthe proceduresthat
determine howandwhere datamaybe storedor sharedall fall underthisumbrella.
5. Disaster recoveryand businesscontinuity define how anorganizationrespondstoacyber-
securityincidentoranyothereventthatcausesthe lossof operationsordata.Disasterrecovery
policiesdictate howthe organizationrestoresitsoperationsandinformationtoreturnto the
same operatingcapacityas before the event.Businesscontinuityisthe planthe organization
fallsbackon while tryingtooperate withoutcertainresources.
6. End-usereducationaddressesthe mostunpredictablecyber-securityfactor:people.Anyone
can accidentallyintroduce avirustoan otherwise securesystembyfailingtofollow good
securitypractices.Teachinguserstodelete suspiciousemail attachments,notplugin
unidentified USBdrives,andvariousotherimportantlessonsisvital forthe securityof any
organization.
CYBER BULLYING
Cyberbullyingisone examplethatcanhave devastatingeffectsonyoungpeople.Cyberbullyingoccurs
whena bullytargetsa victimusingonlinecommunicationmethodssuchastextingorsocial mediaposts
to threaten,abuse,ordegrade someone.Withitsuse of technology,cyberbullyinghasgainedmore
attentionandnotorietyinrecentyears.It’sacrime that doesn’trestrictitself toschool orthe
playground.
What fuelscyberbullying?Unlike traditional bullying,itdoesn’trequire physical strengthoraface-to-
face meeting.AnyonewithanInternetconnectionandadigital device likea smartphone,computeror
tabletcan be a cyberbully.There are nospecifichours,anditcan happenaroundthe clock,whether
throughsocial networkingsitesorinstantmessaging. Sincemanyplatformsdon’tmake aneffortto
verifypeople’sreal identities,acyberbullycanchoose analiasand remainanonymous.Cyberbullyingis
fueledbythiscloakof anonymity,whichoftenservestoheightenthe extentof acyberbully’scruel and
damagingbehavior.Itcan targetanyone,includingyoungkidsandmiddle schoolandhighschool
students. Cyberbullyingcanleave some youthdepressedorwithdrawn,andinsome extremecaseshas
ledvictimstosuicide.
There are manydifferenttypesof cyberbullyingoutthere,andall of themcan be damagingto children
and teens.
Types ofcyberbullying
1. Outing-: Outingisa deliberate acttoembarrassor publiclyhumiliateanindividual bypostingtheir
private,sensitive,orembarrassinginformationonline.The informationrevealedcanbe minoror
serious,butcan have a severe andlastingimpactonthe victim.
2. Fraping-: Frapingisa seriousoffense where apersongainsaccessto the victim’ssocial mediaaccount
and impersonatestheminanattemptto be funnyor to ruintheirreputation.Frapingcanhave serious
consequences,especiallybecause once asocial postisout there,itmay be hard to delete itandmend
the victim’sdigital reputation.
3. Dissing-:Dissingiswhenpeople share orpostcruel informationaboutanindividual onlinetoruin
theirreputationorfriendshipswithothers.Thisincludespostingpersonalphotos,videos,and
screenshots.The personsharingthisinformationmaybe a friendoracquaintance of the victim.Some
cyberbulliesgotogreatlengthstohurt theirvictims,evencreatingwebpagesdesignedtospreadhurtful
informationandliesabouttheirvictims.
4. Trolling-:Trollingisa formof cyberbullyingdone byinsultinganindividual onlinetoprovoke them
enoughtoget a response.Usuallytheseattacksare personal andinstigate angerinthe victim, making
themlashout and behave badly.
5. Trickery -: Trickeryisthe act of gainingavictim’strustso that theyreveal secretsorembarrassing
information,whichthe cyberbullypostsonthe Internetforeveryone tosee.The personpretendstobe
a close friendandconfidant,andgivesthe victimafalse sense of securitybefore breakinghisorher
trust.
6. Sockpuppetsorcatfishing -:A “sockpuppet”isa form of deceptionthatusesafake social media
account. The creator of the fake accountgainstheirvictim’strustbypretendingtobe someone they’re
not.Whentheirvictimdivulgesprivateinformation,the puppeteersharesthatpersonal information
withotherswhomay bullythe victim.Catfishingsimilarlyinvolvessettingupa fake online profile,but
withthe purpose of luringitsvictimintoa deceptiveonline romance.
7. Doxing-: Doxingisderivedfromthe word“documents”andoccurswhena cyberbullyharassesand
threatensavictimonline forrevenge andtodestroytheirvictims’privacy.Doxingsharesprivate
information — suchas Social Securitynumbers,creditcards,phone numbers,andotherpersonal data
— withthe public.
8. Encouragingself-harm-:Some cyberbulliesthreatentohurttheirvictimsorconvince themtohurt
themselves.Itcanbe the worsttype of cyberbullying,becauseitcan leaditsvictimstake theirlivesby
suicide.
Cyberbullying warning signs
Cyberbullyingcomesinmanyformsandcan affectitsvictimsmanyways.It’ssmartto watch for
commonwarningsignsthatyour childisa victimof cyberbullying,aswell asbullyingingeneral.
Depression-:A huge warningsignthat yourchildmay be the victimof cyberbullyingorbullyingisif they
become withdrawnorseemdepressedandsad.Are theylosinginterestinpeople oractivitiestheyused
to enjoy?Are theysleepingin whentheyusuallydon’t?
Avoidance of social situations -:Doesyourchildor teenseemtobe avoidingsocial situationsorfriends
whomtheyenjoyedspendingtime withinthe past?Are theyspendinganinordinate amountof time
alone?Thiscouldbe a signal that somethinggreater,suchascyberbullying,isgoingon.
Changedfrequencyof deviceuse -:Have younoticedthatyour childsuddenlyisalwaysonsocial media
or Snapchat,or textingontheircell phones?Thiscouldsignal theyare the targetof cyberbullying— or
are doingthe bullying.A markeddecreaseindeviceuse couldalsobe awarningsign.Payingattentionto
any changesinyour child’sonlinebehaviorcouldhelpyoudetecttrouble.
Secrecy -: Doesyourchildhide theirdeviceswheneveryou’re aroundordodge questionsabouttheir
online activity?Theycouldbe hidingthe possibilitythattheyare beingbulliedonline.Thisisan
importantopportunityforyoutointervene,helpthemsortouttheiremotions,andputa stopto the
harmful behavior.
Heightenedemotions -:Anotherwarningsignof cyberbullyingisif yourchildseemstogetupsetor
angry whenthey’re online.Cryingisawarningsign.While laughingisn’tabadthing,it mightbe if
they’re the onesdoingorwitnessingthe cyberbullying.
Suspicioussocial mediaaccountactivity -:Has yourchildsuddenlycancelledtheirsocial media
accounts?Or dotheyseemto have multipleaccounts?These couldbe warningsignsthatsomething
isn’tright.
Suspiciousphotos -:Have youseenimages of yourchildontheircell phone orothers’social media
accounts thatare demeaningandinappropriate?Orhave youfoundimagesof someone else onone of
your child’sdevicesthatyouknowthe otherpersonwouldn’twantshared?These are warningsignsthat
eitheryourchildisthe targetor source of cyberbullying.
Hurtful comments -:Are there meancommentsharassingorembarrassingyourchildontheirsocial
mediaaccountsor in theirtextmessages?Keepingupwiththeironline activityisimportant,especially
so youcan spot cyberbullyingbehavior — suchas hurtful comments — before theyare deleted.Evenif
deleted,thosecommentsmayinflictemotionaldamage onyourchild.
How to protect your child from cyberbullying -: One of the firstthings parentsshoulddowhen
theirchildisbeingcyberbulliedisremembertostayaware and calm.Childrenmaynotlike totell their
parentswhentheyare beingcyberbulliedbecausetheyfeel embarrassedorthey’re afraidtheymight
lose theirinternetprivileges.
Talk to yourkidsaboutcyberbullying.Letthemknow cyberbullyingcanbe common that theyaren’tthe
onlyvictims.Teachyourkidsthe basicsof online securityandstayconnectedwiththemdailyand
digitally.
Anotheroptiontokeepchildrensafe onlineistoinstall reliableonline securityonall of the devicesthey
access.For instance letsyourkidsexplore the webfreelywhile keepingyouinthe know aboutwhich
sitestheyvisit.Itcomeswithparental controlsthatblockunsuitablecontentfor kidsandprovides
insightintoyourchild’ssocial mediaactivitywhentheylogintosocial mediasitesfromtheirPC.
The securitysoftware alsohelpsprotectyourchildfromaccidentallygivingoutsensitivepersonal
informationfromtheircomputer.Thisincludesphone numbers,address,email,andthe school they
attend.It alsoalertsyouwhenyourchildattemptstovisita blockedsite.
Cyberbullyingisaproblemthat’snoteasyto solve.Butawarenessandknowledgeare the firststepsto
helpkeepyourchildrensafe online.
ETHICAL ISSUES RELATED TO WEB 2.0 IN EDUCATION
Ethicsare a setof standardsgoverningthe conductof membersof a profession.Ethicsestablishbasic
valuesforresponsible actionsandpracticeswithinaprofessional community.Althoughtheremaybe no
punishmentforviolatingethical standards,some practices(suchasspammingandsendingviruses) are
beingwrittenorwill be writtenintolaw.The generallyagreed-uponethical standardsforWeb
professionalshave developedfromyearsof experience,andmanyhave beeninheritedfromother
professions.
Web2.0 toolsare toolsof technologythatallow teachersandstudentsaliketocreate,collaborate,edit
and share contenton-line thatisuser-generated....Toolsforthe creationandsupportof a web-based
learningenvironment.Toolsforcommunicationandthe cultivationof relationships.Web2.0toolsare
free digital programsthatcan be usedfor creatingandsharingstudent-generatedprojectsandproducts.
Theyare interactive,multi-purpose,easy-to-use digital platformsthatencourage studentstocollaborate
witheachotheror create and share individualizedresponse products.
Web2.0 toolsprovide engagingwaysstudentscaninteractwith,andmostimportantly,learnfrom
course material.Theyare particularlyhelpful whenalignedtoteachingandassessmentexercisesmeant
to increase studentengagement,require studentstosummarize information,orverbalize insightinto
theirconceptual understandingthroughmeansotherthantraditional writingexercises.Web2.0tools
alsoprovide studentsanopportunitytointeractwithothersastheyshare theirknowledge.Students
can collaborate withclassmatestocreate response products,ortheycanshare completedproductswith
peersintheirclass,studentsinothersections,orotherlearnersaroundthe world.Web2.0toolscreate
opportunitiesforstudentstoshare whattheyare learningwithawideraudience. Examplesof Web2.0
sitesinclude Wikipedia,Facebook,Twitter,andwebblog sites,(e.g.wordpress) whichall transformed
the way the same informationwassharedanddelivered.
Examplesof ethical behaviorforWebprofessionalsincludethe following:
I. Do not sendunsolicitedbulke-mail,orspam.
II. Do not buydomainnamesthatyou do notintendtouse (a practice also knownasdomain
squattingorcyber-squatting).
III. Do not knowinglyspreadmaliciousprogramcode suchas virusesorworms.
IV. Do not passalongchain e-mail messages,especiallythose that implythreats.
V. Be honestwithyourcustomers,anddonot overcharge fortechnical servicesthattheymaynot
understand.
The followingare kindsof ethical issuesrelatedtoweb2.0 ineducation
1. Spam -:Spam isunsolicitedbulke-mail — thatis,e-mail messagesthatthe recipientsdidnotask
to receive.Asyouare undoubtedlyaware,millions(if notbillions) of spammessagesare sentto
Webuserseveryday.
2. Uneasinesswithopenness.A numberof participantsnotedthatthe opennature of Web2.0
technologiesisstill new tomanystudents.Theyreportedthatsome studentsare very
uncomfortable withthe opennessandare reluctanttoparticipate inclassactivitiesthatutilize
Web2.0.
3. privacyissueswithWeb2.0. Most of these toolsrequire eachstudenttocreate an account.
Whenstudentscreate accounts,the website storesandsometimessell theirinformation.
4. Offensive orIllegal Content -:The multitudeof offensive andinappropriate contentavailable
online leadstomanydifficultandawkwardconversationswithourchildren.Andthisisonlythe
contentthey’ll openlyaskusabout.Aschildrenbecome older,they’relesslikelytoconsultwith
a parenton what theyhave seenanddon’tunderstand,outof fearof devicesbeingtakenaway
fromthemor parental controlsapplied.Associal mediahascome intoplay,there isalsoan
increase inthe amountof inappropriate andillegalcontentmade availabletokidswithoutthem
evenhavingtoseekitout.Lately,since Facebookreleasedtheir“Live Video”feature therehas
beena frequencyof youngpeoplelivestreamingthemselvesself-harming.These videos,when
viewedinreal time are unmonitoredandcantake weekstobe removedbyFacebook.
5. UnwantedContact-: Whenit comesto the online world,where there are childrenthere are
predators.Withan increase inthe availabilityof livestreamingappsandpublicmessagingapps,
there isan increasedopportunityforpredatorstoreadilytargetandgroomtheirvictims.Sadly,
it ismore difficultforyoungerchildrentounderstandthatapersonposingonline asachildmay
be someone mucholderattemptingtogroomthem.Because of this,they’re more likelyto
readilyshare informationaboutthemselves.Live streamingappspresentaverygreatriskas
childrendon’t realisehoweasilytheycanbe foundinreal life,justfrompostingvideosintheir
school uniform.

More Related Content

What's hot

Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
cschoeneman
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...
Stevecd
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
jordan-and-haden
 
Net Cetera | Provided by: FTC
Net Cetera | Provided by: FTCNet Cetera | Provided by: FTC
Net Cetera | Provided by: FTC
GiddingsComputerServices
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and schoolGrant Ward
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
Toby Treacher
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
Nicastro Consultants
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
ijtsrd
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
21rahul1999
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
Rodolfo Salazar
 
Playing safe
Playing safePlaying safe
Playing safe
hutchison
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
Kate Gukeisen
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
Laura Dunkley
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
- Mark - Fullbright
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Chatting with Kids About Being Online
Chatting with Kids About Being OnlineChatting with Kids About Being Online
Chatting with Kids About Being Online
- Mark - Fullbright
 
Digital wellness and your family internet upload
Digital wellness and your family   internet uploadDigital wellness and your family   internet upload
Digital wellness and your family internet upload
Pella Christian Grade School
 
Adolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing MatterAdolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing Matter
caitystew
 

What's hot (20)

Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Net Cetera | Provided by: FTC
Net Cetera | Provided by: FTCNet Cetera | Provided by: FTC
Net Cetera | Provided by: FTC
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Playing safe
Playing safePlaying safe
Playing safe
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Chatting with Kids About Being Online
Chatting with Kids About Being OnlineChatting with Kids About Being Online
Chatting with Kids About Being Online
 
Digital wellness and your family internet upload
Digital wellness and your family   internet uploadDigital wellness and your family   internet upload
Digital wellness and your family internet upload
 
Adolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing MatterAdolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing Matter
 

Similar to Cyber safety word for edmodo

Cybersafey
Cybersafey Cybersafey
Cybersafey
Vanessa Assumpção
 
The Prevention of Cyberbullying
The Prevention of CyberbullyingThe Prevention of Cyberbullying
The Prevention of Cyberbullying
RRGraph Design
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
pscl
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
pardolopez
 
Using Your WITS To Deal With Cyberbullying
Using Your WITS To Deal With CyberbullyingUsing Your WITS To Deal With Cyberbullying
Using Your WITS To Deal With Cyberbullying
witsprograms
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Joyce Hirsh
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Zekhaya Sithole
 
The Digital Playground
The Digital  PlaygroundThe Digital  Playground
The Digital Playground
Kim Cofino
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
Sumaiya Ismail
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
seswear9388
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
cyberbullyingisreal
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
Cyber Contacts
Cyber ContactsCyber Contacts
Cyber Contacts
MaimoonahKhan
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
JaveriaZain1
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
SEG AT2.pptx
SEG AT2.pptxSEG AT2.pptx
SEG AT2.pptx
BradyTrotman
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
Rahil Foundation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Shelby Mitchell
 

Similar to Cyber safety word for edmodo (20)

Cybersafey
Cybersafey Cybersafey
Cybersafey
 
The Prevention of Cyberbullying
The Prevention of CyberbullyingThe Prevention of Cyberbullying
The Prevention of Cyberbullying
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Using Your WITS To Deal With Cyberbullying
Using Your WITS To Deal With CyberbullyingUsing Your WITS To Deal With Cyberbullying
Using Your WITS To Deal With Cyberbullying
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
The Digital Playground
The Digital  PlaygroundThe Digital  Playground
The Digital Playground
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber Contacts
Cyber ContactsCyber Contacts
Cyber Contacts
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
SEG AT2.pptx
SEG AT2.pptxSEG AT2.pptx
SEG AT2.pptx
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Cyber safety word for edmodo

  • 1. Topic: - CYBER SAFETY Lesson Objectives 1. At the end of the lesson the students should be able to define cyber-safety. 2. At the end of the lesson the student should to identify ways to keep safe online. 3. At the end of the lesson the student should be able to enumerate the ethical issues in the use of web 2.0 in education. INTRODUCTTION cybersafety Internetsafetyoronline safetyorE-Safetyistryingtobe safe on the internetandisthe act of maximizingauser'sawarenessof personal safetyandsecurityriskstoprivate informationand propertyassociatedwithusingthe internet,andthe self-protectionfromcomputercrime. cybersafetymeansbeingsecure online.The online environmentisrife withthreatstooursafetyand security.Naturally,we wishtomitigate thesethreatswhere possible,notonlyasan organizationbut alsoin ourindividual capacities.Thesethreatsare everythingthatcanprove a risk,e.g.a publically accessible internetconnection,phishingemails,suspiciouslinks,downloadable documentsorapps. Cybersafetyhelpstoavoidthose risksbutalsohelpstoprotectagainsttheirconsequences,becauseitis impossible toavoidall hazards.Evenwhensomeonecomplieswithall customarysecurityrequirements, theycouldstill become the targetof an attack. The followingare the waystokeepsafe online: 1. Network securityisthe practice of securinga computernetworkfromintruders,whether targetedattackersor opportunisticmalware. 2. Applicationsecurityfocusesonkeepingsoftware and devicesfree of threats.A compromised applicationcouldprovideaccesstothe data itsdesignedtoprotect.Successful securitybegins inthe designstage,wellbeforeaprogramor device isdeployed. 3. Informationsecurity protectsthe integrityandprivacyof data, bothinstorage and in transit. 4. Operational security includesthe processesanddecisionsforhandlingandprotectingdata assets.The permissionsusershave whenaccessinganetworkandthe proceduresthat determine howandwhere datamaybe storedor sharedall fall underthisumbrella. 5. Disaster recoveryand businesscontinuity define how anorganizationrespondstoacyber- securityincidentoranyothereventthatcausesthe lossof operationsordata.Disasterrecovery policiesdictate howthe organizationrestoresitsoperationsandinformationtoreturnto the same operatingcapacityas before the event.Businesscontinuityisthe planthe organization fallsbackon while tryingtooperate withoutcertainresources. 6. End-usereducationaddressesthe mostunpredictablecyber-securityfactor:people.Anyone can accidentallyintroduce avirustoan otherwise securesystembyfailingtofollow good securitypractices.Teachinguserstodelete suspiciousemail attachments,notplugin unidentified USBdrives,andvariousotherimportantlessonsisvital forthe securityof any organization.
  • 2. CYBER BULLYING Cyberbullyingisone examplethatcanhave devastatingeffectsonyoungpeople.Cyberbullyingoccurs whena bullytargetsa victimusingonlinecommunicationmethodssuchastextingorsocial mediaposts to threaten,abuse,ordegrade someone.Withitsuse of technology,cyberbullyinghasgainedmore attentionandnotorietyinrecentyears.It’sacrime that doesn’trestrictitself toschool orthe playground. What fuelscyberbullying?Unlike traditional bullying,itdoesn’trequire physical strengthoraface-to- face meeting.AnyonewithanInternetconnectionandadigital device likea smartphone,computeror tabletcan be a cyberbully.There are nospecifichours,anditcan happenaroundthe clock,whether throughsocial networkingsitesorinstantmessaging. Sincemanyplatformsdon’tmake aneffortto verifypeople’sreal identities,acyberbullycanchoose analiasand remainanonymous.Cyberbullyingis fueledbythiscloakof anonymity,whichoftenservestoheightenthe extentof acyberbully’scruel and damagingbehavior.Itcan targetanyone,includingyoungkidsandmiddle schoolandhighschool students. Cyberbullyingcanleave some youthdepressedorwithdrawn,andinsome extremecaseshas ledvictimstosuicide. There are manydifferenttypesof cyberbullyingoutthere,andall of themcan be damagingto children and teens. Types ofcyberbullying 1. Outing-: Outingisa deliberate acttoembarrassor publiclyhumiliateanindividual bypostingtheir private,sensitive,orembarrassinginformationonline.The informationrevealedcanbe minoror serious,butcan have a severe andlastingimpactonthe victim. 2. Fraping-: Frapingisa seriousoffense where apersongainsaccessto the victim’ssocial mediaaccount and impersonatestheminanattemptto be funnyor to ruintheirreputation.Frapingcanhave serious consequences,especiallybecause once asocial postisout there,itmay be hard to delete itandmend the victim’sdigital reputation. 3. Dissing-:Dissingiswhenpeople share orpostcruel informationaboutanindividual onlinetoruin theirreputationorfriendshipswithothers.Thisincludespostingpersonalphotos,videos,and screenshots.The personsharingthisinformationmaybe a friendoracquaintance of the victim.Some cyberbulliesgotogreatlengthstohurt theirvictims,evencreatingwebpagesdesignedtospreadhurtful informationandliesabouttheirvictims. 4. Trolling-:Trollingisa formof cyberbullyingdone byinsultinganindividual onlinetoprovoke them enoughtoget a response.Usuallytheseattacksare personal andinstigate angerinthe victim, making themlashout and behave badly. 5. Trickery -: Trickeryisthe act of gainingavictim’strustso that theyreveal secretsorembarrassing information,whichthe cyberbullypostsonthe Internetforeveryone tosee.The personpretendstobe a close friendandconfidant,andgivesthe victimafalse sense of securitybefore breakinghisorher trust. 6. Sockpuppetsorcatfishing -:A “sockpuppet”isa form of deceptionthatusesafake social media account. The creator of the fake accountgainstheirvictim’strustbypretendingtobe someone they’re
  • 3. not.Whentheirvictimdivulgesprivateinformation,the puppeteersharesthatpersonal information withotherswhomay bullythe victim.Catfishingsimilarlyinvolvessettingupa fake online profile,but withthe purpose of luringitsvictimintoa deceptiveonline romance. 7. Doxing-: Doxingisderivedfromthe word“documents”andoccurswhena cyberbullyharassesand threatensavictimonline forrevenge andtodestroytheirvictims’privacy.Doxingsharesprivate information — suchas Social Securitynumbers,creditcards,phone numbers,andotherpersonal data — withthe public. 8. Encouragingself-harm-:Some cyberbulliesthreatentohurttheirvictimsorconvince themtohurt themselves.Itcanbe the worsttype of cyberbullying,becauseitcan leaditsvictimstake theirlivesby suicide. Cyberbullying warning signs Cyberbullyingcomesinmanyformsandcan affectitsvictimsmanyways.It’ssmartto watch for commonwarningsignsthatyour childisa victimof cyberbullying,aswell asbullyingingeneral. Depression-:A huge warningsignthat yourchildmay be the victimof cyberbullyingorbullyingisif they become withdrawnorseemdepressedandsad.Are theylosinginterestinpeople oractivitiestheyused to enjoy?Are theysleepingin whentheyusuallydon’t? Avoidance of social situations -:Doesyourchildor teenseemtobe avoidingsocial situationsorfriends whomtheyenjoyedspendingtime withinthe past?Are theyspendinganinordinate amountof time alone?Thiscouldbe a signal that somethinggreater,suchascyberbullying,isgoingon. Changedfrequencyof deviceuse -:Have younoticedthatyour childsuddenlyisalwaysonsocial media or Snapchat,or textingontheircell phones?Thiscouldsignal theyare the targetof cyberbullying— or are doingthe bullying.A markeddecreaseindeviceuse couldalsobe awarningsign.Payingattentionto any changesinyour child’sonlinebehaviorcouldhelpyoudetecttrouble. Secrecy -: Doesyourchildhide theirdeviceswheneveryou’re aroundordodge questionsabouttheir online activity?Theycouldbe hidingthe possibilitythattheyare beingbulliedonline.Thisisan importantopportunityforyoutointervene,helpthemsortouttheiremotions,andputa stopto the harmful behavior. Heightenedemotions -:Anotherwarningsignof cyberbullyingisif yourchildseemstogetupsetor angry whenthey’re online.Cryingisawarningsign.While laughingisn’tabadthing,it mightbe if they’re the onesdoingorwitnessingthe cyberbullying. Suspicioussocial mediaaccountactivity -:Has yourchildsuddenlycancelledtheirsocial media accounts?Or dotheyseemto have multipleaccounts?These couldbe warningsignsthatsomething isn’tright. Suspiciousphotos -:Have youseenimages of yourchildontheircell phone orothers’social media accounts thatare demeaningandinappropriate?Orhave youfoundimagesof someone else onone of
  • 4. your child’sdevicesthatyouknowthe otherpersonwouldn’twantshared?These are warningsignsthat eitheryourchildisthe targetor source of cyberbullying. Hurtful comments -:Are there meancommentsharassingorembarrassingyourchildontheirsocial mediaaccountsor in theirtextmessages?Keepingupwiththeironline activityisimportant,especially so youcan spot cyberbullyingbehavior — suchas hurtful comments — before theyare deleted.Evenif deleted,thosecommentsmayinflictemotionaldamage onyourchild. How to protect your child from cyberbullying -: One of the firstthings parentsshoulddowhen theirchildisbeingcyberbulliedisremembertostayaware and calm.Childrenmaynotlike totell their parentswhentheyare beingcyberbulliedbecausetheyfeel embarrassedorthey’re afraidtheymight lose theirinternetprivileges. Talk to yourkidsaboutcyberbullying.Letthemknow cyberbullyingcanbe common that theyaren’tthe onlyvictims.Teachyourkidsthe basicsof online securityandstayconnectedwiththemdailyand digitally. Anotheroptiontokeepchildrensafe onlineistoinstall reliableonline securityonall of the devicesthey access.For instance letsyourkidsexplore the webfreelywhile keepingyouinthe know aboutwhich sitestheyvisit.Itcomeswithparental controlsthatblockunsuitablecontentfor kidsandprovides insightintoyourchild’ssocial mediaactivitywhentheylogintosocial mediasitesfromtheirPC. The securitysoftware alsohelpsprotectyourchildfromaccidentallygivingoutsensitivepersonal informationfromtheircomputer.Thisincludesphone numbers,address,email,andthe school they attend.It alsoalertsyouwhenyourchildattemptstovisita blockedsite. Cyberbullyingisaproblemthat’snoteasyto solve.Butawarenessandknowledgeare the firststepsto helpkeepyourchildrensafe online. ETHICAL ISSUES RELATED TO WEB 2.0 IN EDUCATION Ethicsare a setof standardsgoverningthe conductof membersof a profession.Ethicsestablishbasic valuesforresponsible actionsandpracticeswithinaprofessional community.Althoughtheremaybe no punishmentforviolatingethical standards,some practices(suchasspammingandsendingviruses) are beingwrittenorwill be writtenintolaw.The generallyagreed-uponethical standardsforWeb professionalshave developedfromyearsof experience,andmanyhave beeninheritedfromother professions. Web2.0 toolsare toolsof technologythatallow teachersandstudentsaliketocreate,collaborate,edit and share contenton-line thatisuser-generated....Toolsforthe creationandsupportof a web-based learningenvironment.Toolsforcommunicationandthe cultivationof relationships.Web2.0toolsare free digital programsthatcan be usedfor creatingandsharingstudent-generatedprojectsandproducts. Theyare interactive,multi-purpose,easy-to-use digital platformsthatencourage studentstocollaborate witheachotheror create and share individualizedresponse products. Web2.0 toolsprovide engagingwaysstudentscaninteractwith,andmostimportantly,learnfrom course material.Theyare particularlyhelpful whenalignedtoteachingandassessmentexercisesmeant to increase studentengagement,require studentstosummarize information,orverbalize insightinto theirconceptual understandingthroughmeansotherthantraditional writingexercises.Web2.0tools
  • 5. alsoprovide studentsanopportunitytointeractwithothersastheyshare theirknowledge.Students can collaborate withclassmatestocreate response products,ortheycanshare completedproductswith peersintheirclass,studentsinothersections,orotherlearnersaroundthe world.Web2.0toolscreate opportunitiesforstudentstoshare whattheyare learningwithawideraudience. Examplesof Web2.0 sitesinclude Wikipedia,Facebook,Twitter,andwebblog sites,(e.g.wordpress) whichall transformed the way the same informationwassharedanddelivered. Examplesof ethical behaviorforWebprofessionalsincludethe following: I. Do not sendunsolicitedbulke-mail,orspam. II. Do not buydomainnamesthatyou do notintendtouse (a practice also knownasdomain squattingorcyber-squatting). III. Do not knowinglyspreadmaliciousprogramcode suchas virusesorworms. IV. Do not passalongchain e-mail messages,especiallythose that implythreats. V. Be honestwithyourcustomers,anddonot overcharge fortechnical servicesthattheymaynot understand. The followingare kindsof ethical issuesrelatedtoweb2.0 ineducation 1. Spam -:Spam isunsolicitedbulke-mail — thatis,e-mail messagesthatthe recipientsdidnotask to receive.Asyouare undoubtedlyaware,millions(if notbillions) of spammessagesare sentto Webuserseveryday. 2. Uneasinesswithopenness.A numberof participantsnotedthatthe opennature of Web2.0 technologiesisstill new tomanystudents.Theyreportedthatsome studentsare very uncomfortable withthe opennessandare reluctanttoparticipate inclassactivitiesthatutilize Web2.0. 3. privacyissueswithWeb2.0. Most of these toolsrequire eachstudenttocreate an account. Whenstudentscreate accounts,the website storesandsometimessell theirinformation. 4. Offensive orIllegal Content -:The multitudeof offensive andinappropriate contentavailable online leadstomanydifficultandawkwardconversationswithourchildren.Andthisisonlythe contentthey’ll openlyaskusabout.Aschildrenbecome older,they’relesslikelytoconsultwith a parenton what theyhave seenanddon’tunderstand,outof fearof devicesbeingtakenaway fromthemor parental controlsapplied.Associal mediahascome intoplay,there isalsoan increase inthe amountof inappropriate andillegalcontentmade availabletokidswithoutthem evenhavingtoseekitout.Lately,since Facebookreleasedtheir“Live Video”feature therehas beena frequencyof youngpeoplelivestreamingthemselvesself-harming.These videos,when viewedinreal time are unmonitoredandcantake weekstobe removedbyFacebook. 5. UnwantedContact-: Whenit comesto the online world,where there are childrenthere are predators.Withan increase inthe availabilityof livestreamingappsandpublicmessagingapps, there isan increasedopportunityforpredatorstoreadilytargetandgroomtheirvictims.Sadly, it ismore difficultforyoungerchildrentounderstandthatapersonposingonline asachildmay be someone mucholderattemptingtogroomthem.Because of this,they’re more likelyto readilyshare informationaboutthemselves.Live streamingappspresentaverygreatriskas childrendon’t realisehoweasilytheycanbe foundinreal life,justfrompostingvideosintheir school uniform.