SlideShare a Scribd company logo
INTRODUCTION TO
CYBER WELLNESS


LESSON OUTLINE
1. Understand the importance of having proper netiquette and portray them in real
world context

2. Understand the positive and negative impacts on the use of the social media
3. Recognise the different forms of cyberbullying
4. Ability to respond appropriately to cyber bullying without being afraid of the cyber
bullies
WHAT IS CYBER WELLNESS?
The positive well-being of Internet users (You, me & everyone else!)
An understanding of the risks of harmful online behavior and awareness
of how to protect oneself and other Internet users from such behavior
BROAD TOPICS OF CYBER
WELLNESS
1. Content
2. Social Interactions
3. Computer Security
4. Psychological Compulsions
1. CONTENT
• Copyright violations (plagiarism, unauthorized distribution of content)
• Inappropriate content
(violence etc.)

• Hate websites
(negative misinformation)
2. SOCIAL INTERACTIONS
• Netiquette (proper online behavior)
• Neglect of privacy (unnecessary divulgement of personal information)
• Cyberbullying (harm and harassment through hostilities online)
• Danger with cyber contacts (online predators)
3. COMPUTER SECURITY
• Virtual bugs and viruses
• Spam (mail and adverts)
• Viruses (Trojan horses etc.)
• Malware (malicious software)
• Phishing
(scamming of important information)
4. PSYCHOLOGICAL
COMPULSIONS
• Internet or Game addiction
SOCIAL INTERACTIONS:
CYBERBULLYING
• With the rapid surge of IT,
cyberbullying has become
increasingly common, especially
amongst teenagers.
• Done commonly through
platforms such as mobile
technology, social media,
gaming and even via text.
SO HOW CAN YOU PROTECT
YOURSELF AND HELP OTHERS?
• Vigilance – Always exercise caution online and watch out for others
• Awareness – Be aware of the possible threats online
• Consideration – Be considerate and sensitive towards others
• Knowledge – Know the appropriate behavior and security measures
online

More Related Content

What's hot

Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
Juan Miguel Palero
 
Software Applications and Platforms.pptx
Software Applications and Platforms.pptxSoftware Applications and Platforms.pptx
Software Applications and Platforms.pptx
marlonfelizardo3
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cybercrime
CybercrimeCybercrime
Cybercrime
John Ela Echon
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
John Bosco Javellana, MAEd.
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
Moumita Chatterjee
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
Bobby Dait
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
Leelet1121
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
AlminaVelasco
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
Arah Louise
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
DonikaLici
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
Gab Billones
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
JazzyNF
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
Can R. PAHALI
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
josiebrookeday
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
MIL_WEEK-3.pptx
MIL_WEEK-3.pptxMIL_WEEK-3.pptx
MIL_WEEK-3.pptx
PrincessAnnDimaano
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Nuria Quiles
 
Social Media : Pros and Cons
Social Media : Pros and ConsSocial Media : Pros and Cons
Social Media : Pros and Cons
Ritesh Singh
 

What's hot (20)

Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Software Applications and Platforms.pptx
Software Applications and Platforms.pptxSoftware Applications and Platforms.pptx
Software Applications and Platforms.pptx
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
MIL_WEEK-3.pptx
MIL_WEEK-3.pptxMIL_WEEK-3.pptx
MIL_WEEK-3.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Social Media : Pros and Cons
Social Media : Pros and ConsSocial Media : Pros and Cons
Social Media : Pros and Cons
 

Viewers also liked

Cyber-Wellness
Cyber-WellnessCyber-Wellness
Cyber-Wellness
Jessica Chai Pei Shan
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internetbeh yong hua
 
Cyberwellness
CyberwellnessCyberwellness
Cyberwellness
beh yong hua
 
2014.02.03 - NAEC Seminar_Inclusive Growth (Presentation 1)
2014.02.03 - NAEC Seminar_Inclusive Growth (Presentation 1)2014.02.03 - NAEC Seminar_Inclusive Growth (Presentation 1)
2014.02.03 - NAEC Seminar_Inclusive Growth (Presentation 1)OECD_NAEC
 
գարունը իմ բակում
գարունը իմ բակումգարունը իմ բակում
գարունը իմ բակում
AnoushHrach
 
Ճապօնիա
ՃապօնիաՃապօնիա
Ճապօնիա
AnoushHrach
 
2014.04.29_NAEC Seminar_Closing the loop
2014.04.29_NAEC Seminar_Closing the loop2014.04.29_NAEC Seminar_Closing the loop
2014.04.29_NAEC Seminar_Closing the loopOECD_NAEC
 
2014.11.28 - NAEC Group Meeting_Lamia Kamal-Chaoui
2014.11.28 - NAEC Group Meeting_Lamia Kamal-Chaoui2014.11.28 - NAEC Group Meeting_Lamia Kamal-Chaoui
2014.11.28 - NAEC Group Meeting_Lamia Kamal-Chaoui
OECD_NAEC
 
презентация Microsoft office power point
презентация Microsoft office power pointпрезентация Microsoft office power point
презентация Microsoft office power point
AnoushHrach
 
Yerevan
YerevanYerevan
Yerevan
AnoushHrach
 
2014.05.19 - OECD-ECLAC Workshop_Session 1_Greg FISHER
2014.05.19 - OECD-ECLAC Workshop_Session 1_Greg FISHER2014.05.19 - OECD-ECLAC Workshop_Session 1_Greg FISHER
2014.05.19 - OECD-ECLAC Workshop_Session 1_Greg FISHEROECD_NAEC
 
ծածկույթային հյուսվածք
ծածկույթային հյուսվածքծածկույթային հյուսվածք
ծածկույթային հյուսվածքAnoushHrach
 
Հին քաղաքակրթություններ
Հին քաղաքակրթություններՀին քաղաքակրթություններ
Հին քաղաքակրթություններ
AnoushHrach
 
ճամփորդությունը
ճամփորդությունըճամփորդությունը
ճամփորդությունը
AnoushHrach
 
Հովհաննես Թումանյան Քառյակներ
Հովհաննես Թումանյան ՔառյակներՀովհաննես Թումանյան Քառյակներ
Հովհաննես Թումանյան Քառյակներ
AnoushHrach
 
Հաղորդիչների Զուգահեռ Միացումը
Հաղորդիչների Զուգահեռ ՄիացումըՀաղորդիչների Զուգահեռ Միացումը
Հաղորդիչների Զուգահեռ Միացումը
AnoushHrach
 
Մխիթարյանների Խմիչքներ
Մխիթարյանների ԽմիչքներՄխիթարյանների Խմիչքներ
Մխիթարյանների Խմիչքներ
AnoushHrach
 
презентация Microsoft office power point
презентация Microsoft office power pointпрезентация Microsoft office power point
презентация Microsoft office power pointAnoushHrach
 
Number the stars
Number the starsNumber the stars
Number the starsRUBIK40
 
Կոմպոստ
ԿոմպոստԿոմպոստ
Կոմպոստ
AnoushHrach
 

Viewers also liked (20)

Cyber-Wellness
Cyber-WellnessCyber-Wellness
Cyber-Wellness
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internet
 
Cyberwellness
CyberwellnessCyberwellness
Cyberwellness
 
2014.02.03 - NAEC Seminar_Inclusive Growth (Presentation 1)
2014.02.03 - NAEC Seminar_Inclusive Growth (Presentation 1)2014.02.03 - NAEC Seminar_Inclusive Growth (Presentation 1)
2014.02.03 - NAEC Seminar_Inclusive Growth (Presentation 1)
 
գարունը իմ բակում
գարունը իմ բակումգարունը իմ բակում
գարունը իմ բակում
 
Ճապօնիա
ՃապօնիաՃապօնիա
Ճապօնիա
 
2014.04.29_NAEC Seminar_Closing the loop
2014.04.29_NAEC Seminar_Closing the loop2014.04.29_NAEC Seminar_Closing the loop
2014.04.29_NAEC Seminar_Closing the loop
 
2014.11.28 - NAEC Group Meeting_Lamia Kamal-Chaoui
2014.11.28 - NAEC Group Meeting_Lamia Kamal-Chaoui2014.11.28 - NAEC Group Meeting_Lamia Kamal-Chaoui
2014.11.28 - NAEC Group Meeting_Lamia Kamal-Chaoui
 
презентация Microsoft office power point
презентация Microsoft office power pointпрезентация Microsoft office power point
презентация Microsoft office power point
 
Yerevan
YerevanYerevan
Yerevan
 
2014.05.19 - OECD-ECLAC Workshop_Session 1_Greg FISHER
2014.05.19 - OECD-ECLAC Workshop_Session 1_Greg FISHER2014.05.19 - OECD-ECLAC Workshop_Session 1_Greg FISHER
2014.05.19 - OECD-ECLAC Workshop_Session 1_Greg FISHER
 
ծածկույթային հյուսվածք
ծածկույթային հյուսվածքծածկույթային հյուսվածք
ծածկույթային հյուսվածք
 
Հին քաղաքակրթություններ
Հին քաղաքակրթություններՀին քաղաքակրթություններ
Հին քաղաքակրթություններ
 
ճամփորդությունը
ճամփորդությունըճամփորդությունը
ճամփորդությունը
 
Հովհաննես Թումանյան Քառյակներ
Հովհաննես Թումանյան ՔառյակներՀովհաննես Թումանյան Քառյակներ
Հովհաննես Թումանյան Քառյակներ
 
Հաղորդիչների Զուգահեռ Միացումը
Հաղորդիչների Զուգահեռ ՄիացումըՀաղորդիչների Զուգահեռ Միացումը
Հաղորդիչների Զուգահեռ Միացումը
 
Մխիթարյանների Խմիչքներ
Մխիթարյանների ԽմիչքներՄխիթարյանների Խմիչքներ
Մխիթարյանների Խմիչքներ
 
презентация Microsoft office power point
презентация Microsoft office power pointпрезентация Microsoft office power point
презентация Microsoft office power point
 
Number the stars
Number the starsNumber the stars
Number the stars
 
Կոմպոստ
ԿոմպոստԿոմպոստ
Կոմպոստ
 

Similar to Cyber Wellness Lesson Plan Presentation

cyber law and ethics uisng social media .pdf
cyber law and ethics uisng social media .pdfcyber law and ethics uisng social media .pdf
cyber law and ethics uisng social media .pdf
Muhammad Khubaib Awan
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
Dilna DV
 
2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx
Karmel7
 
Unit II.pptx
Unit II.pptxUnit II.pptx
Unit II.pptx
RamachandranPerumal5
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
SheejamolMathew
 
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji... 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
Jim "Brodie" Brazell
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
Mehedi Hasan
 
Ethics
EthicsEthics
Ethics
EthicsEthics
Social Media - It Can Be Good, Bad, and Ugly
Social Media  - It Can Be Good, Bad, and UglySocial Media  - It Can Be Good, Bad, and Ugly
Social Media - It Can Be Good, Bad, and Ugly
Zarb School of Business, Hofstra University
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The Ugly
Dr. Joel Evans
 
a.pptx
a.pptxa.pptx
a.pptx
angadveer4
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
RoshanMaharjan13
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
Rahil Foundation
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
Ziar Khan
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
Christina Ramirez
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
chiragsahoo5
 
Identity in a Digital World
Identity in a Digital WorldIdentity in a Digital World
Identity in a Digital World
Alec Couros
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
 

Similar to Cyber Wellness Lesson Plan Presentation (20)

cyber law and ethics uisng social media .pdf
cyber law and ethics uisng social media .pdfcyber law and ethics uisng social media .pdf
cyber law and ethics uisng social media .pdf
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
 
2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx
 
Unit II.pptx
Unit II.pptxUnit II.pptx
Unit II.pptx
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji... 2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
2011, Cyber Bullying, Digital Citizenship, and Learning: Network World by Ji...
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Social Media - It Can Be Good, Bad, and Ugly
Social Media  - It Can Be Good, Bad, and UglySocial Media  - It Can Be Good, Bad, and Ugly
Social Media - It Can Be Good, Bad, and Ugly
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The Ugly
 
a.pptx
a.pptxa.pptx
a.pptx
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Identity in a Digital World
Identity in a Digital WorldIdentity in a Digital World
Identity in a Digital World
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 

Recently uploaded

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 

Recently uploaded (20)

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 

Cyber Wellness Lesson Plan Presentation

  • 2. LESSON OUTLINE 1. Understand the importance of having proper netiquette and portray them in real world context 2. Understand the positive and negative impacts on the use of the social media 3. Recognise the different forms of cyberbullying 4. Ability to respond appropriately to cyber bullying without being afraid of the cyber bullies
  • 3. WHAT IS CYBER WELLNESS? The positive well-being of Internet users (You, me & everyone else!) An understanding of the risks of harmful online behavior and awareness of how to protect oneself and other Internet users from such behavior
  • 4. BROAD TOPICS OF CYBER WELLNESS 1. Content 2. Social Interactions 3. Computer Security 4. Psychological Compulsions
  • 5. 1. CONTENT • Copyright violations (plagiarism, unauthorized distribution of content) • Inappropriate content (violence etc.) • Hate websites (negative misinformation)
  • 6. 2. SOCIAL INTERACTIONS • Netiquette (proper online behavior) • Neglect of privacy (unnecessary divulgement of personal information) • Cyberbullying (harm and harassment through hostilities online) • Danger with cyber contacts (online predators)
  • 7. 3. COMPUTER SECURITY • Virtual bugs and viruses • Spam (mail and adverts) • Viruses (Trojan horses etc.) • Malware (malicious software) • Phishing (scamming of important information)
  • 9. SOCIAL INTERACTIONS: CYBERBULLYING • With the rapid surge of IT, cyberbullying has become increasingly common, especially amongst teenagers. • Done commonly through platforms such as mobile technology, social media, gaming and even via text.
  • 10. SO HOW CAN YOU PROTECT YOURSELF AND HELP OTHERS? • Vigilance – Always exercise caution online and watch out for others • Awareness – Be aware of the possible threats online • Consideration – Be considerate and sensitive towards others • Knowledge – Know the appropriate behavior and security measures online