SlideShare a Scribd company logo
1 of 27
Digital FootprintsDigital Footprints
TheThe QuickQuick andand DirtyDirty about onlineabout online
safetysafety
Statistics that may surprise you…..Statistics that may surprise you…..
 89% of sexual solicitations are made in either chat89% of sexual solicitations are made in either chat
rooms or Instant Messagesrooms or Instant Messages
 20% of children age 10-17 have been solicited sexually20% of children age 10-17 have been solicited sexually
online; that's 1 out of every 5 kidsonline; that's 1 out of every 5 kids
 75% of youth who received an online sexual solicitation75% of youth who received an online sexual solicitation
did not tell a parentdid not tell a parent
 One third of kids have been contacted by a stranger andOne third of kids have been contacted by a stranger and
half of these were considered inappropriatehalf of these were considered inappropriate
 81% of parents of online youth say that kids aren't81% of parents of online youth say that kids aren't
careful enough when giving out information aboutcareful enough when giving out information about
themselves onlinethemselves online
 76% of parents don't have rules about what their kids76% of parents don't have rules about what their kids
can do on the computercan do on the computer
 65% of parents believe that kids do things online that65% of parents believe that kids do things online that
they wouldn't want their parents to know aboutthey wouldn't want their parents to know about
 4,000,000 children are posting content to the Web4,000,000 children are posting content to the Web
everydayeveryday
http://www.netlingo.com/tips/cyber-safety-statistics.phphttp://www.netlingo.com/tips/cyber-safety-statistics.php
A few statistics that may surpriseA few statistics that may surprise
you…..you…..
 15,000,000 youth use Instant Messaging15,000,000 youth use Instant Messaging
 9 out of 10 parents will never know that any9 out of 10 parents will never know that any
inappropriate contact has occurredinappropriate contact has occurred
 14% have actually met face to face with a person they14% have actually met face to face with a person they
have met on the Internethave met on the Internet
 1 out of 17 kids have been harassed, threatened, or1 out of 17 kids have been harassed, threatened, or
bulliedbullied
 Nearly three-quarters (73%) of online teens believe thatNearly three-quarters (73%) of online teens believe that
someone their age is most likely to be approached bysomeone their age is most likely to be approached by
someone unknown to them online as opposed to offlinesomeone unknown to them online as opposed to offline
 When asked how they responded the last time they wereWhen asked how they responded the last time they were
contacted online by a complete stranger, just 3% ofcontacted online by a complete stranger, just 3% of
online teens said they told and adult or authority figureonline teens said they told and adult or authority figure
 Most kids will not report inappropriate Internet contact toMost kids will not report inappropriate Internet contact to
their parents because they are afraid of losing Internettheir parents because they are afraid of losing Internet
privilegesprivileges
http://www.netlingo.com/tips/cyber-safety-statistics.phphttp://www.netlingo.com/tips/cyber-safety-statistics.php
A few statistics that may surpriseA few statistics that may surprise
you…..you…..
 61% of 13-17 yr olds have a personal profile on social61% of 13-17 yr olds have a personal profile on social
networking sitesnetworking sites
 44% of online teens with profiles like Facebook and44% of online teens with profiles like Facebook and
Myspace have been contacted by a stranger, comparedMyspace have been contacted by a stranger, compared
with 16 percent of those without profiles.with 16 percent of those without profiles.
 71% have reported receiving messages from someone71% have reported receiving messages from someone
they do not knowthey do not know
 45% have been asked for personal info from people they45% have been asked for personal info from people they
do not knowdo not know
 48% of 16-17 yr olds report that their parents know "very48% of 16-17 yr olds report that their parents know "very
little" or "nothing" about their online activitieslittle" or "nothing" about their online activities
 MySpace deletes 25,000 profiles weekly of users whoMySpace deletes 25,000 profiles weekly of users who
don't meet the site's 14-year-old minimum agedon't meet the site's 14-year-old minimum age
requirementrequirement
 From 2007-2009 MySpace has deleted 90,000 accountsFrom 2007-2009 MySpace has deleted 90,000 accounts
because they were created by registered sex offendersbecause they were created by registered sex offenders
http://www.netlingo.com/tips/cyber-safety-statistics.phphttp://www.netlingo.com/tips/cyber-safety-statistics.php
A Digital FootprintA Digital Footprint
Digital FootprintsDigital Footprints are tracesare traces
left by someone's activity in aleft by someone's activity in a
digital environment.digital environment.
Passive Digital FootprintsPassive Digital Footprints isis
information available aboutinformation available about
you that you haven’t initiatedyou that you haven’t initiated
such as addresses, phonesuch as addresses, phone
numbers and credit history.numbers and credit history.
Active Digital FootprintsActive Digital Footprints areare
traces of your social life youtraces of your social life you
leave behind such as groups,leave behind such as groups,
chats, online photos, phonechats, online photos, phone
records.records.
http://en.wikipedia.org/wiki/Digital_footprint
Who can follow your DigitalWho can follow your Digital
Footprint ?Footprint ?
 People you communicate withPeople you communicate with
online or phone…online or phone…
 People you send pictures to…People you send pictures to…
BUT ALSO…..BUT ALSO…..
 Your parentsYour parents
 Your teachersYour teachers
 Your relativesYour relatives
 Future employersFuture employers
 College admissionsCollege admissions
counselorscounselors
 Sexual predatorsSexual predators
Did you know…….Did you know…….
it’s a felony for children under 18 to receiveit’s a felony for children under 18 to receive
sexually explicit pictures on their phone,sexually explicit pictures on their phone,
and taking sexually explicit pictures andand taking sexually explicit pictures and
sending them could lead to charges ofsending them could lead to charges of
pornography production and distribution?pornography production and distribution?
http://open.salon.com/blog/amytuteurmd/2008/12/10/sextinghttp://open.salon.com/blog/amytuteurmd/2008/12/10/sexting
The Sex and Tech campaign has published a listThe Sex and Tech campaign has published a list
of “5 things to think about before pressing ‘send’.”of “5 things to think about before pressing ‘send’.”
 Don’t assume anything you sendDon’t assume anything you send
or post is going to remainor post is going to remain
private.private.
 There is no changing your mindThere is no changing your mind
in cyberspace— anything youin cyberspace— anything you
send or post will never truly gosend or post will never truly go
away.away.
 Don’t give in to the pressure toDon’t give in to the pressure to
do something that makes youdo something that makes you
uncomfortable, even inuncomfortable, even in
cyberspace.cyberspace.
 Consider the recipient’s reaction.Consider the recipient’s reaction.
 Nothing is truly anonymous.Nothing is truly anonymous.
http://open.salon.com/blog/amytuteurmd/2008/12/10/sextinghttp://open.salon.com/blog/amytuteurmd/2008/12/10/sexting
Did you know……Did you know……
 a copy of every image sent via phone ora copy of every image sent via phone or
Internet is stored somewhere inInternet is stored somewhere in
cyberspace? It may be hard to find, butcyberspace? It may be hard to find, but
it’s there.it’s there.
 The same holds true for text messagesThe same holds true for text messages
and chats online.and chats online.
Did you know….Did you know….
 your computer or phone has a unique IPyour computer or phone has a unique IP
Address assigned to it that can be tracedAddress assigned to it that can be traced
to the exact second something wasto the exact second something was
accessed online?accessed online?
 Once you are online, you can be traced.Once you are online, you can be traced.
Survey: One-Third of Youths EngSurvey: One-Third of Youths Eng
 almost one-third of youths admit they’ve engaged inalmost one-third of youths admit they’ve engaged in
sexting-related activities that involved either e-mailing asexting-related activities that involved either e-mailing a
photo or video of themselves in the nude or being thephoto or video of themselves in the nude or being the
recipient of such images.recipient of such images.
 Of those who admitted to distributing suggestive imagesOf those who admitted to distributing suggestive images
of themselves, about 61 percent report that they wereof themselves, about 61 percent report that they were
pressured by someone to send the image.pressured by someone to send the image.
 Girls were more likely to share a naked image ofGirls were more likely to share a naked image of
themselves than boys.themselves than boys.
 Those who are already sexually active were much moreThose who are already sexually active were much more
likely to send an image than those who were not sexuallylikely to send an image than those who were not sexually
active.active.
 Most of the respondents sent the image to a significantMost of the respondents sent the image to a significant
other or a person of romantic interest to them. But 29other or a person of romantic interest to them. But 29
percent said they shared naked images of themselvespercent said they shared naked images of themselves
with someone they knew only online.with someone they knew only online.
Survey: One-Third of Youths EngSurvey: One-Third of Youths Eng
 About 50 percent of youths who responded to the surveyAbout 50 percent of youths who responded to the survey
said they’ve been the victim of some form of digitalsaid they’ve been the victim of some form of digital
abuse.abuse.
 The most common type of abuse was being the target ofThe most common type of abuse was being the target of
a smear campaign; about 22 percent of respondentsa smear campaign; about 22 percent of respondents
indicated they’d been the target of lies spread throughindicated they’d been the target of lies spread through
digital media.digital media.
 About 8 percent of respondents indicated they’d beenAbout 8 percent of respondents indicated they’d been
threatened with some form of digital blackmail.threatened with some form of digital blackmail.
 Females were targeted for digital abuse more often thanFemales were targeted for digital abuse more often than
males — with 53 percent of them acknowledging it, asmales — with 53 percent of them acknowledging it, as
opposed to 42 percent of males.opposed to 42 percent of males.
 Those who have been the victims of digital abuse areThose who have been the victims of digital abuse are
more likely to be sexually active or to have engaged inmore likely to be sexually active or to have engaged in
“risky” behavior, such as smoking, using illegal drugs,“risky” behavior, such as smoking, using illegal drugs,
drinking alcohol or stealing.drinking alcohol or stealing.
Survey: One-Third of Youths EngSurvey: One-Third of Youths Eng
 The survey also showed a correlation, though notThe survey also showed a correlation, though not
necessarily a causation, between digital abuse andnecessarily a causation, between digital abuse and
emotional distress.emotional distress.
 Targets of digital abuse were almost three times as likelyTargets of digital abuse were almost three times as likely
to report that they had also contemplated suicide atto report that they had also contemplated suicide at
some point.some point.
 They were also nearly three times more likely to haveThey were also nearly three times more likely to have
considered dropping out of school.considered dropping out of school.
 More than three-quarters of respondents recognized thatMore than three-quarters of respondents recognized that
digital abuse was a serious problem in the youth culturedigital abuse was a serious problem in the youth culture
but at the same time they were only mildly concernedbut at the same time they were only mildly concerned
about the risks and consequences from such behavior.about the risks and consequences from such behavior.
 Only half of the respondents gave thought to the ideaOnly half of the respondents gave thought to the idea
that information or images they posted online couldthat information or images they posted online could
negatively affect them later.negatively affect them later.
Don’t be caught unaware…Don’t be caught unaware…
Your reputation can be permanently damaged.Your reputation can be permanently damaged.
Do you know who is on the otherDo you know who is on the other
end? Are you sure?end? Are you sure?
?
Web CamsWeb Cams
Webcam sessions andWebcam sessions and
photos can be easilyphotos can be easily
captured, and users cancaptured, and users can
continue to circulatecontinue to circulate
those images online. Inthose images online. In
some cases peoplesome cases people
believed they werebelieved they were
interacting with trustedinteracting with trusted
friends but later foundfriends but later found
their images weretheir images were
distributed to others ordistributed to others or
posted on web sites.posted on web sites.
http://tcs.cybertipline.com/knowthedangers8.htm
Web CamsWeb Cams
 Use webcams or post photos onlineUse webcams or post photos online
only with your parents' andonly with your parents' and
guardians' knowledge andguardians' knowledge and
supervision.supervision.
 Ask yourself if you would beAsk yourself if you would be
embarrassed if your friends or familyembarrassed if your friends or family
saw the pictures or video you postsaw the pictures or video you post
online. If the answer is yes, then youonline. If the answer is yes, then you
need to stop.need to stop.
 Be aware of what is in the camera’sBe aware of what is in the camera’s
field of vision and remember to turnfield of vision and remember to turn
the camera off when it is not in use.the camera off when it is not in use.
 Be careful about posting identity-Be careful about posting identity-
revealing or sexually provocativerevealing or sexually provocative
photos. Don’t post photos of othersphotos. Don’t post photos of others
— even your friends — without— even your friends — without
permission from your friends’permission from your friends’
parents or guardians. Remember -parents or guardians. Remember -
once such images are posted youonce such images are posted you
give up control of them and you cangive up control of them and you can
never get them back.never get them back.
http://tcs.cybertipline.com/knowthedangers8.htm
Did you know…..Did you know…..
 a chatroom is probably the most dangerous areaa chatroom is probably the most dangerous area
on the Internet?on the Internet?
 chatrooms — especially those used bychatrooms — especially those used by
teenagers — are sometimes also used by childteenagers — are sometimes also used by child
molesters to find victims. Adults or even oldermolesters to find victims. Adults or even older
teens seeking to exploit younger people don’tteens seeking to exploit younger people don’t
necessarily tell the truth about who they are.necessarily tell the truth about who they are.
 You never know who is in one, so never typeYou never know who is in one, so never type
anything you wouldn’t say in public.anything you wouldn’t say in public.
http://tcs.cybertipline.com/knowthedangers2.htmhttp://tcs.cybertipline.com/knowthedangers2.htm
Sexual Predators ARE out there….Sexual Predators ARE out there….
 They will oftenThey will often
pretend to be a teenpretend to be a teen
 They will try to gainThey will try to gain
your trustyour trust
 They will try to shameThey will try to shame
you or blame youyou or blame you
 DON’T BE THEIRDON’T BE THEIR
NEXT VICTIMNEXT VICTIM
 TELL SOMEONE!TELL SOMEONE!
Online predators do the following:Online predators do the following:
 Find kids through social networking,Find kids through social networking,
blogs, chat rooms, instantblogs, chat rooms, instant
messaging, e-mail, discussionmessaging, e-mail, discussion
boards, and other Web sites.boards, and other Web sites.
 Seduce their targets throughSeduce their targets through
attention, affection, kindness, andattention, affection, kindness, and
even gifts.even gifts.
 Know the latest music and hobbiesKnow the latest music and hobbies
likely to interest kids.likely to interest kids.
 Listen to and sympathize with kids'Listen to and sympathize with kids'
problems.problems.
 Try to ease young people'sTry to ease young people's
inhibitions by gradually introducinginhibitions by gradually introducing
sexual content into theirsexual content into their
conversations or by showing themconversations or by showing them
sexually explicit material.sexually explicit material.
 Might also evaluate the kids theyMight also evaluate the kids they
meet online for future face-to-facemeet online for future face-to-face
contact.contact. http://www.microsoft.com/protect/parents/social/predators.aspx
Safety TipsSafety Tips
 Limit the informationLimit the information
to VERY generalto VERY general
details only.details only.
 Don’t invite strangersDon’t invite strangers
online into your life.online into your life.
 Be suspicious ofBe suspicious of
strangers who try tostrangers who try to
engage you and askengage you and ask
personal questionspersonal questions
Safety TipsSafety Tips
 Lock your profiles toLock your profiles to
Accepted Friends Only.Accepted Friends Only.
 Never post or sayNever post or say
anything online youanything online you
wouldn’t want everyonewouldn’t want everyone
to see. Chances are,to see. Chances are,
they will.they will.
 If you are approached orIf you are approached or
bullied in any way…TELLbullied in any way…TELL
AN ADULT!AN ADULT!
What to report….What to report….
 Anyone you don't know who asks you for personalAnyone you don't know who asks you for personal
information, photos or videos.information, photos or videos.
 Unsolicited obscene material from people or companiesUnsolicited obscene material from people or companies
you don't know.you don't know.
 Misleading URLs on the Internet that point you to sitesMisleading URLs on the Internet that point you to sites
containing harmful materials rather than what you werecontaining harmful materials rather than what you were
looking for.looking for.
 Anyone who wants to send you photos or videosAnyone who wants to send you photos or videos
containing obscene content of individuals 18 and younger.containing obscene content of individuals 18 and younger.
(The possession, manufacturing, or distributing of child(The possession, manufacturing, or distributing of child
pornography is illegal.)pornography is illegal.)
 Online enticement for offline sexual activities. (No oneOnline enticement for offline sexual activities. (No one
should be making sexual invitations to you online – andshould be making sexual invitations to you online – and
it’s an especially serious crime for adults to do it.)it’s an especially serious crime for adults to do it.)
http://tcs.cybertipline.com/knowthedangers8.htm
In Cyberspace, someone is alwaysIn Cyberspace, someone is always
watching…….watching…….
Photo CreditsPhoto Credits
 Slide 5Slide 5 http://newsimg.bbc.co.uk/media/images/44622000/jpg/_44622679_footprint2_203.jpghttp://newsimg.bbc.co.uk/media/images/44622000/jpg/_44622679_footprint2_203.jpg
 Slide 6Slide 6 http://cache.gizmodo.com/assets/images/gizmodo/2008/08/sensafloor.jpghttp://cache.gizmodo.com/assets/images/gizmodo/2008/08/sensafloor.jpg
 Slide 8Slide 8 http://static.open.salon.com/files/sexting1228917187.jpghttp://static.open.salon.com/files/sexting1228917187.jpg
 Slide 9Slide 9 http://www.useonline.net/useonline/wp-content/uploads/2009/03/huelladigital-150x150.jpghttp://www.useonline.net/useonline/wp-content/uploads/2009/03/huelladigital-150x150.jpg
 Slide 10Slide 10 http://www.useonline.net/useonline/wp-content/uploads/2009/03/huelladigital-150x150.jpghttp://www.useonline.net/useonline/wp-content/uploads/2009/03/huelladigital-150x150.jpg
 Slide 14Slide 14 http://www.textually.org/picturephoning/archives/images/set3/sexting,0.jpghttp://www.textually.org/picturephoning/archives/images/set3/sexting,0.jpg
http://www.pathway-pals.com/Sexting/Index.htmlhttp://www.pathway-pals.com/Sexting/Index.html
 Slide 15Slide 15 http://www.pathway-pals.com/Sexting/Index.htmlhttp://www.pathway-pals.com/Sexting/Index.html
 Slide 16Slide 16 http://www.pathway-pals.com/Sexting/Index.htmlhttp://www.pathway-pals.com/Sexting/Index.html
 Slide 17Slide 17 http://markmeynell.files.wordpress.com/2007/10/chat-rooms.jpghttp://markmeynell.files.wordpress.com/2007/10/chat-rooms.jpg
 Slide 18Slide 18 http://www.onlinesecurityauthority.com/images/WebcamPredator.jpghttp://www.onlinesecurityauthority.com/images/WebcamPredator.jpg
 Slide 19 http://www.onlinesecurityauthority.com/images/WebcamPredator.jpgSlide 19 http://www.onlinesecurityauthority.com/images/WebcamPredator.jpg
 Slide 21 http://library.thinkquest.org/06aug/01158/internet_predators_sized.sized.jpegSlide 21 http://library.thinkquest.org/06aug/01158/internet_predators_sized.sized.jpeg
 Slide 22 http://www.palmettoscoop.com/wp-content/uploads/2009/01/predator.jpgSlide 22 http://www.palmettoscoop.com/wp-content/uploads/2009/01/predator.jpg
 Slide 23 http://farm3.static.flickr.com/2285/1594411528_1512b1aad5.jpgSlide 23 http://farm3.static.flickr.com/2285/1594411528_1512b1aad5.jpg
 Slide 24 http://i.ehow.com/images/GlobalPhoto/Articles/5210373/ChildPredatorOnline-main_Full.jpgSlide 24 http://i.ehow.com/images/GlobalPhoto/Articles/5210373/ChildPredatorOnline-main_Full.jpg
 Slide 26 http://images.clipartof.com/small/20453-Clipart-Illustration-Of-A-Cyber-Humanoid-Being-Slide 26 http://images.clipartof.com/small/20453-Clipart-Illustration-Of-A-Cyber-Humanoid-Being-
With-Pale-Blue-Skin-In-Profile-Leaning-Against-A-Webcam-Lense-And-Looking-At-The-Viewer-With-Pale-Blue-Skin-In-Profile-Leaning-Against-A-Webcam-Lense-And-Looking-At-The-Viewer-
With-Its-Eye.jpgWith-Its-Eye.jpg

More Related Content

What's hot

Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
New activism campaign wants boylovers to speak out
New activism campaign wants boylovers to speak outNew activism campaign wants boylovers to speak out
New activism campaign wants boylovers to speak outRonSpain
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevarajessica97
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet SafetyJVGAJJAR
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Community Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingCommunity Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingShotzy Paugh
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safetyFred Miller
 
Presentation
PresentationPresentation
PresentationLHSICT
 
A internet e as crianças
A internet e as criançasA internet e as crianças
A internet e as criançasAlex Ciqueira
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn'tSocial Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn'tjordanwollman
 
How Online Predators Threaten Our Children
How Online Predators Threaten Our ChildrenHow Online Predators Threaten Our Children
How Online Predators Threaten Our ChildrenTeenSafe
 
Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?Timothy Corey
 
Internet Safety MU version
Internet Safety MU versionInternet Safety MU version
Internet Safety MU versionSteven Knight
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshareTeenSafe
 
Teens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeenSafe
 

What's hot (20)

Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
FBI Cybercrime Presentation
FBI Cybercrime PresentationFBI Cybercrime Presentation
FBI Cybercrime Presentation
 
New activism campaign wants boylovers to speak out
New activism campaign wants boylovers to speak outNew activism campaign wants boylovers to speak out
New activism campaign wants boylovers to speak out
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevara
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Community Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingCommunity Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social Networking
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Presentation
PresentationPresentation
Presentation
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
A internet e as crianças
A internet e as criançasA internet e as crianças
A internet e as crianças
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn'tSocial Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn't
 
How Online Predators Threaten Our Children
How Online Predators Threaten Our ChildrenHow Online Predators Threaten Our Children
How Online Predators Threaten Our Children
 
ISC Presentation
ISC PresentationISC Presentation
ISC Presentation
 
Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?
 
Internet Safety MU version
Internet Safety MU versionInternet Safety MU version
Internet Safety MU version
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshare
 
Teens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From Cyberbullying
 

Viewers also liked

The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsCreepSquash
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital FootprintDean Shareski
 
#diggeroslo and Oslo's digital footprint
#diggeroslo and Oslo's digital footprint#diggeroslo and Oslo's digital footprint
#diggeroslo and Oslo's digital footprintKatrine Mosfjeld
 
Towards a Digital Ecology: The New Organization's Digital Footprint
Towards a Digital Ecology: The New Organization's Digital FootprintTowards a Digital Ecology: The New Organization's Digital Footprint
Towards a Digital Ecology: The New Organization's Digital FootprintJai (Phillip) Djwa
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
 
What’s your Digital Footprint?
What’s your Digital Footprint?What’s your Digital Footprint?
What’s your Digital Footprint?Jessica Gramp
 
My Digital Footprint
My Digital FootprintMy Digital Footprint
My Digital FootprintTony Fish
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
 
Build a positive digital footprint 3
Build a positive digital footprint 3Build a positive digital footprint 3
Build a positive digital footprint 3Margaret Donaghue
 
Online & More: Is Your Digital Footprint in the Digital Age?
Online & More: Is Your Digital Footprint in the Digital Age?Online & More: Is Your Digital Footprint in the Digital Age?
Online & More: Is Your Digital Footprint in the Digital Age?Denny McCorkle
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& dataminingPaige Jaeger
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints PresentationProjectsByJen.com
 
Digital footprint powerpoint
Digital footprint powerpointDigital footprint powerpoint
Digital footprint powerpointducklvr9
 
Digital Footprints, Safety & Citizenship
Digital Footprints, Safety & CitizenshipDigital Footprints, Safety & Citizenship
Digital Footprints, Safety & CitizenshipShelly Sanchez Terrell
 
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Arniel Ping
 
Discrete Mathematics - All chapters
Discrete Mathematics - All chapters Discrete Mathematics - All chapters
Discrete Mathematics - All chapters Omnia A. Abdullah
 

Viewers also liked (17)

The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital Footprint
 
#diggeroslo and Oslo's digital footprint
#diggeroslo and Oslo's digital footprint#diggeroslo and Oslo's digital footprint
#diggeroslo and Oslo's digital footprint
 
Towards a Digital Ecology: The New Organization's Digital Footprint
Towards a Digital Ecology: The New Organization's Digital FootprintTowards a Digital Ecology: The New Organization's Digital Footprint
Towards a Digital Ecology: The New Organization's Digital Footprint
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
 
What’s your Digital Footprint?
What’s your Digital Footprint?What’s your Digital Footprint?
What’s your Digital Footprint?
 
My Digital Footprint
My Digital FootprintMy Digital Footprint
My Digital Footprint
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Build a positive digital footprint 3
Build a positive digital footprint 3Build a positive digital footprint 3
Build a positive digital footprint 3
 
Online & More: Is Your Digital Footprint in the Digital Age?
Online & More: Is Your Digital Footprint in the Digital Age?Online & More: Is Your Digital Footprint in the Digital Age?
Online & More: Is Your Digital Footprint in the Digital Age?
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& datamining
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Digital footprint powerpoint
Digital footprint powerpointDigital footprint powerpoint
Digital footprint powerpoint
 
Digital Footprints, Safety & Citizenship
Digital Footprints, Safety & CitizenshipDigital Footprints, Safety & Citizenship
Digital Footprints, Safety & Citizenship
 
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
 
Discrete Mathematics - All chapters
Discrete Mathematics - All chapters Discrete Mathematics - All chapters
Discrete Mathematics - All chapters
 
Digital, Social & Mobile in 2015
Digital, Social & Mobile in 2015Digital, Social & Mobile in 2015
Digital, Social & Mobile in 2015
 

Similar to Digital Footprints

Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet SafetySage Lewis
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Internet Safety Spring 2010
Internet Safety Spring 2010Internet Safety Spring 2010
Internet Safety Spring 2010Steven Knight
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationspringvillegi
 
Social networks
Social networksSocial networks
Social networksdrlizmike
 
los riesgos en las redes sociales
los riesgos en las redes socialeslos riesgos en las redes sociales
los riesgos en las redes socialesjeminariva
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safelytimryan7
 
Statistics and salient information
Statistics and salient informationStatistics and salient information
Statistics and salient informationsmithmpa
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsus22
 

Similar to Digital Footprints (20)

Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Cyber safe manual_2
Cyber safe manual_2Cyber safe manual_2
Cyber safe manual_2
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Internet Safety Spring 2010
Internet Safety Spring 2010Internet Safety Spring 2010
Internet Safety Spring 2010
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
102009
102009102009
102009
 
Social networks
Social networksSocial networks
Social networks
 
los riesgos en las redes sociales
los riesgos en las redes socialeslos riesgos en las redes sociales
los riesgos en las redes sociales
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Statistics and salient information
Statistics and salient informationStatistics and salient information
Statistics and salient information
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

More from Eric Cole

Global schools rubric
Global schools rubricGlobal schools rubric
Global schools rubricEric Cole
 
Reaching Digital Learners 1:1 Evaluation
Reaching Digital Learners 1:1 EvaluationReaching Digital Learners 1:1 Evaluation
Reaching Digital Learners 1:1 EvaluationEric Cole
 
Reaching out ncties
Reaching out nctiesReaching out ncties
Reaching out nctiesEric Cole
 
Reaching out
Reaching outReaching out
Reaching outEric Cole
 
Radio Plays iTAC2
Radio Plays iTAC2Radio Plays iTAC2
Radio Plays iTAC2Eric Cole
 
Worldview fall
Worldview fallWorldview fall
Worldview fallEric Cole
 
School Fusion Class Wikis
School Fusion Class WikisSchool Fusion Class Wikis
School Fusion Class WikisEric Cole
 
Google For Educators
Google For EducatorsGoogle For Educators
Google For EducatorsEric Cole
 
More Google Tools
More Google ToolsMore Google Tools
More Google ToolsEric Cole
 
JamStudio.com & Audacity
JamStudio.com & AudacityJamStudio.com & Audacity
JamStudio.com & AudacityEric Cole
 
Teacher Tools And Strategies For A 21st Century
Teacher Tools And Strategies For A 21st CenturyTeacher Tools And Strategies For A 21st Century
Teacher Tools And Strategies For A 21st CenturyEric Cole
 
Problem Based Learning Activity
Problem Based Learning ActivityProblem Based Learning Activity
Problem Based Learning ActivityEric Cole
 
Embed A Google Spreadsheet
Embed A Google SpreadsheetEmbed A Google Spreadsheet
Embed A Google SpreadsheetEric Cole
 
Embedding Objects In School Fusion Teacher Pages
Embedding Objects In School Fusion Teacher PagesEmbedding Objects In School Fusion Teacher Pages
Embedding Objects In School Fusion Teacher PagesEric Cole
 
Transforming From Writers To Authors
Transforming From Writers To AuthorsTransforming From Writers To Authors
Transforming From Writers To AuthorsEric Cole
 

More from Eric Cole (19)

Global schools rubric
Global schools rubricGlobal schools rubric
Global schools rubric
 
Reaching Digital Learners 1:1 Evaluation
Reaching Digital Learners 1:1 EvaluationReaching Digital Learners 1:1 Evaluation
Reaching Digital Learners 1:1 Evaluation
 
Reaching out ncties
Reaching out nctiesReaching out ncties
Reaching out ncties
 
Photo album
Photo albumPhoto album
Photo album
 
Reaching out
Reaching outReaching out
Reaching out
 
Crib sites
Crib sitesCrib sites
Crib sites
 
Radio Plays iTAC2
Radio Plays iTAC2Radio Plays iTAC2
Radio Plays iTAC2
 
JSiTAC2
JSiTAC2JSiTAC2
JSiTAC2
 
Worldview fall
Worldview fallWorldview fall
Worldview fall
 
Baby Steps
Baby StepsBaby Steps
Baby Steps
 
School Fusion Class Wikis
School Fusion Class WikisSchool Fusion Class Wikis
School Fusion Class Wikis
 
Google For Educators
Google For EducatorsGoogle For Educators
Google For Educators
 
More Google Tools
More Google ToolsMore Google Tools
More Google Tools
 
JamStudio.com & Audacity
JamStudio.com & AudacityJamStudio.com & Audacity
JamStudio.com & Audacity
 
Teacher Tools And Strategies For A 21st Century
Teacher Tools And Strategies For A 21st CenturyTeacher Tools And Strategies For A 21st Century
Teacher Tools And Strategies For A 21st Century
 
Problem Based Learning Activity
Problem Based Learning ActivityProblem Based Learning Activity
Problem Based Learning Activity
 
Embed A Google Spreadsheet
Embed A Google SpreadsheetEmbed A Google Spreadsheet
Embed A Google Spreadsheet
 
Embedding Objects In School Fusion Teacher Pages
Embedding Objects In School Fusion Teacher PagesEmbedding Objects In School Fusion Teacher Pages
Embedding Objects In School Fusion Teacher Pages
 
Transforming From Writers To Authors
Transforming From Writers To AuthorsTransforming From Writers To Authors
Transforming From Writers To Authors
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

Digital Footprints

  • 1. Digital FootprintsDigital Footprints TheThe QuickQuick andand DirtyDirty about onlineabout online safetysafety
  • 2. Statistics that may surprise you…..Statistics that may surprise you…..  89% of sexual solicitations are made in either chat89% of sexual solicitations are made in either chat rooms or Instant Messagesrooms or Instant Messages  20% of children age 10-17 have been solicited sexually20% of children age 10-17 have been solicited sexually online; that's 1 out of every 5 kidsonline; that's 1 out of every 5 kids  75% of youth who received an online sexual solicitation75% of youth who received an online sexual solicitation did not tell a parentdid not tell a parent  One third of kids have been contacted by a stranger andOne third of kids have been contacted by a stranger and half of these were considered inappropriatehalf of these were considered inappropriate  81% of parents of online youth say that kids aren't81% of parents of online youth say that kids aren't careful enough when giving out information aboutcareful enough when giving out information about themselves onlinethemselves online  76% of parents don't have rules about what their kids76% of parents don't have rules about what their kids can do on the computercan do on the computer  65% of parents believe that kids do things online that65% of parents believe that kids do things online that they wouldn't want their parents to know aboutthey wouldn't want their parents to know about  4,000,000 children are posting content to the Web4,000,000 children are posting content to the Web everydayeveryday http://www.netlingo.com/tips/cyber-safety-statistics.phphttp://www.netlingo.com/tips/cyber-safety-statistics.php
  • 3. A few statistics that may surpriseA few statistics that may surprise you…..you…..  15,000,000 youth use Instant Messaging15,000,000 youth use Instant Messaging  9 out of 10 parents will never know that any9 out of 10 parents will never know that any inappropriate contact has occurredinappropriate contact has occurred  14% have actually met face to face with a person they14% have actually met face to face with a person they have met on the Internethave met on the Internet  1 out of 17 kids have been harassed, threatened, or1 out of 17 kids have been harassed, threatened, or bulliedbullied  Nearly three-quarters (73%) of online teens believe thatNearly three-quarters (73%) of online teens believe that someone their age is most likely to be approached bysomeone their age is most likely to be approached by someone unknown to them online as opposed to offlinesomeone unknown to them online as opposed to offline  When asked how they responded the last time they wereWhen asked how they responded the last time they were contacted online by a complete stranger, just 3% ofcontacted online by a complete stranger, just 3% of online teens said they told and adult or authority figureonline teens said they told and adult or authority figure  Most kids will not report inappropriate Internet contact toMost kids will not report inappropriate Internet contact to their parents because they are afraid of losing Internettheir parents because they are afraid of losing Internet privilegesprivileges http://www.netlingo.com/tips/cyber-safety-statistics.phphttp://www.netlingo.com/tips/cyber-safety-statistics.php
  • 4. A few statistics that may surpriseA few statistics that may surprise you…..you…..  61% of 13-17 yr olds have a personal profile on social61% of 13-17 yr olds have a personal profile on social networking sitesnetworking sites  44% of online teens with profiles like Facebook and44% of online teens with profiles like Facebook and Myspace have been contacted by a stranger, comparedMyspace have been contacted by a stranger, compared with 16 percent of those without profiles.with 16 percent of those without profiles.  71% have reported receiving messages from someone71% have reported receiving messages from someone they do not knowthey do not know  45% have been asked for personal info from people they45% have been asked for personal info from people they do not knowdo not know  48% of 16-17 yr olds report that their parents know "very48% of 16-17 yr olds report that their parents know "very little" or "nothing" about their online activitieslittle" or "nothing" about their online activities  MySpace deletes 25,000 profiles weekly of users whoMySpace deletes 25,000 profiles weekly of users who don't meet the site's 14-year-old minimum agedon't meet the site's 14-year-old minimum age requirementrequirement  From 2007-2009 MySpace has deleted 90,000 accountsFrom 2007-2009 MySpace has deleted 90,000 accounts because they were created by registered sex offendersbecause they were created by registered sex offenders http://www.netlingo.com/tips/cyber-safety-statistics.phphttp://www.netlingo.com/tips/cyber-safety-statistics.php
  • 5. A Digital FootprintA Digital Footprint Digital FootprintsDigital Footprints are tracesare traces left by someone's activity in aleft by someone's activity in a digital environment.digital environment. Passive Digital FootprintsPassive Digital Footprints isis information available aboutinformation available about you that you haven’t initiatedyou that you haven’t initiated such as addresses, phonesuch as addresses, phone numbers and credit history.numbers and credit history. Active Digital FootprintsActive Digital Footprints areare traces of your social life youtraces of your social life you leave behind such as groups,leave behind such as groups, chats, online photos, phonechats, online photos, phone records.records. http://en.wikipedia.org/wiki/Digital_footprint
  • 6. Who can follow your DigitalWho can follow your Digital Footprint ?Footprint ?  People you communicate withPeople you communicate with online or phone…online or phone…  People you send pictures to…People you send pictures to… BUT ALSO…..BUT ALSO…..  Your parentsYour parents  Your teachersYour teachers  Your relativesYour relatives  Future employersFuture employers  College admissionsCollege admissions counselorscounselors  Sexual predatorsSexual predators
  • 7. Did you know…….Did you know……. it’s a felony for children under 18 to receiveit’s a felony for children under 18 to receive sexually explicit pictures on their phone,sexually explicit pictures on their phone, and taking sexually explicit pictures andand taking sexually explicit pictures and sending them could lead to charges ofsending them could lead to charges of pornography production and distribution?pornography production and distribution? http://open.salon.com/blog/amytuteurmd/2008/12/10/sextinghttp://open.salon.com/blog/amytuteurmd/2008/12/10/sexting
  • 8. The Sex and Tech campaign has published a listThe Sex and Tech campaign has published a list of “5 things to think about before pressing ‘send’.”of “5 things to think about before pressing ‘send’.”  Don’t assume anything you sendDon’t assume anything you send or post is going to remainor post is going to remain private.private.  There is no changing your mindThere is no changing your mind in cyberspace— anything youin cyberspace— anything you send or post will never truly gosend or post will never truly go away.away.  Don’t give in to the pressure toDon’t give in to the pressure to do something that makes youdo something that makes you uncomfortable, even inuncomfortable, even in cyberspace.cyberspace.  Consider the recipient’s reaction.Consider the recipient’s reaction.  Nothing is truly anonymous.Nothing is truly anonymous. http://open.salon.com/blog/amytuteurmd/2008/12/10/sextinghttp://open.salon.com/blog/amytuteurmd/2008/12/10/sexting
  • 9. Did you know……Did you know……  a copy of every image sent via phone ora copy of every image sent via phone or Internet is stored somewhere inInternet is stored somewhere in cyberspace? It may be hard to find, butcyberspace? It may be hard to find, but it’s there.it’s there.  The same holds true for text messagesThe same holds true for text messages and chats online.and chats online.
  • 10. Did you know….Did you know….  your computer or phone has a unique IPyour computer or phone has a unique IP Address assigned to it that can be tracedAddress assigned to it that can be traced to the exact second something wasto the exact second something was accessed online?accessed online?  Once you are online, you can be traced.Once you are online, you can be traced.
  • 11. Survey: One-Third of Youths EngSurvey: One-Third of Youths Eng  almost one-third of youths admit they’ve engaged inalmost one-third of youths admit they’ve engaged in sexting-related activities that involved either e-mailing asexting-related activities that involved either e-mailing a photo or video of themselves in the nude or being thephoto or video of themselves in the nude or being the recipient of such images.recipient of such images.  Of those who admitted to distributing suggestive imagesOf those who admitted to distributing suggestive images of themselves, about 61 percent report that they wereof themselves, about 61 percent report that they were pressured by someone to send the image.pressured by someone to send the image.  Girls were more likely to share a naked image ofGirls were more likely to share a naked image of themselves than boys.themselves than boys.  Those who are already sexually active were much moreThose who are already sexually active were much more likely to send an image than those who were not sexuallylikely to send an image than those who were not sexually active.active.  Most of the respondents sent the image to a significantMost of the respondents sent the image to a significant other or a person of romantic interest to them. But 29other or a person of romantic interest to them. But 29 percent said they shared naked images of themselvespercent said they shared naked images of themselves with someone they knew only online.with someone they knew only online.
  • 12. Survey: One-Third of Youths EngSurvey: One-Third of Youths Eng  About 50 percent of youths who responded to the surveyAbout 50 percent of youths who responded to the survey said they’ve been the victim of some form of digitalsaid they’ve been the victim of some form of digital abuse.abuse.  The most common type of abuse was being the target ofThe most common type of abuse was being the target of a smear campaign; about 22 percent of respondentsa smear campaign; about 22 percent of respondents indicated they’d been the target of lies spread throughindicated they’d been the target of lies spread through digital media.digital media.  About 8 percent of respondents indicated they’d beenAbout 8 percent of respondents indicated they’d been threatened with some form of digital blackmail.threatened with some form of digital blackmail.  Females were targeted for digital abuse more often thanFemales were targeted for digital abuse more often than males — with 53 percent of them acknowledging it, asmales — with 53 percent of them acknowledging it, as opposed to 42 percent of males.opposed to 42 percent of males.  Those who have been the victims of digital abuse areThose who have been the victims of digital abuse are more likely to be sexually active or to have engaged inmore likely to be sexually active or to have engaged in “risky” behavior, such as smoking, using illegal drugs,“risky” behavior, such as smoking, using illegal drugs, drinking alcohol or stealing.drinking alcohol or stealing.
  • 13. Survey: One-Third of Youths EngSurvey: One-Third of Youths Eng  The survey also showed a correlation, though notThe survey also showed a correlation, though not necessarily a causation, between digital abuse andnecessarily a causation, between digital abuse and emotional distress.emotional distress.  Targets of digital abuse were almost three times as likelyTargets of digital abuse were almost three times as likely to report that they had also contemplated suicide atto report that they had also contemplated suicide at some point.some point.  They were also nearly three times more likely to haveThey were also nearly three times more likely to have considered dropping out of school.considered dropping out of school.  More than three-quarters of respondents recognized thatMore than three-quarters of respondents recognized that digital abuse was a serious problem in the youth culturedigital abuse was a serious problem in the youth culture but at the same time they were only mildly concernedbut at the same time they were only mildly concerned about the risks and consequences from such behavior.about the risks and consequences from such behavior.  Only half of the respondents gave thought to the ideaOnly half of the respondents gave thought to the idea that information or images they posted online couldthat information or images they posted online could negatively affect them later.negatively affect them later.
  • 14. Don’t be caught unaware…Don’t be caught unaware… Your reputation can be permanently damaged.Your reputation can be permanently damaged.
  • 15.
  • 16.
  • 17. Do you know who is on the otherDo you know who is on the other end? Are you sure?end? Are you sure? ?
  • 18. Web CamsWeb Cams Webcam sessions andWebcam sessions and photos can be easilyphotos can be easily captured, and users cancaptured, and users can continue to circulatecontinue to circulate those images online. Inthose images online. In some cases peoplesome cases people believed they werebelieved they were interacting with trustedinteracting with trusted friends but later foundfriends but later found their images weretheir images were distributed to others ordistributed to others or posted on web sites.posted on web sites. http://tcs.cybertipline.com/knowthedangers8.htm
  • 19. Web CamsWeb Cams  Use webcams or post photos onlineUse webcams or post photos online only with your parents' andonly with your parents' and guardians' knowledge andguardians' knowledge and supervision.supervision.  Ask yourself if you would beAsk yourself if you would be embarrassed if your friends or familyembarrassed if your friends or family saw the pictures or video you postsaw the pictures or video you post online. If the answer is yes, then youonline. If the answer is yes, then you need to stop.need to stop.  Be aware of what is in the camera’sBe aware of what is in the camera’s field of vision and remember to turnfield of vision and remember to turn the camera off when it is not in use.the camera off when it is not in use.  Be careful about posting identity-Be careful about posting identity- revealing or sexually provocativerevealing or sexually provocative photos. Don’t post photos of othersphotos. Don’t post photos of others — even your friends — without— even your friends — without permission from your friends’permission from your friends’ parents or guardians. Remember -parents or guardians. Remember - once such images are posted youonce such images are posted you give up control of them and you cangive up control of them and you can never get them back.never get them back. http://tcs.cybertipline.com/knowthedangers8.htm
  • 20. Did you know…..Did you know…..  a chatroom is probably the most dangerous areaa chatroom is probably the most dangerous area on the Internet?on the Internet?  chatrooms — especially those used bychatrooms — especially those used by teenagers — are sometimes also used by childteenagers — are sometimes also used by child molesters to find victims. Adults or even oldermolesters to find victims. Adults or even older teens seeking to exploit younger people don’tteens seeking to exploit younger people don’t necessarily tell the truth about who they are.necessarily tell the truth about who they are.  You never know who is in one, so never typeYou never know who is in one, so never type anything you wouldn’t say in public.anything you wouldn’t say in public. http://tcs.cybertipline.com/knowthedangers2.htmhttp://tcs.cybertipline.com/knowthedangers2.htm
  • 21. Sexual Predators ARE out there….Sexual Predators ARE out there….  They will oftenThey will often pretend to be a teenpretend to be a teen  They will try to gainThey will try to gain your trustyour trust  They will try to shameThey will try to shame you or blame youyou or blame you  DON’T BE THEIRDON’T BE THEIR NEXT VICTIMNEXT VICTIM  TELL SOMEONE!TELL SOMEONE!
  • 22. Online predators do the following:Online predators do the following:  Find kids through social networking,Find kids through social networking, blogs, chat rooms, instantblogs, chat rooms, instant messaging, e-mail, discussionmessaging, e-mail, discussion boards, and other Web sites.boards, and other Web sites.  Seduce their targets throughSeduce their targets through attention, affection, kindness, andattention, affection, kindness, and even gifts.even gifts.  Know the latest music and hobbiesKnow the latest music and hobbies likely to interest kids.likely to interest kids.  Listen to and sympathize with kids'Listen to and sympathize with kids' problems.problems.  Try to ease young people'sTry to ease young people's inhibitions by gradually introducinginhibitions by gradually introducing sexual content into theirsexual content into their conversations or by showing themconversations or by showing them sexually explicit material.sexually explicit material.  Might also evaluate the kids theyMight also evaluate the kids they meet online for future face-to-facemeet online for future face-to-face contact.contact. http://www.microsoft.com/protect/parents/social/predators.aspx
  • 23. Safety TipsSafety Tips  Limit the informationLimit the information to VERY generalto VERY general details only.details only.  Don’t invite strangersDon’t invite strangers online into your life.online into your life.  Be suspicious ofBe suspicious of strangers who try tostrangers who try to engage you and askengage you and ask personal questionspersonal questions
  • 24. Safety TipsSafety Tips  Lock your profiles toLock your profiles to Accepted Friends Only.Accepted Friends Only.  Never post or sayNever post or say anything online youanything online you wouldn’t want everyonewouldn’t want everyone to see. Chances are,to see. Chances are, they will.they will.  If you are approached orIf you are approached or bullied in any way…TELLbullied in any way…TELL AN ADULT!AN ADULT!
  • 25. What to report….What to report….  Anyone you don't know who asks you for personalAnyone you don't know who asks you for personal information, photos or videos.information, photos or videos.  Unsolicited obscene material from people or companiesUnsolicited obscene material from people or companies you don't know.you don't know.  Misleading URLs on the Internet that point you to sitesMisleading URLs on the Internet that point you to sites containing harmful materials rather than what you werecontaining harmful materials rather than what you were looking for.looking for.  Anyone who wants to send you photos or videosAnyone who wants to send you photos or videos containing obscene content of individuals 18 and younger.containing obscene content of individuals 18 and younger. (The possession, manufacturing, or distributing of child(The possession, manufacturing, or distributing of child pornography is illegal.)pornography is illegal.)  Online enticement for offline sexual activities. (No oneOnline enticement for offline sexual activities. (No one should be making sexual invitations to you online – andshould be making sexual invitations to you online – and it’s an especially serious crime for adults to do it.)it’s an especially serious crime for adults to do it.) http://tcs.cybertipline.com/knowthedangers8.htm
  • 26. In Cyberspace, someone is alwaysIn Cyberspace, someone is always watching…….watching…….
  • 27. Photo CreditsPhoto Credits  Slide 5Slide 5 http://newsimg.bbc.co.uk/media/images/44622000/jpg/_44622679_footprint2_203.jpghttp://newsimg.bbc.co.uk/media/images/44622000/jpg/_44622679_footprint2_203.jpg  Slide 6Slide 6 http://cache.gizmodo.com/assets/images/gizmodo/2008/08/sensafloor.jpghttp://cache.gizmodo.com/assets/images/gizmodo/2008/08/sensafloor.jpg  Slide 8Slide 8 http://static.open.salon.com/files/sexting1228917187.jpghttp://static.open.salon.com/files/sexting1228917187.jpg  Slide 9Slide 9 http://www.useonline.net/useonline/wp-content/uploads/2009/03/huelladigital-150x150.jpghttp://www.useonline.net/useonline/wp-content/uploads/2009/03/huelladigital-150x150.jpg  Slide 10Slide 10 http://www.useonline.net/useonline/wp-content/uploads/2009/03/huelladigital-150x150.jpghttp://www.useonline.net/useonline/wp-content/uploads/2009/03/huelladigital-150x150.jpg  Slide 14Slide 14 http://www.textually.org/picturephoning/archives/images/set3/sexting,0.jpghttp://www.textually.org/picturephoning/archives/images/set3/sexting,0.jpg http://www.pathway-pals.com/Sexting/Index.htmlhttp://www.pathway-pals.com/Sexting/Index.html  Slide 15Slide 15 http://www.pathway-pals.com/Sexting/Index.htmlhttp://www.pathway-pals.com/Sexting/Index.html  Slide 16Slide 16 http://www.pathway-pals.com/Sexting/Index.htmlhttp://www.pathway-pals.com/Sexting/Index.html  Slide 17Slide 17 http://markmeynell.files.wordpress.com/2007/10/chat-rooms.jpghttp://markmeynell.files.wordpress.com/2007/10/chat-rooms.jpg  Slide 18Slide 18 http://www.onlinesecurityauthority.com/images/WebcamPredator.jpghttp://www.onlinesecurityauthority.com/images/WebcamPredator.jpg  Slide 19 http://www.onlinesecurityauthority.com/images/WebcamPredator.jpgSlide 19 http://www.onlinesecurityauthority.com/images/WebcamPredator.jpg  Slide 21 http://library.thinkquest.org/06aug/01158/internet_predators_sized.sized.jpegSlide 21 http://library.thinkquest.org/06aug/01158/internet_predators_sized.sized.jpeg  Slide 22 http://www.palmettoscoop.com/wp-content/uploads/2009/01/predator.jpgSlide 22 http://www.palmettoscoop.com/wp-content/uploads/2009/01/predator.jpg  Slide 23 http://farm3.static.flickr.com/2285/1594411528_1512b1aad5.jpgSlide 23 http://farm3.static.flickr.com/2285/1594411528_1512b1aad5.jpg  Slide 24 http://i.ehow.com/images/GlobalPhoto/Articles/5210373/ChildPredatorOnline-main_Full.jpgSlide 24 http://i.ehow.com/images/GlobalPhoto/Articles/5210373/ChildPredatorOnline-main_Full.jpg  Slide 26 http://images.clipartof.com/small/20453-Clipart-Illustration-Of-A-Cyber-Humanoid-Being-Slide 26 http://images.clipartof.com/small/20453-Clipart-Illustration-Of-A-Cyber-Humanoid-Being- With-Pale-Blue-Skin-In-Profile-Leaning-Against-A-Webcam-Lense-And-Looking-At-The-Viewer-With-Pale-Blue-Skin-In-Profile-Leaning-Against-A-Webcam-Lense-And-Looking-At-The-Viewer- With-Its-Eye.jpgWith-Its-Eye.jpg