Digital literacy includes skills needed to evaluate online sources critically. It involves techniques like R.E.A.L. to evaluate websites by examining the URL, considering any biases, and identifying the author's purpose which could be to persuade, inform, entertain or sell. Netiquette refers to socially acceptable conduct online, including guidelines for texting like being aware of tone, not texting while driving, and remembering others' schedules.
Rivers of Living Waters ministries Curacao's ministry for Woman - Heart to Heart - presentation on the dangers of Internet.
Presentor: N. Everts
Date: March 28, 2009
Rivers of Living Waters ministries Curacao's ministry for Woman - Heart to Heart - presentation on the dangers of Internet.
Presentor: N. Everts
Date: March 28, 2009
This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.
Youth are getting exposed to high‐tech devices such assmart phones and internet at earlier ages. While there are many benefits of these devices,they have opened up opportunities for others to negatively exploit users. This workshopwill educate educators and youth about these predatory activities, ways to avoid them, andwhat to do when you or others encounter them.
Studies and analysis the aspects of confidentiality, integrity and availability of information(data) with regard to the organisation. Identify exposure to accidental or intentional , destruction, disclosure , modification or interruption of information that may cause serious financial and or information loss Study of cyber security and incident response and has become necessary because attacks frequently cause the compromise of personal and business data. Heightened incidents concerns about national security and exposure of personally identifiable information. Racing awareness of the possible effects of computer barred attacks is the other reason.
7 Tips for teen safety online
-Check your comments and images
- Talk to your friends about what is ok to post
- Review your account settings
- Know your friends, contacts and followers
- Keep an eye on 3rd party apps
- Don't forget mobile
- Report
This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.
Youth are getting exposed to high‐tech devices such assmart phones and internet at earlier ages. While there are many benefits of these devices,they have opened up opportunities for others to negatively exploit users. This workshopwill educate educators and youth about these predatory activities, ways to avoid them, andwhat to do when you or others encounter them.
Studies and analysis the aspects of confidentiality, integrity and availability of information(data) with regard to the organisation. Identify exposure to accidental or intentional , destruction, disclosure , modification or interruption of information that may cause serious financial and or information loss Study of cyber security and incident response and has become necessary because attacks frequently cause the compromise of personal and business data. Heightened incidents concerns about national security and exposure of personally identifiable information. Racing awareness of the possible effects of computer barred attacks is the other reason.
7 Tips for teen safety online
-Check your comments and images
- Talk to your friends about what is ok to post
- Review your account settings
- Know your friends, contacts and followers
- Keep an eye on 3rd party apps
- Don't forget mobile
- Report
Internet has permeated to every sphere of our lives. Facebook and WhatsApp have pervaded to every sphere of our lives.
Hoevver, the generation 1950s and earlier have to a lrge extent been unable to grapple with the complexities of this new medium.
Internet Safety for Elder Adults and Beginners is a quick step guide to such adults, to both simplify and yet make them aware of the consequences of their action.
The idea is not to create fear of the monster, but to get them relate the safety precautions to what they would take in offline world.
Would appreciate your suggestions. This is a crowd sourced effort and I am thankful to the contributors.
1. What is Digital (or Internet)
Literacy?
Internet literacy includes the skills it takes to
read, disseminate, and evaluate online
sources. It is among the critical skills we
need as we explore the internet world.
7. Devices on the Internet are uniquely identified
with an Internet Protocol (IP) Number.
IP Numbers (IP version 4) are a set of 4
numbers, each one ranging from 0-255. (for
example; 207.140.138.101)
IP numbers are difficult for people to
remember, so many organizations will register a
domain names which can be mapped to
specific IP Numbers.
Today's Domain Name System includes several
globally shared domain names (i.e.
.com, .net, .org) as well as many country-
specific codes (i.e. .jp, .de, .us, .uk)
8. Which website might contain
information that would influence
your business?
• http://www.sec.gov/rulings/exchanges/regula
tions.html
• http://party.college.edu/freshman/joe/trading
_regs.html
9. What does “bias” mean?
• According to the American Heritage
Dictionary:
• Bias - “a preference or an
inclination, especially one that inhibits
impartial judgement"
10. P.I.E.S.
• Look at the list below and keep it in mind when you are
doing your research.
• An Author’s Purpose:
• Persuade
• Inform
• Entertain
• Sell
• The next time you look at a website, think of the
author’s purpose and think of P. I. E. S. This will help
you to evaluate the information and make a better
decision about its trustworthiness and validity.
11. • Which website might you use when writing a
research paper on President Barack Obama?
• http://www.republicansforobama.org/
• http://www.barackobama.com/
12. How do you find out the owner of a
website?
• http://www.easywhois.com
• Enter the URL of the website you would like
to check.
• Who do you think owns the domain name for
harrypotter.com?
13.
14. The Wayback Machine
• Look back at the history • http://web.archive.or
of a website. See how it
has been changed, what • Check out –
has been added and • http://www.barackobama.com
what has been deleted.
16. What is Netiquette?
• (short for "network etiquette" or "Internet
etiquette") refers to socially acceptable
conduct in an online or digital
situation, ranging from Usenet and mailing
lists to blogs and forums.
17.
18. Text Messaging
• Text messaging, or texting, is the exchange of brief written
text messages between two or more mobile phones or
fixed or portable devices over a phone network. While the
original term was derived from referring to messages sent
using the Short Message Service (SMS) originated from
Radio Telegraphy, it has since been extended to include
messages containing image, video, and sound content
(known as MMS messages).
• The sender of a text message is known as a texter, while
the service itself has different colloquialisms depending on
the region: it may simply be referred to as a text in North
America, Australia, the Philippines and the United
Kingdom, an SMS in most of mainland Europe, and a TMS
or SMS in the Middle East and Asia.
20. Top 10 Texting Guidelines
• Common courtesy still rules. Contrary to popular belief, composing an SMS while you're in a face-to-face
conversation with someone is just about as rude as taking a voice call.
• Remember that SMS is informal. SMS shouldn't be used for formal invitations or to dump your girlfriend or
boyfriend. The casualness of SMS diminishes the strength and meaning of the message.
• Don't get upset if you don't get a reply. Before you text someone and get frustrated at the lack of a response, be
sure that they're familiar with how to use the service, and that their carrier will accept messages from yours.
• Be aware of your tone. It is extremely difficult to discern tone in text messages, just as in e-mail. What seems to
you to be a completely innocuous message may be grossly misinterpreted by the recipient, causing certain
discomfort if not irreparable harm.
• Don't SMS while you're driving. Talking on the phone is bad enough. You won't know what hit you - or what you
hit - if you are pounding out a message on your keyboard.
• Leave the slang to your friends. Don't expect your stodgy superiors at work to be hip to the lingo of the SMS
streets.
• Remember that SMS can be traced. Don't think your messages are Anonymous.
• Be conscientious of others' schedules. Don't assume that because you are awake, working, not busy, or sober that
the person you're texting is as well. Many a pleasant slumber have been interrupted by recurring "beep-
beep...beep-beeps" of messages.
• If it's immediate, make a voice call. If you can't get through and your text message is ignored, there's probably a
good reason. There are still some times when people don't even have a thumb free to respond.
• Remember that your phone does have an off button. There are very, very few things in the world that absolutely
cannot wait.