This document discusses digital citizenship and online safety. It addresses several topics, including physical, psychological, reputational, and identity/property safety online. It emphasizes that information online can be public and permanent, and stresses developing a "digital consciousness" by thinking carefully about risks before posting online. The document provides tips for safe online behavior, including not sharing personal information, using strong and unique passwords, protecting devices with security software, and avoiding cyberbullying or sending inappropriate images.
Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village
CHILDREN LOVE THE INTERNET AND SOCIAL MEDIA. The two have become intricate parts of their daily lives affecting everything from how they connect and communicate with friends, learn about the world around them, spend their leisure and entertainment time, and define their self image and social worth. While there are many benefits to using social media and smartphone apps, with their use comes
inherent dangers that puts our children at serious risk.
Managing and protecting your child’s online identity and digital footprint has become increasingly important.
The purpose of T HE BRAND OF YOU – Protecting Your
Child’s Identity, Reputation & Image is to educate parents, guardians, educators and youth organizations on the benefits and dangers of the social web, and how they
can mentor and coach children of all ages to use social media for good.
Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village
CHILDREN LOVE THE INTERNET AND SOCIAL MEDIA. The two have become intricate parts of their daily lives affecting everything from how they connect and communicate with friends, learn about the world around them, spend their leisure and entertainment time, and define their self image and social worth. While there are many benefits to using social media and smartphone apps, with their use comes
inherent dangers that puts our children at serious risk.
Managing and protecting your child’s online identity and digital footprint has become increasingly important.
The purpose of T HE BRAND OF YOU – Protecting Your
Child’s Identity, Reputation & Image is to educate parents, guardians, educators and youth organizations on the benefits and dangers of the social web, and how they
can mentor and coach children of all ages to use social media for good.
Some young people have never known a world without social media. Around 91 percent of 16-24 year olds use the internet for social networking.They use social media now more than ever before. Give away information without thinking or knowing the consequences. Get sucked into a world of online games and dangerous online trends. There have even been cases where suicide games were trending online, that children all encouraged each other to participate in. It can be a dark and unpredictable place.
Youth are getting exposed to high‐tech devices such assmart phones and internet at earlier ages. While there are many benefits of these devices,they have opened up opportunities for others to negatively exploit users. This workshopwill educate educators and youth about these predatory activities, ways to avoid them, andwhat to do when you or others encounter them.
this is a presentation from a communications seminar at Family Christian Church in Ecorse, MI. given on April 4th, 2009. It covers stats from isafe.org on internet use by teens and youth. The presentation gives advice to parents on how to protect their children from internet predators, cyber-bullies, cybercriminals, and online piracy.
Some young people have never known a world without social media. Around 91 percent of 16-24 year olds use the internet for social networking.They use social media now more than ever before. Give away information without thinking or knowing the consequences. Get sucked into a world of online games and dangerous online trends. There have even been cases where suicide games were trending online, that children all encouraged each other to participate in. It can be a dark and unpredictable place.
Youth are getting exposed to high‐tech devices such assmart phones and internet at earlier ages. While there are many benefits of these devices,they have opened up opportunities for others to negatively exploit users. This workshopwill educate educators and youth about these predatory activities, ways to avoid them, andwhat to do when you or others encounter them.
this is a presentation from a communications seminar at Family Christian Church in Ecorse, MI. given on April 4th, 2009. It covers stats from isafe.org on internet use by teens and youth. The presentation gives advice to parents on how to protect their children from internet predators, cyber-bullies, cybercriminals, and online piracy.
Similar to DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx (20)
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2. • •Finally brothers, whatever is true,
whatever is noble, whatever is right,
whatever is pure, whatever is lovely,
whatever is admirable – if there is
anything excellent or worthy of
praise, think on these things.
Phil. 4:8
3. Physical Safety –
freedom from physical harm
Psychological Safety –
freedom from cruelty, harassment,
exposure to potentially disturbing material
Reputational Safety –
freedom from unwanted social or
professional consequences that could affect a
career
Identity or Property Safety –
freedom from theft of identity and property
4. Some unique characteristics of this cyber world
• It can be Public and Permanent
• You have no control who sees it and what they do
with it
• Information can be copied, pasted and modified
• It may not be received in the way it was intended
unlike face to face when tone, expression give clues,
there are none with the net.
6. Item 1
20%
Item 2
20%
Item 3
20%
Item 4
20%
Item 5
20%
—
LIKE IT OR NOT, PERSONAL INFORMATION
SITES CONTINUE TO BE MORE ACCURATE, DIG
DEEPER AND REVEAL MORE AND MORE OF YOUR
DIGITAL LIFE
—
These entities gather information about you,
your digital activities and your contacts
7. —
Lost in the rapid progress of
technology is a consistent, safe
code of use
—
Most digital users do not realize how
quickly their online activities can be
public and permanent
8. —
Poor digital decision-making starts in the
mind of the user
—
Abusing technology, such as sexting and
cyber-bullying are the effects of poor digital
choices
—
There will be consequences that usually
creates a chain reaction that is very difficult
to take back
9. —
Development of a “Digital Consciousness”
—
Golden Rule for the 21st century
“Develop and maintain a mindset that you are prepared for
your digital actions to be
“public and permanent”
—
Realize that you must operate powerful digital tools and
technologies with the same preventative mindset that you
would use for other things like fire or the automobile
—
—
This mindset would have you evaluate risk vs. reward
before you post information
10. Report: Teen gets 15 years for Facebook blackmail
Nude picture on phone lost in McDonald’s ends up online
Sexting in Maryland school gets student expelled
Teen sentenced to 12 months in jail for sexual bullying on
Facebook
Weiner resigns after sexting scandal
Report: Teen gets 15 years for Facebook blackmail
11. Provide you with information
necessary to understand that you are
accountable and responsible for
maintaining a Digital Consciousness
12. Concerns:
—
People may not be who they say they are so have a parent
approve anyone you meet online before you talk to them
—
If the conversation turns to sex or starts to make you
uncomfortable, get off immediately
—
If someone tries to meet you, contact an adult
immediately
—
Never meet up with someone you first meet online
If you must take a parent or group
of friends and meet in a very public place
13. —
Your online life is a reflection of you
—
Insist that you and people around you are
treated respectfully
—
Respect other people’s digital property
—
Stuff you created belongs to you and you should
control what is done with it
—
Be original or cite your sources
—
Have your work reflect excellence
14. —
Protect your passwords
—
Create secure passwords
—
Use phrases that are easy to
remember but hard to guess
—
Don’t sue the same password
for multiple sites
15. —
Make sure that you have security
software
—
Be careful of WiFi hotspots –
hotel lobbies, airports, etc.
—
Don’t download anything from a
source you don’t trust
—
Always back up your data
16. —
It’s up to you to control what other people
know about you
—
If it’s private, don’t post it online, even email
—
Anything can be copied, pasted and
forwarded
—
Once it is posted, you cannot take it back
—
Don’t post information that could get you in
trouble now or in the future
17. —
Do not give out personal information
Name Where you live
Phone number Birthdate
Home Address School/church
—
You can give out impersonal information
Sports teams you like favorite movies
(Other likes and dislikes)
18. —
Cyber-bullying – the use of technology to harm another
person in a deliberate, repeated and hostile manner
—
Cyber-Mobbing – a form of cyber bullying involving a
group sharing the same malicious mindset or intent to
harm
—
Flaming – hostile interaction between internet users
usually in a internet forum or chat room
—
Cyber-stalking – using electronic means to gather
information for the purpose of harass an individual or
group; false accusations, threats
19. —
Sexting – The act of sending an image, video, text,
etc. of a sexual nature to another individual
(digital), smart phone, etc.
—
Outing – Publically revealing personal information
without the person’s consent
—
Impersonation – pretending to be another person
in order to deceive
—
Phishing – attempting to acquire sensitive
information such as usernames, passwords, credit
cart information through faking authenticity
—
Malware – deliberate attempt to send a virus
crippling the computer’s ability to call up data
20. —
It is against the law
—
It could haunt you later
—
Don’t let provocative pictures be made of
you
—
Don’t send them online, even to someone
you care about
—
If you get them, don’t share them
—
Don’t carry them around in your phone
21.
22. Don’t respond or retaliate
Talk to someone you trust
especially an adult
Save the evidence; it could be a
police matter
Be a friend not a bystander