SlideShare a Scribd company logo
Electronic Safety

Keeping yourself safe on the
  internet and cell phone
      Intended for Grades 4-5
Do you have a computer at home?
1. Yes
                    96%
2. No




                           4%
                    s




                           o
                   Ye




                           N
Do you have/use a cell phone?
1. Yes
                   86%
2. No




                         14%

                   s




                          o
                  Ye




                         N
Do you ever play games online?
1. Yes
                   95%
2. No




                         5%
                   s




                          o
                  Ye




                          N
Do you have an e-mail address?
1. Yes
                     87%
2. No




                           13%

                     s




                            o
                    Ye




                            N
Do you ever use Chat groups?
1. Yes
2. No              63%



                         37%




                   s




                          o
                  Ye




                         N
Have you ever visited Facebook,
 Myspace or other “social sites”?
1. Yes
2. No                 74%




                             26%



                      s




                              o
                     Ye




                             N
Have you ever sent or received a
         text message?
1. Yes
                      75%
2. No



                             25%



                      s




                              o
                     Ye




                             N
Have you ever bullied someone
             online?
1. Yes
2. No                       71%




                     29%



                     s




                             o
                    Ye




                            N
Have you ever been bullied online?
1. Yes
2. No                        54%




                      46%



                      s




                              o
                     Ye




                             N
Electronic Enemies:
1)   Cyberbullies
2)   Spammers
                        www.seobook.com
3)   Defamatory Sites
4)   Child Predators
5)   Cellphone Abuser
What is Cyber Bullying?

 Cyber bullying is sending or posting
 harmful or cruel text or images using the
 Internet or other digital communication
 devices, including cell phones and PDA's
 (personal digital assistants)
Cyber-bullying can include:
• Sending cruel, vicious or threatening e-mails or
  IMs.
• Creating Web sites that have stories, pictures
  and jokes ridiculing others.
• Posting pictures of other students/kids online
  with derogatory phrases or questions attached
  to them.
• Using someone else's e-mail to send vicious or
  incriminating e-mails to others.
• Using instant messaging tools to harass others.
Save your Identity
• Only share passwords with
  parents/guardians
• Change your passwords routinely
• Set webpages, profiles, blogs, etc. to
  private
How much is too much?
 Discuss with an elbow buddy what
 information is safe to put on a
 webpage, blog, myspace or a
 facebook account.
Too much information:
• Do not give away your gender, age, or
  location in screen names
• Avoid posting photos that could be
  damaging now or in the future
• All pictures should be altered to remove
  identifying information
• Don’t post plans or where you are located
• Think about real life effects of posts
Defamatory Sites
Changes information on your site without
your permission
Creates a site about you without you
knowing
Posts negative material or lies about you
Created by cyber-bullies
Have you ever been a victim of a
         cyber bully?
        Students Who've Been Bullied
         Online Between Grades 4-8




         43%                           Yes
                         57%           No
Ways to handle cyber-bullies:
• not giving out your passwords or any personal
  information to anyone, either online or in person.
• not replying to a message from an online bully.
• blocking e-mail or instant messages from the
  sender.
• You can also save harassing messages and forward
  them to your Internet Service Provider (ISP). ISPs are
  companies, such as AOL, Netscape, and NetZero
  that provide Internet access to consumers. Most
  ISPs have policies that restrict users from harassing
  others over the Internet.
• Be aware! Cyber bullies can easily change screen
  names.

 •http://www.weeklyreaderexpress.com/ViewArticle.aspx?pin=wrg5-2003530
Ways to handle cyber-bullies:
• Ignore the bullying or tell them to stop.
• Tell a parent, teacher or trusted adult if
  you are being bullied online. This isn't
  "tattling“ or “snitching.”
• If you know someone else who is being
  mean to other kids online, tell them to
  stop and then tell a parent or teacher.
Spammers
Sends you junk e-mails or texts
Sends e-mails to everyone in their address
book or in contact list
Sends links to sites that contain
inappropriate materials
Sends the same material repeatedly
Cellphone Abusers
Send bullying text messages
Take pictures of people on their cameras
without their consent or knowledge
Use cell phones to text links to
inappropriate sites, spam by phone
Gang up on someone by group texting
Child Predators
Intent is to meet children for illegal
purposes
May intend to harm you
May suggest to meet in real life
Gathers facts about you from your
websites, chat, and profiles
Avoiding Electronic Enemies
- It is important to know who you are talking
  to when using electronic devices.
- Anything you say to someone on-line or in
  a text has a permanent record, it will
  NEVER go away
- You should report anyone who makes you
  feel uncomfortable to an adult.
- Never attempt to “fight back” electronically
Electronic Safety Pledges
I Pledge…
• I promise to tell an adult about e-mails or text
  messages that make me feel uncomfortable,
  bully me, or bully others.
• I will tell a parent if anyone asks for my personal
  information including but not limited to phone
  numbers, addresses and passwords.
• I will never meet anyone from online. I will tell
  an adult if someone online asks to meet me.
I Pledge…
• I will not create sites, post comments, or
  post pictures with the intent of hurting
  someone’s feelings.
• I will not use a cell phone or a computer to
  bully someone else, even if they have
  previously done it to me.
• I will not say things electronically that I
  would not say face to face.

More Related Content

What's hot

Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
jaimejoyh
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
mcmullan
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Maria Stathi
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Niti Arora
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
tdsparks3
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
Amit Pal Singh
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
Arunmozhi Ramesh
 
Internet safety
Internet safetyInternet safety
Internet safetyjld1018
 
Stay Safe In Cyberspace
Stay  Safe In  CyberspaceStay  Safe In  Cyberspace
Stay Safe In CyberspaceCarolyn Argo
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
Matt Britland
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
DonikaLici
 
Cyber safety
Cyber safetyCyber safety
Cyber safetysmartins7
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
mcgeet
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Yash Jain
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
chiennying16
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
alyssacarricato
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Leslie Witten
 

What's hot (19)

Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Cyber saftey
Cyber safteyCyber saftey
Cyber saftey
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Stay Safe In Cyberspace
Stay  Safe In  CyberspaceStay  Safe In  Cyberspace
Stay Safe In Cyberspace
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Similar to Electronic safety grade 4 5

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
Inderjeet Singh
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
janemiller48
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying projectvolpila
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
SMA BRUDERAN PURWOREJO
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwptsooy10
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwptsooy10
 
FAQ's About Cyberbulling
FAQ's About CyberbullingFAQ's About Cyberbulling
FAQ's About Cyberbulling
alsebastino
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in Schools
Webbed Marketing
 
Electronic safety grade 2 3 1
Electronic safety grade 2 3 1Electronic safety grade 2 3 1
Electronic safety grade 2 3 1Melissa Halcott
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
Pratima Nayak ,Kendriya Vidyalaya Sangathan
 
Cyber wellness 2
Cyber wellness 2Cyber wellness 2
Cyber wellness 2Chu Yuan
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Karl Poulin
 
Sexting technology
Sexting  technologySexting  technology
Sexting technology
Fernandanorambuena2
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
Jason Rushing
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Cyberbullying power pot student copy
Cyberbullying  power pot student copyCyberbullying  power pot student copy
Cyberbullying power pot student copybrlewis1971
 
Using Social Media To Change Your World: The Power of Girls Online
Using Social Media To Change Your World: The Power of Girls OnlineUsing Social Media To Change Your World: The Power of Girls Online
Using Social Media To Change Your World: The Power of Girls Online
Judy Lubin, Public Square Communications
 

Similar to Electronic safety grade 4 5 (20)

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying project
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwpt
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwpt
 
FAQ's About Cyberbulling
FAQ's About CyberbullingFAQ's About Cyberbulling
FAQ's About Cyberbulling
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in Schools
 
Electronic safety grade 2 3 1
Electronic safety grade 2 3 1Electronic safety grade 2 3 1
Electronic safety grade 2 3 1
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Cyber wellness 2
Cyber wellness 2Cyber wellness 2
Cyber wellness 2
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbully
CyberbullyCyberbully
Cyberbully
 
Sexting technology
Sexting  technologySexting  technology
Sexting technology
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Cyberbullying power pot student copy
Cyberbullying  power pot student copyCyberbullying  power pot student copy
Cyberbullying power pot student copy
 
Using Social Media To Change Your World: The Power of Girls Online
Using Social Media To Change Your World: The Power of Girls OnlineUsing Social Media To Change Your World: The Power of Girls Online
Using Social Media To Change Your World: The Power of Girls Online
 

More from Melissa Halcott

Project management board presentation
Project management board presentationProject management board presentation
Project management board presentation
Melissa Halcott
 
Photo story 3 for windows
Photo story 3 for windowsPhoto story 3 for windows
Photo story 3 for windows
Melissa Halcott
 
Study island presentation for summer school
Study island presentation for summer schoolStudy island presentation for summer school
Study island presentation for summer school
Melissa Halcott
 
Photo story 3 for windows
Photo story 3 for windowsPhoto story 3 for windows
Photo story 3 for windowsMelissa Halcott
 
Project management board presentation
Project management board presentationProject management board presentation
Project management board presentationMelissa Halcott
 

More from Melissa Halcott (9)

Storybird ppt
Storybird pptStorybird ppt
Storybird ppt
 
Managing moodle
Managing moodleManaging moodle
Managing moodle
 
Discovery learning
Discovery learningDiscovery learning
Discovery learning
 
Project management board presentation
Project management board presentationProject management board presentation
Project management board presentation
 
Photo story 3 for windows
Photo story 3 for windowsPhoto story 3 for windows
Photo story 3 for windows
 
Unit1 edm vocab intro
Unit1 edm vocab introUnit1 edm vocab intro
Unit1 edm vocab intro
 
Study island presentation for summer school
Study island presentation for summer schoolStudy island presentation for summer school
Study island presentation for summer school
 
Photo story 3 for windows
Photo story 3 for windowsPhoto story 3 for windows
Photo story 3 for windows
 
Project management board presentation
Project management board presentationProject management board presentation
Project management board presentation
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

Electronic safety grade 4 5

  • 1. Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5
  • 2. Do you have a computer at home? 1. Yes 96% 2. No 4% s o Ye N
  • 3. Do you have/use a cell phone? 1. Yes 86% 2. No 14% s o Ye N
  • 4. Do you ever play games online? 1. Yes 95% 2. No 5% s o Ye N
  • 5. Do you have an e-mail address? 1. Yes 87% 2. No 13% s o Ye N
  • 6. Do you ever use Chat groups? 1. Yes 2. No 63% 37% s o Ye N
  • 7. Have you ever visited Facebook, Myspace or other “social sites”? 1. Yes 2. No 74% 26% s o Ye N
  • 8. Have you ever sent or received a text message? 1. Yes 75% 2. No 25% s o Ye N
  • 9. Have you ever bullied someone online? 1. Yes 2. No 71% 29% s o Ye N
  • 10. Have you ever been bullied online? 1. Yes 2. No 54% 46% s o Ye N
  • 11. Electronic Enemies: 1) Cyberbullies 2) Spammers www.seobook.com 3) Defamatory Sites 4) Child Predators 5) Cellphone Abuser
  • 12. What is Cyber Bullying? Cyber bullying is sending or posting harmful or cruel text or images using the Internet or other digital communication devices, including cell phones and PDA's (personal digital assistants)
  • 13. Cyber-bullying can include: • Sending cruel, vicious or threatening e-mails or IMs. • Creating Web sites that have stories, pictures and jokes ridiculing others. • Posting pictures of other students/kids online with derogatory phrases or questions attached to them. • Using someone else's e-mail to send vicious or incriminating e-mails to others. • Using instant messaging tools to harass others.
  • 14. Save your Identity • Only share passwords with parents/guardians • Change your passwords routinely • Set webpages, profiles, blogs, etc. to private
  • 15. How much is too much? Discuss with an elbow buddy what information is safe to put on a webpage, blog, myspace or a facebook account.
  • 16. Too much information: • Do not give away your gender, age, or location in screen names • Avoid posting photos that could be damaging now or in the future • All pictures should be altered to remove identifying information • Don’t post plans or where you are located • Think about real life effects of posts
  • 17. Defamatory Sites Changes information on your site without your permission Creates a site about you without you knowing Posts negative material or lies about you Created by cyber-bullies
  • 18. Have you ever been a victim of a cyber bully? Students Who've Been Bullied Online Between Grades 4-8 43% Yes 57% No
  • 19. Ways to handle cyber-bullies: • not giving out your passwords or any personal information to anyone, either online or in person. • not replying to a message from an online bully. • blocking e-mail or instant messages from the sender. • You can also save harassing messages and forward them to your Internet Service Provider (ISP). ISPs are companies, such as AOL, Netscape, and NetZero that provide Internet access to consumers. Most ISPs have policies that restrict users from harassing others over the Internet. • Be aware! Cyber bullies can easily change screen names. •http://www.weeklyreaderexpress.com/ViewArticle.aspx?pin=wrg5-2003530
  • 20. Ways to handle cyber-bullies: • Ignore the bullying or tell them to stop. • Tell a parent, teacher or trusted adult if you are being bullied online. This isn't "tattling“ or “snitching.” • If you know someone else who is being mean to other kids online, tell them to stop and then tell a parent or teacher.
  • 21. Spammers Sends you junk e-mails or texts Sends e-mails to everyone in their address book or in contact list Sends links to sites that contain inappropriate materials Sends the same material repeatedly
  • 22. Cellphone Abusers Send bullying text messages Take pictures of people on their cameras without their consent or knowledge Use cell phones to text links to inappropriate sites, spam by phone Gang up on someone by group texting
  • 23. Child Predators Intent is to meet children for illegal purposes May intend to harm you May suggest to meet in real life Gathers facts about you from your websites, chat, and profiles
  • 24. Avoiding Electronic Enemies - It is important to know who you are talking to when using electronic devices. - Anything you say to someone on-line or in a text has a permanent record, it will NEVER go away - You should report anyone who makes you feel uncomfortable to an adult. - Never attempt to “fight back” electronically
  • 26. I Pledge… • I promise to tell an adult about e-mails or text messages that make me feel uncomfortable, bully me, or bully others. • I will tell a parent if anyone asks for my personal information including but not limited to phone numbers, addresses and passwords. • I will never meet anyone from online. I will tell an adult if someone online asks to meet me.
  • 27. I Pledge… • I will not create sites, post comments, or post pictures with the intent of hurting someone’s feelings. • I will not use a cell phone or a computer to bully someone else, even if they have previously done it to me. • I will not say things electronically that I would not say face to face.