The document provides tips on how to safely manage personal information and privacy online. It discusses how personal data is collected from online activities like social media, emails, and web browsing. It notes that privacy settings don't guarantee absolute privacy and information can be shared beyond intended audiences. The document then offers recommendations to strengthen online privacy through practices like limiting personal details shared, using privacy settings, encrypting data and communications, and educating friends and family.
Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately. Digital Citizenship is more than just a teaching tool; it is a way to prepare students/technology users for a society full of technology. Digital citizenship is the norms of appropriate, responsible technology use.
Facebook101 personal usage for GCSC Education Encore CourseKristi Kirkland
Six week course on Facebook101 for personal usage put together for the Gulf Coast State College Education Encore.
Participants are at all different levels but for this class we are going to start at the beginning:
1) FB101 what it is - how to use it
2) Facebook privacy settings, social media ethics, time management & (custom banners if time) if not will roll it to another day...
3) Posting styles (tagging, linking, drop posts, hashtags, pictures, location tags)
4) Creating photo albums, loading videos, privacy settings & downloading
5) Creating Events, settings, inviting, hosting, privacy
6) Apps, Games & how to avoid FB scams
Questions during the course were asked and answered - we attempted to include all those in this slideshow presentation.
Facebook changes on a regular occurrence. Our office does this training seminar twice a year and have to make changes to our presentation each time.
If in doubt use the help feature and ask your question for steps.
Happy Social Media Connections!
This is an updated version of a presentation about social media and its impact on our society. It looks at how we can help students with and parents with positive strategies focussed on digital citizenship and how to tackle some of the cyberbullying issues.
Presentation by my business partner and friend Amanda Byfield Albertson on the perils of social media and other online tools. This was delivered to a local high school for the Charleston County School District. Amanda is my partner in the web design and consulting firm DesignTechWeb which can be found at http://www.DesignTechWeb.com. She has extensive experience in web design, social media, marketing, and graphic design. In addition she is a concerned mom and educator who helps students of all generations undertand technology and the implications of the use of that technology.
Videos on
www.sharonnagyjohnson.com
“Governors safety initiative” Internet safety “train-the-trainer” training to give effective internet safety presentations to students and parents, as well as community groups. The Keynote created was using material provided by the NJ State Police and Ad Council’s public service advertisements, all of which is free to use
The primer is designed to inform both potential and existing users of the importance of reading and understanding the TOS and adjusting their privacy setting as required. The presentation was developed to meet the requirements of Assignment 2 - Policy Primer for Curtin University subject Net 303 (Internet, Politics and Power).
Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately. Digital Citizenship is more than just a teaching tool; it is a way to prepare students/technology users for a society full of technology. Digital citizenship is the norms of appropriate, responsible technology use.
Facebook101 personal usage for GCSC Education Encore CourseKristi Kirkland
Six week course on Facebook101 for personal usage put together for the Gulf Coast State College Education Encore.
Participants are at all different levels but for this class we are going to start at the beginning:
1) FB101 what it is - how to use it
2) Facebook privacy settings, social media ethics, time management & (custom banners if time) if not will roll it to another day...
3) Posting styles (tagging, linking, drop posts, hashtags, pictures, location tags)
4) Creating photo albums, loading videos, privacy settings & downloading
5) Creating Events, settings, inviting, hosting, privacy
6) Apps, Games & how to avoid FB scams
Questions during the course were asked and answered - we attempted to include all those in this slideshow presentation.
Facebook changes on a regular occurrence. Our office does this training seminar twice a year and have to make changes to our presentation each time.
If in doubt use the help feature and ask your question for steps.
Happy Social Media Connections!
This is an updated version of a presentation about social media and its impact on our society. It looks at how we can help students with and parents with positive strategies focussed on digital citizenship and how to tackle some of the cyberbullying issues.
Presentation by my business partner and friend Amanda Byfield Albertson on the perils of social media and other online tools. This was delivered to a local high school for the Charleston County School District. Amanda is my partner in the web design and consulting firm DesignTechWeb which can be found at http://www.DesignTechWeb.com. She has extensive experience in web design, social media, marketing, and graphic design. In addition she is a concerned mom and educator who helps students of all generations undertand technology and the implications of the use of that technology.
Videos on
www.sharonnagyjohnson.com
“Governors safety initiative” Internet safety “train-the-trainer” training to give effective internet safety presentations to students and parents, as well as community groups. The Keynote created was using material provided by the NJ State Police and Ad Council’s public service advertisements, all of which is free to use
The primer is designed to inform both potential and existing users of the importance of reading and understanding the TOS and adjusting their privacy setting as required. The presentation was developed to meet the requirements of Assignment 2 - Policy Primer for Curtin University subject Net 303 (Internet, Politics and Power).
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
Ever wonder what you should or shouldn’t share on the internet? Do you see users who are posting everything thing they possibly could on the internet and wonder how to help educate them to protect themselves?
All of this collective sharing, creates a data gold mine for hackers to do their evil bidding. In this session we will talk about what to post on the internet and what not too. We will also look into what hackers can use from the information you’ve posted on the internet and how they can use it to gain access to your and your users personal lives, accounts, credit cards, and more. During this session, we’ll dive into building a strategy plan to help limit and hopefully eliminate these references from your digital footprint to help ensure you are more secure than you were when you first started this session.
By the end of this webinar, attendees will have a virtual toolkit and strategies to help educate users on protecting themselves while online.
"Social Media Marketing Boost: An Essential Guide to Growing Your Business Online" is a comprehensive eBook that provides actionable strategies and tips for increasing your brand's presence on social media. Whether you're a beginner or an experienced marketer, this eBook will help you harness the power of social media to reach new customers and drive growth for your business.
What is the impact of digital media on our daily lives? How does it impact our relationships, our careers, our children and our communities? Author, Sarah Granger, dives into key topics from her book, The Digital Mystique.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The French Revolution Class 9 Study Material pdf free download
Internet safety guide
1. How to manage your accounts and
yourself, in order to socialize and surf
safely on the internet.
2. How Safe Are You?
Most people who utilize the internet today, probably think that they are able to do so while still
maintaining their privacy. So lets take a quick little test to see if you are at risk:
1. Do you use the internet for any of the
following:
A. Posting on social media sites, blogging, etc.
B. Web browsing, shopping, newsfeeds, etc.
C. Emails/texts only
D. All of the above
2. You feel safe posting on the internet
because:
A. You have added proper privacy settings to
your accounts
B. Most of your posts are innocent in nature
C. You trust others to not post/repost things
about you
D. All of the above
3. Do you think your privacy is protected
because:
A. My computer has spyware
B. I only use secured sites
C. Laws protect your right to privacy
D. All of the above
4. You feel safe communicating through
emails and texts because:
A. I do not use these forums to conduct any
illegal activity.
B. My email site is able to protect me because
it’s a secured site.
C. I only email and text friends and family.
D. All of the above.
3. How Did You Do?
FACTS
• Companies today utilize your time on the internet to gather and accumulate information
about you so they can sell it to businesses.
• Companies can extract data from your smartphone to get personal information such as;
your email, where you live, your contact list and your phone number.
• Even if you are using a ‘secured site’, old operating systems can have ‘leaks’ through which
your information will find its way around.
• Privacy settings do not provide you with absolute privacy; Facebook and other social media
sites sell your information for profit.
• Once you post something on the Internet, it becomes a permanent fixture.
• Your own personal practices, may be making it easier for you to become a target.
If you were able to find a suitable answer to any of the questions on the previous tile,
then chances are you are at risk of being; scraped, mined, gathered and raked for your
data. But the good news is you are not alone.
4. Through social media
Surfing the
internet
Online shopping
Online gaming
Texting
EmailsWork
Blogging
Image posting
Apps
Dating sites
Banking
Data is mined from the things we do
online as part of our normal routine.
Music
5. • Your location
• Your address
• Your income/what you do for work
• Places you like to shop
• Your friends/family
• Your image/photo
• Your name
• Your phone number
• Your email address
• Your habits/hobbies
• Your SSN
• Your banking and medical information
• Your political/religious affiliations…..
6. Where Is My Info Going?
As mentioned earlier, most companies want your information so they can make you a better, more frequent consumer
of products. Media sites such as Facebook, MySpace, Twitter, etc., sell your data to business and they in turn use this
information to determine your interests, your lifestyle and your partialities to assist with product/ad placement.
Your work: information is used by potential employers to identify the type of individual you are external from your
resume.
Businesses gather your information to determine if you have any impending ‘life events’; if you are getting married,
graduating, have a birthday coming….people want to know.
The NSA (National Security Agency) uses it for surveillance; your information can be used to track you, where you have
been and where you are going.
The NSA also wants to know what you look like, in as many different ways as is possible.
Netflix and iTunes want to know your music and movie/TV preferences to help them know what you like so they can
inform you of potential matches.
Your communications let others know who is in your network; your friends, family and even, friends of friends of
friends.
Thieves want to gain access to your accounts, your personal facts and your identity.
7. Why are companies/people allowed to
‘steal’ my information?
First of all, we need to acknowledge that a majority of information we willingly place onto the
Internet, is not stolen, because well….we put it there. Regardless of your intention, the Internet
as a whole is not set up to protect you, its there to gather and share information; some of that
information, just happens to be yours.
• Data mining is part of our nation’s defense plan. Some information is used to
‘protect’ us.
• People assume they are safe because they are using ‘reliable’ sites on line that
indicate that they are a ‘secure’; the reality is that many sites use dated systems that
can’t protect you from information leaks.
• Another reason companies are able to steal your information is because people, as a
whole, do not do enough as consumers of the Internet product to protect themselves
from theft.
• Currently there are no laws that prohibit the practice of data mining in the USA.
• Your right to privacy, is really now your responsibility for privacy.
So…lets explore a few things we can do to protect ourselves…..from…..ourselves.
8. Most of us use it every day to communicate with others….but what are we really saying
and who are we saying it to?
9. First rule when posting on the
Internet….remember your ‘extended’ audience
10. Not just your friends/family have access to
your posts/information.
What/who is my extended or ‘invisible
audience?
Along comes your
friend,
who comments on
the picture,
Blah
Blah
Blah
The comment
and the picture
now goes out
to her group of
friends
One of her ‘friends’ likes the
comment, sending the image to her
group of friends.
Say you post on Facebook,
a photo of yourself on
vacation
And so
on……
Until this guy gets
it; and he now
knows your name,
your address and
that you are away
on vacation.
11. Your invisible audience can be a
lot of other people who aren’t
one of your ‘friends’….like, your
boss
No not this
boss…
This boss….
And he is less than
amused that your ‘illness’
is really an extended
weekend at the beach
So….before you post anything…..
12. Why Be So Secretive?
Its not about keeping secrets, its acknowledging that the information you give
out freely may seem to be innocent comments and pictures at first, but they
can easily be taken out of context and/or used by someone in a way you did
not intend.
Jenny is having a party?
Why wasn’t I invited?
Phat party Saturday
at Jenny’s house!
Did she just call me fat?
I thought we couldn’t hang out
Saturday because she was going
to see her mom?
I hate it when people
use outdated slang!
Mary sure does
party a lot.
13. The first thing people need to do when posting online is to stop and consider what it
is they are about to post and the potential current and future implications of that
post.
• Will it offend anyone?
• Will it effect my cultural currency? (How will people view my online personality? This
includes: employers, family, groups, co-workers and the invisible audience of potentially millions of
viewers)
• Do I really want this photo/text to be online forever?
• Will this post be taken in the right context? (not everyone reads the same information, the
same way)
• Am I posting out of emotion? (emotions change, but posts are forever)
• What does this post/image say about me as a person?
• What do the posts my family and friends, say about me as a person?
• Will my post allow someone else to exploit me? (through theft or slander)
14. Be your own best privacy setting
The fact is, you have ultimate control over what others can access, its up to you to take the proper
precautions to ensure you’re own online safety.
Have open discussions with friends and family who use social media sites. Talk about what you are
comfortable and not comfortable with posting online. Make certain they follow the don’t tag/don’t post
rule, without checking in first. Offer the same safeguard to them in return.
Here are a few more recommendations on things you should avoid posting online:
• Birthdates of friends and family- Why give away free data that helps thieves to know you better and/or steal your identity?
• Your home address- Again, free personal information that can be used for a variety of reasons.
• Your current location-People often give away their location when ‘tagging’ in at certain spots, this will only attract thieves
Risky photos of yourself- Sure you are adorable when you are drunk standing in a fountain, but your boss might not think
so, or a potential employer. Remember, you are creating an image of yourself for others to see, make it a good one.
• Pictures of children- Photos often get passed around on the internet without thought. Posting pictures of children can
present them as potential targets for those who might do them harm
• If you are going away for vacation/event- this tells thieves the best time to strike
• The layout of your home- This can also make you a bigger target for theft, people can see not only what you own, but the
best way into your home
• Complaints about work/boss- Yes, your boss is probably a jerk but don’t let him know you think that, unless you want
another job.
• Political or religious preference- Good advice at a party as well. Hot topics online create a lot of attention and can result
in strong debate, not always having a positive affect.
• Profanity- Sure people do it all the time, but words vanish…when you post it, you make your language immortal and they
become a reflection of you.
15. Privacy Settings
If you are going to use social media, aside from self monitoring, using privacy settings can help
you to narrow your invisible audience (people you don’t know, who have access to your page)
Remember that the messaging systems on social media, can also be scraped for information.
Here are a few links to get you started on your way:
• http://www.facebook.com/help/445588775451827
• https://twitter.com/privacy
• http://www.techlicious.com/guide/the-guide-to-facebook-privacy-settings-2013/
• http://www.cio.com/article/2413757/social-media/5-linkedin-privacy-settings-you-need-to-
know.html
• http://www.ehow.com/how_2303697_change-settings-myspace.html
Just remember that these settings will not provide 100% protection; in the world of
social media, there is no such thing!!!
16. Other Ways We Can Protect Ourselves
We also provide a lot of free information and access while using the Internet for other
aspects of our lives. Whether its; banking, surfing, shopping or sending an email to a
friend, without protection, our personal information is at risk of being stolen.
17.
18. How many of us:
Use the same user names and passwords on multiple accounts?
Give intuitive answers to security questions such as; What is your mothers
maiden name? In what city were you born? (Easy information to find
online)
Have weak passwords? (123456 or birth dates)
Don’t change your passwords frequently? (or at all)
Click on email links even if you’re not certain of the content of the link?
Keep critical information on your computer without protecting it?
Trust sites to maintain/hold personal information? (Online storage)
All of these practices provide an open door for those wishing to get personal
information from you. Whether they are trying to sell you something or take
something; we often leave a key out to make it easy for them to come right
in.
20. When we first start talking about encryption, people might
instantly start thinking of espionage, as in:
What do I have that’s worth stealing?
Your personal identity and your privacy are the biggest thing you have
to lose.
For this reason it is important to:
Encrypt the data you store on your computer
Encrypt your smart phone data
Encrypt your online data storage/iCloud
Encrypt your data transmissions
Encrypt your browser
Encrypt your email
21. First thing to remember,
encryption is a two way street
In order for your encryptions to work, you need the receiver/sender to also
be using these techniques. How encryption works:
22. Encrypting your
hard drive:
These products help to keep the data you
store on your computer safe.
• FileVault-
– http://filevaultusa.com
• BitLocker
– http://windows.microsoft.com/en
-
US/windows7/products/features/
bitlocker
Encrypting your
Smartphone:
Unfortunately there are limited programs to
Encrypt smartphones, but here are some sites to
help you make it harder for others to steal your
information.
• http://www.wired.com/2013/10/keep-your-
smartphone-locked/
• http://www.makeuseof.com/tag/how-to-
encrypt-data-on-your-smartphone/
Saphos is an App for your Android Phone that can
assist you in protection-
• https://play.google.com/store/apps/details?id
=com.sophos.smsec&hl=en_GB
23. Encrypt the
information on
your cloud:
Many people forget about the data
they have stored in data banks like
the iCloud. This program will help
to protect that information.
• Spider Oak
– https://spideroak.com
Encrypt your texts
and messages:
Texts and the messages you send through messaging systems
on your computer, can also be scraped. Protect your right to
chat with these links.
TEXTING:
iPhone-
• Silent Circle -https://silentcircle.com
• Wickr -https://www.mywickr.com
Android-
• Text Secure-
https://securityinabox.org/en/textsecure_main
MESSAGING:
Macs –
• Aduim -https://adium.im
Windows-
• Pidgin -http://pidgin.im
24. Emails have replaced a majority of our written correspondence
(with the exception of texts). They also can contain a lot of
private information that we might not wish to share openly.
Here are some of the encryption tools that can be used to
secure your emails:
• GPG Tools- https://gpgtools.org
• Enigmail- https://www.enigmail.net/home/index.php
• GNU Privacy Guards- https://www.gnupg.org
To protect Emails on your Smartphone:
• Mailvelope- https://mailvelope.com
25. If you are going to post things on the internet, remember that they have
sustainability and searchability: meaning that they are going to be there for
a very long time and people can find it if they look.
There are tools available to help you to protect yourself; use them and make
sure the people you are corresponding with, use them too.
Be part of your own defense: Talk to friends and family, let them know what
you do not want posted in open forums. Explain the risk and ask that they
respect your choice to keep some things private.
Conduct yourself as you wish to be viewed by a variety of people; friendly,
professional and otherwise.
There is no such thing as absolute privacy when using the internet. Everyday
new products are being developed to grab up your information. Your best
protection is being an active part in your own security.
26. Today’s Information Was Stolen
From
Site Reference:
• http://www.postplanner.com/9-things-you-should-never-share-on-facebook/
• http://www.citifmonline.com/2014/04/02/5-things-you-should-never-post-on-facebook/
• http://www.theatlantic.com/technology/archive/2012/04/everything-you-wanted-to-know-about-
data-mining-but-were-afraid-to-ask/255388/
• http://blog.sgrouples.com/delete-your-private-information-people-search-databases/
• http://www.websitedatascraping.com
• http://www.poynter.org/how-tos/digital-strategies/e-media-tidbits/102589/how-to-scrape-
websites-for-data-without-programming-skills/
• http://www.propublica.org/article/privacy-tools-encrypt-what-you-can
• http://journalistsresource.org/skills/research/chat-peter-singer-brookings-cybersecurity-
media?utm_source=JR-email&utm_medium=email&utm_campaign=JR-email