This document provides an overview of internet safety topics for parents and students. It discusses internet predators, cyberbullying, personal profiles, plagiarism, viruses, and parental tips. Specific dangers covered include predators in social media and chat rooms, data and identity theft, malware, and inappropriate content. Advice is offered on setting privacy settings, monitoring online activities, and educating children about safe internet use.
The embeded videos will not play on slideshare, but you can access the links for websites by clicking on them. Thank you for coming to my presentation.
Dangers of Social Media that was presented by Alex Berta at Level 10 Technology. If you found this slideshow useful please feel free to either reach out to me or send me a message.
The embeded videos will not play on slideshare, but you can access the links for websites by clicking on them. Thank you for coming to my presentation.
Dangers of Social Media that was presented by Alex Berta at Level 10 Technology. If you found this slideshow useful please feel free to either reach out to me or send me a message.
Rivers of Living Waters ministries Curacao's ministry for Woman - Heart to Heart - presentation on the dangers of Internet.
Presentor: N. Everts
Date: March 28, 2009
This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.
Internet Safety for Families and ChildrenBarry Caplin
The Internet is a useful and important part of our daily lives. Many can't
remember how we handled even the most mundane tasks without online
assistance. How did we even survive when we were kids? :-) However, along
with the good, there is bad. Children and teens (but not their parents!) are
very well versed in using the Internet, including web pages, blogs,
uploading and downloading information, music and photos, etc. They are also
trusting. This presentation will give an overview of the Internet and the
inherent dangers. Learn the realities and dangers of ``virtual communities''
websites your kids frequent like Xanga.com, MySpace.com and FaceBook.com.
Learn about the persistence of information on the net and Google hacking.
Learn the differences between a wiki, blog, Instant Messaging, text
messaging, and chat. Learn the Internet slang, key warning signs, and tips
for Parents and Kids. This talk is for anyone who has a child, who knows a
child, or who ever was a child!
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
This powerpoint explores where kids/teens are in the most danger online and strives to educate parents about the dangers of online profile sites like Myspace and Facebook. Parents will be shown how an online predator can use the information posted by the child to stalk the child online and in real life. Realistic safety tips are provided at the program's conclusion.
One in three internet users globally is a child. This proportion is likely to be even higher in the global South.
Organizations working to advance children’s rights and promote well-being need to understand how to reduce the risk of harm children face online while maximizing their opportunities for learning, participation and creativity.
The PPT covers digital safety for children.
Online safety and security 7 golden rules how to save your child from cyber c...Rajeev Ranjan
,child online safety and protection ,online safety rules for child ,child's online protection measures ,cyber bullying ,cyber crime ,cyber crimes against children ,cyber stalking ,digital citizenship ,digital literacy ,how to protect your child from cyber crime ,online sexual abuse ,online sexual exploitation ,rules to keep your child online safe ,ways to protect online fraud ,life skill ,parenting tips ,school
Educating our kids for using rational use of mobile phone can save the child, the family and society from cyber crime, cyber bullying, cyber stalking, online sexual abuse, online sexual exploitation, child grooming and online commercial fraud. Raising awareness among boys and girls on how to safely navigate the online world is great task for 21stcentury educated world citizen.
,www.rajeevelt.com ,www.rajeevranjan.net
Rivers of Living Waters ministries Curacao's ministry for Woman - Heart to Heart - presentation on the dangers of Internet.
Presentor: N. Everts
Date: March 28, 2009
This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.
Internet Safety for Families and ChildrenBarry Caplin
The Internet is a useful and important part of our daily lives. Many can't
remember how we handled even the most mundane tasks without online
assistance. How did we even survive when we were kids? :-) However, along
with the good, there is bad. Children and teens (but not their parents!) are
very well versed in using the Internet, including web pages, blogs,
uploading and downloading information, music and photos, etc. They are also
trusting. This presentation will give an overview of the Internet and the
inherent dangers. Learn the realities and dangers of ``virtual communities''
websites your kids frequent like Xanga.com, MySpace.com and FaceBook.com.
Learn about the persistence of information on the net and Google hacking.
Learn the differences between a wiki, blog, Instant Messaging, text
messaging, and chat. Learn the Internet slang, key warning signs, and tips
for Parents and Kids. This talk is for anyone who has a child, who knows a
child, or who ever was a child!
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
This powerpoint explores where kids/teens are in the most danger online and strives to educate parents about the dangers of online profile sites like Myspace and Facebook. Parents will be shown how an online predator can use the information posted by the child to stalk the child online and in real life. Realistic safety tips are provided at the program's conclusion.
One in three internet users globally is a child. This proportion is likely to be even higher in the global South.
Organizations working to advance children’s rights and promote well-being need to understand how to reduce the risk of harm children face online while maximizing their opportunities for learning, participation and creativity.
The PPT covers digital safety for children.
Online safety and security 7 golden rules how to save your child from cyber c...Rajeev Ranjan
,child online safety and protection ,online safety rules for child ,child's online protection measures ,cyber bullying ,cyber crime ,cyber crimes against children ,cyber stalking ,digital citizenship ,digital literacy ,how to protect your child from cyber crime ,online sexual abuse ,online sexual exploitation ,rules to keep your child online safe ,ways to protect online fraud ,life skill ,parenting tips ,school
Educating our kids for using rational use of mobile phone can save the child, the family and society from cyber crime, cyber bullying, cyber stalking, online sexual abuse, online sexual exploitation, child grooming and online commercial fraud. Raising awareness among boys and girls on how to safely navigate the online world is great task for 21stcentury educated world citizen.
,www.rajeevelt.com ,www.rajeevranjan.net
Prepared for the Ethical and Socıal Issues ın Informatıon Systems.
Titles:
What is Cybercrime ?
Types of Cybercrimes.
Cyberbullying.
Online child sexual abuse material.
Facts and statistics.
Protecting your child.
Protecting your computers.
An education session for parents at St Mary Star of the Sea College Wollongong. The college works with parents to create a healthy and safe environment for learning and growth.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Unit 8 - Information and Communication Technology (Paper I).pdf
Internet safety presentation 2013
1.
2. Welcome
Internet Landscape
Dangers on the Internet
Internet Predators
Cyberbullying
Personal profiles
Internet Chat
Gaming
Cell phones
Plagiarism & Intellectual
Property
Malicious
Codes, Viruses, and
Spyware
Parent Tips and
resources
Q & A
3. ―everything that‘s already in the world when
you‘re born is just normal;
anything that gets invented between then and
before you turn thirty is incredibly exciting and
creative and with any luck you can make a
career out of it;
anything that gets invented after you‘re thirty is
against the natural order of things and the
beginning of the end of civilization as we know it
until it‘s been around for about ten years when it
gradually turns out to be alright really.‖
4. The Internet has dramatically changed our
world and is a part of our everyday lives
ADULTS’ VIEW
Communication – email, texting
Shopping and services (booking travel)
Financial management
News and product research
Entertainment – videos, music, games
5. The Internet has dramatically changed our
world and is a part of our everyday lives
STUDENTS’ VIEW
Communication – texting, instant
messaging, email
Entertainment – games, music, videos
Research – homework, study sites
6. In May 2009, children aged 2-11 made
up nearly 10% of the active online
universe (Nielsen, 2010).
18% of 8 – 10 year olds spend time on
some kind of social networking site daily
(Kaiser, 2010).
http://www.commonsensemedia.org/sites/default/files/intern
etsafetyelem-tip.pdf
7.
8.
9. 1. Predators--social networking sites, chat rooms
2. Data theft--stolen passwords, addresses, Social
Security numbers, credit card numbers, and other
financial information
3. Malicious software (also known as malware)--
adware, spyware, viruses, phishing scams
4. Inappropriate content--pornography, content
focused on violence, hate propaganda
5. Cyberbullying--bullying peers via instant messages,
social networking sites, online games
http://www.cnet.com/4520-13384_1-6721368-1.html
11. 13% of youth ages 10 to 17 received
unwanted solicitations in 2006; this
decreased from 19% in 2001
Most youth handled unwanted
solicitations easily and effectively by
ignoring, blocking solicitors or leaving the
site
2006 study by the Crimes Against Children Research Center at the University of
New Hampshire
Youth report that solicitation occurs
more frequently by other minors than
adult strangers
Internet Safety Technical Task Force in 2008
12.
13.
14. Cyberbullying is emerging as one of the
more challenging issues facing
educators and parents as young people
embrace the Internet and other mobile
communication technologies.
15.
16.
17. Outing and Trickery – Sharing someone‘s
secrets or embarrassing information or
images online
Exclusion – Intentionally keeping
someone from being able to take part in
an online group, such as a ―buddy list.‖
Cyberstalking – Repeatedly sending
unwanted messages that may include
threats of harm; intimidating
18. Flaming – Online ―fights‖ using electronic
messages with inappropriate language
Harassment – Repeatedly sending
offensive, rude, and insulting messages
Denigration – Sending or posting gossip
or rumors about a person
Impersonation – Posing to be someone
else and making them look bad
19.
20. Tell your child not to respond to rude e-mails, messages, and
comments.
Save the evidence, such as e-mail and text messages, and
take screenshots of comments and images. Also, take note of
the date and time when the harassment occurs.
Contact your Internet service provider (ISP) or cell phone
provider. Ask the website administrator or ISP to remove any
Web page created to hurt your child.
If harassment is via e-mail, social networking sites, IM, and
chat rooms, instruct your child to ―block‖ bullies or delete your
child‘s current account and open a new one.
Check out phone features that may allow the number to be
blocked.
Make a report to www.cybertipline.com, and if you feel
something illegal has occurred, inform law enforcement
Information from Netsmartz Kids: http://www.netsmartz.org/Cyberbullying
21. ―Google‖ yourself
› Type in first and last name, email addresses,
screen names, addresses, phone numbers
› search for images as well
22. Facebook ,Myspace
› Age requirements
“No information from children under age 13.”
› Public vs Private
› Know who you add: friends vs cyberfriends
› Have access to your child‘s site
› Be conscientious of pictures/videos
Protecting reputations online, in plain English
(commoncraft.com)
23. Takes advantage of the privacy settings
Parent pre-approve of all pictures and videos
Remind your child
› never to post e-mail addresses or cell phone
numbers.
› passwords should only be shared with parents and
guardians.
› Do not respond to any e-mails requesting personal
information and to delete e-mails from unknown
senders.
Discuss how to keep screen names and e-mail
addresses gender-neutral, appropriate, and free of any
information that could reveal identity.
Encourage your child to tell you right away if anything
happens online that bothers or frightens him or her.
Information from Netsmartz Kids: http://www.netsmartz.org/RevealingTooMuch
25. SMS (short message service) aka texting
Wikipedia and netlingo.com list of
internet slang
› http://en.wiktionary.org/wiki/Appendix:Intern
et_slang
› http://www.netlingo.com/acronyms.php
LOL
BRB
POS
ASL
28. Know the safety features on the gaming equipment that your
child uses—a headset may have voice-masking features, for
example.
Keep gaming consoles in an easy-to-supervise location
Be aware of other places where your child may be accessing
games.
Tell your child never to give out personal information while
gaming or agree to meet anyone outside of the game.
Teach your child not to respond to anyone who is being rude
or bullying while playing the game.
Set rules for how long your child may play, what types of
games are appropriate, and who else may participate.
Have your child check with you before using a credit or debit
card online.
Check to see if the games your child plays have reporting
features or moderators.
Information from Netsmartz Kids: http://www.netsmartz.org/Gaming
29. About 75% of teens (12-17) carry cell
phones
1 in 3 teens (13-19) use their cell phone
to surf the web
Results from Teens and Mobile phones, Pew Internet and Amerian Life
Project, 2010
A Generation Unplugged, Harris Interactive, 2008
30. Review cell phone records for any unknown
numbers and late night phone calls and texts.
Remind your child that texting is viral—anything
sent in a text can be easily forwarded and shared.
Teach your child never to reveal cell phone
numbers or passwords online.
Talk to your child about the possible consequences
of sending sexually explicit or provocative images
or text messages.
When shopping for a cell phone for your child,
research the security settings that are available.
From Netsmartz Kids : http://www.netsmartz.org/CellPhones
33. Computer system
› Keeping bad stuff (predatory software) out
– keeping valuables(personal information) in
Malicious codes: viruses, worms, Trojan
Parasitical malware: spyware, adware
34.
35. www.cyberpatrol.com
www.netnanny.com
www.spectorsoft.com
www.cybersitter.com
www.covenanteyes.com
Anti spyware and adware programs
www.spybot.com (Spybot S &D)
www.adaware.com (lavasoft product)
36.
37. Video from www.commonsense.org
› http://www.commonsensemedia.org/advic
e-for-parents/rules-road-parents-digital-age
38. Guard your identity
› Make username generic and anonymous
› Little information is needed to get to know
you
Monitor your child‘s computer use
Use favorites
Understand the services your child uses
Know usernames, passwords, and e-mail
39. Know child‘s ―online friends‖
Don‘t overreact to anything your child
tells you (fear you will take computer
away)
Never meet anyone met online
Keep your computer up-to-date
› windowsupdate.microsoft.com
› Virus protection
› Firewall
43. http://www.cyberbullying.us/research.php
Bullying, Beyond the Schoolyard, by
Hinduja and Patchin
http://www.cnet.com/4520-13384_1-
6721368-1.html Top 5 Dangers article
http://www.cnet.com/4520-13384_1-
6721401-1.html?tag=lwt;lcol Think Before
You Click Worksheet
44. Thank you for your attendance at
today‘s presentation!
Make sure you have signed in before you
leave
Powerpoint link:
Editor's Notes
Read slide
to understand this complex issue, it is important to start with perspective. Brief uses by adults
Brief uses by students
Points: cell phone is highest, and many have data plans the uses lists are almost all related to communication/social this survey was done before the release of tablets (ipad, kindle, nook…)
Points: cell phone is highest, and many have data plans the uses lists are almost all related to communication/social this survey was done before the release of tablets (ipad, kindle, nook…)
An article on Cnet stated it very concisely, the tope 5 dangers for kids….
Unfortunately the exposure to sexual and pornographic materials have become more of a problem as internet access becomes easierHarassment via digital devices has also increased
A video I saw was about a HS boy adding a ‘female’ ‘friend’ to his fb…. This person scowered his account to find out all he could about him, convinced him to do a video chat, took images, and then tried to blackmail the boy when the ‘female friend’ who was actually an older man, was threatened to be exposed because he was reported.