SlideShare a Scribd company logo
1 of 16
Safety And  Security Dahlia Shatila 9B
This represents a promise a person is making to himself. Everybody knows that handprints are permanent and can be easily traced. Therefore, whatever is done on the Internet can never be erased. And if something wrong has been done then it is going to be hard for the person to erase it. But on the other hand if that person was being safe and taking care of what he is doing on the Internet then none of this would have happened. Also, fingerprints are usually used as a representation of a person’s identity. Also, the hand is like stamping the writing, which says that they promise to stay safe on the Internet.
In both pictures the colors of the balloons have been specifically chosen as the symbolism of their color could be related to the topic of Safety and Security:  Blue: This color represents peace, tranquility, stability, trust, truth, security and loyalty. All of the adjectives could be thought of in many different ways, however, they are directly related to the topic as these are all positive words and acting as a representation of the way a person should feel once they are safe and secure on the Internet. Green: This color represents healthy, renewal, generosity and jealousy. This color could be tricky as it could mean two different things but at the same time they are still related to the whole concept of Security and Safety on the Internet. Being healthy is a simple and understandable word however, sometimes people make mistakes and they should get another chance. Therefore, renewal is a good enough word to describe such a thing. Generosity and jealousy could be considered opposites. On the Internet a person could be generous and think of the harm they could cause to other people if they share what they have in mind but, jealousy could simply be the reason why they would want to do such a thing. Sometimes, bad emotions overcome our senses and make people do things they would never expect to do… Silver: Security, intelligence, conservative, calm, maturity and much more. All these words are perfect to describe what person should be when using the Internet. If a person is smart and mature then they would know better than exposing themselves. If people used the Internet with no bad intentions then being safe would no longer remain such an issue but unfortunately, not everybody thinks the same, therefore, causing them to make incorrect decisions.
	In the first picture the girl is holding onto the balloons and is flying with a smile on her face. This should represent safety as this girl is holding onto her pride and onto everything that could damage her if she let go. Also, this shows that this girl is committed to remaining secure on the Internet. If she lets go off the balloons she could fall down and it’s the same in life if people are not careful and don’t hold onto safety then they will eventually fall and get lost…
		In the other picture, the girl has given up. The balloons are all over the place, as she is no longer holding onto them. Also, the girl is shrugging her shoulder showing that she has no other solution to the problem she has caused herself. Although, the girl has done a mistake by letting go of the balloons it is still going to be impossible for her to get it back. It is just like the Internet. If a person makes a mistake it is so hard to erase it as everything that happens on the Internet stays on the Internet.
	This picture represents the face of someone cracking. It is half black and the other half colored. This was done to just make it look more effective. On the girls face there are veins and cracks. This picture represents how a person’s life could be damaged if she commits a simple mistake on the Internet. Obviously the girl does not seem safe as her face is breaking and she seems scared. Therefore, she has to be careful or else, accidents could occur. Personally, this picture seems very influential as the girl is looking on with sharp features and distinctive characteristics that make her seem different, mad and upset.
This picture of three different people (only their eyes) shows tears running down their cheeks. All these eyes seem upset as something wrong must have happened. Not showing their entire faces was done purposely just to focus on the fact that something wrong has happened to all these people because otherwise they would not be crying. Obviously these eyes belong to different people and that was done purposely. This is mostly to show that even if one person is unsafe on the internet and breaks people’s security they will not only be affecting themselves but others too. Looking at this picture could create so many different stories but really it should not only show that being stupid on the Internet will make “you” cry but will make “everyone else” cry too. If people were safe on the Internet they would feel much more secure about them and would surely make the people surrounding them more secure too.
	This mix of different pictures of the same person smiling represents something really great.  In the middle there is a picture of a young girl happy and smiling and surrounding her are other pictures of herself smiling and happy. It was made to show the results of being safe and secure on the Internet. Using a young person shows innocence. If a person respects others on the Internet and stays secure then, no problems would occur and they would still be pure and they would not have harmed anybody through the Internet. All that would  be left is smiles and happiness, which is what should be happening.
	This picture of  the two girls, a younger one handing over a key to an older one describes many things.  Those two girls shows the same person, one younger and the other slightly older. This is shown by the way they are wearing the same clothes. It is like a younger girl is making a promise to herself, to the day when she grows up that she will remain safe and secure on the Internet. The key shows that she is locking away all the bad things and all the harm that she could cause herself and to others later on in life. The simple background shows that to make such a wish and vow to themselves does not take too much work, in fact it just a simple and easy process that will surely lead to a better background and future.
Thank    You

More Related Content

Similar to Presentation2

Ta of doc
Ta of docTa of doc
Ta of doc
troalfe
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)
Chris Jagger
 
Ta of doc
Ta of docTa of doc
Ta of doc
troalfe
 
Digital etiquette
Digital etiquetteDigital etiquette
Digital etiquette
13amd
 
Textual analysis of CYBERBULLY
Textual analysis of CYBERBULLYTextual analysis of CYBERBULLY
Textual analysis of CYBERBULLY
troalfe
 

Similar to Presentation2 (17)

Ta of doc
Ta of docTa of doc
Ta of doc
 
It's ok to tell discussion guide
It's ok to tell discussion guideIt's ok to tell discussion guide
It's ok to tell discussion guide
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)
 
NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
 
English oral.pptx
English oral.pptxEnglish oral.pptx
English oral.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cornerstone5
Cornerstone5Cornerstone5
Cornerstone5
 
Secondary research on poster campaigns
Secondary research on poster campaignsSecondary research on poster campaigns
Secondary research on poster campaigns
 
THE WHEEL SPEAKS ON 2013 Snitch?
THE WHEEL SPEAKS ON 2013 Snitch?THE WHEEL SPEAKS ON 2013 Snitch?
THE WHEEL SPEAKS ON 2013 Snitch?
 
Ta of doc
Ta of docTa of doc
Ta of doc
 
Digital etiquette
Digital etiquetteDigital etiquette
Digital etiquette
 
Textual analysis of CYBERBULLY
Textual analysis of CYBERBULLYTextual analysis of CYBERBULLY
Textual analysis of CYBERBULLY
 
Five "mobile" "personas" you need to know
Five "mobile" "personas" you need to know Five "mobile" "personas" you need to know
Five "mobile" "personas" you need to know
 
Her name was jyoti
Her name was jyotiHer name was jyoti
Her name was jyoti
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Amazing Uc Essay Prompt Thatsnotus
Amazing Uc Essay Prompt  ThatsnotusAmazing Uc Essay Prompt  Thatsnotus
Amazing Uc Essay Prompt Thatsnotus
 
Commentary essay 2
Commentary essay 2Commentary essay 2
Commentary essay 2
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 

Presentation2

  • 1. Safety And Security Dahlia Shatila 9B
  • 2.
  • 3. This represents a promise a person is making to himself. Everybody knows that handprints are permanent and can be easily traced. Therefore, whatever is done on the Internet can never be erased. And if something wrong has been done then it is going to be hard for the person to erase it. But on the other hand if that person was being safe and taking care of what he is doing on the Internet then none of this would have happened. Also, fingerprints are usually used as a representation of a person’s identity. Also, the hand is like stamping the writing, which says that they promise to stay safe on the Internet.
  • 4.
  • 5. In both pictures the colors of the balloons have been specifically chosen as the symbolism of their color could be related to the topic of Safety and Security:  Blue: This color represents peace, tranquility, stability, trust, truth, security and loyalty. All of the adjectives could be thought of in many different ways, however, they are directly related to the topic as these are all positive words and acting as a representation of the way a person should feel once they are safe and secure on the Internet. Green: This color represents healthy, renewal, generosity and jealousy. This color could be tricky as it could mean two different things but at the same time they are still related to the whole concept of Security and Safety on the Internet. Being healthy is a simple and understandable word however, sometimes people make mistakes and they should get another chance. Therefore, renewal is a good enough word to describe such a thing. Generosity and jealousy could be considered opposites. On the Internet a person could be generous and think of the harm they could cause to other people if they share what they have in mind but, jealousy could simply be the reason why they would want to do such a thing. Sometimes, bad emotions overcome our senses and make people do things they would never expect to do… Silver: Security, intelligence, conservative, calm, maturity and much more. All these words are perfect to describe what person should be when using the Internet. If a person is smart and mature then they would know better than exposing themselves. If people used the Internet with no bad intentions then being safe would no longer remain such an issue but unfortunately, not everybody thinks the same, therefore, causing them to make incorrect decisions.
  • 6. In the first picture the girl is holding onto the balloons and is flying with a smile on her face. This should represent safety as this girl is holding onto her pride and onto everything that could damage her if she let go. Also, this shows that this girl is committed to remaining secure on the Internet. If she lets go off the balloons she could fall down and it’s the same in life if people are not careful and don’t hold onto safety then they will eventually fall and get lost…
  • 7. In the other picture, the girl has given up. The balloons are all over the place, as she is no longer holding onto them. Also, the girl is shrugging her shoulder showing that she has no other solution to the problem she has caused herself. Although, the girl has done a mistake by letting go of the balloons it is still going to be impossible for her to get it back. It is just like the Internet. If a person makes a mistake it is so hard to erase it as everything that happens on the Internet stays on the Internet.
  • 8.
  • 9. This picture represents the face of someone cracking. It is half black and the other half colored. This was done to just make it look more effective. On the girls face there are veins and cracks. This picture represents how a person’s life could be damaged if she commits a simple mistake on the Internet. Obviously the girl does not seem safe as her face is breaking and she seems scared. Therefore, she has to be careful or else, accidents could occur. Personally, this picture seems very influential as the girl is looking on with sharp features and distinctive characteristics that make her seem different, mad and upset.
  • 10.
  • 11. This picture of three different people (only their eyes) shows tears running down their cheeks. All these eyes seem upset as something wrong must have happened. Not showing their entire faces was done purposely just to focus on the fact that something wrong has happened to all these people because otherwise they would not be crying. Obviously these eyes belong to different people and that was done purposely. This is mostly to show that even if one person is unsafe on the internet and breaks people’s security they will not only be affecting themselves but others too. Looking at this picture could create so many different stories but really it should not only show that being stupid on the Internet will make “you” cry but will make “everyone else” cry too. If people were safe on the Internet they would feel much more secure about them and would surely make the people surrounding them more secure too.
  • 12.
  • 13. This mix of different pictures of the same person smiling represents something really great. In the middle there is a picture of a young girl happy and smiling and surrounding her are other pictures of herself smiling and happy. It was made to show the results of being safe and secure on the Internet. Using a young person shows innocence. If a person respects others on the Internet and stays secure then, no problems would occur and they would still be pure and they would not have harmed anybody through the Internet. All that would be left is smiles and happiness, which is what should be happening.
  • 14.
  • 15. This picture of the two girls, a younger one handing over a key to an older one describes many things. Those two girls shows the same person, one younger and the other slightly older. This is shown by the way they are wearing the same clothes. It is like a younger girl is making a promise to herself, to the day when she grows up that she will remain safe and secure on the Internet. The key shows that she is locking away all the bad things and all the harm that she could cause herself and to others later on in life. The simple background shows that to make such a wish and vow to themselves does not take too much work, in fact it just a simple and easy process that will surely lead to a better background and future.
  • 16. Thank You