Online threats and responsible behavior from the Bulgarian Safer Internet Centre.
C3 learning activity, Camouflage and safety in the virtual world, Erasmus+ project, October 2016, Sofia, Bulgaria
This slideshow aligns with the YouTube video: http://www.youtube.com/watch?v=xGNjfiubPKQ This webinar has been developed by the Academy Technology Seminar 3 students of Palisades High school (11th grade). Guided by Mr. Robert Reilly (teacher) and Mrs. Karen Hornberger (librarian). The topic was the issues that accompany friend requests. This specific webinar was produced for the 4th, 5th, and 6th grade levels; the 11th grade students felt that the primary age group could use the guidance.
This presentation explores gender identity and why an understanding of gender identity will help designers make effective designs even stronger. We’ll focus on the “gender question”—form fields that ask users to indicate their gender. We’ll determine how to ask this question in a world where gender is more than the male/female binary.
How to Be a Part-Time Sex-Positive Educator (When You Still Love Your Day Job!)Cunning Minx
Got a passion for a sex-positive cause but don’t want to give up the day job you love? Want to be an activist, but only have 5-10 hours a week to do it? In this CatalystCon session, you’ll learn how to identify and prioritize the daily and weekly tasks needed to achieve your outreach goals; how to cope with and combat work/life hindrances; and how to keep your motivation and mission fresh over time.
Kath Albury confirms that that mobile technology had overtaken internet use for young same-sex attracted people. This presentation was given at the Young Gay Men's Symposium at Promises & Limitations, the CSRH social research conference, February 2014.
This slideshow aligns with the YouTube video: http://www.youtube.com/watch?v=xGNjfiubPKQ This webinar has been developed by the Academy Technology Seminar 3 students of Palisades High school (11th grade). Guided by Mr. Robert Reilly (teacher) and Mrs. Karen Hornberger (librarian). The topic was the issues that accompany friend requests. This specific webinar was produced for the 4th, 5th, and 6th grade levels; the 11th grade students felt that the primary age group could use the guidance.
This presentation explores gender identity and why an understanding of gender identity will help designers make effective designs even stronger. We’ll focus on the “gender question”—form fields that ask users to indicate their gender. We’ll determine how to ask this question in a world where gender is more than the male/female binary.
How to Be a Part-Time Sex-Positive Educator (When You Still Love Your Day Job!)Cunning Minx
Got a passion for a sex-positive cause but don’t want to give up the day job you love? Want to be an activist, but only have 5-10 hours a week to do it? In this CatalystCon session, you’ll learn how to identify and prioritize the daily and weekly tasks needed to achieve your outreach goals; how to cope with and combat work/life hindrances; and how to keep your motivation and mission fresh over time.
Kath Albury confirms that that mobile technology had overtaken internet use for young same-sex attracted people. This presentation was given at the Young Gay Men's Symposium at Promises & Limitations, the CSRH social research conference, February 2014.
Friends! this presentation has been prepared purposefully to introduce newcomer students with department activities. Celebration Committee is one of the committees in Department of English (M .K. Bhavnagar University.)
Moving Towards Insights-Driven StrategiesTara Hunt
There are lots of analytics you can pull when you are working with a large audience to determine what people like/don't like, but there is also a lot of behavioural/interest data that can be used to determine what they will respond to as you are planning your strategies. This presentation was given at Inbound 2015 in Boston (September 8-11).
Presentation on Right to Information Act : by Hemant Goswami : Burning Brain Society : at Chandigarh Central State Library, Sector 17, Chandigarh 160017 INDIA
quiz for class 3, class 4, class 5 , class 6, general round, school quiz, audio visual quiz, best quiz,religion quiz, mythology, logo quiz. sports quiz, nature quiz, defence quiz, united nations quiz, english proverbs quiz,General knowledge quiz ppt
Friends! this presentation has been prepared purposefully to introduce newcomer students with department activities. Celebration Committee is one of the committees in Department of English (M .K. Bhavnagar University.)
Moving Towards Insights-Driven StrategiesTara Hunt
There are lots of analytics you can pull when you are working with a large audience to determine what people like/don't like, but there is also a lot of behavioural/interest data that can be used to determine what they will respond to as you are planning your strategies. This presentation was given at Inbound 2015 in Boston (September 8-11).
Presentation on Right to Information Act : by Hemant Goswami : Burning Brain Society : at Chandigarh Central State Library, Sector 17, Chandigarh 160017 INDIA
quiz for class 3, class 4, class 5 , class 6, general round, school quiz, audio visual quiz, best quiz,religion quiz, mythology, logo quiz. sports quiz, nature quiz, defence quiz, united nations quiz, english proverbs quiz,General knowledge quiz ppt
I created this slide show for Middle and High school students to help educate them about cyberbullying and how it can start out so innocently, and become so very hurtful. I hope you will be able to use parts or all of this presentation with your students.
This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.
this is a presentation from a communications seminar at Family Christian Church in Ecorse, MI. given on April 4th, 2009. It covers stats from isafe.org on internet use by teens and youth. The presentation gives advice to parents on how to protect their children from internet predators, cyber-bullies, cybercriminals, and online piracy.
CHILDREN LOVE THE INTERNET AND SOCIAL MEDIA. The two have become intricate parts of their daily lives affecting everything from how they connect and communicate with friends, learn about the world around them, spend their leisure and entertainment time, and define their self image and social worth. While there are many benefits to using social media and smartphone apps, with their use comes
inherent dangers that puts our children at serious risk.
Managing and protecting your child’s online identity and digital footprint has become increasingly important.
The purpose of T HE BRAND OF YOU – Protecting Your
Child’s Identity, Reputation & Image is to educate parents, guardians, educators and youth organizations on the benefits and dangers of the social web, and how they
can mentor and coach children of all ages to use social media for good.
January - February 2021
Διαβάστε στο Newsletter μας τις κυριότερες δράσεις μας που
έλαβαν χώρα μέσα στο τελευταίο δίμηνο.
Read on our Newsletter our main activities that took place in the
last 2 months.
Διαβάστε στο Newsletter μας τις κυριότερες δράσεις μας που έλαβαν χώρα μέσα στο τελευταίο τρίμηνο.
Read on our Newsletter our main activities that took place in the last 3 months.
Διαβάστε στο Newsletter μας τις κυριότερες δράσεις μας που έλαβαν χώρα μέσα στο τελευταίο τετράμηνο του 2019 και τον Γενάρη του 2020.
Read on our Newsletter our main activities that took place in the last quarter of 2019 & January 2020 .
GATES Yearbook - An Erasmus+ Project | play4impact.eu | InterMediaKT
GATES – Building skills for social entrepreneurship. Game based training to answer the disruptive shift that will reshape the youth workforce landscape.
~ Running dates: January 2018 – June 2019
~ Programme: Erasmus+ KA2 Strategic Partnerships in the field of Youth
~ ID number: 2017-2-PL01-KA205-039199
InterMediaKT Newsletter 2 - August 2019InterMediaKT
Διαβάστε στο Newsletter μας τις κυριότερες δράσεις μας
που έλαβαν χώρα μέσα στο δεύτερο τετράμηνο του 2019.
Read on our Newsletter our main activities that took place
in the second quarter of 2019.
O5 - Cyberbullying guide - Short version - GRInterMediaKT
Created by consortium experts of 5 countries (Poland - Greece - Bulgaria - Turkey - Cyprus) for “Camouflage and safety in the virtual world” project (ID number 2015-1-PL01-KA201-016817) | Erasmus+ KA2 / Cooperation for innovation and the exchange of good practices / Strategic Partnerships for school education, running from December 2015 to November 2017.
http://camouflage-project.eu
O5 - Cyberbullying guide - Short version - PTInterMediaKT
Created by consortium experts of 5 countries (Poland - Greece - Bulgaria - Turkey - Cyprus) for “Camouflage and safety in the virtual world” project (ID number 2015-1-PL01-KA201-016817) | Erasmus+ KA2 / Cooperation for innovation and the exchange of good practices / Strategic Partnerships for school education, running from December 2015 to November 2017.
http://camouflage-project.eu
Created by consortium experts of 5 countries (Poland - Greece - Bulgaria - Turkey - Cyprus) for “Camouflage and safety in the virtual world” project (ID number 2015-1-PL01-KA201-016817) | Erasmus+ KA2 / Cooperation for innovation and the exchange of good practices / Strategic Partnerships for school education, running from December 2015 to November 2017.
http://camouflage-project.eu
Created by consortium experts of 5 countries (Poland - Greece - Bulgaria - Turkey - Cyprus) for “Camouflage and safety in the virtual world” project (ID number 2015-1-PL01-KA201-016817) | Erasmus+ KA2 / Cooperation for innovation and the exchange of good practices / Strategic Partnerships for school education, running from December 2015 to November 2017.
http://camouflage-project.eu
Created by consortium experts of 5 countries (Poland - Greece - Bulgaria - Turkey - Cyprus) for “Camouflage and safety in the virtual world” project (ID number 2015-1-PL01-KA201-016817) | Erasmus+ KA2 / Cooperation for innovation and the exchange of good practices / Strategic Partnerships for school education, running from December 2015 to November 2017.
http://camouflage-project.eu
Created by consortium experts of 5 countries (Poland - Greece - Bulgaria - Turkey - Cyprus) for “Camouflage and safety in the virtual world” project (ID number 2015-1-PL01-KA201-016817) | Erasmus+ KA2 / Cooperation for innovation and the exchange of good practices / Strategic Partnerships for school education, running from December 2015 to November 2017.
http://camouflage-project.eu
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
2. Who are we?
• Bulgarian Safer Internet Centre
• We promote the responsible, positive and safe use of the Internet and digital
technologies - www.safenet.bg
• We are a member of the INSAFE network of European Safer Internet Centres
since 2008 and of the International Association of Internet Hotlines INHOPE
since 2006.
5. Children waste their time on the Internet
False
Over 80% of pupils (9-17 years) use Internet for school-related
activities (European-wide study “EU Kids Online”).
6. Internet users can remain anonymous
False
The majority of Internet users can be localized within minutes,
even if they are hidden behind a nickname.
7. It does not matter if my Facebook profile
is 18+ age
False
The profiles of people under 18 come with a number of additional
security settings, which are automatically turned off for users
over 18.
The minimum age for joining Facebook is 13.
8.
9. I can control the information about myself
online
True
The majority of personal information available for
every person online is posted by the person
himself/herself. Everyone chooses their online
reputation. If someone, however, abuses one’s
identity, the abuser can be reported.
10. Unknown people are the most
common threat for children online
Sexual grooming is the most serious threat online,
however the majority of children are capable of
protecting themselves from it. In the majority of cases a
threat for children comes from the acts of people they
know, like for example cyberbullying among peers.
False
11. It’s the child’s fault that he or she is being
bullied online
False
Everyone could become a victim of
cyberbullying. It is very important that in such
cases the witnesses demonstrate that such
behaviour is not unacceptable and be
emotionally supportive of the victim.
12. True or False is over, let’s go into a bit more detail
13. What is a computer virus?
А. Bad site B. Dangerous file
C. Malicious program D. Computer error
14. What is a computer virus?
А. Bad site B. Dangerous file
C. Malicious program D. Computer error
15. What can stop viruses?
А. Disconnecting from the
internet
B. An anti-virus program
C. A computer specialist D. A Google search
16. What can stop viruses?
А. Disconnecting from the
internet
B. An anti-virus program
C. A computer specialist D. A Google search
17. How do I avoid catching a
virus?
А. Scanning every new file B. Switching off the Internet
C. Closing the suspicious site D. Restarting the computer
18. How do I avoid getting a
virus?
А. Scanning every new file B. Switching off the Internet
C. Closing the suspicious site D. Restarting my computer
30. Just a moment!
Online threats are not only
technical!
A large number of online threats
come from our contact with other
users.
31. How can a verify the
identity a new friend
online ? - q.1
А. I check his/her name in Google
B. I ask him/her what is his/her full
name
C. I ask where he/she lives
D. I ask him/her who are his/her
parents
32. How can a verify the
identity a new friend
online ? - q.1
А. I check his/her name in Google
B. I ask him/her what is his/hers full
name
C. I ask where he/she lives
D. I ask him/her who are his/her
parents
33. How can a verify the
identity a new friend
online ? - q.2
А. I look at the pictures he/she has
published
B. I check his/her e-mail in a search
engine
C. I ask my friends whether someone knows
him/her
D. I ask him/her to tell me the truth
34. How can a verify the
identity a new friend
online ? - q.2
А. I look at the pictures he/she has
published
B. I check his/her e-mail in a search
engine
C. I ask my friends whether someone knows
him/her
D. I ask him/her to tell me the truth
35. How can a verify the
identity a new friend
online ? - q.3
А. I ask how he/she is dressed
B. I ask what kinds of games he/she
prefers
C. I check his/her picture in Google
D. I ask him/her if he/she wants to
meet me
36. How can a verify the
identity a new friend
online ? - q.3
А. I ask how he/she is dressed
B. I ask what kinds of games he/she
prefers
C. I check his/her picture in Google
D. I ask him/her if he/she wants to
meet me
37. How can a verify the
identity a new friend
online ? - q.4
А. I ask a question whose answer he/she
should know
B. I check who his/her friends are
C. I check his/her spelling
D. I ask him/her why he/she wants to be
friends with me
38. How can a verify the
identity a new friend
online ? - q.4
А. I ask a question whose answer he/she
should know
B. I check who his/her friends are
C. I check his/her spelling
D. I ask him/her why he/she wants to be
friends with me
39. Important!
A particular group of unknown
people capable of causing such
troubles are pedophiles.
Unknown people
could cause all kinds
of risks for us.
40. How can I know that someone is a
pedophile? – q. 1
А. He asks me what kinds of games I like to play
B. He asks me where I study
C. He wants to move the conversation to Skype,
Viber or Messenger
D. He asks what kinds of movies I like
41. How can I know that someone is a
pedophile? – q. 1
А. He asks me what kinds of games I like to play
B. He asks me where I study
C. He wants to move the conversation to Skype,
Viber or Messenger
D. He asks what kinds of movies I like
42. How can I know that someone is a
pedophile? – q. 2
А. He asks if I have a web-camera
B. He asks what is my favorite color
C. He asks what kind of music I listen to
D. He asks how I got my name
43. How can I know that someone is a
pedophile? – q. 2
А. He asks if I have a web-camera
B. He asks what is my favorite color
C. He asks what kind of music I listen to
D. He asks how I got my name
44. How can I know that someone is a
pedophile? – q. 3
А. He wants to talk about school
B. He asks me about my parents
C. He asks me about my grades at school
D. He wants to talk about sex
45. How can I know that someone is a
pedophile? – q. 3
А. He wants to talk about school
B. He asks me about my parents
C. He asks me about my grades at school
D. He wants to talk about sex
46. Blocking and reporting
• Block and report unwanted contact
• Bullying – threats, gossip, rude words
• Users who might be using a fake identity
• Users who want us to send them naked pictures, talk about very
personal things, want to see us on a web-camera.
47.
48.
49. Report to:
• Website administrators (personally or socially);
• Your Safer Internet Centre
• Report harmful or illegal content to your Hotline
• Consult with your Helpline
50. Find your country’s Hotline and Centre, if there is
one:
http://www.inhope.org/gns/our-members.aspx
or search for “Members of INHOPE” in any search engine.
and for your SIC:
https://www.betterinternetforkids.eu/web/portal/policy/insafe-inhope