SlideShare a Scribd company logo
Threats and responsible
behavior online
Who are we?
• Bulgarian Safer Internet Centre
• We promote the responsible, positive and safe use of the Internet and digital
technologies - www.safenet.bg
• We are a member of the INSAFE network of European Safer Internet Centres
since 2008 and of the International Association of Internet Hotlines INHOPE
since 2006.
Let’s check our knowledge
about Internet 
True or False
Children waste their time on the Internet
False
Over 80% of pupils (9-17 years) use Internet for school-related
activities (European-wide study “EU Kids Online”).
Internet users can remain anonymous
False
The majority of Internet users can be localized within minutes,
even if they are hidden behind a nickname.
It does not matter if my Facebook profile
is 18+ age
False
The profiles of people under 18 come with a number of additional
security settings, which are automatically turned off for users
over 18.
The minimum age for joining Facebook is 13.
I can control the information about myself
online
True
The majority of personal information available for
every person online is posted by the person
himself/herself. Everyone chooses their online
reputation. If someone, however, abuses one’s
identity, the abuser can be reported.
Unknown people are the most
common threat for children online
Sexual grooming is the most serious threat online,
however the majority of children are capable of
protecting themselves from it. In the majority of cases a
threat for children comes from the acts of people they
know, like for example cyberbullying among peers.
False
It’s the child’s fault that he or she is being
bullied online
False
Everyone could become a victim of
cyberbullying. It is very important that in such
cases the witnesses demonstrate that such
behaviour is not unacceptable and be
emotionally supportive of the victim.
True or False is over, let’s go into a bit more detail 
What is a computer virus?
А. Bad site B. Dangerous file
C. Malicious program D. Computer error
What is a computer virus?
А. Bad site B. Dangerous file
C. Malicious program D. Computer error
What can stop viruses?
А. Disconnecting from the
internet
B. An anti-virus program
C. A computer specialist D. A Google search
What can stop viruses?
А. Disconnecting from the
internet
B. An anti-virus program
C. A computer specialist D. A Google search
How do I avoid catching a
virus?
А. Scanning every new file B. Switching off the Internet
C. Closing the suspicious site D. Restarting the computer
How do I avoid getting a
virus?
А. Scanning every new file B. Switching off the Internet
C. Closing the suspicious site D. Restarting my computer
Protection from viruses
Verifying every new
website or link with WOT
www.mywot.com
How does WOT protect me?
WOT Protection
Mobile security and protection
Another option:
Dolphin web browser
+
Just a moment!
Online threats are not only
technical!
A large number of online threats
come from our contact with other
users.
How can a verify the
identity a new friend
online ? - q.1
А. I check his/her name in Google
B. I ask him/her what is his/her full
name
C. I ask where he/she lives
D. I ask him/her who are his/her
parents
How can a verify the
identity a new friend
online ? - q.1
А. I check his/her name in Google
B. I ask him/her what is his/hers full
name
C. I ask where he/she lives
D. I ask him/her who are his/her
parents
How can a verify the
identity a new friend
online ? - q.2
А. I look at the pictures he/she has
published
B. I check his/her e-mail in a search
engine
C. I ask my friends whether someone knows
him/her
D. I ask him/her to tell me the truth
How can a verify the
identity a new friend
online ? - q.2
А. I look at the pictures he/she has
published
B. I check his/her e-mail in a search
engine
C. I ask my friends whether someone knows
him/her
D. I ask him/her to tell me the truth
How can a verify the
identity a new friend
online ? - q.3
А. I ask how he/she is dressed
B. I ask what kinds of games he/she
prefers
C. I check his/her picture in Google
D. I ask him/her if he/she wants to
meet me
How can a verify the
identity a new friend
online ? - q.3
А. I ask how he/she is dressed
B. I ask what kinds of games he/she
prefers
C. I check his/her picture in Google
D. I ask him/her if he/she wants to
meet me
How can a verify the
identity a new friend
online ? - q.4
А. I ask a question whose answer he/she
should know
B. I check who his/her friends are
C. I check his/her spelling
D. I ask him/her why he/she wants to be
friends with me
How can a verify the
identity a new friend
online ? - q.4
А. I ask a question whose answer he/she
should know
B. I check who his/her friends are
C. I check his/her spelling
D. I ask him/her why he/she wants to be
friends with me
Important!
A particular group of unknown
people capable of causing such
troubles are pedophiles.
Unknown people
could cause all kinds
of risks for us.
How can I know that someone is a
pedophile? – q. 1
А. He asks me what kinds of games I like to play
B. He asks me where I study
C. He wants to move the conversation to Skype,
Viber or Messenger
D. He asks what kinds of movies I like
How can I know that someone is a
pedophile? – q. 1
А. He asks me what kinds of games I like to play
B. He asks me where I study
C. He wants to move the conversation to Skype,
Viber or Messenger
D. He asks what kinds of movies I like
How can I know that someone is a
pedophile? – q. 2
А. He asks if I have a web-camera
B. He asks what is my favorite color
C. He asks what kind of music I listen to
D. He asks how I got my name
How can I know that someone is a
pedophile? – q. 2
А. He asks if I have a web-camera
B. He asks what is my favorite color
C. He asks what kind of music I listen to
D. He asks how I got my name
How can I know that someone is a
pedophile? – q. 3
А. He wants to talk about school
B. He asks me about my parents
C. He asks me about my grades at school
D. He wants to talk about sex
How can I know that someone is a
pedophile? – q. 3
А. He wants to talk about school
B. He asks me about my parents
C. He asks me about my grades at school
D. He wants to talk about sex
Blocking and reporting
• Block and report unwanted contact
• Bullying – threats, gossip, rude words
• Users who might be using a fake identity
• Users who want us to send them naked pictures, talk about very
personal things, want to see us on a web-camera.
Report to:
• Website administrators (personally or socially);
• Your Safer Internet Centre
• Report harmful or illegal content to your Hotline
• Consult with your Helpline
Find your country’s Hotline and Centre, if there is
one:
http://www.inhope.org/gns/our-members.aspx
or search for “Members of INHOPE” in any search engine.
and for your SIC:
https://www.betterinternetforkids.eu/web/portal/policy/insafe-inhope
Georgi Apostolov
BG SIC coordinator
georgi.apostolov@online.bg

More Related Content

What's hot

Audience Profile1234123
Audience Profile1234123Audience Profile1234123
Audience Profile1234123
Reveoh
 
Henry Vanderhoest\'s E-Saftey Quiz
Henry Vanderhoest\'s E-Saftey QuizHenry Vanderhoest\'s E-Saftey Quiz
Henry Vanderhoest\'s E-Saftey Quiz
tonybattista
 
jack salisbury pp quiz
jack salisbury pp quizjack salisbury pp quiz
jack salisbury pp quizguest76ad0e
 
Evaluation - Logical Fallacies (Irrelevance)
Evaluation - Logical Fallacies (Irrelevance)Evaluation - Logical Fallacies (Irrelevance)
Evaluation - Logical Fallacies (Irrelevance)Alwyn Lau
 
Poly Living Keynote 2015: How Polyamory Became More Mainstream Than Peanut Bu...
Poly Living Keynote 2015: How Polyamory Became More Mainstream Than Peanut Bu...Poly Living Keynote 2015: How Polyamory Became More Mainstream Than Peanut Bu...
Poly Living Keynote 2015: How Polyamory Became More Mainstream Than Peanut Bu...
Cunning Minx
 
Questionnaire results
Questionnaire resultsQuestionnaire results
Questionnaire resultskeeleyb01
 

What's hot (6)

Audience Profile1234123
Audience Profile1234123Audience Profile1234123
Audience Profile1234123
 
Henry Vanderhoest\'s E-Saftey Quiz
Henry Vanderhoest\'s E-Saftey QuizHenry Vanderhoest\'s E-Saftey Quiz
Henry Vanderhoest\'s E-Saftey Quiz
 
jack salisbury pp quiz
jack salisbury pp quizjack salisbury pp quiz
jack salisbury pp quiz
 
Evaluation - Logical Fallacies (Irrelevance)
Evaluation - Logical Fallacies (Irrelevance)Evaluation - Logical Fallacies (Irrelevance)
Evaluation - Logical Fallacies (Irrelevance)
 
Poly Living Keynote 2015: How Polyamory Became More Mainstream Than Peanut Bu...
Poly Living Keynote 2015: How Polyamory Became More Mainstream Than Peanut Bu...Poly Living Keynote 2015: How Polyamory Became More Mainstream Than Peanut Bu...
Poly Living Keynote 2015: How Polyamory Became More Mainstream Than Peanut Bu...
 
Questionnaire results
Questionnaire resultsQuestionnaire results
Questionnaire results
 

Viewers also liked

Corynebacterium diphtheriae
Corynebacterium diphtheriaeCorynebacterium diphtheriae
Corynebacterium diphtheriae
Microbiology
 
Antimicrobial chemotherapy
Antimicrobial   chemotherapyAntimicrobial   chemotherapy
Antimicrobial chemotherapy
Microbiology
 
Presentation on celebration commitee
Presentation on celebration commiteePresentation on celebration commitee
Presentation on celebration commitee
JaytiThakar94
 
Sucessão ecológica
Sucessão ecológicaSucessão ecológica
Sucessão ecológica
linamelim
 
Pseudomonas
PseudomonasPseudomonas
Pseudomonas
Microbiology
 
Neisseria
NeisseriaNeisseria
Neisseria
Microbiology
 
Neisseria
NeisseriaNeisseria
Neisseria
Microbiology
 
Xana
XanaXana
Xana
isarevi
 
правильное питание
правильное питаниеправильное питание
правильное питание
virtualtaganrog
 
Pharmacology Respiratory Drugs
Pharmacology   Respiratory DrugsPharmacology   Respiratory Drugs
Pharmacology Respiratory Drugs
jben501
 
Aula sobre quadril, série para sindrome do impacto femoro acetabular
Aula sobre  quadril, série para sindrome do impacto femoro acetabularAula sobre  quadril, série para sindrome do impacto femoro acetabular
Aula sobre quadril, série para sindrome do impacto femoro acetabular
Robson Rocha
 
Breathing System
Breathing SystemBreathing System
Breathing System
Khalid
 
Moving Towards Insights-Driven Strategies
Moving Towards Insights-Driven StrategiesMoving Towards Insights-Driven Strategies
Moving Towards Insights-Driven Strategies
Tara Hunt
 
Presentation on Right to Information Act : by Hemant Goswami
Presentation on Right to Information Act : by Hemant GoswamiPresentation on Right to Information Act : by Hemant Goswami
Presentation on Right to Information Act : by Hemant Goswami
Burning Brain Society
 
Policy guidelines on classroom assessment for the k to 12 basic education pro...
Policy guidelines on classroom assessment for the k to 12 basic education pro...Policy guidelines on classroom assessment for the k to 12 basic education pro...
Policy guidelines on classroom assessment for the k to 12 basic education pro...
Michael Carl Divinaflor
 
Junior quiz 2012 13, audio visual quiz, school quiz ppt,General knowledge qui...
Junior quiz 2012 13, audio visual quiz, school quiz ppt,General knowledge qui...Junior quiz 2012 13, audio visual quiz, school quiz ppt,General knowledge qui...
Junior quiz 2012 13, audio visual quiz, school quiz ppt,General knowledge qui...
mehboobanik
 
Morbidity and mortality slides
Morbidity and mortality slidesMorbidity and mortality slides
Morbidity and mortality slidesjesus4u
 
Mergers & acquisitions for MBA
Mergers & acquisitions for MBAMergers & acquisitions for MBA
Mergers & acquisitions for MBAUlhas Wadivkar
 
Fmea presentation
Fmea presentationFmea presentation
Fmea presentationMurat Terzi
 
Working Flow of Opensource Testlink
Working Flow of Opensource TestlinkWorking Flow of Opensource Testlink
Working Flow of Opensource Testlink
usha kannappan
 

Viewers also liked (20)

Corynebacterium diphtheriae
Corynebacterium diphtheriaeCorynebacterium diphtheriae
Corynebacterium diphtheriae
 
Antimicrobial chemotherapy
Antimicrobial   chemotherapyAntimicrobial   chemotherapy
Antimicrobial chemotherapy
 
Presentation on celebration commitee
Presentation on celebration commiteePresentation on celebration commitee
Presentation on celebration commitee
 
Sucessão ecológica
Sucessão ecológicaSucessão ecológica
Sucessão ecológica
 
Pseudomonas
PseudomonasPseudomonas
Pseudomonas
 
Neisseria
NeisseriaNeisseria
Neisseria
 
Neisseria
NeisseriaNeisseria
Neisseria
 
Xana
XanaXana
Xana
 
правильное питание
правильное питаниеправильное питание
правильное питание
 
Pharmacology Respiratory Drugs
Pharmacology   Respiratory DrugsPharmacology   Respiratory Drugs
Pharmacology Respiratory Drugs
 
Aula sobre quadril, série para sindrome do impacto femoro acetabular
Aula sobre  quadril, série para sindrome do impacto femoro acetabularAula sobre  quadril, série para sindrome do impacto femoro acetabular
Aula sobre quadril, série para sindrome do impacto femoro acetabular
 
Breathing System
Breathing SystemBreathing System
Breathing System
 
Moving Towards Insights-Driven Strategies
Moving Towards Insights-Driven StrategiesMoving Towards Insights-Driven Strategies
Moving Towards Insights-Driven Strategies
 
Presentation on Right to Information Act : by Hemant Goswami
Presentation on Right to Information Act : by Hemant GoswamiPresentation on Right to Information Act : by Hemant Goswami
Presentation on Right to Information Act : by Hemant Goswami
 
Policy guidelines on classroom assessment for the k to 12 basic education pro...
Policy guidelines on classroom assessment for the k to 12 basic education pro...Policy guidelines on classroom assessment for the k to 12 basic education pro...
Policy guidelines on classroom assessment for the k to 12 basic education pro...
 
Junior quiz 2012 13, audio visual quiz, school quiz ppt,General knowledge qui...
Junior quiz 2012 13, audio visual quiz, school quiz ppt,General knowledge qui...Junior quiz 2012 13, audio visual quiz, school quiz ppt,General knowledge qui...
Junior quiz 2012 13, audio visual quiz, school quiz ppt,General knowledge qui...
 
Morbidity and mortality slides
Morbidity and mortality slidesMorbidity and mortality slides
Morbidity and mortality slides
 
Mergers & acquisitions for MBA
Mergers & acquisitions for MBAMergers & acquisitions for MBA
Mergers & acquisitions for MBA
 
Fmea presentation
Fmea presentationFmea presentation
Fmea presentation
 
Working Flow of Opensource Testlink
Working Flow of Opensource TestlinkWorking Flow of Opensource Testlink
Working Flow of Opensource Testlink
 

Similar to Online threats and responsible behavior (Bulgarian Safer Internet Centre)

102009
102009102009
Staying Safe on the Internet
Staying Safe on the InternetStaying Safe on the Internet
Staying Safe on the Internet
Kirby Gomez
 
Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)esolate
 
022010
022010022010
Internet safety
Internet safetyInternet safety
Internet safety
mbend360
 
102010a
102010a102010a
Internet Safety Spring 2010
Internet Safety Spring 2010Internet Safety Spring 2010
Internet Safety Spring 2010
Steven Knight
 
Cybersafety, Teachers
Cybersafety, TeachersCybersafety, Teachers
Cybersafety, Teachers
kat_albe
 
Gloria flores
Gloria floresGloria flores
Gloria floresyaya700
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
KanelandSvihlik
 
UAS Dubai Student Cyber Awareness
UAS Dubai Student Cyber AwarenessUAS Dubai Student Cyber Awareness
UAS Dubai Student Cyber Awareness
Amanda DeCardy
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
University of Wisconsin - Superior
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
Mary Alice Osborne
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
Sandra Fathi
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
Eric Cedo
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
Neville Maluleke
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital Leaders
SWEET SPOT ACADEMY
 
Let's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital WorldLet's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital World
Deborah Gonzalez, Esq.
 

Similar to Online threats and responsible behavior (Bulgarian Safer Internet Centre) (20)

102009
102009102009
102009
 
Staying Safe on the Internet
Staying Safe on the InternetStaying Safe on the Internet
Staying Safe on the Internet
 
Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)
 
022010
022010022010
022010
 
Test
TestTest
Test
 
Internet safety
Internet safetyInternet safety
Internet safety
 
102010a
102010a102010a
102010a
 
Internet Safety Spring 2010
Internet Safety Spring 2010Internet Safety Spring 2010
Internet Safety Spring 2010
 
Cybersafety, Teachers
Cybersafety, TeachersCybersafety, Teachers
Cybersafety, Teachers
 
Gloria flores
Gloria floresGloria flores
Gloria flores
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
UAS Dubai Student Cyber Awareness
UAS Dubai Student Cyber AwarenessUAS Dubai Student Cyber Awareness
UAS Dubai Student Cyber Awareness
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
102008 A
102008 A102008 A
102008 A
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital Leaders
 
Let's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital WorldLet's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital World
 

More from InterMediaKT

Let women-choose-publication
Let women-choose-publicationLet women-choose-publication
Let women-choose-publication
InterMediaKT
 
Annual report 2020
Annual report 2020Annual report 2020
Annual report 2020
InterMediaKT
 
InterMediaKT Newsletter 6
InterMediaKT Newsletter 6InterMediaKT Newsletter 6
InterMediaKT Newsletter 6
InterMediaKT
 
InterMediaKT Newsletter #5
InterMediaKT Newsletter #5 InterMediaKT Newsletter #5
InterMediaKT Newsletter #5
InterMediaKT
 
InterMediaKT Newsletter 4
InterMediaKT Newsletter 4InterMediaKT Newsletter 4
InterMediaKT Newsletter 4
InterMediaKT
 
InterMediaKT - Annual Report 2019
InterMediaKT - Annual Report 2019 InterMediaKT - Annual Report 2019
InterMediaKT - Annual Report 2019
InterMediaKT
 
InterMediaKT Newsletter 3
InterMediaKT Newsletter 3InterMediaKT Newsletter 3
InterMediaKT Newsletter 3
InterMediaKT
 
GATES Yearbook - An Erasmus+ Project | play4impact.eu |
GATES Yearbook - An Erasmus+ Project | play4impact.eu | GATES Yearbook - An Erasmus+ Project | play4impact.eu |
GATES Yearbook - An Erasmus+ Project | play4impact.eu |
InterMediaKT
 
InterMediaKT Newsletter 2 - August 2019
InterMediaKT Newsletter 2 - August 2019InterMediaKT Newsletter 2 - August 2019
InterMediaKT Newsletter 2 - August 2019
InterMediaKT
 
Hλεκτρονικός Eκφοβισμός
Hλεκτρονικός Eκφοβισμός Hλεκτρονικός Eκφοβισμός
Hλεκτρονικός Eκφοβισμός
InterMediaKT
 
O5 - Cyberbullying guide - Short version - GR
O5 - Cyberbullying guide - Short version - GRO5 - Cyberbullying guide - Short version - GR
O5 - Cyberbullying guide - Short version - GR
InterMediaKT
 
O5 - Cyberbullying guide - Short version - PT
O5 - Cyberbullying guide - Short version - PTO5 - Cyberbullying guide - Short version - PT
O5 - Cyberbullying guide - Short version - PT
InterMediaKT
 
O5 - Cyberbullying Guide
O5 - Cyberbullying GuideO5 - Cyberbullying Guide
O5 - Cyberbullying Guide
InterMediaKT
 
Guide 3 - Tips for kids
Guide 3 - Tips for kidsGuide 3 - Tips for kids
Guide 3 - Tips for kids
InterMediaKT
 
Guide 2 - Tips for teachers
Guide 2 - Tips for teachersGuide 2 - Tips for teachers
Guide 2 - Tips for teachers
InterMediaKT
 
O5 - Cyberbullying Guide
O5 - Cyberbullying GuideO5 - Cyberbullying Guide
O5 - Cyberbullying Guide
InterMediaKT
 
School Mediation student training
School Mediation student trainingSchool Mediation student training
School Mediation student training
InterMediaKT
 
CYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLECYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLE
InterMediaKT
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
InterMediaKT
 
Camouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldCamouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual World
InterMediaKT
 

More from InterMediaKT (20)

Let women-choose-publication
Let women-choose-publicationLet women-choose-publication
Let women-choose-publication
 
Annual report 2020
Annual report 2020Annual report 2020
Annual report 2020
 
InterMediaKT Newsletter 6
InterMediaKT Newsletter 6InterMediaKT Newsletter 6
InterMediaKT Newsletter 6
 
InterMediaKT Newsletter #5
InterMediaKT Newsletter #5 InterMediaKT Newsletter #5
InterMediaKT Newsletter #5
 
InterMediaKT Newsletter 4
InterMediaKT Newsletter 4InterMediaKT Newsletter 4
InterMediaKT Newsletter 4
 
InterMediaKT - Annual Report 2019
InterMediaKT - Annual Report 2019 InterMediaKT - Annual Report 2019
InterMediaKT - Annual Report 2019
 
InterMediaKT Newsletter 3
InterMediaKT Newsletter 3InterMediaKT Newsletter 3
InterMediaKT Newsletter 3
 
GATES Yearbook - An Erasmus+ Project | play4impact.eu |
GATES Yearbook - An Erasmus+ Project | play4impact.eu | GATES Yearbook - An Erasmus+ Project | play4impact.eu |
GATES Yearbook - An Erasmus+ Project | play4impact.eu |
 
InterMediaKT Newsletter 2 - August 2019
InterMediaKT Newsletter 2 - August 2019InterMediaKT Newsletter 2 - August 2019
InterMediaKT Newsletter 2 - August 2019
 
Hλεκτρονικός Eκφοβισμός
Hλεκτρονικός Eκφοβισμός Hλεκτρονικός Eκφοβισμός
Hλεκτρονικός Eκφοβισμός
 
O5 - Cyberbullying guide - Short version - GR
O5 - Cyberbullying guide - Short version - GRO5 - Cyberbullying guide - Short version - GR
O5 - Cyberbullying guide - Short version - GR
 
O5 - Cyberbullying guide - Short version - PT
O5 - Cyberbullying guide - Short version - PTO5 - Cyberbullying guide - Short version - PT
O5 - Cyberbullying guide - Short version - PT
 
O5 - Cyberbullying Guide
O5 - Cyberbullying GuideO5 - Cyberbullying Guide
O5 - Cyberbullying Guide
 
Guide 3 - Tips for kids
Guide 3 - Tips for kidsGuide 3 - Tips for kids
Guide 3 - Tips for kids
 
Guide 2 - Tips for teachers
Guide 2 - Tips for teachersGuide 2 - Tips for teachers
Guide 2 - Tips for teachers
 
O5 - Cyberbullying Guide
O5 - Cyberbullying GuideO5 - Cyberbullying Guide
O5 - Cyberbullying Guide
 
School Mediation student training
School Mediation student trainingSchool Mediation student training
School Mediation student training
 
CYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLECYBER BULLYING THE COURT’S ROLE
CYBER BULLYING THE COURT’S ROLE
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Camouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldCamouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual World
 

Recently uploaded

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

Online threats and responsible behavior (Bulgarian Safer Internet Centre)

  • 2. Who are we? • Bulgarian Safer Internet Centre • We promote the responsible, positive and safe use of the Internet and digital technologies - www.safenet.bg • We are a member of the INSAFE network of European Safer Internet Centres since 2008 and of the International Association of Internet Hotlines INHOPE since 2006.
  • 3. Let’s check our knowledge about Internet 
  • 5. Children waste their time on the Internet False Over 80% of pupils (9-17 years) use Internet for school-related activities (European-wide study “EU Kids Online”).
  • 6. Internet users can remain anonymous False The majority of Internet users can be localized within minutes, even if they are hidden behind a nickname.
  • 7. It does not matter if my Facebook profile is 18+ age False The profiles of people under 18 come with a number of additional security settings, which are automatically turned off for users over 18. The minimum age for joining Facebook is 13.
  • 8.
  • 9. I can control the information about myself online True The majority of personal information available for every person online is posted by the person himself/herself. Everyone chooses their online reputation. If someone, however, abuses one’s identity, the abuser can be reported.
  • 10. Unknown people are the most common threat for children online Sexual grooming is the most serious threat online, however the majority of children are capable of protecting themselves from it. In the majority of cases a threat for children comes from the acts of people they know, like for example cyberbullying among peers. False
  • 11. It’s the child’s fault that he or she is being bullied online False Everyone could become a victim of cyberbullying. It is very important that in such cases the witnesses demonstrate that such behaviour is not unacceptable and be emotionally supportive of the victim.
  • 12. True or False is over, let’s go into a bit more detail 
  • 13. What is a computer virus? А. Bad site B. Dangerous file C. Malicious program D. Computer error
  • 14. What is a computer virus? А. Bad site B. Dangerous file C. Malicious program D. Computer error
  • 15. What can stop viruses? А. Disconnecting from the internet B. An anti-virus program C. A computer specialist D. A Google search
  • 16. What can stop viruses? А. Disconnecting from the internet B. An anti-virus program C. A computer specialist D. A Google search
  • 17. How do I avoid catching a virus? А. Scanning every new file B. Switching off the Internet C. Closing the suspicious site D. Restarting the computer
  • 18. How do I avoid getting a virus? А. Scanning every new file B. Switching off the Internet C. Closing the suspicious site D. Restarting my computer
  • 19.
  • 20. Protection from viruses Verifying every new website or link with WOT www.mywot.com
  • 21.
  • 22. How does WOT protect me?
  • 24.
  • 25.
  • 26.
  • 27. Mobile security and protection
  • 28.
  • 30. Just a moment! Online threats are not only technical! A large number of online threats come from our contact with other users.
  • 31. How can a verify the identity a new friend online ? - q.1 А. I check his/her name in Google B. I ask him/her what is his/her full name C. I ask where he/she lives D. I ask him/her who are his/her parents
  • 32. How can a verify the identity a new friend online ? - q.1 А. I check his/her name in Google B. I ask him/her what is his/hers full name C. I ask where he/she lives D. I ask him/her who are his/her parents
  • 33. How can a verify the identity a new friend online ? - q.2 А. I look at the pictures he/she has published B. I check his/her e-mail in a search engine C. I ask my friends whether someone knows him/her D. I ask him/her to tell me the truth
  • 34. How can a verify the identity a new friend online ? - q.2 А. I look at the pictures he/she has published B. I check his/her e-mail in a search engine C. I ask my friends whether someone knows him/her D. I ask him/her to tell me the truth
  • 35. How can a verify the identity a new friend online ? - q.3 А. I ask how he/she is dressed B. I ask what kinds of games he/she prefers C. I check his/her picture in Google D. I ask him/her if he/she wants to meet me
  • 36. How can a verify the identity a new friend online ? - q.3 А. I ask how he/she is dressed B. I ask what kinds of games he/she prefers C. I check his/her picture in Google D. I ask him/her if he/she wants to meet me
  • 37. How can a verify the identity a new friend online ? - q.4 А. I ask a question whose answer he/she should know B. I check who his/her friends are C. I check his/her spelling D. I ask him/her why he/she wants to be friends with me
  • 38. How can a verify the identity a new friend online ? - q.4 А. I ask a question whose answer he/she should know B. I check who his/her friends are C. I check his/her spelling D. I ask him/her why he/she wants to be friends with me
  • 39. Important! A particular group of unknown people capable of causing such troubles are pedophiles. Unknown people could cause all kinds of risks for us.
  • 40. How can I know that someone is a pedophile? – q. 1 А. He asks me what kinds of games I like to play B. He asks me where I study C. He wants to move the conversation to Skype, Viber or Messenger D. He asks what kinds of movies I like
  • 41. How can I know that someone is a pedophile? – q. 1 А. He asks me what kinds of games I like to play B. He asks me where I study C. He wants to move the conversation to Skype, Viber or Messenger D. He asks what kinds of movies I like
  • 42. How can I know that someone is a pedophile? – q. 2 А. He asks if I have a web-camera B. He asks what is my favorite color C. He asks what kind of music I listen to D. He asks how I got my name
  • 43. How can I know that someone is a pedophile? – q. 2 А. He asks if I have a web-camera B. He asks what is my favorite color C. He asks what kind of music I listen to D. He asks how I got my name
  • 44. How can I know that someone is a pedophile? – q. 3 А. He wants to talk about school B. He asks me about my parents C. He asks me about my grades at school D. He wants to talk about sex
  • 45. How can I know that someone is a pedophile? – q. 3 А. He wants to talk about school B. He asks me about my parents C. He asks me about my grades at school D. He wants to talk about sex
  • 46. Blocking and reporting • Block and report unwanted contact • Bullying – threats, gossip, rude words • Users who might be using a fake identity • Users who want us to send them naked pictures, talk about very personal things, want to see us on a web-camera.
  • 47.
  • 48.
  • 49. Report to: • Website administrators (personally or socially); • Your Safer Internet Centre • Report harmful or illegal content to your Hotline • Consult with your Helpline
  • 50. Find your country’s Hotline and Centre, if there is one: http://www.inhope.org/gns/our-members.aspx or search for “Members of INHOPE” in any search engine. and for your SIC: https://www.betterinternetforkids.eu/web/portal/policy/insafe-inhope
  • 51. Georgi Apostolov BG SIC coordinator georgi.apostolov@online.bg