1 / 27

Staying Safe in Cyberspace

Staying Safe in Cyberspace. Jessica Kohler ITC 525. Table of Contents. Safety Rules Cyber Bullying Netiquette Email Safety Standards Credits Cybersmart Video License to Surf the Web. Safety Rules.

bedros
Download Presentation

Staying Safe in Cyberspace

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Staying Safe in Cyberspace Jessica Kohler ITC 525

  2. Table of Contents Safety Rules Cyber Bullying Netiquette Email Safety Standards Credits Cybersmart Video License to Surf the Web

  3. Safety Rules *Only use the Internet when there is an adult home. *Don’t answer email from strangers. *Tell an adult when you feel unsafe. *Keep passwords private. *Don’t meet someone in person whom you met online. *Don’t send your picture to anyone online. Even More Info. More Info. HOME

  4. Are you safety savvy? What are some ways you can stay safe on the Internet? a. Share your password with others. b. Don’t send your picture to anyone online. c. Use the Internet when no one is home. HOME BACK

  5. Let’s try again! Keep your password private. Others can hack into your accounts using your password. HOME

  6. Let’s try again! Make sure there is an adult at home when using the Internet. Who else will you tell if something goes wrong? HOME

  7. Correct! Make sure you don’t send pictures to people over the Internet (even if you know them.) HOME

  8. Cyber Bullying What is it?*When a child is tormented, threatened, harassed, humiliated, embarrassed, or targeted by another child using the Internet or cell phones. How it Works:*Direct attacks *Using others as accomplices Take Action! *Keep personal information private. *Stop, Block, and Tell. *Take 5! VIDEO HOME

  9. Are you safety savvy? What actions can you take to stop Cyper Bullying? a. Keep personal information private. b. Help spread the rumors. c. Text harmful information about another person. True or False? Cyber bullying is talking with a friend over the Internet. HOME BACK

  10. Let’s look at that again! Simply talking with a friend over the Internet is not Cyber Bullying. HOME

  11. Let’s look at that again! Helping to spread rumors is being an accomplice to the bullying. HOME

  12. Let’s look at that again! Texting harmful information about another person is Cyber Bullying. HOME

  13. Great Thinking! Cyber Bullying is when a child is tormented, threatened, harassed, humiliated, embarrassed, or targeted by another child using the Internet or cell phones. Bullies could be a friend or just an acquaintance. HOME

  14. Great Thinking! Make sure you keep your personal information private. Bullies could be a friend or just an acquaintance. HOME

  15. Email Safety Email Dangers: *Chain Letters *Hoaxes, rumors and urban legends *Phishing *Scams and fraud *Spam *Spoofing *Viruses Safety Tips: *Change password often *Keep password private *Log off when done *Don’t reply to spam, harassing, or offensive email. *Don’t forward chain letters *Delete emails, UNREAD, from people you don’t know *Use anti-virus programs before opening attachments. What are these? Even more Information! HOME

  16. Are you safety savvy? What are some email dangers? a. Chain Letters b. Phishing c. Spam d. All of the above HOME BACK

  17. Not Quite! Take another look at that list. HOME

  18. Way To Go! Spam, Phishing, and Chain Letters can be dangerous. Watch Out for these too: *Hoaxes, rumors and urban legends *Scams and fraud *Spoofing *Viruses HOME

  19. Netiquette What is it? Internet etiquette or guidelines for proper behavior on the Internet. Respect all other users! Be careful to not use rude or bad language online. Do not TYPE IN ALL CAPITAL LETTERS. Make a good impression. Do to others as you would have them do to you. Be patient with newcomers. Don’t break any laws. More Info. Even More Info. HOME

  20. Are you safety savvy? What is an example of good Internet behavior? a. TYPE IN ALL CAPITAL LETTERS b. Use rude or bad language c. Do to others as you would have them do to you. HOME BACK

  21. Do you need a redo? Typing in all capital letters makes people think you are yelling at them. This is not good Internet behavior. HOME

  22. Do you need a redo? Using rude or bad language anywhere, whether on the Internet or not is inappropriate behavior. Many Internet providers will terminate your account if you use this type of language. HOME

  23. Absolutely! Doing to others as you would like them to do to you is a rule you should use throughout your life. This is wonderful Internet behavior to have. HOME

  24. Get Cybersmart with Phineas and Ferb HOME

  25. Earn Your License to Surf the Web “Rules of the Road” HOME

  26. PA State Standards Science and Technology and Engineering Education 3.4.B: Technology and Society 3.4.5.B1: Explain how the use of technology can have unintended consequences. 3.4.D: Abilities for a Technological World 3.4.5.D3: Determine if the human use of a product or system creates positive or negative results. National Educational Technology Standards 5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior. Students: a. advocate and practice safe, legal, and responsible use of information and technology. c. demonstrate personal responsibility for lifelong learning. d. exhibit leadership for digital citizenship. HOME

  27. Credits Sites http://www.protectkids.com/youthsafety/safteytipskids.htm http://www.ccmostwanted.com/kids/iguide.htm http://www.stopcyberbullying.org/index2.html http://www.youtube.com/watch?v=o0W_tEUMzuk http://www.wiredsafety.org/safety/email_safety/ http://www.commonsensemedia.org/get-cybersmart-phineas-and-ferb# http://www.ccmostwanted.com/kids/inetiquette.htm http://www.kidsdomain.com/brain/computer/surfing/netiquette_kids.html http://pbskids.org/license/ Images http://dynasium.files.wordpress.com/2008/12/6a00d8341c7bc453ef00e5505e03c48833-800wi.jpg http://www.clker.com/clipart-13158.html http://reallessons4reallearning.wikispaces.com/file/view/computer-clipart.gif/131750119/computer-clipart.gif http://cdnet.myxer.com/tn/c/1943197/big/?t=20090522165142 http://www.chairvilleschool.org/webquests/internet_safety1_check.gif http://www.villageofworth.com/Police/email/envelope-circle-clipart.gif http://www.graphicsfactory.com/clip-art/image_files/tn_image/0/755640-tn_BIB0101.gif http://www.urenco.com/uploads/images/safety%20sign.JPG http://glma.files.wordpress.com/2007/12/cyberbullying.jpg http://scorpion1333.files.wordpress.com/2009/06/phineas-and-ferb-300a071708.jpg http://www.gpl.lib.me.us/movie.gif HOME

More Related