1 / 16

Day 3

Cybersafety. Day 3. Presented by FJUHSD Teacher Librarian. What is Cyberbullying. Cyberbullying involves the use of electronic devices supports deliberate, repeated, and hostile behavior by an individual or group its intent is to harm others. What is Cyberbullying.

sailor
Download Presentation

Day 3

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cybersafety Day 3 Presented by FJUHSD Teacher Librarian

  2. What is Cyberbullying • Cyberbullying • involves the use of electronic devices • supports deliberate, repeated, and hostile behavior by an individual or group • its intent is to harm others.

  3. What is Cyberbullying • According to a survey done in 2007 by the National Crime and Protection Council: • 43% of teens report that they have experienced some form of cyberbullying that year. • The incidence of cyberbullying is higher among females than males. More than 50% of females age 15 to 16 years of age reported at least one cyberbullying incident.

  4. Why do teens cyberbully? 81% Because they think it is funny 64% Because they don’t like the person 45% Because they view the victim as a loser 47% Because they feel there are no consequences for cyberbullying 45% Because they don’t think they will get caught 58% of students surveyed don’t think cyberbullying is a big deal

  5. Stop Cyber bullying Do you think it was a big deal to these students and their loved ones? Rachael was stalked online by anonymous bully. She died by suicide on October 9, 2006. A cruel online hoax by a neighbor led to the suicide death of Megan. Ryan, a 13-year old, who died by suicide as a result of bullying at school and online.

  6. What is a cyber-predator? • A cyber-predator uses the internet to hunt for victims to take advantage of them in some way: • emotionally • sexually • psychologically • financially • A cyber-predator knows how to manipulate people by creating trust and friendships where none should exist.

  7. What is a cyber-predator? • 77% of the target for online predators are teens aged 14 and older. • 33% of teensreceived an aggressive sexual solicitation online in the past year. • 75% of children are willing to share personal information online about themselves and their family in exchange for goods and services.

  8. What is Phishing Phishing is the act of requesting confidential information over the Internet under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data.

  9. Phishing • 15% of online teens have received a fraudulent message, compared with 22% of adults. • Always check your URL when navigating in social networks like MySpace and Facebook. • If you click on an application and the • URL does not have www.facebook or has a URL that is just numbers like 10.263.18, immediately exit out of that page.

  10. How to stop the bad guys • Be suspicious of any email with urgent requests for personal financial information. DO NOT RESPOND TO IT! • Phisher emails are typically NOT personalized • Valid messages from your bank or e-commerce company generally are

  11. How to stop the bad guys • 2. If you suspect an email message might not be authentic . . .Don't use the embedded links to get to another web page. • Call the company on the telephone, or log onto the website directly by typing the URL into the address bar • Don’t cut and paste the link from the message into your Internet browser – the phisers can redirect you to a different site

  12. How to stop the bad guys • 3. Avoid filling out forms in email messages that ask for personal financial information. • Phishers make very good fake forms. • Only communicate personal financial information via a secure website or the telephone.

  13. 4. Don’t email personal or financial information. • Email is not a secure method of transmitting personal information • No one indicator is foolproof • Some phishers have forged security icons like the lock icon on an order form

  14. 5. Always ensure that you're using a secure website when submitting credit card or other sensitive information via your Web browser. • Check the beginning of the Web address in your browsers address bar • It should begin with "https://" rather than just "http://".

  15. 6. When shopping for an item on the Internet • Be sure the site is secure (https: instead of http) before entering personal financial information!

  16. Works Cited Chait, Jennifer. “Cyberbullying Statistics.” lovetoknow. Web. 9 Sept. 2009 <http://safety.lovetoknow.com>. Lopez, Maribel D. “Online Teens Are Not Immune To Phishing.” FORRESTER. Web. 13 Sept. 2009 <http://www.forrester.com>. Make A Difference For Kids, Inc. “Cyberbullying.” Make A Difference For Kids. Web. 9 Sept. 2009 <http://www.makeadifferenceforkids.org>. National Crime Prevention Council. “Teens and Cyberbullying.” NCPC. Web. 9 Sept. 2009 <http://www.ncpc.org>. “Phishing Scams – 12 Ways to Stop Them.” Tweakspeed. Web. 16 Sept. 2009 <http://www.tweakspeed.com>.

More Related