SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Cyberspace   slide show
Access to film,                           Keeping in
 radio , TV, e-                           touch with
    books                                 family and
                     Social media
                                            friends



                                       Search
     Entertainment
                         WWW           engines




You can access                           Discovering
   the www on          Accessibility         new
     laptops,                            information
 i-pad, phones,
Brainstorm the risks involved
   with uploading personal
information and surfing on the
             net.
   Social networking has become one of the fastest
    forms of communication, with the easy access to My-
    space, Face book, instant messaging, e-mail and
    blogs, these technologies are the main targets for
    cyber bullying.
   Majority of your students have access to at least one
    of these social networks, and may be exposed to the
    risks of cyber bullying.
   Expose students to the risks and ensure thy have a
    variety of avenues to take if they fall victim of cyber
    bullying.

   Cyber bullying Alert
   Class discussions

   Guest speakers (police, welfare)

   Interactive activities

   School policy on internet security

   Create opportunities to speak out
How much
What information    social media
have you got on     do you use?
the World Wide
Web?                               Who has
                                   access to
                                   your personal
                                   details?




Are you a good role model for cyber
         safety and security?
Get
                           involved




Resources and links to sites on educator resources page.
http://www.cybersmart.gov.au/



http://www.netsmartz.org/Educators


                http://www.staysmartonline.
                gov.au/schools_and_teach
                ers

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 

Was ist angesagt? (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Cyber law
Cyber lawCyber law
Cyber law
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Andere mochten auch

What’s In Cyberspace
What’s  In  CyberspaceWhat’s  In  Cyberspace
What’s In CyberspaceDaybreak Lit
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet DisputesTalwant Singh
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Web Meets World: Privacy and the Future of the Cloud
Web Meets World: Privacy and the Future of the CloudWeb Meets World: Privacy and the Future of the Cloud
Web Meets World: Privacy and the Future of the Cloudgnat
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceSecureDocs
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivismBilal Ali
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
 
Philosophy Of Cyberspace
Philosophy Of CyberspacePhilosophy Of Cyberspace
Philosophy Of CyberspaceAmnon Carmel
 
Activity 10 timeline of the history of the internet
Activity 10 timeline of the history of the internetActivity 10 timeline of the history of the internet
Activity 10 timeline of the history of the internetjru28
 
Timeline to internet
Timeline to internetTimeline to internet
Timeline to internetRomanbelic911
 
Timeline History of the Internet
Timeline History of the InternetTimeline History of the Internet
Timeline History of the InternetAven Mercado
 
Impact of computers on Society
Impact of computers on SocietyImpact of computers on Society
Impact of computers on SocietyRamki M
 

Andere mochten auch (20)

Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
 
What’s In Cyberspace
What’s  In  CyberspaceWhat’s  In  Cyberspace
What’s In Cyberspace
 
Theory Cyberspace
Theory CyberspaceTheory Cyberspace
Theory Cyberspace
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Web Meets World: Privacy and the Future of the Cloud
Web Meets World: Privacy and the Future of the CloudWeb Meets World: Privacy and the Future of the Cloud
Web Meets World: Privacy and the Future of the Cloud
 
Social impact of computers
Social impact of computersSocial impact of computers
Social impact of computers
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Spreadable Media and consumption
Spreadable Media and consumptionSpreadable Media and consumption
Spreadable Media and consumption
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Philosophy Of Cyberspace
Philosophy Of CyberspacePhilosophy Of Cyberspace
Philosophy Of Cyberspace
 
Activity 10 timeline of the history of the internet
Activity 10 timeline of the history of the internetActivity 10 timeline of the history of the internet
Activity 10 timeline of the history of the internet
 
Timeline to internet
Timeline to internetTimeline to internet
Timeline to internet
 
Timeline History of the Internet
Timeline History of the InternetTimeline History of the Internet
Timeline History of the Internet
 
Impact of computers on Society
Impact of computers on SocietyImpact of computers on Society
Impact of computers on Society
 
Tv Programmes
Tv Programmes Tv Programmes
Tv Programmes
 

Ähnlich wie Cyberspace slide show

A 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseA 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseLouise Jones
 
Secure social networking
Secure social networkingSecure social networking
Secure social networkingOsaid To'meh
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHYaman Singhania
 
Digital Privacy & Safety in Remote Aboriginal Communities
Digital Privacy & Safety in Remote Aboriginal CommunitiesDigital Privacy & Safety in Remote Aboriginal Communities
Digital Privacy & Safety in Remote Aboriginal CommunitiesPatFreeman
 
Social networks in schools
Social networks in schoolsSocial networks in schools
Social networks in schoolsMichael Young
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyCTIC Technology Centre
 
Legal Risks & SNS - teens
Legal Risks & SNS - teensLegal Risks & SNS - teens
Legal Risks & SNS - teensKaren Keighery
 
Oman presentation revised
Oman presentation revisedOman presentation revised
Oman presentation revisedSudesh Sood
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Unit 2 Safe Internet Awareness
Unit 2 Safe Internet AwarenessUnit 2 Safe Internet Awareness
Unit 2 Safe Internet AwarenessManchester24
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010paul
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parentsamelialouise
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesFrances Harris
 

Ähnlich wie Cyberspace slide show (20)

A 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseA 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible Use
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Digital Privacy & Safety in Remote Aboriginal Communities
Digital Privacy & Safety in Remote Aboriginal CommunitiesDigital Privacy & Safety in Remote Aboriginal Communities
Digital Privacy & Safety in Remote Aboriginal Communities
 
CYP E-Safety
CYP E-SafetyCYP E-Safety
CYP E-Safety
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Social networks in schools
Social networks in schoolsSocial networks in schools
Social networks in schools
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and Safety
 
Legal Risks & SNS - teens
Legal Risks & SNS - teensLegal Risks & SNS - teens
Legal Risks & SNS - teens
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Oman presentation revised
Oman presentation revisedOman presentation revised
Oman presentation revised
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Mississippi State University Adams
Mississippi State University AdamsMississippi State University Adams
Mississippi State University Adams
 
Unit 2 Safe Internet Awareness
Unit 2 Safe Internet AwarenessUnit 2 Safe Internet Awareness
Unit 2 Safe Internet Awareness
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parents
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected Consequences
 

Kürzlich hochgeladen

Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationMJDuyan
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptxPractical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptxKatherine Villaluna
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxDr. Santhosh Kumar. N
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphNetziValdelomar1
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17Celine George
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and stepobaje godwin sunday
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 

Kürzlich hochgeladen (20)

Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive Education
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptxPractical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptx
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptx
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a Paragraph
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and step
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 

Cyberspace slide show

  • 2. Access to film, Keeping in radio , TV, e- touch with books family and Social media friends Search Entertainment WWW engines You can access Discovering the www on Accessibility new laptops, information i-pad, phones,
  • 3. Brainstorm the risks involved with uploading personal information and surfing on the net.
  • 4. Social networking has become one of the fastest forms of communication, with the easy access to My- space, Face book, instant messaging, e-mail and blogs, these technologies are the main targets for cyber bullying.  Majority of your students have access to at least one of these social networks, and may be exposed to the risks of cyber bullying.  Expose students to the risks and ensure thy have a variety of avenues to take if they fall victim of cyber bullying.  Cyber bullying Alert
  • 5. Class discussions  Guest speakers (police, welfare)  Interactive activities  School policy on internet security  Create opportunities to speak out
  • 6. How much What information social media have you got on do you use? the World Wide Web? Who has access to your personal details? Are you a good role model for cyber safety and security?
  • 7. Get involved Resources and links to sites on educator resources page.
  • 8. http://www.cybersmart.gov.au/ http://www.netsmartz.org/Educators http://www.staysmartonline. gov.au/schools_and_teach ers