SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Cyber Safety, Cyber Ethics and
       Cyber Security




  Presented by Dr. Julia VanderMolen
Today’s World
• Full of …
  – wonder
  – fun
  – scary places
  – scary people
• Need to stay safe even when having fun
C3
• Cyber Safety
• Cyber Ethics
• Cyber Security




• Created by the National Cyber Security
  Alliance in Washington, DC
Cyber Safety
• Responsible rules and behaviors designed
  to keep individuals safe whenever
  connected to the Internet
• Ask student what are some examples of
  “safety rules” that parents ask them to
  follow while using the Internet
Cyber Safety Terms
•   Privacy
•   Children’s Online Privacy Protection Act (COPPA)
•   Cyber Safety Contract
•   C3 Strategy
     – The three key components all Internet users should
       understand and promise to use whenever they go
       online so keep themselves, others, and their computer
       safe!
         • Cyber Security
         • Cyber Safety
         • Cyber Ethics
Cyber Ethics
• Informal code of positive conduct used
  whenever someone is using the Internet
• “Doing the right thing even when no one is
  looking or watching”
• Ask students of wise and poor Internet
  use choices and discuss
• What are some good strategies for being a
  good digital citizen who behaves ethically
  online.
Cyber Ethics Terms
•   Cyber Smart Citizen
•   Copyright Laws
•   Illegal Downloads
•   Netiquette
•   Digital Citizenship
Cyber Security
• The protection of information and computer
  systems and networks while connected to the
  Internet
• Common strategies that people use to protect
  their computer and personal information
   –   Antivirus
   –   Firewalls
   –   Malware protection
   –   Never give out personal information
   –   Always use a secure site when doing any
       transactions
• List some security tips that people should know
Cyber Security Terms
•   Adware
•   Anti-virus software
•   Browser hijacker
•   Exposure
“WWW Decision Tool”
• Decision checklist to help reinforce
  strategies to behave responsibly and
  remain safe and secure during all Internet
  activities
  – W – Who is asking for this personal
    information?
  – W – What information is being requested?
  – W – Why do they need this personal
    information?
Terms that to know
• Cyber Ethics
• Cyber Security
• Cyber Safety
National Cyber Security Alliance
              (NCSA)
• A Washington DC based national non-profit
  organization that collaborates with the federal
  government, corporate, non-profit and academic
  sectors, to create a culture of cyber security and
  safety awareness by providing the knowledge
  and tools necessary to prevent cyber crime and
  attacks to ensure that everyone remains safe
  while online.
  www.staysafeonline.org
Let’s do this ourselves
•   Break into groups
•   Each group will have a scenario to read and evaluate
•   Write down your findings
•   Report back to the group
•   Open ended discussion
Additional Sources
• NCSA
  (www.usatodayeducate.com/wordpress/i
  ndex.php/technology-syber-security
  – Cyber security
  – NCSA has teamed up with USA Today
    Education Foundation and the Department of
    Homeland Security to develop four lesson
    plans using recent news stories about cyber
    security issues. These lesson plans are
    targeted to 8th through 12th grade
Additional Resources
• CyberSmart! (www.cybersmart.org)
  – Safety and Security Online
  – Manners, Bullying and Ethics
  – The free CyberSmart! Student Curriculum
    empowers students to use the Internet safely,
    responsibly, and effectively. The free CyberSmart!
    Educator Toolbar puts 21st century skills into
    practice every day, with just-in-time 24/7 access
    to annotated essential resources to support
    student learning.
Additional Resources
• Department of Justice
  (www.cybercrime.gov/rules/lessonplan
  1.htm)
  – The Department of Justice has developed a
    kids page focused on lesson plans for
    elementary and middle school children
Additional resources
• IKEEPSAFE (www.ikeepsafe.org)
  – Internet Keep Safe Coalition – Faux Paw the Techno Cat
  – Internet Safety basics
  – How to handle cyber-bullying
  – Balancing real life with screen time
  – The risks and dangers of downloading
  – The Faux Paw® curriculum is based on research from
    Harvard’s Center on Media and Child Health and
    created in partnership with the iKeepSafe Global
    Research Team, Penn State University Department of
    Education, and the University of Maryland.
  – Most iKeepSafe resources are available for free
    download
Additional Resources
• i-Safe (www.isafe.org)
  –   Personal safety
  –   Predator Identification
  –   Intellectual Property
  –   Cyber Citizenship
  –   Cyber Bullying
  –   i-Safe offers internet safety curriculum for
      grades K-8 and webcasts for grades 9. Lessons
      are broken down by grades (K-8) and each
      grade’s lesson focuses on a different topic.
Additional resources
• James Madison University
  (www.jmu.edu/iiia/cybercitz)
  – A guide to responsible technology use
  – Safety
  – Security
  – Ethics
Additional resources
• NetSmartz Workship (www.netsmartz.org)
  – Internet Safety
  – Cyber Bullying
  – NetSmartz offers free, multimedia Internet
    safety presentations for use with children of
    all ages and adults. Resources include a Back
    to School kit, videos, worksheets and activity
    cards on online safety, texting, and
    cyberbullying. The NetSmartz Workshop is an
    interactive, educational safety resource from
    the National Center for Missing and Exploited
    Children® (NCMEC) and Boys & Girls Clubs of
    America (BGCA).
Additional Resources
• Play It CyberSafe
  (www.playitcybersafe.com)
  – Cyber ethics
  – Cyber crime
  – The Business Software Alliance has
    developed a web site that teaches how to
    prevent cyber crime through knowledge of
    the law, their rights, and how to avoid
    misuse of the Internet.
Additional Resources
• WebWise Kids (www.webwisekids.org)
   –   Online safety
   –   Cyber security
   –   Spyware
   –   Bullying
   –   Ethics
   –   Social Networking
   –   E-mail
   –   Cell phone dangers
   –   Emerging technology
   –   Chat rooms and instant messaging safety
   –   Personal website Danger Zones
   –   Web Wise Kids is a unique organization that offers fun, challenging
       and interactive simulations based on real-life criminal cases. Each
       program has been designed specifically for use with young people
       in classrooms and computer labs (special version of the programs
       are also available for home use)

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber security-presentation
Cyber security-presentationCyber security-presentation
Cyber security-presentation
 
Krishna cyber safety
Krishna cyber safetyKrishna cyber safety
Krishna cyber safety
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 

Andere mochten auch

Copyright and ethics in relation to the internet
Copyright and ethics in relation to the internetCopyright and ethics in relation to the internet
Copyright and ethics in relation to the internetPenni Coon
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Adwiteeya Agrawal
 
BTree, Data Structures
BTree, Data StructuresBTree, Data Structures
BTree, Data StructuresJibrael Jos
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in EducationTyrone Grandison
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 

Andere mochten auch (20)

Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Copyright and ethics in relation to the internet
Copyright and ethics in relation to the internetCopyright and ethics in relation to the internet
Copyright and ethics in relation to the internet
 
Wireless security
Wireless securityWireless security
Wireless security
 
M tech2
M tech2M tech2
M tech2
 
Design
DesignDesign
Design
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
BTree, Data Structures
BTree, Data StructuresBTree, Data Structures
BTree, Data Structures
 
B tree
B treeB tree
B tree
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Encryption
EncryptionEncryption
Encryption
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 

Ähnlich wie C3 and digital citizenship

Cybersafety
Cybersafety Cybersafety
Cybersafety Sue Noor
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesStephen Cobb
 
Etl523 pres jj jarick
Etl523 pres jj jarickEtl523 pres jj jarick
Etl523 pres jj jarickjamesjarick
 
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyCTIC Technology Centre
 
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCourse Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCengage Learning
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentationSarah Sell
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 
Promoting and Modeling Digital Citizenship and Responsibility
 Promoting and Modeling Digital Citizenship and Responsibility Promoting and Modeling Digital Citizenship and Responsibility
Promoting and Modeling Digital Citizenship and ResponsibilityE Robertson
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementaryemilyensign
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Promoting and modeling digital citizenship and responsibility no wf
 Promoting and modeling digital citizenship and responsibility no wf Promoting and modeling digital citizenship and responsibility no wf
Promoting and modeling digital citizenship and responsibility no wfE Robertson
 
ICT and young people... the road ahead
ICT and young people... the road aheadICT and young people... the road ahead
ICT and young people... the road aheadCTIC Technology Centre
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
Esafety in the curriculum October 2014
Esafety in the curriculum October 2014Esafety in the curriculum October 2014
Esafety in the curriculum October 2014bellla33
 
Safer Internet Day 2023 Know Theme, History, Significance..docx
Safer Internet Day 2023 Know Theme, History, Significance..docxSafer Internet Day 2023 Know Theme, History, Significance..docx
Safer Internet Day 2023 Know Theme, History, Significance..docxSujeet Yadav
 

Ähnlich wie C3 and digital citizenship (20)

Cybersafety
Cybersafety Cybersafety
Cybersafety
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
Etl523 pres jj jarick
Etl523 pres jj jarickEtl523 pres jj jarick
Etl523 pres jj jarick
 
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
 
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCourse Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
 
Apps and Young Users.pptx
Apps and Young Users.pptxApps and Young Users.pptx
Apps and Young Users.pptx
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Promoting and Modeling Digital Citizenship and Responsibility
 Promoting and Modeling Digital Citizenship and Responsibility Promoting and Modeling Digital Citizenship and Responsibility
Promoting and Modeling Digital Citizenship and Responsibility
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
DeepNines CIPA Whitepaper
DeepNines CIPA WhitepaperDeepNines CIPA Whitepaper
DeepNines CIPA Whitepaper
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Promoting and modeling digital citizenship and responsibility no wf
 Promoting and modeling digital citizenship and responsibility no wf Promoting and modeling digital citizenship and responsibility no wf
Promoting and modeling digital citizenship and responsibility no wf
 
ICT and young people... the road ahead
ICT and young people... the road aheadICT and young people... the road ahead
ICT and young people... the road ahead
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Common sense ppt
Common sense pptCommon sense ppt
Common sense ppt
 
Esafety in the curriculum October 2014
Esafety in the curriculum October 2014Esafety in the curriculum October 2014
Esafety in the curriculum October 2014
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Safer Internet Day 2023 Know Theme, History, Significance..docx
Safer Internet Day 2023 Know Theme, History, Significance..docxSafer Internet Day 2023 Know Theme, History, Significance..docx
Safer Internet Day 2023 Know Theme, History, Significance..docx
 

Mehr von JuliaHoesingVanderMolen

Mehr von JuliaHoesingVanderMolen (8)

BITS Session Tools for Creating Audio Lecture
BITS Session Tools for Creating Audio LectureBITS Session Tools for Creating Audio Lecture
BITS Session Tools for Creating Audio Lecture
 
What is the Info on Infographics?
What is the Info on Infographics?What is the Info on Infographics?
What is the Info on Infographics?
 
Flipped Classroom for the Sciences
Flipped Classroom for the SciencesFlipped Classroom for the Sciences
Flipped Classroom for the Sciences
 
MACUL 2013 Bloom’s Taxonomy is Blooming Technology
MACUL 2013 Bloom’s Taxonomy is Blooming TechnologyMACUL 2013 Bloom’s Taxonomy is Blooming Technology
MACUL 2013 Bloom’s Taxonomy is Blooming Technology
 
Blooming with Technology
Blooming with TechnologyBlooming with Technology
Blooming with Technology
 
Story Telling in the Clouds
Story Telling in the CloudsStory Telling in the Clouds
Story Telling in the Clouds
 
What’s a Rubric?
What’s a Rubric?What’s a Rubric?
What’s a Rubric?
 
Adding audio lectures
Adding audio lecturesAdding audio lectures
Adding audio lectures
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Kürzlich hochgeladen (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

C3 and digital citizenship

  • 1. Cyber Safety, Cyber Ethics and Cyber Security Presented by Dr. Julia VanderMolen
  • 2. Today’s World • Full of … – wonder – fun – scary places – scary people • Need to stay safe even when having fun
  • 3. C3 • Cyber Safety • Cyber Ethics • Cyber Security • Created by the National Cyber Security Alliance in Washington, DC
  • 4. Cyber Safety • Responsible rules and behaviors designed to keep individuals safe whenever connected to the Internet • Ask student what are some examples of “safety rules” that parents ask them to follow while using the Internet
  • 5. Cyber Safety Terms • Privacy • Children’s Online Privacy Protection Act (COPPA) • Cyber Safety Contract • C3 Strategy – The three key components all Internet users should understand and promise to use whenever they go online so keep themselves, others, and their computer safe! • Cyber Security • Cyber Safety • Cyber Ethics
  • 6. Cyber Ethics • Informal code of positive conduct used whenever someone is using the Internet • “Doing the right thing even when no one is looking or watching” • Ask students of wise and poor Internet use choices and discuss • What are some good strategies for being a good digital citizen who behaves ethically online.
  • 7. Cyber Ethics Terms • Cyber Smart Citizen • Copyright Laws • Illegal Downloads • Netiquette • Digital Citizenship
  • 8. Cyber Security • The protection of information and computer systems and networks while connected to the Internet • Common strategies that people use to protect their computer and personal information – Antivirus – Firewalls – Malware protection – Never give out personal information – Always use a secure site when doing any transactions • List some security tips that people should know
  • 9. Cyber Security Terms • Adware • Anti-virus software • Browser hijacker • Exposure
  • 10. “WWW Decision Tool” • Decision checklist to help reinforce strategies to behave responsibly and remain safe and secure during all Internet activities – W – Who is asking for this personal information? – W – What information is being requested? – W – Why do they need this personal information?
  • 11. Terms that to know • Cyber Ethics • Cyber Security • Cyber Safety
  • 12. National Cyber Security Alliance (NCSA) • A Washington DC based national non-profit organization that collaborates with the federal government, corporate, non-profit and academic sectors, to create a culture of cyber security and safety awareness by providing the knowledge and tools necessary to prevent cyber crime and attacks to ensure that everyone remains safe while online. www.staysafeonline.org
  • 13. Let’s do this ourselves • Break into groups • Each group will have a scenario to read and evaluate • Write down your findings • Report back to the group • Open ended discussion
  • 14. Additional Sources • NCSA (www.usatodayeducate.com/wordpress/i ndex.php/technology-syber-security – Cyber security – NCSA has teamed up with USA Today Education Foundation and the Department of Homeland Security to develop four lesson plans using recent news stories about cyber security issues. These lesson plans are targeted to 8th through 12th grade
  • 15. Additional Resources • CyberSmart! (www.cybersmart.org) – Safety and Security Online – Manners, Bullying and Ethics – The free CyberSmart! Student Curriculum empowers students to use the Internet safely, responsibly, and effectively. The free CyberSmart! Educator Toolbar puts 21st century skills into practice every day, with just-in-time 24/7 access to annotated essential resources to support student learning.
  • 16. Additional Resources • Department of Justice (www.cybercrime.gov/rules/lessonplan 1.htm) – The Department of Justice has developed a kids page focused on lesson plans for elementary and middle school children
  • 17. Additional resources • IKEEPSAFE (www.ikeepsafe.org) – Internet Keep Safe Coalition – Faux Paw the Techno Cat – Internet Safety basics – How to handle cyber-bullying – Balancing real life with screen time – The risks and dangers of downloading – The Faux Paw® curriculum is based on research from Harvard’s Center on Media and Child Health and created in partnership with the iKeepSafe Global Research Team, Penn State University Department of Education, and the University of Maryland. – Most iKeepSafe resources are available for free download
  • 18. Additional Resources • i-Safe (www.isafe.org) – Personal safety – Predator Identification – Intellectual Property – Cyber Citizenship – Cyber Bullying – i-Safe offers internet safety curriculum for grades K-8 and webcasts for grades 9. Lessons are broken down by grades (K-8) and each grade’s lesson focuses on a different topic.
  • 19. Additional resources • James Madison University (www.jmu.edu/iiia/cybercitz) – A guide to responsible technology use – Safety – Security – Ethics
  • 20. Additional resources • NetSmartz Workship (www.netsmartz.org) – Internet Safety – Cyber Bullying – NetSmartz offers free, multimedia Internet safety presentations for use with children of all ages and adults. Resources include a Back to School kit, videos, worksheets and activity cards on online safety, texting, and cyberbullying. The NetSmartz Workshop is an interactive, educational safety resource from the National Center for Missing and Exploited Children® (NCMEC) and Boys & Girls Clubs of America (BGCA).
  • 21. Additional Resources • Play It CyberSafe (www.playitcybersafe.com) – Cyber ethics – Cyber crime – The Business Software Alliance has developed a web site that teaches how to prevent cyber crime through knowledge of the law, their rights, and how to avoid misuse of the Internet.
  • 22. Additional Resources • WebWise Kids (www.webwisekids.org) – Online safety – Cyber security – Spyware – Bullying – Ethics – Social Networking – E-mail – Cell phone dangers – Emerging technology – Chat rooms and instant messaging safety – Personal website Danger Zones – Web Wise Kids is a unique organization that offers fun, challenging and interactive simulations based on real-life criminal cases. Each program has been designed specifically for use with young people in classrooms and computer labs (special version of the programs are also available for home use)

Hinweis der Redaktion

  1. PrivacyIn relation to internet use this refers to personal information you are entitled to protect from others accessing online.Social networking sites have special “privacy controls” that all children should set to high so that information they post is only by those they wish to share itChildren’s Online Privacy Protection Act (COPPA)A national law that protects the privacy of children under the age of 13 by requesting parental consent for the collection or use of any personal information of the usersCyber Safety ContractA contract you design with your parents or guardian – AND COMMIT TO FOLLOW – that outlines specific rules and guidelines for computer use in the home, at school, or at another locationC3 StrategyThe three key components all Internet users should understand and promise to use whenever they go online so keep themselves, others, and their computer safe!Cyber SecurityCyber SafetyCyber Ethics
  2. Cyber Smart CitizenA computer user who follows all of the C3 Concepts and commits to always acting safely, ethically, and responsibly while using the InternetCopyright LawsLaws that protect the online material of a creator or composer from a computer user illegally downloading, copying, scanning or otherwise distributing their material without prior approval or consentIllegal DownloadsInformation (most commonly songs or music) downloaded by an individual either for themselves or to share with others that is not authorized by the original creator or composer’s license.NetiquetteThe informal rules of Internet courtesy, enforced exclusively by other internet users.Digital Citizenship
  3. AdwareA type of software that often comes with free downloads. Some adware displays ads on your computer, while some monitors your computer use (including websites visited) and displays targeted ads based on your use.Anti-virus softwareProtects your computer from viruses that can destroy your data, slow your computer’s performance, cause a crash, or even allow spammers to send email through your account.Browser hijackerA common spyware program that changes your web browser’s home page without the user’s knowledge, even if you change it backExposureWhen sensitive information on your computer is released to someone without authorization