SlideShare a Scribd company logo
1 of 35
Finally brothers, whatever is
true, whatever is noble, whatever is
right, whatever is pure, whatever is
lovely, whatever is admirable – if there
is anything excellent or worthy of
praise, think on these things.

Phil. 4:8
Physical Safety –
      freedom from physical harm
Psychological Safety –
     freedom from cruelty, harassment,
     exposure to potentially disturbing material
Reputational Safety –
     freedom from unwanted social or
     professional consequences that could affect a
     career
Identity or Property Safety –
     freedom from theft of identity and property
 It can be Public and Permanent
 You have no control who sees it and what
  they do with it
 Information can be copied, pasted and
  modified
 It may not be received in the way it was
  intended
    Unlike face to face when tone,
    expression give clues, there are none
    with the net
   Stranger danger
   Viewing inappropriate content
   Posting inappropriate content
   Cyber-bullying
   Privacy and reputation
   Online addiction
   Online inappropriate activities
   Device security
 Like it or not, personal information sites
 continue to be more accurate, dig deeper and
 reveal more and more of your digital life

 These entities gather information about
 you, your digital activities and your contacts
 Lost in the rapid progress of
 technology is a consistent, safe code
 of use

 Most digital users do not realize how
 quickly their online activities can be
 public and permanent
 Poor digital decision-making starts in
  the mind of the user
 Abusing technology, such as sexting
  and cyber-bullying are the effects of
  poor digital choices
 There will be consequences that
  usually creates a chain reaction that
  is very difficult to take back
 Development of a “Digital Consciousness”
 Golden Rule for the 21st century
“Develop and maintain a mindset that you are prepared
for your digital actions to be
            “public and permanent”

 Realize that you must operate powerful digital tools
 and technologies with the same preventative mindset
 that you would use for other things like fire or the
 automobile

 This mindset would have you evaluate risk vs. reward
                    before you post information
 Report: Teen gets 15 years for Facebook
    blackmail
   Nude picture on phone lost in McDonald’s
    ends up online
   Sexting in Maryland school gets student
    expelled
   Teen sentenced to 12 months in jail for sexual
    bullying on Facebook
   Weiner resigns after sexting scandal
 Provide you with information
 necessary to understand that you are
 accountable and responsible for
 maintaining a Digital Consciousness
Concerns:
 People may not be who they say they are so have a
  parent approve anyone you meet online before you
  talk to them
 If the conversation turns to sex or starts to make
  you uncomfortable, get off immediately
 If someone tries to meet you, contact an adult
  immediately
 Never meet up with someone you first meet online
       If you must take a parent or group
      of friends and meet in a very public place
 Your online life is a reflection of you
 Insist that you and people around
  you are treated respectfully
 Respect other people’s digital
  property
 Stuff you created belongs to you and
  you should control what is done with
  it
 Be original or cite your sources
 Have your work reflect excellence
 Protect your passwords
 Create secure passwords
 Use phrases that are easy to
    remember but hard to guess
 Don’t sue the same password for
    multiple sites
 Make sure that you have security
  software
 Be careful of WiFi hotspots – hotel
  lobbies, airports, etc.
 Don’t download anything from a
  source you don’t trust
 Always back up your data
 It’s up to you to control what other
  people know about you
 If it’s private, don’t post it online, even
  email
 Anything can be copied, pasted and
  forwarded
 Once it is posted, you cannot take it
  back
 Don’t post information that could get
  you in trouble now or in the future
 Do not give out personal information
Name                 Where you live
Phone number         Birthdate
Home Address         School/church

 You can give out impersonal
 information
Sports teams you like      favorite
movies
(Other likes and dislikes)
 Cyber-bullying – the use of technology to harm
  another person in a deliberate, repeated and
  hostile manner
 Cyber-Mobbing – a form of cyber bullying
  involving a group sharing the same malicious
  mindset or intent to harm
 Flaming – hostile interaction between internet
  users usually in a internet forum or chat room
 Cyber-stalking – using electronic means to
  gather information for the purpose of harass an
  individual or group; false accusations, threats
 Sexting – The act of sending an image, video,
    text, etc. of a sexual nature to another
    individual (digital), smart phone, etc.
   Outing – Publically revealing personal
    information without the person’s consent
   Impersonation – pretending to be another
    person in order to deceive
   Phishing – attempting to acquire sensitive
    information such as usernames, passwords,
    credit cart information through faking
    authenticity
   Malware – deliberate attempt to send a virus
    crippling the computer’s ability to call up
    data
 It is against the law
 It could haunt you later
 Don’t let provocative pictures be
  made of you
 Don’t send them online, even to
  someone you care about
 If you get them, don’t share them
 Don’t carry them around in your
  phone
 Bullying has been around a long time
  but cyber-bullying is a recent
  phenomenon
 Bullies can be invisible – victims don’t
  know who the bully is or why they are
  being targeted
 Viral – hurtful actions of the bully can
  spread to a large group of people, the
  school, the city,.. The perception is
  everyone is in on the joke
 Don’t respond or retaliate
 Talk to someone you trust especially
  an adult
 Save the evidence; it could be a police
  matter
 Be a friend not a bystander
 Ancomm
I want you to be wise about what is
good and innocent about what is evil.
Romans 16:10

With great power comes great responsibility.
Ben Parker – Spiderman
 Sources:
 “Social media snares”
 Safe surfing kids
 Safe kids.com
1. Which screen name is best to have?
    A. cheergirl9393
    B. chrisp1990
    C. sandysmith999
    D. horseluvr01
    E. tphscheergrl
2. While surfing the internet, you get an error
  message from your internet provider; it says
  that it will delete your account unless you
  type in your password again, should you send
  the information?
    A. Yes
    B. No

3. If someone online tells you they are a
  sophomore in high school, and they are taking
  Driver’s Education classes, they are probably
  how old?
    A. 14               B. 15
    C. 16               D. No way to tell
8. While surfing the internet, you see a
   website that makes you feel
   uncomfortable. What should you do?
    A. Write down its name and don’t go
       there again
    B. Tell you friends so that they can
       avoid it to
    C. Tell a parent, guardian or teacher
    D. Shut down the computer
1. I HAVE A PERSONAL SOCIAL WEB
PAGE (Facebook Linked in, etc)
(yes is 10 points)
2. I have posted my personal phone or
   cell number on my social website or
   chat room.
(yes is 10 points)
3. I have posted my home address on
   my social website.
(yes is 10 points)
4. I have posted my school/work name
   on my social website.
(yes – 10 points)
5. I post current and future status
   updates (going on vacation, going to
   the mall, etc).
(yes – 10 points)
6. My understanding is that deleting a
   pictureor test file from my Digital
   Tools removes them permanently.
(yes – 10 points)
7. I have anti-virus and anti-spyware
   programs installed on my computer.
(no – 10 points)
8. I run my anti-virus and anti-
   spyware programs daily.
(no – 10 points)
9. In the digital world, I feel that I am
   anonymous.
(yes – 20 points)
10. My social website passsword is
   truly able to keep my contents
   private.
(yes – 10 points)
11. I have taken digital pictures/video
   of myself which I would not feel
   comfortable showing my parents.
(yes – 50 points)
12. I shared pictures, video, texts about
   myself that I would not show my
   parents.
(yes – 100 points)
13. I so and say things in front of my
   webcam that I would not show my
   parents.
(yes – 50 points)
14. I have, for what ever
  reason, harassed or bullied others
  through digital technology.
(yes – 100 points)

1-30appear to be using digital
technology responsibly; chances are
low of being involved in an issue
40 – 120 moderately high risk of
identity theft or exploitation
130 – high risk to face a severe or
dangerous situation

More Related Content

What's hot

Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For EducatorsMaria Petropulos
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for childrenAvanzo net
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Floreslorrflores
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber securitydivyanigarg2
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 

What's hot (20)

CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Viewers also liked

Cyber safety
Cyber safetyCyber safety
Cyber safetysmartins7
 
Impact cyber safety revised
Impact cyber safety revisedImpact cyber safety revised
Impact cyber safety revisedlibraryreeder
 
Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety Mark Woolley
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingMatt Britland
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 

Viewers also liked (11)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Impact cyber safety revised
Impact cyber safety revisedImpact cyber safety revised
Impact cyber safety revised
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Comp 107 cep 8
Comp 107 cep 8Comp 107 cep 8
Comp 107 cep 8
 
Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 

Similar to Cyber-Safety and Digital Citizenship

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptxDIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptxvanessacabang2
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parentssirchriss
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safelytimryan7
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Quennith
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson planQuennith
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 

Similar to Cyber-Safety and Digital Citizenship (20)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptxDIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson plan
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 

Recently uploaded

Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 

Recently uploaded (20)

INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 

Cyber-Safety and Digital Citizenship

  • 1.
  • 2. Finally brothers, whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable – if there is anything excellent or worthy of praise, think on these things. Phil. 4:8
  • 3. Physical Safety – freedom from physical harm Psychological Safety – freedom from cruelty, harassment, exposure to potentially disturbing material Reputational Safety – freedom from unwanted social or professional consequences that could affect a career Identity or Property Safety – freedom from theft of identity and property
  • 4.  It can be Public and Permanent  You have no control who sees it and what they do with it  Information can be copied, pasted and modified  It may not be received in the way it was intended Unlike face to face when tone, expression give clues, there are none with the net
  • 5. Stranger danger  Viewing inappropriate content  Posting inappropriate content  Cyber-bullying  Privacy and reputation  Online addiction  Online inappropriate activities  Device security
  • 6.  Like it or not, personal information sites continue to be more accurate, dig deeper and reveal more and more of your digital life  These entities gather information about you, your digital activities and your contacts
  • 7.  Lost in the rapid progress of technology is a consistent, safe code of use  Most digital users do not realize how quickly their online activities can be public and permanent
  • 8.  Poor digital decision-making starts in the mind of the user  Abusing technology, such as sexting and cyber-bullying are the effects of poor digital choices  There will be consequences that usually creates a chain reaction that is very difficult to take back
  • 9.  Development of a “Digital Consciousness”  Golden Rule for the 21st century “Develop and maintain a mindset that you are prepared for your digital actions to be “public and permanent”  Realize that you must operate powerful digital tools and technologies with the same preventative mindset that you would use for other things like fire or the automobile  This mindset would have you evaluate risk vs. reward before you post information
  • 10.  Report: Teen gets 15 years for Facebook blackmail  Nude picture on phone lost in McDonald’s ends up online  Sexting in Maryland school gets student expelled  Teen sentenced to 12 months in jail for sexual bullying on Facebook  Weiner resigns after sexting scandal
  • 11.  Provide you with information necessary to understand that you are accountable and responsible for maintaining a Digital Consciousness
  • 12. Concerns:  People may not be who they say they are so have a parent approve anyone you meet online before you talk to them  If the conversation turns to sex or starts to make you uncomfortable, get off immediately  If someone tries to meet you, contact an adult immediately  Never meet up with someone you first meet online If you must take a parent or group of friends and meet in a very public place
  • 13.  Your online life is a reflection of you  Insist that you and people around you are treated respectfully  Respect other people’s digital property  Stuff you created belongs to you and you should control what is done with it  Be original or cite your sources  Have your work reflect excellence
  • 14.  Protect your passwords  Create secure passwords  Use phrases that are easy to remember but hard to guess  Don’t sue the same password for multiple sites
  • 15.  Make sure that you have security software  Be careful of WiFi hotspots – hotel lobbies, airports, etc.  Don’t download anything from a source you don’t trust  Always back up your data
  • 16.  It’s up to you to control what other people know about you  If it’s private, don’t post it online, even email  Anything can be copied, pasted and forwarded  Once it is posted, you cannot take it back  Don’t post information that could get you in trouble now or in the future
  • 17.  Do not give out personal information Name Where you live Phone number Birthdate Home Address School/church  You can give out impersonal information Sports teams you like favorite movies (Other likes and dislikes)
  • 18.  Cyber-bullying – the use of technology to harm another person in a deliberate, repeated and hostile manner  Cyber-Mobbing – a form of cyber bullying involving a group sharing the same malicious mindset or intent to harm  Flaming – hostile interaction between internet users usually in a internet forum or chat room  Cyber-stalking – using electronic means to gather information for the purpose of harass an individual or group; false accusations, threats
  • 19.  Sexting – The act of sending an image, video, text, etc. of a sexual nature to another individual (digital), smart phone, etc.  Outing – Publically revealing personal information without the person’s consent  Impersonation – pretending to be another person in order to deceive  Phishing – attempting to acquire sensitive information such as usernames, passwords, credit cart information through faking authenticity  Malware – deliberate attempt to send a virus crippling the computer’s ability to call up data
  • 20.  It is against the law  It could haunt you later  Don’t let provocative pictures be made of you  Don’t send them online, even to someone you care about  If you get them, don’t share them  Don’t carry them around in your phone
  • 21.  Bullying has been around a long time but cyber-bullying is a recent phenomenon  Bullies can be invisible – victims don’t know who the bully is or why they are being targeted  Viral – hurtful actions of the bully can spread to a large group of people, the school, the city,.. The perception is everyone is in on the joke
  • 22.  Don’t respond or retaliate  Talk to someone you trust especially an adult  Save the evidence; it could be a police matter  Be a friend not a bystander  Ancomm
  • 23. I want you to be wise about what is good and innocent about what is evil. Romans 16:10 With great power comes great responsibility. Ben Parker – Spiderman
  • 24.  Sources:  “Social media snares”  Safe surfing kids  Safe kids.com
  • 25. 1. Which screen name is best to have? A. cheergirl9393 B. chrisp1990 C. sandysmith999 D. horseluvr01 E. tphscheergrl
  • 26. 2. While surfing the internet, you get an error message from your internet provider; it says that it will delete your account unless you type in your password again, should you send the information? A. Yes B. No 3. If someone online tells you they are a sophomore in high school, and they are taking Driver’s Education classes, they are probably how old? A. 14 B. 15 C. 16 D. No way to tell
  • 27.
  • 28.
  • 29.
  • 30. 8. While surfing the internet, you see a website that makes you feel uncomfortable. What should you do? A. Write down its name and don’t go there again B. Tell you friends so that they can avoid it to C. Tell a parent, guardian or teacher D. Shut down the computer
  • 31. 1. I HAVE A PERSONAL SOCIAL WEB PAGE (Facebook Linked in, etc) (yes is 10 points) 2. I have posted my personal phone or cell number on my social website or chat room. (yes is 10 points) 3. I have posted my home address on my social website. (yes is 10 points)
  • 32. 4. I have posted my school/work name on my social website. (yes – 10 points) 5. I post current and future status updates (going on vacation, going to the mall, etc). (yes – 10 points) 6. My understanding is that deleting a pictureor test file from my Digital Tools removes them permanently. (yes – 10 points)
  • 33. 7. I have anti-virus and anti-spyware programs installed on my computer. (no – 10 points) 8. I run my anti-virus and anti- spyware programs daily. (no – 10 points) 9. In the digital world, I feel that I am anonymous. (yes – 20 points) 10. My social website passsword is truly able to keep my contents private. (yes – 10 points)
  • 34. 11. I have taken digital pictures/video of myself which I would not feel comfortable showing my parents. (yes – 50 points) 12. I shared pictures, video, texts about myself that I would not show my parents. (yes – 100 points) 13. I so and say things in front of my webcam that I would not show my parents. (yes – 50 points)
  • 35. 14. I have, for what ever reason, harassed or bullied others through digital technology. (yes – 100 points) 1-30appear to be using digital technology responsibly; chances are low of being involved in an issue 40 – 120 moderately high risk of identity theft or exploitation 130 – high risk to face a severe or dangerous situation