SlideShare ist ein Scribd-Unternehmen logo
1 von 70
Learning to Connect and Properly Navigate the Web



                                          Cathleen Richardson
                                   Apple Distinguished Educator
                              New Media Educational Consultant
                                                Atlanta, Georgia
The Internet: “The Network of All Networks”
Nobody really owns it - It is a
global collection of networks,
both big and small.

These networks connect
together in many different ways
to form the single entity that we
know as the Internet.

In fact, the very name comes
from this idea of interconnected
networks.
What does this
 mean to me?
Statistics

 87% of teens aged 12 – 17 use the Internet.


 51% use the Internet daily.

                                                      200
 45% of teens have cell phones and 38% are texting.


 75% of online teens use instant messaging.
                                                            1
 81% of online teens play online games.
Understand the NET
an d possible risks to
you... they are REAL!
“Instill a sense of caution, not a sense of fear.”
Internet
 Safety
Introduction

    Online Relationships

    Keep Personal Information Private

    Protect Your Reputation

    Cyber Bullying

    Safety Tips
Online
Relationships
You may not know the truth about someone
you first meet online.
Time does not equal trust or knowing the
person.
You can be lied to or betrayed.
Warning Signs

 If someone tries to isolate you from your family or friends.

 Turn you against your parents.

 Make you keep secrets.

 Send inappropriate materials or talks about explicit subjects.

 Threaten you.
Beware when someone says...
 “Let’s go private.”

 “Where’s your computer in the house?”

 “I know someone who can get you a modeling job.”

 “Who’s your favorite band? Designer? Gear?

 “You seem sad. Tell me what’s bothering you.”

 “You are the love of my life.”

 “What’s your phone number?”

 “If you don’t…do what I ask, I’ll … tell your parents OR share your photos in a photo
 blog/Webcam directory/file-sharing network.
Never meet someone you first met online
Who is looking at you online?
DO NOT SAY ANYTHING ONLINE
THAT YOU WOULDN’T SAY OFFLINE.
Don’t give out personal information

  Never give out your personal identifying
  information or your families or friends, such
  as name, address, telephone number, and
  school name in any public areas or in email
  unless you are sure you know the person.
Use Privacy Settings
 Use the privacy settings
 such as “Friends Only”
 on any social
 networking site you are
 on.

 Only allow people you
 know in real life on your
 friends list.
Think before posting pictures


Consider if it is a picture you want
everyone to see, including your
parents, teachers, law enforcement
and college admission officers.
Remember that any picture you
upload to the Web can be
downloaded by anyone and be
copied or posted online FOREVER.
PUBLIC DOMAIN: KNOW YOUR COPYRIGHT LAWS
Sexting has real consequences
Check with your friends

Before posting pictures or information
about your friends, check with them first.
Always protect your privacy and theirs.
Check to see what your friends are posting
about you. If anything they have posted
about you makes you uncomfortable, ask
them to remove it.
Do not respond to offensive or embarrassing
  comments. Delete them and block that
 person from making additional comments.
Virtual Reality
Second Life
   Online 3D virtual world imagined and created by its Residents.




                                                                http://www.secondlife.com
Teen Second Life
Social Networking
Facebook and MySpace
  Facebook and MySpace are social utilities that connects you with the people around you.




                                                             http://www.facebook.com
10,000 offenders
  only 3% caught when reported
http://www.facebook.com
• Facebook has serious consequences

 • Loss of jobs

 • Expulsion from school

 • Reputation, credibility, self-worth
Surveys
You Tube
   YouTube is a video sharing website where users can upload, view and share video clips.




                                                               YouTube




                                                               http://www.youtube.com
Twitter
   Twitter is a free social networking and micro-blogging service that allows users to send "updates" to
   the Twitter web site, via the Twitter web site, short message service (SMS), instant messaging, or a
   third-party application such as Twitterrific or Facebook.




                                                                        http://www.twitter.com
Chat
Skype
  Skype is a software program that allows users to make telephone calls over the Internet. Budgets
                                                 Skype…talk to the world
  are tight. These are ways to take virtual field trips and also speak with experts.




                                                               http://www.skype.com
iChat A/V with built-in web cams
   iChat AV is an AOL Instant Messenger (AIM), .Mac, ICQ and XMPP client by Apple Inc. for their Mac
   OS X operating system.
Person on the other side can record you...take
what you say out of context.

Saved in the chat log
If a person unknown to you was speaking to
 you in your front yard, what would you do?

If you were communicating with the same
    stranger on-line, what would you do?
Blogs and Wikis
Blogger
                                   Blogging
   A blog (an abridgment of the term weblog) is a website, usually maintained by an individual, with
   regular entries of commentary, descriptions of events, or other material such as graphics or video.




                                                                             http://blogger.com
Free Websites for Creating Blogs
                      •   Monitored or live...
Free websites for creating Blogs...monitored or live...private or public
                      •   Private or public



                          Free Websites for Creating Blogs




               Search Engines read Blogs
Google analytics: saved in cache and permanently
                Libel and Slander
Archive.org
Cyberbullying
• There are several ways that children threaten and/or
  harass others online. They may:
  •Send e-mails or instant messages containing insults
   or threats directly to a person.
  •Spread hurtful comments about a person to others
   through e-mail, instant messaging or postings on
   web sites and blogs.
  •Steal passwords and send out threatening e-mails
   or instant messages using an assumed identity.
Dealing with Cyberbullying

  Preserve evidence – this is crucial for identifying the bully and making a case.


  Attempt to enlist assistance from the service provider.


  If able to identify the bully, contact him or her and/or parents.


  Use available blocking technology (i.e., block the user on IM, email and chat.)


  In serious cases, seek assistance from the police (i.e., threats of physical harm,
  unrelenting or unable to stop.)
Parents
1.   Learn everything you can about computers, the Internet and related
     technology


     •   Develop and maintain proficiency through use.


     •   Ask children to demonstrate.


2.   Communicate with your children.

     •   Take time to discuss concerns; agree on ground rules.

     •   Understand their needs.

     •   Set reasonable expectations.


3.   Place the computer in a “well-trafficked” area, not a child’s bedroom or a
     secluded area.
4. Ensure that they do not divulge detailed personal
   information when completing “profiles” and minimize
   dissemination.

5. Keep ALL accounts in your name.

6. Know your child’s password(s) and screen name(s).

  • Ensure that screen names do not provide information
    about his or her identity (e.g., Sarahsweet16.)
Consider Use of Computer/Internet Management Software:

  •   Age-based access levels – Allows for various levels of access for
      different family members.


  •   Filtering and Blocking (incoming and outgoing.)


  •   Time Restrictions.


  •   Activity Logs - Parents can view logs that list web sites visited, web
      sites blocked, chat sessions… Software can even capture screen
      shots and email messages to you if a rule is violated!
Parental Controls
Age Appropriate

  Under 8 - Children shouldn’t be using IM, chat rooms or
  blogs - period. Email should be restricted to only
  approved senders.

  8-10 - If you add IM or chat, make sure only pre-approved
  senders can send to your child. No blogs!

  10-12 - Give them more privacy, as long as it is with
  people you trust. Block all but pre-approved senders. Still
  no blogs!
13-15 - Respect their privacy even more. Give them more leeway
regarding IM, e-mail, chat and blogs. But check and account for
everyone, in real life, on their buddy lists. No friends of friends!

16 and over - Parental involvement becomes difficult at best – if
good judgment and communication have not been firmly
established by now … all bets are off.

If they have earned your trust, give it to them.

If not, unplug the computer and take away their cell phones and
interactive gaming devices.
Warning Signs
Significantly increases on-line time.

Receives phone calls, email, mail or packages from someone you don't know.

Quickly exits IM, chat, email, websites and other activities when you are near.

Increases use of new slang words, inappropriate sexual knowledge, withdraws
from family and friends.

Begins using new screen names, an online account belonging to someone else,
etc.

Is reluctant to discuss activities or your concerns.
Safety Tips
   Talk to a trusted adult if anything makes you
   feel scared, uncomfortable or confused.

   Do not respond to messages that are rude or
   offensive.

   Save messages that could be used by law
   enforcement as evidence.
Safety Tips

   Do not post personal information.

   Respect copyright laws and check your sources.

   Do not forward emails to “everyone” in your
   address book.

   Secure your password – do not share it, even
   with your best friend.
Safety Tips

  Never download from anyone you don’t know.

  Beware of phishing scams: If you receive an
  email or bulletin that requests your username
  and password or directs you to a website that
  asks personal information, DO NOT respond.
Keep in Mind...the Good Outweighs the Bad
Remember the 4 R’s

  Recognize techniques used by online predators to deceive
  their victims.

  Refuse requests for personal information.

  Respond assertively if you are ever in an uncomfortable
  situation while online. Exit the program, log off or turn off
  the computer…

  Report, to a parent or other trusted adult, any suspicious or
  dangerous contact that makes you uncomfortable.
QUESTIONS?

Weitere ähnliche Inhalte

Was ist angesagt?

Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
Lawrence Fine
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
lahill16
 

Was ist angesagt? (20)

A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Internet safety
Internet safety Internet safety
Internet safety
 
Hot topic
Hot topicHot topic
Hot topic
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 

Andere mochten auch

Sage show 2013 making the most of mobile
Sage show 2013 making the most of mobileSage show 2013 making the most of mobile
Sage show 2013 making the most of mobile
Dale Denham
 
Slampkin landingpage mockupv1
Slampkin landingpage mockupv1Slampkin landingpage mockupv1
Slampkin landingpage mockupv1
hoowenware
 
Grade 6 Astronomy
Grade 6 AstronomyGrade 6 Astronomy
Grade 6 Astronomy
Andrew Beck
 
Περιβαλλονικές Επιπτώσεις απο Μεταλλευτικές Δραστηριότητες
Περιβαλλονικές Επιπτώσεις απο Μεταλλευτικές ΔραστηριότητεςΠεριβαλλονικές Επιπτώσεις απο Μεταλλευτικές Δραστηριότητες
Περιβαλλονικές Επιπτώσεις απο Μεταλλευτικές Δραστηριότητες
Dimitrios Belis
 
إعتماد_مهندس مقيم_مشروع الخدمات
إعتماد_مهندس مقيم_مشروع الخدماتإعتماد_مهندس مقيم_مشروع الخدمات
إعتماد_مهندس مقيم_مشروع الخدمات
Mohamed Steif
 
Grade 6 Astronomy
Grade 6 AstronomyGrade 6 Astronomy
Grade 6 Astronomy
Andrew Beck
 
Perceptions of Market Orientation from a Consumer and Retailer Perspective
Perceptions of Market Orientation from a Consumer and Retailer PerspectivePerceptions of Market Orientation from a Consumer and Retailer Perspective
Perceptions of Market Orientation from a Consumer and Retailer Perspective
Tony Kynes
 
شهادة خبرة من بارسونز
شهادة خبرة من بارسونزشهادة خبرة من بارسونز
شهادة خبرة من بارسونز
Ashraf Nagib
 

Andere mochten auch (20)

פרסום ערב
פרסום ערבפרסום ערב
פרסום ערב
 
Sage show 2013 making the most of mobile
Sage show 2013 making the most of mobileSage show 2013 making the most of mobile
Sage show 2013 making the most of mobile
 
Maximize mobile dale denham geiger cio
Maximize mobile dale denham geiger cioMaximize mobile dale denham geiger cio
Maximize mobile dale denham geiger cio
 
BLAST OFF TO THE MOON
BLAST OFF TO THE MOONBLAST OFF TO THE MOON
BLAST OFF TO THE MOON
 
Google Search Operators Lesson
Google Search Operators LessonGoogle Search Operators Lesson
Google Search Operators Lesson
 
Using LinkedIn Effectively for Sales People
Using LinkedIn Effectively for Sales PeopleUsing LinkedIn Effectively for Sales People
Using LinkedIn Effectively for Sales People
 
Press Release November 2017
Press Release November 2017Press Release November 2017
Press Release November 2017
 
Slampkin landingpage mockupv1
Slampkin landingpage mockupv1Slampkin landingpage mockupv1
Slampkin landingpage mockupv1
 
Grade 6 Astronomy
Grade 6 AstronomyGrade 6 Astronomy
Grade 6 Astronomy
 
Περιβαλλονικές Επιπτώσεις απο Μεταλλευτικές Δραστηριότητες
Περιβαλλονικές Επιπτώσεις απο Μεταλλευτικές ΔραστηριότητεςΠεριβαλλονικές Επιπτώσεις απο Μεταλλευτικές Δραστηριότητες
Περιβαλλονικές Επιπτώσεις απο Μεταλλευτικές Δραστηριότητες
 
إعتماد_مهندس مقيم_مشروع الخدمات
إعتماد_مهندس مقيم_مشروع الخدماتإعتماد_مهندس مقيم_مشروع الخدمات
إعتماد_مهندس مقيم_مشروع الخدمات
 
Grade 6 Astronomy
Grade 6 AstronomyGrade 6 Astronomy
Grade 6 Astronomy
 
Perceptions of Market Orientation from a Consumer and Retailer Perspective
Perceptions of Market Orientation from a Consumer and Retailer PerspectivePerceptions of Market Orientation from a Consumer and Retailer Perspective
Perceptions of Market Orientation from a Consumer and Retailer Perspective
 
OOH Media AdEx Report July 2015
OOH Media AdEx Report July 2015OOH Media AdEx Report July 2015
OOH Media AdEx Report July 2015
 
Proposal perbengkelan
Proposal perbengkelanProposal perbengkelan
Proposal perbengkelan
 
linked in PRESENTATION
linked in PRESENTATIONlinked in PRESENTATION
linked in PRESENTATION
 
Komputer akuntansi
Komputer akuntansiKomputer akuntansi
Komputer akuntansi
 
Posterscope OOH Key Facts Belgium 2014
Posterscope OOH Key Facts Belgium 2014Posterscope OOH Key Facts Belgium 2014
Posterscope OOH Key Facts Belgium 2014
 
Xlnc - Profil Perusahaan Ekselensi Kreasi Komunika
Xlnc - Profil Perusahaan Ekselensi Kreasi KomunikaXlnc - Profil Perusahaan Ekselensi Kreasi Komunika
Xlnc - Profil Perusahaan Ekselensi Kreasi Komunika
 
شهادة خبرة من بارسونز
شهادة خبرة من بارسونزشهادة خبرة من بارسونز
شهادة خبرة من بارسونز
 

Ähnlich wie INTERNET SAFETY

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
cpitchford
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest5000f0a
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
Mark Rogers
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
tholman77
 
Cybersafety
CybersafetyCybersafety
Cybersafety
f3tm3
 
What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015
Linda Beres
 

Ähnlich wie INTERNET SAFETY (20)

CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Digital Communication
Digital CommunicationDigital Communication
Digital Communication
 
Myspace
MyspaceMyspace
Myspace
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Chatter
ChatterChatter
Chatter
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
Internet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersInternet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & Teachers
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
 
Cybersafety
CybersafetyCybersafety
Cybersafety
 
What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015
 

Kürzlich hochgeladen

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

INTERNET SAFETY

  • 1. Learning to Connect and Properly Navigate the Web Cathleen Richardson Apple Distinguished Educator New Media Educational Consultant Atlanta, Georgia
  • 2. The Internet: “The Network of All Networks” Nobody really owns it - It is a global collection of networks, both big and small. These networks connect together in many different ways to form the single entity that we know as the Internet. In fact, the very name comes from this idea of interconnected networks.
  • 3. What does this mean to me?
  • 4. Statistics 87% of teens aged 12 – 17 use the Internet. 51% use the Internet daily. 200 45% of teens have cell phones and 38% are texting. 75% of online teens use instant messaging. 1 81% of online teens play online games.
  • 5. Understand the NET an d possible risks to you... they are REAL!
  • 6. “Instill a sense of caution, not a sense of fear.”
  • 8. Introduction Online Relationships Keep Personal Information Private Protect Your Reputation Cyber Bullying Safety Tips
  • 10. You may not know the truth about someone you first meet online. Time does not equal trust or knowing the person. You can be lied to or betrayed.
  • 11. Warning Signs If someone tries to isolate you from your family or friends. Turn you against your parents. Make you keep secrets. Send inappropriate materials or talks about explicit subjects. Threaten you.
  • 12. Beware when someone says... “Let’s go private.” “Where’s your computer in the house?” “I know someone who can get you a modeling job.” “Who’s your favorite band? Designer? Gear? “You seem sad. Tell me what’s bothering you.” “You are the love of my life.” “What’s your phone number?” “If you don’t…do what I ask, I’ll … tell your parents OR share your photos in a photo blog/Webcam directory/file-sharing network.
  • 13. Never meet someone you first met online
  • 14. Who is looking at you online?
  • 15.
  • 16. DO NOT SAY ANYTHING ONLINE THAT YOU WOULDN’T SAY OFFLINE.
  • 17. Don’t give out personal information Never give out your personal identifying information or your families or friends, such as name, address, telephone number, and school name in any public areas or in email unless you are sure you know the person.
  • 18. Use Privacy Settings Use the privacy settings such as “Friends Only” on any social networking site you are on. Only allow people you know in real life on your friends list.
  • 19.
  • 20. Think before posting pictures Consider if it is a picture you want everyone to see, including your parents, teachers, law enforcement and college admission officers. Remember that any picture you upload to the Web can be downloaded by anyone and be copied or posted online FOREVER.
  • 21. PUBLIC DOMAIN: KNOW YOUR COPYRIGHT LAWS
  • 22.
  • 23. Sexting has real consequences
  • 24. Check with your friends Before posting pictures or information about your friends, check with them first. Always protect your privacy and theirs. Check to see what your friends are posting about you. If anything they have posted about you makes you uncomfortable, ask them to remove it.
  • 25. Do not respond to offensive or embarrassing comments. Delete them and block that person from making additional comments.
  • 27. Second Life Online 3D virtual world imagined and created by its Residents. http://www.secondlife.com
  • 30. Facebook and MySpace Facebook and MySpace are social utilities that connects you with the people around you. http://www.facebook.com
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. 10,000 offenders only 3% caught when reported
  • 37.
  • 38. • Facebook has serious consequences • Loss of jobs • Expulsion from school • Reputation, credibility, self-worth
  • 40. You Tube YouTube is a video sharing website where users can upload, view and share video clips. YouTube http://www.youtube.com
  • 41. Twitter Twitter is a free social networking and micro-blogging service that allows users to send "updates" to the Twitter web site, via the Twitter web site, short message service (SMS), instant messaging, or a third-party application such as Twitterrific or Facebook. http://www.twitter.com
  • 42.
  • 43. Chat
  • 44. Skype Skype is a software program that allows users to make telephone calls over the Internet. Budgets Skype…talk to the world are tight. These are ways to take virtual field trips and also speak with experts. http://www.skype.com
  • 45. iChat A/V with built-in web cams iChat AV is an AOL Instant Messenger (AIM), .Mac, ICQ and XMPP client by Apple Inc. for their Mac OS X operating system.
  • 46. Person on the other side can record you...take what you say out of context. Saved in the chat log
  • 47. If a person unknown to you was speaking to you in your front yard, what would you do? If you were communicating with the same stranger on-line, what would you do?
  • 49. Blogger Blogging A blog (an abridgment of the term weblog) is a website, usually maintained by an individual, with regular entries of commentary, descriptions of events, or other material such as graphics or video. http://blogger.com
  • 50. Free Websites for Creating Blogs • Monitored or live... Free websites for creating Blogs...monitored or live...private or public • Private or public Free Websites for Creating Blogs Search Engines read Blogs
  • 51. Google analytics: saved in cache and permanently Libel and Slander
  • 54.
  • 55. • There are several ways that children threaten and/or harass others online. They may: •Send e-mails or instant messages containing insults or threats directly to a person. •Spread hurtful comments about a person to others through e-mail, instant messaging or postings on web sites and blogs. •Steal passwords and send out threatening e-mails or instant messages using an assumed identity.
  • 56. Dealing with Cyberbullying Preserve evidence – this is crucial for identifying the bully and making a case. Attempt to enlist assistance from the service provider. If able to identify the bully, contact him or her and/or parents. Use available blocking technology (i.e., block the user on IM, email and chat.) In serious cases, seek assistance from the police (i.e., threats of physical harm, unrelenting or unable to stop.)
  • 58. 1. Learn everything you can about computers, the Internet and related technology • Develop and maintain proficiency through use. • Ask children to demonstrate. 2. Communicate with your children. • Take time to discuss concerns; agree on ground rules. • Understand their needs. • Set reasonable expectations. 3. Place the computer in a “well-trafficked” area, not a child’s bedroom or a secluded area.
  • 59. 4. Ensure that they do not divulge detailed personal information when completing “profiles” and minimize dissemination. 5. Keep ALL accounts in your name. 6. Know your child’s password(s) and screen name(s). • Ensure that screen names do not provide information about his or her identity (e.g., Sarahsweet16.)
  • 60. Consider Use of Computer/Internet Management Software: • Age-based access levels – Allows for various levels of access for different family members. • Filtering and Blocking (incoming and outgoing.) • Time Restrictions. • Activity Logs - Parents can view logs that list web sites visited, web sites blocked, chat sessions… Software can even capture screen shots and email messages to you if a rule is violated!
  • 62. Age Appropriate Under 8 - Children shouldn’t be using IM, chat rooms or blogs - period. Email should be restricted to only approved senders. 8-10 - If you add IM or chat, make sure only pre-approved senders can send to your child. No blogs! 10-12 - Give them more privacy, as long as it is with people you trust. Block all but pre-approved senders. Still no blogs!
  • 63. 13-15 - Respect their privacy even more. Give them more leeway regarding IM, e-mail, chat and blogs. But check and account for everyone, in real life, on their buddy lists. No friends of friends! 16 and over - Parental involvement becomes difficult at best – if good judgment and communication have not been firmly established by now … all bets are off. If they have earned your trust, give it to them. If not, unplug the computer and take away their cell phones and interactive gaming devices.
  • 64. Warning Signs Significantly increases on-line time. Receives phone calls, email, mail or packages from someone you don't know. Quickly exits IM, chat, email, websites and other activities when you are near. Increases use of new slang words, inappropriate sexual knowledge, withdraws from family and friends. Begins using new screen names, an online account belonging to someone else, etc. Is reluctant to discuss activities or your concerns.
  • 65. Safety Tips Talk to a trusted adult if anything makes you feel scared, uncomfortable or confused. Do not respond to messages that are rude or offensive. Save messages that could be used by law enforcement as evidence.
  • 66. Safety Tips Do not post personal information. Respect copyright laws and check your sources. Do not forward emails to “everyone” in your address book. Secure your password – do not share it, even with your best friend.
  • 67. Safety Tips Never download from anyone you don’t know. Beware of phishing scams: If you receive an email or bulletin that requests your username and password or directs you to a website that asks personal information, DO NOT respond.
  • 68. Keep in Mind...the Good Outweighs the Bad
  • 69. Remember the 4 R’s Recognize techniques used by online predators to deceive their victims. Refuse requests for personal information. Respond assertively if you are ever in an uncomfortable situation while online. Exit the program, log off or turn off the computer… Report, to a parent or other trusted adult, any suspicious or dangerous contact that makes you uncomfortable.