SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Staying Safe in Cyberspace ,[object Object],[object Object]
Table of Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Safety Rules HOME More Info. *Only use the Internet when there is an adult home. *Don’t answer email from strangers.  *Tell an adult when you feel unsafe.  *Keep passwords private.  *Don’t meet someone in person whom you met  online.  *Don’t send your picture to anyone online.  Even More Info.
Are you safety savvy? HOME BACK What are some ways you can stay safe on the Internet? a. Share your password with others.                 b. Don’t send your picture to anyone online.   c. Use the Internet when no one is home.
Let’s try again! HOME Keep your password private.  Others can hack into your accounts using your password.
Let’s try again! HOME Make sure there is an adult at home when using the Internet.  Who else will you tell if something goes wrong?
Correct! HOME Make sure you don’t send pictures to people over the Internet (even if you know them.)
Cyber Bullying HOME What is it?   *When a child is tormented, threatened, harassed, humiliated, embarrassed, or targeted by another child using the Internet or cell phones. How it Works:   *Direct attacks  *Using others as    accomplices Take Action!  Keep personal information private.  Stop, Block, and Tell.  Take 5! VIDEO
Are you safety savvy? HOME BACK What actions can you take to stop Cyper Bullying? a. Keep personal information   private.   b. Help spread the rumors. c. Text harmful information about   another person. True  or  False ?  Cyber bullying is talking with a friend over the Internet.
Let’s look at that again! HOME Simply talking with a friend over the Internet is not Cyber Bullying.
Let’s look at that again! HOME Helping to spread rumors is being an accomplice to the bullying.
Let’s look at that again! HOME Texting harmful information about another person is Cyber Bullying.
Great Thinking! HOME Cyber Bullying is when a child is tormented,  threatened, harassed, humiliated,  embarrassed, or targeted by another  child using the Internet or cell phones. Bullies could be a friend or just an acquaintance.
Great Thinking! HOME Make sure you keep your personal information private. Bullies could be a friend or just an acquaintance.
Email Safety HOME Email Dangers:  *Chain Letters  *Hoaxes, rumors and urban  legends  *Phishing  *Scams and fraud  *Spam  *Spoofing  *Viruses What are these? Safety Tips:  *Change password often  *Keep password private  *Log off when done  *Don’t reply to spam,  harassing, or  offensive email.  *Don’t forward chain letters  *Delete emails, UNREAD,  from people you  don’t know  *Use anti-virus programs  before opening  attachments. Even more Information!
Are you safety savvy? HOME BACK What are some email dangers?  a. Chain Letters                          b.  Phishing                               c.   Spam                                     d. All of the above
Not Quite! HOME Take another look at that list.
Way To Go! HOME Spam, Phishing, and Chain Letters can be dangerous. Watch Out  for these too:  * Hoaxes, rumors and urban legends  *Scams and fraud  *Spoofing    *Viruses
Netiquette HOME Respect  all other users! Be patient with newcomers. Be careful to not use rude or bad language online. Make a good impression. Do not TYPE IN ALL CAPITAL LETTERS. Don’t break any laws. Do to others as you would have them do to you. More     Info. Even More Info. What is it?   Internet etiquette or guidelines for proper  behavior on the Internet.
Are you safety savvy? HOME BACK What is an example of good Internet behavior? a. TYPE IN ALL CAPITAL LETTERS  b. Use rude or bad language              c. Do to others as you would have   	 them do to you.
Do you need a redo? HOME Typing in all capital letters makes people think you are yelling at them.  This is not good Internet behavior.
Do you need a redo? HOME Using rude or bad language anywhere, whether on the Internet or not is inappropriate behavior.  Many Internet providers will terminate your account if you use this type of language.
Absolutely! HOME Doing to others as you would like them to do to you is a rule you should use throughout your life.  This is wonderful Internet behavior to have.
Get Cybersmart with Phineas and Ferb HOME
Earn Your License to Surf the Web HOME “ Rules of the Road”
PA State Standards HOME Science and Technology and Engineering Education    3.4.B: Technology and Society    3.4.5.B1: Explain how the use of technology can have unintended  consequences. 3.4.D: Abilities for a Technological World  3.4.5.D3: Determine if the human use of a product or system creates  positive or negative results. National Educational Technology Standards 5. Digital Citizenship  Students understand human, cultural, and societal issues related to technology  and practice legal and ethical behavior. Students:      a. advocate and practice safe, legal, and responsible use of  information and technology.      c. demonstrate personal responsibility for lifelong learning.      d. exhibit leadership for digital citizenship.
Credits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],HOME

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital EtiquetteKATRUE01
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquetteguestc38192
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette EMCox02
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update14071828
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonEva Buyuksimkesyan
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquettedhabyahalk
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennisdensio123
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 

Was ist angesagt? (20)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquette
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennis
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Uno Digital Etiquette
Uno Digital EtiquetteUno Digital Etiquette
Uno Digital Etiquette
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 

Ähnlich wie Internet safety

The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Digital literacy
Digital literacyDigital literacy
Digital literacyAmanda lee
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Calebguestde489f
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Calebguestde489f
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2guest0e1ade
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2guest0e1ade
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 

Ähnlich wie Internet safety (20)

The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Untitled Presentation.pdf
Untitled Presentation.pdfUntitled Presentation.pdf
Untitled Presentation.pdf
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 

Kürzlich hochgeladen

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Kürzlich hochgeladen (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Internet safety

  • 1.
  • 2.
  • 3. Safety Rules HOME More Info. *Only use the Internet when there is an adult home. *Don’t answer email from strangers. *Tell an adult when you feel unsafe. *Keep passwords private. *Don’t meet someone in person whom you met online. *Don’t send your picture to anyone online. Even More Info.
  • 4. Are you safety savvy? HOME BACK What are some ways you can stay safe on the Internet? a. Share your password with others. b. Don’t send your picture to anyone online. c. Use the Internet when no one is home.
  • 5. Let’s try again! HOME Keep your password private. Others can hack into your accounts using your password.
  • 6. Let’s try again! HOME Make sure there is an adult at home when using the Internet. Who else will you tell if something goes wrong?
  • 7. Correct! HOME Make sure you don’t send pictures to people over the Internet (even if you know them.)
  • 8. Cyber Bullying HOME What is it? *When a child is tormented, threatened, harassed, humiliated, embarrassed, or targeted by another child using the Internet or cell phones. How it Works: *Direct attacks *Using others as accomplices Take Action! Keep personal information private. Stop, Block, and Tell. Take 5! VIDEO
  • 9. Are you safety savvy? HOME BACK What actions can you take to stop Cyper Bullying? a. Keep personal information private. b. Help spread the rumors. c. Text harmful information about another person. True or False ? Cyber bullying is talking with a friend over the Internet.
  • 10. Let’s look at that again! HOME Simply talking with a friend over the Internet is not Cyber Bullying.
  • 11. Let’s look at that again! HOME Helping to spread rumors is being an accomplice to the bullying.
  • 12. Let’s look at that again! HOME Texting harmful information about another person is Cyber Bullying.
  • 13. Great Thinking! HOME Cyber Bullying is when a child is tormented, threatened, harassed, humiliated, embarrassed, or targeted by another child using the Internet or cell phones. Bullies could be a friend or just an acquaintance.
  • 14. Great Thinking! HOME Make sure you keep your personal information private. Bullies could be a friend or just an acquaintance.
  • 15. Email Safety HOME Email Dangers: *Chain Letters *Hoaxes, rumors and urban legends *Phishing *Scams and fraud *Spam *Spoofing *Viruses What are these? Safety Tips: *Change password often *Keep password private *Log off when done *Don’t reply to spam, harassing, or offensive email. *Don’t forward chain letters *Delete emails, UNREAD, from people you don’t know *Use anti-virus programs before opening attachments. Even more Information!
  • 16. Are you safety savvy? HOME BACK What are some email dangers? a. Chain Letters b. Phishing c. Spam d. All of the above
  • 17. Not Quite! HOME Take another look at that list.
  • 18. Way To Go! HOME Spam, Phishing, and Chain Letters can be dangerous. Watch Out for these too: * Hoaxes, rumors and urban legends *Scams and fraud *Spoofing *Viruses
  • 19. Netiquette HOME Respect all other users! Be patient with newcomers. Be careful to not use rude or bad language online. Make a good impression. Do not TYPE IN ALL CAPITAL LETTERS. Don’t break any laws. Do to others as you would have them do to you. More Info. Even More Info. What is it? Internet etiquette or guidelines for proper behavior on the Internet.
  • 20. Are you safety savvy? HOME BACK What is an example of good Internet behavior? a. TYPE IN ALL CAPITAL LETTERS b. Use rude or bad language c. Do to others as you would have them do to you.
  • 21. Do you need a redo? HOME Typing in all capital letters makes people think you are yelling at them. This is not good Internet behavior.
  • 22. Do you need a redo? HOME Using rude or bad language anywhere, whether on the Internet or not is inappropriate behavior. Many Internet providers will terminate your account if you use this type of language.
  • 23. Absolutely! HOME Doing to others as you would like them to do to you is a rule you should use throughout your life. This is wonderful Internet behavior to have.
  • 24. Get Cybersmart with Phineas and Ferb HOME
  • 25. Earn Your License to Surf the Web HOME “ Rules of the Road”
  • 26. PA State Standards HOME Science and Technology and Engineering Education 3.4.B: Technology and Society 3.4.5.B1: Explain how the use of technology can have unintended consequences. 3.4.D: Abilities for a Technological World 3.4.5.D3: Determine if the human use of a product or system creates positive or negative results. National Educational Technology Standards 5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior. Students: a. advocate and practice safe, legal, and responsible use of information and technology. c. demonstrate personal responsibility for lifelong learning. d. exhibit leadership for digital citizenship.
  • 27.