SlideShare ist ein Scribd-Unternehmen logo
1 von 44
• Social networking web sites such as and are 
useful Internet tools to keep in touch with friends 
and family, and can be utilized to meet new 
people with similar interests. 
• These sites have become very popular among 
teens. 
• These sites can be a positive 
and beneficial resource for 
youth, but only if they used 
them in the responsible way.
• Too often, however, adolescents include too 
much personal information, talk about things 
that could get them into trouble, or otherwise 
place themselves at risk by what they share on 
their online profiles. 
• Virtually everyone that uses the media needs 
to understand the benefits of responsible use 
and the consequences of irresponsible use.
• We could establish three major areas within 
which we can group the main risks associated 
with tic's and social networks: 
• EXPOSURE TO HARMFUL CONTENT, 
• EXCESSIVE TIME COMMITMENT 
• AND THE POSSIBILITY OF CONTACT WITH 
POTENTIALLY HAZARDOUS TO THE PHYSICAL 
OR MENTAL INTEGRITY OF PERSONS.
• The main risks that we may face are: 
• ABUSIVE AND ADDICTIVE USE 
• That often results in heavy dependence or 
abuse and social isolation and / or waiver to 
be with friends
• VIOLATION OF RIGHTS OF INDUSTRIAL OR 
INTELLECTUAL PROPERTY 
• Closely related to the phenomenon, 
widespread illegal downloading at all ages
• ACCESS TO INAPPROPRIATE CONTENT 
• The ability to access inappropriate content 
capable offend the sensibilities contained 
pursued by the law, fake content ...
• CYBERBULLYING 
• A risk bolstered by the ease offered by tic's 
hiding under false identities, which has caused 
the number of cases of harassment has 
increased considerably, becoming a teen pop 
phenomenon.
• GROOMING AND SEXUAL HARASSMENT 
• The grooming define a tactic commonly used 
by pedophiles to contact potential victims.
• THREATS TO PRIVACY 
• Privacy in the network is the ability of 
individuals to control what information 
reveals self on the set of Internet and control 
who can access it.
• ECONOMIC RISK AND / OR FRAUD 
• Any internet user can be subject to fraud or 
computer scam. Highlight phishing, a form of 
fraud in order to try to get users to their data, 
passwords, bank accounts, credit card 
numbers, identities, all possible data before 
being used fraudulently.
• TECHNICAL AND / OR RISK MALWARE 
• The use of the Internet can expose you to 
viruses and other malicious software 
(malware).
• ONLY CONNECT WITH THOSE 
YOU KNOW OR THOSE YOU ARE 
CERTAIN CAN BE TRUSTED.
• DON’T ADD PEOPLE AS 
“FRIENDS” UNLESS YOU KNOW 
THEM IN REAL LIFE.
• DON’T ACCUMULATE THOUSANDS OF 
“FRIENDS” ONLY FOR INCREASE THE LIST. 
JUST REMEMBER THAT THESE PEOPLE HAVE 
OPEN ACCESS TO ALL OF YOUR POSTED 
CONTENT AND INFORMATION.
• DON’T PUT ANYTHING ONLINE 
YOU WOULDN’T WANT YOUR 
WORST ENEMY TO KNOW.
• USE THE STRONGEST PRIVACY 
SETTINGS THAT STILL ALLOW 
YOU THE FLEXIBILITY YOU NEED 
TO USE THE SITE IN THE WAY 
YOU WANT.
• MAKE SURE YOU SET YOUR PROFILE TO 
“PRIVATE” SO THAT YOU CAN CONTROL 
WHO HAS EASY ACCESS TO YOUR 
INFORMATION.
• SHARE ONLY INFORMATION THAT 
IS ABSOLUTELY NECESSARY, 
ESPECIALLY WHEN YOU MAY NOT 
KNOW WHO YOUR NETWORK OF 
FRIENDS MIGHT BE SHARING IT 
WITH.
• USE DISCRETION WHEN PUTTING 
PICTURES ON YOUR PROFILE
• BE WARY OF POSTS THAT ARE 
EITHER OFFERING SOMETHING TOO 
GOOD TO BE TRUE. TRUST YOUR 
INSTINCT IF SOMETHING SEEMS 
SUSPICIOUS. AND IF YOU KNOW 
IT’S A FRAUD, REPORT IT TO THE 
SOCIAL NETWORKING SITE.
• ALWAYS HAVE UP-TO-DATE, REPUTABLE 
SECURITY SOFTWARE INSTALLED ON 
EVERY DEVICE YOU ARE USING TO 
CONNECT TO THE INTERNET/SOCIAL 
NETWORKING SITES.
• CHOOSE A SECURE BROWSER. 
• Most of the activities conducted by our focus 
on Internet browser so make a right choice is 
important.
• USE ADDITIONAL PLUGINS FOR THE 
BROWSER 
• It is suitable install some plugins to your 
browser to increase blocking infected web 
sites.
• TAKE CARE TO PROTECT YOUR COMPUTER 
• Install an antivirus on your operating system, 
there are many free and low heavy options.
• UPGRADE YOUR APPLICATIONS 
• It is very important to keep our updated 
applications, because in addition to offering 
the most improved version of the application 
or program normally have associated safety 
improvements.
• COMMON SENSE 
• If sail without common sense the chances of 
problems have increased considerably. Do not 
sail suicidally, before clicking on a link on that 
page well think you're already which can take 
you. There is no better tool than oneself, to 
monitor which pages you enter and leave in 
these data.
• RESPECT 
• I use ICT respecting others, respecting me and 
making me respect.
• FREEDOM 
• I exercise my right to freedom and respect of 
others.
• IDENTITY 
• I am taking my identity securely in my 
interaction with others in technological 
environments.
• INTEGRITY 
• I protect my integrity and personal safety and 
that of others.
• PRIVACY 
• I'm responsible with my privacy and that of 
others.
• AUTONOMY 
• I use ICT for the free development of my 
personality and autonomy, and through it I do 
acknowledge and respect my beliefs and 
thoughts, and those of others.
• QUALITY OF LIFE 
• I use ICT to improve my quality of life, making 
sure to seek a healthy and peaceful 
environment.
• CARE AND BEHAVIOR 
• I'm aware that minors require special care 
and support in the use of ICT.
• RESPECT THE LAW 
• I do not use ICT to promote, query, view, buy 
and share activities outside the law or any 
other behavior that violates human rights.
Guideline about responsible use of social networks
Guideline about responsible use of social networks
Guideline about responsible use of social networks
Guideline about responsible use of social networks
Guideline about responsible use of social networks
Guideline about responsible use of social networks

Weitere ähnliche Inhalte

Was ist angesagt?

TVL MIL COT DEMO final.ppt
TVL MIL COT DEMO final.pptTVL MIL COT DEMO final.ppt
TVL MIL COT DEMO final.pptAneSieras
 
Responsible Social Media Use
Responsible Social Media UseResponsible Social Media Use
Responsible Social Media Useswieda1
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipKati W
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshiptrautweiler
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfBryanSmile
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Jesus Rances
 
The effects of social media on college students
The effects of social media on college studentsThe effects of social media on college students
The effects of social media on college studentsArina Fauzi
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and EtiquetteTeodoro Llanes II
 
Emp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvEmp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvVivienPastores1
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)John Bosco Javellana, MAEd.
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS
 

Was ist angesagt? (20)

TVL MIL COT DEMO final.ppt
TVL MIL COT DEMO final.pptTVL MIL COT DEMO final.ppt
TVL MIL COT DEMO final.ppt
 
Responsible Social Media Use
Responsible Social Media UseResponsible Social Media Use
Responsible Social Media Use
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Youth and social media
Youth and social mediaYouth and social media
Youth and social media
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6
 
The effects of social media on college students
The effects of social media on college studentsThe effects of social media on college students
The effects of social media on college students
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and Etiquette
 
Emp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fvEmp tech q2_m12_l1_multimedia_and_ict_fv
Emp tech q2_m12_l1_multimedia_and_ict_fv
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)Empowerment Technologies Lecture 12 (Philippines SHS)
Empowerment Technologies Lecture 12 (Philippines SHS)
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
 

Andere mochten auch

Social networking as enabler of social responsibility and sustainability
Social networking as enabler of social responsibility and sustainabilitySocial networking as enabler of social responsibility and sustainability
Social networking as enabler of social responsibility and sustainabilityVedran Podobnik
 
Tips to stay safe and responsible on social media
Tips to stay safe and responsible on social mediaTips to stay safe and responsible on social media
Tips to stay safe and responsible on social mediakayliewest
 
Seminario You Tube-Marketing
Seminario You Tube-MarketingSeminario You Tube-Marketing
Seminario You Tube-Marketingedgardom
 
social networking sites
social networking sitessocial networking sites
social networking sitesAnant Agarwal
 
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...Kasthuripriya Nanda Kumar
 

Andere mochten auch (7)

Social networking as enabler of social responsibility and sustainability
Social networking as enabler of social responsibility and sustainabilitySocial networking as enabler of social responsibility and sustainability
Social networking as enabler of social responsibility and sustainability
 
Tips to stay safe and responsible on social media
Tips to stay safe and responsible on social mediaTips to stay safe and responsible on social media
Tips to stay safe and responsible on social media
 
Seminario You Tube-Marketing
Seminario You Tube-MarketingSeminario You Tube-Marketing
Seminario You Tube-Marketing
 
social networking site
social networking sitesocial networking site
social networking site
 
social networking sites
social networking sitessocial networking sites
social networking sites
 
Three cultures. toledo
Three cultures. toledoThree cultures. toledo
Three cultures. toledo
 
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
 

Ähnlich wie Guideline about responsible use of social networks

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxTriveni Prabaakar
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetejNishaTariq1
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttwNishaTariq1
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015Staci Trekles
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenshipkaeschliman
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptxKarmel7
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship ppKatie Ward
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxCatherineBagaan
 

Ähnlich wie Guideline about responsible use of social networks (20)

Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenship
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 

Mehr von profesorjulioperez

Proyecto Erasmus plus KA101 Sistema educativo sueco
Proyecto Erasmus plus KA101 Sistema educativo suecoProyecto Erasmus plus KA101 Sistema educativo sueco
Proyecto Erasmus plus KA101 Sistema educativo suecoprofesorjulioperez
 
Miércoles solidarios versión en inglés
Miércoles solidarios versión en inglésMiércoles solidarios versión en inglés
Miércoles solidarios versión en inglésprofesorjulioperez
 
Diary of MEETING IN Slovakia by Marta and Gloria
Diary of MEETING IN Slovakia by Marta and GloriaDiary of MEETING IN Slovakia by Marta and Gloria
Diary of MEETING IN Slovakia by Marta and Gloriaprofesorjulioperez
 
ERASMUS PATH OF HISTORY OF RIVAS
ERASMUS PATH OF HISTORY OF RIVASERASMUS PATH OF HISTORY OF RIVAS
ERASMUS PATH OF HISTORY OF RIVASprofesorjulioperez
 
Relación de personas participantes
Relación de personas participantesRelación de personas participantes
Relación de personas participantesprofesorjulioperez
 
Comenius Bilateral 201315 Octubre 2014Ayuntamiento rivas vacia...us une rivas...
Comenius Bilateral 201315 Octubre 2014Ayuntamiento rivas vacia...us une rivas...Comenius Bilateral 201315 Octubre 2014Ayuntamiento rivas vacia...us une rivas...
Comenius Bilateral 201315 Octubre 2014Ayuntamiento rivas vacia...us une rivas...profesorjulioperez
 

Mehr von profesorjulioperez (20)

Proyecto Erasmus plus KA101 Sistema educativo sueco
Proyecto Erasmus plus KA101 Sistema educativo suecoProyecto Erasmus plus KA101 Sistema educativo sueco
Proyecto Erasmus plus KA101 Sistema educativo sueco
 
Miércoles solidarios versión en inglés
Miércoles solidarios versión en inglésMiércoles solidarios versión en inglés
Miércoles solidarios versión en inglés
 
INCLUD-ED PROJECT
INCLUD-ED PROJECTINCLUD-ED PROJECT
INCLUD-ED PROJECT
 
Path of sport
Path of sportPath of sport
Path of sport
 
Active breaks at school
Active breaks at schoolActive breaks at school
Active breaks at school
 
PROYECTO INCLUD-ED
PROYECTO INCLUD-EDPROYECTO INCLUD-ED
PROYECTO INCLUD-ED
 
MADRID DE LOS AUSTRIAS
MADRID DE LOS AUSTRIASMADRID DE LOS AUSTRIAS
MADRID DE LOS AUSTRIAS
 
Erasmus+ 2017 englishversion3
Erasmus+ 2017 englishversion3Erasmus+ 2017 englishversion3
Erasmus+ 2017 englishversion3
 
Miércoles solidarios
Miércoles solidariosMiércoles solidarios
Miércoles solidarios
 
Diary of MEETING IN Slovakia by Marta and Gloria
Diary of MEETING IN Slovakia by Marta and GloriaDiary of MEETING IN Slovakia by Marta and Gloria
Diary of MEETING IN Slovakia by Marta and Gloria
 
Balance breakfast
Balance breakfastBalance breakfast
Balance breakfast
 
Erasmus calendar 2017 spain
Erasmus calendar 2017 spainErasmus calendar 2017 spain
Erasmus calendar 2017 spain
 
ERASMUS PATH OF HISTORY OF RIVAS
ERASMUS PATH OF HISTORY OF RIVASERASMUS PATH OF HISTORY OF RIVAS
ERASMUS PATH OF HISTORY OF RIVAS
 
Traditional Spanish games
Traditional Spanish gamesTraditional Spanish games
Traditional Spanish games
 
Path of nature madrid
Path of nature madridPath of nature madrid
Path of nature madrid
 
Spanish national Narks
Spanish national Narks   Spanish national Narks
Spanish national Narks
 
Nature of rivas
Nature of rivasNature of rivas
Nature of rivas
 
Madrid in christmas marta g.
Madrid in christmas marta g.Madrid in christmas marta g.
Madrid in christmas marta g.
 
Relación de personas participantes
Relación de personas participantesRelación de personas participantes
Relación de personas participantes
 
Comenius Bilateral 201315 Octubre 2014Ayuntamiento rivas vacia...us une rivas...
Comenius Bilateral 201315 Octubre 2014Ayuntamiento rivas vacia...us une rivas...Comenius Bilateral 201315 Octubre 2014Ayuntamiento rivas vacia...us une rivas...
Comenius Bilateral 201315 Octubre 2014Ayuntamiento rivas vacia...us une rivas...
 

Kürzlich hochgeladen

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Kürzlich hochgeladen (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Guideline about responsible use of social networks

  • 1.
  • 2.
  • 3.
  • 4. • Social networking web sites such as and are useful Internet tools to keep in touch with friends and family, and can be utilized to meet new people with similar interests. • These sites have become very popular among teens. • These sites can be a positive and beneficial resource for youth, but only if they used them in the responsible way.
  • 5. • Too often, however, adolescents include too much personal information, talk about things that could get them into trouble, or otherwise place themselves at risk by what they share on their online profiles. • Virtually everyone that uses the media needs to understand the benefits of responsible use and the consequences of irresponsible use.
  • 6. • We could establish three major areas within which we can group the main risks associated with tic's and social networks: • EXPOSURE TO HARMFUL CONTENT, • EXCESSIVE TIME COMMITMENT • AND THE POSSIBILITY OF CONTACT WITH POTENTIALLY HAZARDOUS TO THE PHYSICAL OR MENTAL INTEGRITY OF PERSONS.
  • 7. • The main risks that we may face are: • ABUSIVE AND ADDICTIVE USE • That often results in heavy dependence or abuse and social isolation and / or waiver to be with friends
  • 8. • VIOLATION OF RIGHTS OF INDUSTRIAL OR INTELLECTUAL PROPERTY • Closely related to the phenomenon, widespread illegal downloading at all ages
  • 9. • ACCESS TO INAPPROPRIATE CONTENT • The ability to access inappropriate content capable offend the sensibilities contained pursued by the law, fake content ...
  • 10. • CYBERBULLYING • A risk bolstered by the ease offered by tic's hiding under false identities, which has caused the number of cases of harassment has increased considerably, becoming a teen pop phenomenon.
  • 11. • GROOMING AND SEXUAL HARASSMENT • The grooming define a tactic commonly used by pedophiles to contact potential victims.
  • 12. • THREATS TO PRIVACY • Privacy in the network is the ability of individuals to control what information reveals self on the set of Internet and control who can access it.
  • 13. • ECONOMIC RISK AND / OR FRAUD • Any internet user can be subject to fraud or computer scam. Highlight phishing, a form of fraud in order to try to get users to their data, passwords, bank accounts, credit card numbers, identities, all possible data before being used fraudulently.
  • 14. • TECHNICAL AND / OR RISK MALWARE • The use of the Internet can expose you to viruses and other malicious software (malware).
  • 15. • ONLY CONNECT WITH THOSE YOU KNOW OR THOSE YOU ARE CERTAIN CAN BE TRUSTED.
  • 16. • DON’T ADD PEOPLE AS “FRIENDS” UNLESS YOU KNOW THEM IN REAL LIFE.
  • 17. • DON’T ACCUMULATE THOUSANDS OF “FRIENDS” ONLY FOR INCREASE THE LIST. JUST REMEMBER THAT THESE PEOPLE HAVE OPEN ACCESS TO ALL OF YOUR POSTED CONTENT AND INFORMATION.
  • 18. • DON’T PUT ANYTHING ONLINE YOU WOULDN’T WANT YOUR WORST ENEMY TO KNOW.
  • 19. • USE THE STRONGEST PRIVACY SETTINGS THAT STILL ALLOW YOU THE FLEXIBILITY YOU NEED TO USE THE SITE IN THE WAY YOU WANT.
  • 20. • MAKE SURE YOU SET YOUR PROFILE TO “PRIVATE” SO THAT YOU CAN CONTROL WHO HAS EASY ACCESS TO YOUR INFORMATION.
  • 21. • SHARE ONLY INFORMATION THAT IS ABSOLUTELY NECESSARY, ESPECIALLY WHEN YOU MAY NOT KNOW WHO YOUR NETWORK OF FRIENDS MIGHT BE SHARING IT WITH.
  • 22. • USE DISCRETION WHEN PUTTING PICTURES ON YOUR PROFILE
  • 23. • BE WARY OF POSTS THAT ARE EITHER OFFERING SOMETHING TOO GOOD TO BE TRUE. TRUST YOUR INSTINCT IF SOMETHING SEEMS SUSPICIOUS. AND IF YOU KNOW IT’S A FRAUD, REPORT IT TO THE SOCIAL NETWORKING SITE.
  • 24. • ALWAYS HAVE UP-TO-DATE, REPUTABLE SECURITY SOFTWARE INSTALLED ON EVERY DEVICE YOU ARE USING TO CONNECT TO THE INTERNET/SOCIAL NETWORKING SITES.
  • 25. • CHOOSE A SECURE BROWSER. • Most of the activities conducted by our focus on Internet browser so make a right choice is important.
  • 26. • USE ADDITIONAL PLUGINS FOR THE BROWSER • It is suitable install some plugins to your browser to increase blocking infected web sites.
  • 27. • TAKE CARE TO PROTECT YOUR COMPUTER • Install an antivirus on your operating system, there are many free and low heavy options.
  • 28. • UPGRADE YOUR APPLICATIONS • It is very important to keep our updated applications, because in addition to offering the most improved version of the application or program normally have associated safety improvements.
  • 29. • COMMON SENSE • If sail without common sense the chances of problems have increased considerably. Do not sail suicidally, before clicking on a link on that page well think you're already which can take you. There is no better tool than oneself, to monitor which pages you enter and leave in these data.
  • 30. • RESPECT • I use ICT respecting others, respecting me and making me respect.
  • 31. • FREEDOM • I exercise my right to freedom and respect of others.
  • 32. • IDENTITY • I am taking my identity securely in my interaction with others in technological environments.
  • 33. • INTEGRITY • I protect my integrity and personal safety and that of others.
  • 34. • PRIVACY • I'm responsible with my privacy and that of others.
  • 35. • AUTONOMY • I use ICT for the free development of my personality and autonomy, and through it I do acknowledge and respect my beliefs and thoughts, and those of others.
  • 36. • QUALITY OF LIFE • I use ICT to improve my quality of life, making sure to seek a healthy and peaceful environment.
  • 37. • CARE AND BEHAVIOR • I'm aware that minors require special care and support in the use of ICT.
  • 38. • RESPECT THE LAW • I do not use ICT to promote, query, view, buy and share activities outside the law or any other behavior that violates human rights.