SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Safe Internet
SUMAIYA ISMAIL
ID-
COURSE CODE: ART-203
PROGRAM: BCSE
1
Abstract
The Internet is by now embedded in daily life. In our personal
lives and in our society. It is an irreversible technology. But in
relatively short existence it has created many issues concerning
security and safety. These include issues towards personal
information and theft and misuse thereof, and specific risks
towards children like online bullying and grooming. To raise
public awareness into safe Internet use, campaigns have
emerged. However, research shows that the effects of these
campaigns prove to be hard to realize.
2
Introduction
 Without the virtues and possibilities of internet life cannot
be imagined.
 The fast rise of internet also created many debates
regarding safety and security issues.
 The effectiveness of campaigns is being questioned.
 Internet is being used by teenagers and children, so
internet safety should be maintained.
3
Literature Review
 The Internet presents a world of opportunities for children and
adolescents, but it also threatens communities with inappropriate
content, cyberbullying among peers, and online predators –
whether that is via connection to the Internet at home, in a
cybercafé, or by Smartphone.
 Various websites have been created for the purpose of making
users aware of Internet safety. Many governments throughout
Europe, large banks and ICT companies, and other organisations
have created websites that provide information and guidance on
Internet safety. For example the EU website Safer Internet
Programme, the safety section on the Dutch banks ING website,
and MicroSoft's Safety & Security Centre.
4
Internet Safety Tips
When we use a social networking site, we should look at the site
together or search for it ourselves online.
We should not to post a full name, address, phone number, school
name and other personal information that could help a stranger to
find them.
We should learn about privacy settings that allow kids to choose
who can view their profiles.
When it comes to Internet safety, there's no substitute for parental
supervision. Put your computer in a common area of your home,
not a child's bedroom, so you can keep an eye on online
activities.
5
Result
It is important to identify which preventive strategies and programs are most effective in discouraging
cyberbullying and Internet aggression by youth. Further, there is not yet a clear understanding of the
demographic factors (gender, age, socioeconomic status, and race, etc.) associated with likelihood of
becoming a cyberbully or cyber victim. Research in this realm could help communities design more
individualized and effective prevention programs. These could include home-, school-, or community-based
strategies. The measures taken by adults (parents, educators, and government employees) to safeguard youth
from online risks often include:
 monitoring youth (through online technologies and software, or in-person supervision)
 educating youth about potential risks
 attempting to teach appropriate online behaviors.
It should be concluded that future education models and guiding principles must: “be developed in
partnership with young people, and acknowledge their expertise; be experiential as opposed to didactic;
combine online and face-to-face delivery; have scope to meet the specific technical skills needs of adults, as
well as providing capacity for high level conversations about the socio-cultural dimensions of young
people’s technology use; and be flexible and iterative so that they can keep pace with the emergence of new
online and networked media technologies and practices
6
7Discussion
Based on the evaluation of this literature revierized as at-risk when online. Although there
are many benefits to children and adolescents using the Internet for learning or improving
skills, there is obviously a need for regulation or restrictions on the sites they are
accessing and the amount of personal information they are providing to ‘friends’ or
‘relationships’ forged online. Without cautionary guidelines for children who go online,
there is an increased probability that they will experience exposure to some sort of
exploitation during their usage. With children and adolescents accessing the Internet
unsupervised for lengthy periods of time every day (118), further research needs to be
conducted on how many children are actually aware of the dangers of sexual predators
online or are aware of the consequences of sending sexually explicit photographs of
themselves via the World Wide Web (119). At the least, Member States should consider
fostering awareness of the risks of sending personal information and photos online
through school curricula and/or meetings between parents and teachers.
Conclusion
Adults are increasingly spending their discretionary time on the Internet, and
children and adolescents ” spend more time with media than they do in any
other activity except for sleeping” . However, because of the easy and often
private access to children that the Internet offers, it has provided a new
medium through which child exploitation, child maltreatment, and sexual
and emotional abuse can propagate. Broadly speaking, the Internet gives
child predators instant access to a large group of potential victims, as well as
the opportunity to create their own ‘communities’ to exchange ideas and
reinforce their prurient desires.
So we should have awareness of safe Internet.
8

Weitere ähnliche Inhalte

Was ist angesagt?

Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGJaveriaZain1
 
Protection of Students Online
Protection of Students Online Protection of Students Online
Protection of Students Online Wabel Alwabel
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementaryemilyensign
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?Securly
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
Communication Technology For Lifespan Communication
Communication Technology For Lifespan CommunicationCommunication Technology For Lifespan Communication
Communication Technology For Lifespan CommunicationD.J.Mann
 
Digital life
Digital lifeDigital life
Digital lifebobirv
 
Social Media Policy for our School District
Social Media Policy for our School DistrictSocial Media Policy for our School District
Social Media Policy for our School DistrictSallyLynnMcLean
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyCTIC Technology Centre
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymegbg
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your schoolJune Wall
 
The 6 Pillars of Digital Citizenship Success
The 6 Pillars of Digital Citizenship SuccessThe 6 Pillars of Digital Citizenship Success
The 6 Pillars of Digital Citizenship Successemilyensign
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterMark Moran
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatRaudhat-Rahma Shittu-Agbetola
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and schoolGrant Ward
 

Was ist angesagt? (20)

Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
Protection of Students Online
Protection of Students Online Protection of Students Online
Protection of Students Online
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
Communication Technology For Lifespan Communication
Communication Technology For Lifespan CommunicationCommunication Technology For Lifespan Communication
Communication Technology For Lifespan Communication
 
Digital life
Digital lifeDigital life
Digital life
 
Social Media Policy for our School District
Social Media Policy for our School DistrictSocial Media Policy for our School District
Social Media Policy for our School District
 
Introduction to Cybersafety
Introduction to CybersafetyIntroduction to Cybersafety
Introduction to Cybersafety
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
 
The 6 Pillars of Digital Citizenship Success
The 6 Pillars of Digital Citizenship SuccessThe 6 Pillars of Digital Citizenship Success
The 6 Pillars of Digital Citizenship Success
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhat
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 

Ähnlich wie Safe Internet Tips

ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...
CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...
CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...IJITE
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionThomas Müller
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftHeather Dionne
 
Guia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefGuia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefFAIR PLAY AD / @VeronicaRRSouza
 
Being safe online guidelines
Being safe online guidelinesBeing safe online guidelines
Being safe online guidelinesAVINASHRANJAN49
 
Parent meeting
Parent meetingParent meeting
Parent meetinglightb
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Ict and communication
Ict and communicationIct and communication
Ict and communicationnazri88
 
A 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseA 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseLouise Jones
 
Does the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docxDoes the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docxjacksnathalie
 
Unit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxUnit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxmarilucorr
 
CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP
 
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxSafeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxajav252888
 

Ähnlich wie Safe Internet Tips (20)

Cybersafey
Cybersafey Cybersafey
Cybersafey
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...
CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...
CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
Guia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefGuia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / Unicef
 
Being safe online guidelines
Being safe online guidelinesBeing safe online guidelines
Being safe online guidelines
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
SEG AT2.pptx
SEG AT2.pptxSEG AT2.pptx
SEG AT2.pptx
 
Ict and communication
Ict and communicationIct and communication
Ict and communication
 
A 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseA 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible Use
 
Does the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docxDoes the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docx
 
Unit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxUnit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docx
 
CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...
 
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxSafeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
 

Mehr von Sumaiya Ismail

Portfolio sumaiya ismail
Portfolio sumaiya ismailPortfolio sumaiya ismail
Portfolio sumaiya ismailSumaiya Ismail
 
Role of chemistry in cse
Role of chemistry in cseRole of chemistry in cse
Role of chemistry in cseSumaiya Ismail
 
Online resort reservation system report (practicum)
Online resort reservation system report (practicum)Online resort reservation system report (practicum)
Online resort reservation system report (practicum)Sumaiya Ismail
 
Comparative study of microprocessor perspective of historical preference
Comparative study of microprocessor perspective of historical preferenceComparative study of microprocessor perspective of historical preference
Comparative study of microprocessor perspective of historical preferenceSumaiya Ismail
 
Job description Format
Job description FormatJob description Format
Job description FormatSumaiya Ismail
 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer wormSumaiya Ismail
 
Products with chemical elements (chm 117)
Products with chemical elements (chm 117)Products with chemical elements (chm 117)
Products with chemical elements (chm 117)Sumaiya Ismail
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
Comparison and contrast on studying at north south university campus and stud...
Comparison and contrast on studying at north south university campus and stud...Comparison and contrast on studying at north south university campus and stud...
Comparison and contrast on studying at north south university campus and stud...Sumaiya Ismail
 
Food ordering system for red bangladesh course system ananlysis
Food ordering system for red bangladesh course system ananlysisFood ordering system for red bangladesh course system ananlysis
Food ordering system for red bangladesh course system ananlysisSumaiya Ismail
 
Landslide monitoring using wireless sensor network
Landslide monitoring using wireless sensor networkLandslide monitoring using wireless sensor network
Landslide monitoring using wireless sensor networkSumaiya Ismail
 
Food ordering system for red bd csc 397
Food ordering system for red bd csc 397Food ordering system for red bd csc 397
Food ordering system for red bd csc 397Sumaiya Ismail
 
CSC 347 – Computer Hardware and Maintenance
CSC 347 – Computer Hardware and MaintenanceCSC 347 – Computer Hardware and Maintenance
CSC 347 – Computer Hardware and MaintenanceSumaiya Ismail
 
Strategies of improving Communication between University & Students
Strategies of improving Communication between  University & Students Strategies of improving Communication between  University & Students
Strategies of improving Communication between University & Students Sumaiya Ismail
 
Spelling Bee Competition Slide for school
Spelling Bee Competition Slide for schoolSpelling Bee Competition Slide for school
Spelling Bee Competition Slide for schoolSumaiya Ismail
 

Mehr von Sumaiya Ismail (17)

Portfolio sumaiya ismail
Portfolio sumaiya ismailPortfolio sumaiya ismail
Portfolio sumaiya ismail
 
Role of chemistry in cse
Role of chemistry in cseRole of chemistry in cse
Role of chemistry in cse
 
Online resort reservation system report (practicum)
Online resort reservation system report (practicum)Online resort reservation system report (practicum)
Online resort reservation system report (practicum)
 
Comparative study of microprocessor perspective of historical preference
Comparative study of microprocessor perspective of historical preferenceComparative study of microprocessor perspective of historical preference
Comparative study of microprocessor perspective of historical preference
 
Job description Format
Job description FormatJob description Format
Job description Format
 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer worm
 
Cover letter
Cover letterCover letter
Cover letter
 
Products with chemical elements (chm 117)
Products with chemical elements (chm 117)Products with chemical elements (chm 117)
Products with chemical elements (chm 117)
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Comparison and contrast on studying at north south university campus and stud...
Comparison and contrast on studying at north south university campus and stud...Comparison and contrast on studying at north south university campus and stud...
Comparison and contrast on studying at north south university campus and stud...
 
Food ordering system for red bangladesh course system ananlysis
Food ordering system for red bangladesh course system ananlysisFood ordering system for red bangladesh course system ananlysis
Food ordering system for red bangladesh course system ananlysis
 
Landslide monitoring using wireless sensor network
Landslide monitoring using wireless sensor networkLandslide monitoring using wireless sensor network
Landslide monitoring using wireless sensor network
 
Food ordering system for red bd csc 397
Food ordering system for red bd csc 397Food ordering system for red bd csc 397
Food ordering system for red bd csc 397
 
CSC 347 – Computer Hardware and Maintenance
CSC 347 – Computer Hardware and MaintenanceCSC 347 – Computer Hardware and Maintenance
CSC 347 – Computer Hardware and Maintenance
 
Internet
InternetInternet
Internet
 
Strategies of improving Communication between University & Students
Strategies of improving Communication between  University & Students Strategies of improving Communication between  University & Students
Strategies of improving Communication between University & Students
 
Spelling Bee Competition Slide for school
Spelling Bee Competition Slide for schoolSpelling Bee Competition Slide for school
Spelling Bee Competition Slide for school
 

Kürzlich hochgeladen

SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistKHM Anwar
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 

Kürzlich hochgeladen (20)

SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization Specialist
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 

Safe Internet Tips

  • 1. Safe Internet SUMAIYA ISMAIL ID- COURSE CODE: ART-203 PROGRAM: BCSE 1
  • 2. Abstract The Internet is by now embedded in daily life. In our personal lives and in our society. It is an irreversible technology. But in relatively short existence it has created many issues concerning security and safety. These include issues towards personal information and theft and misuse thereof, and specific risks towards children like online bullying and grooming. To raise public awareness into safe Internet use, campaigns have emerged. However, research shows that the effects of these campaigns prove to be hard to realize. 2
  • 3. Introduction  Without the virtues and possibilities of internet life cannot be imagined.  The fast rise of internet also created many debates regarding safety and security issues.  The effectiveness of campaigns is being questioned.  Internet is being used by teenagers and children, so internet safety should be maintained. 3
  • 4. Literature Review  The Internet presents a world of opportunities for children and adolescents, but it also threatens communities with inappropriate content, cyberbullying among peers, and online predators – whether that is via connection to the Internet at home, in a cybercafé, or by Smartphone.  Various websites have been created for the purpose of making users aware of Internet safety. Many governments throughout Europe, large banks and ICT companies, and other organisations have created websites that provide information and guidance on Internet safety. For example the EU website Safer Internet Programme, the safety section on the Dutch banks ING website, and MicroSoft's Safety & Security Centre. 4
  • 5. Internet Safety Tips When we use a social networking site, we should look at the site together or search for it ourselves online. We should not to post a full name, address, phone number, school name and other personal information that could help a stranger to find them. We should learn about privacy settings that allow kids to choose who can view their profiles. When it comes to Internet safety, there's no substitute for parental supervision. Put your computer in a common area of your home, not a child's bedroom, so you can keep an eye on online activities. 5
  • 6. Result It is important to identify which preventive strategies and programs are most effective in discouraging cyberbullying and Internet aggression by youth. Further, there is not yet a clear understanding of the demographic factors (gender, age, socioeconomic status, and race, etc.) associated with likelihood of becoming a cyberbully or cyber victim. Research in this realm could help communities design more individualized and effective prevention programs. These could include home-, school-, or community-based strategies. The measures taken by adults (parents, educators, and government employees) to safeguard youth from online risks often include:  monitoring youth (through online technologies and software, or in-person supervision)  educating youth about potential risks  attempting to teach appropriate online behaviors. It should be concluded that future education models and guiding principles must: “be developed in partnership with young people, and acknowledge their expertise; be experiential as opposed to didactic; combine online and face-to-face delivery; have scope to meet the specific technical skills needs of adults, as well as providing capacity for high level conversations about the socio-cultural dimensions of young people’s technology use; and be flexible and iterative so that they can keep pace with the emergence of new online and networked media technologies and practices 6
  • 7. 7Discussion Based on the evaluation of this literature revierized as at-risk when online. Although there are many benefits to children and adolescents using the Internet for learning or improving skills, there is obviously a need for regulation or restrictions on the sites they are accessing and the amount of personal information they are providing to ‘friends’ or ‘relationships’ forged online. Without cautionary guidelines for children who go online, there is an increased probability that they will experience exposure to some sort of exploitation during their usage. With children and adolescents accessing the Internet unsupervised for lengthy periods of time every day (118), further research needs to be conducted on how many children are actually aware of the dangers of sexual predators online or are aware of the consequences of sending sexually explicit photographs of themselves via the World Wide Web (119). At the least, Member States should consider fostering awareness of the risks of sending personal information and photos online through school curricula and/or meetings between parents and teachers.
  • 8. Conclusion Adults are increasingly spending their discretionary time on the Internet, and children and adolescents ” spend more time with media than they do in any other activity except for sleeping” . However, because of the easy and often private access to children that the Internet offers, it has provided a new medium through which child exploitation, child maltreatment, and sexual and emotional abuse can propagate. Broadly speaking, the Internet gives child predators instant access to a large group of potential victims, as well as the opportunity to create their own ‘communities’ to exchange ideas and reinforce their prurient desires. So we should have awareness of safe Internet. 8