internet safety - tech for students and families€¦ · internet safety iiiiiiiiiiiiiiiiiiiiiiiiii...

9
Internet Safety iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii

Upload: others

Post on 20-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Internet Safety - Tech for Students and Families€¦ · Internet Safety iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii. The internet is like a community,

!Internet Safety

iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

Page 2: Internet Safety - Tech for Students and Families€¦ · Internet Safety iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii. The internet is like a community,

The internet is like a community, but it is linked electronically. !!!!! !!!

Just like a physical community, the internet has appropriate as well as

inappropriate places to visit. !In a physical community, you know the inappropriate places to go so it is easy to avoid them. Online, however, sometimes getting to an inappropriate place is as easy as accidentally clicking a link from a search, advertisement or e-mail that SEEMS perfectly appropriate. !

So what do you do if you end up somewhere you didn’t mean to be?

!!!!!

The best thing to do is EXIT immediately. !

Some sites are designed to prevent you from exiting through a process called looping. If you find yourself on this type of website it may be necessary to turn the computer OFF!

Page 3: Internet Safety - Tech for Students and Families€¦ · Internet Safety iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii. The internet is like a community,

!

Privacy and Private Identity

Information!Each time you share information

about yourself online, stop and think: “Am I giving out information that I should keep private?”

These kinds of facts should be kept private because they could be used for identity theft.

Private Identity Information is... !

!!!!!!!!

Do you share Private Identity Information

online?

➡First and Last Name ➡Postal Address ➡Email Address ➡Phone Numbers ➡Passwords ➡Credit Card Numbers ➡Social Security Numbers ➡Mother’s Maiden Name

Page 4: Internet Safety - Tech for Students and Families€¦ · Internet Safety iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii. The internet is like a community,

!Protect Yourself!

...and your Digital Footprint!!

iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

Page 5: Internet Safety - Tech for Students and Families€¦ · Internet Safety iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii. The internet is like a community,

!

!NEVER meet someone face to face that you’ve only met online.

Online Predators

Online predators find their “prey” by going to sites or chat rooms where young people gather or by searching for a

specific type of victim. Predators use a process to “groom” their victims, which usually follows this pattern:

1.Establishes similar interests. 2.Builds trust. 3.Keeps it a secret. 4.Breaks down barriers. 5.Makes threats. 6.Meets face to face.

Page 6: Internet Safety - Tech for Students and Families€¦ · Internet Safety iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii. The internet is like a community,

!

Cyberbullying is bullying that takes place using technology. Examples of cyberbullying include mean text messages or

emails, rumors sent by email or posted on social networking sites, and embarrassing pictures,

videos, websites, or fake profiles.

Cyberbullying

iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

Page 7: Internet Safety - Tech for Students and Families€¦ · Internet Safety iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii. The internet is like a community,

!

5 Q’s To Stop Bullying:

One of the main reasons why bullying is not addressed is that the bully tells teachers, the Principal, or their parents that they were just

“playing around” with the victim.

Here are five questions that determine a student’s intentions:

1. If someone I didn’t know came up to me and hit me or said something rude to me in front of my friends, would I laugh and think it was funny? Would I do the same thing to a total stranger that I just did to my “friend”?

2. If the person I just “played around” with did the exact same thing to ME in front of my friends, would I laugh and think it was funny?

3. Was this the first time I hit, kicked, made a joke about, or otherwise “played around” with this person?

4. Would I sit at the same lunch table with the person I just “played around” with? Would I invite this person to my house to hang out and/or play?

5. Did I stop bothering this person immediately after they asked me to stop?

iiiii

Page 8: Internet Safety - Tech for Students and Families€¦ · Internet Safety iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii. The internet is like a community,

!

What would you do?

Page 9: Internet Safety - Tech for Students and Families€¦ · Internet Safety iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiiiiiiiiiii. The internet is like a community,

FACT: If you copy someone else’s intellectual property and present it as your own, you are plagiarizing. plagiarizing includes cutting and pasting from the internet, copying out of books, copying pictures, etc. without giving credit to the person who actually created that intellectual property. Plagiarizing is ILLEGAL because it violates copyright law and is punishable by the US Government. !

Some information in this presentation was obtained from the following sites:

Cyberbullying Published by SocialMediaPD

. !Internet Safety, Prezi

by Jane Lenser

commonsensemedia.org