1 / 18

brainpop/socialstudies/culture/onlinesafety /

http://www.brainpop.com/socialstudies/culture/onlinesafety /. Name: . Look at the screen names below. As a class, brainstorm what each says about the person who chose it. Then put the names in order from least informative (1) to most informative (5). Rank. Screen Name.

elana
Download Presentation

brainpop/socialstudies/culture/onlinesafety /

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. http://www.brainpop.com/socialstudies/culture/onlinesafety/ Name:

  2. Look at the screen names below. As a class, brainstorm what each says about the person who chose it. Then put the names in order from least informative (1) to most informative (5). Rank Screen Name Information Revealed Jessica4dance Smithstealshome Bayareababe Dancinfun Fred14 Think about your own screen name. What does it say about you? When you choose a screen name you want something that allows you to remain anonymous, or unknown. Don’t include personal information. Why do you think you shouldn’t include personal information

  3. Password Protection Look at the information about each person below. What are some common and obvious guesses as to what their passwords might be? Write your guess in the boxes below each name. John- Lives in the Tampa Bay area where the Bucs play. He is a really big fan. He loves football. Jessica- Loves all the popular music groups. She is head over heals in love with Justin Timberlake. Ali- Ali is afraid to forget his password. He wants something simple she will always remember.

  4. Internet Communication Internet communication is an exciting area. There are many ways to communicate online. Chatting - real time messaging where everyone in the chat room can read what you post and reply. Instant messaging - real time messaging between two people. Bulletin boards - you leave a message for others to read at a later time. Email - electronic mail addressed to specific people. Insert pictures showing the four ways to communicate on line

  5. Don’t give out personal info While communicating on the Internet, you need to be sure that you stay safe. To do this, make sure you don't reveal information about yourself that others could use to harm you. Private information includes: Your Name Address Phone Number Friends and family names What you look like Your Date of birth Your age Your school Your social security # Insert too much info picture or warning picture above

  6. Remember –online actions can have real life consequences Look at what each person does below. What are the consequences of their actions? What other possible things could have happened? On your paper, brainstorm possible effects. 1. Janice reveals her name and age to an online chat buddy.Effect: The online chat buddy turns out to be a predator who lures her to a meeting and possibly harms her.Other possible effects/consequences to her actions: Insert a picture

  7. Mark uses his email address as a screen name for a bulletin board. Effect: His email box is flooded with spam, retail announcements, etc.Other possible effects/consequences: Insert picture

  8. Sarah is a big fan of her local football team – the Dallas Cowboys. Everyone at school knows this. Her password is Cowboygirl. Effect: Sarah’s ex boyfriend has an idea of her password, guesses it, and uses her account to send bad email to others. Now everyone is mad at her. Other possible effects/consequences: Insert picture

  9. When Andy signed up for AOL instant messaging, he filled out his personal profile with all his information. Effect: Everyone on the Internet can find out who he is and what he posted. They can use this information in any way. Other possible effects/consequences: Insert picture

  10. Chad has been emailing a girl he met online. She asks him to send a picture. He does. Effect: Chad was browsing the web and finds his picture, but its been changed so that he looks like he weighs 500 lbs. Other possible effects/consequences: Insert picture

  11. Safe Website Design

  12. The PlanIn this lesson you will be adding to your knowledge on how to safely design a website. You will be evaluating a sample website for safety tips.

  13. Questions Why do some people build personal websites? Do you have your own website? If you had a personal website – what would it include? What are potential dangers of having a personal website?

  14. All right – Let’s take a look at a website U:\iSAFE\Click on this link to take a look at Trina’s website 5\Appropriate Use\SafeWebsiteDesign\Safe Website Design\Trina Home.htm What did Trina do wrong with her website?

  15. Question 1 What types of information did Trina’s webpage give away?

  16. Question 2 What were some areas for potential danger on Trina’s webpage?

  17. Question 3 How could Trina’s webpage be made safer?

More Related