Who You Are ~ Learning About Yourself ~ Unit Essential Questions How can my principles, skills, and interests help me be successful in life? Concept: Internet Safety
Lesson Essential Questions • What are acceptable uses for social networking? • How do I stay safe when using a social network? • How can a desktop publishing program help me present facts in an eye-catching manner?
Internet Safety • Cyber-bullying • Netiquette • Private Information • Personal Information • Predators • Privacy • Social Network
Flame ~ • Spam ~ • Mail Bomb ~ • Shouting ~ • FAQ ~ Netiquette; Etiquette on the Internet
How much time do you spend on a Social Network on a daily basis? 2. What social network(s) do you use?
Instant Messaging . . . IM & Texting • A way to ___________with friends • _______ are you texting and ______ are you saying • Personal info???? • Some instant message services make it possible to exchange messages with several people at once — just like a ___________. • _____________________could be forwarded to other people. • Is the person you are texting ________? • There is no way to __________something once you enter it.
A free online video hosting community which allows you to upload, view, and share video clips with others. • The internet’s biggest website for sharing videos online. • It only takes ONE video on YouTube to damage your reputation!
Friends only??? • Dangers of posting photos and videos. • You alone decide who sees what side of you on the Internet! • Videos on Youtube can be downloaded and saved to anyone’s computer. • The _________________________ • “Would you want your grandmother to see the picture or video?”
Cyber-bullying Also known as: ____________________________ ____________________________
Write one reason why you think someone might engage in cyber-bullying. 1.
Pennsylvania is ranked 4th in the nation for cyber-bullying. _____of teens reported being bullied at school. _____ of students bully others, OFTEN. _____ had rumors or gossip spread about them. _____ have been physically bullied. _____ of bullying happened inside the school. _____ of bullying was on school grounds, buses, or on the way to school. _____ of the victims reported the bullying to someone at school Source: Bureau of Justice Statistics, US Dept. of Health & Human Services, Cyberbullying Research Center, 7-26-2012 Bullying Statistics
Cyber Bullying Statistics _____ of students reported being cyber bullied. _____ of teens have experienced cyber threats. _____ of teens have been bullied repeatedly through their cell phones of the Internet. _____ do not tell their parents when bullying occurs. _____ of teens have had embarrassing or damaging pictures taken of themselves without their permission. (often with a cell phone) Source: Bureau of Justice Statistics, US Dept. of Health & Human Services, Cyberbullying Research Center, 7-26-2012
What would you do if you or someone you know is being cyber-bullied?
1. 2. 3. 4. 5. 6. 7. What to do if you experience cyber-bullying.
Personal Information ~ Private Information ~ Privacy= Personal Information vs. Private Information
Predators establish contact with children through conversations in: • Chat rooms, instant messaging, texting, e-mail, discussion boards, and social networking sites. • Predators prey on “vulnerable victims.” • Online predators try to gradually seduce their targeted victims through • attention • affection • kindness • gifts Predator ~
PASSWORDS ???? The Basics
PASSWORDS ???? Passwords should not be:
Final Reflection Questions • What are acceptable uses for social networking? (100 words) • How do I stay safe when using a social network? (100 words)