Download
concept internet safety n.
Skip this Video
Loading SlideShow in 5 Seconds..
Concept: Internet Safety PowerPoint Presentation
Download Presentation
Concept: Internet Safety

Concept: Internet Safety

75 Views Download Presentation
Download Presentation

Concept: Internet Safety

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Who You Are ~ Learning About Yourself ~ Unit Essential Questions How can my principles, skills, and interests help me be successful in life? Concept: Internet Safety

  2. Lesson Essential Questions • What are acceptable uses for social networking? • How do I stay safe when using a social network? • How can a desktop publishing program help me present facts in an eye-catching manner?

  3. Internet Safety • Cyber-bullying • Netiquette • Private Information • Personal Information • Predators • Privacy • Social Network

  4. What do you think Internet Safety means?

  5. Flame ~ • Spam ~ • Mail Bomb ~ • Shouting ~ • FAQ ~ Netiquette; Etiquette on the Internet

  6. Social Network

  7. How much time do you spend on a Social Network on a daily basis? 2. What social network(s) do you use?

  8. Instant Messaging . . . IM & Texting • A way to ___________with friends • _______ are you texting and ______ are you saying • Personal info???? • Some instant message services make it possible to exchange messages with several people at once — just like a ___________. • _____________________could be forwarded to other people. • Is the person you are texting ________? • There is no way to __________something once you enter it.

  9. A free online video hosting community which allows you to upload, view, and share video clips with others. • The internet’s biggest website for sharing videos online. • It only takes ONE video on YouTube to damage your reputation!

  10. Friends only??? • Dangers of posting photos and videos. • You alone decide who sees what side of you on the Internet! • Videos on Youtube can be downloaded and saved to anyone’s computer. • The _________________________ • “Would you want your grandmother to see the picture or video?”

  11. Cyber-bullying Also known as: ____________________________ ____________________________

  12. Write one reason why you think someone might engage in cyber-bullying. 1.

  13. Pennsylvania is ranked 4th in the nation for cyber-bullying. _____of teens reported being bullied at school. _____ of students bully others, OFTEN. _____ had rumors or gossip spread about them. _____ have been physically bullied. _____ of bullying happened inside the school. _____ of bullying was on school grounds, buses, or on the way to school. _____ of the victims reported the bullying to someone at school Source: Bureau of Justice Statistics, US Dept. of Health & Human Services, Cyberbullying Research Center, 7-26-2012 Bullying Statistics

  14. Cyber Bullying Statistics _____ of students reported being cyber bullied. _____ of teens have experienced cyber threats. _____ of teens have been bullied repeatedly through their cell phones of the Internet. _____ do not tell their parents when bullying occurs. _____ of teens have had embarrassing or damaging pictures taken of themselves without their permission. (often with a cell phone) Source: Bureau of Justice Statistics, US Dept. of Health & Human Services, Cyberbullying Research Center, 7-26-2012

  15. What would you do if you or someone you know is being cyber-bullied?

  16. 1. 2. 3. 4. 5. 6. 7. What to do if you experience cyber-bullying.

  17. Personal Information ~ Private Information ~ Privacy= Personal Information vs. Private Information

  18. Predators establish contact with children through conversations in: • Chat rooms, instant messaging, texting, e-mail, discussion boards, and social networking sites. • Predators prey on “vulnerable victims.” • Online predators try to gradually seduce their targeted victims through • attention • affection • kindness • gifts Predator ~

  19. PASSWORDS ???? The Basics

  20. PASSWORDS ???? Passwords should not be:

  21. GOOD VS. BAD PASSWORDS

  22. Final Reflection Questions • What are acceptable uses for social networking? (100 words) • How do I stay safe when using a social network? (100 words)