1 / 16

Cyber Security & Safety

Cyber Security & Safety. Introduction. Cyberbullying Social Networking Blogging Cell Phone. Cyberbullying. What is Cyberbullying?. Using Technology to Embarrass, Humiliate, Threaten, or Intimidate Someone Else. Ways of Cyberbullying:

teneil
Download Presentation

Cyber Security & Safety

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security & Safety

  2. Introduction • Cyberbullying • Social Networking • Blogging • Cell Phone

  3. Cyberbullying • What is Cyberbullying? • Using Technology to Embarrass, Humiliate, Threaten, or Intimidate Someone Else • Ways of Cyberbullying: • Flaming – Online fighting • Harassment – Repeat Messages • Impersonation – Identity Theft • Denigration – “Dissing”, Gossip, and Rumors • Stalking – Repeat Harassment and Denigration

  4. Ways to Prevent Cyberbullying • Never Pass Along Harmful or Cruel Messages • Do Not Respond • Tell Parent or Adult About Any Cyberbullying • Tell Friends Who Are Cyberbullying to Stop • Never Give Out Any Personal Information

  5. Cyberbullying • Kylie Kenney – 8th Grade Girl from Vermont1 • Cyberbullies Built “Kill Kylie Incorporated” Website • Used Her Screen Name to Send Harassing Messages to Her Teammates • Elizabeth A. Thrasher – 40 yr. old from Missouri2 • Ex-husband’s New Girlfriend’s 17 yr. old Daughter • Posted Personal Information • Felony With up to 4 Years in Prison 1: Source: By Suzanne Struglinski, Deseret News. Published: Friday, Aug. 18, 2006. Retrieved from http://www.deseretnews.com/article/1,5143,645194065,00.html?pg=1 2: Source: Associated Press. Published: Saturday Aug. 18, 2009. Retrieved from http://www.cbsnews.com/stories/2009/08/18/tech/main5249367.shtml

  6. Social Networking • What Is Social Networking? • Putting Individuals Into Networks/Groups • Popular Online Activity • Websites Are Social Sites • Facebook • MySpace • Twitter

  7. Social Networking • Do: • Talk To Your Parent Before Joining A Social Network • Always Tell Your Parents: • What You Are Up To • How You Met Your Friends • Where You Browse Online • Set Up Privacy Setting for You Online Profile • Trust Your Gut • If You Have Suspicions, Feel Threatened or Uncomfortable, Tell an Adult you Trust! • Report it to the Police & Social Networking Site • You Could Help Prevent Someone Becoming a Victim

  8. Social Networking • Don’t: • Ever Post Anything You Wouldn’t Show Your Parent or Wouldn’t Want Them to See • Post Personal Information on the Internet • Use Your Phone Number, Address, SSN, DOB, or Other Contact Information • Add Anyone to Your Page Unless You Have Met Them In Person • Arrange to Meet an Internet Friend Alone

  9. Social Networking • Middle School Boy Liked a Girl1 • Used Cell Phone to Access Facebook Search • Accidentally Posted Her First & Last Name as His Status • Rudy Giuliani’s Daughter2 • No Privacy Settings • Posted Support for President Obama 1: Source: True Facebook Stories, Retrieved on 11/13/09 from: http://vote.facebook-horror-stories.com/items/Facebook_on_my_phone_mishap 2: Source: By Lucy Marrow Caldwell Washington Post/Slate. Posted: Monday, Aug. 6, 2007. Retrieved on 11/18/09 from http://www.slate.com/id/2171730

  10. Blogging • What is a Blog? • Personal Online Journal that is Frequently Updated and Intended for the General Public to See • What is Blogging? • Adding an Entry or Entries to a Blog • Problems: • Misunderstood Comments • Not Private • Shared with the World

  11. Cell Phone • Do: • Give Your Number to People You Know & Trust • Keep it Stored in a Safe Place • Keep Your Keypad Locked • Don’t: • Reply to Messages From People You Don’t Know • Give Out Other’s Number Without Permission • Use to Cheat at School • Take Pictures or Videos of Someone Without their Permission

  12. Sexting • What is Sexting? • Texting Sexually Explicit or Nude Photos • Can Have Damaging Consequences • Friends Can Become Ex-Friends • Blackmail • Sent to Everyone You Know & Don’t Know • Once Posted Online, Can’t Take Back • Damaged Reputation

  13. Sexting • 30-6A-3. Sexual exploitation of children. • A.     It is unlawful for a person to intentionally possess any obscene visual or print medium depicting any prohibited sexual act or simulation of such an act if that person knows or has reason to know that the obscene medium depicts any prohibited sexual act or simulation of such act and if that person knows or has reason to know that one or more of the participants in that act is a child under eighteen years of age.  A person who violates the provisions of this subsection is guilty of a fourth degree felony. • Points to Take Away: • In the State of New Mexico It is a Crime to • Send, Store, & Receive These Types of Pictures • Minor: One Under the Age of 18 • 4th Degree Felony Source: State of New Mexico. Sexual Exploitation of Children Act. Retrieved November 16, 2009 from http://www.conwaygreene.com/nmsu/lpext.dll?f=templates&fn=main-hit-h.htm&2.0

  14. Group Exercise • Scenario: • A group of girls were fighting with one of their friends, Nicole. They created a “Rate Nicole” group on a social networking site. They posted embarrassing photos of Nicole from middle school and high school and invited their hundreds of “friends” to join the group to look at the photos, and tell Nicole how she stacked up. Cruel and crude comments were posted on the group’s message board. One message said that some girls were planning to beat up Nicole. At school, Nicole got text messages on her cell phone saying, “Take a look at what everyone thinks of you.” • What is the Problem? • Used Nicole’s Photos without Permission • Harassing Comments • Threats of Physical Violence • What is a Possible Solution? • Tell a Trusted Adult or Parent • Contact Social Networking Site • Contact Police Department

  15. QUESTIONS

  16. References • http://interchildrelationships.suite101.com/article.cfm/cell_phone_rules_for_teens • http://www.thesafespace.org/pdf/handout-safety-plan-workbook-teens.pdf • http://www.idthecreep.com/ • http://www.education.vic.gov.au/management/elearningsupportservices/www/classroom/lessonplans.htm • http://www.cybernetrix.com.au/ • http://www.onguardonline.gov/games/overview.aspx • http://www.kidscom.com/games/isg/isg.html • http://familyinternet.about.com/od/computingsafetyprivacy/a/cyberbully.htm • http://www.surfnetkids.com/safety/protecting_your_children_from_being_victims_from_social_networking_hoaxes-29972.htm • http://teenadvice.about.com/od/streetsmarts/a/onlinefriends_2.htm • http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec14.shtm • http://www.wiredsafety.org/safety/chat_safety/phone_safety/sms7.html • http://www.safekids.com/cell-phone-safety-tips/ • http://www.cyberbullying.us/Top_Ten_Teen_Tips_Cell_Phones.pdf • http://www.conwaygreene.com/nmsu/lpext.dll?f=templates&fn=main-hit-h.htm&2.0

More Related