concept: internet safety
DESCRIPTION
Who You Are ~ Learning About Yourself ~. Unit Essential Questions How can my principles, skills, and interests help me be successful in life?. Concept: Internet Safety. Lesson Essential Questions What are acceptable uses for social networking? - PowerPoint PPT PresentationTRANSCRIPT
Concept: Internet Safety
Who You Are~ Learning About
Yourself ~Unit Essential Questions
How can my principles, skills, and interests help me be successful in life?
Lesson Essential Questions
1. What are acceptable uses for social networking?
2. How do I stay safe when using a social network?
3. How can a desktop publishing program help me present facts in an eye-catching manner?
Netiquette
Cyber-bullying
Social NetworkPrivate Information
Predators
Personal Information
Internet Safety
Privacy
What do you think
Internet Safety
means?
1
Netiquette; Etiquette on the Internet 2
Flame ~ Spam ~ Mail Bomb ~ Shouting ~ FAQ ~
Social Network
3
1. How much time do you spend on a Social
Network on a daily basis?
2. What social network(s) do you use?
4
Instant Messaging . . . IM
& Texting
7
A way to ___________with friends _______ are you texting and ______ are you saying Personal info???? Some instant message services make it possible to exchange messages with several people at once — just like a ___________. _____________________could be forwarded to other people. Is the person you are texting ________? There is no way to __________something once you enter it.
8
The internet’s biggest website for sharing videos online.
It only takes ONE video on YouTube to damage your reputation!
A free online video hosting community which allows you to upload, view, and share video clips with others.
9
Friends only???
Dangers of posting photos and videos.
You alone decide who sees what side of you on the Internet!
Videos on Youtube can be downloaded and saved to anyone’s computer.
The _________________________“Would you want your grandmother to see the picture or video?”
Cyber-bullying
Also known as:
____________________________
____________________________
10
Write one reason why you think someone might engage in cyber-bullying.1.
11
12
Bullying Statistics1. Pennsylvania is ranked 4th in the nation for
cyber-bullying.2. _____of teens reported being bullied at
school.3. _____ of students bully others, OFTEN.4. _____ had rumors or gossip spread about
them.5. _____ have been physically bullied.6. _____ of bullying happened inside the
school.7. _____ of bullying was on school grounds,
buses, or on the way to school.8. _____ of the victims reported the bullying to
someone at school
Source: Bureau of Justice Statistics, US Dept. of Health & Human Services, Cyberbullying Research Center, 7-26-2012
12
1. _____ of students reported being cyber bullied.
2. _____ of teens have experienced cyber threats.
3. _____ of teens have been bullied repeatedly through their cell phones of the Internet.
4. _____ do not tell their parents when bullying occurs.
5. _____ of teens have had embarrassing or damaging pictures taken of themselves without their permission. (often with a cell phone)
Source: Bureau of Justice Statistics, US Dept. of Health & Human Services, Cyberbullying Research Center, 7-26-2012
Cyber Bullying Statistics
What would you do if you or someone you know is being cyber-bullied?
13
1.
2.
3.
4.
5.
6.
7.
What to do if you experience cyber-bullying.
14
Personal Information vs. Private InformationPersonal Information ~
Private Information ~
Privacy =
16
Predators establish contact with children through conversations in:
Chat rooms, instant messaging, texting, e-mail, discussion boards, and social networking sites.
Predators prey on “vulnerable victims.”
Online predators try to gradually seduce their targeted victims through
attention affection kindness gifts
Predator ~
19
PASSWORDS ????
23
The Basics
1.
PASSWORDS ????
23
Passwords should not be:
1.
GOOD VS. BAD PASSWORDS
23
GOOD BAD
Final Reflection Questions
1. What are acceptable uses for social networking? (100 words)
2. How do I stay safe when using a social network? (100 words)
25