SlideShare a Scribd company logo
1 of 30
Be Cyber-Smart!
Surf Safely!
Velma Davis,
Instructional Support
Specialist
VDavis1@usd259.net
Know your internet areas
• Email
• Chat rooms
• Game rooms
• Blogs (Blogger)
• Microblogs (Twitter,
Plurk)
• Bulletin Boards
(Myspace, Facebook)
• Instant Messaging
Protocols? What protocols?!
Radios: gained
popularity in 20’s
and 30’s
Television: Late
1940’s
Internet
Explosio
n: 1990’s
Your mother warned you:connectyourhome.com
Teens Online • 82% of profile creators included their first
name in their profiles.
• 79% have included photos of themselves.
• 66% have included photos of their friends.
• 61% have included the name of their city.
• 49% have included the name of their
school.
• 40% have included their instant message
screen name.
• 40% have streamed audio to their profile.
• 39% have linked to their blog.
• 29% have included their email address.
• 29% have included their last name.
• 29% have included videos.
• 2% have included their cell phone
numbers.
http://www.marketingcharts.com/interactive/teens-and-social-networks-managing-personal-information-274/
PEW Report, 2008
Am I really 10 years old?Am I really 10 years old?
Who am I REALLY?!
Is that really a picture of
me?
Am I aAm I a
boy?boy?
Do I really goDo I really go
to school?to school?
Risks? Highest risk to Teenagers!
“Teenagers are particularly at risk because... they are
more likely... to participate in online discussions
regarding companionship..."LOL
LMAO
TY
BRB
AWFK
YW
RU
Y
ASL
POS
LMIRL
WTF
OMG
Laugh out loud
Laughing my A$$ off
Thank You
Be Right Back
Away from
keyboard/computer
You’re Welcome
Are you?
Why?
Age, sex and location
Parent Over Shoulder
Lets Meet In Real Life
What the F$%#
Oh my God
http://en.wikipedia.org/wiki/Internet_slang
Leet Speak
Remember …“Hip”,
“Groovy”, “Peace out”?
“Leet” refers to “Elite”.
Substitutes regular letters
for symbols or numbers
Further information for Leet Speak:
http://en.wikipedia.org/wiki/Leet
http://www.brenz.net/services/l337Maker.asp
cartoonstock.com
0 - O
1- I or L
2- A, Z or R
3- E
4- A
5- S
6- B or G
7- T or L
8- B
9- G or P
£- L or E
Think Before You Click!
• Domains- The extensions on a website
can indicate their purpose:
.com- commercial
.biz- business
.org- organization
.gov- government
.edu- education
.net- network
.xxx- pornography
blog.andyswebtools.com
Virus
A computer virus is a computer program that
can copy itself and infect a computer without
permission or knowledge of the user.
hugepedia.com
Worm
• A computer worm is a
selfreplicating computer
program. It uses a network
to send copies of itself to
other nodes computer
terminals on the network).
• Worms almost always
cause harm to the network,
if only by consuming
bandwidth, whereas
viruses almost always
corrupt or modify files on a
targeted computer.
Spyware
• Collects small pieces of information
about users without their knowledge
• Installs on your computer
• Secretly monitors the user's computing:
can collect various types of
personal information, such as Internet
surfing habits and sites that have been
visited
• Can install additional software and
redirect Web browser activity.
• Changes computer settings:
– Slow connection speeds,
– Changes your home pages,
– Loss of Internet connection
– Loss of functionality of other programs.
http://en.wikipedia.org/wiki/Spyware
Malware
– Rogue or malicious programs can attack and
do various things to your computer while
surfing the internet.
– Hostile, intrusive, or annoying software or
program code
Phishing
Phishing is a way of attempting to acquire
sensitive information such as usernames,
passwords and credit card details by
masquerading as a trustworthy entity in an
electronic communication.
thenextweb.com
Suggestions?
joystickdivision.com
AntiVir PE
• http://www.avira.com/en/avira-free-antivirus
Avira AntiVir Personal - Free Antivirus
Protects your computer against dangerous
viruses.
AVG
• A great Anti-virus
and Anti-Malware
program.
Free Download:
http://free.avg.com/ww-en/download-avg-anti-virus-free
Firewall
• A firewall is a
device or set of
devices
configured to
permit, deny,
encrypt, or
monitor internet
connections
between online
traffic and your
computer.
Windows 07 comes with a built-in Firewall.
Blocking or Filtering
http://internet-filter-review.toptenreviews.com/
Compare software:
Digital Footprint
• What does your digital footprint look like?
• Keeping your
personal details
private. Not
sharing
• Thinking before you
post
• Not posting things
that you don't want
others to know
about or that you
wouldn’t say to their
face.
•
My Rules for Internet Safety!
I will not give out
personal information
such as my address,
telephone number,
parents’ work
address/telephone
number, or the name
and location of my
school without my
parents’ permission
cartoonstock.com
I will tell my parents right away if I
come across any information that
makes me feel uncomfortable
Boy, am I uncomfortable!
I will never agree to get together
with someone I "meet" online!
celebrityradar.info
I will never send a
person my
picture or
anything else
without first
checking with my
parents
I will not respond
to any
messages that
are mean or in
any way make
me feel
uncomfortable.
It is not my fault
if I get a
message like
that. If I do I will
tell my parents
right away.
• I will not download
pictures from an
unknown source,
as there is a good
chance there could
be sexually explicit
images.
• time of day that I can be
online,
• the length of time I can
be online,
• appropriate areas for
me to visit.
I will not access other
areas or break these
rules without their
permission.
I will talk with my parents so that we can
set up rules for going online.
cartoonstock.com
Helpful Sites
• http://www.onlinenetiquette.com/netiquette_quiz.html
• www.netzsmartz.org
• www.safeteens.com
• www.blogsafety.com
• www.netfamilynews.org
• http://www.slideshare.net/jtubbs/internet-safety-program-for-par
• http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec14.shtm
• http://www.cybersmart.gov.au/Kids/Get%20the
%20facts/Digital%20footprint.aspx
Bibliography
• www.netzsmartz.org
• www.safeteens.com
• www.safekids.com Lawrence J. Magid
• www.blogsafety.com
• www.netfamilynews.org
• http://dsc.discovery.com/convergence/koppel/int
eractive/interactive.html
• http://pewresearch.org/

More Related Content

What's hot

Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 

What's hot (18)

Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Surfer Dude
Surfer DudeSurfer Dude
Surfer Dude
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Internet safety
Internet safety Internet safety
Internet safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Viewers also liked

無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731Hika Hika
 
Google Magic2
Google Magic2Google Magic2
Google Magic2Velma
 
無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731Hika Hika
 
A Concise Guide - Growing an E-Commerce Business
A Concise Guide - Growing an E-Commerce BusinessA Concise Guide - Growing an E-Commerce Business
A Concise Guide - Growing an E-Commerce BusinessAmir Y
 
バイラルまとめ
バイラルまとめバイラルまとめ
バイラルまとめHika Hika
 
無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731Hika Hika
 
利用 Lab View 進行整合式機器人系統概念教學
利用 Lab View 進行整合式機器人系統概念教學利用 Lab View 進行整合式機器人系統概念教學
利用 Lab View 進行整合式機器人系統概念教學riobotics
 

Viewers also liked (8)

無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731
 
Google Magic2
Google Magic2Google Magic2
Google Magic2
 
無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731
 
A Concise Guide - Growing an E-Commerce Business
A Concise Guide - Growing an E-Commerce BusinessA Concise Guide - Growing an E-Commerce Business
A Concise Guide - Growing an E-Commerce Business
 
バイラルまとめ
バイラルまとめバイラルまとめ
バイラルまとめ
 
Nanaa
NanaaNanaa
Nanaa
 
無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731
 
利用 Lab View 進行整合式機器人系統概念教學
利用 Lab View 進行整合式機器人系統概念教學利用 Lab View 進行整合式機器人系統概念教學
利用 Lab View 進行整合式機器人系統概念教學
 

Similar to Becybersmart 110605083310-phpapp02

8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 
Evans on Being Smart with Social Media
Evans on Being Smart with Social MediaEvans on Being Smart with Social Media
Evans on Being Smart with Social MediaDr. Joel Evans
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfExtremelyDarkness2
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulAndrew Schwabe
 

Similar to Becybersmart 110605083310-phpapp02 (20)

8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Evans on Being Smart with Social Media
Evans on Being Smart with Social MediaEvans on Being Smart with Social Media
Evans on Being Smart with Social Media
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Becybersmart 110605083310-phpapp02

  • 1. Be Cyber-Smart! Surf Safely! Velma Davis, Instructional Support Specialist VDavis1@usd259.net
  • 2. Know your internet areas • Email • Chat rooms • Game rooms • Blogs (Blogger) • Microblogs (Twitter, Plurk) • Bulletin Boards (Myspace, Facebook) • Instant Messaging
  • 3. Protocols? What protocols?! Radios: gained popularity in 20’s and 30’s Television: Late 1940’s Internet Explosio n: 1990’s
  • 4. Your mother warned you:connectyourhome.com
  • 5. Teens Online • 82% of profile creators included their first name in their profiles. • 79% have included photos of themselves. • 66% have included photos of their friends. • 61% have included the name of their city. • 49% have included the name of their school. • 40% have included their instant message screen name. • 40% have streamed audio to their profile. • 39% have linked to their blog. • 29% have included their email address. • 29% have included their last name. • 29% have included videos. • 2% have included their cell phone numbers. http://www.marketingcharts.com/interactive/teens-and-social-networks-managing-personal-information-274/ PEW Report, 2008
  • 6. Am I really 10 years old?Am I really 10 years old? Who am I REALLY?! Is that really a picture of me? Am I aAm I a boy?boy? Do I really goDo I really go to school?to school?
  • 7. Risks? Highest risk to Teenagers! “Teenagers are particularly at risk because... they are more likely... to participate in online discussions regarding companionship..."LOL LMAO TY BRB AWFK YW RU Y ASL POS LMIRL WTF OMG Laugh out loud Laughing my A$$ off Thank You Be Right Back Away from keyboard/computer You’re Welcome Are you? Why? Age, sex and location Parent Over Shoulder Lets Meet In Real Life What the F$%# Oh my God http://en.wikipedia.org/wiki/Internet_slang
  • 8. Leet Speak Remember …“Hip”, “Groovy”, “Peace out”? “Leet” refers to “Elite”. Substitutes regular letters for symbols or numbers Further information for Leet Speak: http://en.wikipedia.org/wiki/Leet http://www.brenz.net/services/l337Maker.asp cartoonstock.com
  • 9. 0 - O 1- I or L 2- A, Z or R 3- E 4- A 5- S 6- B or G 7- T or L 8- B 9- G or P £- L or E
  • 10. Think Before You Click! • Domains- The extensions on a website can indicate their purpose: .com- commercial .biz- business .org- organization .gov- government .edu- education .net- network .xxx- pornography blog.andyswebtools.com
  • 11. Virus A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. hugepedia.com
  • 12. Worm • A computer worm is a selfreplicating computer program. It uses a network to send copies of itself to other nodes computer terminals on the network). • Worms almost always cause harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
  • 13. Spyware • Collects small pieces of information about users without their knowledge • Installs on your computer • Secretly monitors the user's computing: can collect various types of personal information, such as Internet surfing habits and sites that have been visited • Can install additional software and redirect Web browser activity. • Changes computer settings: – Slow connection speeds, – Changes your home pages, – Loss of Internet connection – Loss of functionality of other programs. http://en.wikipedia.org/wiki/Spyware
  • 14. Malware – Rogue or malicious programs can attack and do various things to your computer while surfing the internet. – Hostile, intrusive, or annoying software or program code
  • 15. Phishing Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. thenextweb.com
  • 17. AntiVir PE • http://www.avira.com/en/avira-free-antivirus Avira AntiVir Personal - Free Antivirus Protects your computer against dangerous viruses.
  • 18. AVG • A great Anti-virus and Anti-Malware program. Free Download: http://free.avg.com/ww-en/download-avg-anti-virus-free
  • 19. Firewall • A firewall is a device or set of devices configured to permit, deny, encrypt, or monitor internet connections between online traffic and your computer. Windows 07 comes with a built-in Firewall.
  • 21. Digital Footprint • What does your digital footprint look like? • Keeping your personal details private. Not sharing • Thinking before you post • Not posting things that you don't want others to know about or that you wouldn’t say to their face. •
  • 22. My Rules for Internet Safety! I will not give out personal information such as my address, telephone number, parents’ work address/telephone number, or the name and location of my school without my parents’ permission cartoonstock.com
  • 23. I will tell my parents right away if I come across any information that makes me feel uncomfortable Boy, am I uncomfortable!
  • 24. I will never agree to get together with someone I "meet" online! celebrityradar.info
  • 25. I will never send a person my picture or anything else without first checking with my parents
  • 26. I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is not my fault if I get a message like that. If I do I will tell my parents right away.
  • 27. • I will not download pictures from an unknown source, as there is a good chance there could be sexually explicit images.
  • 28. • time of day that I can be online, • the length of time I can be online, • appropriate areas for me to visit. I will not access other areas or break these rules without their permission. I will talk with my parents so that we can set up rules for going online. cartoonstock.com
  • 29. Helpful Sites • http://www.onlinenetiquette.com/netiquette_quiz.html • www.netzsmartz.org • www.safeteens.com • www.blogsafety.com • www.netfamilynews.org • http://www.slideshare.net/jtubbs/internet-safety-program-for-par • http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec14.shtm • http://www.cybersmart.gov.au/Kids/Get%20the %20facts/Digital%20footprint.aspx
  • 30. Bibliography • www.netzsmartz.org • www.safeteens.com • www.safekids.com Lawrence J. Magid • www.blogsafety.com • www.netfamilynews.org • http://dsc.discovery.com/convergence/koppel/int eractive/interactive.html • http://pewresearch.org/

Editor's Notes

  1. Short for Malicious + Software
  2. Keeping your personal details private. Use a nickname instead of your real name and always ask your parents before giving out your name, address or phone number online. Not sharing your username or password with anyone. Thinking before you post. Once posted, it can be difficult to remove. Not posting things that you don't want others to know about or that you wouldn’t say to their face. Being respectful of other people’s content that you post or share. For example, a photo that your friend took is their property, not yours. You should post it online only if you have their permission. - See more at: http://www.cybersmart.gov.au/Kids/Get%20the%20facts/Digital%20footprint.aspx#sthash.5veOogAL.dpuf
  3. Teens-