SlideShare a Scribd company logo
1 of 30
Be Cyber-Smart!
Surf Safely!
Velma Davis,
Instructional Support
Specialist
VDavis1@usd259.net
Know your internet areas
• Email
• Chat rooms
• Game rooms
• Blogs (Blogger)
• Microblogs (Twitter,
Plurk)
• Bulletin Boards
(Myspace, Facebook)
• Instant Messaging
Protocols? What protocols?!
Radios: gained
popularity in 20’s
and 30’s
Television: Late
1940’s
Internet
Explosio
n: 1990’s
Your mother warned you:connectyourhome.com
Teens Online • 82% of profile creators included their first
name in their profiles.
• 79% have included photos of themselves.
• 66% have included photos of their friends.
• 61% have included the name of their city.
• 49% have included the name of their
school.
• 40% have included their instant message
screen name.
• 40% have streamed audio to their profile.
• 39% have linked to their blog.
• 29% have included their email address.
• 29% have included their last name.
• 29% have included videos.
• 2% have included their cell phone
numbers.
http://www.marketingcharts.com/interactive/teens-and-social-networks-managing-personal-information-274/
PEW Report, 2008
Am I really 10 years old?Am I really 10 years old?
Who am I REALLY?!
Is that really a picture of
me?
Am I aAm I a
boy?boy?
Do I really goDo I really go
to school?to school?
Risks? Highest risk to Teenagers!
“Teenagers are particularly at risk because... they are
more likely... to participate in online discussions
regarding companionship..."LOL
LMAO
TY
BRB
AWFK
YW
RU
Y
ASL
POS
LMIRL
WTF
OMG
Laugh out loud
Laughing my A$$ off
Thank You
Be Right Back
Away from
keyboard/computer
You’re Welcome
Are you?
Why?
Age, sex and location
Parent Over Shoulder
Lets Meet In Real Life
What the F$%#
Oh my God
http://en.wikipedia.org/wiki/Internet_slang
Leet Speak
Remember …“Hip”,
“Groovy”, “Peace out”?
“Leet” refers to “Elite”.
Substitutes regular letters
for symbols or numbers
Further information for Leet Speak:
http://en.wikipedia.org/wiki/Leet
http://www.brenz.net/services/l337Maker.asp
cartoonstock.com
0 - O
1- I or L
2- A, Z or R
3- E
4- A
5- S
6- B or G
7- T or L
8- B
9- G or P
£- L or E
Think Before You Click!
• Domains- The extensions on a website
can indicate their purpose:
.com- commercial
.biz- business
.org- organization
.gov- government
.edu- education
.net- network
.xxx- pornography
blog.andyswebtools.com
Virus
A computer virus is a computer program that
can copy itself and infect a computer without
permission or knowledge of the user.
hugepedia.com
Worm
• A computer worm is a
selfreplicating computer
program. It uses a network
to send copies of itself to
other nodes computer
terminals on the network).
• Worms almost always
cause harm to the network,
if only by consuming
bandwidth, whereas
viruses almost always
corrupt or modify files on a
targeted computer.
Spyware
• Collects small pieces of information
about users without their knowledge
• Installs on your computer
• Secretly monitors the user's computing:
can collect various types of
personal information, such as Internet
surfing habits and sites that have been
visited
• Can install additional software and
redirect Web browser activity.
• Changes computer settings:
– Slow connection speeds,
– Changes your home pages,
– Loss of Internet connection
– Loss of functionality of other programs.
http://en.wikipedia.org/wiki/Spyware
Malware
– Rogue or malicious programs can attack and
do various things to your computer while
surfing the internet.
– Hostile, intrusive, or annoying software or
program code
Phishing
Phishing is a way of attempting to acquire
sensitive information such as usernames,
passwords and credit card details by
masquerading as a trustworthy entity in an
electronic communication.
thenextweb.com
Suggestions?
joystickdivision.com
AntiVir PE
• http://www.avira.com/en/avira-free-antivirus
Avira AntiVir Personal - Free Antivirus
Protects your computer against dangerous
viruses.
AVG
• A great Anti-virus
and Anti-Malware
program.
Free Download:
http://free.avg.com/ww-en/download-avg-anti-virus-free
Firewall
• A firewall is a
device or set of
devices
configured to
permit, deny,
encrypt, or
monitor internet
connections
between online
traffic and your
computer.
Windows 07 comes with a built-in Firewall.
Blocking or Filtering
http://internet-filter-review.toptenreviews.com/
Compare software:
Digital Footprint
• What does your digital footprint look like?
• Keeping your
personal details
private. Not
sharing
• Thinking before you
post
• Not posting things
that you don't want
others to know
about or that you
wouldn’t say to their
face.
•
My Rules for Internet Safety!
I will not give out
personal information
such as my address,
telephone number,
parents’ work
address/telephone
number, or the name
and location of my
school without my
parents’ permission
cartoonstock.com
I will tell my parents right away if I
come across any information that
makes me feel uncomfortable
Boy, am I uncomfortable!
I will never agree to get together
with someone I "meet" online!
celebrityradar.info
I will never send a
person my
picture or
anything else
without first
checking with my
parents
I will not respond
to any
messages that
are mean or in
any way make
me feel
uncomfortable.
It is not my fault
if I get a
message like
that. If I do I will
tell my parents
right away.
• I will not download
pictures from an
unknown source,
as there is a good
chance there could
be sexually explicit
images.
• time of day that I can be
online,
• the length of time I can
be online,
• appropriate areas for
me to visit.
I will not access other
areas or break these
rules without their
permission.
I will talk with my parents so that we can
set up rules for going online.
cartoonstock.com
Helpful Sites
• http://www.onlinenetiquette.com/netiquette_quiz.html
• www.netzsmartz.org
• www.safeteens.com
• www.blogsafety.com
• www.netfamilynews.org
• http://www.slideshare.net/jtubbs/internet-safety-program-for-par
• http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec14.shtm
• http://www.cybersmart.gov.au/Kids/Get%20the
%20facts/Digital%20footprint.aspx
Bibliography
• www.netzsmartz.org
• www.safeteens.com
• www.safekids.com Lawrence J. Magid
• www.blogsafety.com
• www.netfamilynews.org
• http://dsc.discovery.com/convergence/koppel/int
eractive/interactive.html
• http://pewresearch.org/

More Related Content

What's hot

Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
Matt Forney
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 

What's hot (18)

Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Surfer Dude
Surfer DudeSurfer Dude
Surfer Dude
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Internet safety
Internet safety Internet safety
Internet safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Viewers also liked (8)

無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731
 
Google Magic2
Google Magic2Google Magic2
Google Magic2
 
無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731
 
A Concise Guide - Growing an E-Commerce Business
A Concise Guide - Growing an E-Commerce BusinessA Concise Guide - Growing an E-Commerce Business
A Concise Guide - Growing an E-Commerce Business
 
バイラルまとめ
バイラルまとめバイラルまとめ
バイラルまとめ
 
Nanaa
NanaaNanaa
Nanaa
 
無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731無料アプリ向け 広告媒体資料0731
無料アプリ向け 広告媒体資料0731
 
利用 Lab View 進行整合式機器人系統概念教學
利用 Lab View 進行整合式機器人系統概念教學利用 Lab View 進行整合式機器人系統概念教學
利用 Lab View 進行整合式機器人系統概念教學
 

Similar to Becybersmart 110605083310-phpapp02

W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
ExtremelyDarkness2
 

Similar to Becybersmart 110605083310-phpapp02 (20)

8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Evans on Being Smart with Social Media
Evans on Being Smart with Social MediaEvans on Being Smart with Social Media
Evans on Being Smart with Social Media
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

Becybersmart 110605083310-phpapp02

  • 1. Be Cyber-Smart! Surf Safely! Velma Davis, Instructional Support Specialist VDavis1@usd259.net
  • 2. Know your internet areas • Email • Chat rooms • Game rooms • Blogs (Blogger) • Microblogs (Twitter, Plurk) • Bulletin Boards (Myspace, Facebook) • Instant Messaging
  • 3. Protocols? What protocols?! Radios: gained popularity in 20’s and 30’s Television: Late 1940’s Internet Explosio n: 1990’s
  • 4. Your mother warned you:connectyourhome.com
  • 5. Teens Online • 82% of profile creators included their first name in their profiles. • 79% have included photos of themselves. • 66% have included photos of their friends. • 61% have included the name of their city. • 49% have included the name of their school. • 40% have included their instant message screen name. • 40% have streamed audio to their profile. • 39% have linked to their blog. • 29% have included their email address. • 29% have included their last name. • 29% have included videos. • 2% have included their cell phone numbers. http://www.marketingcharts.com/interactive/teens-and-social-networks-managing-personal-information-274/ PEW Report, 2008
  • 6. Am I really 10 years old?Am I really 10 years old? Who am I REALLY?! Is that really a picture of me? Am I aAm I a boy?boy? Do I really goDo I really go to school?to school?
  • 7. Risks? Highest risk to Teenagers! “Teenagers are particularly at risk because... they are more likely... to participate in online discussions regarding companionship..."LOL LMAO TY BRB AWFK YW RU Y ASL POS LMIRL WTF OMG Laugh out loud Laughing my A$$ off Thank You Be Right Back Away from keyboard/computer You’re Welcome Are you? Why? Age, sex and location Parent Over Shoulder Lets Meet In Real Life What the F$%# Oh my God http://en.wikipedia.org/wiki/Internet_slang
  • 8. Leet Speak Remember …“Hip”, “Groovy”, “Peace out”? “Leet” refers to “Elite”. Substitutes regular letters for symbols or numbers Further information for Leet Speak: http://en.wikipedia.org/wiki/Leet http://www.brenz.net/services/l337Maker.asp cartoonstock.com
  • 9. 0 - O 1- I or L 2- A, Z or R 3- E 4- A 5- S 6- B or G 7- T or L 8- B 9- G or P £- L or E
  • 10. Think Before You Click! • Domains- The extensions on a website can indicate their purpose: .com- commercial .biz- business .org- organization .gov- government .edu- education .net- network .xxx- pornography blog.andyswebtools.com
  • 11. Virus A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. hugepedia.com
  • 12. Worm • A computer worm is a selfreplicating computer program. It uses a network to send copies of itself to other nodes computer terminals on the network). • Worms almost always cause harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
  • 13. Spyware • Collects small pieces of information about users without their knowledge • Installs on your computer • Secretly monitors the user's computing: can collect various types of personal information, such as Internet surfing habits and sites that have been visited • Can install additional software and redirect Web browser activity. • Changes computer settings: – Slow connection speeds, – Changes your home pages, – Loss of Internet connection – Loss of functionality of other programs. http://en.wikipedia.org/wiki/Spyware
  • 14. Malware – Rogue or malicious programs can attack and do various things to your computer while surfing the internet. – Hostile, intrusive, or annoying software or program code
  • 15. Phishing Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. thenextweb.com
  • 17. AntiVir PE • http://www.avira.com/en/avira-free-antivirus Avira AntiVir Personal - Free Antivirus Protects your computer against dangerous viruses.
  • 18. AVG • A great Anti-virus and Anti-Malware program. Free Download: http://free.avg.com/ww-en/download-avg-anti-virus-free
  • 19. Firewall • A firewall is a device or set of devices configured to permit, deny, encrypt, or monitor internet connections between online traffic and your computer. Windows 07 comes with a built-in Firewall.
  • 21. Digital Footprint • What does your digital footprint look like? • Keeping your personal details private. Not sharing • Thinking before you post • Not posting things that you don't want others to know about or that you wouldn’t say to their face. •
  • 22. My Rules for Internet Safety! I will not give out personal information such as my address, telephone number, parents’ work address/telephone number, or the name and location of my school without my parents’ permission cartoonstock.com
  • 23. I will tell my parents right away if I come across any information that makes me feel uncomfortable Boy, am I uncomfortable!
  • 24. I will never agree to get together with someone I "meet" online! celebrityradar.info
  • 25. I will never send a person my picture or anything else without first checking with my parents
  • 26. I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is not my fault if I get a message like that. If I do I will tell my parents right away.
  • 27. • I will not download pictures from an unknown source, as there is a good chance there could be sexually explicit images.
  • 28. • time of day that I can be online, • the length of time I can be online, • appropriate areas for me to visit. I will not access other areas or break these rules without their permission. I will talk with my parents so that we can set up rules for going online. cartoonstock.com
  • 29. Helpful Sites • http://www.onlinenetiquette.com/netiquette_quiz.html • www.netzsmartz.org • www.safeteens.com • www.blogsafety.com • www.netfamilynews.org • http://www.slideshare.net/jtubbs/internet-safety-program-for-par • http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec14.shtm • http://www.cybersmart.gov.au/Kids/Get%20the %20facts/Digital%20footprint.aspx
  • 30. Bibliography • www.netzsmartz.org • www.safeteens.com • www.safekids.com Lawrence J. Magid • www.blogsafety.com • www.netfamilynews.org • http://dsc.discovery.com/convergence/koppel/int eractive/interactive.html • http://pewresearch.org/

Editor's Notes

  1. Short for Malicious + Software
  2. Keeping your personal details private. Use a nickname instead of your real name and always ask your parents before giving out your name, address or phone number online. Not sharing your username or password with anyone. Thinking before you post. Once posted, it can be difficult to remove. Not posting things that you don't want others to know about or that you wouldn’t say to their face. Being respectful of other people’s content that you post or share. For example, a photo that your friend took is their property, not yours. You should post it online only if you have their permission. - See more at: http://www.cybersmart.gov.au/Kids/Get%20the%20facts/Digital%20footprint.aspx#sthash.5veOogAL.dpuf
  3. Teens-