SlideShare une entreprise Scribd logo
1  sur  12
E-Safety
 Tutorial
Staying Safe Online
  February 2013
Aims of Session
    • Students understand some of the
      risks and dangers you may come
      across online
    • Students understand some of the
      ways in which you can operate safely
      online



                                   Tony Delahunty, CNWL
2                                          February 2013
Videos
    • Examples of online behaviour that is
      risky:
      – “Consequences”
      – “Everyone knows your name…”


    • http://www.youtube.com/playlist?list
      =PLYSYL_VAZBc8iK7UrCdsvwexyYm
      uC_wJi

                                      Tony Delahunty, CNWL
3                                             February 2013
E-Safety: handout leaflets



    • Cyberbullying
    • Facebook & Social Networking
    • Mobile Phones
    • Chat rooms and Instant Messaging

                                  Tony Delahunty, CNWL
4                                         February 2013
Summary:
    Risks & Dangers                         Being E-Safer


    •   Posting revealing/embarrassing      •   Only „Friend‟ those you know
        photos                              •   Set Your Privacy Settings
    •   Viruses                             •   Only post photos your mum would
    •   “Weirdos”                               like
    •   Giving out too much personal info   •   Stop if you are uncomfortable
    •   Other people lying about who they   •   Tell an adult/staff: Get Help
        are.                                •   Contact your phone provider if
    •   Fraud from unsafe shopping sites        being hassled by texts
    •   ……                                  •   Use passwords/locking
                                            •   ......




                                                                    Tony Delahunty, CNWL
5                                                                           February 2013
Safe or Unsafe: Online Game




    • Click
      http://moodle.leedscitycollege.ac.uk/file.php/7611/judge.swf
      to play

                                                                     Tony Delahunty, CNWL
6                                                                            February 2013
Summary: (Repeat slide)
    Risks & Dangers                         Being E-Safer


    •   Posting revealing/embarrassing      •   Only „Friend‟ those you know
        photos                              •   Set Your Privacy Settings
    •   Viruses                             •   Only post photos your mum would
    •   “Weirdos”                               like
    •   Giving out too much personal info   •   Stop if you are uncomfortable
    •   Other people lying about who they   •   Tell an adult/staff: Get Help
        are.                                •   Contact your phone provider if
    •   Fraud from unsafe shopping sites        being hassled by texts
    •   ……                                  •   Use passwords/locking
                                            •   ......




                                                                    Tony Delahunty, CNWL
7                                                                           February 2013
Demo/Hands-On Practice
    • Privacy settings in Facebook
      – If you don‟t check, others may easily
        access/view your stuff (as in the video
        ”Everyone knows your name…”)
    • Password locking on
      phone/tablet/computer
      – If you don‟t set, anyone finding the
        phone could access all your contacts,
        details, email.
                                         Tony Delahunty, CNWL
8                                                February 2013
Cyberbullying
    • Online bullying or harassment, using
      technology like mobiles or the
      internet
    • Is wrong and hurtful
    • Do not join in
    • Can be dealt with by the College,
      phone providers, police (as in the
     video ”Consequences…”)

                                    Tony Delahunty, CNWL
9                                           February 2013
Cyberbullying: Reporting It
     • Any trusted adult
     • College Safeguarding team
      (on your ID card)
     • College „Get Help‟ button (on Moodle)
     • Click CEOP (to report online abuse)
     • Phone providers (save or record the
      evidence)
     • Police   (save or record the evidence)

                                                Tony Delahunty, CNWL
10                                                      February 2013
E-Safety: Review Checklist
     • Students can identify 2 or more examples of online
       behaviour that is risky.
     • Students can identify 2 or more examples of online
       behaviour that is safe(r).
     • Students know how to set/change privacy settings on
       Facebook (or similar website).
     • Students know how to set/change a password on a mobile
       phone
     • Students can identify cyberbullying, and some ways to
       respond to it safely/effectively
     • Students can identify 2 or more places they can report
       online misbehaviour.


                                                     Tony Delahunty, CNWL
11                                                           February 2013
E-Safety: Find out more
     • Moodle  Information  Staying
       Safe Online
       – Quiz with Prizes on E-Safety Day
       – YouTube video playlist
     • Think U Know website:
       – http://www.thinkuknow.co.uk
     • Short online qualification in Internet
       Safety
       – Check with your Faculties
                                            Tony Delahunty, CNWL
12                                                  February 2013

Contenu connexe

Tendances

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
csghwood
 
The Original Complete Unit
The Original Complete UnitThe Original Complete Unit
The Original Complete Unit
guest09fcd1
 
Plagiarism student handout
Plagiarism student handoutPlagiarism student handout
Plagiarism student handout
thinkict
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
_chimes_
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
ISTE
 
Rules on the road to netique
Rules on the road to netiqueRules on the road to netique
Rules on the road to netique
C_Warrick
 
ITEC Synthesis Activity 3
ITEC Synthesis Activity 3ITEC Synthesis Activity 3
ITEC Synthesis Activity 3
joanieespinosa
 

Tendances (17)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
E safety for kids: curriculum, lessons, resources
E safety for kids: curriculum, lessons, resourcesE safety for kids: curriculum, lessons, resources
E safety for kids: curriculum, lessons, resources
 
Camouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldCamouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual World
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
 
Digital Identities -- Tufts University EXP-50-CS Spring 2014, Social Media --...
Digital Identities -- Tufts University EXP-50-CS Spring 2014, Social Media --...Digital Identities -- Tufts University EXP-50-CS Spring 2014, Social Media --...
Digital Identities -- Tufts University EXP-50-CS Spring 2014, Social Media --...
 
emerging technologies for the ass'n of legal administrators
emerging technologies for the ass'n of legal administratorsemerging technologies for the ass'n of legal administrators
emerging technologies for the ass'n of legal administrators
 
Life online
Life onlineLife online
Life online
 
Digital Natives
Digital  NativesDigital  Natives
Digital Natives
 
Social networking and security
Social networking and securitySocial networking and security
Social networking and security
 
The Original Complete Unit
The Original Complete UnitThe Original Complete Unit
The Original Complete Unit
 
Plagiarism student handout
Plagiarism student handoutPlagiarism student handout
Plagiarism student handout
 
Digitalnatives
DigitalnativesDigitalnatives
Digitalnatives
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Digital citizenship training
Digital citizenship trainingDigital citizenship training
Digital citizenship training
 
Rules on the road to netique
Rules on the road to netiqueRules on the road to netique
Rules on the road to netique
 
ITEC Synthesis Activity 3
ITEC Synthesis Activity 3ITEC Synthesis Activity 3
ITEC Synthesis Activity 3
 

En vedette

Kid Safety On The Internet
Kid Safety On The InternetKid Safety On The Internet
Kid Safety On The Internet
Jennifer Chilek
 
Computer awareness i logo
Computer awareness i logoComputer awareness i logo
Computer awareness i logo
Madhan Kumar
 
The Mobile Internet: Meeting Demand and Growing Profitably
The Mobile Internet: Meeting Demand and Growing ProfitablyThe Mobile Internet: Meeting Demand and Growing Profitably
The Mobile Internet: Meeting Demand and Growing Profitably
Bytemobile
 
Beyond the Fridge, The World of Connected Data - Dr Werner Vogels
Beyond the Fridge, The World of Connected Data - Dr Werner VogelsBeyond the Fridge, The World of Connected Data - Dr Werner Vogels
Beyond the Fridge, The World of Connected Data - Dr Werner Vogels
Amazon Web Services
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
Lawrence Fine
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
Pamela Moeai
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
Komal Maloo
 

En vedette (20)

Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe Online
 
The Future of Data in a Connected World
The Future of Data in a Connected WorldThe Future of Data in a Connected World
The Future of Data in a Connected World
 
Kid Safety On The Internet
Kid Safety On The InternetKid Safety On The Internet
Kid Safety On The Internet
 
Computer awareness i logo
Computer awareness i logoComputer awareness i logo
Computer awareness i logo
 
Protecting your online privacy
Protecting your online privacyProtecting your online privacy
Protecting your online privacy
 
Computer awareness
Computer awarenessComputer awareness
Computer awareness
 
CyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN Encryption Guide
CyberGhost VPN Encryption Guide
 
The Mobile Internet: Meeting Demand and Growing Profitably
The Mobile Internet: Meeting Demand and Growing ProfitablyThe Mobile Internet: Meeting Demand and Growing Profitably
The Mobile Internet: Meeting Demand and Growing Profitably
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Beyond the Fridge, The World of Connected Data - Dr Werner Vogels
Beyond the Fridge, The World of Connected Data - Dr Werner VogelsBeyond the Fridge, The World of Connected Data - Dr Werner Vogels
Beyond the Fridge, The World of Connected Data - Dr Werner Vogels
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspection
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Brain Computer Interface.ppt
Brain Computer Interface.pptBrain Computer Interface.ppt
Brain Computer Interface.ppt
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 

Similaire à Cnwl e safety-tutorial_2013

Bullying pp best
Bullying pp bestBullying pp best
Bullying pp best
erinmacks
 
Assignment #8 draft 3
Assignment #8 draft 3Assignment #8 draft 3
Assignment #8 draft 3
debbie14
 

Similaire à Cnwl e safety-tutorial_2013 (20)

"Bullying" for #YC14
"Bullying" for #YC14"Bullying" for #YC14
"Bullying" for #YC14
 
Social Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's ViewSocial Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's View
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Bullying pp best
Bullying pp bestBullying pp best
Bullying pp best
 
Raising Children in a Digital Age #YC14
Raising Children in a Digital Age #YC14Raising Children in a Digital Age #YC14
Raising Children in a Digital Age #YC14
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
Cyberbullying (A little information)
Cyberbullying (A little information)Cyberbullying (A little information)
Cyberbullying (A little information)
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social Media final presentation risks
Social Media final presentation   risksSocial Media final presentation   risks
Social Media final presentation risks
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Assignment #8 draft 3
Assignment #8 draft 3Assignment #8 draft 3
Assignment #8 draft 3
 
Bullying
BullyingBullying
Bullying
 
Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011
 
Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.
 
Cyberbullying (Small information about this)
Cyberbullying (Small information about this)Cyberbullying (Small information about this)
Cyberbullying (Small information about this)
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!
 

Plus de College of North West London

Plus de College of North West London (17)

E-Safety Day 2016
E-Safety Day 2016E-Safety Day 2016
E-Safety Day 2016
 
E-Safety day CNWL (Feb 10th, 2015) slideshow
E-Safety day CNWL (Feb 10th, 2015) slideshow E-Safety day CNWL (Feb 10th, 2015) slideshow
E-Safety day CNWL (Feb 10th, 2015) slideshow
 
MOOCs -Gamechanger or Buzzword Bingo?
MOOCs -Gamechanger or Buzzword Bingo?MOOCs -Gamechanger or Buzzword Bingo?
MOOCs -Gamechanger or Buzzword Bingo?
 
Stretch and challenge_strategies_with_ilt_june2013
Stretch and challenge_strategies_with_ilt_june2013Stretch and challenge_strategies_with_ilt_june2013
Stretch and challenge_strategies_with_ilt_june2013
 
Soil investigation part2
Soil investigation part2Soil investigation part2
Soil investigation part2
 
Load bearing elements part5
Load bearing elements part5Load bearing elements part5
Load bearing elements part5
 
Types of ground floors
Types of ground floorsTypes of ground floors
Types of ground floors
 
Preparation of a site part 6
Preparation of a site part 6Preparation of a site part 6
Preparation of a site part 6
 
Building technology part 3
Building technology part 3Building technology part 3
Building technology part 3
 
Building technology in construction intro
Building technology in construction introBuilding technology in construction intro
Building technology in construction intro
 
Superstructure design
Superstructure designSuperstructure design
Superstructure design
 
Piloting mobile resources and mobile access at CNWL
Piloting mobile resources and mobile access at CNWLPiloting mobile resources and mobile access at CNWL
Piloting mobile resources and mobile access at CNWL
 
Educational opportunities offered by social mobile gaming
Educational opportunities offered by social mobile gamingEducational opportunities offered by social mobile gaming
Educational opportunities offered by social mobile gaming
 
Mobilising Remote Student Engagement: Mobile and Personal technologies suppor...
Mobilising Remote Student Engagement: Mobile and Personal technologies suppor...Mobilising Remote Student Engagement: Mobile and Personal technologies suppor...
Mobilising Remote Student Engagement: Mobile and Personal technologies suppor...
 
Examples of Molenet project on using iPod touches wikis and blogs to support ...
Examples of Molenet project on using iPod touches wikis and blogs to support ...Examples of Molenet project on using iPod touches wikis and blogs to support ...
Examples of Molenet project on using iPod touches wikis and blogs to support ...
 
Exploring mobile learning with JISC Advance ; Implementing mobile learning in...
Exploring mobile learning with JISC Advance ; Implementing mobile learning in...Exploring mobile learning with JISC Advance ; Implementing mobile learning in...
Exploring mobile learning with JISC Advance ; Implementing mobile learning in...
 
Mobile Learning - Now, the Past and the Future
Mobile Learning - Now, the Past and the FutureMobile Learning - Now, the Past and the Future
Mobile Learning - Now, the Past and the Future
 

Cnwl e safety-tutorial_2013

  • 1. E-Safety Tutorial Staying Safe Online February 2013
  • 2. Aims of Session • Students understand some of the risks and dangers you may come across online • Students understand some of the ways in which you can operate safely online Tony Delahunty, CNWL 2 February 2013
  • 3. Videos • Examples of online behaviour that is risky: – “Consequences” – “Everyone knows your name…” • http://www.youtube.com/playlist?list =PLYSYL_VAZBc8iK7UrCdsvwexyYm uC_wJi Tony Delahunty, CNWL 3 February 2013
  • 4. E-Safety: handout leaflets • Cyberbullying • Facebook & Social Networking • Mobile Phones • Chat rooms and Instant Messaging Tony Delahunty, CNWL 4 February 2013
  • 5. Summary: Risks & Dangers Being E-Safer • Posting revealing/embarrassing • Only „Friend‟ those you know photos • Set Your Privacy Settings • Viruses • Only post photos your mum would • “Weirdos” like • Giving out too much personal info • Stop if you are uncomfortable • Other people lying about who they • Tell an adult/staff: Get Help are. • Contact your phone provider if • Fraud from unsafe shopping sites being hassled by texts • …… • Use passwords/locking • ...... Tony Delahunty, CNWL 5 February 2013
  • 6. Safe or Unsafe: Online Game • Click http://moodle.leedscitycollege.ac.uk/file.php/7611/judge.swf to play Tony Delahunty, CNWL 6 February 2013
  • 7. Summary: (Repeat slide) Risks & Dangers Being E-Safer • Posting revealing/embarrassing • Only „Friend‟ those you know photos • Set Your Privacy Settings • Viruses • Only post photos your mum would • “Weirdos” like • Giving out too much personal info • Stop if you are uncomfortable • Other people lying about who they • Tell an adult/staff: Get Help are. • Contact your phone provider if • Fraud from unsafe shopping sites being hassled by texts • …… • Use passwords/locking • ...... Tony Delahunty, CNWL 7 February 2013
  • 8. Demo/Hands-On Practice • Privacy settings in Facebook – If you don‟t check, others may easily access/view your stuff (as in the video ”Everyone knows your name…”) • Password locking on phone/tablet/computer – If you don‟t set, anyone finding the phone could access all your contacts, details, email. Tony Delahunty, CNWL 8 February 2013
  • 9. Cyberbullying • Online bullying or harassment, using technology like mobiles or the internet • Is wrong and hurtful • Do not join in • Can be dealt with by the College, phone providers, police (as in the video ”Consequences…”) Tony Delahunty, CNWL 9 February 2013
  • 10. Cyberbullying: Reporting It • Any trusted adult • College Safeguarding team (on your ID card) • College „Get Help‟ button (on Moodle) • Click CEOP (to report online abuse) • Phone providers (save or record the evidence) • Police (save or record the evidence) Tony Delahunty, CNWL 10 February 2013
  • 11. E-Safety: Review Checklist • Students can identify 2 or more examples of online behaviour that is risky. • Students can identify 2 or more examples of online behaviour that is safe(r). • Students know how to set/change privacy settings on Facebook (or similar website). • Students know how to set/change a password on a mobile phone • Students can identify cyberbullying, and some ways to respond to it safely/effectively • Students can identify 2 or more places they can report online misbehaviour. Tony Delahunty, CNWL 11 February 2013
  • 12. E-Safety: Find out more • Moodle  Information  Staying Safe Online – Quiz with Prizes on E-Safety Day – YouTube video playlist • Think U Know website: – http://www.thinkuknow.co.uk • Short online qualification in Internet Safety – Check with your Faculties Tony Delahunty, CNWL 12 February 2013

Notes de l'éditeur

  1. The 2 videos should run one after the other as a playlist. Consequences” lasts 8 minutes“Everyone knows your name…” lasts 1 minute
  2. Facebook: see http://www.facebook.com/help/privacy#!/help/325807937506242/ in Fb, or read article such as http://computer.howstuffworks.com/internet/tips/how-to-update-your-facebook-privacy-settings1.htm Password setting on phone: Important because otherwise anyone stealing it could access all your contacts, details, email if smartphone. Password Setting may need to be enabled first: see. E.g. http://lifehacker.com/5724683/how-to-secure-your-smartphone
  3. Ensure you demonstrate:‘Click CEOP’ and CNWL ‘Get Help’ (in Moodle) on board.
  4. NB http://www.thinkuknow.co.uk is a very important and useful site.