SlideShare une entreprise Scribd logo
1  sur  17
For the Internet Naïve… Internet Safety
Potential Pitfall #1 	Accessing sites with inappropriate materials
You viewed what? 	The internet is full of easy to access information of all types… … and the bad. the good…
You viewed what? 	Only search using trusted search engines and make sure that a link scanner is installed to identify harmful links.  Learn how to use the AVG Link Scanner. 	View this internet safety lesson.
Potential Pitfall #2 	Safety and privacy issues for students
You told who what? Rule Number 1: Nothing online is private Never give out personal information online Never post personal pictures you want to keep private. Never say anything online that you don’t want to be made public
Potential Pitfall #3 	Fraud on the Internet
You gave you password to who? If it sounds too good to be true, then it probably is Only purchase things from a trusted source with proper site security 	Read more frominternetsafetyrules.org
Potential Pitfall #4 	Computer virus and hacking
You opened what? Always keep your antivirus software up-to-date Never open an e-mail attachment or hyperlink unless you are expecting it Only download programs from trusted sites, such as download.com
Potential Pitfall #5 	Copyright and plagiarism issues
You got this information from where? It is illegal to copy and use anything online unless you have permission from the copyright holder View copyrightkids.org for more information
You got this information from where? Plagiarism reaches all levels.  Read this recent news article about Germany’s defense minister. View this slide show for more information on plagiarism.
You got this information from where? 	To find images that you can freely use, visit either commons.wikimedia.org or flickr.com
References Roblyer, M. D., & Doering, A. H. (2009). Integrating educational technology into teaching (5th ed.). Allyn & Bacon.  
Image References Links Privacy Icon: http://commons.wikimedia.org/wiki/File:Privacy_caution.svg Embarrassing Face: http://commons.wikimedia.org/wiki/File:Caught_in_street_photography_small.png Jet Powered Outhouse: http://commons.wikimedia.org/wiki/File:Jet_Powered_Outhouse.jpg HTTP Image: http://commons.wikimedia.org/wiki/File:HTTP.png Password: http://commons.wikimedia.org/wiki/File:Crystal_password.png Virus: http://commons.wikimedia.org/wiki/File:Cartoonvirus.jpg Copyright Question mark: http://commons.wikimedia.org/wiki/File:Questionmark_copyright.svg Copyright Problem: http://commons.wikimedia.org/wiki/File:Copyright-problem.svg
Image References Links Commons Logo: http://en.wikipedia.org/wiki/File:Commons-logo-en.svg Flickr Logo: http://commons.wikimedia.org/wiki/File:Flickr_wordmark.svg

Contenu connexe

Tendances

Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayQuek Lilian
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Floreslorrflores
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saulSaul Vidal Swales
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Online privacy
Online privacyOnline privacy
Online privacyjo-jo23
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young StudentsShubham Gupta
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpointTy122987
 
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy QuizDr. Joel Evans
 

Tendances (17)

Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Dangers of social media
Dangers of social mediaDangers of social media
Dangers of social media
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Online privacy
Online privacyOnline privacy
Online privacy
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
 
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy Quiz
 

En vedette

5c Digital Citizenship
5c Digital Citizenship5c Digital Citizenship
5c Digital CitizenshipAnja Junginger
 
Mobile Safety Solutions Compliance Management Suite System Overview
Mobile Safety Solutions Compliance Management Suite   System OverviewMobile Safety Solutions Compliance Management Suite   System Overview
Mobile Safety Solutions Compliance Management Suite System OverviewNicsbarr
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetykalanifa
 
Printek Mobile Public Safety - Why Mobile Printing?
Printek Mobile Public Safety - Why Mobile Printing?Printek Mobile Public Safety - Why Mobile Printing?
Printek Mobile Public Safety - Why Mobile Printing?ctyeager
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!alexclark-efc
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011photomatt
 

En vedette (9)

5c Digital Citizenship
5c Digital Citizenship5c Digital Citizenship
5c Digital Citizenship
 
Mobile Safety Solutions Compliance Management Suite System Overview
Mobile Safety Solutions Compliance Management Suite   System OverviewMobile Safety Solutions Compliance Management Suite   System Overview
Mobile Safety Solutions Compliance Management Suite System Overview
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Protecting Yourself
Protecting  YourselfProtecting  Yourself
Protecting Yourself
 
Printek Mobile Public Safety - Why Mobile Printing?
Printek Mobile Public Safety - Why Mobile Printing?Printek Mobile Public Safety - Why Mobile Printing?
Printek Mobile Public Safety - Why Mobile Printing?
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similaire à Internet Safety

Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdfMILANOP1
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxGrayzon Gonzales, LPT
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
cyberbullying presentation by class 4 student
cyberbullying presentation by class 4 studentcyberbullying presentation by class 4 student
cyberbullying presentation by class 4 studentadhikarikavya417
 

Similaire à Internet Safety (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
HECCTW11
HECCTW11HECCTW11
HECCTW11
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Ethics in-information-security
Ethics in-information-securityEthics in-information-security
Ethics in-information-security
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Users guide
Users guideUsers guide
Users guide
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
cyberbullying presentation by class 4 student
cyberbullying presentation by class 4 studentcyberbullying presentation by class 4 student
cyberbullying presentation by class 4 student
 
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Dernier

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Internet Safety

  • 1. For the Internet Naïve… Internet Safety
  • 2. Potential Pitfall #1 Accessing sites with inappropriate materials
  • 3. You viewed what? The internet is full of easy to access information of all types… … and the bad. the good…
  • 4. You viewed what? Only search using trusted search engines and make sure that a link scanner is installed to identify harmful links. Learn how to use the AVG Link Scanner. View this internet safety lesson.
  • 5. Potential Pitfall #2 Safety and privacy issues for students
  • 6. You told who what? Rule Number 1: Nothing online is private Never give out personal information online Never post personal pictures you want to keep private. Never say anything online that you don’t want to be made public
  • 7. Potential Pitfall #3 Fraud on the Internet
  • 8. You gave you password to who? If it sounds too good to be true, then it probably is Only purchase things from a trusted source with proper site security Read more frominternetsafetyrules.org
  • 9. Potential Pitfall #4 Computer virus and hacking
  • 10. You opened what? Always keep your antivirus software up-to-date Never open an e-mail attachment or hyperlink unless you are expecting it Only download programs from trusted sites, such as download.com
  • 11. Potential Pitfall #5 Copyright and plagiarism issues
  • 12. You got this information from where? It is illegal to copy and use anything online unless you have permission from the copyright holder View copyrightkids.org for more information
  • 13. You got this information from where? Plagiarism reaches all levels. Read this recent news article about Germany’s defense minister. View this slide show for more information on plagiarism.
  • 14. You got this information from where? To find images that you can freely use, visit either commons.wikimedia.org or flickr.com
  • 15. References Roblyer, M. D., & Doering, A. H. (2009). Integrating educational technology into teaching (5th ed.). Allyn & Bacon.  
  • 16. Image References Links Privacy Icon: http://commons.wikimedia.org/wiki/File:Privacy_caution.svg Embarrassing Face: http://commons.wikimedia.org/wiki/File:Caught_in_street_photography_small.png Jet Powered Outhouse: http://commons.wikimedia.org/wiki/File:Jet_Powered_Outhouse.jpg HTTP Image: http://commons.wikimedia.org/wiki/File:HTTP.png Password: http://commons.wikimedia.org/wiki/File:Crystal_password.png Virus: http://commons.wikimedia.org/wiki/File:Cartoonvirus.jpg Copyright Question mark: http://commons.wikimedia.org/wiki/File:Questionmark_copyright.svg Copyright Problem: http://commons.wikimedia.org/wiki/File:Copyright-problem.svg
  • 17. Image References Links Commons Logo: http://en.wikipedia.org/wiki/File:Commons-logo-en.svg Flickr Logo: http://commons.wikimedia.org/wiki/File:Flickr_wordmark.svg