1 / 18

INTERNET SAFETY Empowerment Training

INTERNET SAFETY Empowerment Training. By Karen Livingood ITC 525: Computers for Educators Summer II. MAIN MENU. Introduction. Phineas and Ferb Clip. Reality Check. Play Time. CyberTipline Report. More Games. Internet Safety Quiz (from ikeepsafe.org). INTRODUCTION.

min
Download Presentation

INTERNET SAFETY Empowerment Training

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. INTERNET SAFETYEmpowerment Training By Karen Livingood ITC 525: Computers for Educators Summer II

  2. MAIN MENU • Introduction • Phineas and Ferb Clip • Reality Check • Play Time • CyberTipline Report • More Games • Internet Safety Quiz (from ikeepsafe.org)

  3. INTRODUCTION “KEEPING CHILDREN SAFE ON THE INTERNET IS EVERYONE’S JOB.” Learning how to make good choices is a skill that will last a lifetime. The material in the following presentation is designed to empower kids to keep themselves safe in an online environment.

  4. GET CYBERSMART WITH PHINEAS AND FERB Click on the link below to watch an amusing clip on Internet safety from the perspective of Phineas and Ferb: http://www.commonsensemedia.org/get-cybersmart-phineas-and-ferb#

  5. PLAYTIME! NetSmartz Kids

  6. REALITY CHECK View some Real-Life Stories told by teens who have been victims of Internet exploitation. Julie’s Journey Cyberbullying Tracking Teresa Angela’s Experience Amy’s Choice Keisha’s Crime

  7. CYBER TIPLINE REPORT The CyberTipline is the place to report any incidents of Internet exploitation. If you find yourself in a situation where you need help, visit www.cybertipline.com and make a report. If you fear that you are in immediate danger, contact your local law enforcement.

  8. A SILLY GAME • Cyberbully Zombies

  9. INTERNET SAFETY QUIZClick on the letter of the correct answer. What information is okay to share with anyone on the Internet? A. Name and address B. The name of your school C. A picture of yourself D. None of the above

  10. What would you do? If you see anything on the computer that makes you feel uncomfortable, you should: A. Ignore it B. Run and tell an adult C. Turn off your computer D. Tell a friend

  11. It is okay to meet someone in person whom you have met online IF: A. You meet in a safe, public place. B. They promise to bring you a present C. It is someone you have grown to trust D. It is never okay

  12. VOCABULARY What is a place where you can “talk by typing” to other people called? A. Virus B. Chat Room C. Cyberspace

  13. VOCAB CONTINUED What is junk mail called that comes to your email box? A. Spam B. URL C. Instant Messaging

  14. LAST ONE… What is the world called that connects computers to the Internet? A. Web sites B. Bulletin boards C. Cyberspace

  15. HAVE A SAFE AND HAPPY ONLINE JOURNEY!

  16. ADDITIONAL SITES ON INTERNET SAFETY YOU MAY WANT TO CHECK OUT: • www.getnetwise.org • www.wiredkids.org/wiredkids_org.html • http://media-awareness.ca/english/index.cfm • www.cybersmart.org

  17. STANDARDS • Digital Citizenship: Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior. Students:  • a. advocate and practice safe, legal, and responsible use of information and technology. • b. exhibit a positive attitude toward using technology that supports collaboration, learning, and productivity. • c. demonstrate personal responsibility for lifelong learning. • d. exhibit leadership for digital citizenship.  • Research and Information Fluency: Students apply digital tools to gather, evaluate, and use information. Students: • b. locate, organize, analyze, evaluate, synthesize, and ethically use information from a variety of sources and media • d. process data and report results. 

  18. RESOURCES • www.iste.org/nets/ • http://www.commonsensemedia.org/get-cybersmart-phineas-and-ferb# • www.netsmartz.org • www.ikeepsafe.org • www.cybertipline.org

More Related