1 / 22

Concept: Internet Safety

Who You Are ~ Learning About Yourself ~. Unit Essential Questions How can my principles, skills, and interests help me be successful in life?. Concept: Internet Safety. Lesson Essential Questions What are acceptable uses for social networking?

Download Presentation

Concept: Internet Safety

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Who You Are ~ Learning About Yourself ~ Unit Essential Questions How can my principles, skills, and interests help me be successful in life? Concept: Internet Safety

  2. Lesson Essential Questions • What are acceptable uses for social networking? • How do I stay safe when using a social network? • How can a desktop publishing program help me present facts in an eye-catching manner?

  3. Internet Safety • Cyber-bullying • Netiquette • Private Information • Personal Information • Predators • Privacy • Social Network

  4. What do you think Internet Safety means?

  5. Flame ~ • Spam ~ • Mail Bomb ~ • Shouting ~ • FAQ ~ Netiquette; Etiquette on the Internet

  6. Social Network

  7. How much time do you spend on a Social Network on a daily basis? 2. What social network(s) do you use?

  8. Instant Messaging . . . IM & Texting • A way to ___________with friends • _______ are you texting and ______ are you saying • Personal info???? • Some instant message services make it possible to exchange messages with several people at once — just like a ___________. • _____________________could be forwarded to other people. • Is the person you are texting ________? • There is no way to __________something once you enter it.

  9. A free online video hosting community which allows you to upload, view, and share video clips with others. • The internet’s biggest website for sharing videos online. • It only takes ONE video on YouTube to damage your reputation!

  10. Friends only??? • Dangers of posting photos and videos. • You alone decide who sees what side of you on the Internet! • Videos on Youtube can be downloaded and saved to anyone’s computer. • The _________________________ • “Would you want your grandmother to see the picture or video?”

  11. Cyber-bullying Also known as: ____________________________ ____________________________

  12. Write one reason why you think someone might engage in cyber-bullying. 1.

  13. Pennsylvania is ranked 4th in the nation for cyber-bullying. _____of teens reported being bullied at school. _____ of students bully others, OFTEN. _____ had rumors or gossip spread about them. _____ have been physically bullied. _____ of bullying happened inside the school. _____ of bullying was on school grounds, buses, or on the way to school. _____ of the victims reported the bullying to someone at school Source: Bureau of Justice Statistics, US Dept. of Health & Human Services, Cyberbullying Research Center, 7-26-2012 Bullying Statistics

  14. Cyber Bullying Statistics _____ of students reported being cyber bullied. _____ of teens have experienced cyber threats. _____ of teens have been bullied repeatedly through their cell phones of the Internet. _____ do not tell their parents when bullying occurs. _____ of teens have had embarrassing or damaging pictures taken of themselves without their permission. (often with a cell phone) Source: Bureau of Justice Statistics, US Dept. of Health & Human Services, Cyberbullying Research Center, 7-26-2012

  15. What would you do if you or someone you know is being cyber-bullied?

  16. 1. 2. 3. 4. 5. 6. 7. What to do if you experience cyber-bullying.

  17. Personal Information ~ Private Information ~ Privacy= Personal Information vs. Private Information

  18. Predators establish contact with children through conversations in: • Chat rooms, instant messaging, texting, e-mail, discussion boards, and social networking sites. • Predators prey on “vulnerable victims.” • Online predators try to gradually seduce their targeted victims through • attention • affection • kindness • gifts Predator ~

  19. PASSWORDS ???? The Basics

  20. PASSWORDS ???? Passwords should not be:

  21. GOOD VS. BAD PASSWORDS

  22. Final Reflection Questions • What are acceptable uses for social networking? (100 words) • How do I stay safe when using a social network? (100 words)

More Related