Staying Safe in Cyberspace
Staying Safe in Cyberspace
Jessica KohlerITC 525
Jessica KohlerITC 525
QuickTime™ and a decompressor
are needed to see this picture.
Table of ContentsTable of Contents Safety Rules
Cyber Bullying Netiquette
Email Safety
Standards CreditsCybersmart Video
License to Surf the Web
Safety Rules
Cyber Bullying Netiquette
Email Safety
Standards CreditsCybersmart Video
License to Surf the Web
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
Safety RulesSafety Rules
HOME
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
More Info.
*Only use the Internet when there is an adult home. *Don’t answer email from strangers. *Tell an adult when you feel unsafe. *Keep passwords private. *Don’t meet someone in person whom you met
online. *Don’t send your picture to anyone online.
Even More Info.
QuickTime™ and a decompressor
are needed to see this picture.
Are you safety savvy?Are you safety savvy?
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
BACK
What are some ways you can stay safe on the Internet?
a. Share your password with others. b. Don’t send your picture to anyone online. c. Use the Internet when no one is home.
Let’s try again!Let’s try again!
QuickTime™ and a decompressor
are needed to see this picture.
HOME
Keep your password private. Others can hack into your accounts using your password.
QuickTime™ and a decompressor
are needed to see this picture.
Let’s try again!Let’s try again!
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Make sure there is an adult at home when using the Internet. Who else will you tell if something goes wrong?
Correct! Correct!QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
HOME
Make sure you don’t send pictures to people over the Internet (even if you know them.)
Cyber BullyingCyber Bullying
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
What is it? *When a child is tormented,
threatened, harassed, humiliated, embarrassed, or targeted by another child using the Internet or cell phones.
How it Works: *Direct attacks *Using others as accomplicesTake Action!
Keep personal information private. Stop, Block, and Tell. Take 5!
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
VIDEO
Are you safety savvy?Are you safety savvy?
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
BACK
What actions can you take to stop Cyper Bullying?
a. Keep personal information private.
b. Help spread the rumors.
c. Text harmful information about
another person.
True or False?
Cyber bullying is talking with a friend over the Internet.
Let’s look at that again!
Let’s look at that again!
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Simply talking with a friend over the Internet is not Cyber Bullying.
Let’s look at that again!
Let’s look at that again!
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Helping to spread rumors is being an accomplice to the bullying.
Let’s look at that again!
Let’s look at that again!
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Texting harmful information about another person is Cyber Bullying.
Great Thinking!
Great Thinking!
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
HOME
Cyber Bullying is when a child is tormented, threatened, harassed, humiliated, embarrassed, or targeted by another child using the Internet or cell phones.
Bullies could be a friend or just an acquaintance.
Great Thinking!
Great Thinking!
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
HOME
Make sure you keep your personalinformation private.
Bullies could be a friend or just an acquaintance.
Email SafetyEmail Safety
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Email Dangers: *Chain Letters *Hoaxes, rumors and urban
legends *Phishing *Scams and fraud *Spam *Spoofing *Viruses
What are these?
Safety Tips: *Change password often *Keep password private *Log off when done *Don’t reply to spam, harassing, or offensive email. *Don’t forward chain letters *Delete emails, UNREAD,
from people you don’t know
*Use anti-virus programs before opening attachments.
Even more Information!
QuickTime™ and a decompressor
are needed to see this picture.
Are you safety savvy?Are you safety savvy?
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
BACK
What are some email dangers? a. Chain Letters b. Phishing c. Spam d. All of the above
Not Quite!Not Quite!
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Take another look at that list.
Way To Go! Way To Go!QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
HOME
Spam, Phishing, and Chain Letters can be dangerous.
Watch Out for these too: *Hoaxes, rumors and urban legends *Scams and fraud *Spoofing *Viruses
NetiquetteNetiquette
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Respect all other users!
Be patient with newcomers.
Be careful to not use rude or bad language online.
Make a good impression.
Do not TYPE IN ALL CAPITAL LETTERS.
Don’t break any laws.
Do to others as you would have them do to you.
More Info.
Even More Info.
What is it? Internet etiquette or guidelines for proper behavior on the Internet.
QuickTime™ and a decompressorare needed to see this picture.
Are you safety savvy?Are you safety savvy?
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
BACK
What is an example of good Internet behavior?
a. TYPE IN ALL CAPITAL LETTERS b. Use rude or bad language c. Do to others as you would have them do to you.
Do you need a redo?Do you need a redo?
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Typing in all capital letters makes people think you are yelling at them. This is not good Internet behavior.
Do you need a redo?Do you need a redo?
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Using rude or bad language anywhere, whether on the Internet or not is inappropriate behavior. Many Internet providers will terminate your account if you use this type of language.
Absolutely! Absolutely!QuickTime™ and a
decompressorare needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
HOME
Doing to others as you would like them to do to you is a rule you should use throughout your life. This is wonderful Internet behavior to have.
Get Cybersmart with Phineas and Ferb
Get Cybersmart with Phineas and Ferb
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
HOME
Earn Your License to Surf the Web
Earn Your License to Surf the Web
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
HOME
“Rules of the Road”
PA State StandardsPA State Standards
QuickTime™ and a decompressor
are needed to see this picture.
HOME
Science and Technology and Engineering Education 3.4.B: Technology and Society
3.4.5.B1: Explain how the use of technology can have unintended consequences.
3.4.D: Abilities for a Technological World 3.4.5.D3: Determine if the human use of a product or system creates
positive or negative results.
National Educational Technology Standards
National Educational Technology Standards
5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior.
Students: a. advocate and practice safe, legal, and responsible use of
information and technology. c. demonstrate personal responsibility for lifelong learning. d. exhibit leadership for digital citizenship.
CreditsCreditsSites
http://www.protectkids.com/youthsafety/safteytipskids.htmhttp://www.ccmostwanted.com/kids/iguide.htmhttp://www.stopcyberbullying.org/index2.htmlhttp://www.youtube.com/watch?v=o0W_tEUMzuk
http://www.wiredsafety.org/safety/email_safety/http://www.commonsensemedia.org/get-cybersmart-phineas-and-ferb#
http://www.ccmostwanted.com/kids/inetiquette.htmhttp://www.kidsdomain.com/brain/computer/surfing/netiquette_kids.html
http://pbskids.org/license/
Imageshttp://dynasium.files.wordpress.com/2008/12/6a00d8341c7bc453ef00e5505e03c48833-800wi.jpg
http://www.clker.com/clipart-13158.htmlhttp://reallessons4reallearning.wikispaces.com/file/view/computer-clipart.gif/131750119/computer-clipart.gif
http://cdnet.myxer.com/tn/c/1943197/big/?t=20090522165142http://www.chairvilleschool.org/webquests/internet_safety1_check.gifhttp://www.villageofworth.com/Police/email/envelope-circle-clipart.gif
http://www.graphicsfactory.com/clip-art/image_files/tn_image/0/755640-tn_BIB0101.gifhttp://www.urenco.com/uploads/images/safety%20sign.JPG
http://glma.files.wordpress.com/2007/12/cyberbullying.jpghttp://scorpion1333.files.wordpress.com/2009/06/phineas-and-ferb-300a071708.jpg
http://www.gpl.lib.me.us/movie.gif
Siteshttp://www.protectkids.com/youthsafety/safteytipskids.htm
http://www.ccmostwanted.com/kids/iguide.htmhttp://www.stopcyberbullying.org/index2.htmlhttp://www.youtube.com/watch?v=o0W_tEUMzuk
http://www.wiredsafety.org/safety/email_safety/http://www.commonsensemedia.org/get-cybersmart-phineas-and-ferb#
http://www.ccmostwanted.com/kids/inetiquette.htmhttp://www.kidsdomain.com/brain/computer/surfing/netiquette_kids.html
http://pbskids.org/license/
Imageshttp://dynasium.files.wordpress.com/2008/12/6a00d8341c7bc453ef00e5505e03c48833-800wi.jpg
http://www.clker.com/clipart-13158.htmlhttp://reallessons4reallearning.wikispaces.com/file/view/computer-clipart.gif/131750119/computer-clipart.gif
http://cdnet.myxer.com/tn/c/1943197/big/?t=20090522165142http://www.chairvilleschool.org/webquests/internet_safety1_check.gifhttp://www.villageofworth.com/Police/email/envelope-circle-clipart.gif
http://www.graphicsfactory.com/clip-art/image_files/tn_image/0/755640-tn_BIB0101.gifhttp://www.urenco.com/uploads/images/safety%20sign.JPG
http://glma.files.wordpress.com/2007/12/cyberbullying.jpghttp://scorpion1333.files.wordpress.com/2009/06/phineas-and-ferb-300a071708.jpg
http://www.gpl.lib.me.us/movie.gif
QuickTime™ and a decompressor
are needed to see this picture.
HOME