SlideShare uma empresa Scribd logo
1 de 8
Access to film,                           Keeping in
 radio , TV, e-                           touch with
    books                                 family and
                     Social media
                                            friends



                                       Search
     Entertainment
                         WWW           engines




You can access                           Discovering
   the www on          Accessibility         new
     laptops,                            information
 i-pad, phones,
Brainstorm the risks involved
   with uploading personal
information and surfing on the
             net.
   Social networking has become one of the fastest
    forms of communication, with the easy access to My-
    space, Face book, instant messaging, e-mail and
    blogs, these technologies are the main targets for
    cyber bullying.
   Majority of your students have access to at least one
    of these social networks, and may be exposed to the
    risks of cyber bullying.
   Expose students to the risks and ensure thy have a
    variety of avenues to take if they fall victim of cyber
    bullying.

   Cyber bullying Alert
   Class discussions

   Guest speakers (police, welfare)

   Interactive activities

   School policy on internet security

   Create opportunities to speak out
How much
What information    social media
have you got on     do you use?
the World Wide
Web?                               Who has
                                   access to
                                   your personal
                                   details?




Are you a good role model for cyber
         safety and security?
Get
                           involved




Resources and links to sites on educator resources page.
http://www.cybersmart.gov.au/



http://www.netsmartz.org/Educators


                http://www.staysmartonline.
                gov.au/schools_and_teach
                ers

Mais conteúdo relacionado

Mais procurados

Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
Priyanka Sharma
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 

Mais procurados (20)

Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
IT Security
IT SecurityIT Security
IT Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
introduction of Cyber securit
introduction of Cyber securitintroduction of Cyber securit
introduction of Cyber securit
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 

Destaque

Cyber threats
Cyber threatsCyber threats
Cyber threats
kelsports
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
Bilal Ali
 
Timeline to internet
Timeline to internetTimeline to internet
Timeline to internet
Romanbelic911
 
Timeline History of the Internet
Timeline History of the InternetTimeline History of the Internet
Timeline History of the Internet
Aven Mercado
 

Destaque (20)

Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
 
What’s In Cyberspace
What’s  In  CyberspaceWhat’s  In  Cyberspace
What’s In Cyberspace
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Theory Cyberspace
Theory CyberspaceTheory Cyberspace
Theory Cyberspace
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Web Meets World: Privacy and the Future of the Cloud
Web Meets World: Privacy and the Future of the CloudWeb Meets World: Privacy and the Future of the Cloud
Web Meets World: Privacy and the Future of the Cloud
 
Social impact of computers
Social impact of computersSocial impact of computers
Social impact of computers
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Spreadable Media and consumption
Spreadable Media and consumptionSpreadable Media and consumption
Spreadable Media and consumption
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Philosophy Of Cyberspace
Philosophy Of CyberspacePhilosophy Of Cyberspace
Philosophy Of Cyberspace
 
Activity 10 timeline of the history of the internet
Activity 10 timeline of the history of the internetActivity 10 timeline of the history of the internet
Activity 10 timeline of the history of the internet
 
Timeline to internet
Timeline to internetTimeline to internet
Timeline to internet
 
Timeline History of the Internet
Timeline History of the InternetTimeline History of the Internet
Timeline History of the Internet
 
Impact of computers on Society
Impact of computers on SocietyImpact of computers on Society
Impact of computers on Society
 
Tv Programmes
Tv Programmes Tv Programmes
Tv Programmes
 

Semelhante a Cyberspace slide show

Digital Privacy & Safety in Remote Aboriginal Communities
Digital Privacy & Safety in Remote Aboriginal CommunitiesDigital Privacy & Safety in Remote Aboriginal Communities
Digital Privacy & Safety in Remote Aboriginal Communities
PatFreeman
 
Legal Risks & SNS - teens
Legal Risks & SNS - teensLegal Risks & SNS - teens
Legal Risks & SNS - teens
Karen Keighery
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
cpitchford
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
paul
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
Ernest Staats
 

Semelhante a Cyberspace slide show (20)

A 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseA 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible Use
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Digital Privacy & Safety in Remote Aboriginal Communities
Digital Privacy & Safety in Remote Aboriginal CommunitiesDigital Privacy & Safety in Remote Aboriginal Communities
Digital Privacy & Safety in Remote Aboriginal Communities
 
CYP E-Safety
CYP E-SafetyCYP E-Safety
CYP E-Safety
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Social networks in schools
Social networks in schoolsSocial networks in schools
Social networks in schools
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and Safety
 
Legal Risks & SNS - teens
Legal Risks & SNS - teensLegal Risks & SNS - teens
Legal Risks & SNS - teens
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Oman presentation revised
Oman presentation revisedOman presentation revised
Oman presentation revised
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Mississippi State University Adams
Mississippi State University AdamsMississippi State University Adams
Mississippi State University Adams
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parents
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected Consequences
 
Digital drama
Digital dramaDigital drama
Digital drama
 

Último

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Cyberspace slide show

  • 1.
  • 2. Access to film, Keeping in radio , TV, e- touch with books family and Social media friends Search Entertainment WWW engines You can access Discovering the www on Accessibility new laptops, information i-pad, phones,
  • 3. Brainstorm the risks involved with uploading personal information and surfing on the net.
  • 4. Social networking has become one of the fastest forms of communication, with the easy access to My- space, Face book, instant messaging, e-mail and blogs, these technologies are the main targets for cyber bullying.  Majority of your students have access to at least one of these social networks, and may be exposed to the risks of cyber bullying.  Expose students to the risks and ensure thy have a variety of avenues to take if they fall victim of cyber bullying.  Cyber bullying Alert
  • 5. Class discussions  Guest speakers (police, welfare)  Interactive activities  School policy on internet security  Create opportunities to speak out
  • 6. How much What information social media have you got on do you use? the World Wide Web? Who has access to your personal details? Are you a good role model for cyber safety and security?
  • 7. Get involved Resources and links to sites on educator resources page.
  • 8. http://www.cybersmart.gov.au/ http://www.netsmartz.org/Educators http://www.staysmartonline. gov.au/schools_and_teach ers