SlideShare a Scribd company logo
1 of 35
Finally brothers, whatever is
true, whatever is noble, whatever is
right, whatever is pure, whatever is
lovely, whatever is admirable – if there
is anything excellent or worthy of
praise, think on these things.

Phil. 4:8
Physical Safety –
      freedom from physical harm
Psychological Safety –
     freedom from cruelty, harassment,
     exposure to potentially disturbing material
Reputational Safety –
     freedom from unwanted social or
     professional consequences that could affect a
     career
Identity or Property Safety –
     freedom from theft of identity and property
 It can be Public and Permanent
 You have no control who sees it and what
  they do with it
 Information can be copied, pasted and
  modified
 It may not be received in the way it was
  intended
    Unlike face to face when tone,
    expression give clues, there are none
    with the net
   Stranger danger
   Viewing inappropriate content
   Posting inappropriate content
   Cyber-bullying
   Privacy and reputation
   Online addiction
   Online inappropriate activities
   Device security
 Like it or not, personal information sites
 continue to be more accurate, dig deeper and
 reveal more and more of your digital life

 These entities gather information about
 you, your digital activities and your contacts
 Lost in the rapid progress of
 technology is a consistent, safe code
 of use

 Most digital users do not realize how
 quickly their online activities can be
 public and permanent
 Poor digital decision-making starts in
  the mind of the user
 Abusing technology, such as sexting
  and cyber-bullying are the effects of
  poor digital choices
 There will be consequences that
  usually creates a chain reaction that
  is very difficult to take back
 Development of a “Digital Consciousness”
 Golden Rule for the 21st century
“Develop and maintain a mindset that you are prepared
for your digital actions to be
            “public and permanent”

 Realize that you must operate powerful digital tools
 and technologies with the same preventative mindset
 that you would use for other things like fire or the
 automobile

 This mindset would have you evaluate risk vs. reward
                    before you post information
 Report: Teen gets 15 years for Facebook
    blackmail
   Nude picture on phone lost in McDonald’s
    ends up online
   Sexting in Maryland school gets student
    expelled
   Teen sentenced to 12 months in jail for sexual
    bullying on Facebook
   Weiner resigns after sexting scandal
 Provide you with information
 necessary to understand that you are
 accountable and responsible for
 maintaining a Digital Consciousness
Concerns:
 People may not be who they say they are so have a
  parent approve anyone you meet online before you
  talk to them
 If the conversation turns to sex or starts to make
  you uncomfortable, get off immediately
 If someone tries to meet you, contact an adult
  immediately
 Never meet up with someone you first meet online
       If you must take a parent or group
      of friends and meet in a very public place
 Your online life is a reflection of you
 Insist that you and people around
  you are treated respectfully
 Respect other people’s digital
  property
 Stuff you created belongs to you and
  you should control what is done with
  it
 Be original or cite your sources
 Have your work reflect excellence
 Protect your passwords
 Create secure passwords
 Use phrases that are easy to
    remember but hard to guess
 Don’t sue the same password for
    multiple sites
 Make sure that you have security
  software
 Be careful of WiFi hotspots – hotel
  lobbies, airports, etc.
 Don’t download anything from a
  source you don’t trust
 Always back up your data
 It’s up to you to control what other
  people know about you
 If it’s private, don’t post it online, even
  email
 Anything can be copied, pasted and
  forwarded
 Once it is posted, you cannot take it
  back
 Don’t post information that could get
  you in trouble now or in the future
 Do not give out personal information
Name                 Where you live
Phone number         Birthdate
Home Address         School/church

 You can give out impersonal
 information
Sports teams you like      favorite
movies
(Other likes and dislikes)
 Cyber-bullying – the use of technology to harm
  another person in a deliberate, repeated and
  hostile manner
 Cyber-Mobbing – a form of cyber bullying
  involving a group sharing the same malicious
  mindset or intent to harm
 Flaming – hostile interaction between internet
  users usually in a internet forum or chat room
 Cyber-stalking – using electronic means to
  gather information for the purpose of harass an
  individual or group; false accusations, threats
 Sexting – The act of sending an image, video,
    text, etc. of a sexual nature to another
    individual (digital), smart phone, etc.
   Outing – Publically revealing personal
    information without the person’s consent
   Impersonation – pretending to be another
    person in order to deceive
   Phishing – attempting to acquire sensitive
    information such as usernames, passwords,
    credit cart information through faking
    authenticity
   Malware – deliberate attempt to send a virus
    crippling the computer’s ability to call up
    data
 It is against the law
 It could haunt you later
 Don’t let provocative pictures be
  made of you
 Don’t send them online, even to
  someone you care about
 If you get them, don’t share them
 Don’t carry them around in your
  phone
 Bullying has been around a long time
  but cyber-bullying is a recent
  phenomenon
 Bullies can be invisible – victims don’t
  know who the bully is or why they are
  being targeted
 Viral – hurtful actions of the bully can
  spread to a large group of people, the
  school, the city,.. The perception is
  everyone is in on the joke
 Don’t respond or retaliate
 Talk to someone you trust especially
  an adult
 Save the evidence; it could be a police
  matter
 Be a friend not a bystander
 Ancomm
I want you to be wise about what is
good and innocent about what is evil.
Romans 16:10

With great power comes great responsibility.
Ben Parker – Spiderman
 Sources:
 “Social media snares”
 Safe surfing kids
 Safe kids.com
1. Which screen name is best to have?
    A. cheergirl9393
    B. chrisp1990
    C. sandysmith999
    D. horseluvr01
    E. tphscheergrl
2. While surfing the internet, you get an error
  message from your internet provider; it says
  that it will delete your account unless you
  type in your password again, should you send
  the information?
    A. Yes
    B. No

3. If someone online tells you they are a
  sophomore in high school, and they are taking
  Driver’s Education classes, they are probably
  how old?
    A. 14               B. 15
    C. 16               D. No way to tell
8. While surfing the internet, you see a
   website that makes you feel
   uncomfortable. What should you do?
    A. Write down its name and don’t go
       there again
    B. Tell you friends so that they can
       avoid it to
    C. Tell a parent, guardian or teacher
    D. Shut down the computer
1. I HAVE A PERSONAL SOCIAL WEB
PAGE (Facebook Linked in, etc)
(yes is 10 points)
2. I have posted my personal phone or
   cell number on my social website or
   chat room.
(yes is 10 points)
3. I have posted my home address on
   my social website.
(yes is 10 points)
4. I have posted my school/work name
   on my social website.
(yes – 10 points)
5. I post current and future status
   updates (going on vacation, going to
   the mall, etc).
(yes – 10 points)
6. My understanding is that deleting a
   pictureor test file from my Digital
   Tools removes them permanently.
(yes – 10 points)
7. I have anti-virus and anti-spyware
   programs installed on my computer.
(no – 10 points)
8. I run my anti-virus and anti-
   spyware programs daily.
(no – 10 points)
9. In the digital world, I feel that I am
   anonymous.
(yes – 20 points)
10. My social website passsword is
   truly able to keep my contents
   private.
(yes – 10 points)
11. I have taken digital pictures/video
   of myself which I would not feel
   comfortable showing my parents.
(yes – 50 points)
12. I shared pictures, video, texts about
   myself that I would not show my
   parents.
(yes – 100 points)
13. I so and say things in front of my
   webcam that I would not show my
   parents.
(yes – 50 points)
14. I have, for what ever
  reason, harassed or bullied others
  through digital technology.
(yes – 100 points)

1-30appear to be using digital
technology responsibly; chances are
low of being involved in an issue
40 – 120 moderately high risk of
identity theft or exploitation
130 – high risk to face a severe or
dangerous situation

More Related Content

What's hot

Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kidsChris Burrows
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineIan Krieger
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints PresentationProjectsByJen.com
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 

What's hot (20)

Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 

Viewers also liked

Cyber safety
Cyber safetyCyber safety
Cyber safetysmartins7
 
Impact cyber safety revised
Impact cyber safety revisedImpact cyber safety revised
Impact cyber safety revisedlibraryreeder
 
Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety Mark Woolley
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingMatt Britland
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 

Viewers also liked (9)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Impact cyber safety revised
Impact cyber safety revisedImpact cyber safety revised
Impact cyber safety revised
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Comp 107 cep 8
Comp 107 cep 8Comp 107 cep 8
Comp 107 cep 8
 
Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 

Similar to Cyber-Safety and Digital Citizenship

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptxDIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptxvanessacabang2
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parentssirchriss
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safelytimryan7
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Quennith
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson planQuennith
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 

Similar to Cyber-Safety and Digital Citizenship (20)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptxDIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson plan
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 

Recently uploaded

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 

Recently uploaded (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 

Cyber-Safety and Digital Citizenship

  • 1.
  • 2. Finally brothers, whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable – if there is anything excellent or worthy of praise, think on these things. Phil. 4:8
  • 3. Physical Safety – freedom from physical harm Psychological Safety – freedom from cruelty, harassment, exposure to potentially disturbing material Reputational Safety – freedom from unwanted social or professional consequences that could affect a career Identity or Property Safety – freedom from theft of identity and property
  • 4.  It can be Public and Permanent  You have no control who sees it and what they do with it  Information can be copied, pasted and modified  It may not be received in the way it was intended Unlike face to face when tone, expression give clues, there are none with the net
  • 5. Stranger danger  Viewing inappropriate content  Posting inappropriate content  Cyber-bullying  Privacy and reputation  Online addiction  Online inappropriate activities  Device security
  • 6.  Like it or not, personal information sites continue to be more accurate, dig deeper and reveal more and more of your digital life  These entities gather information about you, your digital activities and your contacts
  • 7.  Lost in the rapid progress of technology is a consistent, safe code of use  Most digital users do not realize how quickly their online activities can be public and permanent
  • 8.  Poor digital decision-making starts in the mind of the user  Abusing technology, such as sexting and cyber-bullying are the effects of poor digital choices  There will be consequences that usually creates a chain reaction that is very difficult to take back
  • 9.  Development of a “Digital Consciousness”  Golden Rule for the 21st century “Develop and maintain a mindset that you are prepared for your digital actions to be “public and permanent”  Realize that you must operate powerful digital tools and technologies with the same preventative mindset that you would use for other things like fire or the automobile  This mindset would have you evaluate risk vs. reward before you post information
  • 10.  Report: Teen gets 15 years for Facebook blackmail  Nude picture on phone lost in McDonald’s ends up online  Sexting in Maryland school gets student expelled  Teen sentenced to 12 months in jail for sexual bullying on Facebook  Weiner resigns after sexting scandal
  • 11.  Provide you with information necessary to understand that you are accountable and responsible for maintaining a Digital Consciousness
  • 12. Concerns:  People may not be who they say they are so have a parent approve anyone you meet online before you talk to them  If the conversation turns to sex or starts to make you uncomfortable, get off immediately  If someone tries to meet you, contact an adult immediately  Never meet up with someone you first meet online If you must take a parent or group of friends and meet in a very public place
  • 13.  Your online life is a reflection of you  Insist that you and people around you are treated respectfully  Respect other people’s digital property  Stuff you created belongs to you and you should control what is done with it  Be original or cite your sources  Have your work reflect excellence
  • 14.  Protect your passwords  Create secure passwords  Use phrases that are easy to remember but hard to guess  Don’t sue the same password for multiple sites
  • 15.  Make sure that you have security software  Be careful of WiFi hotspots – hotel lobbies, airports, etc.  Don’t download anything from a source you don’t trust  Always back up your data
  • 16.  It’s up to you to control what other people know about you  If it’s private, don’t post it online, even email  Anything can be copied, pasted and forwarded  Once it is posted, you cannot take it back  Don’t post information that could get you in trouble now or in the future
  • 17.  Do not give out personal information Name Where you live Phone number Birthdate Home Address School/church  You can give out impersonal information Sports teams you like favorite movies (Other likes and dislikes)
  • 18.  Cyber-bullying – the use of technology to harm another person in a deliberate, repeated and hostile manner  Cyber-Mobbing – a form of cyber bullying involving a group sharing the same malicious mindset or intent to harm  Flaming – hostile interaction between internet users usually in a internet forum or chat room  Cyber-stalking – using electronic means to gather information for the purpose of harass an individual or group; false accusations, threats
  • 19.  Sexting – The act of sending an image, video, text, etc. of a sexual nature to another individual (digital), smart phone, etc.  Outing – Publically revealing personal information without the person’s consent  Impersonation – pretending to be another person in order to deceive  Phishing – attempting to acquire sensitive information such as usernames, passwords, credit cart information through faking authenticity  Malware – deliberate attempt to send a virus crippling the computer’s ability to call up data
  • 20.  It is against the law  It could haunt you later  Don’t let provocative pictures be made of you  Don’t send them online, even to someone you care about  If you get them, don’t share them  Don’t carry them around in your phone
  • 21.  Bullying has been around a long time but cyber-bullying is a recent phenomenon  Bullies can be invisible – victims don’t know who the bully is or why they are being targeted  Viral – hurtful actions of the bully can spread to a large group of people, the school, the city,.. The perception is everyone is in on the joke
  • 22.  Don’t respond or retaliate  Talk to someone you trust especially an adult  Save the evidence; it could be a police matter  Be a friend not a bystander  Ancomm
  • 23. I want you to be wise about what is good and innocent about what is evil. Romans 16:10 With great power comes great responsibility. Ben Parker – Spiderman
  • 24.  Sources:  “Social media snares”  Safe surfing kids  Safe kids.com
  • 25. 1. Which screen name is best to have? A. cheergirl9393 B. chrisp1990 C. sandysmith999 D. horseluvr01 E. tphscheergrl
  • 26. 2. While surfing the internet, you get an error message from your internet provider; it says that it will delete your account unless you type in your password again, should you send the information? A. Yes B. No 3. If someone online tells you they are a sophomore in high school, and they are taking Driver’s Education classes, they are probably how old? A. 14 B. 15 C. 16 D. No way to tell
  • 27.
  • 28.
  • 29.
  • 30. 8. While surfing the internet, you see a website that makes you feel uncomfortable. What should you do? A. Write down its name and don’t go there again B. Tell you friends so that they can avoid it to C. Tell a parent, guardian or teacher D. Shut down the computer
  • 31. 1. I HAVE A PERSONAL SOCIAL WEB PAGE (Facebook Linked in, etc) (yes is 10 points) 2. I have posted my personal phone or cell number on my social website or chat room. (yes is 10 points) 3. I have posted my home address on my social website. (yes is 10 points)
  • 32. 4. I have posted my school/work name on my social website. (yes – 10 points) 5. I post current and future status updates (going on vacation, going to the mall, etc). (yes – 10 points) 6. My understanding is that deleting a pictureor test file from my Digital Tools removes them permanently. (yes – 10 points)
  • 33. 7. I have anti-virus and anti-spyware programs installed on my computer. (no – 10 points) 8. I run my anti-virus and anti- spyware programs daily. (no – 10 points) 9. In the digital world, I feel that I am anonymous. (yes – 20 points) 10. My social website passsword is truly able to keep my contents private. (yes – 10 points)
  • 34. 11. I have taken digital pictures/video of myself which I would not feel comfortable showing my parents. (yes – 50 points) 12. I shared pictures, video, texts about myself that I would not show my parents. (yes – 100 points) 13. I so and say things in front of my webcam that I would not show my parents. (yes – 50 points)
  • 35. 14. I have, for what ever reason, harassed or bullied others through digital technology. (yes – 100 points) 1-30appear to be using digital technology responsibly; chances are low of being involved in an issue 40 – 120 moderately high risk of identity theft or exploitation 130 – high risk to face a severe or dangerous situation