Cybersafey

Vanessa Assumpção
CYBERSAFETY
    Karenyne
    Lídia
    Raquel
    Vanessa
Cybersafety: what is it?
   Cybersafety is the ability to act in a safe and responsible
    manner while using technology.

   The goal in teaching this is to help people to recognize
    online risks, make informed decisions and take
    appropriate actions to protect themselves.

   This also includes helping people understand the
    importance of following terms of use guidelines, having
    also a disciplined and productive use of internet time,
    safely exiting na inappropriate site and avoiding
    cyberbullying.
3 Cs of Digital Citizenzhip
   Appropriate Contact: teach people how to have healthy
    and appropriate relationship online and expect your
    expectation for whom they communicate with online.

   Appropriate Content: be very clear about your
    expectation for acceptable content. Is it healthy,
    responsible, ethical?

   Appropriate Conduct: teach people appropriate online
    behavior. Help them understand that everything they do
    online contributes to thei online reputation.
For parents
   You can help your child become a responsible
    and ethical digital citizen with healthy online
    relationships. Resilient digital citizens recognize
    and seek out the 3 Cs in all digital settings.
   Keep current with the technology your child uses.
   Keep comunicating with your child about everything they
    experience on internet.
   Keep checking your child’s internet activity. Know where
    they go online.
For educators
   You can help your students become responsible,
    ethical and resilitent digital citizens. Resilient
    digital citizents recognize and seek out the 3 Cs in
    all digital settings (e.g., iPods, instant messaging,
    chat, computer, games, cell phones, webcams).

               For communities

Community and faith-based organizations play a
critical role in empowering communities and youth to
become responsible, ethical and resilient digital
citizens.
Digital Citenship
“a holistic and positive approach to helping
  children learn how to be safe and secure, as
  well as smart and effective participants in a
  digital world. That means helping them
  understand their rights and responsibilities,
  recognize the benefits and risks, and realize
  the personal and ethical implications of their
  actions.“
   Community and faith-based organizations play a
    critical role in empowering communities and youth
    to become responsible, ethical and resilient digital
    citizens.
Balacing Screen Time
Balancing our real life with screen time can be a trick
  for adults and kids. Because digital media is useful
  and engaging—and good at holding our attention—it
  can be tempting to use it all the time. Users with a
  “compulsive Internet habit, . . . exhibit a higher
incidence of moderate to severe depression than non-
  addicted users.”
The American Academy of Pediatrics continues to
  recommend that children and teens use no more
  than two hours per day of screen time, and that
  parents create an “electronic media-
  free”environment in children’s bedrooms. Parents
  can support each
other and empower other parents by following these
guidelines.
Ethical Use
Students and staff must learn to function as ethically
  in their online world as they do in their offline world.
  To apply ethics tothe digital world, we should:
Abide by terms of use.
Avoid piracy or stealing of any kind.
Respect other citizens.
Accurately represent authorship.
Acknowledge when we use ideas taken from another
  source.
How we treat other citizens online affects how we feel
  about ourselves and the world around us. Students
  can't harass, abuse,
or otherwise mistreat people (harassment/bullying) or
  property (hacking, piracy).
Personal Information
“Generally, the information that children shouldn't share
   online doesn't deviate much as they get older. Personally
   identifiable information such as home addresses, phone
   numbers, and excessive pictures should always be
   avoided. At an early age, establish with children the
   difference between personal information and public
   information.
"Digital media can put users at risk by exposing information
   to anyone with the know-how to access it—resulting in
   identity theft or boundary invasion.
However, digital media offers a means to share information
   quickly and broadly. Teens can locate nearby resources
   (e.g., by entering a ZIP code, address, or school name
   into a search engine) and share relevant information with
   friends and family
(e.g., social plans, pick-up times).
Relationships
Digital media are excellent tools for forging and
  maintaining healthy and safe relationships. For
  example, 82% of socialnetworking teens say they
  use these sites to stay in touch with friends they
  rarely see in person. Another study reports that
  time spent on Facebook facilitates offline
  interactions. As with all tools, how we use them
  determines whether they provide positive
  opportunities or expose us to risk. Media can either
  enhance relationships, supporting positive growth,
  or put users at risk.
This is an area where tweens and teens will need
  mentoring from the adults in their lives. They may
  need encouragement to take a break from digital
  media or to report harassment (of themselves or
  others) or inappropriate contact.
Reputation
Storing important information digitally (e.g. account
  numbers, phone numbers, health information, etc.)
  provides convenience but may also put users at risk
  if confidential information is accessed at the wrong
  time, by the wrong people, or if the device is
  misplaced. Families can work together to achieve
digital security for everyone within the home.
Parents should: Secure and back up data, monitor
  devices used by minors and also be careful with
  Antivirus and spyware suppression, Filtering,
  patching, and firewalls.
Security
Storing important information digitally (e.g. account
  numbers, phone numbers, health information, etc.)
  provides convenience but may also put users at risk
  if confidential information is accessed at the wrong
  time, by the wrong people, or if the device is
  misplaced. Families can work together to achieve
  digital security for everyone within the home.
  Parents should: Secure and back up data, monitor
  devices used by minors and also be careful with
  Antivirus and spyware suppression, Filtering,
  patching, and firewalls.
C3 Matrix
The iKeepSafe Digital Citizenship C3 Matrix is provided here
  to assist educators in integrating the essentials of cyber-
  safety, cyber-security, and cyber-ethics (C3 concepts) into
  existing technology and literacy standards and curricula. It
  takes a holistic and comprehensive approach to preparing
  students for 21st century digital communication. The Matrix
  outlines competency levels for C3 concepts divided into
  three levels: basic, intermediate, and proficient. The three
  competency levels outlined in the C3 Matrix are not
  identified by grade level; rather, they represent progressive
  levels of cognitive complexity at which youth should be
  expected to understand and practice.
Smart Students in a Digital World:
 5 Rules for Staying Safe Online


       Research before you register
       Discriminate
       Think before typing
       Require ID
       Trust your gut
Prevent & Detect

Digital culture: kids offer up emotional and
     psychological data to peers online

    3 things parents can do:
    Keep current
    Keep communication
    Keep checking
Using Technology to Prevent and
           Protect
                   The Analysis:

     Risk Factors
     Warning signs (victim/abuser)
     Actions:
            To reduce risk factors
            To increase factors of prevention
Identifing and Analysing the
          Problems
      Dating Violence
      Drug and Alcohol Abuse
      Eating Disorders
      Online Gang Recruitment
      High-Risk Sexual Activity
      Sexual Violence
      Suicide and Self Harm
      Youth Violence
How to check webpages

Programs that help in that task

          Firewall
          Anti-virus
          Parental Control Tools
The most important tool is to use
     the web in a safe way.

   Use legal downloads, which tend to be safer.
   Beware of social networks. People tend to give
    too much personal information away, which
    make it easier for people to prey on them.
   Avoid porn websites.
   Access mostly websites you already know.
   Never click on anything that makes wild
    promises.
NO SOFTWARE IS GOING TO HELP
 YOU MUCH IF YOU DO NOT SURF
    THE NET IN A SAFE WAY.
1 de 20

Recomendados

Cybersafety Version1 por
Cybersafety Version1Cybersafety Version1
Cybersafety Version1sabrinacotta
2.1K visualizações15 slides
Module 1 Lesson 1 ICT Competency Standards for Philippine Pre-Service Teacher... por
Module 1 Lesson 1 ICT Competency Standards for Philippine Pre-Service Teacher...Module 1 Lesson 1 ICT Competency Standards for Philippine Pre-Service Teacher...
Module 1 Lesson 1 ICT Competency Standards for Philippine Pre-Service Teacher...Alex Almohallas
1.8K visualizações15 slides
Module 2 lesson 2 por
Module 2 lesson 2Module 2 lesson 2
Module 2 lesson 2Ira Sagu
3.3K visualizações18 slides
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING por
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNINGICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNINGAllan Lloyd Martinez
19.1K visualizações24 slides
Lesson 1 ict competency standards for philippine pre-service teacher education por
Lesson 1 ict competency standards for philippine pre-service teacher educationLesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher educationIra Sagu
62.3K visualizações18 slides
Ict policies and issues por
Ict policies and issuesIct policies and issues
Ict policies and issueserwin marlon sario
31.3K visualizações12 slides

Mais conteúdo relacionado

Mais procurados

Models of Technology-Enhanced Instructional Lessons por
Models of Technology-Enhanced Instructional LessonsModels of Technology-Enhanced Instructional Lessons
Models of Technology-Enhanced Instructional LessonsIra Sagu
10.5K visualizações18 slides
Curriculum por
CurriculumCurriculum
CurriculumSFYC
41.9K visualizações77 slides
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and... por
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Reji Mae Sunot
12.3K visualizações14 slides
Affective Learning Competencies por
Affective Learning CompetenciesAffective Learning Competencies
Affective Learning CompetenciesBenjJamiesonDuag
48.5K visualizações35 slides
MTB-MLE Framework por
MTB-MLE FrameworkMTB-MLE Framework
MTB-MLE FrameworkMaryJane162
17.1K visualizações29 slides
TTL-1 Module 2 lesson 1 por
TTL-1 Module 2  lesson 1TTL-1 Module 2  lesson 1
TTL-1 Module 2 lesson 1Ira Sagu
2.7K visualizações23 slides

Mais procurados(20)

Models of Technology-Enhanced Instructional Lessons por Ira Sagu
Models of Technology-Enhanced Instructional LessonsModels of Technology-Enhanced Instructional Lessons
Models of Technology-Enhanced Instructional Lessons
Ira Sagu10.5K visualizações
Curriculum por SFYC
CurriculumCurriculum
Curriculum
SFYC41.9K visualizações
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and... por Reji Mae Sunot
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Reji Mae Sunot12.3K visualizações
Affective Learning Competencies por BenjJamiesonDuag
Affective Learning CompetenciesAffective Learning Competencies
Affective Learning Competencies
BenjJamiesonDuag48.5K visualizações
MTB-MLE Framework por MaryJane162
MTB-MLE FrameworkMTB-MLE Framework
MTB-MLE Framework
MaryJane16217.1K visualizações
TTL-1 Module 2 lesson 1 por Ira Sagu
TTL-1 Module 2  lesson 1TTL-1 Module 2  lesson 1
TTL-1 Module 2 lesson 1
Ira Sagu2.7K visualizações
K to 12 Basic Education Curriculum por Joey Valdriz
K to 12 Basic Education CurriculumK to 12 Basic Education Curriculum
K to 12 Basic Education Curriculum
Joey Valdriz29.9K visualizações
N.C.B.T.S.-National Competency-Based Teacher's Standard (2013) por Marianne Seras
N.C.B.T.S.-National Competency-Based Teacher's Standard (2013)N.C.B.T.S.-National Competency-Based Teacher's Standard (2013)
N.C.B.T.S.-National Competency-Based Teacher's Standard (2013)
Marianne Seras212K visualizações
Module 1 ppt 1 K 12 framework por RASBorja
Module 1 ppt 1 K 12 frameworkModule 1 ppt 1 K 12 framework
Module 1 ppt 1 K 12 framework
RASBorja32K visualizações
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES por NethBataller1
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULESSAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
NethBataller14.8K visualizações
Teacher as curricularist por Cris Capilayan
Teacher as curricularistTeacher as curricularist
Teacher as curricularist
Cris Capilayan118.1K visualizações
Understanding the Basic Concept in ICT por Bai Saguira Abdulah-Malik
Understanding the Basic Concept in ICTUnderstanding the Basic Concept in ICT
Understanding the Basic Concept in ICT
Bai Saguira Abdulah-Malik22.4K visualizações
Characteristics of 21st Century Assessment por Sarah Mae Moniva
Characteristics of 21st Century AssessmentCharacteristics of 21st Century Assessment
Characteristics of 21st Century Assessment
Sarah Mae Moniva102.8K visualizações
EDUC 115 (K-12 Program) por Jellai Lascamana
EDUC 115 (K-12 Program)EDUC 115 (K-12 Program)
EDUC 115 (K-12 Program)
Jellai Lascamana13.4K visualizações
Global Issues That Concern Schools and Society.docx por SheldonDarylToledo
Global Issues That Concern Schools and Society.docxGlobal Issues That Concern Schools and Society.docx
Global Issues That Concern Schools and Society.docx
SheldonDarylToledo1.8K visualizações
Online resources, educational sites, and portals por erwin marlon sario
Online resources, educational sites, and portalsOnline resources, educational sites, and portals
Online resources, educational sites, and portals
erwin marlon sario13.5K visualizações
Digital literacy skills in the 21 st century por erwin marlon sario
Digital literacy skills in the 21 st centuryDigital literacy skills in the 21 st century
Digital literacy skills in the 21 st century
erwin marlon sario29.2K visualizações
CHED Memorandum Order No. 30 por Amit Pobadora
CHED Memorandum Order No. 30CHED Memorandum Order No. 30
CHED Memorandum Order No. 30
Amit Pobadora34.8K visualizações
R.A. No. 10533 por Jaypee Baylosis
R.A. No. 10533R.A. No. 10533
R.A. No. 10533
Jaypee Baylosis47K visualizações
The Enhanced Basic Education Act of 2013 (K-12) por Rizza Lynn Labastida
The Enhanced Basic Education Act of 2013 (K-12)The Enhanced Basic Education Act of 2013 (K-12)
The Enhanced Basic Education Act of 2013 (K-12)
Rizza Lynn Labastida52.5K visualizações

Similar a Cybersafey

Safe Internet (Art 203) por
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)Sumaiya Ismail
84 visualizações8 slides
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes... por
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
2.7K visualizações42 slides
Tot edu eng. por
Tot edu eng.Tot edu eng.
Tot edu eng.Mohamed ElGabry
553 visualizações82 slides
Cyber ethics por
Cyber ethicsCyber ethics
Cyber ethicsPreet Hanspal
15.7K visualizações82 slides
Healing our online sickness by cyber path por
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber pathProfsdetchana Murthy
132 visualizações7 slides
Ouch 201705 en por
Ouch 201705 enOuch 201705 en
Ouch 201705 enMichael Clemons
73 visualizações3 slides

Similar a Cybersafey (20)

Safe Internet (Art 203) por Sumaiya Ismail
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
Sumaiya Ismail84 visualizações
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes... por mulingoh
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
mulingoh2.7K visualizações
Tot edu eng. por Mohamed ElGabry
Tot edu eng.Tot edu eng.
Tot edu eng.
Mohamed ElGabry553 visualizações
Cyber ethics por Preet Hanspal
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal15.7K visualizações
Healing our online sickness by cyber path por Profsdetchana Murthy
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
Profsdetchana Murthy132 visualizações
Ouch 201705 en por Michael Clemons
Ouch 201705 enOuch 201705 en
Ouch 201705 en
Michael Clemons73 visualizações
Information Literacy and Online Safety por Donna Murray
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
Donna Murray919 visualizações
Digital citizenship por Inas Hafi
Digital citizenshipDigital citizenship
Digital citizenship
Inas Hafi3 visualizações
Murphy Ppt.Digital Citizenship In Our Schools por Kevin Murphy
Murphy Ppt.Digital Citizenship In Our SchoolsMurphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our Schools
Kevin Murphy706 visualizações
Net Cetera: Chatting with Kids About Being Online 2014 por - Mark - Fullbright
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
- Mark - Fullbright484 visualizações
Digital life middle school presentation at Great Neck South Middle por Heather Joseph Peretz
Digital life   middle school presentation at Great Neck South Middle Digital life   middle school presentation at Great Neck South Middle
Digital life middle school presentation at Great Neck South Middle
Heather Joseph Peretz1.9K visualizações
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx por ronak56
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
ronak564 visualizações
Lawek mui por Mui Lawek
Lawek muiLawek mui
Lawek mui
Mui Lawek19 visualizações
School Librarians Case Study por Yolanda Gonzalez
School Librarians Case StudySchool Librarians Case Study
School Librarians Case Study
Yolanda Gonzalez3 visualizações
Digital life - Sea cliff PCA Presentation 11/19/13 por Heather Joseph Peretz
Digital life - Sea cliff PCA Presentation 11/19/13Digital life - Sea cliff PCA Presentation 11/19/13
Digital life - Sea cliff PCA Presentation 11/19/13
Heather Joseph Peretz1.4K visualizações
digital citizenship poe por Khanyiso Nemuhuyuni
digital citizenship poedigital citizenship poe
digital citizenship poe
Khanyiso Nemuhuyuni140 visualizações
Social Media Policy for our School District por SallyLynnMcLean
Social Media Policy for our School DistrictSocial Media Policy for our School District
Social Media Policy for our School District
SallyLynnMcLean379 visualizações
Cyber safety & social media deck por sagedayschool
Cyber safety & social media deckCyber safety & social media deck
Cyber safety & social media deck
sagedayschool765 visualizações

Último

11.28.23 Social Capital and Social Exclusion.pptx por
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptxmary850239
304 visualizações25 slides
ICS3211_lecture 08_2023.pdf por
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdfVanessa Camilleri
187 visualizações30 slides
Google solution challenge..pptx por
Google solution challenge..pptxGoogle solution challenge..pptx
Google solution challenge..pptxChitreshGyanani1
135 visualizações18 slides
The Value and Role of Media and Information Literacy in the Information Age a... por
The Value and Role of Media and Information Literacy in the Information Age a...The Value and Role of Media and Information Literacy in the Information Age a...
The Value and Role of Media and Information Literacy in the Information Age a...Naseej Academy أكاديمية نسيج
54 visualizações42 slides
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... por
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Ms. Pooja Bhandare
109 visualizações45 slides
Women from Hackney’s History: Stoke Newington by Sue Doe por
Women from Hackney’s History: Stoke Newington by Sue DoeWomen from Hackney’s History: Stoke Newington by Sue Doe
Women from Hackney’s History: Stoke Newington by Sue DoeHistory of Stoke Newington
157 visualizações21 slides

Último(20)

11.28.23 Social Capital and Social Exclusion.pptx por mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239304 visualizações
ICS3211_lecture 08_2023.pdf por Vanessa Camilleri
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdf
Vanessa Camilleri187 visualizações
Google solution challenge..pptx por ChitreshGyanani1
Google solution challenge..pptxGoogle solution challenge..pptx
Google solution challenge..pptx
ChitreshGyanani1135 visualizações
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... por Ms. Pooja Bhandare
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Ms. Pooja Bhandare109 visualizações
Women from Hackney’s History: Stoke Newington by Sue Doe por History of Stoke Newington
Women from Hackney’s History: Stoke Newington by Sue DoeWomen from Hackney’s History: Stoke Newington by Sue Doe
Women from Hackney’s History: Stoke Newington by Sue Doe
History of Stoke Newington157 visualizações
Solar System and Galaxies.pptx por DrHafizKosar
Solar System and Galaxies.pptxSolar System and Galaxies.pptx
Solar System and Galaxies.pptx
DrHafizKosar94 visualizações
Java Simplified: Understanding Programming Basics por Akshaj Vadakkath Joshy
Java Simplified: Understanding Programming BasicsJava Simplified: Understanding Programming Basics
Java Simplified: Understanding Programming Basics
Akshaj Vadakkath Joshy316 visualizações
Psychology KS4 por WestHatch
Psychology KS4Psychology KS4
Psychology KS4
WestHatch90 visualizações
MercerJesse2.1Doc.pdf por jessemercerail
MercerJesse2.1Doc.pdfMercerJesse2.1Doc.pdf
MercerJesse2.1Doc.pdf
jessemercerail237 visualizações
11.30.23 Poverty and Inequality in America.pptx por mary850239
11.30.23 Poverty and Inequality in America.pptx11.30.23 Poverty and Inequality in America.pptx
11.30.23 Poverty and Inequality in America.pptx
mary850239167 visualizações
Monthly Information Session for MV Asterix (November) por Esquimalt MFRC
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)
Esquimalt MFRC58 visualizações
CUNY IT Picciano.pptx por apicciano
CUNY IT Picciano.pptxCUNY IT Picciano.pptx
CUNY IT Picciano.pptx
apicciano54 visualizações
UNIDAD 3 6º C.MEDIO.pptx por MarcosRodriguezUcedo
UNIDAD 3 6º C.MEDIO.pptxUNIDAD 3 6º C.MEDIO.pptx
UNIDAD 3 6º C.MEDIO.pptx
MarcosRodriguezUcedo124 visualizações
Jibachha publishing Textbook.docx por DrJibachhaSahVetphys
Jibachha publishing Textbook.docxJibachha publishing Textbook.docx
Jibachha publishing Textbook.docx
DrJibachhaSahVetphys47 visualizações
Drama KS5 Breakdown por WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch87 visualizações
Narration lesson plan por TARIQ KHAN
Narration lesson planNarration lesson plan
Narration lesson plan
TARIQ KHAN59 visualizações
AI Tools for Business and Startups por Svetlin Nakov
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and Startups
Svetlin Nakov111 visualizações
When Sex Gets Complicated: Porn, Affairs, & Cybersex por Marlene Maheu
When Sex Gets Complicated: Porn, Affairs, & CybersexWhen Sex Gets Complicated: Porn, Affairs, & Cybersex
When Sex Gets Complicated: Porn, Affairs, & Cybersex
Marlene Maheu73 visualizações

Cybersafey

  • 1. CYBERSAFETY  Karenyne  Lídia  Raquel  Vanessa
  • 2. Cybersafety: what is it?  Cybersafety is the ability to act in a safe and responsible manner while using technology.  The goal in teaching this is to help people to recognize online risks, make informed decisions and take appropriate actions to protect themselves.  This also includes helping people understand the importance of following terms of use guidelines, having also a disciplined and productive use of internet time, safely exiting na inappropriate site and avoiding cyberbullying.
  • 3. 3 Cs of Digital Citizenzhip  Appropriate Contact: teach people how to have healthy and appropriate relationship online and expect your expectation for whom they communicate with online.  Appropriate Content: be very clear about your expectation for acceptable content. Is it healthy, responsible, ethical?  Appropriate Conduct: teach people appropriate online behavior. Help them understand that everything they do online contributes to thei online reputation.
  • 4. For parents  You can help your child become a responsible and ethical digital citizen with healthy online relationships. Resilient digital citizens recognize and seek out the 3 Cs in all digital settings.  Keep current with the technology your child uses.  Keep comunicating with your child about everything they experience on internet.  Keep checking your child’s internet activity. Know where they go online.
  • 5. For educators  You can help your students become responsible, ethical and resilitent digital citizens. Resilient digital citizents recognize and seek out the 3 Cs in all digital settings (e.g., iPods, instant messaging, chat, computer, games, cell phones, webcams). For communities Community and faith-based organizations play a critical role in empowering communities and youth to become responsible, ethical and resilient digital citizens.
  • 6. Digital Citenship “a holistic and positive approach to helping children learn how to be safe and secure, as well as smart and effective participants in a digital world. That means helping them understand their rights and responsibilities, recognize the benefits and risks, and realize the personal and ethical implications of their actions.“  Community and faith-based organizations play a critical role in empowering communities and youth to become responsible, ethical and resilient digital citizens.
  • 7. Balacing Screen Time Balancing our real life with screen time can be a trick for adults and kids. Because digital media is useful and engaging—and good at holding our attention—it can be tempting to use it all the time. Users with a “compulsive Internet habit, . . . exhibit a higher incidence of moderate to severe depression than non- addicted users.” The American Academy of Pediatrics continues to recommend that children and teens use no more than two hours per day of screen time, and that parents create an “electronic media- free”environment in children’s bedrooms. Parents can support each other and empower other parents by following these guidelines.
  • 8. Ethical Use Students and staff must learn to function as ethically in their online world as they do in their offline world. To apply ethics tothe digital world, we should: Abide by terms of use. Avoid piracy or stealing of any kind. Respect other citizens. Accurately represent authorship. Acknowledge when we use ideas taken from another source. How we treat other citizens online affects how we feel about ourselves and the world around us. Students can't harass, abuse, or otherwise mistreat people (harassment/bullying) or property (hacking, piracy).
  • 9. Personal Information “Generally, the information that children shouldn't share online doesn't deviate much as they get older. Personally identifiable information such as home addresses, phone numbers, and excessive pictures should always be avoided. At an early age, establish with children the difference between personal information and public information. "Digital media can put users at risk by exposing information to anyone with the know-how to access it—resulting in identity theft or boundary invasion. However, digital media offers a means to share information quickly and broadly. Teens can locate nearby resources (e.g., by entering a ZIP code, address, or school name into a search engine) and share relevant information with friends and family (e.g., social plans, pick-up times).
  • 10. Relationships Digital media are excellent tools for forging and maintaining healthy and safe relationships. For example, 82% of socialnetworking teens say they use these sites to stay in touch with friends they rarely see in person. Another study reports that time spent on Facebook facilitates offline interactions. As with all tools, how we use them determines whether they provide positive opportunities or expose us to risk. Media can either enhance relationships, supporting positive growth, or put users at risk. This is an area where tweens and teens will need mentoring from the adults in their lives. They may need encouragement to take a break from digital media or to report harassment (of themselves or others) or inappropriate contact.
  • 11. Reputation Storing important information digitally (e.g. account numbers, phone numbers, health information, etc.) provides convenience but may also put users at risk if confidential information is accessed at the wrong time, by the wrong people, or if the device is misplaced. Families can work together to achieve digital security for everyone within the home. Parents should: Secure and back up data, monitor devices used by minors and also be careful with Antivirus and spyware suppression, Filtering, patching, and firewalls.
  • 12. Security Storing important information digitally (e.g. account numbers, phone numbers, health information, etc.) provides convenience but may also put users at risk if confidential information is accessed at the wrong time, by the wrong people, or if the device is misplaced. Families can work together to achieve digital security for everyone within the home. Parents should: Secure and back up data, monitor devices used by minors and also be careful with Antivirus and spyware suppression, Filtering, patching, and firewalls.
  • 13. C3 Matrix The iKeepSafe Digital Citizenship C3 Matrix is provided here to assist educators in integrating the essentials of cyber- safety, cyber-security, and cyber-ethics (C3 concepts) into existing technology and literacy standards and curricula. It takes a holistic and comprehensive approach to preparing students for 21st century digital communication. The Matrix outlines competency levels for C3 concepts divided into three levels: basic, intermediate, and proficient. The three competency levels outlined in the C3 Matrix are not identified by grade level; rather, they represent progressive levels of cognitive complexity at which youth should be expected to understand and practice.
  • 14. Smart Students in a Digital World: 5 Rules for Staying Safe Online  Research before you register  Discriminate  Think before typing  Require ID  Trust your gut
  • 15. Prevent & Detect Digital culture: kids offer up emotional and psychological data to peers online  3 things parents can do:  Keep current  Keep communication  Keep checking
  • 16. Using Technology to Prevent and Protect The Analysis:  Risk Factors  Warning signs (victim/abuser)  Actions:  To reduce risk factors  To increase factors of prevention
  • 17. Identifing and Analysing the Problems  Dating Violence  Drug and Alcohol Abuse  Eating Disorders  Online Gang Recruitment  High-Risk Sexual Activity  Sexual Violence  Suicide and Self Harm  Youth Violence
  • 18. How to check webpages Programs that help in that task  Firewall  Anti-virus  Parental Control Tools
  • 19. The most important tool is to use the web in a safe way.  Use legal downloads, which tend to be safer.  Beware of social networks. People tend to give too much personal information away, which make it easier for people to prey on them.  Avoid porn websites.  Access mostly websites you already know.  Never click on anything that makes wild promises.
  • 20. NO SOFTWARE IS GOING TO HELP YOU MUCH IF YOU DO NOT SURF THE NET IN A SAFE WAY.