SlideShare a Scribd company logo
1 of 7
Jake Hollatz
December 13, 2015
• The digital environment
• Use of the internet in all it’s various forms
• Types of access
• Wireless devices
• Handheld devices
• We are still at the beginning of the internet
revolution!
Digital future project. (2015). Retrieved from http://www.digitalcenter.org/digital-future-project/
What is the digital environment?
• Why be safe?
• Approximately 15 million US residents have identity
used fraudulently each year
• $50 billion in losses
• Identity theft continues to grow
• Financial identity
• Medical identity
• Criminal identity
• Children’s identity
• Social security identity
Identity theft and scam prevention services. (2015). Retrieved from
http://www.identitytheft.info/victims.aspx
Safety in the digital environment
• Best practices for online safety
1. Think before you click
• Pop-ups, SPAM, unknown emails
2. Stay up-to-date
• Hardware and software
3. Have a strong password
4. Be cautious about what you publicize about
yourself
Pause then reflect. (2012). Everyday best practices to stay safe online. Retrieved from
http://pausethenreflect.blogspot.com/2012/08/everyday-best-practices-to-stay-
safe.html
Protecting your identity
• Use different passwords on different sites
• Individuals may have as many as 100 online accounts
• Over 55% of users use the same password on all sites
• Use a memorable phrase, followed or preceded by
characterizes from the individual site.
• Never reuse your main email password
• Enable two-step verification
• Lock your phone and tablets
The Observer. (2013). 20 ways to keep your internet identify safe from hackers.
Retrieved from http://www.theguardian.com/technology/2013/may/12/20-ways-keep-
internet-identity-safe
Passwords and your safety
• Do not do something online that you would
not do in real life.
• Keep some stuff private
• Let others around you know if you are not
comfortable sharing your own children’s
photos online.
• Parents and children need to talk together
about the proper use of social media.
Common sense media. (2015). Facebook, Instagram, and Social Media. Retrieved
from https://www.commonsensemedia.org/social-media
Social networking: Identity sheltering
Adults and children need to remember that being
online encompasses:
• Respecting yourself and others
• Educating yourself and others
• Protecting yourself and others
The nine themes of digital citizenship will
help guide children and adults build a safer
presence online.
Respect, educator, and protect
Ribble, M. (2015). 9Themes of DigitalCitizenship. Retrieved from http://digitalcitizenship.net/Nine_Elements.html

More Related Content

What's hot

Digital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDigital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital World
Debra Hargrove
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
Sarah Sell
 
Internet safety
Internet safetyInternet safety
Internet safety
zunker
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
spkiely
 

What's hot (20)

E safety
E safetyE safety
E safety
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Internet safety presentation 2013
Internet safety presentation   2013Internet safety presentation   2013
Internet safety presentation 2013
 
Presentation1 updates 2
Presentation1 updates 2Presentation1 updates 2
Presentation1 updates 2
 
Presentation1 updates 2
Presentation1 updates 2Presentation1 updates 2
Presentation1 updates 2
 
Who are today's learners and teachers
Who are today's learners and teachersWho are today's learners and teachers
Who are today's learners and teachers
 
Social networking privacy issues & exposure
Social networking privacy issues & exposureSocial networking privacy issues & exposure
Social networking privacy issues & exposure
 
Digital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDigital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital World
 
Power point assignment
Power point assignmentPower point assignment
Power point assignment
 
Digital citizenship andayah & rachel & emily
Digital citizenship  andayah & rachel & emilyDigital citizenship  andayah & rachel & emily
Digital citizenship andayah & rachel & emily
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
 
Digital Citezenship 9 Elements
Digital Citezenship 9 Elements Digital Citezenship 9 Elements
Digital Citezenship 9 Elements
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 

Viewers also liked (7)

Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digitalcitizenship
DigitalcitizenshipDigitalcitizenship
Digitalcitizenship
 
Digital citizenship for Enabling e-Learning
Digital citizenship for Enabling e-LearningDigital citizenship for Enabling e-Learning
Digital citizenship for Enabling e-Learning
 
Professional Learning Communities Findings
Professional Learning Communities FindingsProfessional Learning Communities Findings
Professional Learning Communities Findings
 
Case Study
Case StudyCase Study
Case Study
 
7 Principles Business Leadership
7 Principles Business Leadership7 Principles Business Leadership
7 Principles Business Leadership
 
Conjunt Reductor
Conjunt ReductorConjunt Reductor
Conjunt Reductor
 

Similar to Building a safer presence on the web

Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
ConnectSafely
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Commonwealth Telecommunications Organisation
 
Digital Citizenship2
Digital Citizenship2Digital Citizenship2
Digital Citizenship2
groot83
 
Promoting and modeling digital citizenship and responsibility no wf
 Promoting and modeling digital citizenship and responsibility no wf Promoting and modeling digital citizenship and responsibility no wf
Promoting and modeling digital citizenship and responsibility no wf
E Robertson
 

Similar to Building a safer presence on the web (20)

INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Apps and Young Users.pptx
Apps and Young Users.pptxApps and Young Users.pptx
Apps and Young Users.pptx
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx
 
CYP E-Safety
CYP E-SafetyCYP E-Safety
CYP E-Safety
 
The Nine Elements
The Nine ElementsThe Nine Elements
The Nine Elements
 
Digital Citizenship2
Digital Citizenship2Digital Citizenship2
Digital Citizenship2
 
Promoting and Modeling Digital Citizenship and Responsibility
 Promoting and Modeling Digital Citizenship and Responsibility Promoting and Modeling Digital Citizenship and Responsibility
Promoting and Modeling Digital Citizenship and Responsibility
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Etl523 pres jj jarick
Etl523 pres jj jarickEtl523 pres jj jarick
Etl523 pres jj jarick
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
Promoting and modeling digital citizenship and responsibility no wf
 Promoting and modeling digital citizenship and responsibility no wf Promoting and modeling digital citizenship and responsibility no wf
Promoting and modeling digital citizenship and responsibility no wf
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptx
 
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Recently uploaded (20)

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 

Building a safer presence on the web

  • 2. • The digital environment • Use of the internet in all it’s various forms • Types of access • Wireless devices • Handheld devices • We are still at the beginning of the internet revolution! Digital future project. (2015). Retrieved from http://www.digitalcenter.org/digital-future-project/ What is the digital environment?
  • 3. • Why be safe? • Approximately 15 million US residents have identity used fraudulently each year • $50 billion in losses • Identity theft continues to grow • Financial identity • Medical identity • Criminal identity • Children’s identity • Social security identity Identity theft and scam prevention services. (2015). Retrieved from http://www.identitytheft.info/victims.aspx Safety in the digital environment
  • 4. • Best practices for online safety 1. Think before you click • Pop-ups, SPAM, unknown emails 2. Stay up-to-date • Hardware and software 3. Have a strong password 4. Be cautious about what you publicize about yourself Pause then reflect. (2012). Everyday best practices to stay safe online. Retrieved from http://pausethenreflect.blogspot.com/2012/08/everyday-best-practices-to-stay- safe.html Protecting your identity
  • 5. • Use different passwords on different sites • Individuals may have as many as 100 online accounts • Over 55% of users use the same password on all sites • Use a memorable phrase, followed or preceded by characterizes from the individual site. • Never reuse your main email password • Enable two-step verification • Lock your phone and tablets The Observer. (2013). 20 ways to keep your internet identify safe from hackers. Retrieved from http://www.theguardian.com/technology/2013/may/12/20-ways-keep- internet-identity-safe Passwords and your safety
  • 6. • Do not do something online that you would not do in real life. • Keep some stuff private • Let others around you know if you are not comfortable sharing your own children’s photos online. • Parents and children need to talk together about the proper use of social media. Common sense media. (2015). Facebook, Instagram, and Social Media. Retrieved from https://www.commonsensemedia.org/social-media Social networking: Identity sheltering
  • 7. Adults and children need to remember that being online encompasses: • Respecting yourself and others • Educating yourself and others • Protecting yourself and others The nine themes of digital citizenship will help guide children and adults build a safer presence online. Respect, educator, and protect Ribble, M. (2015). 9Themes of DigitalCitizenship. Retrieved from http://digitalcitizenship.net/Nine_Elements.html