Who are people who are left? What is their deal? Things to know and think about. the digital divide & privacy.

Slides:



Advertisements
Similar presentations
Cyber Time 4th Grade Personal Information You can share your favorite food! You can share your favorite colors! Don’t share your cell phone number! Don’t.
Advertisements

Fostering in the Digital Age. Young people and the online world Increasingly young people make very little distinction between their lives online and.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Cyberbullying When good technology goes bad…….. Stay safe in cyberspace.
You can socialise with the internet by using websites such as Facebook, twitter and MySpace. The good things about this is that you can talk to your friends.
e-safety and cyber bullying
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
Working group discussion 1 Cyber Risk Security, Privacy ?
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Internet Safety Rules for Students
INTERNET SAFETY Lynn W Zimmerman, PhD.  Hacking  Identity theft  Stolen passwords  Invasion of privacy POTENTIAL PROBLEMS  Stalking  Cyber-bullying.
Define: Cyberbullying Cyberbullying \ ˈ sī-bər- ˌ bu ̇ -lē-iŋ, - ˈ bə-\ noun The use of digital media tools, such as the Internet and cell phones, to deliberately.
Contents  What is Cyber Bullying?   Credit Card  Social Networking Sites  Phones  End Slide.
Stay Safe on the Internet!
Top 10 Safety Tips of the Year Tell your parents right away if you read anything on the Internet that makes you feel uncomfortable.
Stamford Green Primary School E-safety Seminar Part Two.
Healthy Relationships and Social Media (Part 2 of 2) Grade 8.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
State of Social Media: 2011 Mary Madden, Senior Research Specialist Presented to: U.S. State Department's Bureau of Educational and Cultural Affairs National.
Online Actions = Offline Consequences. Profile Penalty Video URL: lty
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Connecting Generations – Discovering the digital World together.
Older Adults and Internet Use: (Some of) What we know Mary Madden, Senior Researcher Pew Research Center October 21, 2013 University of Michigan.
Keeping you & your identity safe Recognize & avoid cyberbullying.
Is when… someone hurts, threatens or frightens you regularly by sending messages or images using the Internet, mobile phones or other forms of digital.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
THE TEN COMMANDMENTS FOR STUDENTS FOR INTERNET SAFETY By Sandra Salazar Zuñiga.
HOW TO BE SAFE ONLINE By :Sarah Quarles. The internet is a great tool when used with caution!  The internet is an amazing tool that connects people from.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
AARP Social Communication: Seven (or so) Secrets Karin Miller Communications Director AARP Tennessee 1.
Cyberbullying. Cyberbullying is the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening.
Four or More: The New Demographic Mary Madden Pew Internet & American Life Project LITA President’s Program ALA – June 27, 2010 (and a bunch of other really.
Activity 2 What to Do?.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Online Privacy By Steve C. (H2) Ms. Valley’s Library Media Class.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
Social Media for small libraries. digitally divided ‣ We're still at 32-34% of Americans having no broadband at home. ‣ 19% have no internet at all.
ThinkB4uClick A Smart Guide to Internet Safety. Dumb Ideas Stay off the Internet Don’t have a Facebook page Never use Twitter Don’t Never post.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Respect for Self and Others, Safe and Responsible Use Cyberbullying.
Netiquette and Online Safety By: H F. Netiquette Netiquette is the do’s and don’ts of the internet. Basically netiquette is the rules of online communication.
Internet Safety By Blair Number 1 Use a nickname not your real name.
Safer Internet Day. What do you use the Internet for? watching TV shows watching online videos playing gamestalking to friends homeworkfinding out things.
Internet Safety Mrs. Lijó. Some Names for the Internet Cyberspace The Web The Net The Information Highway The World Wide Web.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
Aristotle, a great thinker, once said: “We are what we repeatedly do.”
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
1. Read the following presentation and watch the videos for your grade level. 2. Write your name on your index card and answer the “Bob” questions at the.
Questions ? ? ? ? ? ? ? Do you use the internet to talk to your friends?
Who are people who are left? What is their deal? Five things to know. the Digital Divide's last mile.
Are you SMART?. SMART SafeMeetAcceptReliableTell Keep safe Be careful not to give out personal information such as your address, phone number, real.
Internet Safety Click Clever. Click Safe.
Internet Safety Grade 6.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
By Laurel Bacon 12/1/16 8th grade Career Prep
How To Be Safe On The Internet
Freedom Independence Transition
Digital Citizenship and Social Media
Safer Internet Day 2017 Be the change: unite for a better internet
R E A D What is cyber bullying? Hall
Internet Safety Click Clever. Click Safe.
STAYING SAFE ON THE INTERNET
E SAFETY ASSEMBLY.
Internet Safety – Social Media
Digital Citizen.
Privacy, Security, and Ethics
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Who are people who are left? What is their deal? Things to know and think about. the digital divide & privacy

scope note

When someone tells me the digital divide is over.

Pew Research Center 15% 15% of American adults do not use the internet at all. An additional 9% of adults use the internet but not at home.

WTF Really? Don't they want to see their grandchildren, get cheap printer ink, send people photos of their genitals and apply for health care? No? No.

1.Can't get. 2.Don't want. People are (still) offline for two major reasons.

Who is left offline?

What do they need?

1. People who want to sell them something. 2. Fear-mongers, the media & unrealistic nerds. 3. Real people like their friends and you. Offline people learn about privacy from very few places.

12 - FDR The only thing we have to fear is… fear itself — nameless, unreasoning, unjustified terror… “

balancing acts: privacy vs. realism a few concrete suggestions

14 1. passwords

15 "Why you need a bazillion character password.."

"…and how to write it down"

Identity Theft Resource Center 70% …of all stolen personal information is taken from a business. …of all reported child identity fraud is "friendly fraud."

2. getting help

Graphic

Why can it only do some magic?

obvious to us, not to them

Graphic

23 avoiding being scammed

never passwords

3. staying updated

26 do your updates.

27 user concerns are real

28 Reframing the narrative.

29 Attitude upgrades.

32 Jessamyn West librarian.net/talks/privacy Thanks! Questions?