Technology: Mobile, Wifi, and Facial Recognition

Slides:



Advertisements
Similar presentations
INTERNET SURVEY RESULTS Class: Grade 4. Do you use the internet?
Advertisements

How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Ani Choudhury Why am I taking Dig-It?. Reasons why I am taking the Dig-It class: I’m taking the Dig-It class so that I can be efficient with computers.
Key Stage Three Resources
HISD Becoming #GreatAllOver. How many hours per day does the average child between the ages of 8 and 18 spend with media and technology? (this includes.
Welcome Students to 7 Challenger!. A Day in the Life of a 7 Challenger Student.
E-safety EXPOSURE TO INAPPROPRIATE MATERIAL HARASSMENT AND BULLYING PERSONAL INFORMATION AND PRIVACY PHYSICAL DANGER UNWANTED ADVERTISING FINANCIAL RISKS.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Hypothesis:  I Believe that the younger generation uses cell phones and computers to their fullest capability then the older generation.
Queens and Manhattan Sellers PREPARED FOR National Association of REALTORS ®, Profile of Home Buyers and Sellers, 2010 Online Marketing Plan Almost.
ANY FAMILY RESIDENCE 1234 Main Street Any Town, USA PREPARED FOR.
72% of all parents are concerned that other people could locate their child through their mobile phone using location based services.
The World of the Computer How We Use Computers. My home computer allows me to work at home. Otherwise, I would have to spend many hours in my car to travel.
TELECOMMUNICATIONS GAME
Concept: Internet Safety Who You Are ~ Learning About Yourself ~ Unit Essential Questions How can my principles, skills, and interests help me be successful.
About Me Type a 1 paragraph summary about yourself. Explain some of the pictures that you put on Slide 1. Be sure to proofread for spelling and grammar.
Mobile phone: A mobile phone (also known as a cellular phone, cell phone and a hand phone) is a device which can make and receive telephone calls over.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Discover the Internet together …safely!. Who am I? Emma Vard Working for Microsoft Ireland Microsoft has a key focus on privacy and internet safety Teaching.
Stamford Green Primary School E-safety Seminar Part Two.
Internet Safety for Teens Rebecca DeSantis MUW ED503.
By: Emma Barnett CELL PHONE GPS: SAFETY OR STALKING DEVICES?
Tools from the Virtual Classroom in the Traditional Classroom Speaker Name: Elizabeth Davis Organization: Colorado Calvert Academy.
Index Card SIDE ONE (the one with no lines)
Amazing Facts about senses (Our senses) Why do we have senses?
Kyleigh LESLIE. I will never give out my personal information like my phone number, location, and my school.
Home Networking. The Smith Family This is the house the Smiths live in. Can you spot their digital devices?
Megan Meier Story ABC with Diane Sawyer CNN with Anderson Cooper.
Home and Personal Communication Systems Lesson 7 – Personal Connections.
Grove Primary School. What is E-Safety? E-Safety is a term which means not only the internet but other ways in which young people communicate using electronic.
Multiplication Facts X 3 = 2. 8 x 4 = 3. 7 x 2 =
Child Exploitation and Online Protection
Security and Privacy. 228 What might this number indicate? This is the number of mobile phones stolen in the UK every hour.
Where in the world is my PSP? RFID Triangulation Stuart Lenz North Star High School.
Why You Get Frustrated With Your Computer Presented by Keystone Computer Concepts.
Click here to begin Internet Safety Keeping Kids Safe On-Line.
Technology Competency and Language Proficiency Lara Promnitz-Hayashi Subjects : Class 6- High tier freshman class (21 participants) Class 9- Low tier freshman.
KS2 E-Safety assembly How to be smart and keep safe online.
MY NEST A TECHNOLOGICAL OVERVIEW. NECKLACE Reason: Hidden Less like being tagged and branded (jail)
 Internet access is the process that enables individuals and organizations to connect to the Internet using computer terminals, computers, and mobile.
By: Alina. If I’m signing up for a job the people who might hire me have to search on the internet if I’m mature or capable of having a job because if.
How to Track the Location of a Mobile Phone.
 Quiz will be 45 minutes:  A hard copy of quiz will be handed to each student 1/21/2009 CPSC203- Week2- Lab1 2.
XBIS 219 Week 7 Checkpoint Internet Privacy Write a paragraph of at least 200 words addressing the following: Explain how your expectations for Internet.
Hoover Middle School Cyber Safety Discussion
Internet.
Geolocation.
Introduction to Privacy
Providing Teleworker Services
Unit: Sound and Light Lesson 3: Wireless Communication
Connecting to the Internet
Welcome! Back To School for Families.
E-safety Parents Workshop
Technology: Mobile, Wifi, and Facial Recognition
Dealing With Social Media
Survey Presentation.
THIS IS MY LIBRARY Central Library.
T E E N S CELL PHONE SAFETY
Unit 1 – Making Connections, pp6-8
THIS IS MY LIBRARY Walnut Grove Library
Suggested grade levels 5-7
Modern Technology Warm-Up Pg. 73
Social Media Introduction
Important Resources These resources will help you be successful in US History Class. We’ve used some of them at school, but I’m also asking you to access.
8th Grade Survey 5 QUESTIONS ONLY.
Online Safety: Rights and Responsibilities
2.8.2 Being Online Being smart online
2.8.2 Being Online Being smart online
Being smart online I can discuss what I do online.
Routines for Reasoning
Presentation transcript:

Technology: Mobile, Wifi, and Facial Recognition Privacy Educators Program Technology: Mobile, Wifi, and Facial Recognition Project Team CLIP Children's Privacy Study (2013)

Privacy Educators Program Intro Poll I have a cell phone. I understand how my phone knows where I am when I use it. I have signed on to wireless Internet either at my home, another person’s home, or at school. I know how wireless Internet works. I’ve seen a website or a computer tag my face in a photo by guessing who I am. I understand how it figured out who I was.

Privacy Educators Program Cell Phone Towers The signal from your phone gets picked up by these cells

Privacy Educators Program Cell Phone Towers The signal from your phone gets picked up by these cells

Privacy Educators Program Cell Phone Towers The signal from your phone gets picked up by these cells

Privacy Educators Program Cell Phone Towers The signal from your phone gets picked up by these cells

Privacy Educators Program GPS: Tracking by Satellites

Privacy Educators Program

Your Location Settings Privacy Educators Program Your Location Settings

Found by Cell Phone Tracking Privacy Educators Program Found by Cell Phone Tracking

Privacy Educators Program Check-ins

Privacy Educators Program Check-ins

Privacy Educators Program Debate What do you think are some of the benefits and drawbacks of sharing your location with just your friends?

Privacy Educators Program Debate What are some good/bad reasons to share your location publically?

Privacy Educators Program Debate Would the fact that your parents were seeing all your “check-ins” affect how you use such a service?

Privacy Educators Program WiFi

Privacy Educators Program Google Street View

Privacy Educators Program Google Street View

Privacy Educators Program How does a computer recognize a photo of me? Facial Recognition

What else can computers notice by looking at my face? Privacy Educators Program What else can computers notice by looking at my face?

Privacy Educators Program Photo Tagging

Privacy Educators Program Mess-Ups

Privacy Educators Program FindingRover.com

Privacy Educators Program Wrap Up and Crossword

Privacy Educators Program Wrap Up and Crossword Answers 1. Patterns 2. WiFi 3. Radio 4. TURNITOFF 5. Faces 6. Cell