BREAKING TRUST ON THE INTERNET.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
CYBERBULLYING Did you see that picture of Dana? – OMG!!
ON LINE and doing FINE Using your head When surfing the web. Family Campers and RVers 2011.
Cyberbullying & Cybercitizenship Presented by: Cheryl R. Varnadoe University of Georgia Extension 4-H Specialist.
Cyber-bullying Why We are Mean to Each Other and How We Can Change.
CYBER BULLYING An Overview CYBER BULLYING IS… The use of electronic communication technologies to intentionally engage in repeated or widely disseminated.
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
Forms of Cyberbullying
Cyber Security NSHA Kickoff 2013 NSHA Cyber Seecurity15/2/2015.
Breaking Trust On The Internet
INTERNET SAFETY.
Cyberbullying Simple Guidelines for Parents, Teachers, and Students January 17, 2007.
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
Presentation Secondary School Wexford Anti-Bullying Campaign BULLYING IS DELIBERATE, REPEATED HURTFUL BEHAVIOUR If you see it don’t support it! RECOGNISE.
Online Aggression. Cyberbullying  Definition (Cyberbullying Research Center ) Willful and repeated harm inflicted through the use of computers, cell.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Cyber Bullying Jill Wenger Summer I ITC 525.
CYBERSAFE – PARENTING ONLINE. CYBERBULLYING DEFINITION: intended, deliberate, repeated, virtual hostile behaviour with the usage of ICT FORMS: Denigration.
Cyberbullying Internet Saftey: Information for H.S. Students.
Harsher Punishments for Cyberbullies By: Janeca Latore Section 001.
By: Kinga Budziszewska, Ashley Hiralal, Jakila Maybury, and Lauren Moore.
Cyberbullying Just because they can’t hear you, doesn’t make it any different March 2009.
Things To Know SOURCES:
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
INTERNET SAFETY FOR STUDENTS
CYBERBULLYING Hopkins School Guidance Program.
By: Sophia Dermouche & Maheen Khalid
Cyber Bullying by Lisa Rundall. Cyber bullying is… …when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Digital Citizenship and Media Literacy
Module 1: Bullying Awareness Training. Learning outcomes of Module 1  Learning about workplace bullying  Learning about cyber-bullying  Get to know.
WHAT WE ALL NEED TO KNOW. WHO’S BEHIND THE MASK..
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
As of 8/31/15 Cyberbullying. Learning Target: I can learn how to protect myself from cyberbullies. Success Criterion: I can identify 3 types of cyberbullying.
Cyberbullying A Student Guide.
CYBER BULLYING CYBER BULLYING IS… Being cruel to others by sending or posting harmful material using technological means; an individual or group that.
Cyberbullying. Bullying vs. Cyber bullying Bullying is repeated aggressive behavior that is intentional and involves an imbalance of power or strength.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
Cyberbullying Online Social Aggression Guidelines for Educators.
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
Alexis Pilkington, 17 Long Island Phoebe Prince, 15, Massachusetts.
Cyberbullying The Digital World’s Ugly Reality Understanding the psychology behind it, the forms of it, and it’s prevention – a parent’s guide.
By Tyanna Paling and Manpreet Gill
Cyberbullying 8/14/2013. Learning Target I can learn how to protect myself from cyberbullies. Success Criterion: – I can identify 3 types of cyberbullying.
Cyberbullying Terms & Definitions Source:
Cyberbullying What it is, How to deal with it, and more.
COMPUTER SOLUTIONS 1 **Notes from DVD: I Was Cyberbullied.
Cyber Bullying. What is Cyber Bullying Being cruel to others by sending or posting harmful material using technological means; an individual or group.
By: Shervanae Scott. Social Media Netiquette “Netiquette” refers to etiquette on the Internet. Good “netiquette” involves respecting others' privacy.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
 The use of new media to harass, threaten, humiliate, embarrass, or target another person.  It only occurs among young people (adults involved: cyber-harassment.
Do unto others as you would have them do to you..
A Staff Development created by Martha Littles CYBER KIDS, CYBER BULLYING, AND CYBER BALANCE BY BARBARA TROLLEY AND CONSTANCE HANEL Image: corwin.com.
Are You a Cyber-Bully?  0 – 5 Points  Cyber Saint  Congratulations!! You are a Cyber Saint! Your online behaviour is exemplary! Keep up the good work!
CYBERBULLYING Bullying that takes place using electronic technology Bullying that takes place using electronic technology. Is an issue that need to be.
Cyber-Bullying How to stay safe What to do if it happens to you.
Do Now Pick up a handout in the front of the room and answer the four questions to the best of your ability.
Are you a bully?. 2  Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery,
Delete CyberBullying Boston Public Schools Cyber Safety Campaign.
CYBER BULLYING.
Remember cyber Bullying can also lead to death!!!
If you see it don’t support it! RECOGNISE IT, REJECT IT, REPORT IT!
Cyberbullying Life Class Lessons – Week of May 9th -May 13th.
Cyber Bullying 1. ONLINE.
Digital Citizenship & Social Media.
Life High school waxahachie
Issues With Internet in College
Cyberbullying: How Can I Protect My Child?
Presentation transcript:

BREAKING TRUST ON THE INTERNET. BY WISDOM.C.AGUNTA. stdno.:127760 & Geoffrey Laah. stdno.:068345

Way my presentation is going to go: 1. Introduce myself/topic, which I did previously. 2. Introduction to the topic. 3. Into the topic proper 4. Summary / Conclusion 5. Final Thought. 6. Question Time. ITEC 317

INTRODUCTION: First of all, I will start with the definition of trust. Trust is Believe in the reliability, truth, ability, or strength of something. Then this presentation is on the BREAK of that trust in the accept of internet perspective. ITEC 317

Breaking Trust on the Internet Identity Theft Phishing and Examples. Chat Room Predators Ethical Evaluations of Police “Sting” Operations False Information Cyber Bulling ITEC 317

Identity Theft Definition: when someone uses your personal information without your permission to commit fraud or other crime. This can be done in various ways like using someone’s Name. Social security number. Date of birth. Credit card number. Bank account number. Etc. ITEC 317

Identity Theft ITEC 317

How it Occurs: Good, Old fashioned stealing. ITEC 317

How it Occurs: Dumpster diving. Skimming: The act of using a skimmer to illegally collect data from the magnetic stripe of a credit, debit or ATM card. ITEC 317

How it Occurs: Examples of Phishing: Phishing: Emails that appear to be from IRS requesting you to confirm information. Emails that are thanking you for a recent purchase (or something you didn’t buy). Phone Phishing Examples of Phishing: http://219.166.162.37/icons/www.wachovia.com/… ITEC 317

http://kooptickets.nl/~claudia/mycfcu.com/….. ITEC 317

Chat-Room Predators: Chat room : supports real-time discussions among many people connected to network Some pedophiles(any sexual interest in children or the act of child sexual abuse, often termed "pedophilic behavior".) meeting children. Through chat rooms. Police countering with “string” operations. ITEC 317

Ethical Evaluations of Strings Utilitarian Evaluation: in normative ethics, a tradition stemming from the late 18th- and 19th-century English philosophers and economists Jeremy Bentham and John Stuart Mill that an action is right if it tends to promote happiness and wrong if it tends to produce the reverse of happiness—not just the happiness of the performer of the action but also that of everyone affected by it. Such a theory is in opposition to egoism, the view that a person should pursue his own self-interest, even at the expense of others, and to any ethical theory that regards some acts or types of acts as right or wrong independently of their consequences. ITEC 317

Ethical Evaluations of Strings Kantian Evaluation Social contract Theory Evaluation: is the view that persons’ moral and/or political obligations are dependent upon a contract or agreement among them to form the society in which they live. ITEC 317

Cyber bullying CYBER BULLYING TYPES “Flaming’: Online fights using electronic messages with angry and vulgar language “Harassment”: Repeatedly sending offensive, rude, and insulting messages Use of the Internet or phone system to inflict psychological harm ITEC 317

CYBER BULLYING TYPES “Cyber stalking”: Repeatedly sending messages that include threats of harm or are highly intimidating. Engaging in other on-line activities that make a person afraid for his or her own safety “Denigration”: ‘Dissing’ someone online. Sending or posting cruel gossip or rumors about a person to damage his or her reputation or friendships “Impersonation”: Pretending to be someone else and sending or posting material online that makes that person look bad, gets that person in trouble or danger, or damages that person’s reputation or friendships ITEC 317

CYBER BULLYING TYPES “Outing and Trickery”: Sharing someone’s secret or embarrassing information online. Tricking someone into revealing secrets or embarrassing information which is then shared online “Exclusion”: Intentionally excluding someone from an on-line group, like a ‘buddy list’ ITEC 317

CYBER BULLYING LEGAL ISSUES ‘What Everyone Needs to Know About Cyber Bullying’ (Aftab) Many cases of child cyber bullying, like adult counterparts of cyber-harassment, not criminal Law Enforcement needs to be aware of: Difference between annoying and dangerous communications How to investigate a cyber crime How to obtain information from an ISP ITEC 317

Watch video on Cyber bullying: A Cyberbullying Suicide Story 6 - Ryan Halligan Story http://www.youtube.com/watch?v=iDBiqUWRtMo Cyberbullying - (British) http://www.youtube.com/watch?v=6kYeB2-qXe0 Cyber Bullying - No dialogue http://www.youtube.com/watch?v=YxKYU3SIDhI ITEC 317

Question For You To Answer Are you a cyber bully? http://www.stopcyberbullying.org/tweens/are_you_a_cyberbully.html ITEC 317

False information: Quality of web-based information varies widely. Other media also have information of varying quality like The New York Times v. The Nation Enquirer 60muintes v. Conspiracy Theory Google (panda, penguin) attempts to reward quality of web-based content. Ranking uses “voting” algorithm. If many links point to a page goggle search engine ranks the page higher in web-based content. ITEC 317

Summary In summary all we have been taking about is “BREAKING TRUST ON THE INTERNET”. Deter, Detect, Defend (At Home and At Work). Deter (how do you prevent all of these) Detect (how do you find out ) Defend (restoring your good name) ITEC 317

Final thoughts: When in doubt, ask or “call back” Know this, your bank will NEVER ask you for account number or password if they initiated the communication. If you notice any sign of cyber bullying please go the nearest police station and report the case or let me say HAND OVER the case to the police officers. ITEC 317

QUESTION TIME: ITEC 317

NA ONLY ME?? ITEC 317