Being Good Digital Citizens with Today’s Technologies
Today’s Presentation is About: Benefits & Dangers of the Internet Benefits & Dangers of the Internet Profile of a Teenager Profile of a Teenager Cyber-bullying Cyber-bullying Personal Information Personal Information Online Friends Online Friends Posting a Picture Posting a Picture Talking to an Adult you Trust Talking to an Adult you Trust
Benefits of the Internet Accessible from… Accessible from… Home, school, public libraries… Home, school, public libraries… Communicate with… Communicate with… Family, friends, & fellow students. Family, friends, & fellow students. Information for… Information for… Homework, news, entertainment… Homework, news, entertainment…
Dangers of the Internet Accessible from… Accessible from… Virtually everywhere. Virtually everywhere. Communicate with… Communicate with… Family, friends, predators… Family, friends, predators… Information including… Information including… Pornography, violence, drugs… Pornography, violence, drugs…
Profile of a Teenager Live in the moment Live in the moment Be own person Be own person Make own decisions Make own decisions Be independent from parents Be independent from parents Be understood Be understood Attention Attention Love Love
Chatroom Exchange
What is Cyber-bullying? Use of technology to harass, threaten, or embarrass someone. Use of technology to harass, threaten, or embarrass someone. Courtesy of wentongg’s photostream
Cyber-bullying – Example
Bullying vs Cyber-bullying It can happen 24/7. It can happen 24/7. It can be done from a physically distant location. It can be done from a physically distant location. Do not know who the bully is or why being targeted. Do not know who the bully is or why being targeted. It can become viral – others join in. It can become viral – others join in. Loss of non-verbal cues (face) and voice inflexion. Loss of non-verbal cues (face) and voice inflexion. Victim may become bully. Victim may become bully.
What does Lamer Bill do to threaten and harass Joe?
Wanting to skip school can be a symptom.
Where can cyber-bullying happen?
What does Joe do with the threatening texts & s?
What did Joe do with the “evidence”?
How can we stop cyber-bullying? 1. Do Not Respond. 2. Save the Evidence. 3. Report It.
Rule of Thumb If you won’t say it face to face, then don’t send it.
What about Personal Information? What can happen if… What can happen if… Someone gets your name and ssn? Someone gets your name and ssn? You post your address on facebook? You post your address on facebook?
What are some examples of personal information?
What can happen when someone gets Joe and Maggie’s information?
What does Joe and Maggie do to keep safe?
When it is okay to give out personal information?
Why should we keep our personal information safe? When our personal information is safe then we are safe.
What can we learn about keeping our personal information safe? Use secure web sites. Use secure web sites. Use good passwords. Use good passwords. Guard passwords. Guard passwords. Change passwords. Change passwords. Keep security software updated. Keep security software updated. Log out after using a public computer. Log out after using a public computer.
Online Friends Who should you have as your online friends?
Should Maggie accept this “friend” request?
How should you decide who to be friends with online?
How does Maggie decide who her friends are?
What did Maggie learn about being safe online? Accept “friends” that you know and trust in real life. Accept “friends” that you know and trust in real life. Use privacy settings. Use privacy settings.
Posting a Picture What types of pictures should we post online?
Is Maggie making a good choice here?
What can be some consequences for posting a picture?
What kinds of pictures should you post?
What are some other things that could happen?
How might these pictures effect Maggie’s future?
What do we learn from Maggie’s posting of pictures? Can be forwarded and posted elsewhere. Can be forwarded and posted elsewhere. Once a picture is posted you can’t get it back. Once a picture is posted you can’t get it back. Nude pictures are illegal (< 18=child pornography). Nude pictures are illegal (< 18=child pornography). Only post “G-rated” pictures. Only post “G-rated” pictures. Use privacy settings. Use privacy settings. A picture you post online can effect your future. A picture you post online can effect your future.
Talking to an Adult You Trust So, who is an adult you know that you trust?
What are the things that Maggie really doesn’t want to see online?
Who does Maggie talk to?
What do Maggie and her Dad do to be safe?
What else can happen online?
What can you do if something makes you feel uncomfortable?
Who are the people that are there for you?
What did Maggie (and her Dad) do to be safer on the Internet? Use of the Google filter. Use of the Google filter. Install a software filtering system to block unwanted content. Install a software filtering system to block unwanted content. Agree on G and PG content. Agree on G and PG content. Told a person she trusted when something made her feel uncomfortable. Told a person she trusted when something made her feel uncomfortable.
What is the best Internet filter in the world? It is free. It is free. It is simple to use. It is simple to use. You take it with you wherever you go. You take it with you wherever you go.
The best Internet filter is… You
What have we learned about Internet safety today? Benefits & Dangers of the Internet Benefits & Dangers of the Internet Profile of a Teenager Profile of a Teenager Cyber-bullying Cyber-bullying Personal Information Personal Information Online Friends Online Friends Posting a Picture Posting a Picture Talking to an Adult you Trust Talking to an Adult you Trust
When you go home today tell your family about how they can stay safe online too. Challenge:
To learn more, go to:
The End.