Copyright © 2012 Knowledge Point digital world architecture of evolution Resources:

Slides:



Advertisements
Similar presentations
Internet Bullying Social Networking Site Security Potential to Law Infringement Let us do something more.
Advertisements

Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Bullying & Cyberbullying ◦What is it? ◦Examples ◦Impact and support for students ◦Bystander effect ◦Prevention.
Forms of Cyberbullying
Cyber Safety Assessment Review Grades 6-8. Question #1 Cyber bullies are generally quite mature in their behavior. TRUE FALSE.
BULLYING What Is The Definition of Bullying?
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
e-safety and cyber bullying
Holt High School _48889_ ,00.html.
Things To Know SOURCES:
CYBER BULLYING Cody O’Brien. Goals for Today’s Presentation Introduce Cyber bulling Identify forms of cyber bulling Steps to prevent it What to do if.
Cyberbullying Brittany Benningfield EDF 204 Spring 2015.
Cyber-Bullying and internet use
Social impacts of the use of it By: Mohamed Abdalla.
IL SOS Online Safety Think Before You Click!. STOP.
BY: CHELSEA KUCERA ELED 318 The Legal, Social and Ethical Issues in Technology for the Classroom.
Judith Taylor.Technology tools.5AA
1 Moderator: Thomas N. Shorter, Godfrey & Kahn, S.C. Panelists: Nancy Davis, Ministry Health Care Lee Kadel, Wheaton Franciscan Healthcare Ralph Topinka,
E-Safety Challenge College. Learning Objectives Understanding the definition of ‘cyber’ bullying and the affect it can have on the victim.
How can I adjust my behavior and choices in order to improve the learning environment to represent SMS?
Intro: U TUBE VIDEO  “What to do when you’re bullied”
COMPUTER ETHICS Do you know the difference between right and wrong?
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
Internet Safety Blue Hills School. Internet Safety Use these Tips Don’t share your address, phone number, school name or your parents credit card number.
Cyberbullying By:Ali Komorek. What is Cyberbullying O Cyberbullying is bullying that takes place using electronic technology. (
ETHICS and COMPUTERS An Overview 23/04/2017.
S TOP B ULLYING !. Source:
Safety on the Internet A Lesson by Ms. Grande on Keeping Safe While Having Fun.
WEST COMMUNITY COHESION TEAM Pc Ian Ashton and Helen Chadwick.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
ASHLEIGH LENTYCH CYBER BULLYING AND INTERNET SAFETY.
Netiquette/Internet Safety Presentation VAHS Boys Swim Team.
CYBER BULLYING!. WHAT IS CYBER BULLYING? Cyber bullying affects many adolescents and teens on a daily basis. Cyber bullying involves using technology,
Are you a digital citizen? Zeborah Ware 1. Table of Contents Definition of Digital Citizenship Page 3 Classroom Rules for Cell Phones Page 4 Social Networking.
You must be an E-safety Support member to use these resources in your school. © www.e-safetysupport.com Cyber Bullying.
What is it? & What can I do to prevent it?. Cyber bullying is when somebody is teasing, taunting, or harassing someone else over the computer. Whether.
Digital Citizenship By Lori Gray.
Digital CitizenshipDigital Citizenship By Pinsinee Mekpanuwat (pin) Smita Jirayingcharoen (mudmee)
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
THINK CYBER SMART, BE CYBER SMART! CYBER SAFETY AND DIGITAL CITIZENSHIP IN A CLASSROOM.
Online Safety and Privacy Understanding online privacy and how your information is shared.
Copyright © 2012 Knowledge Point digital world architecture of evolution Resources:
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
By: Delaney Syme and Megan Eglin.. When there is a very intense argument going on in a chat room or over texts it is called flaming. The bullies that.
Keeping it safe on the internet
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Digital Citizenship.  I can…. What is digital citizenship?  Think.Pair.Share.
Remember cyber Bullying can also lead to death!!!
Digital Citizenship.
Lesson 3: Cyberbullying
Sharing Images – The Law
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
BULLYING
Cyber bullying is a form of teen violence that can do lasting harm to young people.
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
Digital Citizenship.
Digital Citizenship & Social Media.
Aim The aims of today's session is to think about what bullying is and how to help yourself or others who are being bullied. To understand what Anti-Bullying.
Cyber Bullying Nicole Massafaro.
Paul Hopkins University of Hull
Digital Citizenship.
Welcome to the E Safety Workshop
Digital Citizenship.
Presentation transcript:

Copyright © 2012 Knowledge Point digital world architecture of evolution Resources:

Copyright © 2012 Knowledge Point Identifying Misuse of Technology Using Social Networking Sites for the Wrong Reasons. Writing Blogs to Spread Hatred. Spreading Hoaxes via Text Messages and s

Copyright © 2012 Knowledge Point Using Social Networking Sites for the Wrong Reasons Case Study: Dubai Court Gets First Facebook Libel Case Dubai – The first trial involving the abuse of Facebook for unlawful acts took place after a business partner admitted to uploading several pictures of his employee and posting a libellous comment under each of them. According to the defendant, he had a partnership with his employee’s brother in a restaurant and had found the said employee stealing money from the cashier.

Copyright © 2012 Knowledge Point Writing Blogs to Spread Hatred Case Study: Schools Act against Students for 'Flaming' Teachers on Blogs Five junior college students were punished for posting offensive remarks about two teachers and a vice‐principal online. The girls had to remove those remarks from their blogs or Internet diaries and were suspended for three days.

Copyright © 2012 Knowledge Point Spreading Hoaxes via Text Messages and s Case Study 1: Panadol Hoax Does the Rounds Again This Year Dubai – A 2005 hoax concerning Panadol Extra has resurfaced, circulating the UAE and other places via text messages. The text warns consumers not to purchase Panadol Extra as a person can damage his kidney by taking just one tablet. After causing a health scare back in 2005, the health authorities conducted tests on the medicine and found that it was safe.

Copyright © 2012 Knowledge Point Spreading Hoaxes via Text Messages and s Case Study 2: The Dubai Metro Derailment is Nothing but a Rumor “A rumour regarding the collapse of Dubai Metro near Al Rashidiya station has been circulating via mobile phones. The rumour stated that the incident resulted in 15 deaths and...”

Copyright © 2012 Knowledge Point Spreading Hoaxes via Text Messages and s Case Study 3: BlackBerry and Internet Rumors Increases Community’s Worry Abu Dhabi Police have warned users against using BlackBerry devices and the Internet to promote rumours.

Copyright © 2012 Knowledge Point Making Ethical Decisions Before making a sound decision, ask yourself these few questions: 1.Recognize if there is any ethical issue – Will your decision damage or affect someone or any group? – Will the decision jeopardize your life? – Are you in a dilemma to make the decision? – Is your decision legal? – Will there be any conflict?

Copyright © 2012 Knowledge Point Making Ethical Decisions 2. Be Specific and Get the Right Facts – Do you really know the facts about the situation or case? – Do you know enough to make the decision? – Do you need to have more information? – Do you need to verify or consult with someone that has more authority?

Copyright © 2012 Knowledge Point Making Ethical Decisions Assess Every Option –  Which option produces the most good and offers the least harm? –  Which option best addresses the situation or case? –  Which option best respects the rights of all parties involved? –  Which option provides equal rights (fair) to all parties involved?

Copyright © 2012 Knowledge Point Lesson Learned Treat others with the same respect you want to be treated with. Being ICT literate, you should know when, when not and how to use technology properly. You have to be aware of Cyber Law in the country. As an ATHS student, you have to be aware of the laws set by the school with regards to responsible use of Internet and social media.

Copyright © 2012 Knowledge Point Be smart and stay safe!