Media Center Essential Question How can I be an effective user of information?

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Cyber Safety Assessment Review
Digital Disasters Laura M Cyberbulling Digital Reputation Identity Theft Offensive or Illegal Content Sexting Unwanted Contact.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Smart Choices for our 21st Century Cyber Surfers
Media Center Essential Question How can I be an effective user of information?
Somerset County Prosecutor's Office 40 North Bridge Street Somerville, NJ (908) / Emerging Threats of Social Media.
Internet Safety Review Are You A Safe User? Grades 4th - 6th
An Internet Safety Presentation for Middle School Adopted from netsmartz with video from netsmartz.org, center for missing & exploited children, and Saturday.
INTERNET SAFETY FOR STUDENTS
 NYS Internet Crimes Against Children Task Force Online Safety for Middle and High School Version 5.0 – 8/
Computer Passwords.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Let’s talk about Internet Safety!
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
E-Safety Challenge College. Learning Objectives Understanding the definition of ‘cyber’ bullying and the affect it can have on the victim.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
INTERNET SAFETY Tips for becoming a “surfer” dude!
 NYS Internet Crimes Against Children Task Force Online Safety for Middle and High School Version 4.0 – 10/
 NYS Internet Crimes Against Children Task Force Online Safety for Middle and High School Version 5.0 – 8/
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
DIGITAL CITIZENSHIP/CYBER BULLYING.  Privacy - Protect Personal Information  Respect – Avoiding Cyberbullying, Plagiarism, Downloading Music Appropriately.
Connecting Generations – Discovering the digital World together.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Panther Forum Activity Week 9. Things to remember when you are using social media to communicate with others.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
Cyberbullying 8/14/2013. Learning Target I can learn how to protect myself from cyberbullies. Success Criterion: – I can identify 3 types of cyberbullying.
Computer Ethics Being Responsible!.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
INTERNET SAFETY Thornell Road Library Let’s Discuss: Information Privacy Social Networking CyberbullyingNetiquette.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
CYBER SAFETY do now… How is the internet used in your life? List at least 2 ways that you use the internet.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Keeping Children Safe Online. Where to report abuse? To report any abuse on social media or internet: CEOP will accept reports from parents, teachers.
Dangers of Online Media and Social Networking By: Micah Cochrane Maurice Gamble Shenne Howell Elvyn Morales.
DIGITAL CITIZENSHIP. Digital Citizenship covers 9 areas according to Mike Ribble, an expert in the field.  Etiquette  Communication  Literacy  Access.
DIGITAL CITIZENSHIP.  Privacy - Protect Personal Information  Respect - Plagiarism, Downloading Music Appropriately.  Self Expression - Create your.
T HINK ! Before You Post A lesson on Internet Safety Source:
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Patti Fowler Internet Safety Education Coordinator SC ICAC Task Force Office of the Attorney General Internet Safety.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Freshman Seminar. Find kids through social networking, blogs, chatrooms, instant messaging, , discussion boards, and other websites. Try to seduce.
Social Media Safety. Discuss O As a class discuss the different types of social media and what it is used for.
What is it? Spreading rumors and gossip Posting pictures without consent Obtaining a password to assume a person’s identity Harassing or threatening.
Cybersafety 4 Kids: Smart Moves in an Online World.
70% were female; 30% were male 86% of offenders were people youth first “met” online 37% of incidents happened in chatrooms 40% in instant messages.
8 THINGS PARENTS CAN DO TO PREVENT CYBER BULLYING Belhaven Middle School, Linwood NJ from the New Jersey Principals and Supervisors Association Cyber Safety.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Social Media Smarts. Yep! That’s Me! I have had a cell phone since 5 th Grade I just got a cell phone this year I wish I had a cell phone I have an IPAD.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Safety.
Creating your online identity
Cyberbullying BY LORD MUSHANGO.
How To Be Safe On The Internet
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
CyberBullying.
E-safety Staying safe online 2017/18.
Appropriate Use of Technology
MSTI 131: Introduction to Educational Technology
Follow safety rules so that YOU: Avoid getting HURT.
Rules To Help You Navigate the Internet Safely
CyberBullying.
Online Safety Social Media & Cyberbullying
Online Safety Social Media & Cyberbullying
Presentation transcript:

Media Center Essential Question How can I be an effective user of information?

Social Networking Socialize with friends Talk to people with similar interests Keep up with old/long distance friends & family Share photos Champion a cause Market a talent Organize events

Social Networking Safety Issues Cyber Security Cyber Bullying Cyber Bullying Sharing Too Much Sharing Too Much

Cyber Security Scams Identity Theft Viruses Trojans Spyware Install Firewall/Virus Protection Don’t Open s from Strangers Don’t Download from Non- Trusted Cites Don’t Enter Contests from Unknown Sources Guard Your Passwords Always Log Out on Public Computers/Devices

Cyber Bullying Use of Technology to Tease, Humiliate, or Harass Serious Problem Results can be Devastating Avoid Gossip Block the Sender Don’t be a Bystander – Report Bullying

Sharing Too Much Inappropriate Photos (Sexting) - Illegal Inappropriate Photos (Sexting) - Illegal Inappropriate Personal Information Inappropriate Personal Information Accessible by Future Colleges/Employers Accessible by Future Colleges/Employers Vulnerable to Sexual Predators/Blackmail Vulnerable to Sexual Predators/Blackmail Snapchat Problems Snapchat Problems Clean Profile Clean Profile Don’t Post or Send Inappropriate Photos Don’t Post or Send Inappropriate Photos Use Privacy Settings Use Privacy Settings Don’t Accept Just Anyone as Friends Don’t Accept Just Anyone as Friends Report Predators/Blackmail Report Predators/Blackmail

Task Definition Watch video clips on Cyber Security, Cyber Bullying, and Sharing too Much, then respond via a Blog on each issue. Synthesis Blog Postings: Post one comment to each Blog entry and respond to one other posting. Evaluation Teacher Rubric/Scale Teacher Rubric/Scale

Strategies, Location & Use of Information On the Tracking Teresa video clip, Teresa has tried not to reveal personal information online, but she has left enough clues that could put her in danger. List one or two pieces of personal information that was found on Teresa and describe how this could possibly put her in danger. Source: National Center for Missing and Exploited Children Netsmartz Workshop

Strategies, Location & Use of Information On the Broken Friendship video clip, a teen gives her password to a friend at school resulting in cyber bullying from classmates and the loss of her friend. Discuss other possible situations that could happen related to cyber bullying and actions you could take to avoid them. Source: National Center for Missing and Exploited Children Netsmartz Workshop

Strategies, Location & Use of Information On the Your Photo Fate Video Clip, a young girl shares an inappropriate photo with another resulting in an out of control situation. Discuss other possible scenarios that might occur from sharing too much that could also get out of control. Source: National Center for Missing and Exploited Children Netsmartz Workshop

Strategies, Location & Use of Information Blog on School Website School Website/Staff/Vincent, David/Internet Safety Blog Post a Response to each Blog Cyber Security – Tracking Teresa Cyber Bullying – Broken Friendships Sharing Too Much – Your Photo Fate Respond to one Other Students Posting Total Postings (4) To Receive Credit: Post by Assigned Alias