Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.

Slides:



Advertisements
Similar presentations
Cyber Safety By Georgia & Emily. The Internet Dos Remember to share guidelines with your students. If you are going to put names on the web make up nicknames.
Advertisements

The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Internet Safety Rockingham County Public Schools
The Internet: Educates Us Entertains Us Connects us False information
How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Cyber Safety Assessment Review
Information and resources
Internet Safety in Schools
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
Internet Online Safety How to have FUN and Stay in Control.
INTERNET SAFETY.
INTERNET SAFETY FOR STUDENTS
Cyber bullying and internet safety Parents meeting: staying safe online.
How do you use the internet?
This week is anti-bullying week.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Digital Citizenship Presentation Mr. E. Colston Note to Portfolio Reviewers: The following material is not my own creation, though it has been modified.
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Grade 5 Student Assistants
+ An Introduction to Safety on the Internet 1 Material and Advice provided by:
Internet Safety Guidelines
Internet Safety Guidelines Elementary Information and graphics obtained from:
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Contents  What is Cyber Bullying?   Credit Card  Social Networking Sites  Phones  End Slide.
Stay Safe in Cyberspace By: Mrs. Marple Never Give out personal information. Such as: Your home address Your phone number The name and location of your.
RULES FOR ONLINE SAFETY BY KYLE K AND JASON. CHECK WITH YOUR PARENTS FIRST ! Don’t ever agree to get together with someone you meet online without checking.
Welcome to Technology Class
INTERNET SAFETY Tips for becoming a “surfer” dude!
Surfing the Internet Teaching Children about the SMARTS of using the Internet Are you being responsible when you use the Internet??? B E SMART! B E RESPONSIBLE!
Junior High Computer Lab.
The Wonderful World Wide Web
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
ACPS Acceptable Use Policy Grades 3-5. A Good Technology User: Uses the computer and other technology with good intentions and for educational purposes.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Ethics. Ethics are the principles and standards we use to decide how to act.
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
TECHNOLOGY USE AGREEMENT FOR STUDENTS GRADES 3-8 This presentation was created to help students understand the district’s Technology Use Agreement before.
Kyleigh LESLIE. I will never give out my personal information like my phone number, location, and my school.
Library Technology Hub
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
I promise…. To always ask my parents before going online.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Let’s Get Savvy about Technology Mrs. George Dondero School.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Understanding the dangers of living online.  Personal networking (Facebook, MySpace, etc.)  Research information  Download music  Gaming  Instant.
KS2 E-Safety assembly How to be smart and keep safe online.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
INTERNET SAFETY, NETIQUETTE, AND COPYRIGHT LAWS By Alex Pagliaro.
WHEN SHARING IS NOT CARING: INTERNET ETHICS By Baikgopodi “Bai” Ditiso Presented at CLTD– 09 May 2016.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
A POWERPOINT MADE TO KEEP YOU SAFE ONLINE!
Keeping safe and private on the internet
Presentation transcript:

Internet Ethics

Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty of opportunities to meet wonderful people. But, like any community, there are also some people and areas that you need to avoid and others that you should approach with caution.

Cyberspace By knowing the dangers and how to avoid them, you can take advantage of all the positive aspects of the Internet while avoiding most of its pitfalls. (www.sdcyberspace.com)

Guidelines: 1. Do not give out personal information. Address Phone number School name or location Credit card number Pictures

Guidelines 2. Do not agree to get together with someone you meet online. Chat rooms are the most dangerous area on the Internet. You never know for certain if they are who they say they are. Discuss it with your parents and meet in a public place with your parents

Guidelines 3. Do not give our your Internet account password or use someone else’s password.

Guidelines 4. Do not download or install from Internet or open e-mail attachments. Don’t open e-mail if you don’t know who sent it to you, you could spread a virus. It would be best to delete the message. It is possible to get a virus from someone you know. It is best to purchase a virus scanning software program.

Guidelines 5. Do not send or display offensive or inappropriate messages or pictures. Harassment is illegal. Respect others.

Guidelines 6. Do not damage computers, computer systems, or computer networks. Hacking is illegal. Respect other’s property.

Guidelines 7. Do not violate copyright laws. Respect other’s rights to ownership. Public Domain Programs – They are not copyrighted and you can put them on as many computers as you want to for free. Freeware Programs – The author retains the copyright. They are free to use or give away, but you can’t sell them or modify them. Shareware Programs – The author retains the copyright. You can use these programs for a short evaluation period, then you must pay a small fee or erase the program. You can’t give this away to your friends; they must also pay the fee.

Guidelines Do not trespass in another’s folder, work, or files. Respect others’ right to privacy.

Chat Room Behavior Remember: Anything you say may be accessed by others. You don’t really know who you are talking to. Use your manners. Some messages could be considered as harassment, which is a federal crime. If you are on your parents account, it could get them into trouble

Spam Mail Spam is bulk e-mail advertising for some product or service that is sent to you through e-mail. Don’t reply to Spam mail. Spammers sell this information to others spammers. To avoid spam stay anonymous. When a website asks for your name and e-mail address, leave the e-mail field blank or make up and address like lsdkfklsdj@hotmail.com

Surfing the ‘Net Always use a search engine like www.google.com Use Boolean Logic to narrow down a search.

Boolean Logic A search for . . . Returns pages with… Ruby slippers “wicked witch” Dorothy-Kansas Dorothy Gale Dorothy, Gale Returns pages with… Ruby or slippers Ruby, maybe slippers The words wicked next to the word witch The name Dorothy; Kansas is ranked lower The name Dorothy Gale Either Dorothy or Gale

Reporting Internet Crime Call your Internet provider. Call local law enforcement. Go to www.cybertipline.com Call 1-800-843-5678

Quiz Go to www.cyberspacers.com/quiz/ Read each question and choose the best answer. There are 5 of them. Read the “Think About it” for each question.

Poster Design a poster to display good Internet ethics. Example: Don’t give out personal information; they’ll track down your location. Don’t be a computer hacker, be a virus cracker. Be creative.