Anonymous Speech & Reading

Slides:



Advertisements
Similar presentations
Its more than a game, its your life…. What do you do online?
Advertisements

Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Association of Registered Nurses of British Columbia Social Media Guide.
Don’t be bullied, or be a bully.
The Franklin Brothers Changing American Journalism Material property of the Arkansas Department of Education Distance Learning Center. It may be used for.
DO NOT USE THIS SPACE DO NOT USE THIS SPACE Internet Privacy How private is your identity? How private are your activities? Digital media ( , photos,
Internet Online Safety How to have FUN and Stay in Control.
South Korea Freedom of Speech. Scenario President involved in embarrassing personal scandal Information is leaked to press by reliable informant Newspapers.
Ask.fm is an app anyone can post anonymous questions and comments and has been used to send sexual, cyberbullying and other abusive content.
Netiquette Rules.
Social Media Understand WHY Biggest MISTAKES How YOU can get STARTED 15 Minutes Agenda.
Internet Safety What Parents Need to Know. Cyberbullying  Cyberbullying is just what it sounds like-bullying through the Internet through instant messages,
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Social Media & The U.S. Election. Important Connections TOK: –What is a citizen’s responsibility in an election? How should they participate? –How do.
How To Protect Your Privacy and Avoid Identity Theft Online.
Cluster 2 Unit 6.  Democracy is: 1) A process 2) People listen to one another 3) People say what they think 4) People make decisions together by accepting.
Skills: none Concepts: information we give up voluntarily, information we reveal as a by-product of using the Internet, use of information “signals,” data.
Oswego School District 308 Internet Safety and Ethics Review Plank Jr. High – Tech 6 Mr. Brown.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
CFE USA Participation.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
What it is About  This poster is about The Nine Elements of Digital Citizenship.  It also has a lot of information about Cyber bullying.  There were.
Social Media Safety Manchester Township Middle School Guidance Department
Mrs. Kinsler’s Class.  With a table partner, make a list of some of the things you do on the Internet.  Be ready to share your list with the class!
Controlling Your Social Networking Privacy Settings Stay safe online!
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
By..Chaim. How is Twitter different from SMS messages? Twitter is a website. Its users to send and read messages called tweets. You can share briefly.
Journalism Chapter 2 Making Ethical Choices. ethics Branch of philosophy that deals with right and wrong.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
 The problem is that young kids don’t know how to us e the Internet safely, and they leav e bad digital footprints.
Influence of Social media on the National Election Campaign in India By: Konaal Kumar.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
DIGITAL FOOTPRINT Everything you do is online. How you can protect yourself and your info.
 Primary Election  General Election  An election in which members of a political party nominate candidates.
Questions National Picture What social networking sites is your child a member of? Vote –
It’s more than a game, it’s your life… What do you do online?
INTERNET SAFETY Thornell Road Library Let’s Discuss: Information Privacy Social Networking CyberbullyingNetiquette.
Cyberbullying What does it mean? What can we do?.
Spring BreakPlease BE HERE!!!!
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Ben Franklin. Ben Franklin was born in Ben had 16 older brothers and sisters.
© 2008 i-SAFE Inc. an i-SAFE presentation. © 2008 i-SAFE Inc. Learning Goals YOU WILL: Understand that an online stranger is anyone met exclusively online.
E-Safety Quiz Are you cybersafe?.
Objective: Analyze personal skills, interests and abilities and relate them to current career opportunities. Finding a Job that Fits.
T HINK ! Before You Post A lesson on Internet Safety Source:
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Aristotle, a great thinker, once said: “We are what we repeatedly do.”
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Digital Footprints By: Devon Nicholson. What is a digital footprint? A digital footprint is an online footprint in which people can look at what you have.
Cybersafety 4 Kids: Smart Moves in an Online World.
Hosted by Mrs. Schneider- Unit US’s Role in the World Today Responsibilities of Citizens Citizens Promote the Common Good Miscellaneous.
Edward Snowden An Introduction.
Amy Randolph-Chernis. Blogging Facebook LinkedIn Twitter YouTube Social Networking!
Employers Employers could check your Facebook. There may be things on there that you might not want them to see, or things that they may see that would.
Tyler Rapp.  I strongly believe anonymous posting should be legal  Why? You have the right, guaranteed to you by the 1 st Amendment in the United States.
GREENHOUSE 101 FOR BASIC USERS
Apps to Get Rid of.
Creating your online identity
By Laurel Bacon 12/1/16 8th grade Career Prep
Pupil eSafety Survey Results
Grade 4.
Define the Problem Constant surveillance of citizens in our country
SOCIAL RESPONSIBILITY
Online Safety! Created by Educational Technology Network
Internet Safety – Social Media
Social Media in Careers
Our internet, our choice
Our internet, our choice
Security Issues within Social Media
Presentation transcript:

Anonymous Speech & Reading LaRue Pierce Brenda Jorcilien Lucas Schafer Jordan McCall

What is Anonymity?

The condition of being anonymous

First Amendment of the U.S. Constitution What does it say?

Freedom of Speech (Caveman style)

Internet Troll

Does free speech give us the right to anonymously troll strangers?

Anonymity on the Internet

Benjamin Franklin a.k.a. “Silence DoGood” Mrs. Silence Dogood was a pen name used by Ben Franklin to get his worked published in the New England Courant, which was a newspaper founded and published by his brother, James Franklin. He wrote around 14 letters and it was all in disguised handwriting that way no one ever had the chance of figuring out what he was up to.

Ben Franklin cont. Ben Franklin created an entire made up background of his character that was seen in his first letter submitted to the paper. Why do you think it was necessary for him to create a whole new identity rather than just using a different name?

Ben Franklin cont.

Voting

Secret Ballots Basically, it means that a voter’s choices in an election are private. Secret ballots are included in many treaties and international agreements. Many ways to do secret ballots Writing on a piece of paper Bubbling in the candidate on a ballot Checking a box next to the candidate’s name on a ballot Voting booths help ensure privacy

History of Secret Ballots In ancient Greece, secrets ballots would be used when voting on if someone is a threat to the city or country. If found to be a threat, they would be banished from Athens for ten years. Secret ballots were also used in ancient Rome. Secret ballots in the United States first started using secret ballots after the 1884 presidential election. The first city to use the secret ballot was Louisville. However, the last state to completely adopt the secret ballot was Kentucky. They did so in 1891. The first president to be elected completely under the secret ballot was Grover Cleveland. He was elected in 1892.

Importance of Secret Ballots Are secret ballots important? Why or why not?

Social Media

Do you know who you’re talking to? Maybe not

Anonymous Social Media Ask.fm Yik Yak Twitter Whisper Secret Wut Popcorn Messaging Rumr Social Number Confide Sneeky Reddit Spring.me Truth

Examples of non-anonymous sites Facebook – collects and sells user information to third parties, informs users about friend activities such as likes, shares, comments, and posts, and prohibits you from creating fake accounts. Netflix – keeps track of everything that you watch and groups it into a category entitled “Recently Watched.” Spotify – music software that informs users what their friends are listening to. Amazon Kindle – reading software that keeps track of everything you’ve read.

Wikipedia (what a headache!) Anyone, members and non- members, can change information which causes Wikipedia to lose it’s credibility.

Social Media Questions Do you really need to be known while using social media? What’s the purpose of a username? What effect does social media have on social interactions? Is there really such a thing as being completely anonymous on social media? Does being anonymous on social media really make a person feel free? What causes us to have to be anonymous on social media? Is there value in reading content anonymously?

Edward Snowden Hero or traitor?

Edward Snowden He blew the whistle on the NSA’s spying and the PRISM program. He revealed to journalists Glenn Greenwald and Laura Poitras in Hong Kong that the NSA has been spying on US citizens and also people around the world. Many people consider Snowden to be a hero, but others call him a traitor. A petition was made on whitehouse.gov calling for him to be pardoned. It met the 100,000 signature requirement for a response but the government never responded to the petition.

PRISM Began in 2007 NSA program that collects internet communications of foreign nationals. Internet companies have to give up any data that matches court-approved search terms. It is the number one source of intelligence for the NSA Do you think this program is good or bad? Why?

“I am Spartacus!”