Unit 2 Lesson 2.05 Social Networking Ethics & Responsibility.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Part I: Making Good Online Choices
Don’t be bullied, or be a bully.
What is Personal Publishing? If you’ve ever written a blog entry, posted a comment or reply on a website, uploaded a video to YouTube, posted a picture.
Information for Students and Families
Are you being a safe and successful digital citizen?
Virtual Safety Keeping you and your students safe in our virtual world.
How To Protect Your Privacy and Avoid Identity Theft Online.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
E-Safety Challenge College. Learning Objectives To assess the risks faced when online and how to use the options available to protect yourself.
Ethics & Responsibility
Stop the Creepers and Cyberbullies! 5 Easy Ways to keep yourself safer online!
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
BY: CHELSEA KUCERA ELED 318 The Legal, Social and Ethical Issues in Technology for the Classroom.
Creating an Online Professional Presence Using Social Media.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Broadcasting News Trivia "LESSON PLANS." BBC News. BBC, 30 Jan Web. 19 Nov
Controlling Your Social Networking Privacy Settings Stay safe online!
 Facebook  Twitter  MySpace  Windows LiveSpace.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Tablet Camp 2015 Resource Guide for Students at Klein ISD 1:1 Campuses.
Do pictures always give truthful information? Can publishing it be hurtful??
Pitfalls and Mistakes. Agenda Who We Are Social Media Today Pitfalls and Mistakes –Policies –Poor Decisions Online Reputation Accepting Random People.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Safety First!!!. General Computer Safety Handle components and cards with care. Ask a parent for help if a piece breaks. (such as a CD). A broken part.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Panther Forum Activity Week 9. Things to remember when you are using social media to communicate with others.
Getting Started Copyright 2010 Peoplemovers.com, All rights reserved.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
TECHNOLOGY USE AGREEMENT FOR STUDENTS GRADES 3-8 This presentation was created to help students understand the district’s Technology Use Agreement before.
Social Networking for Leagues LWVNYS Convention May, 2011.
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
Unit 2 Lesson 2.02 Be Safe in Cyberspace Ethics & Responsibility.
E-Safety. A great place… Image by: Shutterstock/nasirkhan As we have discussed over the last few lessons, the Internet is a great tool for sharing information,
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
INTERNET SAFETY Thornell Road Library Let’s Discuss: Information Privacy Social Networking CyberbullyingNetiquette.
Safety and Security Online: Private Information. Identify private information Recall that private information should not be given out in cyberspace.
How to Select and Use Privacy Settings EL Civics Assessment Task 3.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
StopPreviousNext Vicnet Internet training course Workbook 11 Introduction to Facebook Easy English workbook August 2011.
Online Journalism in Agricultural Communication Agricultural Communication and Leadership.
Let’s Get Savvy about Technology Mrs. George Dondero School.
SOCIAL MEDIA’S IMPACT ON PERSONAL BRANDING WHY YOUR DIGITAL FOOTPRINT MATTERS Image retrieved from socialmediatoday.com Created by Nicole Gennarelli.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
1. Read the following presentation and watch the videos for your grade level. 2. Write your name on your index card and answer the “Bob” questions at the.
Digital Footprints By: Devon Nicholson. What is a digital footprint? A digital footprint is an online footprint in which people can look at what you have.
“Doing the Right thing online” Online Safety. Questions How many of you have like to go off by yourself and get on the internet? What do you like to use.
Technology Safety By: Stefanie Weston. Netiquette Dos and Don’ts for Children  Do  Respect the topic that is being discussed.  Be polite and make friends.
E – SAFETY Being safe online
Creating your online identity
Social Media Security: Understanding how to keep yourself safe.
E – SAFETY Being safe online
Cyberspace Risks and Defenses
Digital Citizenship and Social Media
Social Media Safety Freshman Seminar.
The Social Networking revolution
SOCIAL MEDIA: ARE YOU PLAYING IT SAFE?.
ICT Communications Lesson 3: Internet Life and Privacy
Online Safety! Created by Educational Technology Network
How to Select and Use Privacy Settings
Social Networking Advice for Teenagers
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Unit 2 Lesson 2.05 Social Networking Ethics & Responsibility

Introduction Everyone likes to make friends. Social networking allows you to create your own personal pages and to connect with those friends. But if you’re not careful, you can open the door to hackers and gawkers. In this lesson, you will learn more about social networking and how you should protect yourself online. You will even compete with other contestants for a spot on the Friend Finder All Star List.

Introduction At the end of this lesson, student will be able to: – Practice safe, ethical, and legal use of technology systems and digital content. (ACOS 13) – Explain consequences of unsafe and illegal use of technology systems and digital content (ACOS 13.B1) – Recognize the influence of digital media on audiences (ACOS 14.B1) – Assess the impact of networked technology systems on society (ACOS 14.B3) – Apply safe and healthy work standards in the workplace for use of technology (ACOS 15)

Lesson Social networking refers to online communities where people from all over the world can meet and share common interests. There are several hundred social networking websites. Most of them are free to join and allow users to set up their own personalized profile or blog. But how would you feel about your employers or grandparents seeing what you have posted?

Lesson A 17-year-old might think it’s funny to post a Facebook photo of himself looking drunk with empty beer bottles around him. But will a college admissions officer be impressed? Probably not. Remember this important point: “If it is on the Internet, it is not private and it is not yours anymore.” (Adam Malone, FBI)

Lesson Schools and employers reject young people for high school programs, internships, college admissions, and jobs after checking out what applicants have posted online. Even if you delete your posted photos, others may have already copied them into public forums and websites. Using social media can also put you at risk for identity theft if you aren't careful about what type of information you share. It may seem innocent enough to post that you are going out for your birthday, but your birth date, combined with your name and your address (which is easy enough to find these days) is enough for many crooks to use to steal your identity.

Lesson To protect yourself, you must follow these steps: – Set your security level high – Only let people you know in – Be choosy about your friends – Do not post pictures of yourself – Do not post private information unless you are prepared for anyone to find you/track you down – Do not post anything that might be embarrassing to you now or in the future – Google your name to see how your name or identity is being used So, how careful are you? Find out now and see how savvy you are about choosing your friends online. Go to On Guard Online: Friend Finder and play the game. – Take a screenshot at the end of the game – Save it your F Drive in your Unit 2 Folder as: – 2.05 Friend Finder Game

Review The most important thing for you to remember when using social networking sites is to use the security features. – Facebook for example, lets you set your account so that it isn't accessible to anyone but people you accept as friends. – Twitter lets you receive notification when someone wants to follow you and you must accept the request before they can see your tweets. Take a few minutes to review your settings and activate security settings that can help keep you safe.

Task 1 In this unit, you have learned about “Being Safe in Cyberspace”. – Think about the following questions: Do you know someone who has had their identify stolen? How do they think it happened and what did they have to do? Do you know anyone who has been harassed online? How did they handle it? Do you have any additional tips for teenagers to protect themselves online? Open Word and first type out and then answer all 5 of these questions. – Save to your F Drive in your Unit 2 Folder as – 2.05 Discussion Be Safe in Cyberspace.

Task 2 Find an article on any one of the social networking violations — – Cyberbullying – Identity theft – Illegal file-sharing – or any other criminal act that can be perpetrated electronically — Give a brief summary of your article including the consequences given to the person guilty of that violation. – This should include any jail time, school-based penalties, or fines imposed. – Your summary should be 75 words or more and be sure to provide the name of your article, its URL, and the date it was published. Here are some possible starting points for your search: – MSNBC.com – New York Times – AL.com – CNET News – Cyberbullying Resource Center Save to you F Drive in your Unit 2 Folder as – 2.05 Article Summary and Consequences Dropbox.

Are you finished? You should have 16 things saved to your F Drive in your Unit 2 folder. – 2.01 How Fast Can You Read – 2.01 Practice – 2.01 Netiquette Scenarios Worksheet – – 2.02 What is Bullying – 2.02 Webisode 5 – 2.02 OHSA Computer Workstations – 2.03 Copyright Exposed – 2.03 Copyright Challenge Test – 2.03 ASCAP Payment System – 2.03 Copyright Dropbox – 2.03 Discussion Copyright – 2.04 Works Cited Dropbox – 2.05 Friend Finder Game – 2.05 Be Safe in Cyberspace – 2.05 Article Summary and Consequences Dropbox And, you should completed and turned in the Real-Life Stories Worksheet. So, are you finished?