 Types of accessibility  Video  Facts  Argument  Government  Statistics.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Haygrove School – E Safety Induction E Safety Update #protecting your professional identity.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Perceptions of Behavioral Advertising among CMU Community Ashwini Rao April 21, 2014.
How To Protect Your Privacy and Avoid Identity Theft Online.
Discovering Computers 2010
Digital Citizenship Project
Social Networking Privacy Xintao Wu University of North Carolina at Charlotte Nov 2012.
A Guide to Digital Citizenship
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
How can you protect yourself from online identity theft?
Class 6 Internet Privacy Law Social Media Privacy.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
 Facebook  Twitter  MySpace  Windows LiveSpace.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
Digital Citizenship Created By: Kelli Stinson June 2011.
 What can be used?  When and where? › Classroom › Library › With staff supervision/ permission.
Protecting Your Organization Identity Theft and Data Breach.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
Identity Theft Project Erin L. Caraway Jacob Locke.
Cyebrsafety webinar September, What are other current Cyber Issues? ●Digital Identity ●Fraud ●Geo-location ●Hacker ●Identity theft ●Malware ●Phishing.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
Get Safe Online Expert advice for everyone In association with.
Homework for Wed’s topic: Threats to E-Commerce 1. Review Chapter 5 in Laudon textbook 2. “Facebook's Top Cop”— Joe Sullivan and a staff of 50 people Fortune.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Internet Safety Presentation for Families. Keeping Kids Safe What are they doing online? What are some of the concerns? How do we keep them safe?
Digital Citizen Project By: Frances Murphey Technology and Education.
Targeted Behavioral Advertising Ariel Pierre Section 001.
Digital Citizenship By Teneka Cannon. . Digital Etiquette also known as Netiquette Definition: a basic set of rule everyone should follow to make Internet.
INTRODUCTION & QUESTIONS.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
Scams and Schemes I can… Understand what identity theft is and why it is important to guard against it. Learn to recognize strategies that scam artists.
What Would You Do? The Risks of Behavior on the Internet.
Your kids online – challenges and solutions. Fact or fiction? 1. How many hours a week do children aged between spend online on average? a)18 hours.
Technology Safety By: Stefanie Weston. Netiquette Dos and Don’ts for Children  Do  Respect the topic that is being discussed.  Be polite and make friends.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
ETHICS Internet And Online Community Week 10.
Buy Contacts Without Prescription at Discounted Price -
Order Contact Lenses Without Prescription Contactlenses4us.com Contactlenses4us.com
Hawaii Property Management Companies -
Safety.
Mrs. Esman Computer Special
An Introduction to Phishing and Viruses
Digital Citizenship Middle School
Honolulu Property Management
Property Management Companies Honolulu
Video Wall Content
Internet And Online Community Week 10
Oahu Property Management Companies
HappyDoors Property Management
Calgary Computer Security Services -
Property Management Companies Honolulu -
Check Out for Best Property Management Companies Honolulu
Scams and Schemes.
Starter What is identity theft?
HOW DO I KEEP MY COMPUTER SAFE?
Best Honolulu Property Management Company
ICT Communications Lesson 3: Internet Life and Privacy
Calgary computer security
Ethical, Social and Political Issues
Calgary IT Network Support
Security Issues within Social Media
Presentation transcript:

 Types of accessibility  Video  Facts  Argument  Government  Statistics

 Social networking Sites › Facebook › Twitter › LinkedIn  Telecommunications Companies › Comcast › Verizon  Phishing Scams › Website Pop ups ›

 Information accessibility › Information is recorded and transferred through the internet  Privacy › No single law in the US that provide a comprehensive treatment of data protection (Stratford & Stratford, 2011)

 Ease of access › No privacy › damage  Safety › Stalkers › Access to children  Loss of ownership › Personal information belongs to the site entered Everyone is entitled to an opinion

 Where is the line? › No boundary identified › Intangible place  Who can you trust? › This the perception of the individual › No one

 Everyone must educate themselves (Cyberethics)

 Cyberethics - refers to a code of safe and responsible behavior for the Internet community.  Privacy act of 1974 – is itemized to protect the rights of individuals DOJ, 2011

 This chart outlines identity theft statistics by region.  These statistics have a direct relationship to identity theft attempts. ITAC, 2011

Questions

 DOJ. Cyberethics. (2011): Retrieved from  FTC. Consumer alert. How not to get hooked by Phishing Scam. (2011) Retrieved from alt127.shtm alt127.shtm  Stratford, Jean, Stratford, Juri. Data protection and privacy in the US and Europe (2011). N.pag.Web 20 Nov  ITAC. Research and Statistics. (2011) Retrieved from p?cateid=47 p?cateid=47