Presentation by: Jennifer Collins Roldan Padilla.

Slides:



Advertisements
Similar presentations
On-line media tools for strategic communications purposes When using media tools for communication we try to use the latest technologies such us blogging,
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Breaking Trust On The Internet
Free speech in the United States Technology and the public network of information A fine line between aggression and expression Strengthening the first.
Internet Safety/Cyber Ethics
Using internet and cell phones safely
1 First Amendment Rights The Five Freedoms. 2 Forty-Five Important Words The First Amendment Congress shall make no law respecting an establishment of.
Characteristics and Strategies. A Quick Review: Bullying is when mean behavior is done _______________ and _____________. Bullying is when mean behavior.
Censorship This is a test Power point for the sake of the website. Do not take as real.
Censorship Traditionally: Deletion of materials that the gorvernment or media considers to be objectionable Internet censorship often just blocks access.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
Computers in Society Activism. Team Projects What is your name? Application? Presentation? Copyright The software industry The open source business Free.
CENSORSHIP Jack Homer Frederick Abreu James Carroll Minsoo Kim.
Social Networking Eric Derba Exploring the Internet, Fall 2010.
Free speech in the United States: Expression vs. Hostility Seeking a Balance: Enhancing the First Amendment Challenges.
What is Freedom of Speech and Social Responsibility?  Freedom of speech is the right to speak without censorship and limitation.  The right to freedom.
Internet Censorship By: Austin Tyler And, Lisa. Introduction  Ever since there has been an Internet, there have been attempts to control it. However,
1 st Amendment Freedom of Religion, Speech, Press, Assembly, and Petition.
{ Internet influence… Reasons of internet usage. How does it influence us? Yessenzholova Akbota, 11a Yessenzholova Akbota, 11a 2014y. 2014y.
Internet Censorship Ann Lee, Gregory Fillios, Hugo Ponte, Kathryn Wells, Malcolm Greaves.
Internet Censorship in China By Shipeng Xu. What content is censored? Social networks: Facebook, Twitter, Youtube and Flikr etc. Any news sources contains.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
How to Surf the Web Safely. What is this a picture of?
1 Kids on the Web. Child’s play? September, 2008.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Group Members: Paulina Reyes Brad Sherburne Dillon Iwasaki Sung Hwang Hannah Shepard.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Intro To The Internet A Guide to Getting Started.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Moral, Social and Ethical issues associated with the Internet
Our Freedoms – Expression: Speech and Information.
Internet censorship in the People's Republic of China Group Presentation by Alauddin, Michel, Malik and Toshe.
Restrictions of Internet Use Jeremiah Jones Rodney Dowdy Pablo Gonzalez Pers 2730 Internet Technologies Dr. Chunlei Liu Jeremiah.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Online Marketing Strategy Zoe Behan & April Brophy 15/10/2013.
AMS&NW District 13 District Web Services “The Road Ahead” Plan for the coming Optimist year.
GOVERNMENT REGULATION AND SURVEILLANCE OF THE INTERNET Ayman Irziqat Katarzyna Kosarska Sergio Pradel.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
1 The Five Freedoms of the First Amendment. 2 Forty-Five Important Words The First Amendment Congress shall make no law respecting an establishment of.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
First Amendment Ch. 4, Les. 1. Civil Liberties  All Americans have certain basic civil liberties - the freedom to think and act without government interference.
Internet Dangers Technology Communication Tools E-Literate.
Digital Citizenship By Teneka Cannon. . Digital Etiquette also known as Netiquette Definition: a basic set of rule everyone should follow to make Internet.
China Club forum Question: Why did China ban Facebook?
Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Computers & Censorship
The First Amendment An open exchange of ideas, religion, speech, assembly, press, and petition, is the hallmark of a free society.
FREEDOM OF SPEECH COSC 380 Eric Carroll Courtney Wirtz Adolphe Ngabo.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
INTERNET SAFETY, NETIQUETTE, AND COPYRIGHT LAWS By Alex Pagliaro.
Technology Safety By: Stefanie Weston. Netiquette Dos and Don’ts for Children  Do  Respect the topic that is being discussed.  Be polite and make friends.
Mass Media – the Internet  Role of media  Types of media  What is the Internet  www  Information on the Internet  Usage of the Internet  Favourite.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
CS590B690B Detecting network interference
Safe Internet Mechatronika Budapest.
China & Censorship.
China is Losing a War Over Internet
Presentation transcript:

Presentation by: Jennifer Collins Roldan Padilla

 Having the ability to speak without censorship.  Promotes innovation. Science, Technology, Art.  The right to transfer information freely.  Worldwide communication.  Being able to express our opinions.  Change rules or laws.  Create communities.  Sports and clubs.  Online games and forums.

 Spread news and information.  During the Tiananmen Square rebellion in China in 1990, the Internet kept Chinese communities around the world, especially in universities, in touch with the current events through and the newsgroups, bypassing all government censorship.  News is now transferred in seconds, not days. ▪ Twitter, Facebook, Myspace, YouTube, and Skype.  Idea of “E-Freedom.” ▪ Access, publish, or critique information. Web 2.0.

 Provide helpful information.  Give police or government information on the whereabouts of a criminal  Report suspicious activity.  Prevent harmful activities from occurring.  Personal Freedom.  The right to learn, educate, and communicate.

 To prevent information from spreading.  Information be not be accurate  Can be harmful.  People may over react to news or data.  Wrong information.  The information may be fabricated.  Language.  Intended to offend people.

 Moral  Pornography  Military  Protect intelligence or tactics  Political  Control populations and agendas.  Religious  Create a dominant force.

 Computer Viruses  Malicious intent.  Hacking tools  Can lead to identity theft.  Phishing  Website access.  Malware  Advertisement.

 The Great Firewall of China  Blocks many news websites.  Block websites belonging to pro-democracy activists.  Blocks most blogging websites.  People still bypass the filter.  Proxy servers.  VPN Connection.  Tor

 Rules:  1. Break up into teams.  2. Student must try to get her team to say the word. They may gesture, point, touch anything, or say anything except the taboo words.  3. Student’s partner tries to guess the word within sixty seconds.

 Should there be limits on what we can say?  Should criminals have freedom of speech?  Should some books be banned?  Have you ever told someone to “be quiet?”

Thank you.