Netflix scenario Madison Villalobos.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Privacy Activity Opinions on our own Private Rights By: Martin Duchnak, Paula Nunez, Karly Butler, Bryan M.
Technology SafeKEY.
ICT iGCSE.  You should be able to describe the use of Internet developments such as:  Web 2.0  blogs  wikis  digital media uploading websites  social.
E-safety EXPOSURE TO INAPPROPRIATE MATERIAL HARASSMENT AND BULLYING PERSONAL INFORMATION AND PRIVACY PHYSICAL DANGER UNWANTED ADVERTISING FINANCIAL RISKS.
HOW TO DEAL WITH BULLIES. ESSENTIAL QUESTIONS  What is bullying?  How can I help other people who are being bullied?  How can I help myself if I am.
Going Places Safely Essential Question:
Ollie the Online Owl presents: Internet Safety Tips By Jane Sebastian.
RahulMIN KU WHAT TO DO IF CYBER-BULLYING OCCURS Firstly protect your number- only give it to friends and don’t leave your mobile where others can.
Air Products Internal Use Only.  If you’re not sure what Cyber Safety refers to, this quick video might help. If you’re not sure what Cyber Safety refers.
1 “Technology and Social Networking”. 2 Objectives 1.Describe technology that youth are using for social networking. 2.Recognize benefits and dangers.
Let’s create a better internet together Safer Internet Day 2015 Secondary Assembly #SID2015 #up2us.
Parental Controls What Should You Watch Out For. What’s Out There. There are a lot of new devices and pieces of technology that can go on the internet.
Online Safety
Homeroom – READ or use your technology quietly. Remember you can SIT anywhere you want for homeroom. Keyword is SIT! Science of Bullying.
Privacy in the Media Presentation by Rich Green. What is Privacy? Privacy is the ability to have personal information kept out of the public eye In an.
CALL NOW SPECIAL TOPICS Social Media.
The W.I.S.E. Program Webbie’s Internet Safety Education MAT H. HECK, JR. PROSECUTING ATTORNEY.
Mrs. Kinsler’s Class.  With a table partner, make a list of some of the things you do on the Internet.  Be ready to share your list with the class!
By Joe and Josh.. Would you leave your front door open? Letting strangers see every thing about you by giving away your details online is probably the.
Ms. Park.  Q&A: What are some Internet safety tips you already know?
Be More…Tech Savvy A Workshop for Elementary Students about Internet Safety.
Internet Safety KNOW HOW TO STAY SAFE ONLINE. You should never give out certain information over the internet.  Examples include:  Your last name 
The Final Exam is due May 7. The Final project is due 8:00 am May 12th.
 Go directly to your workstation.  Prepare for Group Presentation. › Communication Methods.
Safety On The Internet!!!!. Introduction There are lots of things to know about the internet. My PowerPoint will help you learn. Please enjoy!
Internet Safety Miss Anderson’s Kindergarten. Internet Safety Video This is how we will begin our lesson.
Show of hands…how many people are using a social media site?
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
My Digital Footprint Gracyn K. WHAT’S A DIGITAL FOOTPRINT? You may not know what a digital footprint is, but you probably already have one yourself. A.
Internet Survival Tips for Kids and Teens
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
 The conflict is when Greg gets hurt.  The Resolution is when Greg gets involved into a fight.
 Go directly to your workstation.  Take out a sheet of paper, pen or pencil.
Internet Safety Krista Sell IST 525 Kutztown University Summer 2011.
Computer Safety Online and Offline By Michelle Noel.
How to Select and Use Privacy Settings EL Civics Assessment Task 3.
 S = Stay safe  M = Meet up  A = Accepting information  R = Reliable  T = Tell someone.
I’M CYBER SAFE.
Argumentative Writing: Effective Introductions Copyright © 2015 by Write Score LLC.
Journeys III – Expedition 2 “R U Online?”. Expedition 2 – Lesson 5 Review Vocabulary Review the vocabulary for “Friends or Foes?” and “DotComGuy: A Life.
COMPUTERS FOR COMMUNICATIONS Exploring Computer Science – Lesson 1-4.
Cyber Bullying Anti-bullying Week Cyber Bullying What does it mean? What does it mean? Cyber bullying is when cruel messages or pictures are sent.
Safe Online Communication. To start off, watch this short video on YouTube by using the link below.  v=ZCKW4H3Ap44
DIGITAL SAFETY City of Edinburgh Council Digital Learning Team.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
IBEAR Decision making scenarios By: Ryan Johnston.
A Parent’s Guide to Child Safety on the Internet.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Cyberbullying and Internet Safety
E – SAFETY Being safe online
Cyberbullying project
Unit 2 Task 1 By Matei Turcu.
Digital Safety City of Edinburgh Council Digital Learning Team.
Using the Computer Responsibly
4th Nine weeks Internet Safety
Privacy Group Activity
KEANU’S GUIDE TO INTERNET SAFETY
The Parents’ and Carers’ Guide to the Internet
Aim To think about what bullying is and how to help yourself or others who are being bullied. To understand what Anti-Bullying Week is and its aims and.
Computers for Communications
Computers for Communications
WELCOME.
Aim The aims of today's session is to think about what bullying is and how to help yourself or others who are being bullied. To understand what Anti-Bullying.
Social Media Safety Freshman Seminar.
Computers for Communications
By: Aubrey beyer 8th grade
Bell Work NETWORK SOCIAL
Digital Citizenship 6th grade
Lesson Plan Safe Data Part 1 Duration: 50 Mins.
Presentation transcript:

Netflix scenario Madison Villalobos

The End

They didn’t have the right. •Someone’s Netflix rental history is being used as evidence in a murder case because this person rented a lot of horror movies. Someone’s rental history of entertainment does not count as evidence of a murder trial. Just because the like a type of movie doesn’t mean they are murderers They didn’t have the right.

The person who was being charged of murder is not at fault for watching horror movies. The prosecuters had no right to deem this as evidence They aren’t at fault

Another example of invasion of privacy A kids was complaining about how murderers get more attention than victims so he went on twitter and said he was going to do a shoot out at school and that he was going to be popular. He did this to make a point. The cops were called and the kid was investigated and suspended from school because of what he said on twitter. Because this was a dangerous threat, it was okay to invade his privacy. Another example of invasion of privacy

I have left birthdays on social media sites, so people know how old I am. My school is listed on my pages, so someone could figure out where I live, Clubs, activities and interests are listed on pages, someone could figure out what I like and do not like All this information is true and accurate about who I am and it is scary that everyone can see it. My Data

People give up their privacy when they log online People give up their privacy when they log online. Data is given on whatever one is doing. The availability of data is detrimental to privacy and there is nothing to fix this. People just need to be careful of their actions Privacy

People are risking their safety when they are creating data People are risking their safety when they are creating data. A phone call or text message has the data to tell someone who you are calling, where you are calling, and at what time you made the call. Safety

The availibility of data lets people connect because they have similar data. This is how dating sites work. When someone inputs similar data they are connected together. Connectivity

Nothing leaves the internet. The internet is infinite Nothing leaves the internet. The internet is infinite. There is a trail somewhere. People need to be careful when they input information because everyone can see it at any time. The data has a positive effect on society. Permanence