Copyright © 2012 Knowledge Point digital world architecture of evolution Resources:

Slides:



Advertisements
Similar presentations
Internet Safety in Schools
Advertisements

Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Forms of Cyberbullying
BULLYING What Is The Definition of Bullying?
Cyberbullying Not just on the playground anymore… What is it? Where does it happen? Why do we care? What can we do? Alcott Elementary 2010 Laura Lynch.
Copyright © 2012 Knowledge Point digital world architecture of evolution Resources:
CYBER C3 – MODULE 1 CYBER ACCESS By Manju Raja. Cyber Access Cyber Access is about understanding the privilege of using electronic information as well.
SOCIAL DEVELOPMENT: CYBER BULLYING TEXTING/SOCIAL MEDIA LESSON ONE 8th Grade 1.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
The Internet is Forever
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Concept: Internet Safety Who You Are ~ Learning About Yourself ~ Unit Essential Questions How can my principles, skills, and interests help me be successful.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
 FOOD, WATER, SLEEP, AIR  SAFETY FROM THREATS AND VIOLENCE  LOVE OF FRIENDS AND FAMILY  RESPECT.
By: Sophia Dermouche & Maheen Khalid
Cyberbullying Inspector Paul Lawrence & Stephanie Frankish Crime Prevention Officer.
Anti-Bullying Presentation September 24 th, 2012.
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
On the planet In the world In the United States In California In Irvine At Plaza Vista In your family With yourself.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
BULLYING It’s Everyone’s Problem. No Student Should Ever Be Bullied.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
A curriculum waiting to happen. Agenda  Survey Says!  7 Topics of Internet Safety  In School Presentation  Sample Cyberbulling  And other resources.
What’s the Big Deal About Bullying?
By: Zach Oltmanns.
 FOOD, WATER, SLEEP, AIR  SAFETY FROM THREATS AND VIOLENCE  LOVE OF FRIENDS AND FAMILY  RESPECT.
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
Internet Safety Blue Hills School. Internet Safety Use these Tips Don’t share your address, phone number, school name or your parents credit card number.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Netiquette/Internet Safety Presentation VAHS Boys Swim Team.
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
Cyber Literate Module 2. What is ‘Cyber Literate’?  Cyber Literate = Ability to use technology + knowing when, when not and how to use it appropriately.
CYBER BULLYING!. WHAT IS CYBER BULLYING? Cyber bullying affects many adolescents and teens on a daily basis. Cyber bullying involves using technology,
COMPUTER SOLUTIONS 1 **Notes from DVD: I Was Cyberbullied.
Cyber Bullying. ~ instant messaging ~ digital photos ~ cell phones ~ computers ~ web pages ~ social networks ~ ~ instant messaging ~ digital.
Welcome!! CyberBullying SkyCast. CyberBullying Today’s Aims: To create a therapeutic ‘online space’ during the SkyCast! To understand more about cyberbullying:
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cortney Wolf November 22, 2015 What is Bullying? Cortney Wolf November 22, 2015.
 It is the use of technology such as a computer or cell phone to harm someone.  It occurs when someone is threatening, making fun of, or humiliating.
Cyberbullying and Cyberstalking BY MS. BARBARA WOOLLEY.
Bullying What is it really?really. Bullying Defined Is unwanted, aggressive behavior Involves a real or perceived imbalance of power, Behavior is repeated.
Sarah Manuel Final Presentation MCO435-Social Media.
CYBERSAFTEY 101 By: Tarrah Marcus INTRODUCTION  Acceptable Use Policies (AUP)  Policies that govern internet use  Cyberbullying  Technology based.
Cyberbullying. What is Cyberbullying? Cyberbullying is is bullying that takes place using electronic technology such as cell phones, computers, and tablets.
Copyright © Cengage Learning. All rights reserved.9 | 1 The Classroom as Community Chapter Nine.
Internet Safety Training For WYWLA Middle School Students.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Digital Citizenship.  I can…. What is digital citizenship?  Think.Pair.Share.
Cyberbullying project
Digital Citizenship.
Cyberbullying Can be done by anyone to anyone
BULLYING
Cyberbullying.
NCMS taking a stand against bullying
Cyber bullying is a form of teen violence that can do lasting harm to young people.
Pics, Flicks, and Sexting
Issues In media studies: Cyberbullying
Bulkeley Middle School
Digital Citizenship.
Digital Citizenship Tech in TUSD.
Information Security Footprint.
Digital Citizenship & Social Media.
Digital Citizenship Tech in TUSD.
CYBERBULLYING References: Fund for Civility, Respect, and Understanding OK, Inc. Friends4Friends Campaign
Digital Citizenship Tech in TUSD.
Issues With Internet in College
Digital Citizenship.
Digital Citizenship.
Internet Safety.
Presentation transcript:

Copyright © 2012 Knowledge Point digital world architecture of evolution Resources:

Copyright © 2012 Knowledge Point Responsible Use of Social Media Instilling the Right Attitude: Internet access enables us to send, receive and obtain information in an instant and anytime, anywhere – Appreciating Digital Facilities. – Being Responsible when sharing knowledge and Information.

Copyright © 2012 Knowledge Point Appreciating Digital Facilities We should not misuse facilities to surf or post pornographic materials. We should not engage in illegal gambling. We should not vandalise Internet kiosks.

Copyright © 2012 Knowledge Point Appreciating Digital Facilities We should not overwhelm the bandwidth by downloading big files during peak hours. We should not hack the network.

Copyright © 2012 Knowledge Point Being Responsible when sharing knowledge and Information. We should not spread fabricated or incorrect information and news. We should not condemn others through blogs, websites, or community portals. We should be sensitive towards different races and ethnic groups.

Copyright © 2012 Knowledge Point Identifying Cyber-bullying Cyber-bullying happens when a person is repeatedly harassed, mistreated, or made fun of via s, web sites, text messaging, cell phones, video, blogs or any other form of communication that occurs electronically. M6o M6o

Copyright © 2012 Knowledge Point Identifying Cyber-bullying Cyber-bullying may include the following activities: – Posting of slanderous messages on social networking sites. – Spreading of rumors online. – Excluding a person from an online group. – Sending of unsolicited messages via text, instant messaging or .

Copyright © 2012 Knowledge Point Identifying Cyber-bullying Video : e-Literate_vo1 The disturbing effects on the victims of cyber- bullying may comprise of the following: – Poor grades. – Emotional spirals. – Poor self-esteem. – Repeated school absences. – Depression. – Suicide.

Copyright © 2012 Knowledge Point Identifying Cyber-bullying UAE Cyber Crimes Law – Any one convicted of using the internet or any other high- tech means for threatening or black mailing another person shall be sentenced to no more than two years in jail and fined no more than Dh 50,000, or both.

Copyright © 2012 Knowledge Point Offenses Offenses are defined as the acts of causing anger, resentment, displeasure, or affront. – Example: in the UAE abuse of any Islamic law or community values or anything said against any recognised religion is considered as an offense.

Copyright © 2012 Knowledge Point Offenses UAE Cyber Crimes Law The crimes are as follows: 1.Abuse of any Islamic holy shrines or rituals. 2.Abuse of holy shrines and religious rituals stipulated in other religious. 3.Insulting any recognized religion. 4.Incitement or promotion of sins. Anyone convicted or transcending family principles and values or publishing news or pictures related to the private life of the family’s members, shall be jailed for no less than one year and fined Dh 50,000.

Copyright © 2012 Knowledge Point Be smart and stay safe!