Digital Media Safety Issues 102.02. Physical Safety Issues Safety issues pertinent to digital media professionals fall under two categories: Physical.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Part I: Making Good Online Choices
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is identity theft, and how can you protect yourself from it?
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CYBERSAFE – PARENTING ONLINE. CYBERBULLYING DEFINITION: intended, deliberate, repeated, virtual hostile behaviour with the usage of ICT FORMS: Denigration.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Shermaine L. Mahan. Social media netiquette is the social code for using social media. Social media is user generated content while netiquette is the.
Protecting Yourself Online (Information Assurance)
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Digital Citizenship By: Miranda Scorver.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Scams & Schemes Common Sense Media.
GOOD COMPUTER SAFETY FOR 1 MALAYSIAN HEALTH CARE
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
100 Internet Safety Jeopardy Social Network Sites Online Shopping Words & Pictures Cyber- bullying Internet Scams.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Joe Ranallo, Melissa Fornes, and Christina Myles.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Technology Competency Computer Infestations Mr. Locke.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
Internet Safety Advanced Techniques By: Haley Needs McKenna Sorensen Kathryn Feltwell.
By: Whitney Cannon. What are binary Numbers Binary numbers are the way a computer thinks. The computer see’s thing in zero’s and ones. We used.
Digital Citizenship By Lori Gray.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Internet Safety Advanced Techniques By: Haley Needs McKenna Sorensen Kathryn Feltwell.
Digital Citizen Project By: Frances Murphey Technology and Education.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cyber Safety Jamie Salazar.
Computer crimes.
INTRODUCTION & QUESTIONS.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Computer Security Keeping you and your computer safe in the digital world.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
By Lloyd and Jamie Brought to you by I safe. How to keep from being bullied (online) 1 don’t give out personal info such as passwords, pins, address,
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Physical Safety Issues
DIGITAL CITIZENSHIP What You Should Know!.
Digital Citizenship Middle School
Physical Safety Issues
Appropriate Use of Technology
Lesson 2- Protecting Yourself Online
Scams, Identity Theft, and Viruses Kelly & Caitlin
Internet Safety Vocabulary
LEGAL TERMS IN DIGITAL MEDIA
Computer Viruses Standard A-4 (Safety Unit)
Physical Safety Issues
Lesson 2- Protecting Yourself Online
Andrea Brunelle, Kaite Quilico, Ashley Deetjen
Presentation transcript:

Digital Media Safety Issues

Physical Safety Issues Safety issues pertinent to digital media professionals fall under two categories: Physical safety issues Physical azards that could injure you or others Digital safety issues Computer or technology-related dangers to your personal, financial, emotional or physical well-being

Physical Safety Issues Electrical Hazards A dangerous condition that poses a threat of injury or even death. Contact with electrical current or equipment failure can result in electric shock, arc-flash burn, thermal burn, blast or other injury.

Physical Safety Issues Trip Hazards Unexpected objects in a path can pose a hazard. Examples: Poor housekeeping Cords in walkways Cluttered work area Poor visibility Open drawers

Physical Safety Issues Ergonomics Ergonomics is simply defined as the science of designing the workplace to fit the worker, enabling comfort and avoiding injury from strain. Examples: Proper posture Safe lifting techniques Appropriate seating position Adaptive equipment

Physical Safety Issues Lifting Hazards Improperly lifting a heavy object is the most common cause of injury for younger workers, damaging muscles, tendons, ligaments, nerves and blood vessels. Lift with the knees, not the back Keep loads close to the body and near your center of gravity Use diagonal foot positions Lift from waist height rather than from the floor. Avoid awkward positions and get help if needed!

Digital Safety Issues Identity Theft Identity theft is a serious problem in modern society, made easier for criminals by the use of computers and electronics. Identity thieves steal or capture identifying or personal data such as Social Security numbers, credit card numbers, passwords, etc. and use it to gain access to financial accounts and more.

Digital Safety Issues Cyberbullying “Cyberbullying” is when someone – often a child, pre-teen or teen – is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another person using the Internet, interactive and digital technologies or mobile phones.

Digital Safety Issues Cyberbullying There are two kinds of cyberbullying: direct attacks (messages sent to your kids directly) and cyberbullying by proxy (using others to help cyberbully the victim, either with or without the accomplice's knowledge). Because cyberbullying by proxy often gets adults involved in the harassment, it is much more dangerous.

Digital Safety Issues Viruses A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as spreadsheet software. Each time the spreadsheet programs runs, the virus runs too and has the chance to reproduce (by attaching to other programs) or wreak havoc.

Digital Safety Issues Trojan Horses A Trojan horse is simply a computer program that claims to do one thing (it may claim to be a game, or screensaver software) but instead does damage when you run it. A Trojan horse may use your computer to send spam, or could even erase your hard disk.

Digital Safety Issues Worms A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, then starts replicating from there as well.

Digital Safety Issues Spam Companies sell valid addresses to people who want to sell a product. They may get the s through numerous methods, including: Social networks or websites Newsgroups or chat room Websites that request personal info Sites created with the specific purpose of ‘harvesting s’ (example: prize offerings)

Digital Safety Issues Hoaxes Hoaxes, commonly spread via , chain letter or social media, are false reports. They can be malicious, or mischievous. They are usually started with mal-intent but then spread by people who believe them to be true. Hoaxes sometimes involve: Non-existent subjects (e.g. warnings about viruses that aren’t real), Claims of impossible feats False alarms about supposed new criminal tactics False or exaggerated accusations against politicians or celebrities Scams or scares Chain letters (if you don’t send this letter to ten friends by midnight..)

Digital Safety Issues Internet Addictions Internet addiction is a type of compulsive disorder that encompasses many unhealthy obsessions: Cybersex addiction Online gambling Compulsive online gaming Auction addiction Internet addicts gradually spend less time with real people in their lives in exchange for solitary time in front of a computer.