Download presentation
Presentation is loading. Please wait.
Published byDoris Ella Hutchinson Modified over 8 years ago
1
Internet Safety
2
Technology Trends
3
Online applications Digital textbooks ePortfolios Yearbooks Cell phones in the classroom
4
Advantages of Being Connected Find out about companies you are interested in. Show off your “good side.” Reconnect with people from your past. Get involved with charitable organizations. Keep track of social, academic, and professional events. College View
5
Social Networking
6
Lists as the top social networking site. Minimum age to join Facebook is 13.
7
800 million users Worth 11 billion dollars Who’s joining Facebook? Privacy settings a continued concern.
8
“We cannot guarantee that only authorized persons will view your information.” “We cannot ensure that information you share on Facebook will not become publicly available.” From Facebook’s Privacy Policy
9
Online magazine, Focus, lists Facebook in the Top 10 Big Brother Companies. Facebook ranked 2 nd on the list of Worst Consumer Privacy Infringers.
10
Risky Behaviors Putting too much personal information online. Accepting anyone and everyone as “friends.” Agreeing to meet with someone that you first met online.
11
Shadow Resumés
12
Instant background check Colleges and universities Prospective employers Grandma Rule
16
Cyberbullying
17
Definition: When the Internet is used to intentionally and repeatedly hurt, embarrass, or humiliate another person.
18
Forms of Cyberbullying Creating fake profiles Harassing, threatening, using offensive language Spreading rumors, gossip about another person Online polls, surveys
19
Tips for Handling Cyberbullying Don’t respond or retaliate. Save evidence such as emails, text messages, pictures, etc. from the cyberbully. Report it!
20
Sexting
21
Photos posted on the Internet are there to stay.
22
Once photos are posted on the Internet, you have no control over where they go or who sees them.
23
Sextortion on the Rise Those who are sexting are being contacted by pornographers who threaten to expose their behavior to family and friends unless they pose for more explicit porn. Associated Press – Charles Wilson – August 14, 2010
24
Current Laws Related To Cyberbullying and Sexting
25
Identity Theft
26
Definition: Any instance where a person uses someone else’s identification documents or other identifiers in order to impersonate that person. Georgia Cybersafety Initiative
27
Phishing Definition: Theft of sensitive personal information. (credit card numbers, bank account information, SSN, passwords, etc.) UPDATE VALIDATE CONFIRM Federal Trade Commission
28
Steps to Avoid Getting Phished: 1.Don’t reply to email or pop-up messages that ask for personal or financial information. 2.Don’t email personal or financial information. 3.Review credit card and bank account statements as soon as you receive them. 4.Be cautious about opening attachments or downloading files from emails you receive. 5.Never provide passwords over the phone or in response to an unsolicited Internet request. Federal Trade Commission, Federal Deposit Insurance Corporation
29
Consider Password Strength many require a minimum PW length, such as 8 characters use both upper and lower-case letters (case sensitivity) include one or more numerical digits include special characters such as @, #, etc. make PWs completely random, but easy for you to remember Do: Do Not: don’t use personal information don’t use PWs that match the format of calendar dates, telephone numbers, or other common numbers don’t use the same PW for more than one account
30
If your identity is stolen: Start a log. Contact the credit bureaus. Review credit reports. Call the police. Fill out an identity theft affidavit from the FTC. Close any accounts that have been accessed fraudulently. NOLO
31
Too Much Time With Technology? University of Maryland Research Study: “24 Hours: Unplugged” Students asked to give up all media for one day Students reported feeling anxious, miserable, jittery, antsy. Many indicated that they were “addicted” to media. They mostly missed text messaging, instant messaging, email, phone calls, and Facebook – over MP3 players and TV.
32
Tips for Staying Safe Research before you register. Discriminate. Think before typing. Require “ID.” Trust your gut. College View
33
The Top Ten Internet/Email Scams 1. The Nigerian Scam (also known as 419) 2. Pay Pal 3. Working from Home 4. “Free” Trial 5. Fake Auctions/Sales
34
The Top Ten Internet Scams (continued) 6. Travel and Vacation Scams 7. Rogue Software 8. Online Dating 9. Disaster Relief 10. Lottery
35
Questions, Comments
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.