Presentation is loading. Please wait.

Presentation is loading. Please wait.

Guidelines for Internet Safety Chad Olivard ITC 525 Kutztown University Summer 2011.

Similar presentations


Presentation on theme: "Guidelines for Internet Safety Chad Olivard ITC 525 Kutztown University Summer 2011."— Presentation transcript:

1 Guidelines for Internet Safety Chad Olivard ITC 525 Kutztown University Summer 2011

2 Think you’re always safe online? Think again.

3 Table of Contents Sexual Predators Protecting Personal InformationProtecting Personal Information Cyberbullying Fun and Games Academic Standards Credits

4 Sexual Predators Click the picture below and watch the video of FBI Executive Assistant Director Shawn Henry discussing the issue of online sexual predators.

5 Agent Henry advised you to “wake up!” Let’s see if you have. According to the FBI, 750,000 child predators are online at any given time. TrueFalse

6 Correct Answer!

7 Incorrect answer. Come on now. This is important.

8 Here’s another one for you. Some sexual predators have used malware to remotely turn on their victims’ webcam and microphone in their rooms and secretly record them in intimate situations. True False

9 Correct Answer!

10 Incorrect answer. Come on now. This is important.

11 One last question from Agent Henry. The child’s bedroom is a safe place for a computer. True False

12 Correct Answer!

13 Incorrect answer. Come on now. This is important.

14 Protecting Personal Information OnGuardOnline.gov provides practical tips from the federal government and the technology industry to help you be on guard against internet fraud, secure your computer, and protect your personal information. Click on the icon below to watch their informative video called The Protection Connection.

15 So let’s see what you learned. It’s perfectly safe to befriend people online who you don’t actually know in “real life.” True False

16 Correct Answer!

17 Incorrect answer. Come on now. This is important.

18 Here’s another one. By turning on privacy settings and learning about “location based services” you can keep strangers from learning too much about you. TrueFalse Click here to learn more about “location based services.”

19 Correct Answer!

20 Incorrect answer. Come on now. This is important.

21 So what about what you click on? It’s pretty safe to click on whatever you want because your computer security programs will catch it guaranteed. TrueFalse

22 Correct Answer!

23 Incorrect answer. Come on now. This is important.

24 Cyberbullying Click on the adjacent website issued by the Office of the Pennsylvania Attorney General that covers cyberbullying. Then answer the questions that follow.

25 Cyberbullying can include: Sending cruel, vicious or threatening e-mails; Creating Web sites that have stories, pictures, and jokes ridiculing others; Posting pictures of other students/kids online with mean phrases or questions attached to them; Using someone else’s e-mail to send mean e- mails to others; and Using instant messaging tools to harass others

26 Be sure to protect yourself from cyber bullying by: Being careful about to whom you give your e- mail address and phone numbers. Never give your e-mail passwords to anyone, not even a close friend. Walk away from the computer if harassment starts, don’t begin a war of words over the computer. Keep in mind that online conversations can be reproduced and spread very easily. Virtually nothing online is private.

27 Fun and Games Click on any of the adjacent links for some fun games that deal with internet safety. http://www.onguardonline.gov/ http://www.attorneygeneral.gov/ki d_site/games/quiz_maker/hs/q uizmaker_hs_ss.swf http://www.attorneygeneral.gov/ki d_site/games/crossword_puzzl e/crossword_hs_ss.swf

28 Standards Addressed Pennsylvania Department of Education Standards Reading, Writing, Speaking, and Listening 1.9.11. Grade 11 English Use media and technology resources for research, information analysis, problem solving, and decision making in content learning. International Society for Technology in Education 3. Research and Information Fluency Students apply digital tools to gather, evaluate, and use information. Students: 3.b. locate, organize, analyze, evaluate, synthesize, and ethically use information from a variety of sources and media 3.c. evaluate and select information sources and digital tools based on the appropriateness to specific tasks 5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior. Students: 5.a. advocate and practice safe, legal, and responsible use of information and technology. 5.c. demonstrate personal responsibility for lifelong learning. 5.d. exhibit leadership for digital citizenship.

29 Credits Resources: http://www.onguardonline.gov http://www.fbi.gov/news/blogs/henry http://www.attorneygeneral.gov/kid_site/high_school/ http://en.wikipedia.org/wiki/Location-based_service http://www.iste.org/standards/nets-for-students/nets-student-standards-2007.aspx Pictures: aiu.edu hightech-edge.com theforumsite.com metrolic.com


Download ppt "Guidelines for Internet Safety Chad Olivard ITC 525 Kutztown University Summer 2011."

Similar presentations


Ads by Google