Download presentation
Presentation is loading. Please wait.
Published byNorman McDowell Modified over 9 years ago
1
Media Center Essential Question How can I be an effective user of information?
2
Social Networking Socialize with friends Talk to people with similar interests Keep up with old/long distance friends & family Share photos Champion a cause Market a talent Organize events
3
Social Networking Safety Issues Cyber Security Cyber Bullying Cyber Bullying Sharing Too Much Sharing Too Much
4
Cyber Security Scams Identity Theft Viruses Trojans Spyware Install Firewall/Virus Protection Don’t Open Emails from Strangers Don’t Download from Non- Trusted Cites Don’t Enter Contests from Unknown Sources Guard Your Passwords Always Log Out on Public Computers/Devices
5
Cyber Bullying Use of Technology to Tease, Humiliate, or Harass Serious Problem Results can be Devastating Avoid Gossip Block the Sender Don’t be a Bystander – Report Bullying
6
Sharing Too Much Inappropriate Photos (Sexting) - Illegal Inappropriate Photos (Sexting) - Illegal Inappropriate Personal Information Inappropriate Personal Information Accessible by Future Colleges/Employers Accessible by Future Colleges/Employers Vulnerable to Sexual Predators/Blackmail Vulnerable to Sexual Predators/Blackmail Snapchat Problems Snapchat Problems Clean Profile Clean Profile Don’t Post or Send Inappropriate Photos Don’t Post or Send Inappropriate Photos Use Privacy Settings Use Privacy Settings Don’t Accept Just Anyone as Friends Don’t Accept Just Anyone as Friends Report Predators/Blackmail Report Predators/Blackmail
7
Task Definition Watch video clips on Cyber Security, Cyber Bullying, and Sharing too Much, then respond via a Blog on each issue. Synthesis Blog Postings: Post one comment to each Blog entry and respond to one other posting. Evaluation Teacher Rubric/Scale Teacher Rubric/Scale
8
Strategies, Location & Use of Information On the Tracking Teresa video clip, Teresa has tried not to reveal personal information online, but she has left enough clues that could put her in danger. List one or two pieces of personal information that was found on Teresa and describe how this could possibly put her in danger. Source: National Center for Missing and Exploited Children Netsmartz Workshop http://www.netsmartz.org http://www.youtube.com/watch?v=aMJ4u3zfmoo
9
Strategies, Location & Use of Information On the Broken Friendship video clip, a teen gives her password to a friend at school resulting in cyber bullying from classmates and the loss of her friend. Discuss other possible situations that could happen related to cyber bullying and actions you could take to avoid them. Source: National Center for Missing and Exploited Children Netsmartz Workshop http://www.netsmartz.org http://www.netsmartz.org/RealLifeStories/BrokenFriendship
10
Strategies, Location & Use of Information On the Your Photo Fate Video Clip, a young girl shares an inappropriate photo with another resulting in an out of control situation. Discuss other possible scenarios that might occur from sharing too much that could also get out of control. Source: National Center for Missing and Exploited Children Netsmartz Workshop http://www.netsmartz.org http://www.netsmartz.org/RealLifeStories/YourPhotoFate
11
Strategies, Location & Use of Information Blog on School Website School Website/Staff/Vincent, David/Internet Safety Blog https://www.buncombe.k12.nc.us//Domain/3826 Post a Response to each Blog Cyber Security – Tracking Teresa Cyber Bullying – Broken Friendships Sharing Too Much – Your Photo Fate Respond to one Other Students Posting Total Postings (4) To Receive Credit: Post by Assigned Alias
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.