Download presentation
Presentation is loading. Please wait.
Published byJemimah Hutchinson Modified over 9 years ago
1
Being Good Digital Citizens with Today’s Technologies
2
Predator Video
3
Technologies of Today… Cell phones –Texting, photos iPods, mp3 players –Videos, photos, music Computers –Social Networking –Online Gaming PlayStation, Nintendo, Xbox 360
4
Benefits of the Internet Accessible from … –Home, school, public libraries, public areas Communicate with … –Family, friends, others Information for… –Homework, entertainment, current news
5
Dangers of the Internet Accessible from… –Home, school, public libraries, public areas Communicate with… –Predators, Bullies, Strangers Information including… –Pornography, violence, drugs
6
Potential Risks Chat Rooms Computer Virus Copyright Infringement Cyber- bullying E-MailSpywareInstant Messaging ID Fraud Online Gaming Online Predator P2P File Sharing Scams Porn- ography Sexual Exploitation Social Net- working sites Popup Ads Hate Crimes Video Sharing Web Blogs Web Cam
7
Profile of a Teenager Be own person Have control over self Make own decisions Be independent from parents Be understood Wants attention Wants love
8
Exchange Video
9
Julie’s Journey
10
Cell Phones Having a cell phone is a privilege, not a right.
11
Cell Phones and Photos Video
12
Possession of Child Pornography is a FELONY in the state of Utah
13
Cell Phones & Photos Taking a nude photo is manufacturing child pornography Sending a nude photo is distributing child pornography Opening a nude photo is possessing child pornography
14
Reasons why you really don’t want to get involved with pornography a.It is addictive b.It interferes with relationships c.It is difficult to cure d.It leads to undesirable consequences
15
Cell Phone Policy What: Teenagers taking risqué photos of themselves are prosecuted for violating child pornography laws. When: Florida state appeals court rules on January 19. Outcome: A 2-1 majority upholds conviction on grounds the girl produced a photograph featuring the sexual conduct of a child.
16
Cell Phones and Photos Victim and perpetrator –often the same person Can lead to cyber bullying Think before you post
17
Bulletin Board Video
18
Cyber bullying What is it? Use of technology to spread rumors, gossip, harass, threaten, or embarrass. Victim may become bully. May become criminal.
19
Cyber-bullying Video - Netsafe
20
Cyber bulling What to do: –Do Not Respond –Save the evidence –Report it to a trusted adult
21
Cyber bullying What else can you do? –Take 5 Put down the cell phone or mouse, step away and no one will get hurt. –Stand up for others. Don’t stand silently by while others are bullied.
22
Bullying Policy
23
Cyber-bullying – Passwords Broken Friendship Video
24
Cyber bullying Characteristics of a bully: 60% more likely to be charged with a crime Is usually a spouse and child abuser have trouble making friends have more trouble with school work Increased risk of having depression –Choose not to be one –Influence others not to be one
25
Cyber bullying – Example 1 Words Hurt
26
Cyber bulling Be careful what you text or email. Words hurt.
27
Cyber bullying – Example 2 Never Safe
28
Teens like Social Networking Sites because they offer… Interactivity Network with friends Personal profile Express own opinions Photos, music & videos
29
Social Network Safety Use Caution Know what you have posted Don’t trust a message is really from who it says. Do not allow access to you address book. Type or link directly to your social network. Be selective about friends.
30
Social Network Safety Choose your social network carefully. Assume everything is permanent. Be careful about installing extras. Think twice before using at work.
31
Social Networking Site Case Example Provided by Sgt. Frank Kardasz MySpace Profile: “Danny”
32
Here’s Danny's profile…he likes poetry, plants, flowers and watching movies by the fire.
33
Danny loves his country and is here for dating, serious relationships, friends and networking. So far he has 14 friends listed
34
Danny has posted some pics of his tattoo's. Says here that he is looking for a girlfriend!
35
How about www.azsexoffender.org? Arizona’s government-operated sex offender registration web site. Where Else can we find DANNY???
36
Hey! There’s Danny. Surprise! His myspace page never mentioned that he is a level 3, high-risk sex offender.
37
ID Fraud & Scams Phishing = Fishing Sends an e-mail purporting to be from a valid financial or eCommerce provider.
42
Being a Good Digital Citizen The golden rule –Treat others as you would have them treat you. Technology is not the problem –It is about learning the life skills of getting along with others. –Taking responsibility for our actions.
43
Comments - Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.