SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Internet Safety and
   Cyberbullying
Mrs. Trudden
Mrs. Clifford
Website and Ad Safety
     Work on the assigned website
     only....don’t navigate away.
     Never click on advertisements....they are
     there to distract you.




 http://www.funbrain.com/brain/SweepsBrain/Password.html?GameName=DesertDive&Brain=kidsandparents&Grade=0&GameNumber=1
Downloading and
        File-Sharing
Download and share media
safely and from approved
websites
It is illegal to share copyrighted
materials without permission
You could unknowingly
download or distribute viruses
and illicit material.
                                     www.nonstopmac.com/ipod/
Email, IM, MySpace and
         Facebook
 Protect yourself by:
  Communicating with
people you know in person
  Keeping your personal
information private
  Not meeting offline
  Not responding to
offensive or any unknown
messages                    http://www.flickr.com/photos/luc/1824234195/
Cell Phones
   Never post your cell
phone number online
  Never send photos or
videos of yourself         http://www.flickr.com/photos/silly_a1804/2279068004/




  Don’t respond to harassing text
  Having a cell phone is a privilege,
not a right.
Make Safe Online Choices
You control your behavior and
reputation as well as how much
personal information is revealed.

Be a good friend and sibling and
encourage others to be safer online.

Talk to a trusted adult if
anything makes you feel
scared or uncomfortable.

          http://www.safeinyourspace.org/images/photokidscomputers.jpg
PRES Students are Technology PALS!

• P - Protection (about your identity and reputation)

• A - Appropriate (about inappropriate sites)

• L - Legal (about plagiarism, copying software/
  music)

• S - Safe & Responsible (about
  handling computers, software,
  equipment, backing up)



                                  http://www.flickr.com/photos/21976935@N03/2774496663
What is Bullying?
          P.I.C. Criteria

  P...purposeful
behavior
  I...imbalance of
power
  C...continual             http://www.citymasala.com/November2008/Bullying.gif
Cyberbullying




    http://www.uberreview.com/wp-content/uploads/cyberbully.jpg
What is Cyberbullying?
Spreading rumors and/or
gossip
Posting pictures without
consent
Stealing passwords to
assume someone’s
identity.
                        http://img.timeinc.net/TFK/media/news/2005a/050314_cyberbullies_special.jpg
Harrassing or
threatening with mean
or bad language

Most cases of
cyberbullying are
committed by someone
that you know
Warning Signs of
      Cyberbullying
• If someone tries to

  • isolate you from family and friends

  • turn you against your parents or guardians

  • tell you to keep secrets

  • sent inappropriate materials or talk about things
    that make you feel uncomfortable

  • threaten you
          Tell an adult you trust!
These warning signs apply online and offline!
What Not to Do!
•Don’t give your personal information to anyone....like
name, age, birthday, address, school, schedule
•Don’t post photos and videos of yourself or anyone
without permission
•NEVER give out your usernames and passwords to
anyone!




                  http://www.whostolemyidentity.com/uploads/Image/identity-theft.jpg
What to do!
•If you are ever cyberbullied:
 •Tell a trusted adult
 •Do not respond
 •Save the evidence
If anyone threatens you or you feel that
you are in immediate danger, talk to an
adult you trust and they will contact your
     local law-enforcement agency.
The Internet is
private.....right???
If it is on the internet, it
is NOT PRIVATE!
Real-Life Consequences
• Profiles and blogs are not only viewed
  by your friends, but also by:
 • Parents and Relatives
 • Teachers and Principals
 • Colleges and Universities
 • Employers
 • ONLINE PREDATORS
                               http://www.flickr.com/photos/32114411@N04/3021610899/

Más contenido relacionado

La actualidad más candente

Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parentssirchriss
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 

La actualidad más candente (17)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Social Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartzSocial Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartz
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 

Destacado

Safety And Ethics on the Internet
Safety And Ethics on the InternetSafety And Ethics on the Internet
Safety And Ethics on the InternetCompApps
 
Building Web Applications
Building Web ApplicationsBuilding Web Applications
Building Web ApplicationsRichard Tiu
 
Econsultancy Social Media Monetisation Case Study 1212418744419594 8
Econsultancy Social Media Monetisation Case Study 1212418744419594 8Econsultancy Social Media Monetisation Case Study 1212418744419594 8
Econsultancy Social Media Monetisation Case Study 1212418744419594 8Gary W. Druckenmiller, Jr.
 
Difficulties in Life ?
Difficulties in Life ?Difficulties in Life ?
Difficulties in Life ?Aftab Ahmed
 
Discografìa Fabulosos Cadillacs
Discografìa Fabulosos CadillacsDiscografìa Fabulosos Cadillacs
Discografìa Fabulosos CadillacsMACEDI
 
Pres Internet Safety Presentation
Pres Internet Safety PresentationPres Internet Safety Presentation
Pres Internet Safety Presentationtruddentechnology
 
Por Qué N..
Por Qué N..Por Qué N..
Por Qué N..xion
 
Bicycling in Brazil - Towards Carfree Cities 2008
Bicycling in Brazil - Towards Carfree Cities 2008Bicycling in Brazil - Towards Carfree Cities 2008
Bicycling in Brazil - Towards Carfree Cities 2008guestf48b83
 
Pres Internet Safety Presentation
Pres Internet Safety PresentationPres Internet Safety Presentation
Pres Internet Safety Presentationtruddentechnology
 
Whats Next In Marketing Advertising 1206247156803190 3
Whats Next In Marketing Advertising 1206247156803190 3Whats Next In Marketing Advertising 1206247156803190 3
Whats Next In Marketing Advertising 1206247156803190 3Gary W. Druckenmiller, Jr.
 
Small Team, Big Demands? - Use The Batteries Included
Small Team, Big Demands? - Use The Batteries IncludedSmall Team, Big Demands? - Use The Batteries Included
Small Team, Big Demands? - Use The Batteries Includedjrasinma
 
Gt Orientation Project Sept. 2008 2
Gt Orientation Project Sept. 2008 2Gt Orientation Project Sept. 2008 2
Gt Orientation Project Sept. 2008 2truddentechnology
 
Digital Road for Kids
Digital Road for KidsDigital Road for Kids
Digital Road for Kidssookyung kong
 

Destacado (20)

Safety And Ethics on the Internet
Safety And Ethics on the InternetSafety And Ethics on the Internet
Safety And Ethics on the Internet
 
Building Web Applications
Building Web ApplicationsBuilding Web Applications
Building Web Applications
 
Econsultancy Social Media Monetisation Case Study 1212418744419594 8
Econsultancy Social Media Monetisation Case Study 1212418744419594 8Econsultancy Social Media Monetisation Case Study 1212418744419594 8
Econsultancy Social Media Monetisation Case Study 1212418744419594 8
 
Difficulties in Life ?
Difficulties in Life ?Difficulties in Life ?
Difficulties in Life ?
 
Discografìa Fabulosos Cadillacs
Discografìa Fabulosos CadillacsDiscografìa Fabulosos Cadillacs
Discografìa Fabulosos Cadillacs
 
Pres Internet Safety Presentation
Pres Internet Safety PresentationPres Internet Safety Presentation
Pres Internet Safety Presentation
 
Customer Engagement White Paper
Customer Engagement White PaperCustomer Engagement White Paper
Customer Engagement White Paper
 
Por Qué N..
Por Qué N..Por Qué N..
Por Qué N..
 
Magic of words
Magic of wordsMagic of words
Magic of words
 
Bicycling in Brazil - Towards Carfree Cities 2008
Bicycling in Brazil - Towards Carfree Cities 2008Bicycling in Brazil - Towards Carfree Cities 2008
Bicycling in Brazil - Towards Carfree Cities 2008
 
Pres Internet Safety Presentation
Pres Internet Safety PresentationPres Internet Safety Presentation
Pres Internet Safety Presentation
 
Whats Next In Marketing Advertising 1206247156803190 3
Whats Next In Marketing Advertising 1206247156803190 3Whats Next In Marketing Advertising 1206247156803190 3
Whats Next In Marketing Advertising 1206247156803190 3
 
Tuki
TukiTuki
Tuki
 
Next Generation Social Marketing 23120[1]
Next Generation Social Marketing 23120[1]Next Generation Social Marketing 23120[1]
Next Generation Social Marketing 23120[1]
 
Small Team, Big Demands? - Use The Batteries Included
Small Team, Big Demands? - Use The Batteries IncludedSmall Team, Big Demands? - Use The Batteries Included
Small Team, Big Demands? - Use The Batteries Included
 
Hiwi The Kiwi
Hiwi The KiwiHiwi The Kiwi
Hiwi The Kiwi
 
Gt Orientation Project Sept. 2008 2
Gt Orientation Project Sept. 2008 2Gt Orientation Project Sept. 2008 2
Gt Orientation Project Sept. 2008 2
 
The Future Of Social Networks
The Future Of Social Networks The Future Of Social Networks
The Future Of Social Networks
 
Web 20 5316 25603
Web 20 5316 25603Web 20 5316 25603
Web 20 5316 25603
 
Digital Road for Kids
Digital Road for KidsDigital Road for Kids
Digital Road for Kids
 

Similar a Pres Internet Safety Presentation

Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyDi Doersch
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipKaylon McGee
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints PresentationProjectsByJen.com
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipnhokanson
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 

Similar a Pres Internet Safety Presentation (20)

Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Ciejkalab4b
Ciejkalab4bCiejkalab4b
Ciejkalab4b
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and Technology
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Internet safety
Internet safetyInternet safety
Internet safety
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Último

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Pres Internet Safety Presentation

  • 1. Internet Safety and Cyberbullying Mrs. Trudden Mrs. Clifford
  • 2. Website and Ad Safety Work on the assigned website only....don’t navigate away. Never click on advertisements....they are there to distract you. http://www.funbrain.com/brain/SweepsBrain/Password.html?GameName=DesertDive&Brain=kidsandparents&Grade=0&GameNumber=1
  • 3. Downloading and File-Sharing Download and share media safely and from approved websites It is illegal to share copyrighted materials without permission You could unknowingly download or distribute viruses and illicit material. www.nonstopmac.com/ipod/
  • 4. Email, IM, MySpace and Facebook Protect yourself by: Communicating with people you know in person Keeping your personal information private Not meeting offline Not responding to offensive or any unknown messages http://www.flickr.com/photos/luc/1824234195/
  • 5. Cell Phones Never post your cell phone number online Never send photos or videos of yourself http://www.flickr.com/photos/silly_a1804/2279068004/ Don’t respond to harassing text Having a cell phone is a privilege, not a right.
  • 6. Make Safe Online Choices You control your behavior and reputation as well as how much personal information is revealed. Be a good friend and sibling and encourage others to be safer online. Talk to a trusted adult if anything makes you feel scared or uncomfortable. http://www.safeinyourspace.org/images/photokidscomputers.jpg
  • 7. PRES Students are Technology PALS! • P - Protection (about your identity and reputation) • A - Appropriate (about inappropriate sites) • L - Legal (about plagiarism, copying software/ music) • S - Safe & Responsible (about handling computers, software, equipment, backing up) http://www.flickr.com/photos/21976935@N03/2774496663
  • 8. What is Bullying? P.I.C. Criteria P...purposeful behavior I...imbalance of power C...continual http://www.citymasala.com/November2008/Bullying.gif
  • 9. Cyberbullying http://www.uberreview.com/wp-content/uploads/cyberbully.jpg
  • 10. What is Cyberbullying? Spreading rumors and/or gossip Posting pictures without consent Stealing passwords to assume someone’s identity. http://img.timeinc.net/TFK/media/news/2005a/050314_cyberbullies_special.jpg
  • 11. Harrassing or threatening with mean or bad language Most cases of cyberbullying are committed by someone that you know
  • 12. Warning Signs of Cyberbullying • If someone tries to • isolate you from family and friends • turn you against your parents or guardians • tell you to keep secrets • sent inappropriate materials or talk about things that make you feel uncomfortable • threaten you Tell an adult you trust! These warning signs apply online and offline!
  • 13. What Not to Do! •Don’t give your personal information to anyone....like name, age, birthday, address, school, schedule •Don’t post photos and videos of yourself or anyone without permission •NEVER give out your usernames and passwords to anyone! http://www.whostolemyidentity.com/uploads/Image/identity-theft.jpg
  • 14. What to do! •If you are ever cyberbullied: •Tell a trusted adult •Do not respond •Save the evidence If anyone threatens you or you feel that you are in immediate danger, talk to an adult you trust and they will contact your local law-enforcement agency.
  • 15. The Internet is private.....right??? If it is on the internet, it is NOT PRIVATE!
  • 16. Real-Life Consequences • Profiles and blogs are not only viewed by your friends, but also by: • Parents and Relatives • Teachers and Principals • Colleges and Universities • Employers • ONLINE PREDATORS http://www.flickr.com/photos/32114411@N04/3021610899/