Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Security & Safety. Introduction Cyberbullying Social Networking Blogging Cell Phone.

Similar presentations


Presentation on theme: "Cyber Security & Safety. Introduction Cyberbullying Social Networking Blogging Cell Phone."— Presentation transcript:

1 Cyber Security & Safety

2 Introduction Cyberbullying Social Networking Blogging Cell Phone

3 Cyberbullying What is Cyberbullying? Ways of Cyberbullying: –Flaming – Online fighting –Harassment – Repeat Messages –Impersonation – Identity Theft –Denigration – “Dissing”, Gossip, and Rumors –Stalking – Repeat Harassment and Denigration –Using Technology to Embarrass, Humiliate, Threaten, or Intimidate Someone Else

4 Ways to Prevent Cyberbullying Never Pass Along Harmful or Cruel Messages Do Not Respond Tell Parent or Adult About Any Cyberbullying Tell Friends Who Are Cyberbullying to Stop Never Give Out Any Personal Information

5 Cyberbullying Kylie Kenney – 8 th Grade Girl from Vermont 1 –Cyberbullies Built “Kill Kylie Incorporated” Website –Used Her Screen Name to Send Harassing Messages to Her Teammates 1: Source: By Suzanne Struglinski, Deseret News. Published: Friday, Aug. 18, Retrieved from 2: Source: Associated Press. Published: Saturday Aug. 18, 2009.http://www.deseretnews.com/article/1,5143, ,00.html?pg=1 Retrieved from Elizabeth A. Thrasher – 40 yr. old from Missouri 2 –Ex-husband’s New Girlfriend’s 17 yr. old Daughter –Posted Personal Information –Felony With up to 4 Years in Prison

6 Social Networking What Is Social Networking? –Putting Individuals Into Networks/Groups –Popular Online Activity –Websites Are Social Sites Facebook MySpace Twitter

7 Social Networking Do: –Talk To Your Parent Before Joining A Social Network –Always Tell Your Parents: What You Are Up To How You Met Your Friends Where You Browse Online –Set Up Privacy Setting for You Online Profile –Trust Your Gut If You Have Suspicions, Feel Threatened or Uncomfortable, Tell an Adult you Trust! Report it to the Police & Social Networking Site You Could Help Prevent Someone Becoming a Victim

8 Social Networking Don’t: –Ever Post Anything You Wouldn’t Show Your Parent or Wouldn’t Want Them to See –Post Personal Information on the Internet –Use Your Phone Number, Address, SSN, DOB, or Other Contact Information –Add Anyone to Your Page Unless You Have Met Them In Person –Arrange to Meet an Internet Friend Alone

9 Social Networking Middle School Boy Liked a Girl 1 –Used Cell Phone to Access Facebook Search –Accidentally Posted Her First & Last Name as His Status Rudy Giuliani’s Daughter 2 –No Privacy Settings –Posted Support for President Obama 1: Source: True Facebook Stories, Retrieved on 11/13/09 from: 2: Source: By Lucy Marrow Caldwell Washington Post/Slate. Posted: Monday, Aug. 6, Retrieved on 11/18/09 from

10 Blogging What is a Blog? –Personal Online Journal that is Frequently Updated and Intended for the General Public to See What is Blogging? –Adding an Entry or Entries to a Blog Problems: –Misunderstood Comments –Not Private –Shared with the World

11 Cell Phone Do: –Give Your Number to People You Know & Trust –Keep it Stored in a Safe Place –Keep Your Keypad Locked Don’t: –Reply to Messages From People You Don’t Know –Give Out Other’s Number Without Permission –Use to Cheat at School –Take Pictures or Videos of Someone Without their Permission

12 Sexting What is Sexting? –Texting Sexually Explicit or Nude Photos Can Have Damaging Consequences –Friends Can Become Ex-Friends –Blackmail –Sent to Everyone You Know & Don’t Know –Once Posted Online, Can’t Take Back –Damaged Reputation

13 Sexting 30-6A-3. Sexual exploitation of children. A. It is unlawful for a person to intentionally possess any obscene visual or print medium depicting any prohibited sexual act or simulation of such an act if that person knows or has reason to know that the obscene medium depicts any prohibited sexual act or simulation of such act and if that person knows or has reason to know that one or more of the participants in that act is a child under eighteen years of age. A person who violates the provisions of this subsection is guilty of a fourth degree felony. Points to Take Away: –In the State of New Mexico It is a Crime to –Send, Store, & Receive These Types of Pictures –Minor: One Under the Age of 18 –4 th Degree Felony Source: State of New Mexico. Sexual Exploitation of Children Act. Retrieved November 16, 2009 from

14 Group Exercise Scenario: –A group of girls were fighting with one of their friends, Nicole. They created a “Rate Nicole” group on a social networking site. They posted embarrassing photos of Nicole from middle school and high school and invited their hundreds of “friends” to join the group to look at the photos, and tell Nicole how she stacked up. Cruel and crude comments were posted on the group’s message board. One message said that some girls were planning to beat up Nicole. At school, Nicole got text messages on her cell phone saying, “Take a look at what everyone thinks of you.” What is the Problem? –Used Nicole’s Photos without Permission –Harassing Comments –Threats of Physical Violence What is a Possible Solution? –Tell a Trusted Adult or Parent –Contact Social Networking Site –Contact Police Department

15 QUESTIONS

16 References om/lessonplans.htmhttp://www.education.vic.gov.au/management/elearningsupportservices/www/classro om/lessonplans.htm _social_networking_hoaxes htmhttp://www.surfnetkids.com/safety/protecting_your_children_from_being_victims_from _social_networking_hoaxes htm


Download ppt "Cyber Security & Safety. Introduction Cyberbullying Social Networking Blogging Cell Phone."

Similar presentations


Ads by Google