Presentation is loading. Please wait.

Presentation is loading. Please wait.

Today you will be learning about personal safety when online. This unit consists of four mini lessons. The slide show covers all lessons in the unit:

Similar presentations


Presentation on theme: "Today you will be learning about personal safety when online. This unit consists of four mini lessons. The slide show covers all lessons in the unit:"— Presentation transcript:

1

2 Today you will be learning about personal safety when online. This unit consists of four mini lessons. The slide show covers all lessons in the unit: The Plan Safeguarding your Identity While Online Protecting Personal Information Online Predators and the Grooming Process Online Personal Safety Review and Action

3 Lesson 1 Safeguarding your Identity While Online

4 Cyberspace What is Cyberspace, and how do we get there? What are some of the ways we communicate in Cyberspace?

5 Teacher’s choice: Otherwise – let’s continue on… For a classroom with computers, return to the lesson folder and select the HTML Activity for this lesson. Students should work in groups. When the activity is completed – Go to the Group Activity slide (slide 13)

6 Start with the Screen Name Activity Follow along on your resource and activity pages. Read through the information and complete the activities as we go along.

7 Online ID – What can you tell? Directions: Look at the screen names below. As a class, brainstorm what each says about the person who chose it. Then put the names in order from least informative to most informative. 1.Jessica4dance 2.Smithstealshome 3.Bayareababe 4.dancinfun 5.Fred14

8 Discussion Think about your own screen name. What does it say about you? When you choose a screen name you want something that allows you to remain anonymous, or unknown. Don’t include personal information. Why do you think you shouldn’t include personal information? What are some of the dangers?

9 Screen Names Screen names should never contain or refer to: –first and/or last name –address –phone number –date of birth (complete or partial) or age –Social Security number – address –combinations of personal information such as listed above –combinations of personal information (above) plus descriptions of such information as, but not limited to gender, school name, favorite sport, favorite celebrity, family member names marcy14inSanFran tiger1234

10 Password Protection Directions: Look at the information about each person below. What are some common and obvious guesses as to what their passwords might be? Brainstorm a list for each one. 1.John – John lives in the Tampa Bay area where the Bucs play. He is a really big fan. He loves football. 2. Jessica – Jessica loves all the popular music groups. She is head over heels in love with Justin Timberlake. 3. Ali – Ali is afraid to forget her password. She wanted something simple she could always remember.

11 Discussion Think about your own password. - Is it something obvious? - Could someone easily guess it? - Does anyone else know it? When someone knows or can guess your password you could be in trouble. This allows them access to you. They could pretend to be you. What types of dangers are involved when others know or can guess your password?

12 Passwords Follow these rules for creating safe passwords: be lengthy – at least 8 characters contain a combination of letters, numbers, and symbols changed when its secrecy is in doubt –should not contain personal information –should not be shared –should not be easily guessed –should not be provided in an , even if requested

13 Group Activity In small groups – brainstorm some screen names and passwords that are not obvious and don’t reveal personal information. Be careful – don’t tell anyone your current password. If you currently have a screen name – discuss it. See if your classmates think it says too much about you.

14 Remember It is important to select safe and secure screen names and passwords. Think about it: What should you NEVER reveal in either? Think about it: What is your screen name and password? Do you think you need to change it? Why/Why not?

15 Lesson 2 Protecting Personal Information

16 Let’s go over some basic Internet Safety Tips

17 Internet Safety Tips 1.Think carefully before giving out personal information such as your name, home address, school name, or telephone number in a chat room or on social networking sites (IMs and blogs too!). 2.Never write to someone who has made you feel uncomfortable or scared, even if you or your parents know who they are.

18 Internet Safety Tips 3.Do not meet someone or have them visit you without the permission of your parents. 4.Tell your parents right away if you read anything on the Internet that makes you feel uncomfortable. 5.Remember that people online may not be who they say they are.

19 Remember that people online may not be who they say they are.

20 Brainstorm  Why do students feel safe on the Internet?  What are some dangers on the Internet?  What are some good things on the Internet?  How can you stay away from the dangerous things?

21 One way to stay safe, is to avoid revealing any information about oneself online Never tell anyone: Your name Address Phone number Age Gender Family names School Never give a stranger your picture These are all considered to be identifying or personal information.

22 I hope you learned something – I know I did! OK – let’s get into groups. Your teacher will divide you up for the next activity.

23 Everyone in Groups? Good! Each group should have received a cause and effect sheet. Here’s how to get started  Brainstorm how each effect could have been avoided.  Brainstorm other possible effects of the person’s actions.  Present your information to the class.

24 So Get Started! Do your best on these cause and effect charts! Once you are finished, your group will present your chart to the rest of the class and discuss what you have learned.

25 Let’s Review! Remember: It is important that any time you are asked to post personal information online you need to ask permission from a parent or supervising adult. This includes entering Web sites, filling out profiles, forms, etc.

26 Lesson 3 identifying Online Predators

27 Learning Goals YOU WILL: Understand the need for being safe in the cyber community - just like your physical community. Be able to list safety rules/advice of behavior towards strangers in the physical community that also apply to behavior towards strangers in Cyberspace. Understand the importance of refusing inappropriate online relationships. Know how to interact online appropriately and safely.

28 Do You Go Online? Discuss: Do you go online alone? What do you do online? How do you know how old someone is that you meet online?

29 Group Activity Your teacher will provide you with activity instructions.

30 Discuss: What rules do you follow in the physical world for meeting or communicating with strangers? Do these rules also apply to the cyber community? REMEMBER: Anyone you meet and know only online is a stranger to you, no matter how well you think you know them. Rules for Communication

31 Online Socializing To socialize online means to interact with others using Internet technologies. Name some ways people socialize online. Name your favorite ways to socialize online. List some good rules to help us (even adults) stay safe when socializing online.

32 Online Realities Sometimes people lie about who they are when socializing online. This could be because they want to bully or steal identities. It also could be that they are just exploring and experimenting. Most online relationships are safe, but sometimes adults lie online in order to meet and form friendships with youth. They are called predators.

33 The Grooming Process Have you heard of the grooming process? This term is used to mean the methods a predator uses to befriend youth online.

34 Online Relationships Most online relationships are safe and do not involve a predator! How can you identify someone who might be an online predator?

35 Online Grooming Studies have shown that an online predator will: encourage sexually explicit talk do or say anything to show they care want to meet

36 Online Relationships Remember: Most online relationships are safe. However, the way one interacts online can increase the chances of meeting a predator. And no one can predict the harm that a predator could cause.

37 Minimizing Danger There are things you can do to minimize the danger and the chances of becoming the victim of an online predator, including the following: Choose a safe screen name. Use caution when choosing whom to communicate with. Avoid revealing too much personal information. No matter what, it is important to tell an adult if: You feel uncomfortable online for any reason. You are approached by someone who discusses inappropriate things. You are approached by someone who wants to meet you offline.

38 Minimizing Danger Think about what UR Talking About. A predator looks for youth who willingly talk about sex online. It’s not appropriate! And it’s NOT SAFE!

39 Review Think Safety First Use an appropriate screen name. Don’t engage in talk about sex online. Don’t agree to meet an online stranger. Avoid secret online friendships. Find an offline friend if you’re feeling down.

40 Review It is important to stop the communication and tell an adult if: You feel uncomfortable online for any reason. You are approached by someone who discusses inappropriate things. You are approached by someone who wants to meet you offline. Who can U Tell? Tell your parent, guardian, or another trusted adult. Tell a teacher or another adult at school. Bottom line - Tell someone!

41 Lesson 4 Online Personal Safety Review and Action

42 Create a Presentation Procedure: As a class, run through the 5 slide presentation (which begins after the directions). The 5 slide presentation will be shown TWICE. Use the first time to become familiar with the slides and the information.

43 Directions These slides are to educate your parents or others during a parent meeting or parent night on the topic of Internet safety. What information do your parents need to know to protect both themselves and their children? Use what you have learned to tell others how to stay safe online.

44 Personal Safety Online There are many dangers youth face while online, such as: Predators – strangers who may cause harm Cyber bullies Inappropriate Web sites and material And some that parents also face, such as: Identity theft Monetary theft

45 Predators Those who use Cyberspace to hunt for victims to take advantage of them. The Facts: There are predators online. They use tools like social media, instant messaging, etc. to get close to kids. Sometimes a victim is a willing participant and chooses to talk to a stranger.

46 Cyber Bullying Sending or posting harmful or cruel text or images using the Internet or other digital media source. The Facts: The Internet is a tool used to bully. People feel removed from what they say online. They feel anonymous. Unexpected participants: Anyone can join in. 1 in 5 youth will be faced with a hurtful or mean message while online.

47 Identity Theft The Facts: Posting personal information online makes it available for others to steal. With your personal information, someone can pretend to be you, use your credit card or bank account to buy things that you don’t know about. Personal information can also be stolen from you if you respond to s from strangers.

48 A Little Prevention… Prepare yourself. Many online problems can be avoided or dealt with safely. Keep in mind the 4 Rs RECOGNIZE REFUSE RESPOND REPORT

49 A Second Take… Now you are going to look at the slides again and write a “script” to coordinate with them. Think about what you need to say with each slide and what your parents need to know. Pick a person to write out the script. Practice the presentation so it flows smoothly for parent/adult presentation.

50 Personal Safety Online There are many dangers youth face while online, such as: Predators – strangers who may cause harm Cyber bullies Inappropriate Web sites and material And some that parents also face, such as: Identity theft Monetary theft

51 Predators Those who use Cyberspace to hunt for victims to take advantage of them. The Facts: There are predators online They use tools like social media, Instant messaging, etc. to get close to kids. Sometimes a victim is a willing participant and chooses to talk to a stranger.

52 Cyber Bullying Sending or posting harmful or cruel text or images using the Internet or other digital media source. The Facts: The Internet is a tool used to bully. People feel removed from what they say online. They feel anonymous. Unexpected participants: Anyone can join in. 1 in 5 youth will be faced with a hurtful or mean message while online.

53 Identity Theft The Facts: Posting personal information online makes it available for others to steal. With your personal information, someone can pretend to be you, use your credit card or bank account to buy things that you don’t know about. Personal information can also be stolen from you if you respond to s from strangers.

54 A Little Prevention… Prepare yourself. Many online problems can be avoided or dealt with safely. Keep in mind the 4 Rs RECOGNIZE REFUSE RESPOND REPORT

55 Now Use It! Keeping others informed on Internet safety is important. Now use the presentation you just helped create to reach others in your school, faculty, family, and in your community.

56 That’s a wrap! You now know the tips and tools that can help keep you safe online! Just remember, when you’re online you aren’t invincible.


Download ppt "Today you will be learning about personal safety when online. This unit consists of four mini lessons. The slide show covers all lessons in the unit:"

Similar presentations


Ads by Google