We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJody Powers
Modified about 1 year ago
Copyright © 2012 Knowledge Point digital world architecture of evolution Resources: http://www.physorg.com/news74186484.htmlhttp://www.physorg.com/news74186484.html
Copyright © 2012 Knowledge Point Identifying Misuse of Technology Using Social Networking Sites for the Wrong Reasons. Writing Blogs to Spread Hatred. Spreading Hoaxes via Text Messages and Emails
Copyright © 2012 Knowledge Point Using Social Networking Sites for the Wrong Reasons Case Study: Dubai Court Gets First Facebook Libel Case Dubai – The first trial involving the abuse of Facebook for unlawful acts took place after a business partner admitted to uploading several pictures of his employee and posting a libellous comment under each of them. According to the defendant, he had a partnership with his employee’s brother in a restaurant and had found the said employee stealing money from the cashier.
Copyright © 2012 Knowledge Point Writing Blogs to Spread Hatred Case Study: Schools Act against Students for 'Flaming' Teachers on Blogs Five junior college students were punished for posting offensive remarks about two teachers and a vice‐principal online. The girls had to remove those remarks from their blogs or Internet diaries and were suspended for three days.
Copyright © 2012 Knowledge Point Spreading Hoaxes via Text Messages and Emails Case Study 1: Panadol Hoax Does the Rounds Again This Year Dubai – A 2005 hoax concerning Panadol Extra has resurfaced, circulating the UAE and other places via text messages. The text warns consumers not to purchase Panadol Extra as a person can damage his kidney by taking just one tablet. After causing a health scare back in 2005, the health authorities conducted tests on the medicine and found that it was safe.
Copyright © 2012 Knowledge Point Spreading Hoaxes via Text Messages and Emails Case Study 2: The Dubai Metro Derailment is Nothing but a Rumor “A rumour regarding the collapse of Dubai Metro near Al Rashidiya station has been circulating via mobile phones. The rumour stated that the incident resulted in 15 deaths and...”
Copyright © 2012 Knowledge Point Spreading Hoaxes via Text Messages and Emails Case Study 3: BlackBerry and Internet Rumors Increases Community’s Worry Abu Dhabi Police have warned users against using BlackBerry devices and the Internet to promote rumours.
Copyright © 2012 Knowledge Point Making Ethical Decisions Before making a sound decision, ask yourself these few questions: 1.Recognize if there is any ethical issue – Will your decision damage or affect someone or any group? – Will the decision jeopardize your life? – Are you in a dilemma to make the decision? – Is your decision legal? – Will there be any conflict?
Copyright © 2012 Knowledge Point Making Ethical Decisions 2. Be Specific and Get the Right Facts – Do you really know the facts about the situation or case? – Do you know enough to make the decision? – Do you need to have more information? – Do you need to verify or consult with someone that has more authority?
Copyright © 2012 Knowledge Point Making Ethical Decisions Assess Every Option – Which option produces the most good and offers the least harm? – Which option best addresses the situation or case? – Which option best respects the rights of all parties involved? – Which option provides equal rights (fair) to all parties involved?
Copyright © 2012 Knowledge Point Lesson Learned Treat others with the same respect you want to be treated with. Being ICT literate, you should know when, when not and how to use technology properly. You have to be aware of Cyber Law in the country. As an ATHS student, you have to be aware of the laws set by the school with regards to responsible use of Internet and social media.
Copyright © 2012 Knowledge Point Be smart and stay safe!
Copyright © 2012 Knowledge Point digital world architecture of evolution Resources:
Intro: U TUBE VIDEO “What to do when you’re bullied”
Judith Taylor.Technology tools.5AA
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
E-Safety Challenge College. Learning Objectives Understanding the definition of ‘cyber’ bullying and the affect it can have on the victim.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Safety on the Internet A Lesson by Ms. Grande on Keeping Safe While Having Fun.
How can I adjust my behavior and choices in order to improve the learning environment to represent SMS?
Are you a digital citizen? Zeborah Ware 1. Table of Contents Definition of Digital Citizenship Page 3 Classroom Rules for Cell Phones Page 4 Social Networking.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
BY: CHELSEA KUCERA ELED 318 The Legal, Social and Ethical Issues in Technology for the Classroom.
BULLYING What Is The Definition of Bullying?
Digital Citizenship. I can…. What is digital citizenship? Think.Pair.Share.
CYBER BULLYING Cody O’Brien. Goals for Today’s Presentation Introduce Cyber bulling Identify forms of cyber bulling Steps to prevent it What to do if.
Keeping it safe on the internet Computer safetyComputer safety Proper use of Internet materialProper use of Internet material Copyright guidelinesCopyright.
Internet Safety Blue Hills School. Internet Safety Use these Tips Don’t share your address, phone number, school name or your parents credit card number.
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
WEST COMMUNITY COHESION TEAM Pc Ian Ashton and Helen Chadwick.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
ASHLEIGH LENTYCH CYBER BULLYING AND INTERNET SAFETY.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Netiquette/Internet Safety Presentation VAHS Boys Swim Team.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Digital Citizenship By Lori Gray. Netiquette on Social Media Rules for connecting to others using social media on the internet – Facebook, myspace, ,
Forms of Cyberbullying
You must be an E-safety Support member to use these resources in your school. © 2014www.e-safetysupport.com Cyber Bullying.
ETHICS and COMPUTERS An Overview 23/04/2017.
Digital CitizenshipDigital Citizenship By Pinsinee Mekpanuwat (pin) Smita Jirayingcharoen (mudmee)
Cyber Safety Assessment Review Grades 6-8. Question #1 Cyber bullies are generally quite mature in their behavior. TRUE FALSE.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
Cyber-Bullying and internet use
Digital Citizenship Project. The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
Things To Know SOURCES:
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
THINK CYBER SMART, BE CYBER SMART! CYBER SAFETY AND DIGITAL CITIZENSHIP IN A CLASSROOM.
What is it? & What can I do to prevent it?. Cyber bullying is when somebody is teasing, taunting, or harassing someone else over the computer. Whether.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
1 Moderator: Thomas N. Shorter, Godfrey & Kahn, S.C. Panelists: Nancy Davis, Ministry Health Care Lee Kadel, Wheaton Franciscan Healthcare Ralph Topinka,
Safe Social Networking: Parent Workshop Helping to keep your children safe online.
S TOP B ULLYING !. Source:
Cyberbullying Brittany Benningfield EDF 204 Spring 2015.
Internet Safety Night Raising Good Digital Citizens.
IL SOS Online Safety Think Before You Click!. STOP.
Internet Bullying Social Networking Site Security Potential to Law Infringement Let us do something more.
Holt High School _48889_ ,00.html.
Lecture 3 1Norazirah Ayob, FEB. Ch Technology advances allow individuals to self-select what, when, and where messages are sent and received.
Internet Safety Tips.
© 2017 SlidePlayer.com Inc. All rights reserved.