Download presentation
Presentation is loading. Please wait.
Published byClara Mitchell Modified over 9 years ago
1
Concept: Internet Safety Who You Are ~ Learning About Yourself ~ Unit Essential Questions How can my principles, skills, and interests help me be successful in life?
2
Lesson Essential Questions 1. What are acceptable uses for social networking? 2. How do I stay safe when using a social network? 3. How can a desktop publishing program help me present facts in an eye-catching manner?
3
Netiquette Cyber-bullyingSocial Network Private Information PredatorsPersonal Information Internet Safety Privacy
4
What do you think Internet Safety means? 1
5
Netiquette; Etiquette on the Internet 2 Flame ~ Spam ~ Mail Bomb ~ Shouting ~ FAQ ~
6
Social Network 3
7
1. How much time do you spend on a Social Network on a daily basis? 2. What social network(s) do you use? 4
8
Instant Messaging... IM & Texting 7 A way to ___________with friends _______ are you texting and ______ are you saying Personal info???? Some instant message services make it possible to exchange messages with several people at once — just like a ___________. _____________________could be forwarded to other people. Is the person you are texting ________? There is no way to __________something once you enter it.
9
8 The internet’s biggest website for sharing videos online. It only takes ONE video on YouTube to damage your reputation! A free online video hosting community which allows you to upload, view, and share video clips with others.
10
9 Friends only??? Dangers of posting photos and videos. You alone decide who sees what side of you on the Internet! Videos on Youtube can be downloaded and saved to anyone’s computer. The _________________________ “Would you want your grandmother to see the picture or video?”
11
Cyber-bullying Also known as: ____________________________ 10
12
Write one reason why you think someone might engage in cyber-bullying. 1. 11
13
12 Bullying Statistics 1. Pennsylvania is ranked 4 th in the nation for cyber- bullying. 2. _____ of teens reported being bullied at school. 3. _____ of students bully others, OFTEN. 4. _____ had rumors or gossip spread about them. 5. _____ have been physically bullied. 6. _____ of bullying happened inside the school. 7. _____ of bullying was on school grounds, buses, or on the way to school. 8. _____ of the victims reported the bullying to someone at school Source: Bureau of Justice Statistics, US Dept. of Health & Human Services, Cyberbullying Research Center, 7-26-2012
14
12 1. _____ of students reported being cyber bullied. 2. _____ of teens have experienced cyber threats. 3. _____ of teens have been bullied repeatedly through their cell phones of the Internet. 4. _____ do not tell their parents when bullying occurs. 5. _____ of teens have had embarrassing or damaging pictures taken of themselves without their permission. (often with a cell phone) Source: Bureau of Justice Statistics, US Dept. of Health & Human Services, Cyberbullying Research Center, 7-26-2012 Cyber Bullying Statistics
15
What would you do if you or someone you know is being cyber-bullied? 13
16
1. 2. 3. 4. 5. 6. 7. What to do if you experience cyber-bullying. 14
17
Personal Information vs. Private Information Personal Information ~ Private Information ~ Privacy = 16
18
Predators establish contact with children through conversations in: Chat rooms, instant messaging, texting, e-mail, discussion boards, and social networking sites. Predators prey on “vulnerable victims.” Online predators try to gradually seduce their targeted victims through attention affection kindness gifts Predator ~ 19
19
23 The Basics 1.
20
23 Passwords should not be: 1.
21
23 GOODBAD
22
Final Reflection Questions 1. What are acceptable uses for social networking? (100 words) 2. How do I stay safe when using a social network? (100 words) 25
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.