Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

DIGITAL RESPONSIBILITY

No description
by

Moisés Llorente Santos

on 24 January 2016

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of DIGITAL RESPONSIBILITY

5. INTERNET PRIVACY (pag. 162)
6. DIGITAL RESPONSIBILITY (pag. 163)

UNIT 1: INTERNET AND DIGITAL RESPONSIBILITY
A few questions to debate...
Can people be damaged when they are using internet?
Which kind of "digital threats" do you know? Have you ever been a "victim" of them?
Who is your most dangerous enemy on the internet?
Do you know what "Digital reputation" is? Is it equal to the real reputation?
Before starting, you should
know that...
A
cyber-criminal
is a person that commits a crime involving a computer and a network.
Not all the hackers are cyber-criminals. Lots of them help police to solve cyber-crimes or work in companies securing their systems against cyber-criminals.
Before starting, you should
know that...
You, as an internet user, are constantly creating your
digital reputation.
Your
digital reputation
is the opinion or view that others have about you as a user, based on what you say, show or do on the internet.
Digital reputation is
FOR EVER.
Cleaning up your D.R. can be an almost impossible task, so... always think if what you are doing now on the internet will be appropriate for you in the future.
Before starting, you should
know that...
A
cyber threat
is any threat that uses the internet to facilitate cyber-crime.
The most dangerous cyber threats are:
Identity impersonation to steal personal passwords (phising).
Personal and intimate information theft.
Cyberbulling.
Malicious software and Denial of Service attacks (DDoS)
Child abuse.
We can be our worst cyber-enemies if
our attitude is not correct.
Remember...
our best protection on the Internet is ourselves and adults who we trust
: parents, teachers and specialists.
BE SMART ON THE INTERNET
HIGHWAY CODE FOR THE INTERNET
FOR YOUNG PEOPLE
1. Always browse on the internet when there is an adult at home.
2. Don't give out unknowns data such as addresses, passwords, telephone numbers, the place where you study or live, etc.
3. Be aware of people that wants to know a lot of information about you.
4. Think before typing a text, uploading a picture or clicking on a suspicious link. Don't act if you are not 100% sure about what you are doing.
5. And, above all else...
USE YOUR COMMON SENSE!
CLASSROOM ACTIVITY
AN INTERNET DANGER: DAMAGED REPUTATIONS

Camera phones, digital cameras and web cams are everywhere these days, and kids can be victims of their own inexperience with new technology. Many post pictures, videos or notes online that they later regret. "Think before you post, because once you do, it's going to be up there forever," Shehan says.

A child's online reputation is a growing concern, Aftab says, with the rise of online social networking and profiles. She cites reports of schools and employers rejecting young people for high school programs, internships, college admissions and jobs after checking out what applicants have posted online.

Many teenage girls put up provocative photos of themselves, Shehan says. Why? Handy - a teenager herself - believes it's a game of one-upmanship. "Kids are trying to look cool. They're doing it because everyone else is doing it. A girl will see a picture and say, 'Oh, I can top that.' And before you know it, she's half-naked on the Internet for everybody to see."

READ THE FOLLOWING TEXT AND LISTEN TO YOUR TEACHER'S TIPS
Do you have any different "good practices tip" you want to share with the class?
COMPUTER ROOM ACTIVITY
1. Choose a name and two surnames from the columns underneath and form a complete name:
ANTONIO
PEDRO
MARÍA
ISABEL
GARCÍA
PÉREZ
RODRÍGUEZ
SÁNCHEZ
PÉREZ
LÓPEZ
VÁZQUEZ
DÍAZ
For example:
PEDRO SÁNCHEZ VÁZQUEZ
2. Using Google and all the information you can gather from the internet, make a profile of that person including all the personal information you can find about a real person with that name (including pictures, place of birth, job, where does/did he/she study, hobbies, places visited on holidays, etc.)
3. Make a word document with all that information and send it to
practicasmoises@gmail.com
4. Write a verdict, at the end of the document, about his/her digital reputation.
MAIN IDEAS:
1. What's a cyber criminal? Which is the difference between a cyber-criminal and a hacker?
2. What's the meaning of "Digital Reputation"?
3. What's a cyber-threat? Which are the most dangerous?
KEYWORDS (VOCABULARY)

Threat_______________
Reputation____________
Full transcript