Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Internet Safety--Middle School
Transcript of Internet Safety--Middle School
the internet has appropriate as well as inappropriate
places to visit. The Internet presents a special problem, however. In a physical community, you know the inappropriate places,
and you can avoid them pretty easily. Online, however, sometimes getting to an inappropriate place
is as easy as accidentally clicking a link from a search, advertisement
or e-mail that SEEMS perfectly appropriate. So what do you do if you end up somewhere you
didn't mean to be? The best thing to do is EXIT immediately. Some sites are designed to prevent you from
exiting through a process called looping. If you find yourself on this
type of website, it may be necessary to turn the computer completely off to exit! The Internet is a great place to learn,
to be entertained, and to share
your ideas. Social networking,
gaming, and video-sharing Web
sites are all about sharing with
others. Private Identity Information:
Each time you share information about
yourself online, stop and think: “Am I giving out information that I should keep private?” These kinds of facts are called private identity information. You keep them private because they could be used for identity theft. What’s Private Identity
full (first and last) name
calling card numbers
credit card numbers
Social Security number
mother’s maiden name Kids and teens, as well as adults, are targets
for identity theft. An identity thief uses someone
else’s private identity information to pretend to
be that person. Do YOU share private identity information online? ? ? ? ? ? ? ? ? ? So... you're chatting online with a friend you met through facebook. Even though you've never met this person, you are already great friends. You both like the same things, and can really talk about your problems. It's entirely possible, however,
that you're chatting with... HIM. Or some other creepy
jerk trying to lure you into doing something
potentially dangerous. The Grooming Process Online predators find their "prey" by going to sites or
chat rooms where young people gather or by searching
profiles for a specific type of victim. Predators use a process to "groom" their victims, which usually follows this pattern 1. Establishes similar interests through chat or IM. 2. Builds trust. 3. Keeps it a secret. 4. Breaks down barriers. 5. Makes threats. 6. Meets face to face. Malware Email Attachments Watch Out For... Unless you know who the email is from, you should NEVER
open email attachments. In fact, if you don't recognize the
address an email is coming from, don't open the email at all!
Spammers are alerted that their email is reaching you every
time you open a spam email. Jaleesa and Kim are friends at Jefferson Middle School. Kim tells Jaleesa that she doesn’t want to hang out with her any more. Jaleesa is angry and upset. She uploads a photo of Kim from her cell phone that was taken at a slumber party two weeks earlier. Jaleesa sends the photo to everyone on her buddy list with a message attached: “Kim is such a ****.” One day you like someone. The next day you don’t. Angry, you say something or post something online. It gets passed around quickly and easily. So now, everybody knows about it and everybody talks about it in school. While maybe you are mean only once, when you do it online, your posting or message is repeated again and again as it gets passed around. Meanness multiplies.
When kids are intentionally and repeatedly mean to one another using cell phones or the Internet, it’s called cyberbullying. Sometimes kids can handle cyberbullying and not get too upset. Other times, it can make kids feel angry, frustrated, sad, or afraid. Everyone has a right not to be bullied and the responsibility to treat others fairly.
• Save copies of bullying IMs, e-mails, or text messages.
• Don’t share or allow photos of yourself that could be used to embarrass you.
• Show the evidence of cyberbullying to a trusted adult who can help you. Sondra is planning a slumber party to celebrate her birthday. Her
parents have set a limit of eight girls, so Sondra can’t invite everyone
she’d like. Two girls who are left out overhear the plans. Angry, they plan
The girls make a “We Hate Sondra Jones” Web site. They say that anyone invited to
the party should not go. They tell everyone in school the site’s address. The girls invite everyone to add new reasons why they hate Sondra and to spread ugly rumors about her.
When Sondra hears about the site, she gets a sick feeling in her stomach. Unable to
ignore it, she checks the site often. Each day she finds a new nasty comment or
joke about her. She feels hurt and powerless to defend herself. Sondra is too
embarrassed to go to school and tells her parents she is sick.
If you were Sondra’s friend, what advice would you give her? For the tenth day in a row, Andrew opens an e-mail that says, “I’m getting closer.” He doesn’t recognize the sender’s address. He wonders if someone at school is trying to scare him. On the other hand, it could be a stranger. Whatever the source, Andrew is scared. The next afternoon, Andrew is home alone. The e-mails come every few minutes. “I’m hiding in your house using a wireless Internet connection. You’ll never find me. But I’ll find you.”
Frozen with fear, Andrew can’t think what to do. If he called you for advice, what would you tell him? FACT: Ideas, drawings, stories, music -- anything that a person can dream up in their mind and then put in some physical form = INTELLECTUAL PROPERTY. FACT: As soon as a person puts their idea, story, piece of music, drawing, photograph, etc. on paper, film, mp3, or any other recorded media, that intellectual property belongs to them, and is protected by the Federal Government under copyright law, which guarantees to an individual who creates something that they alone have the right to make money off of what they create, and to choose how it is used. FACT: If you copy someone else's intellectual property and present it as your own, you are PLAGIARIZING. Plagiarizing includes cutting and pasting from the internet, copying out of books, copying pictures, etc, without giving credit to the person who actually created that intellectual property.
Plagiarizing is illegal, because it violates copyright law, and is punishable by the U.S. Government. So, what CAN I use without breaking the law? For students, fair use is fairly easy. You have more rights to use materials than anyone else. You can use graphics and content for educational purposes in small amounts (30 seconds of a song, one picture from a book or website, a couple of sentences from a written text, etc.). Just remember to give credit to the person who actually created that song, book, or picture, so you're not guilty of plagiarizing, and put quotations around the copied words or phrases in your paper to show which words are not your own. Also remember that work cannot be publicly displayed or put into a situation where it can be distributed or copied (examples: Web site, contest, sell for school funds). It's a serious crime to violate these laws! Are you breaking the law if... You use a search engine to find several Web sites containing information for a school report.You copy, paste, and reorganize one paragraph from each site into your report. Then you write your own introduction and conclusion. You get a very funny birthday card in the
mail, scan it, and post it on your personal
Web page. You copy a photo from a Web site and
paste it into a school report. Kids at school find out you have a very fast Internet connection and ask you to download music files for them.You see an opportunity to
make some money, copy the files onto CDs, and offer them at much cheaper prices than they would pay for a CD in a music store. You see a very cool animation on a video game site and copy it to your personal Web page. Your older brother tells you where on the Internet to get free passwords for subscription online games.You get a password and play a game that costs others $10 a month. You learn where on the Internet to
download first-run movies and watch
one at home with your family. Microsoft word clip art Microsoft Word clip art Microsoft Word clip art Text and Ideas for this presentation come from two sources:
1. iSAFE grade 7 curriculum, iSAFE Inc., http://www.isafe.org
2. Cyber Smart online curriculum lessons "Private and personal information," "Strong Passwords," "Cyberbullying: Not a Pretty Picture," "Dealing with Cyberbullying," and "Considering Copying." http://cybersmartcurriculum.org Follow these guidelines for safe, legal Internet use, and enjoy the bounty of information the Internet has to offer! The internet is a community, but it is linked electronically. Phishing Spyware