Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Internet Safety

No description
by

Tanis Simoncelli

on 17 December 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Internet Safety

Internet Safety
SCN LRC
Awareness is Key
Social Networking
Blogs, Chat Rooms, Email, E-Bulletin Boards, Twitter, Instagram, Tumblr, Pintrest, Facebook
Positive: Connected, Communication like never before
Negatives: Altered Photos, Followers/Creepers, Identity Theft, Copyright Violations, Harrassment, & Social Consequences
Online Solicitation
According to Crime Against Children Research Center (University of New Hampshire),
1 in 7 minors are threatened by online predators.
4% of online predators asked to meet offline with minors.
Always report a predator
to parents or
the authorities
Where are the online places you can find online predators?
Personal info on the web
Nothing on the Internet is private!
Do:
Use privacy settings
Be creative with passwords
Use sites with https
Buy ONLY from trusted sites
Realize that prospective employers or colleges look at your personal info (i.e. Facebook)
Don't:
Post exact birthday
Save password on a computer
Deceptive communication
Pfishing & Spyware
Do:
Use disposable e-mail accounts like g-mail (w/parents’ permission) to create a buffer
Use a firewall
Identify biases on website you are using; dissect a URL to know what you are looking at (i.e. .com vs. a .gov website);
Don't
Open email from someone you don't know or respond to them
Click on links that are alone in the email...even from people you know
Online Harassment

22% of 11-16 yr olds are cyberbullied
(Goldsmiths, 2006)
Most common form is child to child
Targets:
Sexual preference, religious background, special needs, ethnicity, sex, social background, economic background, disabilities
Repeated, prolonged, unwanted texting, whether explicitly offensive or not, is a form of harassment (Dept. of Children, Schools, & Family, 2006).

Online forms come in all shapes and sizes.
Direct vs. Indirect
Spyware, Trojan Horse, Keyloggers, Zombies, Cookies, Drive-by downloads Web Beacons/Web Bugs
Identity Theft
Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.
What can you do currently to prevent your identity from being stolen?
General Rules to Follow
Copyright
According to National Center for Missing and Exploited Children,
13% of minors are threatened by online predators.
Full transcript