Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of Internet Safety
Awareness is Key
Blogs, Chat Rooms, Email, E-Bulletin Boards, Twitter, Instagram, Tumblr, Pintrest, Facebook
Positive: Connected, Communication like never before
Negatives: Altered Photos, Followers/Creepers, Identity Theft, Copyright Violations, Harrassment, & Social Consequences
According to Crime Against Children Research Center (University of New Hampshire),
1 in 7 minors are threatened by online predators.
4% of online predators asked to meet offline with minors.
Always report a predator
to parents or
Where are the online places you can find online predators?
Personal info on the web
Nothing on the Internet is private!
Use privacy settings
Be creative with passwords
Use sites with https
Buy ONLY from trusted sites
Realize that prospective employers or colleges look at your personal info (i.e. Facebook)
Post exact birthday
Save password on a computer
Pfishing & Spyware
Use disposable e-mail accounts like g-mail (w/parents’ permission) to create a buffer
Use a firewall
Identify biases on website you are using; dissect a URL to know what you are looking at (i.e. .com vs. a .gov website);
Open email from someone you don't know or respond to them
Click on links that are alone in the email...even from people you know
22% of 11-16 yr olds are cyberbullied
Most common form is child to child
Sexual preference, religious background, special needs, ethnicity, sex, social background, economic background, disabilities
Repeated, prolonged, unwanted texting, whether explicitly offensive or not, is a form of harassment (Dept. of Children, Schools, & Family, 2006).
Online forms come in all shapes and sizes.
Direct vs. Indirect
Spyware, Trojan Horse, Keyloggers, Zombies, Cookies, Drive-by downloads Web Beacons/Web Bugs
Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.
What can you do currently to prevent your identity from being stolen?
General Rules to Follow
According to National Center for Missing and Exploited Children,
13% of minors are threatened by online predators.