Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Internet Safety

No description

Justin Perkins

on 22 September 2017

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Internet Safety

Obstacle 2:

Obstacle 4:

Obstacle 5:
Cyber Bullying

Obstacle 1:
Cyber Citizenship

Internet Safety
Rules, Etiquette, & Lessons to Keep You Safe and Responsible Online
Obstacle 3:
Copyright Laws

Definition - Responsible cyber social behavior
What people do online when no one is watching

Digital Citizenship

Where are these places?
Email where you send electronic messages to people.
Social Networks like Facebook & Twitter.
People can feel invisible and capable of doing things they normally wouldn't do in person or in public...things that might be wrong or hurtful.
Online Identity - a social identity that an Internet user establishes in online communities.
NEVER give out your passwords to ANYONE (unless a parent/guardian requests it).
NEVER open emails from anyone you are unfamiliar with.
DO conduct yourself online as you should in person...with respect.
DO represent yourself in an appropriate manner in everything you do in cyber space.
Do's & Don'ts
Virus - a small piece of software that piggybacks on real programs.
Example - a virus might attach itself to a program such as word processing. Each time you run that program, the virus runs too...and has a chance to spread and wreak havoc!
Personal Information

Your name
Home address
Phone number
Who should you give this information to?
Types of Viruses
Email Viruses
Trojan Horses
Malicious Code/
Travel as an attachment to email messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's address book.
Email Viruses
Simply a computer program. The program claims to do one thing, but instead does damage when you run it. They do not replicate automatically.
Small pieces of software that uses computer networks and security holes to replicate itself.
What is a copyright?
Why are they important and why should you care?
What is plagiarism?
What can be a copyright? Literary work, music, dramas, choreography, pictures, movies/tv shows, sound recordings and architecture.
Copyright Terms
Copyright - a form of protection given to the authors or creators of “original works of authorship,” including literary, dramatic, musical, artistic and other intellectual works.
What that means is that, as the author of the work, you alone have the right to do any of the following or to let others do any of the following:
make copies of your work;
distribute copies of your work;
perform your work publicly
display your work publicly
make “derivative works”
Let’s talk about Facebook Friends
What is Grooming?
This is the process predators use to manipulate minors into inappropriate relationships or into meeting them in public. It often includes the giving of compliments or gifts.
Internet Predator -
An adult internet user who searches for vulnerable and naive children or teens, usually for inappropriate or other abusive purposes.
The ultimate goal of a groomer...is to arrange an in-person meeting that can lead to danger.
Prey on child or teen's desire for romance and adventure
Develop trust and secrecy; manipulate kids by listening to and sympathizing with their problems and insecurities
Affirms feelings and choices of the child
Exploit curiosities of the child
Predators will...
Flatter and compliment the child excessively, send gifts, and invests time, money, and energy to groom the child
Develop an online relationship that is romantic, controlling...making you dependent on them
Drive a wedge between you and your parents or friends
Makes promises of an exciting, stress-free life
Makes threats to blackmail it's victims
If someone asks for personal information online, ignore the request and tell a parent/guardian or teacher.
Don’t talk to strangers online.
General Safety Rules
Never meet someone in person you meet online.
Online predators lie about their age, interests, and other things just to gain a child’s trust.
What is Cyber Bullying?
The use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
Cyber Stalking
Types of Cyber Bullying
My Experience with
Cyber Bullying...
Posting or sending cruel gossip to damage a person’s reputation and relationships with friends, family, and acquaintances.
Deliberately excluding someone from an online group.
Breaking into someone’s e-mail or other online account and sending messages that will cause embarrassment or damage to the person’s reputation and affect his or her relationship with others.
Repeatedly posting or sending offensive, rude, and insulting messages.
Posting or sending unwanted or intimidating messages, which may include threats
Cyber Stalking
Online fights where scornful and offensive messages are posted on websites, forums, or blogs.
If you are cyber bullied...ignore the ignorant comments and tell a teacher, parent, or guardian
You are above negative comments.
Do not ignore cyber bullying if you witness it. Stand up against it!
Are you ready for the Internet Safety Exam???
Malware, or malicious code, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
Digital Footprint:

Your digital footprint is
everything on the internet
that makes you you! This
could mean photos, audio,
videos, texts, blog posts, and
messages you write on a
friends' pages.
Can be varying degrees of public or private, depending on how sensitive it is!

are the area in any digital product, app, website, etc., where you can define or adjust what you share and how your account is handled.
is a point or limit that indicates where 2 things become different, or unofficial rules about what should not be done. Behavior is acceptable on one side of the boundary but not the other.
Privacy Scenarios
Scenario 1:
A kid you know at school gets bitten by a weird insect that causes an ugly multicolored rash on her stomach. She doesn't want other people to know.

Do other people have the right to know?
Should you be the one to tell them?
Scenario 2:
Someone writes in their diary. Another person copies what they wrote and posts it online.

Was the other person wrong to post the diary entries?
How would you feel if someone did this with your diary?
Scenario 3:
Someone posts, "Have a good vacation", on a friend's social media page.

Had the friend announced publicly that they were going away?
Are there more private ways to communicate this message - i.e., sending a private message or text?
Full transcript