Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of Internet Safety
Rules, Etiquette, & Lessons to Keep You Safe and Responsible Online
Definition - Responsible cyber social behavior
What people do online when no one is watching
Where are these places?
Email where you send electronic messages to people.
Social Networks like Facebook & Twitter.
People can feel invisible and capable of doing things they normally wouldn't do in person or in public...things that might be wrong or hurtful.
Online Identity - a social identity that an Internet user establishes in online communities.
NEVER give out your passwords to ANYONE (unless a parent/guardian requests it).
NEVER open emails from anyone you are unfamiliar with.
DO conduct yourself online as you should in person...with respect.
DO represent yourself in an appropriate manner in everything you do in cyber space.
Do's & Don'ts
Virus - a small piece of software that piggybacks on real programs.
Example - a virus might attach itself to a program such as word processing. Each time you run that program, the virus runs too...and has a chance to spread and wreak havoc!
Who should you give this information to?
Types of Viruses
Travel as an attachment to email messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's address book.
Simply a computer program. The program claims to do one thing, but instead does damage when you run it. They do not replicate automatically.
Small pieces of software that uses computer networks and security holes to replicate itself.
What is a copyright?
Why are they important and why should you care?
What is plagiarism?
What can be a copyright? Literary work, music, dramas, choreography, pictures, movies/tv shows, sound recordings and architecture.
Copyright - a form of protection given to the authors or creators of “original works of authorship,” including literary, dramatic, musical, artistic and other intellectual works.
What that means is that, as the author of the work, you alone have the right to do any of the following or to let others do any of the following:
make copies of your work;
distribute copies of your work;
perform your work publicly
display your work publicly
make “derivative works”
Let’s talk about Facebook Friends
What is Grooming?
This is the process predators use to manipulate minors into inappropriate relationships or into meeting them in public. It often includes the giving of compliments or gifts.
Internet Predator -
An adult internet user who searches for vulnerable and naive children or teens, usually for inappropriate or other abusive purposes.
The ultimate goal of a groomer...is to arrange an in-person meeting that can lead to danger.
Prey on child or teen's desire for romance and adventure
Develop trust and secrecy; manipulate kids by listening to and sympathizing with their problems and insecurities
Affirms feelings and choices of the child
Exploit curiosities of the child
Flatter and compliment the child excessively, send gifts, and invests time, money, and energy to groom the child
Develop an online relationship that is romantic, controlling...making you dependent on them
Drive a wedge between you and your parents or friends
Makes promises of an exciting, stress-free life
Makes threats to blackmail it's victims
If someone asks for personal information online, ignore the request and tell a parent/guardian or teacher.
Don’t talk to strangers online.
General Safety Rules
Never meet someone in person you meet online.
Online predators lie about their age, interests, and other things just to gain a child’s trust.
What is Cyber Bullying?
The use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
Types of Cyber Bullying
My Experience with
Posting or sending cruel gossip to damage a person’s reputation and relationships with friends, family, and acquaintances.
Deliberately excluding someone from an online group.
Breaking into someone’s e-mail or other online account and sending messages that will cause embarrassment or damage to the person’s reputation and affect his or her relationship with others.
Repeatedly posting or sending offensive, rude, and insulting messages.
Posting or sending unwanted or intimidating messages, which may include threats
Online fights where scornful and offensive messages are posted on websites, forums, or blogs.
If you are cyber bullied...ignore the ignorant comments and tell a teacher, parent, or guardian
You are above negative comments.
Do not ignore cyber bullying if you witness it. Stand up against it!
Are you ready for the Internet Safety Exam???
Malware, or malicious code, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.