Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Social Media Awareness
Transcript of Social Media Awareness
We asked, you answered!
What is Malware & Spyware?
Allow offenders to collect personal information about targets.
Malware (malicious software)
collects sensitive user information to use for fraud.
is a computer code installed on a device to send information to a third party.
Do not use
Defined by your behaviours in
the online environment and by
content you post
about yourself and others.
Tagged photos, blogs and social network interactions determine how others perceive you- online AND offline.
Poor digital reputation can affect your friendships, relationships and job opportunities.
Give your profile a 'cleanse'
Always keep personal info safe and appropriate
- online information could be there forever
The use of electronic
communication to deliberately harass, threaten or intimidate a person.
Why does a cyberbully bully?
Have been in the same situation
May believe a person deserves it
Unsure how to use spare time productively
Are told by others to do it
Think it’s normal
Believe it’s necessary to be popular
Think it’s easier to get away with
Don’t think it genuinely affects others
How to deal
Save the evidence
View it from different perspective
Keep focused on the things you love
Know someone being cyberbullied?
Let them know you're concerned
Be sensitive, listen and support
Identify when/where bullying is happening
Be with them/online during these times
Don't be a bystander
Be Social, Be Safe, Be Smart, Be YOU!
Security and identity theft
involves stealing money or gaining benefit by pretending to be someone else.
But what's the difference?
- the ability to decide what information about you goes where.
- offers the ability to be confident that those decisions are respected.
What the cyberbullies want
Bystanders become active participants
Laughed at a post/meme on a social network?
You could be involving yourself
in cyberbullying without
DON'T GET INVOLVED!
How can I avoid this?!
'https' rather than 'http'
appears on site
Privacy and security
policies available on
Destroy all discarded
Ask for name/company
over the phone
Avoid texting/calling numbers beginning with '19'
Never follow a link
directly from an email
or private message
the web address
Think before you post, send or
Treat others as you would like to
Set profile to private
Differences from face-to-face
Can be anonymous
Do/say things that wouldn't
normally be said face-to-face
No limitations- 24/7
Magnified impact- can spread to a global scale
Main four types of cyberbullying:
form of harassment using persistent behaviours that cause apprehension and fear.
sending of offensive messages to an individual or group (often repetitive).
Public display, posting or forwarding of personal messages/images.
Heated or intense argument which often uses offensive language.
3, 000 member responses
And the top
Staying in touch
Sent via email, IM, text, MMS or social media
Can appear to come from authoritative source.
Make people fearful of missing out- money trap
Feel guilty not giving to charity
Types- Lottery, Phishing, Advance Fee, Mule
How addicted are you
to the internet?
Are you doing/saying
the right things on it?
Do you know someone
that might not be?
World Wide Wed Consortium- Platform for Privacy Preferences Project
Social Media Awareness