internet safety
TRANSCRIPT
![Page 1: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/1.jpg)
Staying Safe in Cyberspace
Staying Safe in Cyberspace
Jessica KohlerITC 525
Jessica KohlerITC 525
QuickTime™ and a decompressor
are needed to see this picture.
![Page 2: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/2.jpg)
Table of ContentsTable of Contents Safety Rules
Cyber Bullying Netiquette
Email Safety
Standards CreditsCybersmart Video
License to Surf the Web
Safety Rules
Cyber Bullying Netiquette
Email Safety
Standards CreditsCybersmart Video
License to Surf the Web
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
![Page 3: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/3.jpg)
Safety RulesSafety Rules
HOME
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
More Info.
*Only use the Internet when there is an adult home. *Don’t answer email from strangers. *Tell an adult when you feel unsafe. *Keep passwords private. *Don’t meet someone in person whom you met
online. *Don’t send your picture to anyone online.
Even More Info.
QuickTime™ and a decompressor
are needed to see this picture.
![Page 4: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/4.jpg)
Are you safety savvy?Are you safety savvy?
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
BACK
What are some ways you can stay safe on the Internet?
a. Share your password with others. b. Don’t send your picture to anyone online. c. Use the Internet when no one is home.
![Page 5: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/5.jpg)
Let’s try again!Let’s try again!
QuickTime™ and a decompressor
are needed to see this picture.
HOME
Keep your password private. Others can hack into your accounts using your password.
QuickTime™ and a decompressor
are needed to see this picture.
![Page 6: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/6.jpg)
Let’s try again!Let’s try again!
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Make sure there is an adult at home when using the Internet. Who else will you tell if something goes wrong?
![Page 7: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/7.jpg)
Correct! Correct!QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
HOME
Make sure you don’t send pictures to people over the Internet (even if you know them.)
![Page 8: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/8.jpg)
Cyber BullyingCyber Bullying
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
What is it? *When a child is tormented,
threatened, harassed, humiliated, embarrassed, or targeted by another child using the Internet or cell phones.
How it Works: *Direct attacks *Using others as accomplicesTake Action!
Keep personal information private. Stop, Block, and Tell. Take 5!
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
VIDEO
![Page 9: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/9.jpg)
Are you safety savvy?Are you safety savvy?
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
BACK
What actions can you take to stop Cyper Bullying?
a. Keep personal information private.
b. Help spread the rumors.
c. Text harmful information about
another person.
True or False?
Cyber bullying is talking with a friend over the Internet.
![Page 10: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/10.jpg)
Let’s look at that again!
Let’s look at that again!
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Simply talking with a friend over the Internet is not Cyber Bullying.
![Page 11: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/11.jpg)
Let’s look at that again!
Let’s look at that again!
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Helping to spread rumors is being an accomplice to the bullying.
![Page 12: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/12.jpg)
Let’s look at that again!
Let’s look at that again!
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Texting harmful information about another person is Cyber Bullying.
![Page 13: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/13.jpg)
Great Thinking!
Great Thinking!
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
HOME
Cyber Bullying is when a child is tormented, threatened, harassed, humiliated, embarrassed, or targeted by another child using the Internet or cell phones.
Bullies could be a friend or just an acquaintance.
![Page 14: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/14.jpg)
Great Thinking!
Great Thinking!
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
HOME
Make sure you keep your personalinformation private.
Bullies could be a friend or just an acquaintance.
![Page 15: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/15.jpg)
Email SafetyEmail Safety
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Email Dangers: *Chain Letters *Hoaxes, rumors and urban
legends *Phishing *Scams and fraud *Spam *Spoofing *Viruses
What are these?
Safety Tips: *Change password often *Keep password private *Log off when done *Don’t reply to spam, harassing, or offensive email. *Don’t forward chain letters *Delete emails, UNREAD,
from people you don’t know
*Use anti-virus programs before opening attachments.
Even more Information!
QuickTime™ and a decompressor
are needed to see this picture.
![Page 16: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/16.jpg)
Are you safety savvy?Are you safety savvy?
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
BACK
What are some email dangers? a. Chain Letters b. Phishing c. Spam d. All of the above
![Page 17: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/17.jpg)
Not Quite!Not Quite!
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Take another look at that list.
![Page 18: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/18.jpg)
Way To Go! Way To Go!QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
HOME
Spam, Phishing, and Chain Letters can be dangerous.
Watch Out for these too: *Hoaxes, rumors and urban legends *Scams and fraud *Spoofing *Viruses
![Page 19: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/19.jpg)
NetiquetteNetiquette
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Respect all other users!
Be patient with newcomers.
Be careful to not use rude or bad language online.
Make a good impression.
Do not TYPE IN ALL CAPITAL LETTERS.
Don’t break any laws.
Do to others as you would have them do to you.
More Info.
Even More Info.
What is it? Internet etiquette or guidelines for proper behavior on the Internet.
QuickTime™ and a decompressorare needed to see this picture.
![Page 20: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/20.jpg)
Are you safety savvy?Are you safety savvy?
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
BACK
What is an example of good Internet behavior?
a. TYPE IN ALL CAPITAL LETTERS b. Use rude or bad language c. Do to others as you would have them do to you.
![Page 21: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/21.jpg)
Do you need a redo?Do you need a redo?
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Typing in all capital letters makes people think you are yelling at them. This is not good Internet behavior.
![Page 22: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/22.jpg)
Do you need a redo?Do you need a redo?
QuickTime™ and a decompressor
are needed to see this picture.
HOME
QuickTime™ and a decompressor
are needed to see this picture.
Using rude or bad language anywhere, whether on the Internet or not is inappropriate behavior. Many Internet providers will terminate your account if you use this type of language.
![Page 23: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/23.jpg)
Absolutely! Absolutely!QuickTime™ and a
decompressorare needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
HOME
Doing to others as you would like them to do to you is a rule you should use throughout your life. This is wonderful Internet behavior to have.
![Page 24: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/24.jpg)
Get Cybersmart with Phineas and Ferb
Get Cybersmart with Phineas and Ferb
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
HOME
![Page 25: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/25.jpg)
Earn Your License to Surf the Web
Earn Your License to Surf the Web
QuickTime™ and a decompressor
are needed to see this picture.
QuickTime™ and a decompressor
are needed to see this picture.
HOME
“Rules of the Road”
![Page 26: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/26.jpg)
PA State StandardsPA State Standards
QuickTime™ and a decompressor
are needed to see this picture.
HOME
Science and Technology and Engineering Education 3.4.B: Technology and Society
3.4.5.B1: Explain how the use of technology can have unintended consequences.
3.4.D: Abilities for a Technological World 3.4.5.D3: Determine if the human use of a product or system creates
positive or negative results.
National Educational Technology Standards
National Educational Technology Standards
5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior.
Students: a. advocate and practice safe, legal, and responsible use of
information and technology. c. demonstrate personal responsibility for lifelong learning. d. exhibit leadership for digital citizenship.
![Page 27: Internet safety](https://reader035.vdocuments.net/reader035/viewer/2022062703/555364fdb4c905cf188b52ad/html5/thumbnails/27.jpg)
CreditsCreditsSites
http://www.protectkids.com/youthsafety/safteytipskids.htmhttp://www.ccmostwanted.com/kids/iguide.htmhttp://www.stopcyberbullying.org/index2.htmlhttp://www.youtube.com/watch?v=o0W_tEUMzuk
http://www.wiredsafety.org/safety/email_safety/http://www.commonsensemedia.org/get-cybersmart-phineas-and-ferb#
http://www.ccmostwanted.com/kids/inetiquette.htmhttp://www.kidsdomain.com/brain/computer/surfing/netiquette_kids.html
http://pbskids.org/license/
Imageshttp://dynasium.files.wordpress.com/2008/12/6a00d8341c7bc453ef00e5505e03c48833-800wi.jpg
http://www.clker.com/clipart-13158.htmlhttp://reallessons4reallearning.wikispaces.com/file/view/computer-clipart.gif/131750119/computer-clipart.gif
http://cdnet.myxer.com/tn/c/1943197/big/?t=20090522165142http://www.chairvilleschool.org/webquests/internet_safety1_check.gifhttp://www.villageofworth.com/Police/email/envelope-circle-clipart.gif
http://www.graphicsfactory.com/clip-art/image_files/tn_image/0/755640-tn_BIB0101.gifhttp://www.urenco.com/uploads/images/safety%20sign.JPG
http://glma.files.wordpress.com/2007/12/cyberbullying.jpghttp://scorpion1333.files.wordpress.com/2009/06/phineas-and-ferb-300a071708.jpg
http://www.gpl.lib.me.us/movie.gif
Siteshttp://www.protectkids.com/youthsafety/safteytipskids.htm
http://www.ccmostwanted.com/kids/iguide.htmhttp://www.stopcyberbullying.org/index2.htmlhttp://www.youtube.com/watch?v=o0W_tEUMzuk
http://www.wiredsafety.org/safety/email_safety/http://www.commonsensemedia.org/get-cybersmart-phineas-and-ferb#
http://www.ccmostwanted.com/kids/inetiquette.htmhttp://www.kidsdomain.com/brain/computer/surfing/netiquette_kids.html
http://pbskids.org/license/
Imageshttp://dynasium.files.wordpress.com/2008/12/6a00d8341c7bc453ef00e5505e03c48833-800wi.jpg
http://www.clker.com/clipart-13158.htmlhttp://reallessons4reallearning.wikispaces.com/file/view/computer-clipart.gif/131750119/computer-clipart.gif
http://cdnet.myxer.com/tn/c/1943197/big/?t=20090522165142http://www.chairvilleschool.org/webquests/internet_safety1_check.gifhttp://www.villageofworth.com/Police/email/envelope-circle-clipart.gif
http://www.graphicsfactory.com/clip-art/image_files/tn_image/0/755640-tn_BIB0101.gifhttp://www.urenco.com/uploads/images/safety%20sign.JPG
http://glma.files.wordpress.com/2007/12/cyberbullying.jpghttp://scorpion1333.files.wordpress.com/2009/06/phineas-and-ferb-300a071708.jpg
http://www.gpl.lib.me.us/movie.gif
QuickTime™ and a decompressor
are needed to see this picture.
HOME