online safety for adults
TRANSCRIPT
![Page 1: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/1.jpg)
![Page 2: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/2.jpg)
commercial
![Page 3: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/3.jpg)
Digital footprints
![Page 4: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/4.jpg)
Digital FootprintsBenefits
• Don’t have to repeatedly log in• Submit personal details
Cost• Which websites you frequent• What things you search for• Who is in your social circle
![Page 5: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/5.jpg)
Commercial PurposesTrack youCustomize for youMarket to you
![Page 6: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/6.jpg)
Three ways to manage and control
1. Improve your understanding of basic issues
2. Develop “basic hygiene” habits
3. Use privacy tools
![Page 7: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/7.jpg)
Understanding the basics
everything shared on the Internet being a privacy risk to some degree
![Page 8: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/8.jpg)
Develop your 'basic hygiene” habits.
keep different parts of your digital footprint separate
![Page 9: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/9.jpg)
Use Privacy Settings
default settings for browsers, devices and apps are set to disclose,
rather than secure, your personal data
![Page 10: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/10.jpg)
Define terms
Virus a self-replicating program that is designed to infect a computer
Malwareintentionally malicious software or code
Spamunsolicited email or junk mail
![Page 11: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/11.jpg)
Define terms Clickjacking technique that tricks users into
clicking on a malicious link
Mousetrappingkeeps visitors from leaving a website by locking them into a window, opening multiple windows on the desktop, or relaunching their website in a window that can't be closed.
![Page 12: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/12.jpg)
Define terms Sockpuppeta fake identify
Trolla person who posts comments just to get a rise out of people
Flame War insulting comments and personal attacks are focus of conversation
FlamebaitA comment posted by someone trying to provoke a flame
![Page 13: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/13.jpg)
Teens online
![Page 14: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/14.jpg)
![Page 15: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/15.jpg)
![Page 16: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/16.jpg)
Online Study 88% of self-made
Sexual or suggestive imagesteens post are reposted on
adult websites
![Page 17: Online safety for adults](https://reader031.vdocuments.net/reader031/viewer/2022021921/58f114f91a28abd5458b464f/html5/thumbnails/17.jpg)
•Creating a hate group about someone.•Posting mean comments online.•Photoshopping someone’s photo to embarrass them.•Recording and posting fight videos.•Spreading rumors and gossip through text messages.•Stealing someone’s identity to create a fake profile