Internet Safety/Cyber Ethics - PowerPoint PPT Presentation

1 / 18
About This Presentation
Title:

Internet Safety/Cyber Ethics

Description:

The Fun Side of the Internet Netiquette: using good behavior in cyber space It s not unethical to make a mistake. However, if you do, correct it. The positive side ... – PowerPoint PPT presentation

Number of Views:352
Avg rating:3.0/5.0
Slides: 19
Provided by: schoolsPa3
Category:

less

Transcript and Presenter's Notes

Title: Internet Safety/Cyber Ethics


1
Internet Safety/Cyber Ethics
2
What are cyber ethics?
  • Ethics are the rules you use in life to help you
    decide what is right and wrong.
  • Cyber ethics is how you act when you are on the
    computer.

3
The Fun Side of the
Internet
  • Learning/Research
  • Playing games
  • Staying in touch
  • (e-mail)
  • Shopping
  • Travel arrangements
  • Downloading music
  • Checking the weather
  • Pay bills

4
Netiquette using good behavior
in cyber space
  • Watch your language
  • (written language)
  • ALL CAPS Shouting
  • Emoticons Show emotions
  • Do not send angry or insulting e-mails
  • (This is called flaming.)
  • Always think about your audience
  • (all online communication
  • is public)

5
Its not unethical to make a mistake. However,
if you do, correct it.
  • Did you?
  • Download music illegally?
  • Give out a friends web/e-mail address?
  • Offend someone?
  • Give out personal information?
  • Copy software from a friend?
  • Correct it.
  • Buy a legal copy
  • Tell them so they can change it
  • Apologize
  • Tell an adult
  • Buy your own rights or your own copy

6
The positive side of e-mail
  • Talk to friends
  • Keep in touch with far away relatives
  • Share information

7
The negative side of e-mail
  1. SPAM Phishing is the term used for e-mails
    which try to scam you for money, sell you things,
    or give your computer viruses.
  2. Viruses Information sent to your computer to
    corrupt your hardware.
  3. Identity Theft People try to persuade you to
    give out personal information so they can access
    your life.

8
Protecting your (and your friends) e-mail account
  • Dont give out your
  • e-mail address to anyone you dont know.
  • Dont give out friends e-mail addresses without
    their permission.
  • Dont share your password.
  • Dont read other peoples
  • e-mails without their permission.
  • Dont forward e-mails just because they say to
    forward them. You could be sharing viruses.

9
Generation _at_ INTERNET ETHICS
  • Web Pages
  • Blogs
  • My Space
  • Face Book
  • You Tube
  • Podcasts
  • E-mail
  • These items are all accessible by the general
    public.
  • Everybody can read what you write.
  • BE CAREFUL WHAT
  • YOU WRITE! Anything you post can be held
    against you in a court of law!

10
How to Protect Yourself
  • DO NOT GIVE OUT THE FOLLOWING INFORMATION
  • Address
  • Phone
  • Social Security
  • Birthday/Age
  • Other peoples information
  • School Name
  • Your Interests

11
Terms you should know
12
Cyber bullying
  • What is it?
  • Teasing or harassing someone online
  • What do I do if I am being
  • harassed?
  • Do not respond. This only perpetuates the
    situation.
  • Tell an adult. Some people become stalkers
    through bullying.
  • Seek a monitored chat room designated for you and
    your friends only.

13
Griefers
  • What are they?
  • Bullies who hang out at game sites to harass,
    cheat, or gang up on other gamers.
  • What do I do?
  • Tell or e-mail the site owners about the problem.
  • The owners can set up a private game just between
    you and your friends.

14
Predators
  • Predators use the tactic of grooming earning
    your trust by engaging you in simple
    conversations, asking general questions, and by
    pretending to care.
  • What do I do?
  • Trust your feelings
  • Tell an adult
  • Do not go into chat rooms when you are angry or
    emotional
  • Go to safe, monitored chat rooms

15
Hacking
  • What is it?
  • Hacking to break into someones computer system.
  • Hacker someone who breaks into computer systems.
  • Cracker someone who breaks in to do harm to your
    computer.
  • How do I stop it?
  • Make sure you have up to date spy-ware, pop-up
    blockers, and filters on your computer to protect
    you from harm.

16
Plagiarism
  • Plagiarism means to use someone elses work
    and not give them credit for the work.
  • How do I not plagiarize?
  • Cite anything that is not your original work.
  • Easybib.com

17
What are the consequences?
  • Jail
  • Fines
  • Loss of internet privileges
  • Loss of your integrity

18
Bibliography
  • Bailey, Diane. Cyber Ethics. New York Rosen
    Group, Incorporated, The, 2008.
  • All pictures and icons were copied from Microsoft
    Clip Art
Write a Comment
User Comments (0)
About PowerShow.com