Картинки на тему «Safe Practices for Internet Usage (Internet Safety…)» |
Автор: Darrin Goodman. Чтобы познакомиться с картинкой полного размера, нажмите на её эскиз. Чтобы можно было использовать все картинки для урока английского языка, скачайте бесплатно презентацию «Safe Practices for Internet Usage (Internet Safety…).ppt» со всеми картинками в zip-архиве размером 757 КБ.
Сл | Текст | Сл | Текст |
1 | Safe Practices for Internet Usage | 19 | http://aobo.cc/aobo-porn-filter.html |
(Internet Safety…). Darrin Goodman Web | Sentry Parental Controls: | ||
Systems Coordinator Colorado State | http://www.sentryparentalcontrols.com Free | ||
University Extension Presented at 2010 CSU | Software for Content Filtering OpenDNS - | ||
Extension Fall Forum. | FamilyShield: | ||
2 | What is Internet Safety? Internet | http://www.opendns.com/familyshield | |
safety or online safety is the security of | Parental Filter: | ||
people and their information when using | http://www.softpedia.com/get/Security/Lock | ||
the Internet. Internet safety means | own/Parental-Filter.shtml K9 Web | ||
protecting your personal information while | Protection: | ||
online. Details such as your address, full | http://www1.k9webprotection.com ProCon | ||
name, telephone number, birth date and/or | Latte: http://procon.mozdev.org (read | ||
social security number can potentially be | interesting related article) Content | ||
used by on-line criminals. Adapted from: | Filtering for Firefox KidZui - a safe | ||
Wikipedia: | browser and online playground for kids | ||
http://en.wikipedia.org/wiki/Internet_safe | 3-12 FoxFilter Add-on for Firefox | ||
y eHow: | Interesting article on using manual proxy | ||
http://www.ehow.com/about_6577504_definiti | configurations Filtering Content with IE's | ||
n-internet-safety.html. | Content Advisor. | ||
3 | Personal Protection From… Internet | 20 | Cyberbullying What is it? Cyber |
Predators Coffee-Shop-Data-Collectors | Bullying occurs when people send or post | ||
“Script-Kiddies” (what you might think of | mean or threatening text or pictures on | ||
as “hackers”) Viruses / Trojans / Ad-Ware | the Internet. Examples: A kid could post | ||
Those who take advantage of children & | stories about another kid online. They | ||
teens Use “Social Engineering” to | could show the website to all of their | ||
manipulate victim Sexual Intentions | friends. When the victim goes back to | ||
Murderous Intentions Other Malicious | school, he/she gets teased about something | ||
Intent Phishing Attempts (Masquerading as | they don’t know about. If a friend had | ||
a trustworthy entity while attempting to | your password, and you got into a fight, | ||
acquire sensitive information) Scam | they could send mean emails to everyone in | ||
Artists Email scams are meant to take your | your address book. When your friends or | ||
money Scams on Craigslist that are using | family open the email, they would think | ||
you to commit fraudulent activities. | that it came from you! They could feel | ||
4 | Coffee-Shop-Data-Collectors. Most | very hurt and upset. Source: | |
public wireless connections are NOT secure | http://library.thinkquest.org/06aug/01158/ | ||
It’s easy to capture your data Don’t log | ome.html. | ||
into websites that reveal your sensitive | 21 | Cyberbullying Possible warning signs | |
credentials (email, bank account, etc.) | of children being bullied or bullying | ||
Use onboard firewall software Lock your | other children. Complaining that other | ||
screen before leaving your seat Don’t | children or a group of children do not | ||
store sensitive information on your | like them. Preoccupation with friendship | ||
computer Use an encrypted VPN (Virtual | concerns. Poor self-esteem. Feeling they | ||
Private Network). | are not as good as others. Not wanting to | ||
5 | Coffee Shop Scenario. Typical | go to school or other activities. Spending | |
unsecured wireless connection. This is | a great deal of time on the computer. | ||
what you think that you are logging into… | Being secretive about online activities. | ||
6 | Man In The Middle Attack. The | Source: Internet Safety PowerPoint - A | |
Man-In-The-Middle grabs and/or modifies | Parent's Guide to the Internet: | ||
data that is sent/received. | http://criminaljustice.state.ny.us/missing | ||
http://www.interlinknetworks.com/whitepape | i_safety/mediafiles/isafety_parents6.ppt. | ||
s/Link_Layer_Security.htm. | 22 | Cyberbullying Dealing with | |
7 | VPN – Virtual Private Network. Protect | Cyberbullying. Preserve evidence – this is | |
your traffic by encrypting it. | crucial for identifying the bully and | ||
http://myvpnreviews.com/ | making a case. Attempt to enlist | ||
http://en.wikipedia.org/wiki/Virtual_priva | assistance from the service provider. If | ||
e_network | able to identify the bully, contact him or | ||
http://www.interlinknetworks.com/whitepape | her and/or parents. Use available blocking | ||
s/Link_Layer_Security.htm. | technology (i.e., block the user on IM, | ||
8 | Youth Online Safety. It is clear, | email and chat.) In serious cases, seek | |
then, that the definition of “youth online | assistance from the police (i.e., threats | ||
safety” has broadened and become more | of physical harm, unrelenting or unable to | ||
complex in the past 10 years, as have the | stop.) Source: Internet Safety PowerPoint | ||
role of the online user and the | - A Parent's Guide to the Internet: | ||
inter-connected devices today’s user takes | http://criminaljustice.state.ny.us/missing | ||
advantage of when consuming, socializing, | i_safety/mediafiles/isafety_parents6.ppt. | ||
producing, and connecting. In addition to | 23 | Cyberbullying Dealing with | |
cyberbullying, inappropriate content, and | Cyberbullying. Some links worth looking | ||
predation, other risks have emerged, | at: | ||
including “sexting” and the risks related | http://wiki.ucalgary.ca/page/Cyberbullying | ||
to geolocation technology in online | http://www.stopcyberbullying.org | ||
applications and on mobile phones. Source: | http://www.wiredsafety.org/ | ||
OSTWG Article, "Youth Safety on a | http://www.wiredsafety.org/fbprivacy/index | ||
Living Internet“ Online Safety and | htm. | ||
Technology Working Group (OSTWG). | 24 | “Sexting”. A recent study by the Pew | |
9 | Desired Outcomes. Physical Safety – | Internet & American Life Project | |
freedom from physical harm Psychological | “found that 4% of cell-owning teens ages | ||
Safety – freedom from cruelty, harassment, | 12-17 say they have sent sexually | ||
and exposure to potentially disturbing | suggestive nude or nearly nude images or | ||
material Reputational and Legal Safety – | videos of themselves to someone else via | ||
freedom from unwanted social, academic, | text messaging.” Fifteen percent of young | ||
professional, and legal consequences that | respondents “say they have received such | ||
could affect users for a lifetime | images of someone they know via text | ||
Identity, Property, and Community Safety – | message.” Source: OSTWG Article, | ||
freedom from theft of identity & | "Youth Safety on a Living | ||
property. | Internet" | ||
10 | Statistics. 75% of children and teens | 25 | “Sexting” - Consequences. Photos sent |
report sharing personal information about | to boy/girlfriend could potentially be | ||
them and their families to complete | distributed over school, especially after | ||
strangers in chat rooms1 93% of American | a breakup One could suffer legal | ||
teens (ages 12-to-17) use the Internet2 | consequences after distributing nude | ||
73% of American teens use social network | photos of an underage minor criminal | ||
sites2 75% of American teens own cell | charges listed as registered sex offender | ||
phones2 4% of American teens have sent | Criminal charges could result in... | ||
sexually suggestive images or videos of | permanent expulsion from school loss of | ||
themselves via cell phone, and 15% have | job opportunities (due to lack of | ||
received such images from someone they | education and/or sex-offender job | ||
know2 43% of teens have been victims of | regulations & limitations) can't | ||
cyberbullying3 Sources are referenced in | reside near school areas Example: | ||
Resources slide near the end of this | http://www.themonitor.com/articles/palmvie | ||
presentation. | -38189-school-charge.html. | ||
11 | Avenues for Online Communication. | 26 | Viruses / Trojans / Ad-Ware. Internet |
Avenues for online child communication: | Explorer uses Active-X controls for easy | ||
blogs, chat rooms, irc, IM, Facebook, | software installation – not safe Use Web | ||
Facebook chat, MySpace, Orkut, email, | Browser Alternatives: Firefox, Opera, | ||
Skype, Twitter, Identica, Craigslist, | Safari Use Virus Software: Symantec, | ||
forums, text messages, etc…. | McAffee, ClamWin, etc Regular Windows | ||
12 | Protection Methods for Youth (& | Updates (weekly) Don’t open email | |
you!). Educate your child about the | attachments unless you know for certain | ||
dangers that exist on the Internet Studies | what they are. | ||
show that: Fear-based scare-tactics are | 27 | Viruses / Trojans / Ad-Ware. Software | |
not effective Use the "norms" | is available to CSU employees through | ||
approach - suggest that [insert behavior | ACNS: | ||
here] is not a “norm” among youth's peers | http://www.acns.colostate.edu/?page=downlo | ||
and that people who engage in such | ds | ||
activity are abnormal and may need help. | http://www.acns.colostate.edu/?page=downlo | ||
13 | Protection Methods for Youth (& | ds_sls_free Download & Install | |
you!). Educate you child about safe | Symantec AntiVirus using links above. | ||
Internet practices Use strong passwords | Spybot Search & Destroy | ||
(including numbers, special characters, | http://www.safer-networking.org/en/downloa | ||
and combination of upper/lower case) Never | /index.html. | ||
give password to anyone Don't communicate | 28 | Thank You! Darrin Goodman email: | |
online with people you don't know Enable | Darrin.Goodman@ColoState.EDU phone: | ||
& elevate privacy settings in Facebook | 970.491.2734 This presentation is located | ||
Disable Facebook Chat Do not allow Skype | online at: | ||
calls from anyone who is not on your | http://www.ext.colostate.edu/staffres/pres | ||
contact list Teach kids about responsible | ntations/socialmedia. | ||
communication. | 29 | References from Slide #10. The Safe | |
14 | Protection Methods for Youth (& | Surfin' Foundation OSTWG Article, | |
you!). Do not share specific information | "Youth Safety on a Living | ||
about yourself, such as family info, where | Internet" Internet Safety PowerPoint | ||
you live, photos of yourself or your home, | - A Parent's Guide to the Internet: | ||
etc. Use an alias for Web communications, | http://criminaljustice.state.ny.us/missing | ||
not your real name / also use avatar that | i_safety/mediafiles/isafety_parents6.ppt. | ||
is different from your actual photo Don't | 30 | Resources, Articles, Videos, & | |
say anything online to someone that you | More Information About Internet Safety. | ||
would not be willing to say directly to | Internet Safety – Keeping it Real: | ||
their face in person Don't open email | http://library.thinkquest.org/06aug/01158/ | ||
attachments unless you know for certain | ome.html Dateline NBC Online Safety Kit: | ||
what it is Be aware that actions have | http://www.msnbc.msn.com/id/15162866/ The | ||
consequences - ex: nude photos, bad | Online Safety and Technology Working Group | ||
language, inappropriate conduct, etc. - | (OSTWG): | ||
could have legal impacts, embarrassment, | http://www.ntia.doc.gov/advisory/onlinesaf | ||
or affect future job opportunities Inform | ty OSTWG Article, "Youth Safety on a | ||
you (the parent or another authority | Living Internet: | ||
figure) if the child has experienced | http://www.ntia.doc.gov/reports/2010/OSTWG | ||
anything online that makes him/her feel | Final_Report_060410.pdf Some guidelines | ||
creepy or uncomfortable. | for protection: | ||
15 | Protection Methods for Youth (& | http://www.ehow.com/how_4542712_protect-ch | |
you!). Use Internet Content Filters | ldren-online-sexual-predators.html | ||
Software that filters out unwanted | Division of Criminal Justice Services - | ||
websites, such as pornography IP Addresses | Internet Safety Presentations & | ||
can be filtered using your router or your | Resources: | ||
Web browser Place computer in living room | http://criminaljustice.state.ny.us/missing | ||
or other "common" area within | i_safety/videos_presentations.htm Internet | ||
your home Regulate length of time child | Safety PowerPoint - A Parent's Guide to | ||
spends on Internet as well as determine a | the Internet: | ||
window of time for usage Request list of | http://criminaljustice.state.ny.us/missing | ||
email and social networking sites being | i_safety/mediafiles/isafety_parents6.ppt | ||
used and username/password for each | The Safe Surfin' Foundation: | ||
account Perform random checks on your | http://www.safesurfincentral.org eHow.com | ||
teenager's cell phone to view text | - How to Protect Children From Online | ||
messages sent/received. | Sexual Predators: | ||
16 | Passwords. Strong Passwords: Phrases, | http://www.ehow.com/how_4542712_protect-ch | |
mixed case, special characters, and long: | ldren-online-sexual-predators.html | ||
- 5db10mw! (Slow Down Buddy I’m On My | Teaching Teenagers About The Danger of | ||
Way!) - w@yD0wny0nd3r#% (Way Down Yonder | Internet Predators: | ||
#%). | http://parenting.families.com/blog/teachin | ||
17 | Passwords. Password Card: | -children-about-the-danger-of-internet-pre | |
http://www.passwordcard.org/en. | ators Video: Tracking Teresa: | ||
18 | http://www.netsmartz.org/stories/teresa.ht | ||
19 | Content Filtering. Commercial Software | Video: CBS News - Finding Internet | |
for Content Filtering: Cyber Patrol: | Predators - The Alicia Kozakiewicz Story: | ||
http://www.cyberpatrol.com CyberSitter: | http://www.cbsnews.com/video/watch/?id=337 | ||
http://www.cybersitter.com InternetSafety: | 194n Dateline NBC - To Catch A Predator: | ||
http://www.internetsafety.com/safe-eyes-pa | http://www.msnbc.msn.com/id/10912603 Net | ||
ental-control-software.php ContentWatch: | Smartz: | ||
http://www.contentwatch.com NetNanny: | http://www.netsmartz.org/index.aspx Net | ||
http://www.netnanny.com (powered by | Smartz Teens: http://www.NSTeens.org | ||
ContentWatch - also works on mobile | Kideos: http://www.kideos.com Online | ||
devices) Panda Internet Security: | Safety and Technology Working Group: | ||
http://www.pandasecurity.com/security-prom | http://www.ntia.doc.gov/advisory/onlinesaf | ||
tion/usa/panda-internet-security PC | ty Additional resources: | ||
TattleTale Parental Control: | http://www.ncjrs.gov/internetsafety/childr | ||
http://www.pctattletale.com Aobo Porn | n.html. | ||
Filter - Website Blocker: | |||
Safe Practices for Internet Usage (Internet Safety…).ppt |
«English for you» - Твои школьные учебники. Ты научишься правильно строить предложение. Что ты научишься делать и узнаешь. Узнать насколько хорошо ты усвоил материал тебе помогут: ENGLISH FOR YOU. Грамматика станет твоим другом. Викторины Задания Игры Игровые упражнения Ты можешь выбрать уровень сложности. Слова и выражения по темам.
«Работа в Internet» - Вызов. Интерактивная работа в internet. Skype. Поиск пользователя. Программа NetMeeting. Непосредственное общение, как при обычной беседе в реальной жизни. Общие приложения. Тема 13. Кафедра МИОЭС Ст. преподаватель Гончаров Сергей Леонидович. MOO (Object-Oriented MUD) - объектно-ориентированный многопользовательский мир.
«Языковые курсы Net languages» - Фонд Магистр и Net Languages. Фонд Магистр является официальным представителем школы Net Languages в России. Скотт - автор многих работ, увенчанный многочисленными наградами. Публикации Скотта. Перечень доступных курсов в 2006 - 2007. Фонд Магистр предоставляет сопутствующие услуги по обучению иностранным языкам за рубежом.
«Английский язык РУДН» - Вклад в становление России как региона «экономики знаний». Использование законов по признанию эквивалентности дипломов. Ожидаемые магистерские программы на английском языке. Через междисциплинарность интернационализируются наука и образование. Целевые группы обучения в магистратуре на английском языке в университетах РФ.
«English for you» - Ты сможешь совершенствовать своё произношение. Артикль Множественное число Предлоги. «Английский для тебя» (курс английского языка с применением ИКТ). Грамматика станет твоим другом. При выполнении заданий программа оценивает твой результат и предоставляет отчёт. EuroTalk. Узнать насколько хорошо ты усвоил материал тебе помогут:
«Языковые лагеря» - Языковые лагеря в России и за рубежом. Языковые лагеря. Искра. Елочки. Распорядок дня. Москва. Workshops. Тематические вечеринки. Knowledge control. English lessons. E-Camp explore Europe.