Computer Science LearnITWithMrC ⛯ Year 7 Year 8 Year 9 GCSE
Responsive image

E-safety Introduction

Overview
Flight Path
Learning Objectives
0 results forGuest
IDSkill_name
 1 I can use technology safely and responsibly
 3 I can demonstrate understanding of ways to report concerns
 1 I can take measures to protect my identity and privacy when using the internet
 2 I can identify good and bad online behaviour, including cyberbullying and scams

🏁 Learning Objective 1 :- I can use technology safely and responsibly


Scratch

Staying Safe Online

The Internet is much more anonymous than the real world. People can hide their identities or even pretend to be someone they're not. This can sometimes present a real danger to children and teens who are online. Online predators may try to lure kids and teens into sexual conversations or even face-to-face meetings. Predators will sometimes send obscene material or request that kids send pictures of themselves. Therefore, it's important to to be on your guard whenever you're online.

Teens are generally more at risk from predators. Because they are curious and want to be accepted, they may talk to a predator willingly, even if they know it's dangerous. Sometimes teens may believe they are in love with someone online, making them more likely to agree to a face-to-face meeting.

To learn more about the dangers of online predators, watch the video below.

Using technology safely

You'll need to know about the different types of online dangers that exist. For example, kids and teens may find inappropriate content on the Internet, such as pornography or obscene language.

There is also a possibility of cyberbullying or cyberharassment from others online. This does not mean you will encounter all of these threats. However, knowing about the dangers can help you and you make smart decisions online.



Task

Create a Powerpoint with the title "Staying safe Online"

  1. Then create a page like the one below and put down the dangers and the way to avoid the dangers.


Main Task - Be SMART

Add another slide to your powerpoint

Plan out a SMART poster like the one below using the letters of SMART to warn people about the Dangers of being online



Update your objectives

control

🏁 Learning Objective 2 :- I can demonstrate understanding of ways to report concerns


Scratch

Protecting your identity and privacy

To learn more about the dangers of online predators, watch the video below.

Setting up a social networking profile

Even though sites like Facebook give you some control over what information is shared, some parts of your profile are usually visible to everyone. If your children are setting up online profiles, they should take precautions to make sure their profiles aren't revealing too much information. Let's take a look at how to set up a safe and appropriate profile.

Screen name

Should you use your full name, first name only, or a pseudonym (fictitious name)? It may be okay to use your full name on sites like Facebook and Linkedln where you can limit your sharing to the people you know. On a message board or chat room, you should not use your full name, since you are interacting with people you don't know. Instead, you can just use your first name or a pseudonym.

Profile picture

Many sites allow you to choose a profile picture. This can either be a photo or an avatar, which is a graphical image that represents you. On Facebook, most people use photos of themselves. However, on a more public site (such as a discussion board), you may want to use an avatar, as it allows you to remain more anonymous.

Keep in mind that many different people will be able to see your profile picture. Therefore, it's important to choose a picture that won't reflect negatively on you. It's possible for a photo to get you into trouble at school or damage your reputation.

Profile information

You should be careful about what personal information you share. If you have the option of making your info private to just you and your friends, you should choose this option. You should never make your birthday or home address publicly viewable.

Contact information

Generally speaking, you do not want to include any contact information other than your email address. Do not use home phone numbers or addresses. If you must include a phone number, use a mobile phone number.

It may also be a good idea to create a separate email address for social networking connections in order to protect your normal account from getting cluttered with spam and phishing emails.

Image and personal information

Many sites allow you to customize your profile with wallpaper, personal interests, likes and other types of information like relationship status. Always keep in mind what type of public image you want to project as you choose how to customize your profile and what types of information to include.

Your online image will become more important when you begin applying for jobs or to college. Anything that is inappropriate may lower someone's impression of you. Even if you're not worried about it now, don't post anything that's going to come back to haunt you in a few years.


Task 2

Add another slide to your powerpoint with the title

Protecting your identity and privacy

  1. Explain the things you can do to protect your identity and privacy


Extension Task

Add another slide to your powerpoint

Explain in it how not protecting your privacy might affect your future wellbeing


Update your objectives

control

🏁 Learning Objective 3 :- I can take measures to protect my identity and privacy when using the internet


bullying

Cyberbullying and cyberharassment

Cyberbullying is bullying that occurs online, often through instant messaging, text messages, emails, and social networks. Cyberbullies may be the same age as the victims, or they may be older. If the perpetrator is an adult, it is generally called cyber-stalking or cyberharassment.

Cyberbullying can be just as hurtful as other types of bullying, and in some ways it can actually be worse. Cyberbullying is not limited to the playground; it can occur anytime children are online, even if they're at home. Also, the bully can sometimes remain anonymous, which can make the bullying more difficult to stop.

Avoiding spam and phishing

From email to instant messaging to social media, the Internet is an essential communication tool. Unfortunately, it's also popular among scammers and cybercriminals. To protect yourself from email scams, malicious software, and identity theft, you'll need to understand how to identify and avoid potentially dangerous content in your inbox, including spam and phishing attempts.

Phishing scams are messages that try to trick you into providing sensitive information. These often appear to come from a bank or another trusted source, and they'll usually want you to re-enter a password, verify a birth date, or confirm a credit card number. Phishing messages may look real enough at first glance, but it’s surprisingly easy for scammers to create convincing details.


Task 3

Add another two slides to your powerpoint with the titles

Examples of Cyber bullying and What is phishing?

  1. Give different examples of cyber-bullying
  2. Explain what phishing is and how to avoid being scammed by it


Extension Task

Add another slide to your powerpoint

Explain the effects that Cyberbullying and phishing can have on your wellbeing.


Update your objectives

control

🏁 Learning Objective 4 :- I can identify good and bad online behaviour, including cyberbullying and scams


Scratch

Reporting concerns


Task 4

Add another slide to your powerpoint with the title

Ways to report concerns

  1. List the different ways you can report e-safety concerns


Extension Task

Add another slide to your powerpoint with the title

Why you should report any concerns?

Explain why you should always report any concerns you have stright away


Update your objectives

control


0 results forGuest
Recent Comments

Teacher Date: 2024-04-19


Guest