C-SAVE. Level Middle/High School Ethics-copyright. Scenario #2 - Scott s Sorry Slumdog Choice
|
|
|
- Hilda McCormick
- 10 years ago
- Views:
Transcription
1 Grade Level- Middle/High School Ethics-plagiarism Scenario #1 - Brian and His Research Paper Brian has a research paper due next week on the impact of cyber security threats to our national security. He was supposed to have been doing research on this project for the past month, but kept putting it off, and is now in a crunch for time! Rather than find the research, read through it, and paraphrase the key points, Brian thinks it is easier to simply cut and paste some of the paragraphs directly into his paper. He fails to cite many of the publications he copies the information from directly into his paper, thinking there is no way that his teacher will ever know the difference. Please use your knowledge of the C3 concepts to answer the questions provided on your team s reporting form and help Brian use better judgment about how best to use the information he finds online.
2 Level Middle/High School Ethics-copyright Scenario #2 - Scott s Sorry Slumdog Choice Scott s friend Matt posted a message on his own Facebook page that he was able to score an early video release of the new movie, Slumdog Millionaire from a website for only $3.99 plus shipping. He is psyched and wants to share this resource with his friends so he passes the website link onto his friends (including Scott) via Facebook. Scott checks out the website and sees quite a few of the movies he has been planning to purchase when they are officially released on video. This website, however, already has them available and for a lot less money! Scott is very cyber-savvy and questions for a minute if this is a legal website, but decides to go through with the purchase of Slumdog and begins providing personal information including specific payment details. Please use your knowledge of the C3 Concepts and the WWW Decision Tool to answer the questions on your reporting form and help Scott understand the error of his ways.
3 Ethics-cyberbullying Scenario #3 - Caroline Helps Susanne Conquer Cyberbullies Susanne is a new student at Deer Valley High School and has had some difficulty making friends. She is very nice to everyone, but Caroline, a new classmate and true friend to her, has noticed that a group of girls from their English class have started talking behind her back and excluding her from most group activities. Caroline likes Susanne and even s and IM s with her regularly in the evenings to talk about homework or help Susanne figure out who she should ask to go to the homecoming dance with her. One evening Susanne sends Caroline an message and she is clearly very upset. The girls who had been so unkind to her seemed to be coming around, or so she thought. When they invited her to join their group to go to the homecoming dance, she actually thought they were sincerely trying to be friends. Instead, they sent a mass out to all of the boys in her class that spread a completely untrue rumor about why her family moved here and said Beware! She is planning to ask one of you to go to the dance with her! Caroline feels so bad for her new friend. Poor Susanne is devastated and totally embarrassed. Please use your knowledge of the C3 Concepts and WWW Decision Tool to answer the questions on your team s reporting form and help Susanne understand her rights in this situation.
4 Ethics-Impulsivity/Flaming Scenario #4 - John s Impulsivity Makes His Life More Difficult John just started attending a new school in California called Golden Bear Middle School. He has been struggling making new friends and the school work is much more difficult than his old school in South Carolina. He wants to play on his new school s baseball team, but his parents have told him that he has to bring his grades up first. He has been studying, but his grades have still not been going very well. Yesterday at school, John received his Pre-Algebra test back and saw that he got a D on the test. He is understandably bummed because he thought he did pretty well. It didn t help matters when one his new classmates saw his test and made a cruel remark that made him feel dumb. After he got home from school, he impulsively got online and sent a mass out to his classmates saying, Golden Bear Middle School and its students suck! Please use your knowledge of the C3 Concepts and WWW Decision Tool to answer the questions on your reporting form and help John understand the consequences of using this kind of behavior to vent normal school frustrations.
5 Security-phishing Scenario #2 - Jake Gets Caught Taking The Bait Jake was using the Internet on his family s home computer to with some classmates about a really tough homework assignment they had in Geometry class. After finishing his homework, Jake decides to check his family s general account before logging off his computer. In his Inbox Jake sees several messages from his cousins on the East Coast, and another message from: [email protected] with a subject line that reads You Have A Tax Credit. Jake skips his cousin s and opens the message from the Internal Revenue Service. The message is directed to his parents and says that they have overpaid their taxes and are eligible for a $ credit. It looks like a legitimate message, so Jake begins to provide the detailed personal information they are requiring, including his parent s address, date of birth and the name of the bank they use. When he tells his parents what he did, they are really alarmed, and explain to him that this sounds like a scam and no legitimate bank or federal agency would ever ask a customer to provide personal financial information over the Internet. Please use your knowledge of the WWW Decision Tool and C3 Concepts to answer the questions on your reporting forms and help Jake understand how risky it can be to provide this kind of personal information to a virtual stranger online.
6 Security Scenario #3 - Jason Discovers Peer-to-Peer Can Be Painful-to-Play Jason and Dustin are classmates and have recently started using a Peerto-Peer program with several friends from a nearby school to share their favorite music files and play video games. Jason doesn t know all of the guys from the other school well, but figures his friend Dustin does, so they are probably trustworthy. Jason s parents know he uses the P2P program and have extremely clear rules about using it. No downloading of music from illegal websites is one of the rules they went over with him. Unfortunately, Jason didn t realize that while connected to a P2P program, his computer s security is vulnerable not only by his actions, but also by those of the people he is connected to. One of the guys at the nearby school apparently tried to download a bunch of free music from an illegal website and instead received a virus that has now spread to everyone else s computer by way of the P2P program. Please use your knowledge of the C3 Concepts and WWW Decision Tool to answer the questions on your team s reporting form and help Jason understand the risks involved in using Peer-to-Peer programs and the best ways to keep your computer safe.
7 Security - Anti-spyware Scenario #4: Debra s Dream Vacation Becomes Dreary Debra s family feels they are pretty good about protecting their computer from malicious activity or hackers. They use anti-virus software and regularly install the updates, and they use an Internet filter to automatically block inappropriate information from accidentally being accessed online. Recently, however, Debra has received a lot of pop-up ads while she has been online researching places to go for the family s summer vacation. Debra noticed that the ads started popping up right after she clicked on a link to a discounted trip to Hawaii that she researched in the hopes of convincing her parents to take everyone to the Islands! Debra assumed the updated anti-virus software kept her computer secure and protected from annoying and potentially harmful pop-ups. Perhaps she has a few more cyber-savvy tips to learn to become even more protected while connected! Please use your knowledge of the C3 Concepts and WWW Decision Tool to answer the questions on your reporting form and help Debra and her family understand where their computer is still vulnerable and how they can be better protected.
8 Safety-Revealing Too Much Scenario #1: Allison Accidentally Reveals Too Much Allison is a high school sophomore who happens to be a star player on the junior varsity girl s soccer team. She has a MySpace account that her parents know about and regularly posts pictures of her soccer team and their big wins on her profile page. The pictures typically show the girls in their team uniforms with captions that make reference to their upcoming game date and time, and who they plan to play and beat next. Unfortunately, one day after school Allison receives a scary message from an unknown person asking details about when and where the next game is to be held. At first Allison ignores the person, but this only makes them more persistent. She blocks them and immediately tells her parents what happened. Once her parents see her profile page, they are more concerned because, without intending to, Allison has posted pictures and details that reveal a lot of personal information, including what school she goes to, when the girls practice, and who they plan to play next. Use your knowledge of the C3 Concepts and WWW Decision Tool to answer the questions on your reporting form and help Allison and her teammates stay safe.
9 Safety-Making Yourself Vulnerable Scenario #2: Julie s Bad Breakup Becomes Dangerous Kim and Julie s parents are very cyber-savvy and keep the family computer in the kitchen where they can easily monitor what the girls are doing while online. Kim and Julie s parents had a long talk with the girls about expectations for behavior on the Internet and the importance of open communication if something happens online that makes either of them feel uncomfortable. The girls each have their own Facebook profile, and have signed a contract for acceptable use of all social networking sites at home and on friend s computers. Usually the girls follow their parent s rules very well, but Julie just broke up with her boyfriend and is really bummed. She talks about it pretty openly with friends while socializing online. While online one evening, Julie receives a friend request from someone she doesn t recognize. The personal message says, I know how you feel. I m bummed too. My boyfriend and I broke up two weeks ago, right before homecoming! Feel free to me if you want to talk to someone who really understands. Use your knowledge of the C3 Concepts and WWW Decision Tool to answer the questions on your team s reporting form and help Julie understand the serious risks she is taking if she begins communicating with this friend.
10 Safety Scenario #3: Emily Gets Tricked Eighth grade students Emily and Romanita have been good friends since the third grade and have lived in the same neighborhood for just as long. Unfortunately, Romanita s family recently moved to Boston so her mom could pursue a new job as Distinguished Professor of Cyber Security at Harvard University. Now the only way these girls can communicate is through and a social networking site that both sets of parents have approved of them using. While on the social networking site one afternoon, Emily receives a message to her profile from someone asking to be her friend. The message reads, Sendme a pic and we ll be friendz too! Emily is very cyber-savvy, but sees that the unknown contact s address reads [email protected]. She quickly assumes that this unknown person is a new friend of Romanita s and accepts the friend request, eager to share in a little of Romanita s new Boston life. Now that Emily is friends with this online stranger, he/she begins to ask her personal information including her address and what school she attends. Emily starts to feel uncomfortable and doesn t respond. Please use your knowledge of the WWW Decision Tool and C3 Concepts to answer the questions on your reporting form to help Emily handle this situation and avoid this problem in the future.
11 Safety-gaming Scenario #4: Trevor and Steve s Unsafe Gaming Habits Trevor and Steve have been neighbors since the third grade and are very good friends. They are seriously into video games, and their families are constantly telling them to turn the games off and join the rest of the world! Because their parents are good friends, they share information, and both have the same set of concerns about how plugged-in both boys are when they are in the middle of a video game. Trevor s mother complains, It is like he completely tunes me out! While Steve s mother agrees, she is also growing more and more concerned that it is actually physically not good for him to be so plugged into video games, especially when some of them are very violent. Both sets of parents don t want to restrict their teenage sons from using video games, but agree that their current video game behavior is unsafe for their wellbeing and something has to change. Use your knowledge of the C3 Concepts and WWW Decision Tool to answer the questions on your reporting form and help find a realistic and suitable alternative to this situation.
C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
National Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School [email protected]
CYBER SAFETY, CYBER ETHICS, CYBER SECURITY How to teach the kids about these concepts (a primer from staysafeonline.org program that is available free from the website) YOUR PRESENTERS Maryly Skallos Technology
Related KidsHealth Links. Discussion Questions
Grades 6 to 8 Personal Health Series Online Safety and Cyberbullying KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible
HEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
Class 3: Identify Tricks and Scams Online
Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices
FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
A Time to Tell Troop Meeting Guide
A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as
Connectedness and the Emotional Bank Account
Connectedness and the Emotional Bank Account Directions This is a self-guided activity that can be completed by parents, teens or both. It contains five parts and should take about 45 minutes to complete.
e-rate toolkit Cyberbullying: Crossing the Line
e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview
objectives teaching plans Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Key Vocabulary
e-rate toolkit Private Today, Public Tomorrow Lesson Plan Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility
EADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12
Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect
Case study: What the? Online scams and identity theft
Case study: What the? Online scams and identity theft Theme The internet and mobile technologies are a source of scams and identity theft. Key learning/subject areas Cross curricula. Duration One to two
Practicing Interventions: Role Playing
Practicing Interventions: Role Playing You cannot simply explain an intervention technique to students and expect them to use it. They need practice these skills using multiple scenarios, before we can
Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:
Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
2010 Middle School Internet Safety Survey Results
When you are online, people can say whatever they want. ~ 8th Grader A friend pressured me to tell her my password. ~ 5th Grader Plainview Old Bethpage Central School District 21 Middle School Internet
CyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
ONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
Applying to Physical Therapy Schools. Alyssa Montanaro Feel free to have any CMU students contact me with questions or advice.
Applying to Physical Therapy Schools Alyssa Montanaro Feel free to have any CMU students contact me with questions or advice. The application process: There are 3 major things you need to prepare for before
Cyberbullying. Understanding and Addressing Online Cruelty. Students Handouts and Supporting Materials for Teachers
Cyberbullying Understanding and Addressing Online Cruelty Students Handouts and Supporting Materials for Teachers Elementary Level Lesson: Building a Foundation for Safe and Kind Online Communication Resources
Self-Acceptance. A Frog Thing by E. Drachman (2005) California: Kidwick Books LLC. ISBN 0-9703809-3-3. Grade Level: Third grade
Self-Acceptance A Frog Thing by E. Drachman (2005) California: Kidwick Books LLC. ISBN 0-9703809-3-3 This Book Kit was planned by Lindsay N. Graham Grade Level: Third grade Characteristic Trait: Self Acceptance
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
GAcollege411 Site Overview Transcript
GAcollege411 Site Overview Transcript College Student Hey little man. High School Student What!!? UGH! Don t call me that! So, home for Spring Break, how s college going? College Student Oh, pretty good,
Private Today, Public Tomorrow
LESSON PLAN Private Today, Public Tomorrow UNIT 4 Essential Question How can you respect the privacy of others online? Lesson Overview Students reflect on their responsibility to protect the privacy of
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
Teens, Online Stranger Contact and Cyberbullying What the research is telling us
Teens, Online Stranger Contact and Cyberbullying What the research is telling us Amanda Lenhart Internet Safety Task Force April 30, 2008 Washington, DC Methodology Interviewed 700 parent-child pairs in
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
Staying Safe.....on social media and online
Staying Safe.....on social media and online What is this guide about This booklet is about how to keep safe when you are using social media and the internet. Some people get called names, are bullied or
MATERIALS: Chart paper/markers; pens; Student handouts: Instant Replay and Staying SAFE
LESSON PLAN: INSTANT REPLAY OVERVIEW: Students discuss and practice safe and realistic responses to name-calling and bullying by role-playing fictional scenarios. They use the instant replay technique,
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
Computer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
WHAT IS SEXUAL HARASSMENT?
WHAT IS SEXUAL HARASSMENT? Sexual harassment is a serious problem for students at all educational levels. Students in elementary and secondary schools, as well as vocational schools, apprenticeship programs,
A Job Seeker s Guide to Discovery
1 A Job Seeker s Guide to Discovery Discovery is a way to find out what you are good at and what you like to do. In your Discovery program, you will learn about different jobs, try different job tasks,
Why is a strong password important?
Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods
Grade 8 Lesson Peer Influence
Grade 8 Lesson Peer Influence Summary This lesson is one in a series of Grade 8 lessons. If you aren t able to teach all the lessons, try pairing this lesson with the Substance and Gambling Information,
What you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
Internet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
Conditional Sentences Third Condition (Past Time - Unreal/ Contrary to Fact)
Conditional Sentences Third Condition (Past Time - Unreal/ Contrary to Fact) Complete the following sentences using the correct form of the verbs provided. Ex. Annie failed her history test, but if she
platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential
Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.
Hector s World Lesson plan Episode: Computer security: Oops Upper primary
Hector s World Lesson plan Episode: Computer security: Oops Upper primary BACKGROUND Students of this age are emerging users of internet-enabled computers. They may be involved in a range of online activities
She Wants Out Part II. Female gang members are second-class citizens. The guys sometimes throw
Carol Adams Huntington Junior College Literary Dictation Material Marked in 20 Word Groups She Wants Out Part II Female gang members are second-class citizens. The guys sometimes throw parties and don
TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus
Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some
Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
ANDRA ZAHARIA MARCOM MANAGER
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
Realistic Job Preview Family Services Specialist (FSS)
Realistic Job Preview Family Services Specialist (FSS) Carol Sideris: I m Carol Sideris, Director of the Division of Client Services, and I m delighted that you re considering a position with us. Over
Online Security Tips
Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized
Dulwich College ICT Acceptable Use Policy
Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These
Related KidsHealth Links
Grades 6 to 8 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards
Comprehension and Discussion Activities for the Movie Bend it Like Beckham
Comprehension and Discussion Activities for the Movie Bend it Like Beckham This module is designed to accompany the award-winning 2002 British film Bend it Like Beckham. Bend it like Beckham is about football,
Dimes to Riches Money Management for Teens in Grades 7-12
Dimes to Riches Money Management for Teens in Grades 7-12 s e e r t n o row g t n s e o yd e n o M t a! h k t n a w b o n a k t u n By now yo Your parents are & Life is getting busy and you need cash for
YOUNG PEOPLE, MUSIC & THE INTERNET
YOUNG PEOPLE, MUSIC & THE INTERNET a guide for parents about P2P, file-sharing and downloading What is P2P? As a parent, you ve probably already heard your children talk about file-sharing, downloading
Social Networking Sites A Predator s Playground?
Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every
Computer Security Self-Test: Questions & Scenarios
Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.
Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee
Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee Government Grants The government gives grants to special people like you! Stimulus money is still available through
Participle. 國 中 英 語 自 助 餐 http://210.240.55.2/~t311/moe/engb5/b5grammar/b5participle.htm
Participle 國 中 英 語 自 助 餐 http://210.240.55.2/~t311/moe/engb5/b5grammar/b5participle.htm Basic 1. Chuck: Did you watch the tennis game between our school and Wanlai Junior High School yesterday? It was
Safety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Guideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
Social Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
UK Now: Mobile Phones
UK Now: Mobile Phones The United Kingdom s international organisation for cultural relations and educational opportunities. A registered charity: 209131 (England and Wales) SC037733 (Scotland). 10 Tips
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
From The Desk of Mrs. Samine Charles Pierre.. INTRODUCING YOUR SCHOOL COUNSELOR
From The Desk of Mrs. Samine Charles Pierre.. INTRODUCING YOUR SCHOOL COUNSELOR What is a school counselor? Your school counselor is a person who is specially trained to help you realize your full potential
THE LITTLE BIG BOOK OF BADNESS
THE LITTLE BIG BOOK OF BADNESS How to stay safe on the Internet a guidebook for students and parents USE THIS BOOK TO FIND OUT HOW YOU AND YOUR COMPUTER CAN STAY AWAY FROM BAD THINGS 2 CONTENTS Why you
SeeWhy Learning s Top-10 LLQP Exam Writing Tips
SeeWhy Learning s Top-10 LLQP Exam Writing Tips How is it that so many students pass the course provider's certification exam (which means they know their stuff) but still fail the actual licensing exam?
Social Media Curriculum Overview
Lessons in K 2 Social Media Curriculum Overview 1. Going Places Safely ( KINDERGARTEN) https://www.commonsensemedia.org/educators/lesson/going places safely k 2 How do I go places safely on the computer?
Hector s World Lesson plan Episode: Computer security: Oops Lower primary
Hector s World Lesson plan Episode: Computer security: Oops Lower primary BACKGROUND Very young students are unlikely to fully understand how computers work. They may have limited understanding about the
Teen Online & Wireless Safety Survey
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications [email protected] 404-269-8057 Cox Communications
TEENS. talking to. about GAMBLING. Our YOUTH ENGAGEMENT. Strategy
Our YOUTH ENGAGEMENT Strategy The Victorian Responsible Gambling Foundation s Youth Engagement Strategy, Gambling s not a Game is about preventing the cycle of gambling-related harm which can start at
Recognizing Spam. IT Computer Technical Support Newsletter
IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
Would You Like To Earn $1000 s With The Click Of A Button?
Would You Like To Earn $1000 s With The Click Of A Button? (Follow these easy step by step instructions and you will) This Version of the ebook is for all countries other than the USA. If you need the
Share Aware Lesson 2 - Lucy
Share Aware Lesson 2 - Lucy Class Key Stage 2 Time 40 mins Date October 2015 Learning Objectives Learning Outcomes Key Vocabulary Resources We are learning about online safety and how to access available
Something Better Than Punishment
Alabama Cooperative Extension System, Alabama A&M and Auburn Universities HE-687 PRINCIPL E S OF Something Better Than Punishment When we think of discipline, we may think of threats and punishment. They
You Must Promote You
You Must Promote You The college softball recruiting process can be very challenging to understand. At times, it can be extremely confusing and frustrating for players and their families. As an organization,
High School Lesson 14. Lesson 14 Credit: Your Best Friend or Your Worst Enemy? High School
High School Lesson 14 Lesson 14 Credit: Your Best Friend or Your Worst Enemy? High School L EARNING, EARNING AND I NVESTING, NATIONAL C OUNCIL ON E CONOMIC E DUCATION, NEW YORK, NY 189 14 Credit: Your
Bullying 101: Guide for Middle and High School Students
Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org
