19
Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Embed Size (px)

Citation preview

Page 1: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Museum Entrance

Welcome to the Lobby

Online Safety E-Mail SafetyBlogging Safety

Website Safety

Internet Safety Museum

Octavia HolleyOctavia Holley

Artifact1

Page 2: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

Octavia Holley

•I was born in Sylacauga, AL on January,10 1997.

•My parents names are Angela McElrath and Stefan Holley.

•I go to school at Childersburg Middle School and I am in the eighth grade

•When I graduate high school I want to go to school to become a doctor.

•I have two younger brothers whose names are Quotin Holley and Quincy Holley.

•I am in Jr. Beta Club, FBLA, and Math Club.

Back to Lobby

Note: Virtual museums were first introduced by educators at Keith Valley Middle School in Horsham, Pennsylvania. This template was designed by Lindsey Warneka under the direction of Dr. Christy Keeler during a Teaching American History grant module. View the Educational Virtual Museums website for more information on this instructional technique.

Page 3: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

Online Safety

Artifact 2 Artifact 3 Artifact 4

Page 4: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

E-Mail Safety

Artifact 5 Artifact 6 Artifact 7

Page 5: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

Website Safety

Artifact 8 Artifact 9 Artifact 10

Page 6: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

Blogging Safety

Artifact 11 Artifact 12 Artifact 13

Page 7: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

1. You can never be too safe on the internet!!!!!

2. Don't keep your personal or financial information on your computer.

3. Keep your operating system, anti-virus, anti-spyware and firewall software up to date

4. Use anti-virus software and/or firewalls on every computer you own/use.

5. Never give out personal information online

6. Never, for any reason, agree to meet someone face to face that you met online.

7. talk to children about what to do if they see something that makes them feel scared, uncomfortable, or confused

Online Tips Insert Artifact Picture Here

Back to Room 2

Page 8: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

Cyber Bullying Insert Artifact Picture Here

Back to Room 1

Cyber bullying is when a person is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another person using the internet, interactive and digital technologies, or mobile phones. Students participating in cyber bullying while at school will face disciplinary action. In addition, students participating in cyber bullying off school campus that disrupts or negatively affects the school environment may also face disciplinary action. Law enforcement officials may be contacted if deemed necessary by school officials.

Page 9: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

While online you are online you need to be aware of cyber bullying. Be aware of what you do or put online because anyone can get into your computer and get any information that they need to know about you. Look out for suspicious advertisements, and any harassing messages or instant messages from someone that you just met online. Never give anyone online any information about you. Always be aware of what you do online.

Being aware online Insert Artifact Picture Here

Back to Room 1

Page 10: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

Preventing Harassments online

Insert Artifact Picture Here

Back to Room 1

Net bullying takes place far more often than most adults realize. Few kids have gotten away without knowing someone who has been net bullied, net bullied someone else or been the victim of net bullying themselves. preteens and young teens receive these and similar threats and hateful messages every single day. Yet for some reason, it has remained under their parents' radar. Middle schools in the United States (approximately 2000 children) have either experienced net bullying or had a close friend who did or had net bullied another. Net Bullying may include instant messaging, cell phones, interactive games, text-messaging, websites, profiles, blog, discussion boards, guest books and provocative postings and websites targeting the other with humiliations. Sometimes the bullying takes place through the use of a website. If you are getting harassed online let someone know the minute that it starts happening. Don’t reply to any messages or they will continue to harass you.

Page 11: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

E-Mail SafetyInsert Artifact Picture Here

Back to Room 1

If you get harassing messages tell someone that you can trust and can help you. Never open attachments from unknown sources. They may contain viruses which can damage your PC. Don't reply to unsolicited messages ("spam") mail, or other harassing or offensive mail. By responding, you only confirm that you are a person with an active e-mail address who can be plagued with constant unwanted e-mail solicitations. Instead, forward the unsolicited message to the customer service department of the source's e-mail. Always use a secure network. Most corporate networks and Internet service providers are protected by administrators who watch for potential security problems and act to protect users from "hackers" who may try to steal personal information that is transferred through the network. Use caution when revealing personal information, such as your physical address, to anyone you meet in cyberspace; even if they claim to be someone of authority.

Page 12: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender. There are two types of spam and they can have different effects on Internet users. Cancellable Usenet spam is a single message sent to 20 or more Usenet newsgroups. Usenet spam is aimed at "lurkers", people who read newsgroups but rarely or never post and give their address away. Usenet spam robs users of the utility of the newsgroups by overwhelming them with a barrage of advertising

or other irrelevant posts. Spam is the bane of small businesses’ existence. It can not only bring viruses onto your network, but it can take over your computers and send spam

to other computers and it impacts you in other ways. Stop spam before it stops you!!!

Spam Insert Artifact Picture Here

Back to Room 2

Page 13: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

Email users are being bombarded with authentic-looking messages that instruct them to provide sensitive personal information. It's called "phishing,“ Individuals who are exposed to identity theft. Phishing occurs when a consumer receives a deceptively-legitimate looking email from what appears to be a reputable company. The email asks recipients to update their credit card information or their account will be promptly terminated. Or the message offers a service to protect their credit cards from possible fraud. Phishing messages will use legitimate 'From:' email addresses, logos, and links to reputable businesses such as AOL, PayPal, Best Buy, EarthLink and eBay in the message. But the message instructs you to click on a web link that sends you to a fake website where you are asked to provide personal information to the scam artists. Sites will ask for information such as your name, address, phone number, date of birth, Social Security number (SSN), and bank or credit card account number. Providing this kind of information can leave consumers at risk for identity theft. Consumers who receive an email that fits the description of a phishing email should:

•Contact the legitimate company named in the email to confirm whether the request is from them. •Forward the suspicious email to the Federal Trade Commission's address for unsolicited commercial email

•You may also want to send the bogus email to the Anti-Phishing Working Group

Phishing Insert Artifact Picture Here

Back to Room 2

Page 14: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

Kids use the Internet for hours upon hours each week. They can navigate themselves very well around the World Wide Web. Kids use the Internet to research for school papers or assignments, playing games, and social networking. Being properly educated about online dangers is the best way to protect yourself and your family from MySpace, Facebook, and many other social networking sites. Social networks have become one of the principle modes of communication for the millennial youth. Social networking has become one of the most popular ways to find friends, family, and form new relationships with people all over the world. You can use social networks to write journal entries, post pictures for family and friends to see, and join social network groups with millions around the country. For children who sign up to use social networks like Facebook or MySpace there are some precautions they should take before becoming a user on these social networks. Here are some suggestions:

•Don't ever post anything you wouldn't show your parent or guardian or anything you wouldn't want them to see.

•Don't post your personal information on the Internet.

•Don't add anyone as a friend to your page unless you have actually met them in person.

Social Networking Insert Artifact Picture Here

Back to Room 3

Page 15: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

If you have a Web site or a Web page, it is very possible that without actually realizing it you are giving away information about yourself to complete strangers. you have a responsibility to ensure that your Web site or Web page is as safe as possible both for yourself and for those who access it. That means that you have a Privacy Policy

•Don't use your real name in your e-mail address. Do use an anonymous e-mail address if possible

•Don't use your home telephone number on your Web site. Do get a second number or cell phone that you only use for the business.

•Don't ask for personal information unless you really need it and the process is secure. Do make sure you have a Privacy Policy and a secure server if you collect information.

Personal Information Insert Artifact Picture Here

Back to Room 3

Page 16: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

One of the biggest concerns among visitors to Web sites is how their personal information is going to be used. March of 2000, Business Week did a cover story on Internet privacy, including a survey showing that the vast majority of users were either very or somewhat concerned about how their information would be used. Most websites have posted private policies. A private policy is a disclosure document, which informs and therefore protects consumers. Social networking platforms give users the opportunity to control how their information is shared. Although users can modify many settings, the privacy policy states “Our Services are primarily designed to help you share information with the world. Most of the information you provide to us is information you are asking us to make public." Social networking then, requires users to by discerning about the information which they share and who is able to view it.

Privacy Policy Insert Artifact Picture Here

Back to Room 3

Page 17: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

•Never offer any personal information including your last name, contact information, home address, phone numbers, school's name, e-mail address, last names of friends or relatives, instant messaging names, age, or birth date.

•Never post provocative pictures of yourself or anyone else, and be sure any images you provide do not reveal any of the previously mentioned information. Always remember to look at the background of a picture too.

• Assume what you publish on the Web is permanent.

•Keep blogs positive and don't use them for slander or to attack others.

Blogging Tips Insert Artifact Picture Here

Back to Room 4

Page 18: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

consider what information you do and don’t reveal online about where you live and your family because someone can track you down easily. Decide how much personal information you want to share on the blog. Revealing too much information can have anyone access to you quickly. Consider the way you are perceived online. recommend giving some thought to how you will deal with escalating situations that could lead to personal safety problems. Online stalkers is one thing that you should be aware of while blogging online.

Preventing Blog Stalkers Insert Artifact Picture Here

Back to Room 4

Page 19: Museum Entrance Welcome to the Lobby Online Safety E-Mail Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1

Name of Museum

More than 133,000,000 blogs have been indexed by Technocratic since 2002. In January 2002 41,000 people created a new blog using Blogger. In August 2002 Blogger had more than 50,000 people and were creating a new blog every 40 seconds. In June 2003 there were between 2.4 million to 2.9 million active blogs. Based on survey 3,634 blogs on eight blog hosting services Pursues claimed that as of October 2003 there were about 4.12 million blogs. In May 2004 Technocratic claimed to track 2.4 million blogs, increasing to 11.7 million blogs in June 2005. In March 2008 184 million people had started a blog. Two-thirds of Bloggers are male. Part-Timers, Pros, and Self-Employed Bloggers are blogging as much as or more than ever.

Blogging Statistics Insert Artifact Picture Here

Back to Room 4