Anda di halaman 1dari 12

Internet Dangers

By Daniel Hopkins
Cyberbullying:
Definition: the act of bullying via technology such as
cellphones, computers, and social media

The ability to communicate behind the safety and


anonymity of a screen, though helpful in many
ways, can also make us ignorant of the
consequences of our words.

Because technology is available 24/7, anytime and


place, it gives bullies a platform to hurt their target
constantly and incessantly. In addition, social media
allows bullies a platform to humiliate their target in
front of large groups of peers.
Preventing Cyberbullying
Do not encourage the bully by responding to
their tactics
Utilize the block option to disable the bully
from contacting you at all
There is no shame in asking for help; notify a
parent or trusted adult of the harassment
Keep all personal accounts password protected;
change your password frequently
DO NOT POST, TEXT, OR SHARE ANYTHING
NEGATIVE
Using Social Media
Golden Rule: Dont post anything you wouldnt
want your parent/guardian to see!

Only add and interact with friends; no


strangers!!
Keep your settings on private
Keep your password private (even from
friends!!)
Do not overshare personal information,
especially concerning personal whereabouts
or plans
Online Etiquette
Always start emails with professional
prefixes (i.e. Mr., Mrs., Professor)
Emails are formal letters and should
be written as such
Utilize proper grammar and
punctuation
Professional usernames and email
addresses are important -- first
impressions make a big difference
Online Reputation
Colleges and Universities as well as
Employers look at Social Media Profiles of
Applicants
DO NOT post photos with alcohol or any
illegal substances
Err on the side of caution when deciding to
post or share a photo
Social Media is supposed to be fun, but
understand that anyone can view your
profile!
Predators
1 in 7 children have been Sexually Solicited
by an online predator
Online predators are attracted to children
who are in need of a friend
Online predators groom children by
appealing to their interests, boosting
confidence with kind words, and giving them
attention
Be wary of anybody you have not met face
to face!
Inappropriate Photos
20% of teens have sent or posted nude
or semi-nude photographs or videos of
themselves
Sending or forwarding inappropriate
images is considered distribution of child
pornography -- a serious offense!
Simple as this: DO NOT send
inappropriate photos of yourself or your
friends to others
Personal Information
Oversharing can attract online predators!
It is especially important to be wary of sharing personal information such as
Credit Card Information, Social Security Numbers, and Addresses, which can
be useful to Identity Thieves
Make sure when you enter your personal information -- make sure the website
is legitimate
Americans have been affected by Internet Identity Thieves in the past 5
years alone
Internet Addiction

Video game/Social Media Addiction


Symptoms include withdrawal from friends and family, significant weight gain
or loss, sleep deprivation, academic decline, replacing real world
relationships with in-game friends, and prioritizing in-game achievements
over real world achievements. http://www.myactionalert.com/dangers.aspx
Try to limit your online interactions and maximize your face-to-face, real life
interactions
Make sure you are not feeling like you need to go on Social Media or other
online sites
Sources
15 Essential Netiquette Guidelines to Share with Your Students. (n.d.). Retrieved February 25, 2017, from
http://www.educatorstechnology.com/2014/06/15-essential-netiquette-guidelines-to.html
A. (2015, December 01). THE POWER OF NO. Retrieved February 25, 2017, from
http://saucedinnewyork.com/2015/12/the-power-of-no/
C. (2015, July 13). Task force launched in US Virgins Islands to crack down on child predators. Retrieved February 25,
2017, from
http://www.caribbean360.com/news/task-force-launched-in-us-virgins-islands-to-crack-down-on-child-predators
Do You Have Good Netiquette? (n.d.). Retrieved February 25, 2017, from
http://wonderopolis.org/wonder/do-you-have-good-netiquette
Dos and Don'ts: Workplace Internet and E-Mail. (n.d.). Retrieved February 25, 2017, from
http://smallbusiness.findlaw.com/employment-law-and-human-resources/dos-and-don-ts-workplace-internet-and-e-ma
il.html
INTERNET SAFETY 101:. (n.d.). Retrieved February 25, 2017, from http://www.internetsafety101.org/
Sources (Continued)
January 3, 2014 by CJ Castillo | Tags business cable, business internet. (2014, January 20). Top 5 Risks of Employee
Internet Usage. Retrieved February 25, 2017, from
http://www.bandwidthplace.com/top-5-risks-of-employee-internet-usage-article/
Kam, K. (n.d.). 4 Dangers of the Internet. Retrieved February 25, 2017, from
http://www.webmd.com/parenting/features/4-dangers-internet#2
Mohamed, F. (2014, December 02). The Global Geography Of Internet Addiction. Retrieved February 25, 2017, from
http://www.huffingtonpost.com/2014/12/02/global-internet-addiction_n_6253892.html
Online Reputation Management. (n.d.). Retrieved February 25, 2017, from
http://dizimark.com/index.php/services/digital-marketing/online-reputation-management/
Parents, Wake Up: The Hidden Dangers of the Internet. (n.d.). Retrieved February 25, 2017, from
http://www.futureofbusinessandtech.com/online-and-mobile-safety/parents-wake-up-the-hidden-dangers-online
Safety. (n.d.). Retrieved February 25, 2017, from http://www.myactionalert.com/dangers.aspx
Think B4 U Post. (2016, November 28). Retrieved February 25, 2017, from
http://www.browardprevention.org/violence/internet-safety/internet-safety-curriculum/think-b4-u-post/
Security. (n.d.). Retrieved February 25, 2017, from http://www.socialmediatoday.com/tags/security