technologies information and communication. browsing when a computer has a connection to the...
TRANSCRIPT
Technologies
Information and Communication
Browsing
When a computer has a connection to the Internet, the user can view what is on the Internet through a software program called a browser Microsoft's Internet Explorer Netscape's Navigator Mozzila's Firefox Opera
Browsing
WebSite Directory (Folder) of files usually on one
computer called a web server Web server gives other computers on the
Internet permission to access that folder of files
Browsing
Browser assembles the various files that are used to create one Web page and displays that page to the user
Links on pages go to other pages
in this site or
on other sites
Browsing
Following the links from one Web page to another is called browsing or surfing
Browsing
Risks: Inappropriate information Forms to be completed…should not give
information Typo squatting (www.microsofy.com) or
domain name confusion (www.whitehouse.com) can lead to wrong sites
Cell Phones
Mobile phone Many features that go far beyond
the ability to make a phone call text messaging, voice mail, games, email
access, scheduling, and image generation (camera phone)
Cell Phones
Risks Risks of accessing the Internet on the
phone are the same as accessing the Internet on a computer parental (and school) supervision
significantly more difficult Predators Cyberbullies Use of a cell phone while driving
Cell Phones
Risks with camera phones Inappropriate images taken with camera
phones Cheating
Online Chat
Is similar to a conference call typed rather than spoken
Now can be spoken using voice over and can be viewed with a cam
conducted through a computer which is connected to the Internet
Online Chat
Individuals are listed on the right side of the screen May just be watching and not chatting
The name can be clicked upon as a link to their profile
Online Chat
Most chat rooms have feature where two individuals can leave the main chat and conduct a private chat
Online Chat
Risks Social cues are absent Never really know with whom you are
chatting Rich hunting ground for online predators Unhealthy set of online relationships and
withdrawal into a fantasy world Vulgar language and sexually explicit
images and discussions Subject matter that is not healthy or
appropriate
Electronic mail (email) sending of a text file from one piece of
equipment (PC, laptop, PDA, or cell phone) to another
Located on your computer Outlook using Earthlink
Or may be web based Hotmail or Gmail
Mailbox (i.e. Outlook, Hotmail inbox, etc.)
Write and send email Goes to a mail server (post office) The mail server sends it to the recipient’s
mail server Their mail server keeps
When they check their email, their server delivers it to them
They may open it and read it, read it later, or just delete it.
Risks Emails can be spoofed Emails are used to obtain information
(scams and hoaxes, phishing) Computer virus are sent in emails Predators will use email to contact their
potential victims Students use email for cyberbullying Email addresses can be collected from
forwarded emails
Instant Messaging
Known as IM Is a text-based form of
communication Extremely popular with kids
Instant Messenger
• Free• Easy to get• Easy to use• Students enjoy
this communication
Instant Messenger -Preferences
Instant Messaging
Often vowels are deleted changing 'text' into 'txt' and 'this' into 'ths'.
Apostrophes or dashes are removed as well.
Words are replaced with numbers or symbols, changing 'date' into 'd8' and 'forgive' into '4giv'.
Acronyms are also a short cut.
Instant Messaging
If you restrict your instant messaging to people that you really know, in person, there should be no danger (unless you know a dangerous person)
Instant Messaging
Risks Speaking to stranger Disclosing private information Exposure to vulgar language and
sexually explicit images and discussions Cyberbullying Instant messaging programs will alert
one user if another ‘buddy’ is online
Instant Messenger
Web Cam Settings
How Someone is Found
Search Results
Online Journals
Diaries that are exposed to the entire world
“Blogs”
Online Journals
Risks Disinhibition Disclosure of personal information Predators
Online Journals
Other users’ journals:Friends and
Friend of section.
The User Nameis a link
to their Journal.
Other personal data
is on here.
Online Community
Members can belong to groups like this one - members from a certain city.
Online Community
The group lists its members and others interested in this group. This community lists 178 links to pages associated with the particular city.
This is a service that is very popular at the high school and middle school level.
Live Journal Latest Posts
Xanga
There are other sites that offer web hosting, journals and communities. This is a popular site used by teens in Georgia.
thefacebook.com
[thefacebook] is popular with college students, but is beginning to be seen at the high school level.
Peer to Peer
P2P Program that allows that
computer to communicate directly with other computers that have the same program installed
Allows direct real-time exchange of files chat, audio, video, images, software, and
games
Peer to Peer
Aimster
Audio Galaxy
Bearshare
Gnutella
Gnucleus
Grokster
iMesh
KaZaa
Limewire
Mactella
Napster
Morpheus
SwapNut
WinMX
Peer to Peer
Risks Viruses Illegal copies
music, movies, software, and child pornography and possibly distribution charges of the same
Copyright violations are being pursued by various industries legal notification – see Talking to Your
Children About Downloading Music - A Parents Guide http://www.wiredsafety.org/law/copyrights/riaa/downloadingmusic_parryguide.html