SlideShare a Scribd company logo
1 of 15
Download to read offline
1. Take appropriate precautions to ensure own safety

and privacy.

2. Protect personal information online.

3. Carry out checks on others’ online identity.

4. Describe the forms and features of cyber bullying.
0 By Charley
Charley

Privacy and safety online is a very big role associating with being on the internet.
Privacy and safety is something that is not put into place by some people online
and can lead to massive range of problems e.g cyber bullying, emails used as a
threatening message or harassment, unsafe pop ups and hacks, and can also range
to Trojans and viruses coming into your computer alongside a unsafe
advertisement and email.

The ranges of unsafe behaviour on a computer, laptop, or tablet can be quite
devastating and can also include blackmail. To ensure your security and privacy
online you must take precautions and avoid things what you might find harmful
and unsafe. Also if you find a website unsafe and you don’t find it trustworthy
don’t use it!!!.
The way how you can ensure privacy and safety protection online is by a very easy set of steps by using these steps you are
ensuring that you want absolute total control over your pc or laptop and don’t want any exposure when using the internet
online.
Step 1: Go onto www.filehippo.com and download Microsoft Security Essentials this is a great software to protect yourself
in a security-based way and also can help- you scan a malicious website.
Step 2:
After downloading Microsoft Security Essentials there is another programme which I highly recommend for protection head
back onto www.filehippo.com and then download Spyware Blaster after downloading Spyware Blaster this is a excellent
programme to use for blocking pop ups and malicious websites. Even though Spyware Blaster is mainly used for Spyware
protection it is still handy for scanning blocking and defeating malicious websites and can also block ActiveX pop ups as
well.
Step 3:
The final programme what you should decide to download is CCleaner Ccleaner is another great and trustworthy
programme to use for computer protection. This is one of the most trustworthy programmes used for protection against
malicious files serious malware and temporary internet files download from www.filehippo.com and you will be sorted!.
Step 4:
After downloading Microsoft Security Essentials, Spyware Blaster, and Ccleaner if you want more further protection while
browsing the internet there are certain options what you can put into place when browsing (e.g if you want to block a
website what you may find with full of malware or pop ups) then there are certain internet browsers which can help with this
option. If you use Internet Explorer there are certain options which can block malicious websites here are the steps..
Intro:
If you use Internet Explorer there are ways and methods to stop yourself
worrying about pop-ups advertisements and threats to security. There are
very easy ways that can help you and above all else protect you.

Step 1:
To stop pop ups incoming onto your pc first click onto the tolls option
and then click onto the
0 By Patryk Piras
Many people don't shop online because they think that their bank details are not safe. Shopping online is just as safe as ordering
by the telephone as long as you follow these rules.
0 - Make sure that the company that your ordering from has a secure shopping server.
0 - Make sure that the website your using starts with “https:”
0 - Make sure that you don't send any bank details to anyone in an email.
0 - If you do receive an official looking email that asks you to send your financial

details, you should never replay because you could become a victim of identity fraud.

0 - If its a company that you have never heard of before , search their site for any

contact numbers and postal addresses. They would not mid you doing a quick call
asking few questions.
Take steps to protect your online privacy
Looking after your privacy online will help protect your personal
information from abuse.

0 Good computer security includes installing anti-spyware, anti-virus.
0 Keep these security tools up to date.
0 Make sure you are visiting secure web sites before handing over

personal information such as banking and credit card details.
When creating passwords there are some rules that you should follow:
Do
0 Make it at least eight characters in length.
0 Combine letters, numbers and upper and lower case letters.
0 Change your password regularly.

Don’t
0 Use pet names, birthdates, family or friends names.
0 Share passwords with others, even with friends.
0 Store them on the device or write them down.
0 By Jonathan Callcott
0 Laura Nicolai
0 Cyber bullying is where people use computers to abuse or harm

someone else.

0 People use fake accounts to attack vulnerable individuals to

send offensive comments/content.

0 People harass someone due to an event.
0 People use social networking site to target people.
When using the internet you should be very careful of who
you chat and become friends to because the internet can be
used 24/7 and people become more vulnerable to fake
accounts and people can send messages to other people.
Cyber stalking > Is where people make other people scared and try to harm them and
threaten someone's privacy
Harassment > Is w>hen someone targets an individual or group by sending offensive
messages/content
Sending Spyware and/or Hacking Programs > Using technology to jeopardize or gain
unauthorized access to someone else’s computer.
Sending Pictures > Sending, posting, or altering compromising pictures of others whether
the images were taken with or without consent.

http://bullyingproject.com/curriculum/
0 Can effect peoples confidence
0 Can affect peoples lives
0 Can lead to suicides and suicide thoughts
0 People will stress over the event
0 Can affect peoples attendance and punctuation

More Related Content

Viewers also liked

Avoiding plagiarism
Avoiding plagiarismAvoiding plagiarism
Avoiding plagiarismkcarreon
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Plagiarism vs. Cheating: What is the difference?
Plagiarism vs. Cheating: What is the difference?Plagiarism vs. Cheating: What is the difference?
Plagiarism vs. Cheating: What is the difference?Mary Alice Osborne
 
Plagiarism PowerPoint Presentation
Plagiarism PowerPoint PresentationPlagiarism PowerPoint Presentation
Plagiarism PowerPoint PresentationSteve Nelson
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Viewers also liked (18)

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Avoiding plagiarism
Avoiding plagiarismAvoiding plagiarism
Avoiding plagiarism
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Computer crime
 Computer crime Computer crime
Computer crime
 
What Is Plagiarism
What Is PlagiarismWhat Is Plagiarism
What Is Plagiarism
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Plagiarism vs. Cheating: What is the difference?
Plagiarism vs. Cheating: What is the difference?Plagiarism vs. Cheating: What is the difference?
Plagiarism vs. Cheating: What is the difference?
 
Plagiarism Powerpoint
Plagiarism PowerpointPlagiarism Powerpoint
Plagiarism Powerpoint
 
Plagiarism PowerPoint Presentation
Plagiarism PowerPoint PresentationPlagiarism PowerPoint Presentation
Plagiarism PowerPoint Presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Recently uploaded

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 

Recently uploaded (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 

Internet Safety / 2013 [Team Work]

  • 1.
  • 2. 1. Take appropriate precautions to ensure own safety and privacy. 2. Protect personal information online. 3. Carry out checks on others’ online identity. 4. Describe the forms and features of cyber bullying.
  • 4. Charley Privacy and safety online is a very big role associating with being on the internet. Privacy and safety is something that is not put into place by some people online and can lead to massive range of problems e.g cyber bullying, emails used as a threatening message or harassment, unsafe pop ups and hacks, and can also range to Trojans and viruses coming into your computer alongside a unsafe advertisement and email. The ranges of unsafe behaviour on a computer, laptop, or tablet can be quite devastating and can also include blackmail. To ensure your security and privacy online you must take precautions and avoid things what you might find harmful and unsafe. Also if you find a website unsafe and you don’t find it trustworthy don’t use it!!!.
  • 5. The way how you can ensure privacy and safety protection online is by a very easy set of steps by using these steps you are ensuring that you want absolute total control over your pc or laptop and don’t want any exposure when using the internet online. Step 1: Go onto www.filehippo.com and download Microsoft Security Essentials this is a great software to protect yourself in a security-based way and also can help- you scan a malicious website. Step 2: After downloading Microsoft Security Essentials there is another programme which I highly recommend for protection head back onto www.filehippo.com and then download Spyware Blaster after downloading Spyware Blaster this is a excellent programme to use for blocking pop ups and malicious websites. Even though Spyware Blaster is mainly used for Spyware protection it is still handy for scanning blocking and defeating malicious websites and can also block ActiveX pop ups as well. Step 3: The final programme what you should decide to download is CCleaner Ccleaner is another great and trustworthy programme to use for computer protection. This is one of the most trustworthy programmes used for protection against malicious files serious malware and temporary internet files download from www.filehippo.com and you will be sorted!. Step 4: After downloading Microsoft Security Essentials, Spyware Blaster, and Ccleaner if you want more further protection while browsing the internet there are certain options what you can put into place when browsing (e.g if you want to block a website what you may find with full of malware or pop ups) then there are certain internet browsers which can help with this option. If you use Internet Explorer there are certain options which can block malicious websites here are the steps..
  • 6. Intro: If you use Internet Explorer there are ways and methods to stop yourself worrying about pop-ups advertisements and threats to security. There are very easy ways that can help you and above all else protect you. Step 1: To stop pop ups incoming onto your pc first click onto the tolls option and then click onto the
  • 7. 0 By Patryk Piras
  • 8. Many people don't shop online because they think that their bank details are not safe. Shopping online is just as safe as ordering by the telephone as long as you follow these rules. 0 - Make sure that the company that your ordering from has a secure shopping server. 0 - Make sure that the website your using starts with “https:” 0 - Make sure that you don't send any bank details to anyone in an email. 0 - If you do receive an official looking email that asks you to send your financial details, you should never replay because you could become a victim of identity fraud. 0 - If its a company that you have never heard of before , search their site for any contact numbers and postal addresses. They would not mid you doing a quick call asking few questions.
  • 9. Take steps to protect your online privacy Looking after your privacy online will help protect your personal information from abuse. 0 Good computer security includes installing anti-spyware, anti-virus. 0 Keep these security tools up to date. 0 Make sure you are visiting secure web sites before handing over personal information such as banking and credit card details.
  • 10. When creating passwords there are some rules that you should follow: Do 0 Make it at least eight characters in length. 0 Combine letters, numbers and upper and lower case letters. 0 Change your password regularly. Don’t 0 Use pet names, birthdates, family or friends names. 0 Share passwords with others, even with friends. 0 Store them on the device or write them down.
  • 11. 0 By Jonathan Callcott 0 Laura Nicolai
  • 12. 0 Cyber bullying is where people use computers to abuse or harm someone else. 0 People use fake accounts to attack vulnerable individuals to send offensive comments/content. 0 People harass someone due to an event. 0 People use social networking site to target people.
  • 13. When using the internet you should be very careful of who you chat and become friends to because the internet can be used 24/7 and people become more vulnerable to fake accounts and people can send messages to other people.
  • 14. Cyber stalking > Is where people make other people scared and try to harm them and threaten someone's privacy Harassment > Is w>hen someone targets an individual or group by sending offensive messages/content Sending Spyware and/or Hacking Programs > Using technology to jeopardize or gain unauthorized access to someone else’s computer. Sending Pictures > Sending, posting, or altering compromising pictures of others whether the images were taken with or without consent. http://bullyingproject.com/curriculum/
  • 15. 0 Can effect peoples confidence 0 Can affect peoples lives 0 Can lead to suicides and suicide thoughts 0 People will stress over the event 0 Can affect peoples attendance and punctuation