Page 1

Ruben Delfa and Salvador Vilchez 4ยบC


SECURITY IN THE INTERNET Child grooming

Child grooming comprises actions deliberately undertaken with

the aim of befriending and establishing an emotional connection with a child, to lower the child's inhibitions in preparation to sexually assault the child, or to exploit the child.

Sexting is the act of sending sexually explicit messages and photographs , primarily between mobile phone .

Ciberbullyng is any form of bullying which takes place online or through your mobile phone.Websites like Facebook, Bebo, YouTube, MySpace, instant messaging on MSN and gaming forums can be great fun.

Phising Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) when simulated as a trustworthy entity in an electronic communication.

Harassment

contains a wide range of offensive behavior. It is commonly

understood as behavior intended to disturb or annoy, and it is characteristically repetitive.

Deceiving is the act to take advantage of people for any purpose.

Flaming

Also known as hitting, is hostile and insulting interaction between

Internet users, often with the use of bad words.

Hate speech is to say outlaw insulting communication to a person or group based on discrimination against that person or group.

Pรกgina 2 Fecha:25/11/13


SECURITY IN THE INTERNET Netiquette consist in a serie of rules on the internet.

6 advices to stop Ciberbulling.

1. Do not respond to provocations, ignore them. Count to a hundred and think otherwise.

2. Behave politely on the Web Use Netiquette.

3. If they bother you, leave the connection and asks for help.

4. Do not enter personal data. You will feel more protected / a.

5. Do not do it on the Web you would not do in the face.

6. If you are harassed, keep testing.

Pรกgina 3 Fecha:25/11/13


SECURITY IN THE INTERNET

10 tips to beat the Grooming.

1. No images or provide incriminating information.

2. Prevent theft of the force element.

3. Maintain a proactive approach to privacy.

4. Do not give in to blackmail.

5. Asking for help.

6. Evaluate the accuracy of possession.

7. Limit the ability of action stalker.

8. Analyze how illegalities incurred the bully and what can be tested.

9. Find and collect evidence of criminal activity.

10. Make a complaint.

Pรกgina 4 Fecha:25/11/13


SECURITY IN THE INTERNET

3 rules to end Sexting.

1. Receive or take a picture of a person does not give you the right to distribute it.

2. The image is a personal data whose use is protected by law.

3.The Law always works, even for minors, Internet and mobile.

Pรกgina 5 Fecha:25/11/13


SECURITY IN THE INTERNET 10 rules of online behavior.

1. I will not post embarrassing pictures of other people on public sites.

2. I will not post mean comments online.

3. I will not post any personal information about myself online.

4. I will not give out any personal information about my friends.

5. I will not make up fake identities.

6. I will always ask permission before posting pictures of others.

7. I will respect a person’s decision if they do not want a picture or video of themselves posted online.

8. I will think twice (or three times) before putting anything online.

9. I will not pretend to be another person online behind their back.

10. I will not post personal stories about my friends online without their permission.

PĂĄgina 6 Fecha:25/11/13


SECURITY IN THE INTERNET

STOP:

Child grooming Sexting Ciberbullyng Phising Harrasament Deceiving Flaming Hate Speech Netiquette

Pรกgina 7 Fecha:25/11/13

Security1  

kdfjsgjrjegojro

Read more
Read more
Similar to
Popular now
Just for you