Misericordia University TED 121 -- Educational Technology

Module 6: Exploring Online Safety Issues

EXPLORING ONLINE SAFETY ISSUES


Avoiding Online Problems

Download Dr. Steve's interactive presentation on sexting, cyberbullying, and related topics on our course Blackboard page.

  1. Take steps to stop (or at least slow down) spam!
    Unwanted bulk-sent e-mail is known as spam. You can deter or minimize spam through the following methods:

  2. Be careful about how your name appears in sent e-mail messages!
    Almost all mail clients (except Misericordia's, where it is already established) allow you to choose your user name and your display name. You don't have to enter you first and last name to appear on outgoing e-mail messages.
    Be careful! Realize that the e-mail world will know you only by the presence that you create. The name you choose may attract people, and sometimes the wrong people. Choose your name carefully, and think about the possible consequences before you do.

 

Can You Be Found?

Do you need some convincing as to why you should not make your full name your e-mail name? In the "try it" below, try to find out someone's phone number or street address. You might also want to obtain a map with driving directions to their house. You might also want to try to locate a person's e-mail address, although this usually is not reliable unless the person you are seeking is established for a period of time within a company. (Anyone can create, change, and delete e-mail names over and over again daily.)

  1. Find a Person in RL
    Find people online and in RL (real life) at anywho.com. Try the following:

    • Imagine that you just have a name and maybe a city or state. Try to find a phone number and address for this name.
    • Determine how many people with your last name live in Pennsylvania or another state.

  2. Reverse Telephone Lookup
    Navigate to anywho.com
    • Pretend that you only have a phone number. Try the reverse lookup option and try to locate this person.

  3. Maps and Driving Directions
    • When you have found an address, select from a variety of maps or driving directions.

 

Avoiding Identity Theft

Navigate to the following resources to learn more about this important topic:
  1. ftc.gov/bcp/edu/microsites/idtheft: The Federal Trade Commission Web site on identity theft. View their introductory video!
  2. comparecards.com: This online resource discusses wise and careful use of credit cards, and how your identity can be stolen when using credit cards.
According to the Federal Trade Commission, "identity theft" occurs when someone possesses or uses your name, address, Social Security number (SSN), bank or credit card account number, or other identifying information without your knowledge with the intent to commit fraud or other crimes. (Read more at the Federal Trade Commission Resource for Identity Theft.)

To avoid identity theft:

  1. Never give out personally identifying information to anyone (except for authorities and people you trust).
  2. Always shred mail that contains your name, address, and other personally identifying information.
  3. Protect against spyware.
  4. Check your credit report periodically.

If you are a victim of identity theft:

  1. Place a fraud alert on your credit reports with the 3 main credit bureaus (Equifax, TransUnion, Experian).
  2. Close any suspected accounts with your financial institutions and credit card companies.
  3. File a complaint with the FTC.
  4. File a report of the crime with local police.
  5. Monitor your credit report AnnualCreditReport.com (free annual service) OR FreeCreditReport.com (pay service to automatically monitor your credit reports).
  6. Download more information from the Federal Trade Commission.

Protect yourself when buying/selling online at www.escrow.com

Spyware

Another threat to your privacy and protection that could lead to identity theft is spyware. Spyware software hides on your computer and monitors or controls your computer use. It may be used to send you pop-up ads, redirect your computer to websites, monitor your Internet surfing, or record your keystrokes, which, in turn, could lead to identity theft.

Some clues that spyware is on your PC: (according to the Federal Trade Commission)

  • a barrage of pop-up ads
  • a hijacked browser (takes you to sites other than those you type into the address box)
  • a sudden or repeated change in your computer's Internet home page
  • new and unexpected toolbars
  • new and unexpected icons on the system tray at the bottom of your computer screen
  • keys that don't work (for example, the "Tab" key that might not work when you try to move to the next field in a Web form)
  • random error messages
  • sluggish or downright slow performance when opening programs or saving files

To guard against spyware, experts at the FTC and technologists suggest:

  • Update Windows and Web browser software.
  • Download free software only from sites you know and trust.
  • Be careful with peer-to-peer file-sharing programs. Know the risks (FTC's P2P File Sharing Alert).
  • Don't install any software without knowing exactly what it is.
  • Ensure your browser security setting is high enough to detect unauthorized downloads.
  • Don't click on any links within pop-up windows. (If you do, you may install spyware on your computer. Instead, close pop-up windows by clicking on the "X" icon in the title bar.)
  • Don't click on links in spam that claim to offer anti-spyware software. Some software offered in spam actually installs spyware.
  • Switch on the Windows firewall program or install a another similar product.
Download Ad-Aware by Lavasoft.
Ad-Aware is designed to provide advanced protection from known Data-mining, aggressive advertising, Parasites, Scumware, selected traditional Trojans, Dialers, Malware, Browser hijackers, and tracking components.

 

Sexting

Sexting (sex and texting) is the act of sending sexually explicit messages or photos electronically, primarily between cell phones.

Aspects of sexting:

What can we do?

 

Cyberbullying

Cyberbullying occurs �when the Internet, cell phones, or other devices are used to send or post text or images intended to hurt or embarrass another person� (National Crime Prevention Council).

Aspects of cyberbullying:

Cyberbullying is effective because:

Teachers (and parents) need to be aware of the ramifications of cyberbullying. Many victims never tell any adult about the problem, and may become depressed. If the situation escalates, a young person may contemplate committing suicide!

 


JUMP TO A TOPIC IN MODULE 6:
  Exploring online safety issues.


Module 1.

Topics.

TED 121

Dr. Steve