Misericordia University | TED 121 -- Educational Technology |
Do you need some convincing as to why you should not make your full name your e-mail name? In the "try it" below, try to find out someone's phone number or street address. You might also want to obtain a map with driving directions to their house. You might also want to try to locate a person's e-mail address, although this usually is not reliable unless the person you are seeking is established for a period of time within a company. (Anyone can create, change, and delete e-mail names over and over again daily.)
|
 
To avoid identity theft:
If you are a victim of identity theft:
Protect yourself when buying/selling online at www.escrow.com
SpywareAnother threat to your privacy and protection that could lead to identity theft is spyware. Spyware software hides on your computer and monitors or controls your computer use. It may be used to send you pop-up ads, redirect your computer to websites, monitor your Internet surfing, or record your keystrokes, which, in turn, could lead to identity theft.Some clues that spyware is on your PC: (according to the Federal Trade Commission)
To guard against spyware, experts at the FTC and technologists suggest:
|
 
Aspects of sexting:
What can we do?
 
Aspects of cyberbullying:
Cyberbullying is effective because:
Teachers (and parents) need to be aware of the ramifications of cyberbullying. Many victims never tell any adult about the problem, and may become depressed. If the situation escalates, a young person may contemplate committing suicide! |
 
JUMP TO A TOPIC IN MODULE 6: |
  Exploring online safety issues. |
Module 1. |
Topics. |
TED 121 |
Dr. Steve |