Want to make interactive content? It’s easy in Genially!

Over 30 million people build interactive content in Genially.

Check out what others have designed:

Transcript

Presentation prepared for participants of the eTwinning featured group: Bringing eSafety into eTwinning projects Author of the presentation: Aneta Wilk

Tips and advice on how to implement eSafety in the daily teaching routine

eSafety in the teaching practice

The word „netiquette” is a compilation of two words, i.e. „the Net” (a global computer network) and „etiquette” (a set of social behaviour). It can be defined as a code of online behaviour, which includes some aspects of Internet life as well as online interactions between people, such as: comments of people’s posts, bullying and harassment, copyright, spam, online chatting. There is no single universally applicable netiquette. On the Internet, however, the same habits apply that we use in everyday life: good manners, word culture, the use of which contributes to building a friendly atmosphere between Internet users.

Rules of cultural behaviour on the Internet - why are they important?

Most online societies have their own code of conduct. For example eTwinning code of conduct is available under the link: eTwinning Code of conduct | ESEP (europa.eu) It is recommended to become acquainted with the netiquette before starting using the portal. It is worth teaching students how to behave properly on the Internet. Practical activities can be implemented into practice while taking part in educational projects that demand online communication between students, for example eTwinning projects. Students can define their own rules of proper behavior on the Internet and pay attention of possible dangers that they can face when using electronic devices. Under this link you can find an example set of online rules defined by students taking part in the project "Hate speech online - it doesn't work/Hass im Netz - Geht gar nicht”.

Rules of cultural behaviour on the Internet - why are they important?

  • cyberaggression (intimidation, harassment, disclosure of private messages via the Internet, instant messaging, mobile phone and other information and communication technology tools),
  • phishing (stealing online identity),
  • exposition to inappropriate content (pornography, violence, challenges),
  • online games that do not fit to user’s age (the content of the games can be evaluated by the rating system called PEGI),
  • possibility to download a virus on a device after clicking on suspicious links,

Most popular threats faced by children and young people using electronic media:

  • making risky acquaintances (arranging meetings with online “friends”),
  • copyright infringement (copying and re-posting copyrighted content),
  • joining risky support groups (promoting messages concerning, among others, self-injury, drastic diets, racism, etc.)
  • spending to much time in front of electronic devices (this can cause health problems, failure to perform everyday duties like taking care of personal hygiene, personal development, etc.).

Most popular threats faced by children and young people using electronic media:

Activities that shape our online personality

  • comments we post on forums, websites, in social media,
  • language we use to make comments,
  • images we post and their descriptions,
  • information we post in our social media profil.
Our online identity can influence our future life. Watch a film presenting how it is possible.

e-Safety rules - learning how to manage your personal data online

  1. Find any photo on the Internet (e.g. your profile picture from a social network), copy its link and place it in the TinEye image search engine. Check which websites it is assigned to.
2. Find any photo on the Internet (e.g. your profile picture from a social network), right-click on it and choose the option “Search the image using the Google tool", check the search results.

e-Safety rules - learning how to manage your personal data online

3. Enter your name in the Google search engine, preceded by quotation marks, check the results obtained. 4. Use the portal https://haveibeenpwned.com/ and check whether your e-mail address provided during registration on various portals has not been violated due to a data leak.

e-Safety rules - learning how to manage your personal data online

5. Remember the principle that nothing is lost on the Internet. Access to the archival resources of specific websites is provided by the Wayback Machine application. Go to the Wayback Machine website and check what archival information you can find there, enter the address of a specific portal, e.g. www.etwinning.net

e-Safety rules - learning how to manage your personal data online

1. Enable two-step login, which will effectively protect you from hacking into your account. When logging in, you will have to enter your password, and then confirm your willingness to log in with an additional code that you will receive via SMS or e-mail. Two-step login is currently a popular form of securing data in the mailboxes and accounts on social networking sites, e.g. Facebook, LinkedIn.

Being active online - what should you remember about?

2. Use strong login passwords consisting of a combination of letters, numbers and special characters. Set separate passwords for each account, this way you will avoid the possibility of a hacker logging in with one password for your different accounts. Use a password manager that lets you store your online account usernames and passwords in one secure place. 3. Do not click on suspicious links, do not open attachments if you are not sure that you are not their recipient, e.g. an attachment with information about an invoice for a product that you did not buy.

Being active online - what should you remember about?

4. Enable antivirus software updates on the devices you use. This will allow you to eliminate vulnerabilities in security systems. 5. Back up your important files and documents so you can quickly recover your documents if needed. 6. If you log in to your account from a different device, remember to log out of it, do not save data to your account in the device's memory.

Being active online - what should you remember about?

7. Limit posting of information about yourself online, especially sensitive data (address, telephone number, date of birth, private photos, providing data on the current place of residence). 8. Check the credibility of information from friends sent via e-mails, messengers, social media, e.g. a request for a quick money transfer, suspicious links, files.

Being active online - what should you remember about?

Copyright If you implement the work of others in your work, use materials available in open digital resources, the content of which can be copied, distributed, edited and remixed without attribution in accordance with the provisions of the Creative Commons license. https://creativecommons.org/

Being active online - what should you remember about?

Copyright On the Internet, you can find many search engines containing content available on free licences, for example: -https://www.malbertsmelodier.se/en -https://musopen.org/ -https://www.flickr.com/ -https://www.front-music.pl/darmowe/ -https://www.pexels.com/

Being active online - what should you remember about?

Copyright Open the Pixabay search engine, enter any term, e.g. Internet, and find an image licensed under the CC0 Creative Commons license (free for commercial use, no attribution required).

Being active online - what should you remember about?

Thank you for your attention - Aneta Wilk, moderator of the featured group Bringing e-Safety into eTwinning projects.