NAVODAYA VIDYALAYA SAMITI� NOIDA
E-CONTENT
COMPUTER SCIENCE CLASS XI
SOCIETY LAW AND ETHICS (SLE-1)
CYBER SAFETY
-DESIGNED BY :-
B.KAVITHA,PGTIT
JNV VATTEM
MAHABUBNAGAR(DIST)
Introduction-Cyber Safety
Safely Browsing the Web
Identity Protection
Protection against theft of personal information over Cyber Space without consent, usually for financial gain is known as Identity Protection.
Tips to Prevent Identity Theft
Confidentiality of Information
Allows authorized users to access sensitive and secured data maintains the Confidentiality of Information.
Tips to Protect Information Confidential
Cyber Safety – Social Networks
Facebook, MySpace, Twitter, LinkedIn, Digg,Ning, MeetUp etc….. -- the number of social networking sites and tools is exploding nowadays.These are becoming soft tool to attack & target for scam.
Tips to stay safe on social media
Cyber trolls & Cyber bullying
1. Cyber trolling: is internet slang for a person who intentionally starts arguments or upsets others by posting inflammatory remarks. The sole purpose of trolling is angering people.
Purpose – to entertain, to argument, to upset victim, to get attention.
2. Cyberbullying: Saying and/or doing mean things to the person online. It is a harm inflicted through using the Internet, CT devices, or mobile phones.
Purpose – to get revenge, to harass & threat, to humiliate.
3. Cyber stalking: Doing research on every aspect of the person’s life.
4. Cyber harassment: Continuously contacting the person online, even though they don’t want you to.
Appropriate Usage of Social Network
Social Network refers to web and mobile technologies or their practices to share content, thoughts, ideas, opinions, experiences etc. online. Various examples of social networks are Facebook, Twitter, YouTube, LinkedIn, and blogging sites among many others.
Appropriate Usage of Social Network
Problems to Avoid
Children's are advised to not to interact with strangers on social media networks as there are chances that many people on not who they say they are.
Appropriate Usage of Social Network
When a spreader meet an ignorant, the ignorant will become a spreader.
When two spreaders meet with each other, one of them will become a stifler.
When a spreader meet a stifler, the spreader will lose the interest in spreading the rumor, so become a stifler.
Problems to Avoid
A lie can travel halfway around the world before the truth has got its boots, this phrase totally fits with rumors spread over social media. On average, it takes more than 12 hours for a false claim to be debunked online where as only 2 hours for true claim.
A standard model of rumor spreading is given by Daley and Kendall, which is called DK model. In this model there are N people in total. Which are categorized into three groups: ignorant, spreaders and stifles, which are denoted as S, I, and R.
Appropriate Usage of Social Network
COMMON USAGE OF SOCIAL MEDIA(FACEBOOK,TWITTER ETC..,)
BIBLIOGRAPHY:
1. Computer Science Textbook for class XI
by NCERT
2. Computer Science with Python
by Sumitha Arora
3. Computer Science with Python
by Preeti Arora