Section 2.2 Internet Safety Personal Online Internet Safety Guidelines
Online Disclosure of Personal Information 1. Full name- use nicknames & partial names 2. Home address- do not give out personal address to individual on the web 3. Phone number- a phone number can be used in a reverse search on the internet to identify the addresses of an individual 4. Social Security number- disclosure of social security numbers is not a good idea unless the website is secured. It could be used to steal financial & personal info 5. Disclosure of passwords to anyone should be avoided. The greater the number of people with access to personal information the greater the risk a. The password should be at least 8 characters long b. Use a combination of letters & numbers c. Changed the passwords every 1-2 months d. Do not give out the passwords e. Do not use birthdays, pet names, friends names, common words 6. Disclosure of the names of family members is not a good idea as well 7. Credit card information- should be disclosed to trusted, verified, and secure sites that have security and encryption software 8. Photos- are potential sources of risk because they are personal information. Photos can also be edited to falsify information, such as to make ID cards Social Networking & Online Chatting 9. Behave properly when online Employers & colleges recruiters are frequently turning to online social networking sites to assess the behavior of potential employees a. Inappropriate pictures & illegal behavior may be viewed by future employers and can prove fatal to one’s job potential b. Your online reputation is valuable 10.Posting harmful information about someone on the Internet & especially on social networking sites is never a good idea 11.Safety guidelines and precautions a. Avoid yelling (keying in all caps) when chatting online b. Do not bully- spreading malicious & false information. Ignore bullies c. If situation escalates or a bully does not stop, contact school authorities & inform parents d. Never meet someone in person that you have not met online only Financial safeguards 12.Do not open emails or respond to sites that promise you will get rich quick or anything else that seems too good to be true. Phishing Schemes 13.Do not give out credit information without parental permission and only when the site is certified as secure. Encryption
14.The URL of a secure site begins with https:- “s” indicates a secure web site 15.An interactive lock is displayed on the site, usually in the bottom corner 16.A seal is another indication of safety. If there is a steal, inspect it & make sure it is authentic Potential Computer Hazards 17.Virus- a small piece of software that attaches to programs that are installed on a user’s pc. An email virus has the potential to automatically mail itself to contacts 18.Spam- unwanted and unsolicited email advertisements or messages 19.Spyware- malicious software designed to take partial control of a computer’s operations without the consent of the user a. Some spyware intercepts and records passwords and credit card numbers b. Tracks a user’s visits to different websites to analyze their spending activity and forecast consumer behavior
The Internet, Section 1 Internet Search Tools Search Engines 1. Individual search engine- uses computer programs called “spiders”, “crawlers” or “robots” to match key search words with the web pages that contain them a. The results returned are lists of web pages & titles b. Does not search the internet itself, but instead, searches databases of information about the internet c. Google, Ask, Yahoo, Live 2. Meta-search engine- sends requests for information to several search engines and complies the results (Dogpile, Altavista) 3. As the results are compiled, duplications are eliminated, thus yielding fewer results 4. A time- saver compared to a regular search engine 5. Examples: Google custom search, allows users to control their search by specifiying a. Name of search engine, description, language, sites 6. Subject directories- searchable databases that are developed & maintained by human selection of sites to search broad categories & descriptions a. Used in research & often linked to library systems, research databases b. Mostly made up of searchable databases, such as library catalogs. c. Searches for non-HTML formats (pdf, word, excel, powerpoint) d. Results in more reliable pages than search engines e. http://informine.ucr.edu – complied by academic libraries f. www.lii.org- librarians’ internet index 7. EBSCOhost- premium online information resources for institutions worldwide a. Colleges & universities, hospitals, and medical institutions, corporations b. Government, K-12 schools, public libraries 1. Library research.com- a subsidiary of EBSCOhost 2. ERIC (education resources information center) 3. CRIS (current research and information center) 4. Incywincy.com 5. Completeplanet.com Internet Search Methods 8. Keyword- unique phrases or terms, synonyms or word variations a. Field- a search perimeter, such as a title, date of publication, useful for drilling down and focusing on specific content 9. Boolean Search, +,- (), and, or, not a. Uses operators with keywords to narrow search parameters b. AND narrows results by searching for pages that contain both keywords c. OR expands results by search for pages that contain either of keywords
d. Quotation marks narrow results by searching for phrases instead of words 10.Boolean is implied in many search engines, but still a valuable method for narrowing searches
Operator
Search String
Result
1.
AND
2.
+
Movies AND Advertising +movies+advertising +sales
Movies and advertising Movies, advertising, and sales
3.
OR
Jam OR jelly
4.
OR
Jam OR Jelly OR Preserves
5.
AND/OR
Orchids AND (growing or planting)
Jam and jelly, or either term Documents and websites containing one or all of the terms Orchids and either the term growing or the term planting both items President Clinton AND foreign policy
6.
“
”
“President Clinton” AND “Foreign Policy”