You are on page 1of 2

E-Safety

Digital Citizenship
A digital citizen is a person utilizing information technology (IT) in order to engage in
society, politics, and government. K. Mossberger, et al.[1] define digital citizens as
"those who use the Internet regularly and effectively".[2][3] Digital citizens understand
digital citizenship, which is the appropriate use of technology.[4]

What Is Cyberbullying
Cyberbullying is bullying that takes place over digital devices like cell phones,
computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or
online in social media, forums, or gaming where people can view, participate in, or
share content. Cyberbullying includes sending, posting, or sharing negative, harmful,
false, or mean content about someone else. It can include sharing personal or private
information about someone else causing embarrassment or humiliation. Some
cyberbullying crosses the line into unlawful or criminal behavior.

1. Never respond
Do not reply to anything that has been said or retaliate by doing the same thing back.
2. Screenshot
If you can, take a screenshot of anything that you think could be cyberbullying and keep
a record of it on your computer.

3. Block and report


Most online platforms have this function, make sure you block and report the offending
users to the appropriate social media platform.

4. Talk about it.
You may not feel it at the time, but cyberbullying affects you in many different ways.
You are not alone.

5. How serious is it?


Assess how serious the cyberbullying is. If it is light name calling from somebody that
you don’t know, it may just be easier to just report and block that user.

Fake news,
also known as junk news or pseudo-news, is a type of yellow
journalism or propaganda that consists of
deliberate disinformation or hoaxes spread via traditional news media (print
and broadcast) or online social media.[1][2] The false information is often
caused by reporters paying sources for stories, an unethical practice
called checkbook journalism. Digital news has brought back and increased the usage of
fake news, or yellow journalism.[3] The news is then often reverberated as misinformation in
social media but occasionally finds its way to the mainstream media as well.[4]
Live Streaming

Report on E-safety
In streaming video and audio, the traveling information is a stream of data from a server. The
decoder is a stand-alone player or a plugin that works as part of a Web browser. The server,
information stream and decoder work together to let people watch live or prerecorded
broadcasts.
How to make your password secure?

1. Be sure no one watches when you enter your password.

2. Always log off if you leave your device and anyone is around—it only takes a moment for

someone to steal or change the password.

3. Avoid entering passwords on computers you don’t control (like computers at an Internet

café or library)—they may have malware that steals your passwords.

4. Avoid entering passwords when using unsecured Wi-Fi connections (like at the airport

or coffee shop)—hackers can intercept your passwords and data over this unsecured

connection.

5. Don’t tell anyone your password. Your trusted friend now might not be your friend in

the future. Keep your passwords safe by keeping them to yourself.

6. Depending on the sensitivity of the information being protected, you should change your

passwords periodically, and avoid reusing a password for at least one year.

7. Do use at least eight characters of lowercase and uppercase letters, numbers, and

symbols in your password. Remember, the more the merrier.

10. Check your password strength. Strong passwords are easy to remember

Privacy protection
Information privacy is the relationship between the collection and dissemination of data, technology,
the public expectation of privacy, legal and political issues surrounding them.[1] It is also known as data
privacy[2] or data protection.
The challenge of data privacy is to use data while protecting an individual's privacy preferences and their
personally identifiable information.[3] The fields of computer security, data security, and information
security design and use software, hardware, and human resources to address this issue.

Report on E-safety

You might also like