You are on page 1of 93

INTERNET SAFETY AND

GOLDEN RULES

BE ST P R ACTI C E S F OR
SAFE AN D SAVVY
TE CHNOLOG Y USE
WHY DO YOU USE TECHNOLOGY?

EMAIL Research GAMING


Staying
Social organized
Media Blogging

Homework Shopping listen


ing
A DOUBLE-EDGED SWORD
Technology is so well-integrated into daily life that we may not realize its extent.

 Pros: convenience and efficiency


Cons: dependence and vulnerability
TYPES OF TECHNOLOGY-RELATED RISKS

Security Issues

Safety Issues

Privacy Issues

Data Integrity Issues


IF YOU POST IT, THEY WILL FIND IT
Anyone can find a lot of information about you online.

All it takes to find many details about you is…


 The motivation and persistence to look for them
If you are careless about online safety and security, they may also be able to access more
sensitive or private information about you
WHAT CAN I FIND OUT ABOUT YOU?
Where you go to school Where you are and what
What kind of car you drive you’re doing right now
What you did last Saturday What you think of your boss
night Items you own and items you
Your favorite songs want to purchase
What you want for your Your sexual orientation
birthday Who your family members
Where you live are
The people you admire Your birthday and age
Where & when you’re going What causes/issues you
on vacation support
Who your friends are Where you shop
Illegal activities you’ve How you’re doing in school
participated in What you look like
Your sense of humor And much more…
WHERE CAN I FIND ALL THIS INFORMATION?
Social networking sites Wish lists/registries
Facebook, Twitter, Google+ Amazon, Target, eBay
Blogs File-sharing sites
Blogger, Tumblr BitTorrent
Personal websites Entertainment sites/services
Photo/video sites Hulu, Netflix, Goodreads
YouTube, Instagram Employment-related sites
Dating sites Monster, CareerBuilder
eHarmony, Match.com Business sites
Online video games Craigslist, Etsy, Roommates
Xbox Live, Steam Other
Can you think of additional online
Message boards
resources where you may
Any website with this feature inadvertently
be sharing more than you realize?
10 NEGATIVE EFFECTS OF INTERNET ON
STUDENTS AND TEENAGERS

Lack Of Face To Face Communication


It sounds quite ironic when the lack of face to face
communication is mentioned as one of the negative effects
of Internet because the Internet is supposed to bring people
closer. But the fact is that somehow many people find it
easier to communicate through the Internet instead of the
traditional direct way. They prefer to discuss over
Messenger, Viber or other apps available on the Internet.
The idea of taking face to face is becoming a tough
decision. 
LACK OF CREATIVITY

The lack of creativity in teenagers and students is also another one of negative effects
of Internet rooting from its benefits. One significant feature of Internet is the
unlimited sources of information.
CYBER BULLYING

Cyber bullying is basically a term to describe the bullying using the Internet. This
disadvantage can be considered as one of the evilest negative effects of Internet .
It is never easier for haters to give ugly words toward a person. Celebrities or
some kinds of people in protected class are often the victims of cyber bullying.
WASTE OF TIME

It will be a mistake to forget the waste of time when it comes to


the negative effects of Internet. 
ABANDONMENT OF FAMILY

The excessive using of anything always creates side effects. The Internet is not an
exception. When students and teenagers use of Internet is too much, the
abandonment of family will occur as one of the negative effects of Internet.
PRIVACY DISRUPTED

Occurring due to the free information flow of Internet, privacy threat is one of the
negative effects of Internet that you should know about. Teenagers exchange
their picture, private information or personal chat every day in social
networking.
INSOMNIA

For anyone does not know what insomnia is, it is a sleeping disorder that happens
when people are not able to rest or sleep. And the powerful global system, the
Internet, somehow is one of the reasons for insomnia. It cannot be denied that
teenagers and students are sticking with the Internet all day. They take
advantages of any time possible to browsing the Internet, even the sleeping time.
PHYSICAL INACTIVITY

When it comes to the negative effects of Internet, we cannot ignore physical


inactivity. As we all learn it in school, a full education includes mental and
physical development. It is the reason why there is break- time between classes
so that students can relax and work out their body. The Internet only supports
for the mental side. There is no exercise for teenagers and students in this global
system. When people use the Internet a lot, they will lack time for physical
activities such as playing sports.
 INTERNET ADDICTION
 CHEATING

It is true to say that the Internet creates a number of troubles for teachers. The
cheating becomes much easier for students with a source of knowledge from all
over the world. They can find the answer for all the homework without a lot of
effort, resulting in an increase cheating, academic fraud, and plagiarism.
HOW CAN YOU DEAL WITH
THE RISKS INHERENT IN
USING TECHNOLOGY?

You can’t ignore the risks, but you also


can’t avoid technology entirely.

The solution is to become “web wise”


and technologically-savvy.
FROM “STREET SMART” TO “WEB WISE”

“Street smart” people…


 Possess strong common sense
 Have good instincts
 Develop strong critical thinking skills
 Are aware of their environment, including the risks it may pose
 Use their skills to make good decisions and minimize risks

“Web wise” is the internet version of “street smart”


BECOMING “WEB WISE” AND TECH-SAVVY
Understand that being tech-savvy is about more than knowing how to use technology

Learn about technology-related risks

Take steps to avoid or minimize risks

Take responsibility for your role as a member of the online community by being a good cyber-citizen

Apply critical thinking skills and good judgment to all your technology-related actions
TIPS FOR BECOMING A
“WEB WISE” & TECH-
SAVVY COLLEGE STUDENT
KEEP A CLEAN MACHINE
Use reputable security software and ensure that
it scans for threats regularly
 Anti-virus
 Anti-malware
 Anti-spyware

Don’t bypass or disable security protocols


Keep security software up-to-date
Protect all devices that connect to the internet
Don’t forget about external devices like flash
drives
CREATE STRONG PASSWORDS

Minimum length of 8 characters


Include at least 3 different types of characters:
Uppercase letters (A B C) Lowercase letters (a b c)
Numbers (1 2 3) Symbols (@ & % * ? / + ~)

NO personal information
e.g., pet’s name, significant dates, your name, etc.
NO dictionary words or names
NO reverse-spelled words or common substitutions
e.g., regrubeseehc, LuvDaPir@tez1, 3L!z@b3t4
DON’T EVEN THINK ABOUT USING THESE
PASSWORDS…
password dragon master michael
123456 111111 123123 ninja
12345678 baseball welcome mustang
abc123 iloveyou shadow password1
qwerty trustno1 ashley
monkey 1234567 football
letmein sunshine jesus

These are the 25 “Worst Passwords of 2012” as compiled by SplashData,


a company that makes password management software
MORE PASSWORD TIPS
Change passwords regularly

Use a different password for each account

Store passwords securely


 Write it down and lock it up
 Use a password manager

Do not share your password with anyone

Choose security questions and answers wisely


TAKE COMMON-SENSE
Check and PRECAUTIONS
customize your security and privacy settings

Never leave your technology unattended

Always remember to log out of accounts on shared or public computers

Don’t open, download, or click on anything that looks even remotely suspicious

Back up your data often and store it securely


SHARE SAFELY ON SOCIAL MEDIA
Consider limiting others’ access to your social networking profiles

Make decisions about what to share (and what not to share) with a level head

Learn to evaluate your social media presence with a critical eye


BE A GOOD CYBER-CITIZEN
Good citizenship
 Becoming well-informed and educated
 Respecting legitimate authority
 Treating your environment, yourself, and others with
respect and helping those who need support as you are
able

Good citizenship also applies to the global


community as accessed through the internet
THE BOTTOM LINE FOR USING TECHNOLOGY
RESPONSIBLY

Ask yourself:
THINK…! • What are the risks?
…before you post • Why am I doing this?
• Would I want ________
…before you act to see this?
• Do these actions/words
portray me as I want to
be perceived by others?
FOUNDATIONS OF HUMAN–
COMPUTER INTERACTION
THE COMPUTER
a computer system is made up of various elements

each of these elements affects the interaction


 input devices – text entry and pointing
 output devices – screen (small&large), digital paper
 virtual reality – special interaction and display devices
 physical interaction – e.g. sound, haptic, bio-sensing
 paper – as output (print) and input (scan)
 processing – speed of processing, networks
INTERACTING WITH COMPUTERS

to understand human–computer interaction


… need to understand computers!

what goes in and out


devices, paper,
sensors, etc.

what can it do?


memory, processing,
networks
A ‘TYPICAL’ COMPUTER SYSTEM
screen, or monitor, on which there are windows
keyboard

? mouse/trackpad

variations
 desktop window 1

 laptop
 PDA window 2

the devices dictate the styles of interaction that the system supports
If we use different devices, then the interface will support a different style of
12-37pm
interaction
HOW MANY …
computers in your house?
 hands up, …
… none, 1, 2 , 3, more!!

computers in your pockets?

are you thinking …


… PC, laptop, PDA ??
HOW MANY COMPUTERS …
in your house? in your pockets?

 PC  PDA
 TV, VCR, DVD, HiFi,  phone, camera
cable/satellite TV
 smart card, card with
 microwave, cooker,
magnetic strip?
washing machine
 central heating  electronic car key
 security system  USB memory

can you think of more? try your pockets and bags


INTERACTIVITY?

Most computing is interactive


 rapid feedback
 the user in control (most of the time)
 doing rather than thinking …

Is faster always better?


RICHER INTERACTION

sensors
and devices
everywhere
TEXT ENTRY DEVICES T
A
P
L
A
.
D
)
S

E E
N
Y O
T H
R P H
E , C
S E
W D E
Q R P
( A S
O ,
S
B G
D
Y N
R
E I
A
K T
O I
B D R
Y R W
E O D
K H N
C A
H
HANDWRITING RECOGNITION
Text can be input into the computer, using a pen and a
digesting tablet
 natural interaction

Technical problems:
 capturing all useful information - stroke path, pressure, etc. in a natural
manner
 segmenting joined up writing into individual letters

Used in PDAs, and tablet computers …


… leave the keyboard on the desk!
SPEECH RECOGNITION
Improving rapidly

Most successful when:


 single user – initial training and learns peculiarities
 limited vocabulary systems

Problems with
 external noise interfering
 imprecision of pronunciation
 large vocabularies
 different speakers
NUMERIC KEYPADS

for entering numbers quickly:


 calculator, PC keyboard
for telephones

not the same!!


1 2 3 7 8 9
ATM like phone
4 5 6 4 5 6

7 8 9 1 2 3

0 # 0 . =
*
telephone calculator
POSITIONING, POINTING AND DRAWING E
T
C
.

S S
K T
C E
I L
T B
D S A
A Y T
P O , S
H J R
C S O
, N S
U S
O L E R
T L E U
R C
, A C
E B S ,
S K E
U C H Z
O A C A
M R U G
T O E
T Y
E
THE MOUSE
Handheld pointing device
 very common
 easy to use

 buttons
(usually from 1 to 3 buttons on top, used for making a selection, indicating an
option, or to initiate drawing etc.)
THE MOUSE (CTD)
Mouse located on desktop
 requires physical space
 no arm fatigue

Relative movement only is detectable.


Movement of mouse moves screen cursor
Screen cursor oriented in (x, y) plane,
mouse movement in (x, z) plane …

… an indirect manipulation device.


 device itself doesn’t obscure screen, is accurate and fast.
 hand-eye coordination problems for novice users
EVEN BY FOOT …
some experiments with the footmouse
 controlling mouse movement with feet …
 not very common :-)

but foot controls are common elsewhere:


 car pedals
 sewing machine speed control
 organ and piano pedals
TOUCHPAD
small touch sensitive tablets
‘stroke’ to move mouse pointer
used mainly in laptop computers
DISPLAY DEVICES L
C
S
D
)

& A
Y

L
T P
R S
C I
( D

S D
N E
E T
E A
R U R
C T E
I P
S S A
P P
&
A L
M E A
T G T
I R I
B A G
L I
D
BITMAP DISPLAYS
screen is vast number of coloured dots
SOUNDS
beeps, bongs, clonks, whistles and whirrs

used for error indications

confirmation of actions e.g. keyclick

also see chapter 10


PRINTING
image made from small dots
 allows any character set or graphic to be printed,
critical features:
 resolution
 size and spacing of the dots
 measured in dots per inch (dpi)
 speed
 usually measured in pages per minute
 cost!!
TYPES OF DOT-BASED PRINTERS
dot-matrix printers
 use inked ribbon (like a typewriter)
 line of pins that can strike the ribbon, dotting the paper.
 typical resolution 80-120 dpi
ink-jet and bubble-jet printers
 tiny blobs of ink sent from print head to paper
 typically 300 dpi (Dots per inch) or better .
laser printer
 like photocopier: dots of electrostatic charge deposited on drum, which picks
up toner (black powder form of ink) rolled onto paper which is then fixed with
heat
 typically 600 dpi or better.
PRINTING IN THE WORKPLACE
shop tills
 dot matrix
 same print head used for several paper rolls
 may also print cheques

thermal printers
 special heat-sensitive paper
 paper heated by pins makes a dot
 poor quality, but simple & low maintenance
 used in some fax machines
SCANNERS
Take paper and convert it into a bitmap

Two sorts of scanner


 flat-bed: paper placed on a glass plate, whole page converted into bitmap
 hand-held: scanner passed over paper, digitising strip typically 3-4” wide

Shines light at paper and note intensity of reflection


 colour or greyscale

Typical resolutions from 600–2400 dpi


SCANNERS (CTD)
Used in

 desktop publishing for incorporating photographs and other images

 document storage and retrieval systems, doing away with paper storage

 special scanners for slides and photographic negatives


THE INTERNET
history …
 1969: DARPANET US DoD, 4 sites
 1971: 23; 1984: 1000; 1989: 10000
common language (protocols):
 TCP – Transmission Control protocol
 lower level, packets (like letters) between machines
 IP – Internet Protocol
 reliable channel (like phone call) between programs on machines
 email, HTTP, all build on top of these
EXAMPLES OF GOOD AND BAD
DESIGN

57
EXAMPLES ..(CONT.)

58
EXAMPLES ..(CONT.)

59
EXAMPLES ..(CONT.)

60
EXAMPLES ..(CONT.)

61
EXAMPLES ..(CONT.)

62
63
PRINCIPLE OF HUMAN COMPUTER
INTERACTION

64
INTRODUCTION TO HCI

65
OUTLINE
Introduction
What is HCI?
 The HCI Challenge
 HCI is Not about
 HCI is about
The goals of HCI
What is Usability?
Why is usability important?
 Why HCI is Important in the Context of WWW?
 It is not Simple to Make Good User Interfaces

66
INTRODUCTION
Interacting with technology has become an essential part of everyday life for
the majority of people.

The average user of a computer system is now less likely to understand the
technology. Since, there are different types of technology they have to use.

People are busy and may spend little or no time actually learning a new system.

67
INTRODUCTION..(CONT.)
• Therefore, computer systems should be easy to use, easy to
learn, and with no errors.

• To design and develop of such a system is a major concern of


HCI

68
WHAT IS HCI?
Human-computer interaction (HCI): “is a discipline concerned with the design,
evaluation and implementation of interactive systems for human use and with study
of major phenomena surrounding them.”
WHAT IS HCI?
HCI (human-computer interaction) is the study of interaction between people (users) and
computers.

Interaction between users and computers occurs at the user interface

The golden principle in HCI is that “people should come first”.

70
WHAT ..(CONT.)
HCI consists of three parts:
Human: could be an individual user or a group of users.
Computer: could be any technology ranging from the general desktop computer to a
large scale computer system.
Interaction: any direct or indirect communication between a human and computer.

71
WHAT ..(CONT.)
HCI concentrates on the study of human factors

The study of human factors started during the Second World War by US army.

Usability was born because of badly designed arms that caused “friendly fire”
during war.

72
THE HCI CHALLENGE

73
HCI IS NOT ABOUT
Making the interface look pretty

Only about desktop computers (and that goes for computing as well!)

Something that would be nice to do but usually there’s no time for it

74
HCI IS ABOUT
• Understanding the users
• Understanding users tasks
• Understanding the surrounding environment
• GUI requirements gathering and analysis
• Design prototype
• Evaluate the system

75
THE GOALS OF HCI
The goal of HCI “is to develop or improve the safety, utility, effectiveness, efficiency
and usability of system that include computers.”
(Interacting with computers, 1989, p3)

76
THE GOALS OF HCI
The goals of HCI are to produce usable and safe systems, as
well as functional systems. In order to fulfill that,
developers must attempt to:
 Understand how people use technology
 Building suitable systems
 Achieve efficient, effective, and safe interaction
 Put people first

People needs, capabilities and preferences should come first. People should not have to
change the way that they use a system. Instead, the system should be designed to
match their requirements

77
WHAT IS USABILITY?
A usable system is:
 easy to use
 easy to learn
 easy to remember how to use
 effective to use
 efficient to use
 safe to use
 enjoyable to use

78
WHY IS USABILITY IMPORTANT?
A Good user-interface can:

1. Earn a company billions.

2. Increase users loyalty.

3. Increase users trust.

4. Makes users happy : )

79
WHY ..(CONT.)
A Bad user-interface can:

1. be annoying, embarrassing, frustrating, and even deadly.


2. Increase mistakes in data entry and system operation.
3. Makes functions become completely inaccessible.
4. System failure because of user rejection.

80
WHY HCI IS IMPORTANT IN THE
CONTEXT OF WWW?
• Competition is very close (just another link…)
• Comparison is easily possible (example –
Online-Shop)
• Users who can’t find the product in the shop
cannot buy it
• Users who are not able to fill in correctly the
order form are not going to buy

81
IT IS NOT SIMPLE TO MAKE GOOD
USER INTERFACES

Basic misconceptions:
• If I (the developer) can use it, everyone can use it

• If our non-technical staff can use it, everyone can

• Good user interfaces are applied common sense

• A system is usable if all style guidelines are met

82
AN
UM N
H T IO
F
O RA C
T S E
E N N T
N R I
O
P TE
OM PU
C M
CO
WHAT CAN YOU SAY ABOUT THIS PICTURE?
TECHNOLOGY

It is a human
discovery

Discovery or
Invention?
COMPUTER SCIENCE
Computer Science is the study of computers and computational systems. Unlike
electrical and computer engineers, computer scientists deal mostly with software and
software systems; this includes their theory, design, development, and application.
ERGONOMICS AND HUMAN FACTORS
Ergonomics (or human factors) is the scientific discipline concerned with the
understanding of interactions among humans and other elements of a system,
and the profession that applies theory, principles, data and methods to design in
order to optimize human well-being and overall system performance.
DESIGN
A design is a plan or specification for the construction of an object or system or for
the implementation of an activity or process, or the result of that plan or
specification in the form of a prototype, product or process.
SOCIOLOGY AND SOCIAL PSYCHOLOGY
The main difference between social psychology and sociology is their scope. Social
psychology studies how society and social environment affect individuals'
behavior, whereas sociology studies groups within society and society as a whole
to analyze how people behave as part of a social system.
ETHNOGRAPHY
Ethnography is a branch of anthropology and the systematic study of individual
cultures. Ethnography explores cultural phenomena from the point of view of
the subject of the study.
INFORMATION SECURITY
Information security protects sensitive information from unauthorized activities,
including inspection, modification, recording, and any disruption or destruction.
The goal is to ensure the safety and privacy of critical data such as customer
account details, financial data or intellectual property.

You might also like