1/83
Flashcards covering key vocabulary related to personal security, online privacy, rights, responsibilities, digital footprint, internet searches, copyright, and cyberbullying.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Privacy
Controlling your personal information.
Security
Protecting your data and devices from unauthorized access.
Compromised Personal Privacy
Can occur through data breaches, oversharing on social media, and weak passwords.
Maintaining Personal Security
Using strong passwords, enabling two-factor authentication, being cautious of phishing attempts, and updating software.
Data Breach
An incident where sensitive data is viewed, stolen, or used by an unauthorized individual.
Cybercriminal
A person engaged in criminal activities online.
Security Breach
Unauthorized access to digital data, applications, networks, or devices.
Virtual Private Network (VPN)
A technology creating a secure and encrypted connection over less secure networks.
VPN Blocking Tracking
VPNs encrypt internet traffic and mask the IP address, preventing tracking.
VPN Protecting Personal Data
Encrypts data, making it unreadable to eavesdroppers.
Limiting Social Media Information
Reduces the risk of identity theft and social engineering.
Shredding Personal Documents
Prevents recovery and misuse of sensitive information.
Protecting Social Security Number
Essential to prevent identity theft and fraud.
Information Used Against You
Oversharing can lead to scams and discrimination.
Safeguarding Data and Devices
Using strong passwords, keeping software updated, and using antivirus software.
Loss of Control Online
Once information is shared online, it can be accessed indefinitely.
Blocking Internet Sites and Phone Numbers
To avoid contact, harassment, or scams.
Types of Home Security
Includes alarm systems, security cameras, smart locks, and monitored services.
Internet Scams
Can include phishing emails, fake websites, and online shopping scams.
Right to Acknowledge How the Internet Works
Understanding how data is collected and used.
Accessing Information
Knowing how platforms provide information.
Separating Fact from Non-Fact
Critically evaluating online information to identify biases.
Content vs. Advertising
Recognizing the difference between objective information and marketing.
Protection from Cyberbullying
Everyone has the right to be free from online harassment.
Protection from Violence
The right to be safe from threats in cyberspace.
Protection from Diminishment or Bullying
The right to not be demeaned online.
Participating in Discussions and Forums
The right to express opinions in online communities.
Engaging and Interacting on Social Media
The right to use platforms to connect and share.
Seeking Help if Threatened
Right to report cyberbullying and online threats.
Seeking Help from School and Authorities
Students can report online behavior concerns.
Right to Education and Information
The right to learn about online safety and digital citizenship.
Right to Remain Safe
The right to physical and emotional safety online.
Right to Original Work
The right to post without manipulation or theft.
Responsibility of Not Modifying Others' Work
Respecting intellectual property.
Digital Footprint
A trail of data created while using the Internet.
Importance of Digital Footprint
It can impact reputation and job opportunities.
Creating a Digital Footprint
Every email, post, and click leaves a trail.
Positive and Negative Footprints
Positive footprints showcase skills, negative can damage reputation.
Every Action Leaves a Trail
Be mindful of what you share online.
Information Gathered
Advertisers use your data to personalize ads and assess suitability.
Digital Economy
The ecosystem built from online connectivity.
Cookies
Small files that track browsing activity.
Digital Footprint and Advertising
Advertisers target you based on your digital footprint.
Negative Impact on Job Offers
Employers may judge candidates based on online presence.
Thinking Before Posting
Consider consequences before sharing anything online.
Internet Alerts
Tools that notify you when personal information appears online.
Positive First Impression
A well-managed digital footprint helps create a good impression.
Strong Positive Footprint
Showcasing skills and positive contributions online.
Key Terms in Internet Searches
Using specific words to narrow search results.
Best Search Engine
One that provides accurate and unbiased results.
Facts vs. Opinion
Distinguishing between objective information and subjective viewpoints.
Political Persuasion
Recognizing how results can be influenced by agendas.
Research Backing
Verifying the credibility of online information.
Rationale for Selecting a Search Engine
Consider privacy, accuracy, and features.
Search Engines
Google, Bing, DuckDuckGo, and Ecosia.
Parameters for Selecting an Honest Search Engine
Look for transparency and unbiased results.
Internet Searches Can Be Traced
Search history is tracked by engines and websites.
Different Search Terms
Using different keywords yields different results.
Fact and Opinion Website Searches
Identifying bias in different websites.
Copyright
A legal right granted to the creator of original works.
Illegal Activity Associated with Plagiarism
Using someone else's work without giving credit.
Responsibility of Knowing Copyright Laws
Understanding and adhering to copyright regulations.
Consequences of Copyright Infringement
Fines, legal action, and reputation damage.
Fair Use
Legal doctrine allowing limited use of copyrighted material.
Appropriate Citation
Giving credit by properly referencing work.
Copyright Laws
Laws protecting the rights of creators.
Protection of Images
Copyright laws also protect visual content.
Internet and Copyright Laws
Easier sharing has increased the importance of copyright enforcement.
Rights with Copyright Protection
Control over how their work is used and distributed.
Cyberbullying
Bullying that occurs over digital devices.
Social Networking and Interaction
Social media platforms can facilitate cyberbullying.
Internet Lingo (Netiquette)
Etiquette for online communication.
Confronting and Reporting Cyberbullies
Important to end cyberbullying offenses.
Negative Impact of Cyberbullying
Can lead to emotional distress and anxiety.
Why Cyberbullying Occurs
Anonymity, lack of supervision, and desire for status.
Mental Impact of Cyberbullying
Causes feelings of isolation and shame.
Digital Law
Laws protecting users from online harassment.
Methods of Cyberbullying
Includes email, social media, and text messages.
Digital Forums and Content
Shared content can be viewed by many.
Permanent Public Record
Online content creates a lasting record.
24/7 Communication
Digital devices allow constant connectivity.
Permanence and Publicity
Online communication impacts various life aspects.
Hard to Notice Cyberbullying
Often goes unnoticed by adults.
Far-Reaching Negative Effects of Cyberbullying
Long-term consequences for both victims and perpetrators.