The Internet is very useful. However, in order to benefit from it, you must have some knowledge and follow a set of specified principles. Not all information found on the Internet is reliable and up to date and its usage is associated with some online threatsthreatsthreats. The Internet, as any other tool, may be used for abuse.
Create a comparison of the advantages of using the Internet (including social networks, instant messengers, online games and e‑commerce services, e.g. online shops and Internet auctions) and on the other hand threatsthreatsthreats and risksrisksrisks associated with the use of the above services.
R1L6agGXp1sEV
Ilustracja interaktywna przedstawia w schematyczny sposób przepływ danych w internecie - ciągi cyfr zer i jedynek spadających w kolumnach z góry na dół. W tle widać kulę ziemską z zarysowanymi konturami kontynentów. Na ilustracji widoczne są numery, a na nich podpisy. 1. unreliable and outdated content {audio}, 2. dangerous content {audio}, 3. content that breaks the law {audio}, 4. phishing, i.e. an attempt to obtain sensitive information {audio}, 5. personal data theft {audio}, 6. taking control over accounts {audio}, 7. behaviour that is unethical and breaks the law, including cybercrime {audio}, 8. taking over data from a device {audio}, 9. taking control over a device {audio}
Ilustracja interaktywna przedstawia w schematyczny sposób przepływ danych w internecie - ciągi cyfr zer i jedynek spadających w kolumnach z góry na dół. W tle widać kulę ziemską z zarysowanymi konturami kontynentów. Na ilustracji widoczne są numery, a na nich podpisy. 1. unreliable and outdated content {audio}, 2. dangerous content {audio}, 3. content that breaks the law {audio}, 4. phishing, i.e. an attempt to obtain sensitive information {audio}, 5. personal data theft {audio}, 6. taking control over accounts {audio}, 7. behaviour that is unethical and breaks the law, including cybercrime {audio}, 8. taking over data from a device {audio}, 9. taking control over a device {audio}
While using the Internet, you can be exposed to content that you would not like to do with, such as:
content encouraging to violence,
content promoting attitudes and behaviours that pose risk to health, e.g. gambling, drugs, anorexia, encouraging to join cults etc.,
content encouraging to committing crimes,
content approving racial discrimination.
Part of these materials are placed online illegallyillegallyillegally, other, though harmful to younger Internet users, conform to the law. You can come across most of them accidentally. Therefore the ability to critically assess online content is very important.
Another threat is using the Internet illegallyillegallyillegally. First of all you have to remember that not all online content is free. You have already learnt that computer programmes, films, music or books are published on the Internet under licenceslicenceslicences. These materials are copyrighted. It is important to conform to the copyrightcopyrightcopyright. When you download files from illegal sources, you:
break the law, which may entail legal consequences,
expose your computer to threatsthreatsthreats posed by hackers (viruses, Trojan horses, which cracked programmes may be infected with).
While using web portals, remember that you cannot trust every person you meet online. Somebody may want to obtain information about you, or even harm you. Never make appointments with people met online without your parents consent.
RFUoWVGYe4aIB
Ilustracja przedstawia nastolatkę kontaktującą się za pomocą komputera ze starszym mężczyzną podszywającym się pod nastolatka. Do każdej postaci dodany jest dymek z napisem. Nastolatka: I'm Anne, I'm 11 years old. I'm looking friends. Mężczyzna: My name is Billy and I am also 11 years old.
In the event of online threat you can seek help by calling on 116‑111. You will also find useful information on the web site of the Empowering Children Foundation.
RmQfviSfl6ROR
Ikonografika telefonu : słuchawka telefonu umieszczona w kole. Obok zapisany numer 116-111
Consider whom could you contact in the situations listed below. Who could solve the problem the best and the quickest? Create a multimedia presentation which could offer guidelines for your school mates.
Someone is recording you with their mobile phone without your consent.
Someone attacks you on the Internet.
You receive unpleasant text or multimedia messages.
Someone intimidates or blackmails you.
Someone has placed information about you on the Internet which is false or posted without your consent.
Someone has broken into your account, e.g. on a social network.
Tell your parents that you want to meet a person whom you know only from the Internet.
When you receive information that embarrasses you, tell about it someone you trust.
Do not trust strangers. Be cautious when someone wants to learn too much about you (e.g. your name, telephone number, address).
Exercises
Exercise 1
RDFe7rpQmUEOD
Wersja alternatywna ćwiczenia: Identify false sentences: Możliwe odpowiedzi: 1. Tell your parents that you want to meet a person whom you know only from the internet., 2. When you receive information that embarrasses you, tell about it someone you trust., 3. Do not trust strangers met online. , 4. When someone on the internet wants to learn your personal details, you can disclose this information without concern.
Wersja alternatywna ćwiczenia: Identify false sentences: Możliwe odpowiedzi: 1. Tell your parents that you want to meet a person whom you know only from the internet., 2. When you receive information that embarrasses you, tell about it someone you trust., 3. Do not trust strangers met online. , 4. When someone on the internet wants to learn your personal details, you can disclose this information without concern.
Identify false sentences:
Tell your parents that you want to meet a person whom you know only from the internet.
When you receive information that embarrasses you, tell about it someone you trust.
Do not trust strangers met online.
When someone on the internet wants to learn your personal details, you can disclose this information without concern.
zadanie
Source: GroMar, licencja: CC BY 3.0.
Exercise 2
Create a leaflet with information about the safe usage of web portals, instant messangers and online games.
Exercise 3
Explain in English what in your opinion online anonymity is.
Exercise 4
Rs2uszwENBANe
Wersja alternatywna ćwiczenia: Indicate which pairs of expressions or words are translated correctly. Możliwe odpowiedzi: 1. zagrożenia - threats, 2. licencje - licences, 3. nielegalnie - illegally, 4. prawa autorskie - copyright, 5. niebezpieczeństwa - safety, 6. bezpieczeństwo - risks
Wersja alternatywna ćwiczenia: Indicate which pairs of expressions or words are translated correctly. Możliwe odpowiedzi: 1. zagrożenia - threats, 2. licencje - licences, 3. nielegalnie - illegally, 4. prawa autorskie - copyright, 5. niebezpieczeństwa - safety, 6. bezpieczeństwo - risks
Indicate which pairs of expressions or words are translated correctly.
zagrożenia - threats
licencje - licences
nielegalnie - illegally
prawa autorskie - copyright
niebezpieczeństwa - safety
bezpieczeństwo - risks
zadanie
Source: GroMar, licencja: CC BY 3.0.
ROdiYWQ3uNJDU1
Interaktywna gra, polegająca na łączeniu wyrazów w pary w ciągu jednej minuty. Czas zaczyna upływać wraz z rozpoczęciem gry. Jeden ruch to odkrywanie najpierw jednej potem drugiej karty z wyrazem. Każdy wyraz jest odczytywany. Kolejny ruch to odkrywanie trzeciej i czwartej karty. W ten sposób odsłuchasz wszystkie wyrazy. Nawigacja z poziomu klawiatury za pomocą strzałek, odsłuchiwanie wyrazów enterem lub spacją. Znajdź wszystkie pary wyrazów.
Interaktywna gra, polegająca na łączeniu wyrazów w pary w ciągu jednej minuty. Czas zaczyna upływać wraz z rozpoczęciem gry. Jeden ruch to odkrywanie najpierw jednej potem drugiej karty z wyrazem. Każdy wyraz jest odczytywany. Kolejny ruch to odkrywanie trzeciej i czwartej karty. W ten sposób odsłuchasz wszystkie wyrazy. Nawigacja z poziomu klawiatury za pomocą strzałek, odsłuchiwanie wyrazów enterem lub spacją. Znajdź wszystkie pary wyrazów.
Match Polish terms with their English equivalents.
risks
threats
safety
copyright
prawa autorskie
zagrożenia
nielegalnie
niebezpieczeństwa
illegally
bezpieczeństwo
Source: Zespół autorski Politechniki Łódzkiej, licencja: CC BY 3.0.