Sie sind auf Seite 1von 4

Section 2.2, Internet Safety.

Online Disclosure of Personal Information

1. Full name: use nicknames & partial names


2. Home Address: do not give out personal address to individual on the
web
3. Phone Number: a phone number can be used in a reverse search on
the Internet to identify the addresses of an individual
4. Social Security Number: disclosure of social security numbers is not
a good idea unless the website is secured. It could be used to steal
financial and personal info
5. Disclosure of passwords to anyone should be avoided. The greater
the number of people with access to personal information, the
greater the risk.
a. The password should be at least 8 characters long
b. Use a combination of letters & numbers.
c. Change the password every 1 – 2 months.
d. Do not give out the password
e. Do not use birthdays, pet names, friends names, common
words
6. Disclosure of the names of the family member is not a good idea as
well
7. Credit card info should only be disclosed to trusted, verified, and
secure sites have security and encryption software.
8. Photos: are potentially sources of risk because they are personal
information. Photos can also be edited to falsify info such as to make
ID cards.
9. Behave properly when online
Employers & college recruiters are frequently turning to online social
networking sites to assess the behavior of potential employees.
a. Inappropriate pictures and illegal behavior may be viewed by the
future employers and can prove fatal to one’s job potential.
b. Your online reputation is valuable.
10.Posting harmful information about someone on the Internet &
especially on social networking sites is never a good idea.
11.Safety guidelines and precautions.
a. Avoid yelling when chatting online
b. Do not bully
c. Tell elders if u are bullied
d. Never meet someone u only talked to online
12.Do not open emails or respond to sites that promise you will get rich
quick or anything else that seems too good to be true. Phishing
schemes
13.Do not give out credit info without parental permission and only
when the site is certified as secure. Encryption
14.The URL of a secure site begins with https: - the “S” indicates a
secure web site
15.An interactive lock is displayed on the site, usually bottom corner.
16.A seal is another indication of safety. is there is a seal , inspect &
make sure it is authentic.
17.Virus: a small piece of software that attaches to programs that are
installed on a user’s pc. An email virus has the potential to
automatically mail itself to contacts.
18.Spam: unwanted and unsolicited email advertisements or messages
19.Spyware: malicious software designed to take partial control of a
computer’s operations without the consent of the user.
a. Some spyware intercepts and records passwords and credit
numbers
b. Tracks a user’s visits to different websites to analyze their
spending activity and forecast consumer behavior.
The Internet, Section 1
1. Individual search engine: uses a computer programs called
spiders, crawlers or robots to match key words with the web
pages that contain them.
a. The result are lists of web pages
b. Does not search the internet itself, but instead searches
databases of information about the Internet.
c. Google, Ask, Yahoo, Live
2. Meta – search engine – sends requests for information to several
search engines and compiles the results Dogpile, AltaVista.
3. As the results are compiled duplications are eliminated thus
yielding fewer results.
4. A time – saver compared to a regular search
5. Examples: Google custom search allows users to control their
search by specifying
a. Name of the search engine, description, language, sites.
6. Subject directions: searchable databases that are developed &
maintained by human selection of sites to search broad
categories & description.
a. Used in research & often linked to library systems, to research
databases,
b. Mostly made up of searchable databases, such as library
catalogs
c. Searches for non-HTML formats PDF, Word, Excel, Power Point*
d. Results in reliable pages than search engines.
e. http://informine.ucr.edu – compiled by academic libraries
f. www.lil.org – librarian’s internet index
g. www.about.com
7. EBSCO host- premium online information resources for
institutions worldwide
a. Colleges and universities, hospitals and medical institutions,
worldwide.
b. Government, k – 12 schools, public libraries
c. Libraryresearch.com – a subsidiary of EBSCOhost
d. ERIC (educational resources information center)
e. CRIS (current research and info system)
f. Incywincy.com
g. Completeplant.com
h. Google Scholar
8. Internet search methods
9. Keywords: unique phrase or terms, Synonyms or word variations
a. Field: a search parameter, such as title, date of publication,
useful for drilling down and focusing on specific content
10.Boolean search: + - () and or not
a. Uses operators with keywords to narrow search parameters
b. AND narrows results by searching for pages that contain both
keywords
c. OR expands results by searching for pages that contain either
keywords
d. Quotation marks narrow results by searching for phase instead
of words

Boolean is implied in many search engines, but still a valuable method for
narrowing searches

Operator Search String Result


1. AND Movies AND Movies and advertising
advertisement
2. + +movies+advertisem Movies, advertising, and sales
ent+sales
3. OR Jam or Jelly Jam, jelly, or either them
4. OR Jam OR Jelly OR Documents and websites
preserves containing one or all of the terms
5. AND/OR Orchids AND (growing Orchids and either the term
OR Planting growing or the term planting or
both terms
6. “ “president Clinton” President Clinton AND foreign
“ AND “Foreign Policy” policy

Das könnte Ihnen auch gefallen