Glossary

Similar documents
ONLINE SAFETY. Messaging, , Vlogging and Sexting

Electronic Network Acceptable Use Policy

Anti-Cyber Bullying Policy.

Circle Link 1 "Know Before You Go" Web Literacy Tips:

INTERNET SAFETY IS IMPORTANT

Vocabulary Bank organized by module

Acceptable Use Policy Document ID: SER-POL-001

Computer networks 2013

Practice Examination 3

STUDENT ACCEPTABLE USE OF IT SYSTEMS POLICY

Communication and Usage of Internet and Policy

The Table Privacy Policy Last revised on August 22, 2012

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Chapter 6 Network and Internet Security and Privacy

Netiquette. IT Engineering II. IT Engineering II Instructor: Ali B. Hashemi

Digital Safety and Digital Citizenship

POLICY BURLINGTON TOWNSHIP BOARD OF EDUCATION. PROGRAM 2361/page 1 of 8 Acceptable Use of Computer Network/Computers and Resources M

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning

F9A0 04 (ESKINT2): Using the Internet 2

Netiquette. IT Engineering II Instructor: Ali B. Hashemi

amaysim NBN Broadband Fair Go Policy Valid as of May 2017

EADS up. stop think connect

Using in Schools

Online Dangers. According to the National Center for Missing and Exploited Children.

Your message is sent from your computer to a server (like the post office) where the

Introduction to

Kings Heath Academy Acceptable Use (Staff and Students) Policy and Procedures September 2018

INTRODUCTION TO Part 3

Online Security and Safety Protect Your Computer - and Yourself!

Conveying Emotion. Chapter 12: Computers In Polite Society: Social Implications of IT. Improving the Effectiveness of . Problems with

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

(electronic mail) is the exchange of computer-stored messages by telecommunication.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Family Internet Agreement

Frequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web?

How many people are online? As of Sept. 2002: an educated guess suggests: World Total: million. Internet. Types of Computers on Internet

Breckenridge Financial Supplies Website Use Policy

The West End Community Trust Privacy Policy

The process by which a user can associate specific permissions to each username.

CrossFit.com Privacy Policy

PIN / Password Security

Spree Privacy Policy

SECURE USE OF IT Syllabus Version 2.0

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.

Octopus Online Service Safety Guide

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

ICT Acceptable Use Policy for Students

The John Fisher School ICT Policy

Binarytech Digital Education Karta Allahabad ( Notes)

Reading School: ICT User Agreement Return Form (AUP)

A1 ASSIGNMENT TERMINOLOGY.

Acceptable Use Policy (AUP)

ELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12

: Acceptable Use Policy

Abbreviations and acronyms are commonly used in technology-based communication. Cross curricula and particularly suited to English and Language Arts.

ECDL / ICDL IT Security. Syllabus Version 2.0

Acceptable Use Policy

2.4.2 List out the Dos and Don ts while communicating online.

So, you re child wants to sign up for Myspace...

PRIVACY STATEMENT. Effective Date 11/01/17.

SMS SERVICE PROVISION

FAQ: Privacy, Security, and Data Protection at Libraries

The Internet and the World Wide Web Lesson 3 Communicating on the Internet

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

Discussion Ppt To work on completing questions you need your book and exercise copies

Discover (n.): This feature surfaces personalized content tailored to your interests.

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Acceptable Use Policy

USE POLICY. iprimus.com.au

Policy & Procedure Privacy Policy

STUDENT ICT ACCEPTABLE USE POLICY

3.5 SECURITY. How can you reduce the risk of getting a virus?

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

AOL keyword: UPGRADE HELP = This keyword will give you much information about how to install or upgrade to a higher version of AOL.

One Sector Community Limited ACN ( OSC ) Privacy Policy

EnviroIssues Privacy Policy Effective Date:

Chapter 2 The Internet and World Wide Web

American Dental Hygienists Association Privacy Policy

High-Speed Internet. Connection Guide

PUPIL ICT ACCEPTABLE USE POLICY

Service Specific Terms & Conditions

(short for electronic mail) is a fast and convenient way to communicate with others. You can use to:

Security Awareness. Presented by OSU Institute of Technology

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Acceptable Use Policy

Student E-Safety Induction

Resource:

Each member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network

VIEWING AND/OR USE AND/OR COMMUNICATION IS CONSTRUED AS ACCEPTANCE OF THE TERMS OF THIS POLICY

Your security on click Jobs

Terms and Conditions

Eagles Charitable Foundation Privacy Policy

Internet and Mini.K.G Senior Scientist, FRAD, CMFRI

Acceptable Use Policy

The ICT4me Curriculum

Emergency Nurses Association Privacy Policy

The ICT4me Curriculum

SHARING PHOTOS AND OTHER ATTACHMENTS ONLINE

ACCEPTABLE USE POLICY

Transcription:

Glossary www.cybersmart.gov.au/cyberquoll

CyberQuoll Internet Safety Education for Primary School Students, Parents Guide Website: www.cybersmart.gov.au/cyberquoll Source: Commonwealth of Australia 2009 This work is based on materials that constitute copyright of the Commonwealth of Australia and is licensed under a Creative Commons Attribution No Derivatives 2.5 Australia Licence (see: http://creativecommons.org/licenses/by-nc-nd/2.5/au/ legalcode). The work is freely available at: www.cybersmart.gov.au/cyberquoll. If you republish this work you are required to retain any symbols and notices that are included on these materials. Disclaimer: The ACMA has taken reasonable care to ensure the information in this work is correct and accurate at the time of publication. However, the ACMA makes no warranties regarding the correctness of the information at later dates, and disclaims liability for damages resulting from its use. The ACMA recommends that users exercise their own independent skill and judgment when using this work and carefully evaluate the accuracy, currency, completeness and relevance of the material for their purposes. The ACMA requests that if you republish this work, you notify the ACMA by email at: candinfo@acma.gov.au including a link to the republished work. This is to assist us in tracking the uptake of our works and the innovative uses that our licensees are making of our works. Published by the Australian Communications and Media Authority. Please address any enquiries to: Manager Communications and Publishing, Australian Communications and Media Authority, Melbourne Central Office, PO Box 13112 Law Courts, Melbourne Vic 8010.

The ACMA Attachment Blog Broadband Browser CD-ROM Chat room Cyberbullying Cyberspace Download E-crime Email Emoticons Filter Firewall Flaming Handle Identity theft Instant messaging Internet Internet acronyms Internet content Mobile internet-enabled devices Netiquette Newsgroups Online/offline Password Peer-to-peer (P2P) networking Personal information Phishing Pop-ups Privacy policy Safe zones Software Spam Spyware Stranger danger Unreliable information Unsolicited email URL User Username Virus Web page 3

The ACMA The Australian Communications and Media Authority (The ACMA) is responsible for the regulation of broadcasting, the internet, radiocommunications and telecommunications. The ACMA s responsibilities include: promoting self-regulation and competition in the communications industry, while protecting consumers and other users fostering an environment in which electronic media respect community standards and respond to audience and user needs managing access to the radiofrequency spectrum representing Australia s communications interests internationally. Attachment This is a file of information that is sent with an email. It may contain text, photos, graphics, sound or video. Blog The word blog is derived from the combination of the two words, web and log. Blogs are virtual diaries created by individuals and stored on the internet. Blogs generally consist of text and images and can appear in a calendar type format. Broadband Sometimes referred to as a high speed internet, broadband is an always on fast connection to the internet. Today there are a wide variety of broadband technologies available in most areas. Two of the more commonly used technologies are cable and DSL broadband. Browser A software program that allows you to explore the internet in an easy-to-use way. Examples of popular browsers are Internet Explorer and Firefox. CD-ROM (Compact Disk-Read Only Memory) A compact disk can store large amounts of information and is inserted into a computer s CD-ROM drive. For example, the CyberQuoll internet safety program has been copied on to a CD. Chat room A chat room is a place on the internet where people with similar interests can meet and communicate by typing messages on their computer. People can often enter an unmoderated chat room without any verification of who they are. Problems for students can arise with chat room participants pretending to be someone they are not. Cyberbullying The use of Information and Communication Technologies (ICT), particularly mobile phones and the internet, to deliberately upset someone else. 4

Cyberspace The online world of computer networks. Download By downloading something, such as a music file, document, or photo, you are transferring information from the internet to your computer. E-crime E-crime is where computers or other electronic communications devices, for example mobile phones, are used to commit an offence, are the target of an offence or act as a storage device in an offence. Email Email is a service that lets you send a message, like a letter, to another person over the internet. The message is stored on a computer and is read when the recipient checks their mail. This is a little like checking your real mailbox. Emoticons Emoticons is a word derived from the two words emotions and icons. Emoticons are a shorthand method of explaining a feeling on the internet. Emoticons can be used in any communication over the internet but are particularly popular with chat rooms and instant messaging. Here s an example of an emoticon :) = happy. Filter A filter manages access to online content. A filter can restrict times when the internet can be accessed and also restrict what is viewed and downloaded. Some filters can also be instructed to specifically block information from being displayed. Types of filters range from home filters to filters used by a school on its server. Firewall Firewalls can limit and stop access to computers by unauthorised people or systems. A personal firewall can be installed on your home computer to protect it from intruders on the internet. Firewalls can be used to stop the spread of viruses and spam and can be a valuable tool in protecting children online. Flaming Flaming is the sending of messages that include bad language or repeat messaging especially of undesirable or obscene text. Flaming, also known as flame wars, occurs in unmoderated chat rooms. The majority of chat rooms remain open messages are posted automatically with no human intervention. Handle (see also Username) A handle is a name for a person that is used in the online world. When a person signs up for a service such as Hotmail or ICQ, they are required to create a unique identifier a handle. When in a chat room you should always use a handle. 5

Identity theft Identity theft occurs when somebody steals your name and other personal information for fraudulent purposes. Identity theft is a form of identity crime (where somebody uses a false identity to commit a crime). Instant messaging An instant messaging program is one that can instantly send messages from one computer to another by means of small pop-up windows. They are a form of instant email and are very popular with students and adults alike. Internet The internet is a global communication network that enables computers and people to share information and interact. Pictures, movies, text and voice can be easily transmitted across the internet via a range of services such as email or the world wide web. There is no central home for the internet as it has been designed to operate from many geographically different locations. Anybody can connect to the internet if they have an internet-ready computer and an account with an internet service provider or ISP. Internet acronyms Internet acronyms are acronyms that are used specifically on the internet or mobile phones as a method of communication. They are popular because they save people time in preparing messages. It is quicker, for example, to type in one acronym which is easily understood, than it is a series of words. Internet content All forms of information including text, pictures, animation, video and sound recording, and may include software. Mobile internet-enabled devices Mobile devices such as phones which are now able to access the internet, take photographs and sometime record sound. Netiquette Netiquette is derived from the two words, internet and etiquette. Netiquette describes the rules for how one should act online especially in newsgroups, forums and chat rooms. Netiquette can also be applied to email creation and transmission. Newsgroups Newsgroups are also known as online forums and are places on the internet where people can contribute to a discussion by leaving a message of interest. Newsgroups exist on thousands of topics, and are useful for building online communities and bringing together people with similar interests. Unrestricted or unmoderated newsgroups pose significant safety risks for students. 6

Online/offline When someone is online, he/she is connected to the internet. People communicate online by sending and receiving information via email, instant messaging or a chat room. Offline is another term for the real world, outside the internet. Password A password that you use on the internet works in a similar way to a password you may use in real life. For example, you may have a password for your video/dvd store, or a bicycle chain lock to protect your belongings from theft or damage. When using a computer you may need to enter your password to open it. On the internet, you usually have an email account password. Passwords protect your computer from misuse, as well as protect your privacy. A password can consist of a secret word, set of numbers, set of characters, set of letters, or a combination of these that only you know. Your password should never be given to anyone other than your parents or carer. You should get into the habit of password protecting all blogs and websites you may create. This will ensure that only people you authorise can access the site. Peer-to-peer (P2P) networking Peer-to-peer networking (P2P) is an application that runs on a personal computer and shares files with other users across the internet. P2P networks work by connecting individual computers together to share files instead of having to go through a central server. Personal information Personal information is anything that can identify you, such as name, address, telephone number, mobile number, age, what school or sports club you attend, your email address, password, username, bank account or credit card details and who your family is. Phishing Phishing is the practice where a scammer, who is pretending to be from a legitimate organisation, sends misleading emails requesting personal and financial details from unsuspecting people. Pop-ups Pop-ups are small windows that appear in the foreground of an internet browser. Pop-ups are often used to display advertising or unwanted content on the screen; however, they can be integrated into some websites for practical purposes. Privacy policy A privacy policy outlines the terms by which a company or website handles personal information from its visitors to the site. Privacy policies can often be found as a text link in the footer section of a web page. Safe zones Safe zones are an alternative to filtering or labelling. Labelling allows web developers to categorise online content on the basis of language, violence, sexual content, and so on. Safe zones are services providing access to a range of sites which are suitable for children. 7

Software Computer software. Spam Spam is the email equivalent of junk mail or nuisance phone calls. Spam can simply be defined as unsolicited electronic email, instant messaging, SMS or MMS (text and image-based mobile phone messaging) of a commercial nature which is sent to individuals/organisations that have not consented to receive it. Spyware Spyware is a computer program that can be installed on personal computers, usually without the permission from the owner, which collects information and sends it back to another source usually an internet marketing or pornographic website. Stranger danger Stranger danger is the term used to describe the potential dangers in meeting a stranger online. Adults may pretend to be children in chat rooms or other internet services. It is important for students to realise they may not be communicating with the person they think they are. Unreliable information Information on the internet may misrepresent the truth, be out of date, biased or just incorrect. Unsolicited email Means electronic mail that is unrequested by the recipient and is of an advertising or promotional nature. URL URL stands for Uniform Resource Locator which is the address of a file of content on the internet. All URLs begin with www (world wide web), followed by the name of the company or product. For example, the URL for CyberQuoll is: www.cybersmart.gov.au/cyberquoll User Means a user of the internet. Username (see also Handle) A username is a name for a person that is used in the online world. When a person signs up for a service such as Hotmail or ICQ, they are required to create a unique identifier a username. When in a chat room you should always use a username. Virus A virus is a computer program which is designed to cause an undesirable effect on a computer system. Viruses are usually disguised as something else. Viruses are often designed so that they can be transferred from one computer to another without the users knowing. They can be hidden in emails, on CDs or in files that are shared across the internet. Computer viruses can cause harm to computer systems and need to be avoided. Web page Means a file of content accessible on the world wide web by requesting a single URL. 8