Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

E-Safety

9/3/2023

M.DAWOOD AWAN
CLASS: 8-T
E-Safety
E-safety is the term used to describe the concept of keeping users safe while browsing
the internet, particularly those in vulnerable categories, such as children and the elderly. The
basic foundation of e-safety is to protect users from potentially harmful content or activities,
such as grooming, pornography, or cyber bullying, and includes both websites and apps
(Jones). This report will discuss the cyber security issues and e-safety.

a. Digital Citizenship:
Digital citizenship refers to the responsible use of technology by anyone who uses computers,
the Internet, and digital devices to engage with society on any level. Although we live and
interact in the digital world in a similar way to the offline world, we're not always as mindful
of our actions online. We can sometimes act without realizing how it could affect our
reputation, safety and growth as digital citizens. In the meantime, everything we do online
continues to affect and define our digital world and selves. Digital media also provide unique
opportunities for everyone to get involved, to speak out and to make change both online and
offline. Our actions in our online world can have a real impact and we all have a role to play
as active digital citizens (“What Is Digital Citizenship?”).

(Source: “What Is Digital Citizenship?”)

b. Digital Resilience:
A digitally resilient organization can spot early signals of disruption (from real-time data)
with an aim of preventing or reducing the impact on mission critical service delivery. Digital
resilience is a foundational component of business resilience, encompassing security, IT and
engineering. In short, it's the capability of an organization to continue its business operations
uninterrupted during disruptive events, such as natural disasters, cybersecurity incidents,
pandemics, power outages and hardware and software failures. An organization with high

Report on E-Safety
digital resilience can quickly detect, prevent and recover from such crisis situations. It
enables you to provide uninterrupted customer service, minimize financial losses and prevent
reputational damage. (Wickramasinghe)

(source: Frick)

c. Cyber Bullying:
Cyberbullying is bullying that takes place over digital devices like cell phones, computers,
and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media,
forums, or gaming where people can view, participate in, or share content. Cyberbullying
includes sending, posting, or sharing negative, harmful, false, or mean content about someone
else. It can include sharing personal or private information about someone else causing
embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal
behaviour. The most common places where cyberbullying occurs are:
 Social Media, such as Facebook, Instagram, Snapchat, and Tik Tok
 Text messaging and messaging apps on mobile or tablet devices
 Instant messaging, direct messaging, and online chatting over the internet
 Online forums, chat rooms, and message boards, such as Reddit
 Email
 Online gaming communities (Stopbullying.gov)

Report on E-Safety
(Source: Quinn)
d. How to Avoid Cyber Bulling:
Bullying is a problem that many of us have encountered at some point, and it’s one that
affects all parts of society and reaches from the school to the workplace. It has moved far
beyond in-person interactions, too, especially as we all spend more of our time online on
social media, workplace apps, and message boards. More time spent online increases our
exposure to cyberbullying, which is the act of bullying another person online. Thankfully,
most social media platforms and forums include built-in ways to protect yourself as well as
rules that help minimize the risk of bad behaviour by others. But even if they don’t, you still
have options, including contacting law enforcement. We can manage privacy settings online
as follow:
 Protect your passwords
 Keep clear records
 Don’t respond or retaliate
 Block cyberbullies via user settings
 Report cyberbullying to site admins
 Stay safe online
 Ask when you think a friend might need help
 Remember you aren’t alone
 Contact law enforcement if you feel threatened (Packard)

e. Fake News:
The Internet is an incredible resource for news and information, but unfortunately not
everything online is trustworthy. Fake news is any article or video containing untrue
information disguised as a credible news source. While fake news is not unique to the
Internet, it has recently become a big problem in today’s digital world. A fake news article is
designed to outrage and shock, causing some readers to share it on Facebook, Twitter, or
another type of social media platform without questioning it. Sharing the article exposes it to
more people who may be outraged by it, who also share it without question, and so on. This
cycle continues until a sizeable number of people believe this fake story is the truth. Writers
of fake news typically create it for one of two reasons: to fulfil a social agenda, like angering
a population against a political opponent; or to earn advertising revenue through visits to their

Report on E-Safety
sites. Unfortunately, business is booming. Just one fake news writer claimed to earn $10,000
per month from the advertising revenue of his articles, and he said he planned to keep writing
until the money stopped coming in. With an unknown number of writers drafting multiple
fake articles each day, the flood of bad information may continue for quite some time.
(globel)

f. Live Streaming:
Live streaming is a social media feature on platforms like Facebook and Instagram that
invites brands and users to share unedited, raw footage in real time. As audiences began to
crave greater authenticity for brands, raw and genuine video grew in popularity. 80% of
customers now say that they’d rather watch a live video than read a company’s blog. Live
streaming is an effective, impactful way to accomplish any goals and objectives you want to
accomplish. Live streaming can be used to promote and announce your new products and
services, announce big company news, teach an online class, and more. Live streaming gives
brands the opportunity to reach and interact with millions of people across the
world. (Marketing Hub)

g. Etiquettes of Password Protection:


Passwords are the gatekeepers to our personal, private or even professional data, we use them
to protect our accounts and the information within them restricted to authorised users only.
We suggest a few standards and best practice methods that will prove difficult for any
formidable would-be intruders to gain access. Passwords on the Integrity platform are
required to contain:
 Anywhere from 6 to 200 characters
 At least one upper case character
 One numerical digit from 0 to 9
 One non alphanumeric character
These are in place as a starting point, there are many factors in which we should be
implementing in respect of all our separate passwords. (Anderson)

h. How to Manage Privacy Protection:


If you do anything online and you care about your privacy, you can't ignore the fact that data
breaches, spyware, and identity theft have become all too common in the modern world. But
it's not difficult to step up your protections to ensure that your user accounts, browsing habits,

Report on E-Safety
and most sensitive data don't end up in someone else's hands. In this guide, we'll walk you
through a bunch of easy and affordable ways to bolster your online security with simple
solutions like password managers, virtual private networks (VPNs), strong security tools, and
better browsing habits. We've divided the tips into categories to make it easier to find the
ones that might be most helpful to you. (Lishchuk)
Name: M.Dawood Awan
Class: 8-T

Report on E-Safety
References
Anderson, Travis . “Password Etiquette | Intigriti Help Center.” Kb.intigriti.com, 27 Aug.
2023, kb.intigriti.com/en/articles/5379017-password-etiquette. Accessed 3 Sept. 2023.
Globel, gcf. “The Now: What Is Fake News?” GCFGlobal.org, 2019,
edu.gcfglobal.org/en/thenow/what-is-fake-news/1/.
Jones, Connor . “What Is E-Safety?” ITPro, 18 Oct. 2019,
www.itpro.com/strategy/28709/what-is-e-safety.
Lishchuk, Ruslana . “How to Protect Your Online Privacy.” Mackeeper.com,
mackeeper.com/blog/online-privacy-protection/.
Marketing Hub, influencer. “What Is Live Streaming ?” Influencer Marketing Hub,
influencermarketinghub.com/glossary/live-streaming/.
Packard, Hewlett. “10 Best Ways to Prevent Cyberbullying Online - HP Store Canada.”
Hp.com, 2022, www.hp.com/ca-en/shop/offer.aspx?p=best-ways-to-prevent-cyber-
bullying-online.
Stopbullying.gov. “What Is Cyberbullying.” Stopbullying.gov, U.S. Department of Health
and Human Services, 5 Nov. 2021, www.stopbullying.gov/cyberbullying/what-is-it.
“What Is Digital Citizenship?” MediaSmarts, 8 Aug. 2022, mediasmarts.ca/digital-media-
literacy/general-information/digital-media-literacy-fundamentals/what-digital-
citizenship#:~:text=Digital%20citizenship%20is%20the%20ability.
Wickramasinghe, Shanika . “The Digital Resilience Guide: 7 Steps to Building Digital
Resilience.” Splunk-Blogs, www.splunk.com/en_us/blog/learn/digital-
resilience.html#:~:text=What%20is%20Digital%20Resilience%3F. Accessed 3 Sept.
2023.

Report on E-Safety

You might also like