Проект Безопасность в интернете «Security of users on the Internet»

проект  по английскому языку

Скачать:

ВложениеРазмер
Microsoft Office document icon proekt_artyom.doc234 КБ
PDF icon prezentatsiya1.pdf2.54 МБ

Предварительный просмотр:

муниципальное бюджетное общеобразовательное учреждение

«Ярцевская средняя школа № 1» Ярцевского района Смоленской области

Индивидуальный итоговый

исследовательский проект

«Security of users on the Internet»

                                                 

                                 Автор проекта: Кусанков Артем Дмитриевич,                            

обучающийся 11 класса А

                                            Руководитель: Собянина Екатерина Викторовна,

                                            учитель иностранного языка

   

                                                           2020 г.

                                             Паспорт проекта

Наименование ОУ

муниципальное бюджетное общеобразовательное учреждение «Ярцевская средняя школа № 1» Ярцевского района Смоленской области

Тема

«Безопасность пользователей  в сети Интернет»

Учебный  предмет

Английский язык

Автор

Кусанков Артем Дмитриевич

Руководитель

Собянина Екатерина Викторовна

Тип

Исследовательский

Объект  исследования

Обучающиеся 5-11 классов

Актуализация (проблема)

Какие правила необходимо соблюдать, чтобы Интернет стал безопасным?

Гипотеза

Избежать обмана в Интернете возможно в случае хорошей информированности пользователей сети Интернет.

Цель

Рассмотрение основных видов мошенничества и разработка рекомендаций по безопасному пользованию сети Интернет.

Задачи

  • Рассмотреть основные виды мошенничества в сети Интернет.
  • Провести опрос «Безопасность пользователей  в сети Интернет»
  • Проанализировать результаты опроса.
  • Создать буклет с рекомендациями безопасного пользования ресурсами сети Интернет.
  • Распространить буклеты среди обучающихся и учителей школы.

Методы

Теоретические: опрос обучающихся и учителей; построение диаграмм и анализ опроса; изучение литературы и материалов Интернет-ресурсов по данной теме.

Эмпирические:

создание буклета, оформление презентации.

Оборудование

ПК, принтер

Продукт проекта

буклет, презентация

Содержание

Паспорт программы

……………………...

стр.

2

Содержание

……………………...

стр.

3

Введение

……………………...

стр.

4

1.Мотивационный этап

……………………...

стр.

5

 2.Подготовительный этап

.……………………..

стр.

5-6

3. Информационно-операционный этап

.……………………..

стр.

6-7

4. Практический этап

……………………..

стр.

8-10

5. Заключительный этап

……………………...

стр.

10

5.1. Оформление проекта

……………………...

стр.

10

5.2. Самооценка

…………………….

стр.

10-11

Заключение

……………………...

стр.

11

Литература и интернет-источники

……………………..

стр.

12

Приложение

……………………...

стр.

13-18

Introduction

The use of computer technology in everyday life grows rapidly nowadays. Computers and the Internet have become an indispensable tool in learning and work and even become part of our leisure time.

Internet access and information online extend the social possibilities of the users and increase mobility and the chances of success in life. Consequently, those people who have access and effectively use the Internet, occupy an advantageous position compared to those for whom this access is limited.

Almost all the possible tools of self-expression, communication and finding friends are concentrated in social networks. That is why they are so popular among teenagers.

Along with the positive moments of Internet usage, the evidence about the negative impact of the Internet grows. Most of the world`s money is stored in computers. Clever criminals are likely to use computers and the Internet, not guns, to steal it. Moreover, there are any other dangers for people on the Internet. All types of fraudulent activity are great problems for modern world. Therefore, frauds use different methods to cheat people and it is the problem of my project.

  

The hypothesis: I suppose that we would avoid the Internet fraud if we were more informed users of web.

The aim of my project: Finding out the main types of fraud and develop recommendation for safety Internet using.

Accordingly to the aim I have put the following tasks:

  • To find out the main types of fraud
  • To conduct a survey about «Safety of users on the Internet»
  • To analyze the results of the survey
  • To create informative booklet with recommendation for safe usage of Internet recourses.
  • To promote booklets among the students and teachers of my school.

I used the fоllowing research methods:

  • survey of students and teachers;
  •  analysis of the survey;
  • plotting the diagrams;
  • learning the literature and materials from the Internet on the problem.

Object of the research:  Internet users (students, teachers)

Subject of the research: Main types of fraud in the Internet.

Project produce: Booklet with recommendations of safety using of the Internet resources, presentation.

Steps of project:

  1. Motivation step
  2. Preparatory step
  3. Information and operations step
  4. Practical step
  5. Concluding step

1. Motivation step        

1.1. Substantiation of the opened problem and its necessity.

        I want to tell about rules of safety Internet uses and collect useful information about frauds in the Internet. For example: methods of fraudsters and how to avoid them. How to convey information to Internet users and draw their attention to this problem?

1.2. Concrete the definition of tasks. 

That`s why I decided to make a survey among students and teachers, and create an informative booklet.

2. Preparatory step

On this step I defined the project theme: «Security of users on the Internet», the problem, the aim and the tasks of it. I spoke to my teacher. We worked out the plan and ways of my actions.

Plan of my actions

Steps of my actions

1

Justification of the problem and its necessity.

        October

2

The definition of a particular problem and its formulation

        October

3

Learning the literature and finding the information on this theme.

       November

4

Conducting a survey among senior students of our school. Analyzing the survey.

       December

5

Researching  and plotting the diagrams. Consulting with my English teacher

         January

6

Consulting with my English teacher

         January

7

Consulting with the teacher of Informatics. Finding out the main requirements for the presentation

  January

8

Creation the presentation

     February

9

Self- rating and conclusion

February

10

Presentation of my project

February

3. Information and operation step

3.1. Collection and systematization of information. Analysis of data.

 Searching the Internet I found a lot of information. Fraud in Internet is quite common in Internet shops. After you give money to fraudulent wallet it disappears. Websites or social networks have adverts with asking for help to a disabled child or an orphan. You need to think carefully before transit money for them.

Very dangerous and criminal way of fraud is «Fishing». This is a method of getting secret information: passwords, pin-codes, numbers and codes.

It is necessary to know that fraud in Internet its activity for people who have special skills. For example: talented programmers, hackers and even bank  

They need a little of your information to steal all your money.

One third of Russian people admitted that at least one time in life they have a deal with fraud in the Internet. In Russia there has been a record surge in fraud in the Internet over the past three years. In the first half of 2019 122.8 thousand crimes were registered in the country.

4. Practical step

4.1 Conducting and making a survey

 I paid attention that some people in my family and friends have bad experience with the Internet network. It`s time to find out how often they encounter this problem.  For this reason, I conducted a survey among 100 senior students of our school.  

I asked them to answer the following questions: (Supplement1)

1. Which information should you never tell in the Internet?

2. Do you have a filter (ban on visiting non-offensive and dangerous sites)?

3. Do you have mobile Internet on your phone?

4. For what purposes do you use the Internet?

5. The virtual interlocutor suggests meeting, what should you do?

6. Do you know which dangers social networks have?

7. Have you ever encountered fraud on the Internet?

8.  Does your friend know the username and password of your account?

9. Which information do you post in social network?

10. Have you ever experienced abuse and humiliation from other users on the Internet? (Cyberbullying — is any message or publication on network of a single user with the purpose of intimidating, insulting.)

4.2. Survey analyzes


Analysis of diagram №1 (Supplement 2) to the question “What information cannot be disclosed on the Internet?” shows that 40% believe that it is impossible to disclose their personal data.

Analysis of diagram№2 (Supplement 2)   to the question: “Is there a filter on your computer (a ban on visiting unwanted and dangerous sites)?” indicates that only 5% have a filter installed, while 95% do not have a filter.

Analysis of diagram №3 (Supplement 2) to the question: “Is your mobile phone connected to the Internet?” shows that  10% of the Internet on the phones are not connected, and  90% are connected.

Analysis of diagram №4 (Supplement 2) to the question: “For what purposes do you use the Internet?” it is obvious that 15% use the Internet to search for information, 85% of respondents use the Internet to chat with friends and play.

Analysis of diagram № 5 (Supplement 2) to the question: “The virtual interlocutor suggests meeting, what should be done?” shows that 3% of respondents will go to a meeting alone, 20% will invite a friend with them, 77% will refuse to meet.

Analysis of diagram №6 (Supplement 2) to the question: “Do you know which dangers social networks have?” we can conclude that 17% of respondents believe that personal information can be used by anyone for different purposes, 63% of respondents believe that when you look through unidentified links, the computer can be hacked, and 20% believe that all information is true.

Analysis of diagram №7 (Supplement 2)   to the question: “Have you ever encountered fraud / thief on the Internet?” we conclude that 87% of respondents have encountered this problem, 13% have never encountered fraud / theft on the Internet.

Analysis of diagram №8 (Supplement 2)   to the question: “Does your friend know the username and password from your account?” it is obvious that 11% of respondents consider sharing their username and password with a friend, 89% of respondents do not share their usernames and passwords with anyone.

Analysis of diagram № 9 (Supplement 2) to the question: “What information do you post on social networks?” shows that 13% of respondents post whatever information they want, the main thing is that friends like it.  34% think if they will be comfortable if acquaintances see what he publishes. 23% post full information about themselves: photos, names, addresses, phone numbers, etc. 27% of respondents do not report anything about themselves and use nicknames.

Analysis of diagram № 10 (Application 2) to the question: “Have you ever encountered insult and humiliation from other users on the Internet?” shows that 67% did not encounter this problem, 33% are faced to this problem regularly.

     After analyzing the diagrams, we can draw the following conclusions that the participants in my survey are poorly informed about Internet security.

4.3. Creating an informative booklet for the Internet users.

In order to familiarize users with the rules of the safe Internet, I decided to create a booklet - "User Security on the Internet."

A booklet is a sheet edition printed on both sides of a sheet and folded in any way into two or more folds. One of the main advantages of the booklet is the brevity of the presentation of the most basic, most necessary information, and, of course, the convenience of its perception.

The aim of the booklet is to give the necessary information laconically and attract readers` attention. That`s why my booklet is bright and attractive.  (Supplement 3)

While creating the booklet, I tried to observe the following rules:

 my booklet is so designed that all columns are easy to read;

• I have fulfilled all the conditions of the assignment, and the information is available on all pages of the booklet;

• images from those that I have selected are relevant to the content;

• in my written presentation there is a suitable style and sense of audience;

• I used the recommendations for computer text and color to create an attractive, neat and interesting booklet. I used a suitable font size and line spacing, which improved readability.

5. Concluding step

5.1. Project design

At this stage, I have entered into the system all the data on the project and formed a project plan. And then I created an information booklet for the Internet users – «Security of users on the Internet». (Application 5)

5.2. Self-rating

          Environmentally friendly material – paper was used in the production of the booklet. Usage of informative booklets will not lead to changes in the environment and violations in the life of a person.

While working on the project, I had to look for new ways to solve this problem:

- use new working methods such as analysis, a survey for which questions are independently developed;

- to analyze the results of the study, build diagrams, draw conclusions;

- use your creativity to create a booklet

The booklet is made carefully, have aesthetic qualities (beauty, harmony).

When working on a project:

• made a list of questions and conducted a survey among  the Internet users;

• learned to build and analyze a chart;

When executing the booklet:

• determined the basic rules for the safe use of the Internet;

• identified a color scheme that will match. Picked up the right font and drawings;

• I studied the program for creating the Microsoft Publisher booklet.

• nurtured perseverance, accuracy, aesthetic taste in the execution of the booklet, developed creative abilities.

Conclusion

As a result of the work done, the following conclusion can be drawn: the aim of my project is achieved, main task are done. I conducted a survey among Internet users, made charts and analyzed them and then made conclusions. Created informative booklets and distributed them to students of our school.

During the work I realized the main thing for myself:
in order to be safe on the Internet, you must know and follow the certain rules. It is necessary to inform as many people as possible.

 

Literature and Internet sources

  1. Davis S.A. A cognitive-behavioral model of pathological Internet use // Computers in Human Behavior. 2001. Vol. 17. № 2. P. 187–195.
  2. Ehmke R. How Using Social Media Affects Teenagers. Available at: childmind.org.
  3. How Does Social Media Affect Teens? URL: wehavekids.com.
  4. Internet addiction ranks among major risks for adolescent health — minister Russia. May 27, 2014, 19:24. Available at: tass.com.
  5. Revell T. Video gaming disorder to be officially recognized for first time. Available at: newscientist.com.
  6. Право на доступ к Интернету предложили закрепить в Конституции. 03.02.2016. Available at: forbes.ru.
  7. http://fin10.ru/finansovaya-gramotnost/moshennichestvo-v-internete-top-10-rasprostranennyih-shem-obmana.
  8. https://www.adme.ru/svoboda-kultura
  9. https://businessman.ru/new-kakim-byvaetmoshennichestvo-v-internete.html
  10. http://pcenter-tlt.ru/bezopasny-internet

Supplement 1

Survey "User Security on the Internet"

1. Which information you should never tell in Internet?

a) hobbies   b) personal data

2. Do you have a filter (ban on visiting non-offensive and dangerous sites)?

a) Yes     b) No

3. Do you have mobile Internet on your phone?

а) Yes   b) No

4. How do you using Internet?

а) For searching the information    b) For chatting with friends  

5. Virtual friend manage to see with you in real live, what should you do?

a) go to a meeting alone b) invite a friend c) refuse to meet

6. Do you know which dangers social networks have?

a) personal information can be used by anyone for different purposes

b) when viewing unidentified links, the computer can be hacked

c) all information is true

7. Have you ever encountered fraud on the Internet?

a) Yes                 b) Newer

8.  Does your friend know the username and password of your account?

a) Yes, because he is my friend and you need to share everything with him

b) No, I don’t tell anyone my usernames and passwords

9. Which information do you post in social network?

a) Everything that I want, the main thing is that my friends like it!

b) I think it will be comfortable for me if my friends see what I publish?

c) Full information about yourself: photos, name, address, phone number, etc.

d) I don’t inform about myself, I use a nickname.

10. Have you ever experienced abuse and humiliation from other users on the Internet? (Cyberbullying — is any message or publication on network of a single user with the purpose of intimidating, insulting.)

а) Yes                 b) Newer

Supplement 2.

Diagram 1. Which information should you never tell in the Internet?

40% of respondents believe that it is impossible to disclose data about their hobbies, 60% believe that it is impossible to disclose their personal data.

Diagram 2. Do you have a filter (ban on visiting non-offensive and dangerous sites)?

5% of Internet users have a filter installed, 95% of users do not have a filter.

Diagram 3. Do you have mobile Internet on your phone?


For 10% of users, the Internet is not connected to the phone, while 90% are connected.

Diagram 4. How do you using Internet?


15% use the Internet to search for information, 85% of respondents use the Internet to chat with friends and play.

Diagram 5. Virtual friend suggests meeting in real live, what should you do?

3% of respondents will go to a meeting alone, 20% will invite a friend with them, 77% will refuse to meet.

Diagram 6. Do you know which dangerous have social networks?

17% of respondents believe that personal information can be used by anyone for different purposes, 63% of respondents believe that with

When viewing unidentified links, the computer may be hacked, and 20% believe that all the information is true.

Diagram 7. Have you ever encountered fraud on the Internet?


87% of respondents experienced this problem, 13% never experienced fraud on the Internet.

Diagram 8. Does your friend know the username and password of your account?


4% of respondents consider sharing their username and password with a friend, 96% of respondents do not share their usernames and passwords with anyone.

Diagram 9. Which information do you post in social network?

13% of respondents post whatever information they want, most importantly to make friends like it.

34% think if they will be comfortable if acquaintances see what he publishes.

23% post full information about themselves: photos, name, address, phone number, etc.

30% of respondents do not report anything about themselves and use a nickname.

Diagram 10. Have you ever experienced abuse and humiliation from other users on the Internet?


67% did not encounter this problem, 33% are faced to this problem regularly.


Предварительный просмотр: