SlideShare a Scribd company logo
1 of 7
 Physical Protection
 Emotional Protection
 Financial Protection
   In order to protect myself of physical
    dangers online, the only real solution to
    the problem would be not putting
    anything personal about my physical
    whereabouts on the internet. Examples
    of this type of information would be
    things such as your address, your
    phone number, where you work, where
    you go to school, or where you like to
    hang out. Not putting this information in
    the Internet will help prevent from
    identity theft or from people that could
    possibly be out to hurt you in any shape
    form or fashion. If anyone were to ever
    get their hands on this type of
    information, they could potentially take
    your mail and get even more personal
    information from you. They could also
    possibly steal from your home or even
    hurt you personally. Just keep this
    information to yourself.
   When posting personal things about
    your life or things that are going on in
    your life on the internet, there are many
    harms that could come to your
    emotions. When posting something
    about your day, say on your Facebook,
    your employer or possible future
    employer could possibly see it and find
    that it is very negative and that you may
    not be emotionally stable enough to
    handle the position that you are in or
    that you may be applying for. This will
    lead to stress from not having a job,
    depression from not acquiring the
    position you wanted, and also
    resentment. All of these could then lead
    you to write on your Facebook again
    which is still hindering you from getting
    that job you wanted. There also may be
    a negative remark that someone has to
    say about what you wrote which could
    harm your self esteem.
   When it comes to financial security on
    the internet, there are multiple ways to
    have your financial information spread
    across the internet. When buying things
    on the internet, make sure that you are
    very wary with what website you buy
    items off of. There are certain websites
    that ask for ‘donations’ that are actually
    out to get your credit card number. They
    can take your card number and take
    money from your account or they could
    sell it to someone who will to the same
    thing or take your identity. Make sure
    that the website you are buying items
    off of is a legit site that is part of a large
    franchise or that has a lot of positive
    feedback from its customers. If there is
    not enough information on the website
    you are wanting to buy from, then I
    suggest finding the item on a different
    website to avoid identity or financial
    theft.
   Many of the things that I learned from my research on this
    subject are how important it is to have correct internet protection
    precautions. There are so many easy ways to have your
    personal and financial information taken from you over the
    internet that being overly precautious is not a bad idea like it is
    in so many other aspects of life. Also affecting you
    emotionally, the internet can cause more than harm just to your
    finances. It can bring harm to you physically or even
    emotionally. When surfing the internet, or shopping for
    clothes, or talking to your friends on Facebook or
    twitter, practicing internet protection is probably the smartest
    decision you can make. Do not put personal information on the
    web. Do not buy things off of sketchy websites that you have
    never heard of before. And finally, do not post personal feelings
    or talk about your life on your personal pages. If you avoid these
    few simple steps, you should be able to avoid internet fraud or
    bad consequences when using the internet.
   If you follow these
    easy instructions to
    protect yourself from
    online dangers, then I
    am positive that no
    harm will come to you.
    And you will look more
    like this lady =>

More Related Content

What's hot

10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child SafeShaun Bent
 
Being Smart In Cyber Space
Being Smart In Cyber SpaceBeing Smart In Cyber Space
Being Smart In Cyber Spacekirahlee
 
Facebook Online Policy Primer
Facebook Online Policy PrimerFacebook Online Policy Primer
Facebook Online Policy Primermark mclaine
 
Internet safety
Internet safety Internet safety
Internet safety Sydni
 
Reflection module1 epanag_maeann
Reflection module1 epanag_maeannReflection module1 epanag_maeann
Reflection module1 epanag_maeannepanagmae
 
How to be safe on facebook
How to be safe on facebookHow to be safe on facebook
How to be safe on facebookOlga Vareli
 
Tips for Securing Your Facebook Account
Tips for Securing Your Facebook AccountTips for Securing Your Facebook Account
Tips for Securing Your Facebook AccountProfessor Bauer
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide Dee Tutino
 
Internet safety
Internet safetyInternet safety
Internet safetymbend360
 
Social Media Tips In A Non-Deletable World
Social Media Tips In A Non-Deletable WorldSocial Media Tips In A Non-Deletable World
Social Media Tips In A Non-Deletable WorldTricia Lawrence
 
Gary Vaynerchuck / Lisa Cullen
Gary Vaynerchuck / Lisa CullenGary Vaynerchuck / Lisa Cullen
Gary Vaynerchuck / Lisa CullenLisaCullen6
 
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Them
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid ThemThe 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Them
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Themtanyajhall
 
10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
10 Most Common Mistakes in Social Media Marketing and How to Avoid Them10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
10 Most Common Mistakes in Social Media Marketing and How to Avoid Themgreenleaf
 
How Protected Are You?
How Protected Are You?How Protected Are You?
How Protected Are You?Alyssa Lewis
 
Privacy rules
Privacy rulesPrivacy rules
Privacy rulesGNBCEC
 
101 facebooktipsposter24x36 copy
101 facebooktipsposter24x36   copy101 facebooktipsposter24x36   copy
101 facebooktipsposter24x36 copySheila Lott
 

What's hot (18)

Cy Q Good One
Cy Q Good OneCy Q Good One
Cy Q Good One
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
 
Being Smart In Cyber Space
Being Smart In Cyber SpaceBeing Smart In Cyber Space
Being Smart In Cyber Space
 
Facebook Online Policy Primer
Facebook Online Policy PrimerFacebook Online Policy Primer
Facebook Online Policy Primer
 
Internet safety
Internet safety Internet safety
Internet safety
 
Reflection module1 epanag_maeann
Reflection module1 epanag_maeannReflection module1 epanag_maeann
Reflection module1 epanag_maeann
 
How to be safe on facebook
How to be safe on facebookHow to be safe on facebook
How to be safe on facebook
 
Tips for Securing Your Facebook Account
Tips for Securing Your Facebook AccountTips for Securing Your Facebook Account
Tips for Securing Your Facebook Account
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Social Media Tips In A Non-Deletable World
Social Media Tips In A Non-Deletable WorldSocial Media Tips In A Non-Deletable World
Social Media Tips In A Non-Deletable World
 
Gary Vaynerchuck / Lisa Cullen
Gary Vaynerchuck / Lisa CullenGary Vaynerchuck / Lisa Cullen
Gary Vaynerchuck / Lisa Cullen
 
Do’s and don’ts on facebook
Do’s and don’ts on facebookDo’s and don’ts on facebook
Do’s and don’ts on facebook
 
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Them
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid ThemThe 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Them
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Them
 
10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
10 Most Common Mistakes in Social Media Marketing and How to Avoid Them10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
 
How Protected Are You?
How Protected Are You?How Protected Are You?
How Protected Are You?
 
Privacy rules
Privacy rulesPrivacy rules
Privacy rules
 
101 facebooktipsposter24x36 copy
101 facebooktipsposter24x36   copy101 facebooktipsposter24x36   copy
101 facebooktipsposter24x36 copy
 

Similar to Slideshare

Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tantaSamir Deutsch
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-securityrobert mota
 
Social engineers
Social engineersSocial engineers
Social engineerssimsvir
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook securityErnest Staats
 
Are You Living the Life You Imagined?
Are You Living the Life You Imagined?Are You Living the Life You Imagined?
Are You Living the Life You Imagined?gstuncay
 
Are You Living the Life You Imagined?
Are You Living the Life You Imagined?Are You Living the Life You Imagined?
Are You Living the Life You Imagined?btbyrd
 
Are You Living the Life You Imagined?
Are You Living the Life You Imagined?Are You Living the Life You Imagined?
Are You Living the Life You Imagined?gstuncay
 
Are You Living the Life You Imagined?
Are You Living the Life You Imagined?Are You Living the Life You Imagined?
Are You Living the Life You Imagined?darandon
 
Are You Living the Life You Imagined?
Are You Living the Life You Imagined?Are You Living the Life You Imagined?
Are You Living the Life You Imagined?karma49
 
Are You Living the Life You Imagined?
Are You Living the Life You Imagined?Are You Living the Life You Imagined?
Are You Living the Life You Imagined?jsmooth1969
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Jamie Edmondson
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for childrenKumar Manish
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child SafeShaun Bent
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety GuideDee Tutino
 

Similar to Slideshare (20)

Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tanta
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Social engineers
Social engineersSocial engineers
Social engineers
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Are You Living the Life You Imagined?
Are You Living the Life You Imagined?Are You Living the Life You Imagined?
Are You Living the Life You Imagined?
 
Are You Living the Life You Imagined?
Are You Living the Life You Imagined?Are You Living the Life You Imagined?
Are You Living the Life You Imagined?
 
Are You Living the Life You Imagined?
Are You Living the Life You Imagined?Are You Living the Life You Imagined?
Are You Living the Life You Imagined?
 
Are You Living the Life You Imagined?
Are You Living the Life You Imagined?Are You Living the Life You Imagined?
Are You Living the Life You Imagined?
 
Are You Living the Life You Imagined?
Are You Living the Life You Imagined?Are You Living the Life You Imagined?
Are You Living the Life You Imagined?
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Project
ProjectProject
Project
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Are You Living the Life You Imagined?
Are You Living the Life You Imagined?Are You Living the Life You Imagined?
Are You Living the Life You Imagined?
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
 
10things
10things10things
10things
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Slideshare

  • 1.
  • 2.  Physical Protection  Emotional Protection  Financial Protection
  • 3. In order to protect myself of physical dangers online, the only real solution to the problem would be not putting anything personal about my physical whereabouts on the internet. Examples of this type of information would be things such as your address, your phone number, where you work, where you go to school, or where you like to hang out. Not putting this information in the Internet will help prevent from identity theft or from people that could possibly be out to hurt you in any shape form or fashion. If anyone were to ever get their hands on this type of information, they could potentially take your mail and get even more personal information from you. They could also possibly steal from your home or even hurt you personally. Just keep this information to yourself.
  • 4. When posting personal things about your life or things that are going on in your life on the internet, there are many harms that could come to your emotions. When posting something about your day, say on your Facebook, your employer or possible future employer could possibly see it and find that it is very negative and that you may not be emotionally stable enough to handle the position that you are in or that you may be applying for. This will lead to stress from not having a job, depression from not acquiring the position you wanted, and also resentment. All of these could then lead you to write on your Facebook again which is still hindering you from getting that job you wanted. There also may be a negative remark that someone has to say about what you wrote which could harm your self esteem.
  • 5. When it comes to financial security on the internet, there are multiple ways to have your financial information spread across the internet. When buying things on the internet, make sure that you are very wary with what website you buy items off of. There are certain websites that ask for ‘donations’ that are actually out to get your credit card number. They can take your card number and take money from your account or they could sell it to someone who will to the same thing or take your identity. Make sure that the website you are buying items off of is a legit site that is part of a large franchise or that has a lot of positive feedback from its customers. If there is not enough information on the website you are wanting to buy from, then I suggest finding the item on a different website to avoid identity or financial theft.
  • 6. Many of the things that I learned from my research on this subject are how important it is to have correct internet protection precautions. There are so many easy ways to have your personal and financial information taken from you over the internet that being overly precautious is not a bad idea like it is in so many other aspects of life. Also affecting you emotionally, the internet can cause more than harm just to your finances. It can bring harm to you physically or even emotionally. When surfing the internet, or shopping for clothes, or talking to your friends on Facebook or twitter, practicing internet protection is probably the smartest decision you can make. Do not put personal information on the web. Do not buy things off of sketchy websites that you have never heard of before. And finally, do not post personal feelings or talk about your life on your personal pages. If you avoid these few simple steps, you should be able to avoid internet fraud or bad consequences when using the internet.
  • 7. If you follow these easy instructions to protect yourself from online dangers, then I am positive that no harm will come to you. And you will look more like this lady =>