Norton's Internet Safety Advocate with a presentation on internet safety, online privacy, viruses and malware, for 8th grade students (13 years and up)
ICT Seminar: Parenting In the Digital Age: Inspiring Parents to Protect
Digital Parenting workshops is an hour of informational seminars where parents learn the latest in online safety (30-45 minute presentation) followed by interactive discussion on issues relevant to each parent. Team from Ramsys Infotech Solutions will moderate each workshop with the goal that, parents will walk out of the seminar feeling more confident, less anxious and ready to communicate with their children about some of the icky things online.
its free!!!
This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.
ICT Seminar: Parenting In the Digital Age: Inspiring Parents to Protect
Digital Parenting workshops is an hour of informational seminars where parents learn the latest in online safety (30-45 minute presentation) followed by interactive discussion on issues relevant to each parent. Team from Ramsys Infotech Solutions will moderate each workshop with the goal that, parents will walk out of the seminar feeling more confident, less anxious and ready to communicate with their children about some of the icky things online.
its free!!!
This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
A talk for middle school and high school students by ConnectSafely.org's Larry Magid about digital literacy, digital citizenship, cyberbullying, sexting and how to thrive online.
The embeded videos will not play on slideshare, but you can access the links for websites by clicking on them. Thank you for coming to my presentation.
Delivered by Patrick Laverty and his daughter, this is about how kids can stay safe online. Various tips, suggestions and recommendations are given to keep children safe when they go on the internet.
Rivers of Living Waters ministries Curacao's ministry for Woman - Heart to Heart - presentation on the dangers of Internet.
Presentor: N. Everts
Date: March 28, 2009
Studies and analysis the aspects of confidentiality, integrity and availability of information(data) with regard to the organisation. Identify exposure to accidental or intentional , destruction, disclosure , modification or interruption of information that may cause serious financial and or information loss Study of cyber security and incident response and has become necessary because attacks frequently cause the compromise of personal and business data. Heightened incidents concerns about national security and exposure of personally identifiable information. Racing awareness of the possible effects of computer barred attacks is the other reason.
Internet Safety for Families and ChildrenBarry Caplin
The Internet is a useful and important part of our daily lives. Many can't
remember how we handled even the most mundane tasks without online
assistance. How did we even survive when we were kids? :-) However, along
with the good, there is bad. Children and teens (but not their parents!) are
very well versed in using the Internet, including web pages, blogs,
uploading and downloading information, music and photos, etc. They are also
trusting. This presentation will give an overview of the Internet and the
inherent dangers. Learn the realities and dangers of ``virtual communities''
websites your kids frequent like Xanga.com, MySpace.com and FaceBook.com.
Learn about the persistence of information on the net and Google hacking.
Learn the differences between a wiki, blog, Instant Messaging, text
messaging, and chat. Learn the Internet slang, key warning signs, and tips
for Parents and Kids. This talk is for anyone who has a child, who knows a
child, or who ever was a child!
Trust in the Digital World 2014 - eIdentity threadJames Varga
Early initiatives pointed to a central role of government itself in the control and provision of public and private digital identities. Some governments choose to seize identity, others to radically defer it to the market, while any scenario has to deal with the citizen's own demand for control, usability and interoperability within Europe.
These slides are from my own commercial SME perspective at the session.
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
A talk for middle school and high school students by ConnectSafely.org's Larry Magid about digital literacy, digital citizenship, cyberbullying, sexting and how to thrive online.
The embeded videos will not play on slideshare, but you can access the links for websites by clicking on them. Thank you for coming to my presentation.
Delivered by Patrick Laverty and his daughter, this is about how kids can stay safe online. Various tips, suggestions and recommendations are given to keep children safe when they go on the internet.
Rivers of Living Waters ministries Curacao's ministry for Woman - Heart to Heart - presentation on the dangers of Internet.
Presentor: N. Everts
Date: March 28, 2009
Studies and analysis the aspects of confidentiality, integrity and availability of information(data) with regard to the organisation. Identify exposure to accidental or intentional , destruction, disclosure , modification or interruption of information that may cause serious financial and or information loss Study of cyber security and incident response and has become necessary because attacks frequently cause the compromise of personal and business data. Heightened incidents concerns about national security and exposure of personally identifiable information. Racing awareness of the possible effects of computer barred attacks is the other reason.
Internet Safety for Families and ChildrenBarry Caplin
The Internet is a useful and important part of our daily lives. Many can't
remember how we handled even the most mundane tasks without online
assistance. How did we even survive when we were kids? :-) However, along
with the good, there is bad. Children and teens (but not their parents!) are
very well versed in using the Internet, including web pages, blogs,
uploading and downloading information, music and photos, etc. They are also
trusting. This presentation will give an overview of the Internet and the
inherent dangers. Learn the realities and dangers of ``virtual communities''
websites your kids frequent like Xanga.com, MySpace.com and FaceBook.com.
Learn about the persistence of information on the net and Google hacking.
Learn the differences between a wiki, blog, Instant Messaging, text
messaging, and chat. Learn the Internet slang, key warning signs, and tips
for Parents and Kids. This talk is for anyone who has a child, who knows a
child, or who ever was a child!
Trust in the Digital World 2014 - eIdentity threadJames Varga
Early initiatives pointed to a central role of government itself in the control and provision of public and private digital identities. Some governments choose to seize identity, others to radically defer it to the market, while any scenario has to deal with the citizen's own demand for control, usability and interoperability within Europe.
These slides are from my own commercial SME perspective at the session.
This wonderful presentation, appropriate for teens and young adults, was created by Symantec's Rayane Hazimeh for the Dubai Techfest, 2013. We thank her for generously sharing her content with the SlideShare community.
ICT Seminar: Parenting In the Digital Age: Inspiring Parents to Protect
Digital Parenting workshops is an hour of informational seminars where parents learn the latest in online safety (30-45 minute presentation) followed by interactive discussion on issues relevant to each parent. Team from Ramsys Infotech Solutions will moderate each workshop with the goal that, parents will walk out of the seminar feeling more confident, less anxious and ready to communicate with their children about some of the icky things online.
its free!!!
An introduction so various technologies for parents. Included are: Home Computers, Viruses, Safe Web Surfing, Social Networks, Cell Phones and Texting, and Reputation Management.
Coverage of the following topics: Tech growth, social media, Internet of things, how business are using social media in HR, how people expose their information online, privacy, the ramifications of your online life, how criminals, terrorist, governments and organizations use your online information, cyberbullying, data breaches, and Hacktivisim.
For academic purposes only.
Sources of information are compiled and indicated in the Reference section of the presentation. Images or pictures are obtained from Google search.
The Internet has evolved into a collaborative environment where anyone can publish information as easily as viewing or downloading it. There are many powerful learning opportunities on the Internet and we want to ensure our students get the most of this valuable tool while being safe. This session includes introductions to the technologies, the benefits, the concerns, and proactive strategies for keeping students safe.
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
Ever wonder what you should or shouldn’t share on the internet? Do you see users who are posting everything thing they possibly could on the internet and wonder how to help educate them to protect themselves?
All of this collective sharing, creates a data gold mine for hackers to do their evil bidding. In this session we will talk about what to post on the internet and what not too. We will also look into what hackers can use from the information you’ve posted on the internet and how they can use it to gain access to your and your users personal lives, accounts, credit cards, and more. During this session, we’ll dive into building a strategy plan to help limit and hopefully eliminate these references from your digital footprint to help ensure you are more secure than you were when you first started this session.
By the end of this webinar, attendees will have a virtual toolkit and strategies to help educate users on protecting themselves while online.
Similar to 8th grade presentation for slideshare (20)
How we use mobile devices increasingly impacts our online safety. Learn quick tips for upping your internet safety savvy and keep your private data secure.
4th annual global study of 13,000 online adults, their experiences with cybercrime, their attitudes and adoption of online security best practices, blurred lines between work and home with BYOD and the social stress brought on by our addiction to mobile devices and social networks.
Family Online Safety: Truth and ConsequencesMarian Merritt
Updated! Full speaker notes (just download the deck), lots of data points and citations. This is a presentation for a general family audience. Lots of new info and an expanded section on cyber bullying! Free copies of our booklet, "Family Online Safety Guide" if you email me at marian @ norton.com
Internet Security: Protect the Personal; Defend the WorkplaceMarian Merritt
From mobile security to data breaches and global cyber terrorism; understand what you the individual need to do to protect your private information as well as defend your employers valuable information. Speaker notes are included. Feel free to download and reuse!
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
2. When the Internet began (early 90’s)
• Information was centralized or had little user created content
– Government information
– University research
– Usenet group, special interests
– Not visual, text based
• Browsers like Mosaic made internet “visual”
• Big companies made websites, sometimes too graphic heavy,
lots of design
• Most of world was on dial-up, slow connections
• AOL was king (sent out millions of free startup disks)
3. Internet Matured in early 2000’s
• Broadband became widely available
• Websites sprang up for everyone
– Online storage, photo sharing, blogging, social networking , dating, job,
auction and shopping sites
• Today, internet moving to mobile devices and app based
– Even OS can be cloud based
– Wifi widely available in public places
– More smartphones
4. So what’s up next?
• Mobile and apps continue
• Cloud based storage becomes simpler
– Your phone, camera, tablet, home network become autosynced
– You are never “away” from the photo or document you need
– Security like passwords become more important
– Data permanence
• Potential for less data loss from computer failure, stolen devices, out of date technology,
corruption from malware
• More risk from hackers, opportunistic and malicious efforts to view, use and copy your
work
5. How You Use Technology Keeps Changing
• You’ve got to stay smart
– Read articles about internet safety and technology
• You’ve got to keep up
– Be open to trying new apps or programs or services
– If you see someone with a new device ask about it
– Visit technology sites like CNET, Wired, Mashable
• Help parents understand what’s going on
6. Today’s Digital Native (born in 1990’s or later)
• You have never stood to change a TV channel
• Internet has always existed
• You don’t go “online”; you are always connected
• Your definition of privacy is different from your parents
• You expect devices to just turn on, connect and work
• You are more collaborative, get help from networks, not just a web
search or in a book
• By age 21, will have sent an average of 250,000 emails, instant
messages and texts
• By age 21, more than 10,000 hours on your cell phone
• By age 21, more than 14,500 hours online, mostly in social networks
7. What Your Parents Worry About What You Worry About (Maybe)
•Online Strangers •Online “drama”
•Cyber bullying •Will my friends embarrass me?
•Internet Addictions •Will my secret stuff get out?
•Reputation problems •Who are my real friends?
•Will I be judged by my:
•Facebook,
•Tumblr,
•YouTube stuff
8. The Internet Is Fun
Multi-tasking generation: 8-18 year olds consume
10 hours, 45 minutes of media in 7 hours, 38 min
PER DAY!
i.e. TV, internet, music, chatting while studying
9. What we all can worry about
•Who can we trust online?
•How search works for us and against us
•Online privacy, what impacts it and what you can do
•Managing your online reputation
•Where to report spam and online crime
•Viruses, Trojans and malware
•Cyberbullying
10. Online Literacy
• Are wiki sites true?
– Feb. 2009 Colbert changed information about elephant’s extinction status
• Can search be manipulated?
– Ex: one of top search results for Martin Luther King goes to a disguised
racist site
• Are review sites ok?
– Restaurant and hotel owners can post favorable (anonymous) reviews
• Do people lie online?
– On dating sites, they increase height , income and use old photos
• Learn how to find accurate source material online, be wary of
information only found online, develop critical thinking
11. Search - What happens?
• Logged in or not?
• Are “cookies” on or off?
• What is SEO? (or what are tags or meta-data?)
– Search Engine Optimization (SEO) is a method used to help websites rank
well with search engines
– Sometimes, shady types may embed data in a webpage to trick the search
engine, so you visit a site that has nothing to do with what you were
looking for
– When done to give you malware, we call it “search engine poisoning”
– Be careful when search results you choose, use browser tools like Norton
Safe Web
12. What does Privacy mean?
• Why be anonymous online:
– Great for comments on media websites
– Have parts of your life separate from work/home
– Hide some activities from work/home
– Freedom of speech and protest groups
13. Privacy IRL
• Others are posting, tagging about you
• Hard to have total control
– ISPs can trace you for law enforcement
– Your browser keeps information to make your web experience better
– Apps retain your information and your friends’ information
• Kids better at using privacy settings than adults
• Set up automatic search on your name
• Be prepared to “clean up” before job or college
14. Pew study of Facebook Users and Privacy Settings
18. Everything can be more secure and more private
• Social networks
– Visit your account security and privacy settings to learn more
• Don’t share your user name and password with others
• Logout
• Protect mobile devices with passwords
• Protect laptops and mobile devices with anti-theft software
– Track , Wipe, Help Law Enforcement
19. Passwords
• Unique, complex, try a code that can be customized
– “I Went to Spain in 2010” > Iw2Si10
– For Amazon, add an “a” and an “n”> aiw2Si10n
– For ESPN, add an “e” and an “n”>eiw2Si10n
• Not a dictionary word or name
• Not a phrase
• Nothing a good friend might guess (like an address, pet’s name,
birthday, nickname)
• Most important passwords are for email and social network
• NEVER SHARE A PASSWORD! Not with a sibling, BFF, or from one
website to another. You can tell your parent.
19
21. Other Private information
• Social network posts
• More common, posting information about ourselves we later
regret:
– “Bored at work” – your boss won’t like it
– Posting photos of underage drinking – school/law enforcement issues
– “Great party last night at Kim’s house!” – someone’s feelings hurt because
they weren’t invited
22. Real story of Alison Chang of Dallas, TX
http://www.nytimes.com/2007/10/01/technology
taken at church BBQ Posted to up on Australian bus ad
Ends
23. Real story of Smith family of St. Louis, MO
They take a lovely Christmas card That turns up as a Czech grocery
photo ad!
http://www.npr.org/templates/story/story.php?storyId=10531845
23
25. What is Spam?
•Unwanted emails
•Up to 80% of world’s email is spam
•Some is dangerous:
•links to websites with malware
•attachments that have viruses in them
•Phishing emails – offers that are dangerous or
fake
26. Avoiding Spam and Staying Safe
• Don’t click or reply to spam
• Look at web/email address part that is “.com” or “.gov”.
Whatever is just to the left is the website.
• i.e. onlinefamily.norton.com = a norton website
– Norton.onlinefamily.com is not.
• If it sounds urgent or “an emergency” it probably isn’t
• Avoid posting your email address on public sites
• Just because it looks legit, or has the right logos doesn’t mean it
is
30. How Do Computers Get Infected
Dangerous downloads
Clicking on ads, links
Visiting infected websites
Buying into “security” alerts
& scare tactics by
unknown companies
Peer-to-peer file sharing
networks
Through “holes” left by web
browser vulnerabilities
30
31. Spotting Virus or Malware Infection
• Computer runs slowly or trouble starting
• Programs might not start, esp. security software
• Flickering hard drive light
• Strange programs listed in task manager
• OFTEN YOU CAN’T EVEN TELL!!!
• Best bet: run security software at all times, regularly scan the
computer and let your parents know if something weird
happens when you are online.
33. Cyberbullying is serious and mean
•Electronic harassment, teasing, cruelty,
usually repetitive
•About 20% of kids experience it
•Peaks in middle school
•Email, texts, social network messages
•Only 10% of kids report
•Many who report to school staff say it made
matters worse
•Bystanders are powerful, can reach out to
targets
33
34. Tips for Dealing with Cyberbullying
Talk about it Ask your friends Don’t reply, Bystanders Can
before and parents for help Keep copies Help!
it happens
Most kids don’t cyberbully!
•Work together as a community
•If you see cyberbullying, don’t be a silent bystander. Do something!
•Talk to your classmates if they are being teased online, be a friend!
•Involve your parents, teachers and other adults.
•If there’s too much “drama”, turn it off. Get off the computer,
mobile phone and find something else to do.
34
35. Review and Wrapping up
• Online Literacy – learning how to be savvy about online content
and information
• Passwords – why they matter, how to create good ones
• Privacy and reputation – what can happen when you aren’t
careful
• Spam – recognizing it, avoiding it
• Viruses – keep the computer clean
• Cyberbullying – make your school “drama free”
36. Bottom Line
• Embrace tech
– Computers, smartphones, mobile devices and apps can make life BETTER
• Teach each other
– Ex: Show your parents how to use privacy settings
• Homework:
– Set passwords and don’t share them
– Increase privacy settings
– Make sure you have security and antitheft software
– Be kind online, don’t tolerate cyberbullying
From Gawker hack; 13 most common passwords used (of millions of accounts): 123456 Password 12345678 Lifehack Qwerty abc123 111111 Monkey Consumer 12345 0 Letmein Trustno1 Most common Iphone passwords: 0000, 1234, 2580 (straight shot down keypad) Most important two passwords are your email and social network? Because with email I can hit “forgotmy password” at almost any account and get the code to reset yours. With your social network I can spread a scam to all your friends and make money or spread malware. Or just embarrass you by using your account and posting silly or embarassing stuff. Sharing – lots of girls will test their friendships by saying you’re not “BFF” until you share a FB password. Or boyfriend/girlfriends will post for each other or share an account, then whenthey break up it’s a disaster.
So what about the dumb stuff we do to hurt ourselves online? Those are things that can damage our online reputation and privacy.
Norton did it’s own global study and found that 2/3 of adults have already been a victim. So it’s a huge problem and almost never reported. That’s why we have a disconnect (1 in 5 or 2 of 3). Cybercrime is a huge problem, driven by an underground economy of people buying and selling our private information for financial gain. Cybercrime includes: More recent data Viruses/malware 51% Online scams 10% Phishing 9% Social network hacking 7% Online credit card fraud 7% Sexual predation 7%
Who is this kid? He represents the old school virus writer. Well, it used to be someone who looked a lot like this: a computer geek squirreled away in a basement somewhere spreading viruses as a prank to prove how smart he was. And his work looked like this….a virus that was more of a nuisance – maybe just a silly graphic of running across your screen. Some of you may recall the Ambulance Virus, which was popular in the late ’80’s. The good old days of computer viruses, no one lost money and it was just a big annoyance.
This is where kids get into trouble. We think they are safe because we installed security software but we let our kids use the Admin account (where they can install and uninstall things on the family computer) or they don’t know not to ignore security software warnings. Also if you give a kid an iPod but not a way to get music legally, you’ve created a pirate. That brings us to peer to peer software. Some of it is legal but most isn’t and downloading free music is usually stealing. Kids who don’t know what they are doing are inviting the criminals directly into your computer. There’s nothing the software can do to stop them since by definition when you install peer to peer, you are opening a port on your computer where traffic is allowed. Crooks know this and regularly scan the networks of connected music sharing computers, looking for financial records. The Today show recently did a story on a family whose tax refund was stolen by a crook who found their tax return’s digital image (from their online filing), registered a change of address for them at the IRS and received (and cashed) the family’s refund check.
Cyberbullying is such a common issue, it’s one parents need to prepare for, the way we prepare to teach our kids to drive. Even if your child is never a target or a bully, they’ll probably see it and be effected by that exposure alone. Make sure they know you get it and can be a help.
The images on the right are possibly familiar to you. They are children who committed suicide due to ongoing cyberbullying and other forms of cruelty. Phoebe Prince of Massachusetts, Tyler Clementi of New Jersey, Megan Meier of Missouri. Cyberbullying is a huge problem. We need to be mostly concerned, not with the one off mean message of a kid being “a kid” but with repetition or ongoing cruelty. It can take so many different forms, it might be anonymous but your child will likely know who is involved if asked. Few kids tell their parents or a trusted adult. So while schools now have policies about cyberbullying and 43 of 50 states have laws about it, and school counselors now have an ethical obligation to address cyberbullying in their charter, many who reported it in the past to school staff say it made matters worse. Schools are not perfect when it comes to delaing with it, even though it impacts the students ability to learn, it can create a hostile environment and it can contribute to a child developing depression. We have to educate our children about being the same in person as you are online, also about the permanency of digital communication. Teach kids not to respond to cyberbullying , to keep a copy (cut and paste into word processing), tell school (especially if they know their bully and their school has a cyberbullying policy) if threats or violence is implied, immediately report it to local law enforcement. , etc. Most kids are trying to the right thing online and off but we do need more schools to teach the importance of character and appropriate behavior.
Parents must be aware of cyberbullying and teach their kids to recognize and report it. Talk to your child about how you could work together if it happened. If it does, make sure you don’t respond to the bully. Keep a copy of any on screen message, no matter how embarassing. And if you are a bystander (meaning you were sent a link to a mean website, copied on an email, etc) make sure you reach out to the victim/target to express friendship, sympathy, offer a diversion together (like ‘let’s get together after school and work on math’) If the bullying is serious enough, get police involved. If it’s impacting the school environment, (child is afraid to go to school, feels like everyone is laughing at them, etc) then report to the school, the teacher or principal, counselor or resource officer. But parents need to drive process, leave a paper trail, review the school policy, ask for an action plan in writing. Stay on top of things and demand a respones. (from Allison Trachthill) theAmerican School Counselor Association has updated its ethical standards. Now, confronting cyberbullying is an ethical obligation for school counselors. Section A.10.e of the Ethical Standards for School Counselors states that school counselors should, "Consider the extent to which cyberbullying is interfering with students’ educational process and base guidance curriculum and intervention programming for this pervasive and potentially dangerous problem on research-based and best practices."