This presentation was delivered by the DHSEM Communications Specialist at the 2014 Colorado Safe Schools Summit. It discussing using social media to response and monitor in the school setting.
Director Lee Rainie will join other transporation researchers at a session of the Transportation Research Board that will examine consumer behavior and their attitudes about privacy in the age of mobile connectivity.
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Michelle Ferrier
Orientation and overview of free speech, freedom of expression and free press issues in the United States and the tactics to navigate online spaces as a journalist and communicator.
Director Lee Rainie will join other transporation researchers at a session of the Transportation Research Board that will examine consumer behavior and their attitudes about privacy in the age of mobile connectivity.
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Michelle Ferrier
Orientation and overview of free speech, freedom of expression and free press issues in the United States and the tactics to navigate online spaces as a journalist and communicator.
Computers and the Internet-Of-Things generate data about our every move, passing thought or feeling. There is also a comprehensive set of data on our life’s context: our whereabouts, connections, physiological state, patterns of movement, and deeply ingrained subconscious behaviors. While that information may not be immediately visible or easy to learn from, it is created, collected and saved. Over time, the pile of data grows. The processing technologies become more sophisticated and powerful. No data is ever “forgotten”. In this session we will look at data that’s currently collected by popular services, the implications of cross-processing streams of data from different sources, and the power of metadata. There are no more secrets. Based on “Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World” by Bruce Schneier.
http://ssrn.com/abstract=1478214
Contrary to what many marketers claim, most adult Americans (66%) do not want marketers to tailor advertisements to their interests.
Social Media For Success And Safety By Scott MillsScott Mills
Social Media For Success And Safety | Relationships And Technology | The need for a pardigm shift from legal liability model to policy driving relationships + technology approach to social media with purpose and proces
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Computers and the Internet-Of-Things generate data about our every move, passing thought or feeling. There is also a comprehensive set of data on our life’s context: our whereabouts, connections, physiological state, patterns of movement, and deeply ingrained subconscious behaviors. While that information may not be immediately visible or easy to learn from, it is created, collected and saved. Over time, the pile of data grows. The processing technologies become more sophisticated and powerful. No data is ever “forgotten”. In this session we will look at data that’s currently collected by popular services, the implications of cross-processing streams of data from different sources, and the power of metadata. There are no more secrets. Based on “Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World” by Bruce Schneier.
http://ssrn.com/abstract=1478214
Contrary to what many marketers claim, most adult Americans (66%) do not want marketers to tailor advertisements to their interests.
Social Media For Success And Safety By Scott MillsScott Mills
Social Media For Success And Safety | Relationships And Technology | The need for a pardigm shift from legal liability model to policy driving relationships + technology approach to social media with purpose and proces
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
Internet security threats have grown from just simple viruses to various forms of computer hacking, scams, impersonation, cyber bullying, and spyware. The Internet has great influence on most people. It has profound influence and one can spend endless hours on internet activities. In particular, youth engage in more online activities than any other age group. Excessive internet usage is an emerging threat that has negative impacts on these youth; hence it is vital to investigate youths' online behavior. This work studies tertiary students’ risk awareness, and provides some findings that allow us to understand their knowledge on risks and their behavior towards online activities. It reveals several important online issues amongst tertiary students; Firstly, the lack of online security awareness; second, a lack of awareness and information about the dangers of rootkits, internet cookies and spyware; thirdly, female students are more unflinching than male students when commenting on social networking sites; fourthly, students are cautious only when obvious security warnings are present; and finally, their usage of internet hotspots is common without fully understanding its associated danger. These findings enable us to recommend types of internet security habits and safety practices that students should adopt in future when they are exposed to online activities. A more holistic approach was considered which aims to minimize any future risks and dangers with online activities involving students.
-Identify the uses for mobile devices and the implications it has in today’s classrooms.
-Discover sites, tools, apps and resources
-What critical 21st century skills can be mastered when using mobile devices?
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
reSearch with teacher comment/IMG_0418.JPG
reSearch with teacher comment/IMG_0419.JPG
reSearch with teacher comment/IMG_0420.JPG
reSearch with teacher comment/IMG_0421.JPG
reSearch with teacher comment/IMG_0422.JPG
reSearch with teacher comment/IMG_0423.JPG
reSearch with teacher comment/IMG_0424.JPG
reSearch with teacher comment/IMG_0425.JPG
reSearch with teacher comment/IMG_0426.JPG
reSearch with teacher comment/IMG_0427.JPG
engl3000.docx
6
Kids and cyber crime
Table of contents
1.Introduction2
2.Literature Review2
3.Tips to protect children from cyber crime5
3.1.Use parental control software5
3.2.Set limits on late-night use6
3.3.Establish rules and take control6
3.4.Talk to your kids about avoiding cybercrime7
3.5.secure your computer8
3.6.Conclusion8
3.7.References10
1. Introduction
Today’s kids have access to the Internet 24/7 and from a variety of sources, like laptops, tablets, smart phones and game consoles. That means it’s harder than ever for you to protect your child from the multitude of Internet dangers. This research describes the state of technology for studying Internet crimes against children, and cyberbullying.
Computer crime, or cybercrime, is crime that involves a computer and a network and is a bigger risk now than ever before due to the sheer number of connected people and devices. Additionally, cybercrime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, when the illegal activities are committed through the use of a computer and the Internet. We will advise some ways to be warned from cybercrime. You can protect your child from cybercrime by Use parental control software, Set limits on late-night use, Establish rules and take control, Talk to your kids about avoiding cybercrime, and secure your computer, we will explain this ways in detail
{make it long and modify as my teacher comment} follow the rubric
2. Literature Review
The first New Safe Social Networking Site for Kids Launches Offering Millions of Parents Break-Through
Solution
to Protect Their Children from Epidemic of Cyber-Bullying & Sexual(New Safe Social, 2010)
Predators The most recent numbers are each guardian's most noticeably awful bad dream: 1 in 5 adolescents has been focused by some type of cyber crime. According to the Crimes Against Children Research Center. 42% of students in grades 4-8 report that they have been the victims of cyber-bullying.
LOS ANGELES, Oct. 13 /PRNewswire/ -- With the epidemic of cyber-bullying on the rise and MySpace's public admission that it had 90,000 convicted sexual predators on the sit.Presently they have new solution: a break-through social networking website provide planned particularly for youngsters ages 6-12, Mixels.com gives folks full control and permits them to give their kids the flexibility to go web.
Benefit Mixels.com web site:
1. never allows for kids to put their photograph on open profile whi ...
A presentation given by LIFARS at a conference MEPA EU Police Academy conference on May 2016. It covers the dangers that the internet and social media pose to children and adolescents. More and more, we're seeing that social media are opening the gates to cyberbullying, cyber extortion, sextortion, cyber stalking and more. Any parts of this presentation can be adopted and reused as long as attribution is given. For inquiries, please contact pr@lifars.com.
Social Media and Sustainability: EAI 2013 MeetingBrittany Smith
When reaching out to young adults with mental health challenges, social media needs to be a key part of your engagement strategy. Learn what social media is all about and how you can start using it.
This was a presentation to 9th graders to help them explore how to take control of their online persona. Examples reach back in time and project into the future when things like augmented reality amplify the information we put online.
Colorado Front Range Livestock Symposium Presentation: DHSEM, CLA, CDATrost, Micki
Colorado Front Range Livestock Symposium Presentation
1. The problem: firezone and ranchers have no access to land or cattle or roads with which to move them2. Incident Management top priorities and objectives may not include Ag concerns4. Help Ag community to understand how incidents are managed 5. Help IMTs to understand the Ag interests and that ranchers and producers are an important resource for response6. Connecting local ranchers to the local incident through education and involvement with the CDA Colorado Rapid Response for Ag & Livestock (CORRAL) program.
An overview of Colorado emergency management shared by the Colorado Director of Emergency Management, Acting Field Services Manager and South Central Regional Field Manager at the Colorado Counties Inc. (CCI) Conference on Nov. 28, 2017.
Colorado DHSEM: A look inside emergency management from a regional field mana...Trost, Micki
Focus: Emergency Management, State Focus, Leadership, Case Study, and Discussions.
Created and presented by Colorado DHSEM Regional Field Manager Cory Stark
COVOST overview for the Bureau of Reclamation Emergency Management Workshop sharing the benefits of activating a virtual operations support team and social media monitoring/listening.
Social Media: Situational Awareness & Anonymous AppsTrost, Micki
Presentation delivered to the Safe Schools Summit for school officials to learn how to use social media listening to increase situational awareness on open source platforms including anonymous apps.
Presentation shared by Colorado DHSEM Strategic Communications Director Micki Trost on impact of recent Colorado Floods including lessons learned from Public Information Officer presprective.
Colorado Public Safety DTR System Assessment Project Update Trost, Micki
Colorado Statewide Public Radio Safety Summit presentation regarding the DTR system assessment project update by the Colorado Division of Homeland Security and Emergency Management.
Presentation by Jared Jageler, David Adler, Noelia Duchovny, and Evan Herrnstadt, analysts in CBO’s Microeconomic Studies and Health Analysis Divisions, at the Association of Environmental and Resource Economists Summer Conference.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
ZGB - The Role of Generative AI in Government transformation.pdfSaeed Al Dhaheri
This keynote was presented during the the 7th edition of the UAE Hackathon 2024. It highlights the role of AI and Generative AI in addressing government transformation to achieve zero government bureaucracy
Donate to charity during this holiday seasonSERUDS INDIA
For people who have money and are philanthropic, there are infinite opportunities to gift a needy person or child a Merry Christmas. Even if you are living on a shoestring budget, you will be surprised at how much you can do.
Donate Us
https://serudsindia.org/how-to-donate-to-charity-during-this-holiday-season/
#charityforchildren, #donateforchildren, #donateclothesforchildren, #donatebooksforchildren, #donatetoysforchildren, #sponsorforchildren, #sponsorclothesforchildren, #sponsorbooksforchildren, #sponsortoysforchildren, #seruds, #kurnool
Understanding the Challenges of Street ChildrenSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHOChristina Parmionova
The 2024 World Health Statistics edition reviews more than 50 health-related indicators from the Sustainable Development Goals and WHO’s Thirteenth General Programme of Work. It also highlights the findings from the Global health estimates 2021, notably the impact of the COVID-19 pandemic on life expectancy and healthy life expectancy.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
1. Understanding Social Media and
Using it to Your Advantage
Nathan C. Hunerwadel
Communications Specialist
Colorado Division of Homeland Security
& Emergency Management
@hunerwadel
nathan.hunerwadel@state.cous
2. Agenda
Introduction
Social Media Statistics
Persistent & Emerging Concerns
Anonymous Trends
Specific Platform Review
Using it to Your Advantage
Questions
3. Nathan C. Hunerwadel
Communications Specialist
Manage @ReadyColorado Blog and Social Media accounts
Colorado Virtual Operations Support Team Manager
Reserve Deputy Sheriff, Jefferson County Sheriff’s Office
PIO with the Jefferson County Type III IMT
@Hunerwadel ~ about.me/hunerwadel
4. Social Media 101
Published on Apr 16, 2014
#Socialnomics 2014 by Erik Qualman is the fifth
version of the most watched video series on Social
Media. Qualman is a #1 best selling author and
keynote speaker on digital leadership. The video
was produced by Equalman Studios. Source data
for the statistics in the video is available in the
book Socialnomics (sold on Amazon)
socialnomics.com | @equalman
(Text taken from You-Tube video description)
#Socialnomics 2014
Teens are among the leaders of Internet
trends. The world is advancing so quickly that
many of today's teens will find future careers
in technologies that haven't been invented
yet. Through the Think Time videos, you'll see
why it's time for them to become more cyber
savvy. By MySecureCyberSpace
(Text taken from You-Tube video description)
Think Time – Teens and Social Networks
5. Social Media Statistics
10 Things to Know About How Teens Use Technology – Pew Research Internet Project
http://www.pewinternet.org/2013/07/10/10-things-to-know-about-how-teens-use-technology/
6. Social Media Statistics
Teens, Social Media, and Privacy – Pew Research
http://www.pewinternet.org/2013/05/21/teens-social-media-and-privacy-
3/
7. Persistent & Emerging Concerns
Norton Online Family Report
http://us.norton.com/content/en/us/home_homeoffice/media/pdf/nofr/Norton_Family-Report-USA_June9.pdf
8. Persistent & Emerging Concerns
Infographic – How to Keep Students Safe Online
https://gaggle.net/speaks/infographic-how-to-keep-students-safe-online/
9. Persistent & Emerging Concerns
McAfee The Secret Online Lives of Teens
http://promos.mcafee.com/en-US/PDF/lives_of_teens.pdf
http://promos.mcafee.com/en-
US/PDF/lives_of_teens.pdf
10. Persistent & Emerging Concerns
McAfee The Secret Online Lives of Teens
http://promos.mcafee.com/en-
US/PDF/lives_of_teens.pdf
11. Persistent & Emerging Concerns
2011 AP-MTV Digital Abuse Study
• Three-quarters of youth believe that digital abuse is a serious problem, and intervention is on the rise from 2009
• Digital abuse isn’t generally the act of strangers – perpetrators are usually people known well
• Youth are aware that sexting can be a serious problem, but still 1 in 3 have engaged in some form of sexting.
• Many who “sext” do so as a result of pressure.
• Additionally, 41% of those in a relationship have experienced some form of digital dating abuse, with about a quarter
feeling pressure to constantly “check in” with their partner.
• Slurs are common online, and young people regularly encounter words like “slut” “that’s so gay” “fag” and “retard”
on social networks.
• Youth know digital discrimination is a serious issue, yet many don’t fully grasp the weight of discriminatory language.
• Youth point to some tactics as helpful in ameliorating digital abuse, particularly limiting the perpetrator’s access to
their social network accounts, passwords and digital contact info.
• Compared to two years ago, young people today are more aware of the potential negative impacts of posting
information online and more likely to intervene when they see peers experiencing digital abuse.
• Digital Abuse is not something to be dismissed as “no big deal.” Most (53%) of those who have encountered abuse
online say the experience was deeply upsetting.
• Association seen between digital abuse and mental health.
• Other risky behaviors are associated with digital abuse.
• Students engaged in sexting or who are victims of digital dating abuse are more likely to consider dropping out of
school.
• Whether rich or poor, black or white, digital abuse touches young people from all parts of society
http://www.athinline.org/pdfs/MTV-AP_2011_Research_Study-Exec_Summary.pdf
12. Persistent & Emerging Concerns
2013 AP-MTV Digital Abuse Study
http://www.athinline.org/pdfs/2013-MTV-AP-NORC%20Center_Digital_Abuse_Study_Release.pdf
http://www.athinline.org/pdfs/MTV-AP_2011_Research_Study-Exec_Summary.pdf
13. Persistent & Emerging Concerns
National School Safety & Security Services
http://www.schoolsecurity.org/2014/02/schools-face-new-wave-violent-threats-sent-social-media-electronic-means-study-
says/
15. Persistent & Emerging Concerns
SWATTING – Dangerous New Trend, More Than Just
A Prank
http://www.ivecla
w.com/swatting-dangerous-
new-trend-
fraught-dangers/
16. Anonymous Trends
“A funny thing happened on the way to an authentic internet: Anonymity came back into
vogue. Today, there are literally dozens of anonymous apps that allow you to vent,
confess, or share secrets with strangers while going incognito. These apps are so popular,
in fact, that it’s hard to keep track of them all.”
~ Kevin Roose ~ Daily Intelligencer ~ NYMag.com
http://nymag.com/daily/intelligencer/2014/06/complete-guide-to-anonymous-apps.html
“The Secret’s Out
“Critics maintain that anonymity is a double-edged sword. While it lets the public frankly
discuss issues they might not otherwise in an open forum, cloaking one’s identity leads
some to believe they can tease and troll others at will.
“This is especially true among kids, teens and adults in their early 20s—groups not known
for their restraint and self-control. (The penetration of these apps is high among young
people. Nine percent of Internet users ages 10-18 in the U.S. use Ask.fm on a daily basis,
while about 5 percent utilize Secret, Whisper and Yik Yak every day, according to
research data from McAfee.)
‘“They may be feeling power for the first time,” says anti-bullying activist Mike Dreiblatt,
co-author of the book How to Stop Bullying and Social Aggression. “For some young
people, that can be intoxicating. They don’t know when to stop. Cyberbulling and
anonymous apps go hand in hand.”’ ~ David Gianatasio ~ ADWEEK.com
http://www.adweek.com/news/advertising-branding/anonymous-apps-whisper-and-secret-have-dark-side-160107
17. Anonymous Trends
“These apps are demonized because they’re new,” adds Lee Tien, senior staff attorney at the Electronic Frontier
Foundation, a nonprofit that supports digital rights. “There’s a tendency to blame the technology or the modality.”
Working through issues like bullying and abuse, he says, “are part of the free-speech bargain. Those costs are
something that we deal with. No right-thinking person says free speech has no cost.”
Quoted by David Gianatasio in ADWEEK.com
http://www.adweek.com/news/advertising-branding/anonymous-apps-whisper-and-secret-have-dark-side-160107
Whisper
Secret
Yik Yak
Gossup
Babbly
Cloaq
Viper
Insider
Mood
Local Anonymous
ButterflyEffect
Matter
Ether
Steams
Bamtboo
WUT
Impulses
ShareWhere
Confidly
Shrtwv
Truth
Erodr
Sneeky
Backchat
rumr http://nymag.com/daily/intelligencer/2014/06/complete-guide-to-anonymous-apps.html
18. Specific Platform Review
https://gaggle.net/top-social-networking-sites-and-apps-kids-use/
4chan.org
9gag.com
Ask.fm
Badoo
Burn Note
ChatRouletter.com
Creepypasta
Dropbox
Facebook
Facebook Messenger
Fess
FireChat
Foursquare
Google+
Google Drive
Grom Social
Instagram
Keek
Kik
Leak
Meet Me
Myex.com
Myspace
OKCupid
Omegle
Oovoo
Path
PhotoSwap
Plenty Of Fish “POF”
Reddit Forums
Secret
Slingshot
SnapChat
Spring.me
Streetchat
Tagged.com
Tinder
Truth
Tumblr
Twitter
Viber
Vine
Voxer
WhatsApp
Whisper
Yik Yak
19. Using it to Your Advantage
http://www.pewinternet.org/2014/07/23/13-things-to-know-about-teens-and-technology/
20. Using it to Your Advantage
Listen to the Conversation and Engage
A Maryland school district will be one of
only four in the nation to use special
software to track students' social media
posts. The idea is to keep students safe.
FOX 5's Lauren DeMarco has more.
https://www.youtube.com/watch?v=VV9u
NKVef_A
Use of Geolocation Services
There is notable growth in the number of social media users who are
now setting their accounts to include location in their posts.
Among adult social media users ages 18 and older, 30% say that at
least one of their accounts is currently set up to include their
location in their posts, up from 14% who said they had ever done this
in 2011.2 This trend is also showing up among younger users. An
earlier Pew Internet survey of teens ages 12-17 found that 16% of
teen social media users have their accounts set up to automatically
include their location in posts.3
http://www.pewinternet.org/2013/09/12/location-based-services/
21. Using it to Your Advantage
Listen to the Conversation and Engage
https://www.facebook.com/pages/School-
Resource-Officer-HobartIN/138999636114920
https://www.facebook.com/profile.php?id=10000
4719858297&fref=ts
22. Using it to Your Advantage
Update Policies
http://whotv.com/2014/09/26/school-districts-revising-social-
“What was clarified in this specific case was referring
Facebook and Twitter and some of the other social media
sites by name,” says the district’s communication director,
Jarret Peterson. “We also clarified teachers can use social
media to push information out and that students should not
be followed or ‘friended’ on social media.”
media-policies/
23. Using it to Your Advantage
Communicate and Train
https://www.facebook.com/pages/School-
Resource-Officer-HobartIN/138999636114920
http://lexch.com/news/regional/grand-island-schools-plan-presentations-
on-social-media-for-parents/article_dac58a20-
5975-11e4-b92e-97ba37c57da6.html
http://triblive.com/neighborhoods/yournorthhills/yo
urnorthhillsmore/6931594-74/parents-presentation-media#
axzz3GtYu8m00
24. Using it to Your Advantage
Communicate, Communicate, Communicate
Many school districts now use social
media to communicate with parents.
News 8 looks into one district taking
social media to the next level.
http://youtu.be/9tLYGvE7w4g
https://twitter.com/SheriffCameron/status/512673004581830656
https://twitter.com/firstsheriff/status/512638870656004096
25. Using it to Your Advantage
Use it in the Classroom
http://www.bestofneworleans.com/gambit/social
-media-in-the-classroom/Content?oid=2506272
But in Loyola's social media classes, and within the
university's newly minted social media minor, it's not about
teaching students how to use the technology with which they
are intimately familiar. Instead, it's focused on teaching
them how to use social media strategically and get the most
out of what the various platforms offer. "It's a question of
what is good content — when do you post and thinking about
how you post strategically," Nelson says. "How do you work
together across platforms?"
In Nelson's social media class, the School of Mass
Communication is the students' client. Students represent
the school by operating its social media presence. Content is
produced with a purpose and students get a real life
connection between the classroom and the world beyond its
walls. Nelson says one of the major challenges students face
is how to find a dynamic voice that appeals to a variety of
audiences.
"Trying to reach high school students, who are increasingly
straying from Facebook because their parents are on it, that
could be Instagram and Tumblr," he says. "Alumni like
Facebook. Everybody loves Twitter, so the thrust of the
semester is being able to direct [students'] messaging."
26. Using it to Your Advantage
Watch and Learn!
https://twitter.com/SmokyNow
https://twitter.com/SmokyNow/status/4572898
66275848192
27. Using it to Your Advantage
Beware of the dangers. Embrace the positive potential.
http://promos.mcafee.com/en-US/PDF/lives_of_teens.pdf
28. Questions?
Nathan C. Hunerwadel
Communications Specialist
Colorado Division of Homeland Security
& Emergency Management
@hunerwadel
nathan.hunerwadel@state.co.us