A comprehensive guide on cyberbullying for parents, teachers & children.
You can also read this on our website here: https://homeguides.co.uk/cyberbullying/
One in three internet users globally is a child. This proportion is likely to be even higher in the global South.
Organizations working to advance children’s rights and promote well-being need to understand how to reduce the risk of harm children face online while maximizing their opportunities for learning, participation and creativity.
The PPT covers digital safety for children.
This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.
A comprehensive guide on cyberbullying for parents, teachers & children.
You can also read this on our website here: https://homeguides.co.uk/cyberbullying/
One in three internet users globally is a child. This proportion is likely to be even higher in the global South.
Organizations working to advance children’s rights and promote well-being need to understand how to reduce the risk of harm children face online while maximizing their opportunities for learning, participation and creativity.
The PPT covers digital safety for children.
This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.
The goal of this presentation is to increase your knowledge about social media and create a sense of awareness about social networking trends including cyber-dangers: sexting, bullying, stalking. Share social networking and media best practices and ultimately, start a conversation about a values-based approach to social networking.
Cyber-Stalking Threat to People or Bane to Technologyijtsrd
A day without the use of technology in our lives seems like an impossible mission. We have become entirely dependent on it in divergent ways. Technology has helped us in creating great ideas that we can communicate with people present anywhere on this earth. Apart from the fact that technology has made our lives easy, it also bought in a lot of difficulties. With the massive advancement of technology along with the evolution of time, the crime rate of cyber offences keeps increasing every day. One such cyber assault that requires immediate attention is cyber stalking. Cyber stalking involves continuous or persistent following of a person through electronic media with or without the persons consent. Cyber stalking, unlike the offline stalking, is severe as the identity of the perpetrator is unknown and geographical proximity is no barrier. The severity of cyber talking has increased in the recent times as the current generation is found all the time surfing on their phones or laptops and being busy with social networking media like Facebook, Instagram, Whatsapp and many more. The reason why one may become a cyber-stalker can be because of revenge, obsession, sadism, denial, insult and many more. The post effects of cyber stalking to a victim can be psychologically overwhelming that there are cases where the victims have committed suicide being incapable of coping with the psychological and emotional stress. Cyber stalking can be used to blackmail victims as well. It can also include morphing of the victims image with nude pictures and posting it on public and social websites thus destroying the reputation and dignity of the victim. One of the highly disadvantageous facts in cyber offences is that once such obscene picture of the victim is posted, the post gets shared to more and more people. Therefore even if the perpetrator is found and the origin where the obscene pictures were posted is deleted, it is difficult to find all places where the post has been shared. Thus its high time that more emphasis is laid on introducing effective and efficient laws in field of newly formed cyber offences such as cyber stalking. H. M. Shambhavee "Cyber-Stalking: Threat to People or Bane to Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21354.pdf
Paper URL: https://www.ijtsrd.com/management/law-and-management/21354/cyber-stalking-threat-to-people-or-bane-to-technology/h-m-shambhavee
ONLINE SAFETY conference for Parents in Escuela Americana - What every parent should know about impact of new technologies on their children - www.ideaworks.la - @rokensa
Invited presentation to the parent-teacher association of C.E.I.P. Rosa Luxemburgo, Madrid, April 2012.
http://www.educa.madrid.org/web/cp.rosaluxemburgo.madrid/index.html
Internet Filtering, Intellectual Freedom, & Your School LibrarianKate Gukeisen
Created for MSLIS "Information Technologies in Educational Organizations," this slide show explores the importance of school librarians to creating effective policies and learning opportunities for all students in online, participatory environments.
Parent Tips | Social Media & Internet Security Laura Dunkley
Parenting Tips on how to help your families stay safe while using social media and the internet. A few online usage tips & guidelines for the early years, teens & adults.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Adolescent Mobile Safety: Not a LOL-ing Mattercaitystew
This presentation delineates the dangers of mobile technology and the increased risk of these hazards to the digital native generation. Moreover, the slides detail how theses dangers can be resolved and/or prevented and discusses whose responsibility it is to teach children the safe use mobile technology.
Cyberbullying is a growing social problem that has become all too common in online communities. Research indicates that one in five tweens has been cyberbullied, while 59% of teens have been harassed online. And the rate at which online bullying is occurring does not seem to be declining. In the midst of the COVID-19 pandemic, cyberbullying escalated. During stay-at-home orders, research shows cyberbullying increased 70% and toxicity on online gaming platforms increased 40%.3
The goal of this presentation is to increase your knowledge about social media and create a sense of awareness about social networking trends including cyber-dangers: sexting, bullying, stalking. Share social networking and media best practices and ultimately, start a conversation about a values-based approach to social networking.
Cyber-Stalking Threat to People or Bane to Technologyijtsrd
A day without the use of technology in our lives seems like an impossible mission. We have become entirely dependent on it in divergent ways. Technology has helped us in creating great ideas that we can communicate with people present anywhere on this earth. Apart from the fact that technology has made our lives easy, it also bought in a lot of difficulties. With the massive advancement of technology along with the evolution of time, the crime rate of cyber offences keeps increasing every day. One such cyber assault that requires immediate attention is cyber stalking. Cyber stalking involves continuous or persistent following of a person through electronic media with or without the persons consent. Cyber stalking, unlike the offline stalking, is severe as the identity of the perpetrator is unknown and geographical proximity is no barrier. The severity of cyber talking has increased in the recent times as the current generation is found all the time surfing on their phones or laptops and being busy with social networking media like Facebook, Instagram, Whatsapp and many more. The reason why one may become a cyber-stalker can be because of revenge, obsession, sadism, denial, insult and many more. The post effects of cyber stalking to a victim can be psychologically overwhelming that there are cases where the victims have committed suicide being incapable of coping with the psychological and emotional stress. Cyber stalking can be used to blackmail victims as well. It can also include morphing of the victims image with nude pictures and posting it on public and social websites thus destroying the reputation and dignity of the victim. One of the highly disadvantageous facts in cyber offences is that once such obscene picture of the victim is posted, the post gets shared to more and more people. Therefore even if the perpetrator is found and the origin where the obscene pictures were posted is deleted, it is difficult to find all places where the post has been shared. Thus its high time that more emphasis is laid on introducing effective and efficient laws in field of newly formed cyber offences such as cyber stalking. H. M. Shambhavee "Cyber-Stalking: Threat to People or Bane to Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21354.pdf
Paper URL: https://www.ijtsrd.com/management/law-and-management/21354/cyber-stalking-threat-to-people-or-bane-to-technology/h-m-shambhavee
ONLINE SAFETY conference for Parents in Escuela Americana - What every parent should know about impact of new technologies on their children - www.ideaworks.la - @rokensa
Invited presentation to the parent-teacher association of C.E.I.P. Rosa Luxemburgo, Madrid, April 2012.
http://www.educa.madrid.org/web/cp.rosaluxemburgo.madrid/index.html
Internet Filtering, Intellectual Freedom, & Your School LibrarianKate Gukeisen
Created for MSLIS "Information Technologies in Educational Organizations," this slide show explores the importance of school librarians to creating effective policies and learning opportunities for all students in online, participatory environments.
Parent Tips | Social Media & Internet Security Laura Dunkley
Parenting Tips on how to help your families stay safe while using social media and the internet. A few online usage tips & guidelines for the early years, teens & adults.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Adolescent Mobile Safety: Not a LOL-ing Mattercaitystew
This presentation delineates the dangers of mobile technology and the increased risk of these hazards to the digital native generation. Moreover, the slides detail how theses dangers can be resolved and/or prevented and discusses whose responsibility it is to teach children the safe use mobile technology.
Cyberbullying is a growing social problem that has become all too common in online communities. Research indicates that one in five tweens has been cyberbullied, while 59% of teens have been harassed online. And the rate at which online bullying is occurring does not seem to be declining. In the midst of the COVID-19 pandemic, cyberbullying escalated. During stay-at-home orders, research shows cyberbullying increased 70% and toxicity on online gaming platforms increased 40%.3
Cyberbullying-Identification-Prevention-Response.pdf
1
Cyberbullying:
Identification,
Prevention,
& Response
Sameer Hinduja, Ph.D.
Justin W. Patchin, Ph.D.
Cyberbullying Research Center
October 2014
2
ids have been bullying each other for gener-
ations. The latest generation, however, has
been able to utilize technology to expand
their reach and the extent of their harm. This phe-
nomenon is being called cyberbullying, defined as:
“willful and repeated harm inflicted through the use
of computers, cell phones, and other electronic de-
vices.” Basically, we are referring to incidents where
adolescents use technology to harass, threaten, hu-
miliate, or otherwise hassle their peers. For exam-
ple, youth can send hurtful text messages to others
or spread rumors using smartphones or tablets.
Teens have also created web pages, videos, and
profiles on social media platforms making fun of
others. With mobile devices, adolescents have tak-
en pictures in a bedroom, a bathroom, or another
location where privacy is expected, and posted or
distributed them online. Others have recorded un-
authorized videos of other kids and uploaded them
for the world to see, rate, tag, and discuss. Still oth-
ers are embracing anonymous apps or chat func-
tionality on gaming networks to tear down or hu-
miliate others.
What are some negative effects that cyber-
bullying can have on a person?
There are many detrimental outcomes associated
with cyberbullying that reach into the real world.
First, many targets report feeling depressed, sad,
angry, and frustrated. As one teenager stated: “It
makes me hurt both physically and mentally. It
scares me and takes away all my confidence. It
makes me feel sick and worthless.” Those who are
victimized by cyberbullying also reveal that they are
often afraid or embarrassed to go to school. In ad-
dition, research has revealed a link between cyber-
bullying and low self-esteem, family problems, aca-
demic difficulties, school violence, and various de-
linquent behaviors. Finally, cyberbullied youth also
report having suicidal thoughts, and there have
been a number of examples in the United States
and abroad where youth who were victimized end-
ed up taking their own lives.
Where does cyberbullying commonly occur?
Cyberbullying occurs across a variety of venues and
mediums in cyberspace, and it shouldn’t come as a
surprise that it occurs most often where teenagers
congregate. Initially, many kids hung out in chat
rooms, and as a result that is where most harass-
ment took place. In recent years, most youth are
have been drawn to social media (such as Insta-
gram, Snapchat, and Twitter) and video-sharing
sites (such as YouTube). This trend has led to in-
creased reports of cyberbullying occurring in those
environments. Voice chat, textual chat, and texting
via phones or tablets also can provide an environ-
ment in whi.
Good Cybercitizens Make the Internet a Safer Place
Own your online presence. To keep yourself safe, set privacy and security settings on web services, apps, and devices to your comfort level. ...
Be a good digital citizen. ...
Respect yourself and others. ...
Practice good communications. ...
Protect yourself and your information.
Magazine on the PERVENTION OF CYBERBULLYINGJaveriaZain1
CYBER BULLYING basic intro
its preventions
how it is dangerous
role of teacher , stdents ,parents, government, educational institute
in its prevention
ratio of cyber bullying now a days in our society
Rahil Foundation is telling you What Cyber Bullying is and what Harm it can Cause, so you should Read and Understand this thing. Rahil Foundation's NGO is Working to make people Cyber Literate.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Accelerate your Kubernetes clusters with Varnish Caching
Cyber safety word for edmodo
1. Topic: - CYBER SAFETY
Lesson Objectives
1. At the end of the lesson the students should be able to define cyber-safety.
2. At the end of the lesson the student should to identify ways to keep safe online.
3. At the end of the lesson the student should be able to enumerate the ethical
issues in the use of web 2.0 in education.
INTRODUCTTION
cybersafety Internetsafetyoronline safetyorE-Safetyistryingtobe safe on the internetandisthe act
of maximizingauser'sawarenessof personal safetyandsecurityriskstoprivate informationand
propertyassociatedwithusingthe internet,andthe self-protectionfromcomputercrime.
cybersafetymeansbeingsecure online.The online environmentisrife withthreatstooursafetyand
security.Naturally,we wishtomitigate thesethreatswhere possible,notonlyasan organizationbut
alsoin ourindividual capacities.Thesethreatsare everythingthatcanprove a risk,e.g.a publically
accessible internetconnection,phishingemails,suspiciouslinks,downloadable documentsorapps.
Cybersafetyhelpstoavoidthose risksbutalsohelpstoprotectagainsttheirconsequences,becauseitis
impossible toavoidall hazards.Evenwhensomeonecomplieswithall customarysecurityrequirements,
theycouldstill become the targetof an attack.
The followingare the waystokeepsafe online:
1. Network securityisthe practice of securinga computernetworkfromintruders,whether
targetedattackersor opportunisticmalware.
2. Applicationsecurityfocusesonkeepingsoftware and devicesfree of threats.A compromised
applicationcouldprovideaccesstothe data itsdesignedtoprotect.Successful securitybegins
inthe designstage,wellbeforeaprogramor device isdeployed.
3. Informationsecurity protectsthe integrityandprivacyof data, bothinstorage and in transit.
4. Operational security includesthe processesanddecisionsforhandlingandprotectingdata
assets.The permissionsusershave whenaccessinganetworkandthe proceduresthat
determine howandwhere datamaybe storedor sharedall fall underthisumbrella.
5. Disaster recoveryand businesscontinuity define how anorganizationrespondstoacyber-
securityincidentoranyothereventthatcausesthe lossof operationsordata.Disasterrecovery
policiesdictate howthe organizationrestoresitsoperationsandinformationtoreturnto the
same operatingcapacityas before the event.Businesscontinuityisthe planthe organization
fallsbackon while tryingtooperate withoutcertainresources.
6. End-usereducationaddressesthe mostunpredictablecyber-securityfactor:people.Anyone
can accidentallyintroduce avirustoan otherwise securesystembyfailingtofollow good
securitypractices.Teachinguserstodelete suspiciousemail attachments,notplugin
unidentified USBdrives,andvariousotherimportantlessonsisvital forthe securityof any
organization.
2. CYBER BULLYING
Cyberbullyingisone examplethatcanhave devastatingeffectsonyoungpeople.Cyberbullyingoccurs
whena bullytargetsa victimusingonlinecommunicationmethodssuchastextingorsocial mediaposts
to threaten,abuse,ordegrade someone.Withitsuse of technology,cyberbullyinghasgainedmore
attentionandnotorietyinrecentyears.It’sacrime that doesn’trestrictitself toschool orthe
playground.
What fuelscyberbullying?Unlike traditional bullying,itdoesn’trequire physical strengthoraface-to-
face meeting.AnyonewithanInternetconnectionandadigital device likea smartphone,computeror
tabletcan be a cyberbully.There are nospecifichours,anditcan happenaroundthe clock,whether
throughsocial networkingsitesorinstantmessaging. Sincemanyplatformsdon’tmake aneffortto
verifypeople’sreal identities,acyberbullycanchoose analiasand remainanonymous.Cyberbullyingis
fueledbythiscloakof anonymity,whichoftenservestoheightenthe extentof acyberbully’scruel and
damagingbehavior.Itcan targetanyone,includingyoungkidsandmiddle schoolandhighschool
students. Cyberbullyingcanleave some youthdepressedorwithdrawn,andinsome extremecaseshas
ledvictimstosuicide.
There are manydifferenttypesof cyberbullyingoutthere,andall of themcan be damagingto children
and teens.
Types ofcyberbullying
1. Outing-: Outingisa deliberate acttoembarrassor publiclyhumiliateanindividual bypostingtheir
private,sensitive,orembarrassinginformationonline.The informationrevealedcanbe minoror
serious,butcan have a severe andlastingimpactonthe victim.
2. Fraping-: Frapingisa seriousoffense where apersongainsaccessto the victim’ssocial mediaaccount
and impersonatestheminanattemptto be funnyor to ruintheirreputation.Frapingcanhave serious
consequences,especiallybecause once asocial postisout there,itmay be hard to delete itandmend
the victim’sdigital reputation.
3. Dissing-:Dissingiswhenpeople share orpostcruel informationaboutanindividual onlinetoruin
theirreputationorfriendshipswithothers.Thisincludespostingpersonalphotos,videos,and
screenshots.The personsharingthisinformationmaybe a friendoracquaintance of the victim.Some
cyberbulliesgotogreatlengthstohurt theirvictims,evencreatingwebpagesdesignedtospreadhurtful
informationandliesabouttheirvictims.
4. Trolling-:Trollingisa formof cyberbullyingdone byinsultinganindividual onlinetoprovoke them
enoughtoget a response.Usuallytheseattacksare personal andinstigate angerinthe victim, making
themlashout and behave badly.
5. Trickery -: Trickeryisthe act of gainingavictim’strustso that theyreveal secretsorembarrassing
information,whichthe cyberbullypostsonthe Internetforeveryone tosee.The personpretendstobe
a close friendandconfidant,andgivesthe victimafalse sense of securitybefore breakinghisorher
trust.
6. Sockpuppetsorcatfishing -:A “sockpuppet”isa form of deceptionthatusesafake social media
account. The creator of the fake accountgainstheirvictim’strustbypretendingtobe someone they’re
3. not.Whentheirvictimdivulgesprivateinformation,the puppeteersharesthatpersonal information
withotherswhomay bullythe victim.Catfishingsimilarlyinvolvessettingupa fake online profile,but
withthe purpose of luringitsvictimintoa deceptiveonline romance.
7. Doxing-: Doxingisderivedfromthe word“documents”andoccurswhena cyberbullyharassesand
threatensavictimonline forrevenge andtodestroytheirvictims’privacy.Doxingsharesprivate
information — suchas Social Securitynumbers,creditcards,phone numbers,andotherpersonal data
— withthe public.
8. Encouragingself-harm-:Some cyberbulliesthreatentohurttheirvictimsorconvince themtohurt
themselves.Itcanbe the worsttype of cyberbullying,becauseitcan leaditsvictimstake theirlivesby
suicide.
Cyberbullying warning signs
Cyberbullyingcomesinmanyformsandcan affectitsvictimsmanyways.It’ssmartto watch for
commonwarningsignsthatyour childisa victimof cyberbullying,aswell asbullyingingeneral.
Depression-:A huge warningsignthat yourchildmay be the victimof cyberbullyingorbullyingisif they
become withdrawnorseemdepressedandsad.Are theylosinginterestinpeople oractivitiestheyused
to enjoy?Are theysleepingin whentheyusuallydon’t?
Avoidance of social situations -:Doesyourchildor teenseemtobe avoidingsocial situationsorfriends
whomtheyenjoyedspendingtime withinthe past?Are theyspendinganinordinate amountof time
alone?Thiscouldbe a signal that somethinggreater,suchascyberbullying,isgoingon.
Changedfrequencyof deviceuse -:Have younoticedthatyour childsuddenlyisalwaysonsocial media
or Snapchat,or textingontheircell phones?Thiscouldsignal theyare the targetof cyberbullying— or
are doingthe bullying.A markeddecreaseindeviceuse couldalsobe awarningsign.Payingattentionto
any changesinyour child’sonlinebehaviorcouldhelpyoudetecttrouble.
Secrecy -: Doesyourchildhide theirdeviceswheneveryou’re aroundordodge questionsabouttheir
online activity?Theycouldbe hidingthe possibilitythattheyare beingbulliedonline.Thisisan
importantopportunityforyoutointervene,helpthemsortouttheiremotions,andputa stopto the
harmful behavior.
Heightenedemotions -:Anotherwarningsignof cyberbullyingisif yourchildseemstogetupsetor
angry whenthey’re online.Cryingisawarningsign.While laughingisn’tabadthing,it mightbe if
they’re the onesdoingorwitnessingthe cyberbullying.
Suspicioussocial mediaaccountactivity -:Has yourchildsuddenlycancelledtheirsocial media
accounts?Or dotheyseemto have multipleaccounts?These couldbe warningsignsthatsomething
isn’tright.
Suspiciousphotos -:Have youseenimages of yourchildontheircell phone orothers’social media
accounts thatare demeaningandinappropriate?Orhave youfoundimagesof someone else onone of
4. your child’sdevicesthatyouknowthe otherpersonwouldn’twantshared?These are warningsignsthat
eitheryourchildisthe targetor source of cyberbullying.
Hurtful comments -:Are there meancommentsharassingorembarrassingyourchildontheirsocial
mediaaccountsor in theirtextmessages?Keepingupwiththeironline activityisimportant,especially
so youcan spot cyberbullyingbehavior — suchas hurtful comments — before theyare deleted.Evenif
deleted,thosecommentsmayinflictemotionaldamage onyourchild.
How to protect your child from cyberbullying -: One of the firstthings parentsshoulddowhen
theirchildisbeingcyberbulliedisremembertostayaware and calm.Childrenmaynotlike totell their
parentswhentheyare beingcyberbulliedbecausetheyfeel embarrassedorthey’re afraidtheymight
lose theirinternetprivileges.
Talk to yourkidsaboutcyberbullying.Letthemknow cyberbullyingcanbe common that theyaren’tthe
onlyvictims.Teachyourkidsthe basicsof online securityandstayconnectedwiththemdailyand
digitally.
Anotheroptiontokeepchildrensafe onlineistoinstall reliableonline securityonall of the devicesthey
access.For instance letsyourkidsexplore the webfreelywhile keepingyouinthe know aboutwhich
sitestheyvisit.Itcomeswithparental controlsthatblockunsuitablecontentfor kidsandprovides
insightintoyourchild’ssocial mediaactivitywhentheylogintosocial mediasitesfromtheirPC.
The securitysoftware alsohelpsprotectyourchildfromaccidentallygivingoutsensitivepersonal
informationfromtheircomputer.Thisincludesphone numbers,address,email,andthe school they
attend.It alsoalertsyouwhenyourchildattemptstovisita blockedsite.
Cyberbullyingisaproblemthat’snoteasyto solve.Butawarenessandknowledgeare the firststepsto
helpkeepyourchildrensafe online.
ETHICAL ISSUES RELATED TO WEB 2.0 IN EDUCATION
Ethicsare a setof standardsgoverningthe conductof membersof a profession.Ethicsestablishbasic
valuesforresponsible actionsandpracticeswithinaprofessional community.Althoughtheremaybe no
punishmentforviolatingethical standards,some practices(suchasspammingandsendingviruses) are
beingwrittenorwill be writtenintolaw.The generallyagreed-uponethical standardsforWeb
professionalshave developedfromyearsof experience,andmanyhave beeninheritedfromother
professions.
Web2.0 toolsare toolsof technologythatallow teachersandstudentsaliketocreate,collaborate,edit
and share contenton-line thatisuser-generated....Toolsforthe creationandsupportof a web-based
learningenvironment.Toolsforcommunicationandthe cultivationof relationships.Web2.0toolsare
free digital programsthatcan be usedfor creatingandsharingstudent-generatedprojectsandproducts.
Theyare interactive,multi-purpose,easy-to-use digital platformsthatencourage studentstocollaborate
witheachotheror create and share individualizedresponse products.
Web2.0 toolsprovide engagingwaysstudentscaninteractwith,andmostimportantly,learnfrom
course material.Theyare particularlyhelpful whenalignedtoteachingandassessmentexercisesmeant
to increase studentengagement,require studentstosummarize information,orverbalize insightinto
theirconceptual understandingthroughmeansotherthantraditional writingexercises.Web2.0tools
5. alsoprovide studentsanopportunitytointeractwithothersastheyshare theirknowledge.Students
can collaborate withclassmatestocreate response products,ortheycanshare completedproductswith
peersintheirclass,studentsinothersections,orotherlearnersaroundthe world.Web2.0toolscreate
opportunitiesforstudentstoshare whattheyare learningwithawideraudience. Examplesof Web2.0
sitesinclude Wikipedia,Facebook,Twitter,andwebblog sites,(e.g.wordpress) whichall transformed
the way the same informationwassharedanddelivered.
Examplesof ethical behaviorforWebprofessionalsincludethe following:
I. Do not sendunsolicitedbulke-mail,orspam.
II. Do not buydomainnamesthatyou do notintendtouse (a practice also knownasdomain
squattingorcyber-squatting).
III. Do not knowinglyspreadmaliciousprogramcode suchas virusesorworms.
IV. Do not passalongchain e-mail messages,especiallythose that implythreats.
V. Be honestwithyourcustomers,anddonot overcharge fortechnical servicesthattheymaynot
understand.
The followingare kindsof ethical issuesrelatedtoweb2.0 ineducation
1. Spam -:Spam isunsolicitedbulke-mail — thatis,e-mail messagesthatthe recipientsdidnotask
to receive.Asyouare undoubtedlyaware,millions(if notbillions) of spammessagesare sentto
Webuserseveryday.
2. Uneasinesswithopenness.A numberof participantsnotedthatthe opennature of Web2.0
technologiesisstill new tomanystudents.Theyreportedthatsome studentsare very
uncomfortable withthe opennessandare reluctanttoparticipate inclassactivitiesthatutilize
Web2.0.
3. privacyissueswithWeb2.0. Most of these toolsrequire eachstudenttocreate an account.
Whenstudentscreate accounts,the website storesandsometimessell theirinformation.
4. Offensive orIllegal Content -:The multitudeof offensive andinappropriate contentavailable
online leadstomanydifficultandawkwardconversationswithourchildren.Andthisisonlythe
contentthey’ll openlyaskusabout.Aschildrenbecome older,they’relesslikelytoconsultwith
a parenton what theyhave seenanddon’tunderstand,outof fearof devicesbeingtakenaway
fromthemor parental controlsapplied.Associal mediahascome intoplay,there isalsoan
increase inthe amountof inappropriate andillegalcontentmade availabletokidswithoutthem
evenhavingtoseekitout.Lately,since Facebookreleasedtheir“Live Video”feature therehas
beena frequencyof youngpeoplelivestreamingthemselvesself-harming.These videos,when
viewedinreal time are unmonitoredandcantake weekstobe removedbyFacebook.
5. UnwantedContact-: Whenit comesto the online world,where there are childrenthere are
predators.Withan increase inthe availabilityof livestreamingappsandpublicmessagingapps,
there isan increasedopportunityforpredatorstoreadilytargetandgroomtheirvictims.Sadly,
it ismore difficultforyoungerchildrentounderstandthatapersonposingonline asachildmay
be someone mucholderattemptingtogroomthem.Because of this,they’re more likelyto
readilyshare informationaboutthemselves.Live streamingappspresentaverygreatriskas
childrendon’t realisehoweasilytheycanbe foundinreal life,justfrompostingvideosintheir
school uniform.