SlideShare a Scribd company logo
Do U Txt Msg? IM? Chat? Your Kids Do! Just What Are Kids Doing Online?
Why Online? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is a profile? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Discussion Boards ,[object Object],[object Object],[object Object],[object Object]
Chat rooms ,[object Object]
The Stats (From PEW Internet & American Life Project) ,[object Object],[object Object],[object Object],[object Object]
Instant Messaging- IM ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Stats (From PEW Internet & American Life Project) ,[object Object],[object Object],[object Object],[object Object]
Blogging ,[object Object],[object Object],[object Object]
Student Blogs ,[object Object]
Blogging Sites ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber Bullying Statistics ,[object Object],[object Object],[object Object]
Cyber Bullying (Continued) ,[object Object],[object Object],[object Object]
Our Students Need to Know (Tips) ,[object Object],[object Object],[object Object],[object Object]
Tips for Students (Continued) ,[object Object],[object Object],[object Object]
Kentucky POS ,[object Object],[object Object],[object Object]

More Related Content

What's hot

Social media and the christian youth
Social media and the christian youthSocial media and the christian youth
Social media and the christian youth
Folasade Adedeji
 
Teaching w/Technology Myths ElginCC 2009
Teaching w/Technology Myths ElginCC 2009Teaching w/Technology Myths ElginCC 2009
Teaching w/Technology Myths ElginCC 2009
Barry Dahl
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
pscl
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Doha qaradeh
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking SafetyJEM JEM
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Cyberbullying- Assignment 8
Cyberbullying- Assignment 8Cyberbullying- Assignment 8
Cyberbullying- Assignment 8jbpruden1
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying projectvolpila
 
[R]evolution - Parenting Workshop Slides
[R]evolution - Parenting Workshop Slides[R]evolution - Parenting Workshop Slides
[R]evolution - Parenting Workshop Slides
NathanielCarlson2
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
columbiahighschoollibrary
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
columbiahighschoollibrary
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
renumann
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Zarmeen Durrani
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
SuphaphonP
 
Socialmedialandmines
SocialmedialandminesSocialmedialandmines
Socialmedialandmines
Joel J. Campbell
 
Social networking sites
Social networking sitesSocial networking sites
Social networking sites
parvez_25
 

What's hot (20)

Internet Safety for Educators
Internet Safety for EducatorsInternet Safety for Educators
Internet Safety for Educators
 
Social media and the christian youth
Social media and the christian youthSocial media and the christian youth
Social media and the christian youth
 
Teaching w/Technology Myths ElginCC 2009
Teaching w/Technology Myths ElginCC 2009Teaching w/Technology Myths ElginCC 2009
Teaching w/Technology Myths ElginCC 2009
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safety
 
SMS Break up
SMS Break upSMS Break up
SMS Break up
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying- Assignment 8
Cyberbullying- Assignment 8Cyberbullying- Assignment 8
Cyberbullying- Assignment 8
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying project
 
[R]evolution - Parenting Workshop Slides
[R]evolution - Parenting Workshop Slides[R]evolution - Parenting Workshop Slides
[R]evolution - Parenting Workshop Slides
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Socialmedialandmines
SocialmedialandminesSocialmedialandmines
Socialmedialandmines
 
Social networking sites
Social networking sitesSocial networking sites
Social networking sites
 

Viewers also liked

Nota flip flop
Nota flip flopNota flip flop
Nota flip flop
FazLeenz Nik
 
Pike Ky Digital Citizenship
Pike Ky Digital CitizenshipPike Ky Digital Citizenship
Pike Ky Digital Citizenshipcynthia.warner
 
Stop Cyberbullying Parent Presentation
Stop Cyberbullying Parent PresentationStop Cyberbullying Parent Presentation
Stop Cyberbullying Parent Presentationcynthia.warner
 
SD Cloud Comp
SD Cloud CompSD Cloud Comp
SD Cloud CompA H
 
Manifesting His Glory - Part 3: Manifest His Glory Through Life and Ministry
Manifesting His Glory - Part 3: Manifest His Glory Through Life and MinistryManifesting His Glory - Part 3: Manifest His Glory Through Life and Ministry
Manifesting His Glory - Part 3: Manifest His Glory Through Life and Ministry
All Peoples Church and World Outreach
 
proyecto de innovacion tecnologica
proyecto de innovacion tecnologicaproyecto de innovacion tecnologica
proyecto de innovacion tecnologica
zamvid
 
Dead women talking (in morocco)
Dead women talking (in  morocco)Dead women talking (in  morocco)
Dead women talking (in morocco)
Renu Khanna
 
LODLearning: Enhancing e-Learning content by using Semantic Web technologies
LODLearning: Enhancing e-Learning content by using Semantic Web technologiesLODLearning: Enhancing e-Learning content by using Semantic Web technologies
LODLearning: Enhancing e-Learning content by using Semantic Web technologies
Herminio García González
 
Nature view farm case study
Nature view farm case studyNature view farm case study
Nature view farm case study
Rishi Bansal
 
Gastronomía cusqueña
Gastronomía cusqueñaGastronomía cusqueña
Gastronomía cusqueña
Cintia Rodriguez
 
Positive Attitude
Positive AttitudePositive Attitude
Positive Attitude
Kajal Kathpalia
 
Dir & chitral
Dir & chitralDir & chitral
Dir & chitral
hayat alishah
 

Viewers also liked (12)

Nota flip flop
Nota flip flopNota flip flop
Nota flip flop
 
Pike Ky Digital Citizenship
Pike Ky Digital CitizenshipPike Ky Digital Citizenship
Pike Ky Digital Citizenship
 
Stop Cyberbullying Parent Presentation
Stop Cyberbullying Parent PresentationStop Cyberbullying Parent Presentation
Stop Cyberbullying Parent Presentation
 
SD Cloud Comp
SD Cloud CompSD Cloud Comp
SD Cloud Comp
 
Manifesting His Glory - Part 3: Manifest His Glory Through Life and Ministry
Manifesting His Glory - Part 3: Manifest His Glory Through Life and MinistryManifesting His Glory - Part 3: Manifest His Glory Through Life and Ministry
Manifesting His Glory - Part 3: Manifest His Glory Through Life and Ministry
 
proyecto de innovacion tecnologica
proyecto de innovacion tecnologicaproyecto de innovacion tecnologica
proyecto de innovacion tecnologica
 
Dead women talking (in morocco)
Dead women talking (in  morocco)Dead women talking (in  morocco)
Dead women talking (in morocco)
 
LODLearning: Enhancing e-Learning content by using Semantic Web technologies
LODLearning: Enhancing e-Learning content by using Semantic Web technologiesLODLearning: Enhancing e-Learning content by using Semantic Web technologies
LODLearning: Enhancing e-Learning content by using Semantic Web technologies
 
Nature view farm case study
Nature view farm case studyNature view farm case study
Nature view farm case study
 
Gastronomía cusqueña
Gastronomía cusqueñaGastronomía cusqueña
Gastronomía cusqueña
 
Positive Attitude
Positive AttitudePositive Attitude
Positive Attitude
 
Dir & chitral
Dir & chitralDir & chitral
Dir & chitral
 

Similar to Do U Txt Msg

Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected Consequences
Frances Harris
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parentsagoldberghvs
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
Larry Magid
 
All of Our Students are On Social Media, But What Do We Need to Know?
All of Our Students are On Social Media, But What Do We Need to Know?All of Our Students are On Social Media, But What Do We Need to Know?
All of Our Students are On Social Media, But What Do We Need to Know?
Chad Norman
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Media Lit (Starting the Converstation)
Media Lit (Starting the Converstation)Media Lit (Starting the Converstation)
Media Lit (Starting the Converstation)Don I Frazier, Jr.
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1bmcdade
 
Coping with the many faces of facebook
Coping with the many faces of facebookCoping with the many faces of facebook
Coping with the many faces of facebook
ktcole
 
Vimalan [as first-speaker]
Vimalan  [as first-speaker]Vimalan  [as first-speaker]
Vimalan [as first-speaker]VIMALAN
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
Fred Miller
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
LightedCandle
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
Sage Lewis
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
University of Wisconsin - Superior
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
E Robertson
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
E Robertson
 

Similar to Do U Txt Msg (20)

Web 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected ConsequencesWeb 2.0: Land of Unexpected Consequences
Web 2.0: Land of Unexpected Consequences
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parents
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Myspace
MyspaceMyspace
Myspace
 
All of Our Students are On Social Media, But What Do We Need to Know?
All of Our Students are On Social Media, But What Do We Need to Know?All of Our Students are On Social Media, But What Do We Need to Know?
All of Our Students are On Social Media, But What Do We Need to Know?
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Media Lit (Starting the Converstation)
Media Lit (Starting the Converstation)Media Lit (Starting the Converstation)
Media Lit (Starting the Converstation)
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Coping with the many faces of facebook
Coping with the many faces of facebookCoping with the many faces of facebook
Coping with the many faces of facebook
 
Vimalan [as first-speaker]
Vimalan  [as first-speaker]Vimalan  [as first-speaker]
Vimalan [as first-speaker]
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Hungerfordnetiquette
HungerfordnetiquetteHungerfordnetiquette
Hungerfordnetiquette
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 

Recently uploaded

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Do U Txt Msg

  • 1. Do U Txt Msg? IM? Chat? Your Kids Do! Just What Are Kids Doing Online?
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.