Did you know that more than 500,000 sexual predators are online EVERY day? Learn how predators target and engage children, and what you can do if you think your child has been contacted by a predator.
The document discusses the negative impacts of social media usage. It notes that excessive social media use can lower self-esteem, reduce productivity, and harm communication skills. Studies cited show that students who use social media heavily tend to have lower GPAs than non-users, and that cutting social media usage could raise exam grades significantly. The document encourages reducing social media time each day to avoid these problems and improve grades, self-esteem, and happiness.
This document discusses social media use among kids and teens. It provides information on the most popular social media platforms and their key features. Some of the main issues covered include privacy and control concerns, the prevalence of cyberbullying, and the effects of social media on mood, self-esteem and relationships. Research is presented on topics like cyberbullying perpetrators and victims, and how platforms and messaging influence bullying risk. Guidelines are offered for parents to have open conversations with youth about responsible social media use.
The document discusses a 2011 study that administered anonymous questionnaires to 50 people to collect data on their social media usage. Key findings were that 60% of participants preferred Facebook, 45% spent 6-8 hours per day on social media, and students reported using social media for both academic and non-academic purposes but that overuse could lead to issues like wasted time, health problems, and cyberbullying.
The document discusses the effects of social media on youth. It notes that many children have social media profiles and share personal information online from a young age. It also discusses how social media can influence youth lifestyle choices and decision making, but also has some negative impacts like reduced attention spans and increased risk of depression or loneliness. The document also provides a SWOT analysis of social media which notes potential threats like privacy issues but also opportunities like a sense of community and engagement.
Social media can have both positive and negative effects on youth. Positively, it provides easy access to online resources for learning, increases general knowledge, and facilitates political and social movements. However, heavy social media use has been linked to lower grades, reduced work productivity, and privacy and employment issues. Extensive online engagement can also correlate with psychological disorders like depression and anxiety. While social media allows for connection and information sharing, it can be addictive and reduce focus, and enable the spread of misinformation. A balanced approach is important to manage both the opportunities and risks social media presents.
Social media has had both positive and negative impacts on youth. It allows worldwide connectivity and real-time information sharing but can also endanger face-to-face connections. While social media sites foster common interests and free advertising, they also pose risks like cyberbullying, identity theft, and excessive time wasted online. The first social media site, called a computerized bulletin board system, was created in 1978 by computer hobbyists Ward Christensen and Randy Suess to share information with friends.
Back To School Night
I was given the task by school administration to develop and deliver a presentation to parents on the topic of social media.
The presentation was given during my school's open house and the audience consisted of parents with children in grades 6th through 8th grade.
The purpose of the presentation was to educate parents about social media:
How it works
Types of social media
Dangers of social media
Laws of sexting
How to protect your child
Cyberbullying involves the use of technology to deliberately harm others. It can take many forms such as mean messages, threats, rumors, or posts online or through texts. Cyberbullying is emotionally abusive and can be difficult to overcome, with some victims considering or committing suicide. Surveys of students found that over half had received unwanted sexual pictures, many had engaged in mean behavior online, and over 40% had been cyberbullied, showing cyberbullying to be a significant problem.
The document discusses the negative impacts of social media usage. It notes that excessive social media use can lower self-esteem, reduce productivity, and harm communication skills. Studies cited show that students who use social media heavily tend to have lower GPAs than non-users, and that cutting social media usage could raise exam grades significantly. The document encourages reducing social media time each day to avoid these problems and improve grades, self-esteem, and happiness.
This document discusses social media use among kids and teens. It provides information on the most popular social media platforms and their key features. Some of the main issues covered include privacy and control concerns, the prevalence of cyberbullying, and the effects of social media on mood, self-esteem and relationships. Research is presented on topics like cyberbullying perpetrators and victims, and how platforms and messaging influence bullying risk. Guidelines are offered for parents to have open conversations with youth about responsible social media use.
The document discusses a 2011 study that administered anonymous questionnaires to 50 people to collect data on their social media usage. Key findings were that 60% of participants preferred Facebook, 45% spent 6-8 hours per day on social media, and students reported using social media for both academic and non-academic purposes but that overuse could lead to issues like wasted time, health problems, and cyberbullying.
The document discusses the effects of social media on youth. It notes that many children have social media profiles and share personal information online from a young age. It also discusses how social media can influence youth lifestyle choices and decision making, but also has some negative impacts like reduced attention spans and increased risk of depression or loneliness. The document also provides a SWOT analysis of social media which notes potential threats like privacy issues but also opportunities like a sense of community and engagement.
Social media can have both positive and negative effects on youth. Positively, it provides easy access to online resources for learning, increases general knowledge, and facilitates political and social movements. However, heavy social media use has been linked to lower grades, reduced work productivity, and privacy and employment issues. Extensive online engagement can also correlate with psychological disorders like depression and anxiety. While social media allows for connection and information sharing, it can be addictive and reduce focus, and enable the spread of misinformation. A balanced approach is important to manage both the opportunities and risks social media presents.
Social media has had both positive and negative impacts on youth. It allows worldwide connectivity and real-time information sharing but can also endanger face-to-face connections. While social media sites foster common interests and free advertising, they also pose risks like cyberbullying, identity theft, and excessive time wasted online. The first social media site, called a computerized bulletin board system, was created in 1978 by computer hobbyists Ward Christensen and Randy Suess to share information with friends.
Back To School Night
I was given the task by school administration to develop and deliver a presentation to parents on the topic of social media.
The presentation was given during my school's open house and the audience consisted of parents with children in grades 6th through 8th grade.
The purpose of the presentation was to educate parents about social media:
How it works
Types of social media
Dangers of social media
Laws of sexting
How to protect your child
Cyberbullying involves the use of technology to deliberately harm others. It can take many forms such as mean messages, threats, rumors, or posts online or through texts. Cyberbullying is emotionally abusive and can be difficult to overcome, with some victims considering or committing suicide. Surveys of students found that over half had received unwanted sexual pictures, many had engaged in mean behavior online, and over 40% had been cyberbullied, showing cyberbullying to be a significant problem.
Cyber-bullying involves using technology like phones and the internet to embarrass, harass or hurt others. It is a serious problem affecting many students both in schools and at home. Cyber-bullying has led to emotional distress and in some cases, physical violence against oneself or others. Statistics show that over 50% of kids have been cyber-bullied or cyber-bullied others. Schools are working to address this issue through policies while allowing for freedom of speech, but it remains a difficult problem to solve. Parents must be aware of signs of cyber-bullying and depression in their children.
This document discusses cyberbullying, including definitions, types of cyberbullies and victims, statistics, and advice. It defines cyberbullying as using technology to harass, threaten or intimidate others. Common forms include phones, IM, websites, and social media. Cyberbullies can remain anonymous and their messages spread quickly. The document provides scenarios to discuss appropriate responses and prevention strategies.
The document discusses cyber predators and how to protect children from online threats. It defines cyber predators as internet users who exploit vulnerable people for sexual or financial purposes. It provides statistics on the characteristics of cyber predators and disturbing statistics about child pornography and online solicitation of children. The document also gives recommendations for parents such as monitoring computer use, using parental control software, and teaching children internet safety.
The effects of social media on childrenChris Jones
The document discusses statistics and studies on teenagers' use of social media:
- 93% of 12-17 year olds go online regularly and 73% use some form of social media
- Many teenagers overshare personal information online, with 55% sharing photos and details with strangers
- Social media can have both benefits like feeling closer to others, but also risks like depression, aggression, or engaging in dangerous behaviors influenced by social media
Cyber bullying involves tormenting, harassing, threatening, or humiliating another child or teen using the internet, technology, or mobile phones. It can take many forms, such as sending mean texts and emails, posting embarrassing photos online, or creating fake social media profiles. Cyber bullying is dangerous and can lead to anxiety, depression, and even suicide. While teens may think using fake names prevents getting caught, there are ways to track cyber bullies. Most states currently do not have laws specifically targeting cyber bullying, so awareness is important for prevention.
Social media can be misused in several ways, including loss of privacy, sexual predators, cyberbullying, excessive time consumption, and loss of social skills. When personal information and photos are shared online without privacy settings, it becomes available to anyone and could be viewed or misused by sexual predators. Social media also enables cyberbullying through mean comments and messages. While social media is intended for social interaction, some users spend too much time on sites instead of more productive activities. Additionally, relying solely on online conversations rather than in-person social skills can negatively impact users. However, social media may not be inherently harmful when used appropriately and for the right purposes.
Social media refers to online platforms that allow users to connect, share content, and interact. Popular social media sites include Facebook, Twitter, Instagram, and WhatsApp. In Pakistan, over 44 million people use social media, with Facebook having 30 million users. Worldwide, over 3.7 billion people use the internet, with 2.3 billion active on social media. While social media allows for connection and information sharing, it can also have negative effects on youth like increased risk of psychological disorders, addiction, and negative impact on physical health from excessive screen time. However, social media also has benefits such as easier communication, information dissemination, and professional networking opportunities.
1) The document discusses cyber bullying among adolescents and examines factors that influence their vulnerability to being cyber bullied or becoming cyber bullies.
2) It analyzes different motives for cyber bullying, including anonymity, entertainment, revenge, social status, and discusses how anonymity in particular gives adolescents confidence and makes punishment difficult.
3) The conclusion is that anonymity is a key reason adolescents cyber bully, and reducing anonymous use of technology could help decrease cyber bullying. Further research is still needed as technology continues advancing.
Social media refers to websites and applications that allow users to share content and communicate. Facebook has the most users worldwide, with over 1.5 billion. Social media is widely used, with over half of the global population being active on mobile social platforms. It is used for various purposes like staying connected with others, sharing ideas and reviews, and raising awareness for causes. While it has benefits like education and connectivity, it also has some negative effects like addiction, privacy issues, and cyberbullying.
Impact of social media on teenagers- PresentationMiss Perfect
Social media has become an important part of teenagers' daily lives, with the average teenager spending over 2 hours per day on social networks. While social media provides benefits like facilitating education and awareness, it can also negatively impact teenagers' work and study habits by distracting them and exposing them to privacy and security risks. The document concludes that social media should be treated as a tool rather than a lifestyle, and teenagers need to be cautious of its overuse.
The document defines cyberbullying as the use of technology like phones or the internet to deliberately upset or hurt others. Cyberbullying has a bigger audience than traditional bullying and there is no escape, as the bullying follows victims everywhere. Examples include threats, harassment, impersonation, and spreading rumors or embarrassing photos online. Cyberbullying is common, with 90% of middle school students experiencing hurtful behavior online. Laws may apply if cyberbullying involves harassment or threats, and it can be reported to authorities. The document provides advice on how to respond if cyberbullied and avoid becoming a cyberbully.
This document provides tips for military children to stay safe online. It advises only chatting with known friends and family, avoiding sharing private information, and getting parental permission for activities like webcam chats. Specific dos and don'ts are outlined for chatting, instant messages, profiles, emails and more. The goal is to help kids understand potential dangers and how to avoid unsafe situations so they can enjoy the internet while staying protected.
Social media and marketing have significant psychological impacts on children and teens. Excessive exposure to ads, desire for brand names, and focus on appearance can lower self-esteem and promote unhealthy behaviors. Parents struggle to set limits in the face of intense marketing pressures. Schools and communities need to support parents by educating youth, restricting ads, and promoting critical thinking skills to resist undue influence.
This document provides information on cyber bullying, including how to identify it, its harmful effects, and ways to prevent and address it. Cyber bullying is defined as using technology to deliberately embarrass or hurt someone repeatedly. Signs someone is being cyber bullied include emotional distress, withdrawing from activities, and changes in mood or behavior. Cyber bullying can have serious psychological effects like low self-esteem and increased suicidal thoughts. To address it, one should not respond to bullies, collect evidence, identify the source, and report incidents to authorities. Students and schools can help by raising awareness and taking a stand against cyber bullying.
Do you know every year around 750 Australian teens between the ages of 13 and 17 commit suicide because of cyber bullying? It’s a statistic sure to concern any parent. The best way to address cyberbullying is to stop it before it starts. This presentation provides valuable legal tips on how to stop cyberbullying.
At Owen Hodge Lawyers we understand that experiences relating to cyberbullying are extremely traumatic. The personal information shared and the hateful content and rumours spread often leaves people in untter despair and hopelessness. We are here to help! If you have any questions in relation to cyberbullying, please feel free to contact our team at Owen Hodge Lawyers on 1800 770 780.
Rivers of Living Waters ministries Curacao's ministry for Woman - Heart to Heart - presentation on the dangers of Internet.
Presentor: N. Everts
Date: March 28, 2009
Bullying can take place online through cyberbullying. With over 100 million smartphone users in Pakistan, cyberbullying is increasing but there are no cybercrime laws in Pakistan. Common forms of cyberbullying include harassment, denigration, flaming, impersonation, outing/trickery, and cyber stalking. Women in Pakistan are particularly vulnerable targets for cyberbullying due to the lack of legislation. The document provides recommendations for preventing cyberbullying such as educating oneself on internet etiquette, thinking before posting personal information online, ignoring cyberbullies, and protecting oneself by blocking bullies and changing usernames.
Media comes in many forms like print, radio, television, movies, video games, music, mobile phones, the internet and software. It can have both positive and negative impacts on children and adolescents. Media messages can promote unhealthy behaviors like smoking, drinking, unhealthy eating and violence. However, media also makes research, teaching, learning, communication and entertainment easier in the modern world. There is ongoing debate around how media affects societal values and whether its influence should be regulated.
The document defines social media as online spaces where people can connect and share information. It notes both positive and negative impacts of social media. The positive impacts include facilitating open communication, business networking, marketing, and market research. However, social media can also be addictive and time-consuming. It may intrude on privacy and personal lives. While social media has benefits, it also has drawbacks, and is overall a neutral technology with pros and cons.
The document discusses different approaches to sex education in schools. It considers abstinence-only education and comprehensive sex education (known as "abstinence-plus") that teaches both abstinence and contraception use. The document argues that the abstinence-plus approach is best as it gives students all the information while still promoting abstinence, and that sex education should start in elementary school and continue through high school with age-appropriate curricula.
A Digital Toolkit for Year 0 to 4 Teachers - July 2010Rachel Evans Boyd
This document provides an overview of top digital tools for teachers in years 0-4. It describes the digital camera as a simple yet amazing tool that allows teachers to teach students how to safely handle cameras and tips for taking great shots. It then summarizes various free online tools for creating mind maps, digital diagrams, social bookmarking, blogging, comic making, word clouds and more that are excellent resources for junior and middle school teachers. It concludes by asking teachers to share their ideas for how they could use these digital tools in the classroom.
Online dating and sexting among teens can pose serious risks. Cyberdating abuse, where technology is used to exploit, harass or threaten a romantic partner, is on the rise. 25% of teens in relationships have experienced some form of cyberdating abuse, such as sexual, emotional or physical abuse. Teens who suffer from abuse are more likely to experience long-term issues like depression or suicide. The document provides advice to parents on discussing these risks with their teens and creating safety plans.
Cyber-bullying involves using technology like phones and the internet to embarrass, harass or hurt others. It is a serious problem affecting many students both in schools and at home. Cyber-bullying has led to emotional distress and in some cases, physical violence against oneself or others. Statistics show that over 50% of kids have been cyber-bullied or cyber-bullied others. Schools are working to address this issue through policies while allowing for freedom of speech, but it remains a difficult problem to solve. Parents must be aware of signs of cyber-bullying and depression in their children.
This document discusses cyberbullying, including definitions, types of cyberbullies and victims, statistics, and advice. It defines cyberbullying as using technology to harass, threaten or intimidate others. Common forms include phones, IM, websites, and social media. Cyberbullies can remain anonymous and their messages spread quickly. The document provides scenarios to discuss appropriate responses and prevention strategies.
The document discusses cyber predators and how to protect children from online threats. It defines cyber predators as internet users who exploit vulnerable people for sexual or financial purposes. It provides statistics on the characteristics of cyber predators and disturbing statistics about child pornography and online solicitation of children. The document also gives recommendations for parents such as monitoring computer use, using parental control software, and teaching children internet safety.
The effects of social media on childrenChris Jones
The document discusses statistics and studies on teenagers' use of social media:
- 93% of 12-17 year olds go online regularly and 73% use some form of social media
- Many teenagers overshare personal information online, with 55% sharing photos and details with strangers
- Social media can have both benefits like feeling closer to others, but also risks like depression, aggression, or engaging in dangerous behaviors influenced by social media
Cyber bullying involves tormenting, harassing, threatening, or humiliating another child or teen using the internet, technology, or mobile phones. It can take many forms, such as sending mean texts and emails, posting embarrassing photos online, or creating fake social media profiles. Cyber bullying is dangerous and can lead to anxiety, depression, and even suicide. While teens may think using fake names prevents getting caught, there are ways to track cyber bullies. Most states currently do not have laws specifically targeting cyber bullying, so awareness is important for prevention.
Social media can be misused in several ways, including loss of privacy, sexual predators, cyberbullying, excessive time consumption, and loss of social skills. When personal information and photos are shared online without privacy settings, it becomes available to anyone and could be viewed or misused by sexual predators. Social media also enables cyberbullying through mean comments and messages. While social media is intended for social interaction, some users spend too much time on sites instead of more productive activities. Additionally, relying solely on online conversations rather than in-person social skills can negatively impact users. However, social media may not be inherently harmful when used appropriately and for the right purposes.
Social media refers to online platforms that allow users to connect, share content, and interact. Popular social media sites include Facebook, Twitter, Instagram, and WhatsApp. In Pakistan, over 44 million people use social media, with Facebook having 30 million users. Worldwide, over 3.7 billion people use the internet, with 2.3 billion active on social media. While social media allows for connection and information sharing, it can also have negative effects on youth like increased risk of psychological disorders, addiction, and negative impact on physical health from excessive screen time. However, social media also has benefits such as easier communication, information dissemination, and professional networking opportunities.
1) The document discusses cyber bullying among adolescents and examines factors that influence their vulnerability to being cyber bullied or becoming cyber bullies.
2) It analyzes different motives for cyber bullying, including anonymity, entertainment, revenge, social status, and discusses how anonymity in particular gives adolescents confidence and makes punishment difficult.
3) The conclusion is that anonymity is a key reason adolescents cyber bully, and reducing anonymous use of technology could help decrease cyber bullying. Further research is still needed as technology continues advancing.
Social media refers to websites and applications that allow users to share content and communicate. Facebook has the most users worldwide, with over 1.5 billion. Social media is widely used, with over half of the global population being active on mobile social platforms. It is used for various purposes like staying connected with others, sharing ideas and reviews, and raising awareness for causes. While it has benefits like education and connectivity, it also has some negative effects like addiction, privacy issues, and cyberbullying.
Impact of social media on teenagers- PresentationMiss Perfect
Social media has become an important part of teenagers' daily lives, with the average teenager spending over 2 hours per day on social networks. While social media provides benefits like facilitating education and awareness, it can also negatively impact teenagers' work and study habits by distracting them and exposing them to privacy and security risks. The document concludes that social media should be treated as a tool rather than a lifestyle, and teenagers need to be cautious of its overuse.
The document defines cyberbullying as the use of technology like phones or the internet to deliberately upset or hurt others. Cyberbullying has a bigger audience than traditional bullying and there is no escape, as the bullying follows victims everywhere. Examples include threats, harassment, impersonation, and spreading rumors or embarrassing photos online. Cyberbullying is common, with 90% of middle school students experiencing hurtful behavior online. Laws may apply if cyberbullying involves harassment or threats, and it can be reported to authorities. The document provides advice on how to respond if cyberbullied and avoid becoming a cyberbully.
This document provides tips for military children to stay safe online. It advises only chatting with known friends and family, avoiding sharing private information, and getting parental permission for activities like webcam chats. Specific dos and don'ts are outlined for chatting, instant messages, profiles, emails and more. The goal is to help kids understand potential dangers and how to avoid unsafe situations so they can enjoy the internet while staying protected.
Social media and marketing have significant psychological impacts on children and teens. Excessive exposure to ads, desire for brand names, and focus on appearance can lower self-esteem and promote unhealthy behaviors. Parents struggle to set limits in the face of intense marketing pressures. Schools and communities need to support parents by educating youth, restricting ads, and promoting critical thinking skills to resist undue influence.
This document provides information on cyber bullying, including how to identify it, its harmful effects, and ways to prevent and address it. Cyber bullying is defined as using technology to deliberately embarrass or hurt someone repeatedly. Signs someone is being cyber bullied include emotional distress, withdrawing from activities, and changes in mood or behavior. Cyber bullying can have serious psychological effects like low self-esteem and increased suicidal thoughts. To address it, one should not respond to bullies, collect evidence, identify the source, and report incidents to authorities. Students and schools can help by raising awareness and taking a stand against cyber bullying.
Do you know every year around 750 Australian teens between the ages of 13 and 17 commit suicide because of cyber bullying? It’s a statistic sure to concern any parent. The best way to address cyberbullying is to stop it before it starts. This presentation provides valuable legal tips on how to stop cyberbullying.
At Owen Hodge Lawyers we understand that experiences relating to cyberbullying are extremely traumatic. The personal information shared and the hateful content and rumours spread often leaves people in untter despair and hopelessness. We are here to help! If you have any questions in relation to cyberbullying, please feel free to contact our team at Owen Hodge Lawyers on 1800 770 780.
Rivers of Living Waters ministries Curacao's ministry for Woman - Heart to Heart - presentation on the dangers of Internet.
Presentor: N. Everts
Date: March 28, 2009
Bullying can take place online through cyberbullying. With over 100 million smartphone users in Pakistan, cyberbullying is increasing but there are no cybercrime laws in Pakistan. Common forms of cyberbullying include harassment, denigration, flaming, impersonation, outing/trickery, and cyber stalking. Women in Pakistan are particularly vulnerable targets for cyberbullying due to the lack of legislation. The document provides recommendations for preventing cyberbullying such as educating oneself on internet etiquette, thinking before posting personal information online, ignoring cyberbullies, and protecting oneself by blocking bullies and changing usernames.
Media comes in many forms like print, radio, television, movies, video games, music, mobile phones, the internet and software. It can have both positive and negative impacts on children and adolescents. Media messages can promote unhealthy behaviors like smoking, drinking, unhealthy eating and violence. However, media also makes research, teaching, learning, communication and entertainment easier in the modern world. There is ongoing debate around how media affects societal values and whether its influence should be regulated.
The document defines social media as online spaces where people can connect and share information. It notes both positive and negative impacts of social media. The positive impacts include facilitating open communication, business networking, marketing, and market research. However, social media can also be addictive and time-consuming. It may intrude on privacy and personal lives. While social media has benefits, it also has drawbacks, and is overall a neutral technology with pros and cons.
The document discusses different approaches to sex education in schools. It considers abstinence-only education and comprehensive sex education (known as "abstinence-plus") that teaches both abstinence and contraception use. The document argues that the abstinence-plus approach is best as it gives students all the information while still promoting abstinence, and that sex education should start in elementary school and continue through high school with age-appropriate curricula.
A Digital Toolkit for Year 0 to 4 Teachers - July 2010Rachel Evans Boyd
This document provides an overview of top digital tools for teachers in years 0-4. It describes the digital camera as a simple yet amazing tool that allows teachers to teach students how to safely handle cameras and tips for taking great shots. It then summarizes various free online tools for creating mind maps, digital diagrams, social bookmarking, blogging, comic making, word clouds and more that are excellent resources for junior and middle school teachers. It concludes by asking teachers to share their ideas for how they could use these digital tools in the classroom.
Online dating and sexting among teens can pose serious risks. Cyberdating abuse, where technology is used to exploit, harass or threaten a romantic partner, is on the rise. 25% of teens in relationships have experienced some form of cyberdating abuse, such as sexual, emotional or physical abuse. Teens who suffer from abuse are more likely to experience long-term issues like depression or suicide. The document provides advice to parents on discussing these risks with their teens and creating safety plans.
Judgement Call: Maturity, Emotions, and the Teenage BrainTeenSafe
Teens are known to be impulsive, but did you know that their bad decision-making skills are biological? The parts of the brain that govern judgement, rational thought, and emotions is not fully developed until a person's mid-twenties. That means teens aren't physically capable of making the best decisions for themselves. Read on to learn more about how brain development affects our kids behavior!
The TeenSafe Parenting Guide to Tech SafetyTeenSafe
The TeenSafe Digital Manifesto covers everything a parent needs to know to keep their child safe online; from the dangers they face, to how to teach appropriate online behavior and supervise your child's digital life - just like you would on the playground! To learn more, visit TeenSafe.com
From the event "From Troubled Teens to Tsarnaev: Promises and Perils of Adolescent Neuroscience and Law."
Part of the Project on Law and Applied Neuroscience, cosponsored by the Center for Law, Brain and Behavior at Massachusetts General Hospital and the Petrie-Flom Center for Health Law Policy, Biotechnology, and Bioethics at Harvard Law School.
For more information, visit our website at http://petrieflom.law.harvard.edu/events/details/from-troubled-teens-to-tsarnaev.
Teenage brain and stress for City of London School Jan 2016Nicola Morgan
The document discusses strategies for helping teenagers manage stress and promoting well-being. It notes that adolescent brains undergo significant changes that impact emotions, empathy, and impulse control. Teenagers also face increased external stresses from academics, social media, and lack of control. Five main strategies are proposed: 1) build resilience by teaching growth mindset and allowing failure, 2) educate about stress and relaxation techniques, 3) value introverts' needs, 4) promote better sleep habits, and 5) encourage readaxation to relax and reduce cortisol levels. The goal is to boost health, well-being, and school performance through a holistic approach.
My Little Genius offers brain development programme for children, cognitive development in children, brain development in early childhood, child development school, child cognitive development, brain development in children, mental development for children, etc.
This document summarizes key aspects of neuropsychological development from infancy through adolescence, including major developmental milestones, disorders, and treatment approaches. It discusses phases of brain development, Piaget's stages of cognitive development, myelination and executive function development through the teen years. Common childhood neurodevelopmental disorders like learning disabilities, ADHD, autism, and Tourette's syndrome are described. Treatment approaches for these disorders focus on behavioral, educational, social skills, and medical interventions.
The human brain is the most complex organ on Earth. It develops from the neural tube which forms the basic structure of the central nervous system. As the brain develops from early embryonic stages through fetal development, different regions form including the rhombencephalon (medulla and pons), mesencephalon, and prosencephalon (telencephalon and diencephalon). Precisely regulated molecular processes guide the formation, migration and differentiation of neurons and glial cells in each brain region. Malformations can occur if these processes are disrupted, leading to neurological disorders.
The document outlines the embryology and development of the brain from formation of the neural tube through development of the cerebral cortex and corpus callosum. Key stages discussed include development of the primary brain vesicles and their subdivisions, flexures of the neural tube, external form of the brain from 10-40 weeks gestation, ventricles of the brain, medulla oblongata, pons, midbrain, cerebellum, cerebral hemispheres, thalamus, hypothalamus, corpus striatum, hippocampus, and cerebral cortex.
The document discusses brain and nervous system development from the early stages of embryogenesis through childhood. It covers the formation of the neural tube and differentiation of the central nervous system into the brain and spinal cord. Key topics include neural cell formation and migration, myelination, and the importance of neural activity and connectivity for proper development. Factors that can disrupt development, such as genetic defects and fetal alcohol syndrome, are also outlined.
The human brain continues developing well into a person's 20s, with a second wave of grey matter growth in adolescence followed by a pruning period. Teens are more susceptible than adults to long-term negative effects from alcohol on brain development. Compared to adults, teens have less rational thinking ability and more sensitivity to emotions due to differing levels of activity in the frontal lobe and amygdala.
This document discusses brain development from early embryonic stages through childhood. It outlines major developmental events such as induction, segmentation, proliferation, migration, differentiation and organization. It describes disturbances that can occur during these stages, including primary and secondary malformations. Key neurodevelopmental disorders are also summarized.
The document discusses adolescent brain development and its implications. It notes that the prefrontal cortex, responsible for reasoning and problem solving, develops last. During adolescence, the brain undergoes synaptic pruning and myelination in the frontal lobes. This results in improved abstract thinking abilities but also impaired emotional control and judgment. Teens may engage in risky behavior due to a less developed prefrontal cortex. The document emphasizes the importance of supporting adolescent well-being, competence, confidence, connections, character and sleep for healthy development.
Mental health is essential to overall health and well-being. It involves how one thinks, feels, and acts when facing life's situations. Key aspects of mental health include cognitive thoughts, emotional feelings, and behavioral actions. Maintaining positive mental health requires recognizing thoughts and feelings, understanding where they come from, and responding to them in healthy ways. It also means taking care of one's physical, emotional, and social needs through a balanced lifestyle and stress management. Seeking help is important when warning signs of mental health issues emerge.
The document discusses mental health and mental illness. It defines mental health as maintaining successful mental activity and fulfilling relationships while adapting to change. Mental illness occurs when the brain is not functioning properly, disrupting thinking, emotions, behavior, or physical functioning. Common symptoms include sleep problems, mood swings, and difficulty focusing. Mental illness is caused by a complex interplay between genetics and environment and results in abnormal brain functioning. While some illnesses begin in childhood, others often emerge during adolescence. Most people with mental illness can live productive lives with treatment. The document encourages seeking help from others if experiencing prolonged sadness, anger, or risky behaviors.
Early childhood spans from birth to age 5 and involves remarkable physical, cognitive, socio-emotional, and language development. Key physical milestones include walking, running, and fine motor skills like scribbling and cutting. Cognitively, children progress from sensorimotor thinking to representational thought, such as pretend play and understanding of symbols. Socio-emotionally, children develop self-awareness and understanding of emotions while learning social skills through family and peer interactions. This period lays the groundwork for further development across multiple domains.
The adolescent brain is best described as a work in progress. Our brains are about 90-95% of their maximum size by the time we are 6 years old, but they are definitely not finished changing! Massive changes continue to occur over the next 15-20 years, as connections within the brain are strengthened and refined. Adolescent brain development can be divided into three processes: proliferation, pruning and myelination.
Kennedy Park School #24 held an open house on September 22, 2015 that included an affirmative action presentation and a guide to social media, schools, and the law given by Woodbridge Township School District. The presentation covered worldwide social media statistics, definitions of social media, pros and cons, cyberbullying, sexting, online predators, prevention tips, and resources for more information. It warned of dangers like stolen private images, identity theft, harassment, and meeting strangers met online while also noting benefits like connectivity, skills, and information access.
This presentation provides information on cyber dangers and digital safety for school personnel and the community. It defines social media and discusses worldwide social media usage statistics. It outlines both the pros and cons of social media use, and covers topics like cyberbullying, sexting, online predators, and signs that a student may be victimized. Prevention tips are provided, such as privacy settings, monitoring online activity, and teaching children internet safety. Resources for more information are listed at the end.
This presentation provides information about social media, cyber dangers, and digital safety. It defines social media and provides worldwide statistics on social media usage. It discusses pros and cons of social media, risks like cyberbullying, sexting, and online predators. The presentation outlines signs that a child may be contacting an online predator and provides tips for prevention, such as privacy settings and monitoring computer usage. It advises what to do if a child has been victimized, such as saving evidence and contacting authorities rather than handling it personally.
This document discusses statistics related to online safety and digital footprints. Some key points include:
- 20% of children age 10-17 have been solicited sexually online and 75% did not tell their parents.
- 89% of sexual solicitations occur in chat rooms or instant messages.
- 61% of teens age 13-17 have social media profiles and 44% have been contacted by strangers due to their profiles.
- A digital footprint is the traces of someone's online activity that can include social media posts, messages, photos, and more. This information can have lifelong consequences if visible to future employers, colleges or others.
This document provides information and tips for parents about internet safety for children. It discusses how most teens use the internet daily and have cell phones. It also reports statistics on online victimization of youth, such as receiving unwanted explicit images or threats. The document advises parents to monitor their children's internet use, maintain open communication, and consider using parental control software. It provides age-based guidelines for social media and tips parents can share with their teens to promote internet safety.
Some young people have never known a world without social media. Around 91 percent of 16-24 year olds use the internet for social networking.They use social media now more than ever before. Give away information without thinking or knowing the consequences. Get sucked into a world of online games and dangerous online trends. There have even been cases where suicide games were trending online, that children all encouraged each other to participate in. It can be a dark and unpredictable place.
Parents are often unaware of the dangers their children face from online predators. While parents think their children would never be victims, statistics show that 1 in 7 children are sexually solicited online everyday. Children frequently post too much personal information on social media sites, making it easy for predators to contact them. Parents must monitor their children's internet activity and educate them about internet safety in order to protect them from the real risks of sexual exploitation posed by online predators.
This document discusses cyberbullying and provides strategies for educators to address it. It defines cyberbullying and provides examples. The legal issues around school authority to discipline for off-campus cyberbullying are examined. The document recommends that schools define cyberbullying in their policies, provide staff training and education programs for students, and utilize free resources to prevent and address cyberbullying issues. Educators are advised to have open conversations with students about appropriate online behavior.
- BeNetSafe.org is a nonprofit organization founded in 2002 that provides internet safety education to students, parents, educators and law enforcement.
- It aims to educate about both benefits and risks of social media and networking sites, and how to stay safe online through open communication and understanding evolving technologies and risks.
- The organization reaches thousands through classroom presentations, videos, and community outreach on topics like cyberbullying, sexting, online predators, and setting privacy controls on social media profiles.
BeNetSafe.org is an organization founded in 2002 that provides internet safety education to students, parents, educators and law enforcement. It started as an unfunded organization and became a non-profit in 2007. The organization aims to guide children safely through the internet as they would in the real world and helps over 7,000 students and 600 parents/educators annually understand online risks and how to prevent issues like cyberbullying, online predators, and privacy concerns.
Cyberbullying involves hostile behavior through technology that is intended to harm others. It differs from traditional bullying in that it allows anonymity, there is no scene of the crime, and victims cannot escape it. Some forms are considered criminal acts under Canadian law if they cause fear, spread defamation or hate, or violate privacy through impersonation. Both active aggressors and passive bystanders can participate in cyberbullying. Prevention involves being careful about sharing personal information online and telling trusted adults about cyberbullying incidents.
Cyberbullying involves the use of technology to deliberately harm or harass others. Nearly 35% of kids have been threatened online and one in five experience it repeatedly. Common forms of cyberbullying include threatening emails, mean posts on social media, and identity theft online. Cyberbullying by proxy occurs when a bully tricks others into cyberbullying a victim without realizing they are being manipulated. Resources for kids to learn about online safety and how to respond to cyberbullying are provided.
Digital citizenship and online safety are important topics for today's digital learners. Over half of teens have created online content using found materials, while one-third share their own creations. However, technology alone does not teach reflection and evaluation of online information. Issues like cyberbullying, through means such as flaming, exclusion, impersonation or proxy bullying, remain a concern. It is important for digital citizens to practice safe online behaviors, like avoiding sharing personal information and being wary of strangers.
This document provides tips and information about internet safety for people of all ages. It discusses potential risks like exposure to inappropriate content, physical harm, bullying, viruses, identity theft, and legal issues. It emphasizes the importance of using antivirus software, only sharing information on secure websites, being cautious on social media, and parental supervision for children. Parents are advised to talk to their kids about online safety, maintain open communication, and utilize filtering and monitoring applications.
Teens: Cyberbullying, Sexting And Your Internet Presence Gennia Holder
This document summarizes a presentation on cyberbullying and online safety for youth. The presentation covered topics like cyberbullying, sexting, and protecting yourself online. It provided examples of cyberbullying and harassment, discussed laws around these issues, and gave tips to youth on maintaining online privacy and making responsible decisions about what they post and share online. The presentation aimed to educate youth on these topics and empower them to stand up to cyberbullying as bystanders or victims.
Cyber bullying involves mean or untrue things being said about someone online or embarrassing photos being shared without consent. To stay safe online, only add people you know on social media, keep your profiles private, don't open suspicious emails, scan USB drives for viruses, avoid giving out personal information, and never meet strangers alone. If cyber bullied, tell an adult, save evidence, don't respond to bullies, and report the behavior to the site or police. People bully for different reasons, so stand up for yourself and know who your real friends are.
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
This powerpoint explores where kids/teens are in the most danger online and strives to educate parents about the dangers of online profile sites like Myspace and Facebook. Parents will be shown how an online predator can use the information posted by the child to stalk the child online and in real life. Realistic safety tips are provided at the program's conclusion.
This document discusses cyberbullying, defining it as tormenting, threatening, harassing, humiliating or embarrassing someone using technology. It provides key statistics on cyberbullying such as 85% of middle schoolers being cyberbullied and ways cyberbullies target victims like through social media, texting, stealing passwords and sending embarrassing photos. The document also outlines New Jersey laws strengthening anti-bullying policies in schools.
Similar to How Online Predators Threaten Our Children (20)
The document discusses various distractions for teen drivers, especially cell phone use. It notes that teens have the highest rate of cell phone use while driving according to the DOT. Several examples are given of deadly accidents caused by distracted driving, most involving cell phones. Texting increases the risk of an accident by 8 times. The document advocates educating teens about the dangers of distracted driving and having conversations about setting rules to stay safe.
This document summarizes 10 apps that parents should be aware of their children using on mobile devices. It describes popular messaging and social media apps like Kik, Snapchat, and Instagram that could expose children to risks like sexting, cyberbullying, and interacting with strangers. The document warns that while these apps may seem harmless, features like anonymous posting and messaging or sharing photos that disappear enable dangerous behaviors. It advises parents to monitor their children's app usage, set clear rules, and educate them about staying safe online.
This document provides a summary of common texting acronyms and slang terms used by teens. It explains that acronyms are used to send messages faster, as a secret language among teens, and to hide inappropriate conversations. Examples are given of acronyms that could indicate dangerous interactions, like asking to meet in person or asking about age. The document aims to help parents understand teen texting language by providing glossaries translating many common acronyms and slang terms.
Is your teen getting enough sleep? Most children in the U.S. aren't - and their phone may be to blame! Learn how smartphones affect our sleep, and how we can better balance digital device time and bed time.
Teens Online: Keeping Your Child Safe From CyberbullyingTeenSafe
Cyberbullying is an epidemic among our youth, yet 90% of children who experience or witness cyberbullying will not tell an adult! Learn how you can protect your child in the digital age, and visit TeenSafe.com to learn more!
When Should I Buy My Child A Smartphone (Or Tablet)?TeenSafe
This document provides guidelines for parents on introducing children to digital devices and smartphones. It recommends no access to electronic devices before age 2, as unstructured play and human interaction are important for brain development. It suggests following the "1-in-4 rule", where for every year a child ages they get 1 additional hour of screen time per day. It also notes risks of heavy media usage under age 2 including language development issues. The document provides age-based suggestions for access to tablets, smartphones, and cell phones, as well as tips on monitoring usage and having discussions about responsible online behavior.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
2. Over 50% of online
sexual exploitation
victims are between
12-15 years old.sexual predators are
online everyday.
More than
500,000
3. How Predators Target ChildrenHow Predators Target Children
Jj_06: “How old r u?”
Jj_06:“That’s cool”
teresa: “13! I’m in jr. high?”
make contact through
chat rooms and instant
messaging80%
5. hello
hello
Jj_06: “you are 14?”
Jj_06: “i’m 48”
teresa: “yes, how old r u?”
RISKY BEHAVIORS % OF TEENS
Chatting online without their
parent’s knowledge
Responding to strangers’
messages
Communicating with
someone they’ve never met
Posting personal information
60%
86%
50%
50%
7. How Predators Engage VictimsHow Predators Engage Victims
stranger
hello
how old r u ?
1
Strike up a conversation
8. How Predators Engage VictimsHow Predators Engage Victims
2
Pretend to have common interest
9. How Predators Engage VictimsHow Predators Engage Victims
can i tell u a
secret ?
3
Become a confidant
10. How Predators Engage VictimsHow Predators Engage Victims
u r totally my BFF
thanks :-)
4
Gain their trust
At this point, predators often push a child to send sexually explicit texts or photos.
11. 60
70
80
90
60
70
80
90
WHATTHEYDO NEXT DEPENDS ON WHATTYPE OF PREDATORTHEYARE
These predators are
interested in having an
explicit online
and potentially physical
relationship with a child.
Sex Offenders
12. Sextortion is a new online
epidemic, and involves
getting teens to send
explicit photos, then
blackmailing them to
send more.
Sextortioners
60
70
80
90
60
70
80
90
13. 60
70
80
90
60
70
80
90
Predators who do not
want to meet children
offline, only look and
collect photos, might not
even think what they are
doing is wrong.
Pornographers
75% of victims who meet offenders face-to-face do so more
than once.
14. If Your Child Has Been Contacted?If Your Child Has Been Contacted?
How Do You Know
keep out!
Spending too much
time online
Using “secret” email or
social media accounts
Withdrawing from
normal activities
Warning signs include…
15. Closing or switching their
screen when you are near
Having porn on their
computer
Receiving text, calls, or
gifts from people you
don’t know
16. ???
???
Keeping Your Child SafeKeeping Your Child Safe
EDUCATEYOUR CHILDABOUT...
Keeping their personal
information private.
Not chatting with
strangers.
Never sending explicit
photos online
22. Brought to you by:
http://nobullying.com/internet-safety-statistics/
http://www.gomcgruff.com/m/articles_facts.asp
http://www.family-safe-computers.org/predators.htm
http://www.internetsafety101.org/predatorstatistics.htm#_ftnref
http://www.teensafe.com/blog/online-predator-spart-ii-6-ways-online-predators-are-reaching-out-to-your-kids/
http://www.teensafe.com/blog/online-predators-part-iii-how-to-know-if-your-child-has-been-contacted-by-an-
online-predator/
SOURCES
TO LEARN HOW YOU CAN KEEP YOUR TEEN SAFE IN THE
DIGITAL WORLD, VISIT TEENSAFE.COM