The document discusses social networking and addresses concerns about it. It introduces Gladys, an internet skeptic, and her objections to social networking. It then provides examples of popular social networks like Facebook and MySpace. It gives a walkthrough of how Facebook works, including building a profile, connecting with friends, messaging capabilities, and using it to share photos and stay in touch. It concludes by defining some common social networking terminology like profiles, tagging, walls, and statuses.
The document provides an introduction to social networking and addresses common concerns about it. It explains that social networking allows users to connect with friends and share information through creating a profile, connecting with other users, and posting updates and photos. It notes that while there is a lot of content online, users can focus on sites that interest them. It also defines some common terms used in social networking like profile, tag, wall, status, friend requests, and groups to help users understand how the sites work.
Ever get the impression that Facebook, Twitter and the like are just "for the kids"? How about us old folks, you know, people over thirty. Can we get any value out of this social networking "stuff"? Sure we can. This presentation runs through some of "the stuff" (Facebook, Twitter, LinkedIN), and shares some considerations for using them in a safe, effective manner, whether it is to build and promote a strong personal brand online, maintain a strong personal and professional network, or all of the above.
Facebook can be used for learning and collaboration in education. It allows students and faculty to communicate, collaborate, and engage in teaching and learning activities. However, users must be aware of privacy and ownership issues when sharing content on Facebook. Educators should consider using restricted groups and pages rather than personal profiles to avoid potential disciplinary problems.
This document provides an overview of using social media as a marketing tool. It discusses blogs and how they can be used for marketing purposes. Blogs allow for feedback and repeat readers if new content is consistently added. Twitter is also discussed as a form of microblogging. The document emphasizes that social media is about building relationships and connections with customers to gain insights and brand awareness. It concludes by noting that social media is a time-intensive but cheap form of marketing.
This document provides 20 things not to do on social media related to professionalism and etiquette. Some key points include: don't break defamation or copyright laws; don't violate association rules; engage with others rather than just broadcasting; understand privacy settings; and don't lie or exaggerate online. It encourages having complete profiles, thoughtful interactions, and addressing any comments or concerns about yourself or your business.
The document discusses building a public persona to help one's career. It notes that having some online presence through platforms like blogs, Twitter, LinkedIn allows people to learn about you before meeting and gives you more credibility in job interviews. The document then shares the author's experience gradually building their profile over years through minimal efforts like blogging, attending meetups, speaking at conferences, and connecting with others online and in person. Maintaining an online presence is presented as a low-effort way to positively impact one's career.
This document is a presentation about leveraging social media conversations. It discusses the presenter's personal experiences with adopting various social media tools like RSS feeds, Facebook, Twitter and wikis. It also covers selecting appropriate social media spaces and building a personal learning network. The presentation aims to demonstrate how social media can enhance personal productivity and connections if the right tools are selected based on one's interests and roles in online communities.
This document provides an introduction to various topics related to Web 2.0 and social networking, including what they are, examples of tools used, and basic etiquette. It outlines key concepts like blogs, wikis, social media sites, and productivity applications. The document emphasizes that Web 2.0 facilitates communication, sharing, and collaboration between users online. Examples provided include Facebook, Twitter, LinkedIn, Google Docs, and Remember The Milk. Basic etiquette tips encourage being reciprocal, using proper grammar, and avoiding oversharing personal information.
The document provides an introduction to social networking and addresses common concerns about it. It explains that social networking allows users to connect with friends and share information through creating a profile, connecting with other users, and posting updates and photos. It notes that while there is a lot of content online, users can focus on sites that interest them. It also defines some common terms used in social networking like profile, tag, wall, status, friend requests, and groups to help users understand how the sites work.
Ever get the impression that Facebook, Twitter and the like are just "for the kids"? How about us old folks, you know, people over thirty. Can we get any value out of this social networking "stuff"? Sure we can. This presentation runs through some of "the stuff" (Facebook, Twitter, LinkedIN), and shares some considerations for using them in a safe, effective manner, whether it is to build and promote a strong personal brand online, maintain a strong personal and professional network, or all of the above.
Facebook can be used for learning and collaboration in education. It allows students and faculty to communicate, collaborate, and engage in teaching and learning activities. However, users must be aware of privacy and ownership issues when sharing content on Facebook. Educators should consider using restricted groups and pages rather than personal profiles to avoid potential disciplinary problems.
This document provides an overview of using social media as a marketing tool. It discusses blogs and how they can be used for marketing purposes. Blogs allow for feedback and repeat readers if new content is consistently added. Twitter is also discussed as a form of microblogging. The document emphasizes that social media is about building relationships and connections with customers to gain insights and brand awareness. It concludes by noting that social media is a time-intensive but cheap form of marketing.
This document provides 20 things not to do on social media related to professionalism and etiquette. Some key points include: don't break defamation or copyright laws; don't violate association rules; engage with others rather than just broadcasting; understand privacy settings; and don't lie or exaggerate online. It encourages having complete profiles, thoughtful interactions, and addressing any comments or concerns about yourself or your business.
The document discusses building a public persona to help one's career. It notes that having some online presence through platforms like blogs, Twitter, LinkedIn allows people to learn about you before meeting and gives you more credibility in job interviews. The document then shares the author's experience gradually building their profile over years through minimal efforts like blogging, attending meetups, speaking at conferences, and connecting with others online and in person. Maintaining an online presence is presented as a low-effort way to positively impact one's career.
This document is a presentation about leveraging social media conversations. It discusses the presenter's personal experiences with adopting various social media tools like RSS feeds, Facebook, Twitter and wikis. It also covers selecting appropriate social media spaces and building a personal learning network. The presentation aims to demonstrate how social media can enhance personal productivity and connections if the right tools are selected based on one's interests and roles in online communities.
This document provides an introduction to various topics related to Web 2.0 and social networking, including what they are, examples of tools used, and basic etiquette. It outlines key concepts like blogs, wikis, social media sites, and productivity applications. The document emphasizes that Web 2.0 facilitates communication, sharing, and collaboration between users online. Examples provided include Facebook, Twitter, LinkedIn, Google Docs, and Remember The Milk. Basic etiquette tips encourage being reciprocal, using proper grammar, and avoiding oversharing personal information.
This document discusses how to brand yourself professionally online. It recommends defining who you are, going where people are through social networks, publishing your own content, connecting to the right people, and displaying your online activities and presence. Key steps include starting a blog, writing articles on various topics, participating in relevant social networks, and monitoring your online brand and mentions. The goal is to stand out professionally and build an online network and influence through your online content and connections.
This document discusses various social media platforms such as Facebook, Twitter, Google+, LinkedIn, and blogs. It provides information on how each platform works, who to follow, privacy and safety concerns, and copyright issues. The document encourages students to utilize social media but also raises awareness about privacy, personal branding, and legal issues. Students are invited to tweet questions to the hosts.
Ron Price has engaged in social networking and publishing on the internet for over 15 years. He maintains a personal website as a central hub for his writing and interacts with readers at over 8,000 other sites by posting extended writing in the form of essays, poems, and articles. Through this extensive online presence, Ron Price has built a large readership of several million and shares his perspectives on various topics. He retired from teaching in 2005 and now pursues writing as a self-employed author and publisher online.
Your digital footprint, including everything found online about you through both your active and passive presence, can significantly impact your reputation and career opportunities. Employers and colleges regularly search applicants online and 70% have rejected candidates due to questionable content. You should curate your digital footprint to present a professional, positive image by controlling privacy settings, selectively connecting with others, using your real name consistently, and carefully considering anything you post or share online. Maintaining an active, controlled digital presence through profiles highlighting qualifications and personality can help develop a positive digital footprint.
Understanding & Leveraging Social MediaDave Tedlock
This document provides an overview of social media and strategies for using social media to protect and enhance one's reputation and brand. It discusses engaging with important audiences through social media, characteristics of an effective online presence, monitoring one's online reputation, and specific platforms like LinkedIn, Facebook, blogs, and Twitter. Recommendations include having an integrated, genuine presence across platforms and giving thoughtful consideration to one's online image.
1. The document discusses the history and future of semantic web technologies, including lessons learned and trends. It notes that semantic web's strength is in data aggregation rather than data management.
2. Two scenarios involving expressing claims in RDFa and linking from a homepage are presented, showing how trust can come from linked information.
3. Recent and emerging trends in user interfaces, search engines, and services are moving towards a more machine-readable web where pages make claims and datasets are interconnected.
How To Make Friends And Inference PeopleDan Brickley
The document discusses social network portability and whether the semantic web is ready for integration. While data formats and handling heterogeneity are relatively strong, integration across different social networks and systems is still weak due to issues with data flow, privacy, and publishing between real-world networks and frameworks. More collaboration is needed among developers to better understand each other's work in building the social web.
Busting Myths: Intellectual Property and Blogging by Mark PattersonPhilip Taylor
The document summarizes several myths and issues related to intellectual property and fair use on blogs. It discusses that fair use does not allow copying an entire article or work, and that simply attributing the source does not constitute fair use. It provides an example of a blogger copying an entire article without permission and the author's response demanding the blogger remove the content and explain their actions. The document cautions bloggers to be aware of copyright issues and limitations of fair use when utilizing others' content in their blogs.
Schemas for the Real World [Madison RubyConf 2013]Carina C. Zona
Social app development challenges us how to code for users’ personal world. Users are giving push-back to ill-fitted assumptions about their identity — including name, gender, sexual orientation, important relationships, and other attributes they value.
How can we balance users’ realities with an app’s business requirements?
Facebook, Google+, and others are grappling with these questions. Resilient approaches arise from an app’s own foundation. Discover schemas’ influence over codebase, UX, and development itself. Learn how we can use schemas to both inspire users and generate data we need as developers.
--
META
Where: Madison Ruby Conference 2013 (Madison, Wisconsin, USA)
Date: August 23, 2013
Video: http://www.confreaks.com/videos/2627-madisonruby2013-schemas-for-the-real-world
"Managing your Digital Footprint : Taking control of the metadata and tracks and traces that define us online" invited presentation for CIG Scotland's 7th Metadata & Web 2.0 Seminar: "Somewhere over the Rainbow: our metadata online, past, present & future", which took place at the National Library of Scotland, 5th April 2017.
Managing your Digital Footprint : Taking control of the metadata and tracks a...CIGScotland
Find out how personal metadata, social media posts, and online activity make up an individual's "Digital Footprint", why they matter, and hear some advice on how to better manage digital tracks and traces. Nicola Osborne will draw on recent University of Edinburgh research on students' digital footprints, which is also the subject of the new #DFMOOC free online.
Presented at the CIG Scotland seminar 'Somewhere over the Rainbow: our metadata online, past, present & future' (Metadata & Web 2.0 Series) at the National Library of Scotland, Edinburgh, 5th April 2017
This document discusses the importance of social capital and connections between people. It suggests that removing the social system would cause the financial system to fall apart, as social capital and connections are what give financial numbers meaning and drive real world impact. The core message is that quality relationships and stories are more important than just numbers and transactions.
Discover a website that presents the best education websites for teachers, students and parents. World and American History, Language Arts, Math, Science, Art and Music, Technology, Homework Help, ESL and Gifted Education, Teacher Resources...
This document discusses the Digital Public Library of America (DPLA) and linked library data. It begins by asking questions about what the DPLA is, where its materials and metadata are coming from, and what problems it may encounter. It then discusses that libraries have metadata in many forms beyond catalogs and that standards need to account for computers' abilities while allowing flexibility. Unique identifiers, controlled vocabularies, and machine-readable data are important. The document proposes several ways to connect library data, such as metadata standards or metasearch, and discusses issues with each. It introduces linked data using URIs, RDF triples, and vocabularies as a way to integrate data while allowing different implementations.
Networking And Social Media Session 1 Keynote ShowWalterAkana
The document discusses how to effectively network using social media. It explains that initially one may feel alone online but can find community by connecting with others with similar interests and sharing one's talents. It recommends getting clear on one's goals, building trust over time by being helpful, and finding ways to contribute to feel accepted. The keys to starting are to get clear on one's message, establish trustworthiness, and find a sense of belonging. Specific social media activities mentioned include creating a profile, communicating, accessing and sharing information, and participating in groups.
The document discusses personal branding and provides steps to develop an effective personal brand. It explains that personal branding is the process of marketing oneself to others and that everyone has a brand. It then outlines 5 steps to build a personal brand: 1) discover your brand, 2) create your brand, 3) create branding tools like a website and social media profiles, 4) create brand-aligned content, and 5) listen, engage and share content to promote your brand. The document emphasizes defining goals and values, creating a brand statement, developing a branding toolkit, and consistently communicating your brand message across online and offline channels.
Jobhunting and the Absence of Online PrivacyJim Stroud
This presentation explains the importance of your online reputation, how to build it and how to protect it. Use the tips in this presentation to take your job hunting to the next level. And please, do pass it on to others that could use the advice.
- The document discusses the current state of the social graph and challenges around interoperability between social networks and applications. It proposes using open standards and protocols like OpenID, OAuth, FOAF and XFN to help connect the "Giant Global Graph" and enable applications to access social data across platforms.
- Issues around privacy, personas and syncing social data between sites are examined. The ideal is described as a world where applications can easily access the social graph while respecting user privacy and control over their data.
- Small steps are being taken using these open standards to work towards the ideal of a fully interoperable social graph not controlled by any single company.
Facebook was created in 2004 by Mark Zuckerberg and initially launched at Harvard University. It quickly expanded to other universities and incorporated as a company in 2004. Throughout the 2000s, Facebook grew rapidly in users and revenue, reaching over 350 million users by 2009. However, competing social networks like MySpace struggled as Facebook focused more on the user experience rather than monetization, maintaining a consistent interface across the site that was easy for all users. MySpace's heavy advertising and complicated customization alienated users and contributed to its decline while Facebook continued growing into the dominant social media platform.
Palm was founded in 1992 as a smartphone manufacturer specializing in PDAs. In recent years, Palm's market has become highly competitive. Although the Palm Pre, its first device featuring the new WebOS platform, marked a new era for the company, Palm has struggled financially. From 2008 to 2009, Palm's revenues declined significantly from $366 million to $68 million while operating losses increased from $21 million to $127 million. Analyst predictions for Palm's future sales have also exceeded Palm's own projections, indicating the company continues to face challenges.
This document discusses how to brand yourself professionally online. It recommends defining who you are, going where people are through social networks, publishing your own content, connecting to the right people, and displaying your online activities and presence. Key steps include starting a blog, writing articles on various topics, participating in relevant social networks, and monitoring your online brand and mentions. The goal is to stand out professionally and build an online network and influence through your online content and connections.
This document discusses various social media platforms such as Facebook, Twitter, Google+, LinkedIn, and blogs. It provides information on how each platform works, who to follow, privacy and safety concerns, and copyright issues. The document encourages students to utilize social media but also raises awareness about privacy, personal branding, and legal issues. Students are invited to tweet questions to the hosts.
Ron Price has engaged in social networking and publishing on the internet for over 15 years. He maintains a personal website as a central hub for his writing and interacts with readers at over 8,000 other sites by posting extended writing in the form of essays, poems, and articles. Through this extensive online presence, Ron Price has built a large readership of several million and shares his perspectives on various topics. He retired from teaching in 2005 and now pursues writing as a self-employed author and publisher online.
Your digital footprint, including everything found online about you through both your active and passive presence, can significantly impact your reputation and career opportunities. Employers and colleges regularly search applicants online and 70% have rejected candidates due to questionable content. You should curate your digital footprint to present a professional, positive image by controlling privacy settings, selectively connecting with others, using your real name consistently, and carefully considering anything you post or share online. Maintaining an active, controlled digital presence through profiles highlighting qualifications and personality can help develop a positive digital footprint.
Understanding & Leveraging Social MediaDave Tedlock
This document provides an overview of social media and strategies for using social media to protect and enhance one's reputation and brand. It discusses engaging with important audiences through social media, characteristics of an effective online presence, monitoring one's online reputation, and specific platforms like LinkedIn, Facebook, blogs, and Twitter. Recommendations include having an integrated, genuine presence across platforms and giving thoughtful consideration to one's online image.
1. The document discusses the history and future of semantic web technologies, including lessons learned and trends. It notes that semantic web's strength is in data aggregation rather than data management.
2. Two scenarios involving expressing claims in RDFa and linking from a homepage are presented, showing how trust can come from linked information.
3. Recent and emerging trends in user interfaces, search engines, and services are moving towards a more machine-readable web where pages make claims and datasets are interconnected.
How To Make Friends And Inference PeopleDan Brickley
The document discusses social network portability and whether the semantic web is ready for integration. While data formats and handling heterogeneity are relatively strong, integration across different social networks and systems is still weak due to issues with data flow, privacy, and publishing between real-world networks and frameworks. More collaboration is needed among developers to better understand each other's work in building the social web.
Busting Myths: Intellectual Property and Blogging by Mark PattersonPhilip Taylor
The document summarizes several myths and issues related to intellectual property and fair use on blogs. It discusses that fair use does not allow copying an entire article or work, and that simply attributing the source does not constitute fair use. It provides an example of a blogger copying an entire article without permission and the author's response demanding the blogger remove the content and explain their actions. The document cautions bloggers to be aware of copyright issues and limitations of fair use when utilizing others' content in their blogs.
Schemas for the Real World [Madison RubyConf 2013]Carina C. Zona
Social app development challenges us how to code for users’ personal world. Users are giving push-back to ill-fitted assumptions about their identity — including name, gender, sexual orientation, important relationships, and other attributes they value.
How can we balance users’ realities with an app’s business requirements?
Facebook, Google+, and others are grappling with these questions. Resilient approaches arise from an app’s own foundation. Discover schemas’ influence over codebase, UX, and development itself. Learn how we can use schemas to both inspire users and generate data we need as developers.
--
META
Where: Madison Ruby Conference 2013 (Madison, Wisconsin, USA)
Date: August 23, 2013
Video: http://www.confreaks.com/videos/2627-madisonruby2013-schemas-for-the-real-world
"Managing your Digital Footprint : Taking control of the metadata and tracks and traces that define us online" invited presentation for CIG Scotland's 7th Metadata & Web 2.0 Seminar: "Somewhere over the Rainbow: our metadata online, past, present & future", which took place at the National Library of Scotland, 5th April 2017.
Managing your Digital Footprint : Taking control of the metadata and tracks a...CIGScotland
Find out how personal metadata, social media posts, and online activity make up an individual's "Digital Footprint", why they matter, and hear some advice on how to better manage digital tracks and traces. Nicola Osborne will draw on recent University of Edinburgh research on students' digital footprints, which is also the subject of the new #DFMOOC free online.
Presented at the CIG Scotland seminar 'Somewhere over the Rainbow: our metadata online, past, present & future' (Metadata & Web 2.0 Series) at the National Library of Scotland, Edinburgh, 5th April 2017
This document discusses the importance of social capital and connections between people. It suggests that removing the social system would cause the financial system to fall apart, as social capital and connections are what give financial numbers meaning and drive real world impact. The core message is that quality relationships and stories are more important than just numbers and transactions.
Discover a website that presents the best education websites for teachers, students and parents. World and American History, Language Arts, Math, Science, Art and Music, Technology, Homework Help, ESL and Gifted Education, Teacher Resources...
This document discusses the Digital Public Library of America (DPLA) and linked library data. It begins by asking questions about what the DPLA is, where its materials and metadata are coming from, and what problems it may encounter. It then discusses that libraries have metadata in many forms beyond catalogs and that standards need to account for computers' abilities while allowing flexibility. Unique identifiers, controlled vocabularies, and machine-readable data are important. The document proposes several ways to connect library data, such as metadata standards or metasearch, and discusses issues with each. It introduces linked data using URIs, RDF triples, and vocabularies as a way to integrate data while allowing different implementations.
Networking And Social Media Session 1 Keynote ShowWalterAkana
The document discusses how to effectively network using social media. It explains that initially one may feel alone online but can find community by connecting with others with similar interests and sharing one's talents. It recommends getting clear on one's goals, building trust over time by being helpful, and finding ways to contribute to feel accepted. The keys to starting are to get clear on one's message, establish trustworthiness, and find a sense of belonging. Specific social media activities mentioned include creating a profile, communicating, accessing and sharing information, and participating in groups.
The document discusses personal branding and provides steps to develop an effective personal brand. It explains that personal branding is the process of marketing oneself to others and that everyone has a brand. It then outlines 5 steps to build a personal brand: 1) discover your brand, 2) create your brand, 3) create branding tools like a website and social media profiles, 4) create brand-aligned content, and 5) listen, engage and share content to promote your brand. The document emphasizes defining goals and values, creating a brand statement, developing a branding toolkit, and consistently communicating your brand message across online and offline channels.
Jobhunting and the Absence of Online PrivacyJim Stroud
This presentation explains the importance of your online reputation, how to build it and how to protect it. Use the tips in this presentation to take your job hunting to the next level. And please, do pass it on to others that could use the advice.
- The document discusses the current state of the social graph and challenges around interoperability between social networks and applications. It proposes using open standards and protocols like OpenID, OAuth, FOAF and XFN to help connect the "Giant Global Graph" and enable applications to access social data across platforms.
- Issues around privacy, personas and syncing social data between sites are examined. The ideal is described as a world where applications can easily access the social graph while respecting user privacy and control over their data.
- Small steps are being taken using these open standards to work towards the ideal of a fully interoperable social graph not controlled by any single company.
Facebook was created in 2004 by Mark Zuckerberg and initially launched at Harvard University. It quickly expanded to other universities and incorporated as a company in 2004. Throughout the 2000s, Facebook grew rapidly in users and revenue, reaching over 350 million users by 2009. However, competing social networks like MySpace struggled as Facebook focused more on the user experience rather than monetization, maintaining a consistent interface across the site that was easy for all users. MySpace's heavy advertising and complicated customization alienated users and contributed to its decline while Facebook continued growing into the dominant social media platform.
Palm was founded in 1992 as a smartphone manufacturer specializing in PDAs. In recent years, Palm's market has become highly competitive. Although the Palm Pre, its first device featuring the new WebOS platform, marked a new era for the company, Palm has struggled financially. From 2008 to 2009, Palm's revenues declined significantly from $366 million to $68 million while operating losses increased from $21 million to $127 million. Analyst predictions for Palm's future sales have also exceeded Palm's own projections, indicating the company continues to face challenges.
The document discusses reforms to Taiwan's trial scheme for drug testing in schools. It proposes decentralizing decision-making power by allowing district councils and political parties to design their own testing schemes. This would reduce challenges to the legitimacy of the schemes, avoid direct confrontation between the government and media, and reverse the current top-down policy approach.
Creating A Positive Classroom Environment 1192954359997023 3smszyco
The document discusses how to create a positive classroom environment through structuring the physical and emotional aspects of the classroom. It recommends arranging desks in small groups or a U-shape to facilitate discussion and collaboration. It also stresses the importance of the teacher-student bond and using strategies like greeting students personally and acknowledging positive behavior to build students' self-esteem. While self-esteem is important, research shows that achievement, not self-esteem, leads to improved performance and that students need to believe they can succeed through effort rather than innate ability.
The document outlines an activity where students will research different plant and animal habitats. It discusses having students put into groups to research a randomly assigned habitat, including the animals, plants, climate, and adaptations. Students will then create a project and presentation to teach their classmates about their habitat. They will also write a paper about what they learned about their own habitat and the others. The activity aims to teach students about how environments affect what types of plants and animals can survive in different parts of the world.
This document discusses key concepts in Scrum project management. It provides an overview of Scrum principles like self-organizing teams, empirical process control, and transparency. It also examines differences between predictive/waterfall and Scrum approaches. Specifically, it notes that Scrum starts with goals and some priority requirements rather than a full plan, and aims to meet goals rather than fully specify requirements up front given the potential for emergence.
This document provides information on combating obesity among teens. It discusses that obesity is having excess body fat and causes health risks. It can be avoided through a healthy diet and regular exercise. The two main reasons teens become obese are poor nutrition and lack of physical activity. The document recommends running or jogging as an easy cardio workout that teens can fit into their daily routine to help lose weight and fight obesity.
This appears to be song lyrics discussing a volatile relationship where one person's mood and feelings change frequently. Some key points mentioned are: how the person changes their mind and acts differently, comparing them to being bipolar or having PMS; they used to be in sync but now their energy levels are mismatched; and the speaker feels stuck in the ups and downs of the relationship like a rollercoaster ride. The chorus reiterates that the person is sometimes hot and cold in their behavior and emotions.
This document discusses data security challenges and threats facing organizations. It notes that data breaches and amounts of digital data are growing significantly each year. Both external hackers and internal threats pose risks. The majority (80%) of damage comes from insiders. While technologies can help address some issues, focusing on fundamentals like training employees, securing basic configurations, and adopting a holistic security approach are also important. Oracle offers various security products that take a defense-in-depth approach across areas like access control, encryption, monitoring and auditing to help organizations address modern security challenges.
1) The document discusses developing a cross-media marketing strategy that uses multiple complementary channels and media to engage different target audiences.
2) It emphasizes the importance of understanding each media's dynamics, defining a coherent visual language and messaging system, and planning the user experience across channels.
3) The document provides tips for storytelling across media by dividing campaigns into chapters that each channel can feature, ensuring consistency while allowing each medium to highlight its strengths.
The document discusses arts education policy in the United States and Michigan. It notes that while educational curriculum is set at the state level, the federal government recognizes the arts as a core subject under No Child Left Behind. Individual states have different interpretations of arts education requirements. In Michigan, high school graduation requires one credit in the visual, performing, or applied arts, but there is no mandate for arts education at the elementary level. The document also reviews national arts education standards and assessments.
Prototyping app using JS and HTML5 (Ciklum Kharkiv)Yuriy Silvestrov
The document discusses quick prototyping of applications using JavaScript within 24 hours, providing an overview of the speakers' backgrounds and experiences and outlining topics like startup mode, JavaScript techniques including MVC, modules and responsive design, and demonstrating a sample alarm clock application created using these techniques. The presentation discusses plans to develop the demo within 4 hours that did not come to fruition due to additional complexity, instead showing code fragments and the full code on BitBucket.
The document discusses dyslipidemia prevalence and screening guidelines, summarizes studies on cholesterol-lowering drug efficacy for primary and secondary prevention, and provides treatment guidelines including lifestyle modification, medications, and combination therapy options. Prevalence of high cholesterol in Saudi Arabia is reported from various studies. Drug treatment goals and general management guidelines are outlined based on cardiovascular risk factors and disease status.
Understanding how collaboration improves productivityPaul Boos
The document discusses a simulation game called "Power of 13" that is used to demonstrate how collaboration improves productivity. The game simulates different collaboration scenarios where developers work alone, pull additional work after completing tasks, work in pairs, and work as a swarm. Participants found that effectiveness increased in each subsequent round as collaboration increased. Models of group dynamics and communication patterns are also discussed, such as how the number of communication paths grows with group size, limiting productivity. Successful team behaviors like equal participation and direct communication are identified. The stages of group development and information sharing through collaboration are explored.
Increasing Access to Safe Drinking Water - by SummerAmalia Giebitz
This document discusses the target of reducing by half the proportion of people without sustainable access to safe drinking water and basic sanitation. It identifies the main causes of unsafe drinking water and lack of sanitation as climate change, pollution from agriculture and industry, population growth, and irrigation usage. The effects are increased poverty, disease, and water disputes. It also profiles the organization Global Water and their work providing water and sanitation in developing countries.
The document discusses Ireland's efforts to become a leader in digital media and a test bed for digital technologies. It outlines Ireland's plans to use EU-sponsored digital networks and infrastructure, develop test bed schemes locally, and attract overseas entrepreneurs from 2010-2020 as part of establishing a "smart economy." Specific initiatives discussed include the Exemplar Network test bed, Smartbay water management project, and winning proposals from the "Your Country Your Call" competition around making Ireland a global media hub and developing green data centers powered by renewable energy.
Paul Adams gives a presentation on social networks and how they differ from real-life social networks. He discusses Debbie, a woman with different social groups in her life like friends from LA and San Diego that would never interact in real life but were connected on Facebook. Adams talks about how online social networks simplify real-life networks and do not account for people having multiple independent friend groups centered around different parts of their lives. He emphasizes that understanding sociology, not just technology, is important for designing effective social experiences.
Als Volunteer Social Media Session SlideshareLaurie Pringle
The document discusses social media and provides an introduction to popular sites such as Flickr, blogs, Facebook, LinkedIn, and Twitter. It encourages using these sites to build communities, share personal stories and experiences, spread awareness about causes, and potentially raise funds. The document suggests trying out different social media sites that others are using and not being afraid to experiment as a way to have fun and connect with others.
Social Networking: An overview for all agesTim Keneipp
This document provides an overview of social networking for all ages. It defines social networks as groups of people that communicate regularly. While social networks used to be local, technology now allows networks to span geography. The document outlines the major forms of social networking today, including email, Facebook, Twitter, chat platforms, and blogging. It provides statistics on internet and social media use and offers tips for determining the right networks to use and basic etiquette and best practices.
A basic introduction to social networking sites, including Facebook, Twitter, MySpace, and Facebook. This presentation was delivered to Coos County Library District staff at the Coos Bay Public Library in December 2009.
This document provides an introduction to a course on Web 2.0 and social networking. The course covers topics such as what Web 2.0 and social networking are, popular social media sites like Facebook, Twitter, and LinkedIn, productivity tools like Google Docs and Remember the Milk, and etiquette for social networking. The instructor provides their background and goals for the course, which is meant as a basic overview for those new to these concepts and tools.
This document provides an overview of key concepts in Web 2.0 and social networking. It discusses how Web 2.0 allows for more user participation and collaboration online. Popular social media sites like Facebook and Twitter are mentioned, as well as how people now blog, share photos, videos and more. Productivity tools from Google like Gmail, Docs and Calendar are also summarized.
This document discusses social networks from various perspectives. It begins by looking at early pioneers like Tim Berners-Lee and usenet groups. It then examines specific social networks like Facebook, MySpace, Flickr, Last.fm, Twitter and Dopplr. Key aspects covered include their origins, defining features, how and where they are used, and the underlying human motivations for using social networks. The document concludes by discussing the potential for crowdsourcing wisdom and knowledge from large groups of individuals.
Bridging the gap between our online and offline social networkPaul Adams
A 30 minute talk I gave at the IA Summit 2010. If you find the content useful in your work, I'd love to hear your stories and examples to inform a book I'm writing. Please get in touch!
padday at gmail dot com
Facebook 101: Tips and Tricks provides 25 tips for optimizing your Facebook experience. It discusses setting up a profile with a current photo, inviting real friends and family but not random strangers, using features like writing on friends' walls, updating your status occasionally, creating events, tagging photos, and making pages. It also warns about potential employers checking profiles and provides safety tips like being wary of scammers. The document aims to help users make the most of Facebook while avoiding privacy and safety issues.
The document discusses the benefits of lawyers using social networking tools like Facebook, Twitter, and LinkedIn to establish relationships and promote their practice. It provides tips for setting up an interesting profile, engaging with contacts at networking sites as if at a party, using blogging to further relationships, and tools to help manage a social media presence. Effective social networking is portrayed as a long-term commitment to building online communities and relationships through regular, valuable contributions over time.
The document discusses the rise of social media and how it has changed how people interact and share information online in a collaborative way. It explores both the benefits of social media like widespread audiences and easy connections, as well as limitations around privacy and inability to take content back once shared. Examples are given of how businesses and individuals can leverage social media tools to better connect with customers and networks.
Introduction to Social Media: The web is ready for youCarrie Saarinen
The document introduces several types of social media including social bookmarking, social networking, and microblogging. It provides examples of social bookmarking tools like Delicious and tagging resources. Examples of social networking tools include LinkedIn for professional networking and how to use profiles, groups, and updates to connect and share information. Microblogging using Twitter is discussed as a way to have short conversations by listening to discussions and finding topics of interest to join. The document encourages connecting with others and sharing information through social media networks.
Quick Connections with Facebook and TwitterJamie C
This document discusses how social media platforms like Facebook and Twitter are commonly used by older generations. It provides statistics that over 16.5 million Americans aged 55 and older are active on social networks, and the number of internet users aged 70-75 has increased from 26% in 2005 to 45% in recent years. The document then gives an overview of how to use key features on Facebook like creating a profile, posting updates, and finding friends. It also summarizes how to use Twitter by creating tweets within 140 characters and following other users to participate in conversations.
The document summarizes key points from a presentation about how people's real-life social networks differ from their online social networks. It tells a story about a woman named Debbie who was upset to discover that photos from her friends' wild nights at a gay bar, which she had commented on on Facebook, could be viewed by 10-year-old children she teaches swimming. This highlighted the problem that online social networks do not always match people's real-world relationships and connections. The presentation then covered topics like how social networks have changed the web, the importance of understanding relationships and influence, identity, and privacy on social platforms.
Paul Adams, a user research lead at Google, discusses research findings on people's real-life social networks compared to their online social networks. He tells a story about "Debbie" who had different groups in her life unintentionally linked online through Facebook. The main points are that people's online social networks don't match their offline networks, leading to privacy and sharing issues. Further, people have multiple independent groups in their lives formed around shared experiences, not one single "friends" group as typically represented online.
The document summarizes key points from a presentation about how people's real-life social networks differ from their online social networks. It tells a story about a woman named Debbie who was upset to discover that photos from her friends' wild nights at a gay bar, which she had commented on on Facebook, could be viewed by 10-year-old children she teaches swimming. This highlighted the problem that online social networks do not always match people's real-world relationships and connections. The presentation then covered topics like how social networks have changed the web, the importance of understanding relationships and influence, identity, and privacy on social platforms.
This document discusses the use of social media for educators. It provides examples of popular social media sites like Twitter, Facebook, and Delicious. It describes how educators can use these tools to connect with other teachers, share resources, and collaborate. The document outlines both the successes and challenges of using social media. It encourages educators to build personal learning networks and engage in interactive dialogues using these new technologies.
Social networking allows people to connect with others online through sites like Facebook, MySpace, and Twitter. It enables users to meet new people with shared interests, reconnect with old friends and family, get help from others in a community, and feel less isolated. While initially popular mainly with teens and college students, social networking sites now attract users of all ages who enjoy networking, sharing photos and videos, finding support, and staying in touch with a wide community online.
Ashley is careful about what she shares online because anything can be seen and shared with others. She knows teens who got in trouble for inappropriate photos online.
Your online identity may be different than how people see you offline. You can try new personalities and interests online but should be careful what you post because nothing is truly private.
It's important to safeguard your online identity by making profiles private, using secure passwords, avoiding inappropriate content, not responding to unwanted messages, thinking before posting when angry, and checking your digital footprint occasionally. Your online reputation is shaped like your real reputation so be responsible in both worlds.
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
3. Let’s Talk About...
Social Networking
Because it’s not an if; it’s a when.
And that’s not a bad thing. We just need to
learn about what a social network is.
Let’s Talk!
4. Let’s Talk About...
Social Networking
Because it’s not an if; it’s a when.
And that’s not a bad thing. We just need to
learn about what a social network is.
Let’s Talk!
11. Some Common Misconceptions
These interwebs are just full of
Meet Gladys, our resident
DANGEROUS MyFace Twiddlers who are
Internet Skeptic
out to STEAL your MONEY! Dang Kids!
12. Some Common Misconceptions
These interwebs are just full of
Meet Gladys, our resident
DANGEROUS MyFace Twiddlers who are
Internet Skeptic
out to STEAL your MONEY! Dang Kids!
She doesn't like this whole “Social
Networking” thing, and she has all
sorts of objections and concerns.
13. Some Common Misconceptions
Meet Gladys, our resident
Internet Skeptic
She doesn't like this whole “Social
Networking” thing, and she has all
sorts of objections and concerns.
14. Some Common Misconceptions
Meet Gladys, our resident
In my day, you had to
Internet Skeptic
talk to interact...
grumblemutterrabble
She doesn't like this whole “Social
Networking” thing, and she has all
sorts of objections and concerns.
15. Some Common Misconceptions
Meet Gladys, our resident
In my day, you had to
Internet Skeptic
talk to interact...
grumblemutterrabble
She doesn't like this whole “Social
Networking” thing, and she has all
sorts of objections and concerns.
We’re not down on talking, Gladys (even in person).
After all, that’s what Social Networking is all about!
16. i yths v 1.0
Brought to you by Gladys
There are just too many sites and too
much going on online to ever have a
chance at grasping anything!
17. i yths v 1.0
Brought to you by Gladys
There are just too many sites and too
much going on online to ever have a
chance at grasping anything!
Well... maybe. There is a lot out there. But that just means you
need to be judicious about where you go. Just think: there are
too many towns in the world to ever get to know all of them in
your lifetime... but that doesn't mean you shouldn’t visit Paris.
18. i yths v 1.0
Brought to you by Gladys
Well... maybe. There is a lot out there. But that just means you
need to be judicious about where you go. Just think: there are
too many towns in the world to ever get to know all of them in
your lifetime... but that doesn't mean you shouldn’t visit Paris.
19. i yths v 1.0
Brought to you by Gladys
Technorati.com, Digg.com and
Stumbleupon.com are all great communities
that are already there to point you toward
the best of the web!
Well... maybe. There is a lot out there. But that just means you
need to be judicious about where you go. Just think: there are
too many towns in the world to ever get to know all of them in
your lifetime... but that doesn't mean you shouldn’t visit Paris.
20. The Big Two
Facebook
Real Life Friends Network
and Catch Up
MySpace
Connect to Others Via Your
Creative Side
22. A Walkthrough
You start out by building a profile, which contains information
about yourself: text and photos.
23. A Walkthrough
You start out by building a profile, which contains information
about yourself: text and photos.
From there, you have the ability to connect with friends who are
also on Facebook, using a simple search feature.
24. A Walkthrough
You start out by building a profile, which contains information
about yourself: text and photos.
From there, you have the ability to connect with friends who are
also on Facebook, using a simple search feature.
Depending on your privacy options, you are able to message
with your friends, friends of your friends, or anyone in the
network you choose to join. (e.g. New York City or Swarthmore
College)
25. A Walkthrough
You start out by building a profile, which contains information
about yourself: text and photos.
From there, you have the ability to connect with friends who are
also on Facebook, using a simple search feature.
Depending on your privacy options, you are able to message
with your friends, friends of your friends, or anyone in the
network you choose to join. (e.g. New York City or Swarthmore
College)
What's it for? Sharing pictures, catching up with old friends,
finding groups with a shared interest, and even birthday reminders
and event invitations.
29. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
30. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
31. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
32. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
33. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
34. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
35. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
Status - This is a place where you can write what you are currently doing/thinking about.
This means you can stay constantly in touch with your network, to help them keep up with
your daily life, thoughts, and activities. You can also use status updates to organize plans with
others or share a URL (web address).
36. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
Status - This is a place where you can write what you are currently doing/thinking about.
This means you can stay constantly in touch with your network, to help them keep up with
your daily life, thoughts, and activities. You can also use status updates to organize plans with
others or share a URL (web address).
37. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
Status - This is a place where you can write what you are currently doing/thinking about.
This means you can stay constantly in touch with your network, to help them keep up with
your daily life, thoughts, and activities. You can also use status updates to organize plans with
others or share a URL (web address).
Friend Request - When you see a person on Facebook whose profile you'd like to be
connected to, you send them a friend request. Before you can see their profile, they must
"accept" you. A connection is only formed when both sides choose to opt in, a method that has
become standard across many social networking sites.
38. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
Status - This is a place where you can write what you are currently doing/thinking about.
This means you can stay constantly in touch with your network, to help them keep up with
your daily life, thoughts, and activities. You can also use status updates to organize plans with
others or share a URL (web address).
Friend Request - When you see a person on Facebook whose profile you'd like to be
connected to, you send them a friend request. Before you can see their profile, they must
"accept" you. A connection is only formed when both sides choose to opt in, a method that has
become standard across many social networking sites.
39. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
Status - This is a place where you can write what you are currently doing/thinking about.
This means you can stay constantly in touch with your network, to help them keep up with
your daily life, thoughts, and activities. You can also use status updates to organize plans with
others or share a URL (web address).
Friend Request - When you see a person on Facebook whose profile you'd like to be
connected to, you send them a friend request. Before you can see their profile, they must
"accept" you. A connection is only formed when both sides choose to opt in, a method that has
become standard across many social networking sites.
Groups - From supporting a candidate, to following your favorite team, to something as silly
as “people who like to chew gum and skip rope,” groups connect you to people around the world
with similar interests.
40. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
Status - This is a place where you can write what you are currently doing/thinking about.
This means you can stay constantly in touch with your network, to help them keep up with
your daily life, thoughts, and activities. You can also use status updates to organize plans with
others or share a URL (web address).
Friend Request - When you see a person on Facebook whose profile you'd like to be
connected to, you send them a friend request. Before you can see their profile, they must
"accept" you. A connection is only formed when both sides choose to opt in, a method that has
become standard across many social networking sites.
Groups - From supporting a candidate, to following your favorite team, to something as silly
as “people who like to chew gum and skip rope,” groups connect you to people around the world
with similar interests.
41. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
Status - This is a place where you can write what you are currently doing/thinking about.
This means you can stay constantly in touch with your network, to help them keep up with
your daily life, thoughts, and activities. You can also use status updates to organize plans with
others or share a URL (web address).
Friend Request - When you see a person on Facebook whose profile you'd like to be
connected to, you send them a friend request. Before you can see their profile, they must
"accept" you. A connection is only formed when both sides choose to opt in, a method that has
become standard across many social networking sites.
Groups - From supporting a candidate, to following your favorite team, to something as silly
as “people who like to chew gum and skip rope,” groups connect you to people around the world
with similar interests.
43. A Walkthrough
Like Facebook, you start out by building a profile. Unlike
Facebook, it’s not always about you. A profile can be about a band,
a studio, a project or an organization... and some people use more
imagination than others.
44. A Walkthrough
Like Facebook, you start out by building a profile. Unlike
Facebook, it’s not always about you. A profile can be about a band,
a studio, a project or an organization... and some people use more
imagination than others.
Where Facebook starts with real life friends and family, then
builds out from there, MySpace focuses on shared interests. Artists,
musicians and writers use MySpace to share their work.
45. A Walkthrough
Like Facebook, you start out by building a profile. Unlike
Facebook, it’s not always about you. A profile can be about a band,
a studio, a project or an organization... and some people use more
imagination than others.
Where Facebook starts with real life friends and family, then
builds out from there, MySpace focuses on shared interests. Artists,
musicians and writers use MySpace to share their work.
MySpace contains a wide open design scheme, a Blog (often a
kind of web diary - way more then a Wall) and a place to upload
music, giving it the flexibility of a personalized web-page.
46. A Walkthrough
Like Facebook, you start out by building a profile. Unlike
Facebook, it’s not always about you. A profile can be about a band,
a studio, a project or an organization... and some people use more
imagination than others.
Where Facebook starts with real life friends and family, then
builds out from there, MySpace focuses on shared interests. Artists,
musicians and writers use MySpace to share their work.
MySpace contains a wide open design scheme, a Blog (often a
kind of web diary - way more then a Wall) and a place to upload
music, giving it the flexibility of a personalized web-page.
What's it for? Sharing personal music and artwork, connecting
with others who share your interests, promoting upcoming work,
sharing feelings, and re-inventing selves.
47.
48.
49. i yths v 2.0
Brought to you by Gladys
Everyone online is some kind of crazed
sex pervert, just waiting to prey on my
child. I have to watch their EVERY
MOUSE CLICK!
50. i yths v 2.0
Brought to you by Gladys
Everyone online is some kind of crazed
sex pervert, just waiting to prey on my
child. I have to watch their EVERY
MOUSE CLICK!
Well...most adults who are using the internet and social networking sites are engaging in
everyday social behaviors, not behaving like predators.
51. i yths v 2.0
Brought to you by Gladys
Everyone online is some kind of crazed
sex pervert, just waiting to prey on my
child. I have to watch their EVERY
MOUSE CLICK!
Well...most adults who are using the internet and social networking sites are engaging in
everyday social behaviors, not behaving like predators.
Some people do use the anonymity of the web to trick
unsuspecting users. But this is why social networks are good.
52. i yths v 2.0
Brought to you by Gladys
Everyone online is some kind of crazed
sex pervert, just waiting to prey on my
child. I have to watch their EVERY
MOUSE CLICK!
Well...most adults who are using the internet and social networking sites are engaging in
everyday social behaviors, not behaving like predators.
Some people do use the anonymity of the web to trick
unsuspecting users. But this is why social networks are good.
Facebook, for example, allows you to see who else is in a stranger’s
network. It acts as a gated community in an otherwise unfettered e-
world.
53. i yths v 2.0
Brought to you by Gladys
Everyone online is some kind of crazed
sex pervert, just waiting to prey on my
child. I have to watch their EVERY
MOUSE CLICK!
Well...most adults who are using the internet and social networking sites are engaging in
everyday social behaviors, not behaving like predators.
Some people do use the anonymity of the web to trick
unsuspecting users. But this is why social networks are good.
Facebook, for example, allows you to see who else is in a stranger’s
network. It acts as a gated community in an otherwise unfettered e-
world.
Talking to your child about where they go on the web and who
they interact with is important (just like in physical reality!).
54. i yths v 2.0
Brought to you by Gladys
Everyone online is some kind of crazed
sex pervert, just waiting to prey on my
child. I have to watch their EVERY
MOUSE CLICK!
Well...most adults who are using the internet and social networking sites are engaging in
everyday social behaviors, not behaving like predators.
Some people do use the anonymity of the web to trick
unsuspecting users. But this is why social networks are good.
Facebook, for example, allows you to see who else is in a stranger’s
network. It acts as a gated community in an otherwise unfettered e-
world.
Talking to your child about where they go on the web and who
they interact with is important (just like in physical reality!).
You should teach your children not to take candy from a stranger, but you don’t
(can’t!) follow them everywhere they go, right? The same should be true online.
55. i yths v 2.0
Brought to you by Gladys
Well...most adults who are using the internet and social networking sites are engaging in
everyday social behaviors, not behaving like predators.
Some people do use the anonymity of the web to trick
unsuspecting users. But this is why social networks are good.
Facebook, for example, allows you to see who else is in a stranger’s
network. It acts as a gated community in an otherwise unfettered e-
world.
Talking to your child about where they go on the web and who
they interact with is important (just like in physical reality!).
You should teach your children not to take candy from a stranger, but you don’t
(can’t!) follow them everywhere they go, right? The same should be true online.
56. i yths v 2.0
Brought to you by Gladys
KidsHealth.org and Wiredsafety.org are two
great resources for kids AND parents to learn
the warning signs that can help identify
predators, as well as preventative measures to
increase safety.
Well...most adults who are using the internet and social networking sites are engaging in
everyday social behaviors, not behaving like predators.
Some people do use the anonymity of the web to trick
unsuspecting users. But this is why social networks are good.
Facebook, for example, allows you to see who else is in a stranger’s
network. It acts as a gated community in an otherwise unfettered e-
world.
Talking to your child about where they go on the web and who
they interact with is important (just like in physical reality!).
You should teach your children not to take candy from a stranger, but you don’t
(can’t!) follow them everywhere they go, right? The same should be true online.
57. i yths v 2.0
Brought to you by Gladys
KidsHealth.org and Wiredsafety.org are two
great resources for kids AND parents to learn Facebook is FYI:
the warning signs that can help identify safer than
predators, as well as preventative measures to
MySpace in this
increase safety.
regard; both are
Well...most adults who are using the internet and social networkingsaferare engaging in
sites than an
everyday social behaviors, not behaving like predators.
AOL chat room.
Some people do use the anonymity of the web to trick
unsuspecting users. But this is why social networks are good.
Facebook, for example, allows you to see who else is in a stranger’s
network. It acts as a gated community in an otherwise unfettered e-
world.
Talking to your child about where they go on the web and who
they interact with is important (just like in physical reality!).
You should teach your children not to take candy from a stranger, but you don’t
(can’t!) follow them everywhere they go, right? The same should be true online.
66. Remember the Facebook Status Updates?
This is Worse.
Twitter is an entire Social Network designed to give you the
very latest in what people are thinking and doing.
67. Remember the Facebook Status Updates?
This is Worse.
Twitter is an entire Social Network designed to give you the
very latest in what people are thinking and doing.
140 characters long, Twitter updates are called “Tweets.”
68. Remember the Facebook Status Updates?
This is Worse.
Twitter is an entire Social Network designed to give you the
very latest in what people are thinking and doing.
140 characters long, Twitter updates are called “Tweets.”
Where Facebook has friends, Twitter has followers: you can
follow anyone on Twitter... even if they aren’t following you. (Al
Gore and Shaquille O’Neal have many followers on Twitter.)
69. Remember the Facebook Status Updates?
This is Worse.
Twitter is an entire Social Network designed to give you the
very latest in what people are thinking and doing.
140 characters long, Twitter updates are called “Tweets.”
Where Facebook has friends, Twitter has followers: you can
follow anyone on Twitter... even if they aren’t following you. (Al
Gore and Shaquille O’Neal have many followers on Twitter.)
Organizations, politicians, and non-profits are using Twitter now:
even the nightly news wants you to follow them.
70. You may have heard the phrases Chat Room or Message
Board. These are catch-all terms for online communication:
some are parts of larger social networks and some stand
alone.
71. You may have heard the phrases Chat Room or Message
Board. These are catch-all terms for online communication:
some are parts of larger social networks and some stand
alone.
Chats are basically any real time communication: either
between individuals you already know, or in larger rooms
(often themed) filled with... pretty much anybody with a
web connection.
72. You may have heard the phrases Chat Room or Message
Board. These are catch-all terms for online communication:
some are parts of larger social networks and some stand
alone.
Chats are basically any real time communication: either
between individuals you already know, or in larger rooms
(often themed) filled with... pretty much anybody with a
web connection.
73. You may have heard the phrases Chat Room or Message
Board. These are catch-all terms for online communication:
some are parts of larger social networks and some stand
alone.
Chats are basically any real time communication: either
between individuals you already know, or in larger rooms
(often themed) filled with... pretty much anybody with a
web connection.
74. You may have heard the phrases Chat Room or Message
Board. These are catch-all terms for online communication:
some are parts of larger social networks and some stand
alone.
Chats are basically any real time communication: either
between individuals you already know, or in larger rooms
(often themed) filled with... pretty much anybody with a
web connection.
Message Boards are a more permanent version of
communicating online: people use them to hold longer
discussions, respond (via comments sections) to articles, sell
things or meet people. Craig’s List is a popular example.
75. You may have heard the phrases Chat Room or Message
Board. These are catch-all terms for online communication:
some are parts of larger social networks and some stand
alone.
Chats are basically any real time communication: either
between individuals you already know, or in larger rooms
(often themed) filled with... pretty much anybody with a
web connection.
Message Boards are a more permanent version of
communicating online: people use them to hold longer
discussions, respond (via comments sections) to articles, sell
things or meet people. Craig’s List is a popular example.
76. You may have heard the phrases Chat Room or Message
Board. These are catch-all terms for online communication:
some are parts of larger social networks and some stand
alone.
Chats are basically any real time communication: either
between individuals you already know, or in larger rooms
(often themed) filled with... pretty much anybody with a
web connection.
Message Boards are a more permanent version of
communicating online: people use them to hold longer
discussions, respond (via comments sections) to articles, sell
things or meet people. Craig’s List is a popular example.
77. You may have heard the phrases Chat Room or Message
Board. These are catch-all terms for online communication:
some are parts of larger social networks and some stand
alone.
Chats are basically any real time communication: either
between individuals you already know, or in larger rooms
(often themed) filled with... pretty much anybody with a
web connection.
Message Boards are a more permanent version of
communicating online: people use them to hold longer
discussions, respond (via comments sections) to articles, sell
things or meet people. Craig’s List is a popular example.
There are two kinds of chatting: in one version, you are
real-life friends with your chat buddy. In the other, you
are chatting with a stranger...
79. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
80. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
81. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
82. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
In contrast, in chat rooms you have little idea to whom you are
speaking. These sites lend themselves to anonymity, as users often post
under an alias. This means that you are never really sure of to whom
you are talking.
83. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
In contrast, in chat rooms you have little idea to whom you are
speaking. These sites lend themselves to anonymity, as users often post
under an alias. This means that you are never really sure of to whom
you are talking.
84. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
In contrast, in chat rooms you have little idea to whom you are
speaking. These sites lend themselves to anonymity, as users often post
under an alias. This means that you are never really sure of to whom
you are talking.
85. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
In contrast, in chat rooms you have little idea to whom you are
speaking. These sites lend themselves to anonymity, as users often post
under an alias. This means that you are never really sure of to whom
you are talking.
It is very important to tell your children to treat people in chat rooms
like they would strangers in real life, making sure to never give out
personal information.
86. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
In contrast, in chat rooms you have little idea to whom you are
speaking. These sites lend themselves to anonymity, as users often post
under an alias. This means that you are never really sure of to whom
you are talking.
It is very important to tell your children to treat people in chat rooms
like they would strangers in real life, making sure to never give out
personal information.
87. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
In contrast, in chat rooms you have little idea to whom you are
speaking. These sites lend themselves to anonymity, as users often post
under an alias. This means that you are never really sure of to whom
you are talking.
It is very important to tell your children to treat people in chat rooms
like they would strangers in real life, making sure to never give out
personal information.
88. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
In contrast, in chat rooms you have little idea to whom you are
speaking. These sites lend themselves to anonymity, as users often post
under an alias. This means that you are never really sure of to whom
you are talking.
It is very important to tell your children to treat people in chat rooms
like they would strangers in real life, making sure to never give out
personal information.
Since chatting is immediate, it is a good way to have a conversation
with a friend, but also a danger for impulsive kids who might type
before they think.
90. Social Networks: What are they good for?
Making Connections: To interact with folks that you would
otherwise never get to meet.
91. Social Networks: What are they good for?
Making Connections: To interact with folks that you would
otherwise never get to meet.
Using Connections: To find jobs, housing, friendship and romance.
92. Social Networks: What are they good for?
Making Connections: To interact with folks that you would
otherwise never get to meet.
Using Connections: To find jobs, housing, friendship and romance.
Re-connecting: To catch up with and learn about old friends.
93. Social Networks: What are they good for?
Making Connections: To interact with folks that you would
otherwise never get to meet.
Using Connections: To find jobs, housing, friendship and romance.
Re-connecting: To catch up with and learn about old friends.
Sharing Ideas: To share and build pictures, thoughts, and writing.
94. Social Networks: What are they good for?
Making Connections: To interact with folks that you would
otherwise never get to meet.
Using Connections: To find jobs, housing, friendship and romance.
Re-connecting: To catch up with and learn about old friends.
Sharing Ideas: To share and build pictures, thoughts, and writing.
Keeping in Touch: To communicate instantly (and for free!) with
people around the globe.
95. Social Networks: What are they good for?
Making Connections: To interact with folks that you would
otherwise never get to meet.
Using Connections: To find jobs, housing, friendship and romance.
Re-connecting: To catch up with and learn about old friends.
Sharing Ideas: To share and build pictures, thoughts, and writing.
Keeping in Touch: To communicate instantly (and for free!) with
people around the globe.
Now you know some basic information about specific sites, but the
internet is a constantly changing place; it’s worth the time to learn
about new sites and compare them to what is already there. Be
Alert. Read the Fine Print.
100. i yths v 3.0
Brought to you by Gladys
Opening an Email -- any Email -- can give
someone access to ALL of my MONEY! And
MY IDENTITY! I am ALWAYS AT RISK
of identity theft online!
101. i yths v 3.0
Brought to you by Gladys
Opening an Email -- any Email -- can give
someone access to ALL of my MONEY! And
MY IDENTITY! I am ALWAYS AT RISK
of identity theft online!
Well...there are a lot of scams out there, created by tech-savvy people
looking to make a quick buck. But if you keep your wits about you,
they should be easy to spot.
102. i yths v 3.0
Brought to you by Gladys
Opening an Email -- any Email -- can give
someone access to ALL of my MONEY! And
MY IDENTITY! I am ALWAYS AT RISK
of identity theft online!
Well...there are a lot of scams out there, created by tech-savvy people
looking to make a quick buck. But if you keep your wits about you,
they should be easy to spot.
Avoid clicking or opening anything with generic language (e.g. “check this link out!”)
103. i yths v 3.0
Brought to you by Gladys
Opening an Email -- any Email -- can give
someone access to ALL of my MONEY! And
MY IDENTITY! I am ALWAYS AT RISK
of identity theft online!
Well...there are a lot of scams out there, created by tech-savvy people
looking to make a quick buck. But if you keep your wits about you,
they should be easy to spot.
Avoid clicking or opening anything with generic language (e.g. “check this link out!”)
Legitimate sites will never ask you to send them private information through email,
and they won’t solicit things out of the blue. Don’t trust Email that looks like this,
even if it looks like a source you recognize. (e.g. Amazon.com saying “we lost your
credit card info! Could you send it again?”)
104. i yths v 3.0
Brought to you by Gladys
Opening an Email -- any Email -- can give
someone access to ALL of my MONEY! And
MY IDENTITY! I am ALWAYS AT RISK
of identity theft online!
Well...there are a lot of scams out there, created by tech-savvy people
looking to make a quick buck. But if you keep your wits about you,
they should be easy to spot.
Avoid clicking or opening anything with generic language (e.g. “check this link out!”)
Legitimate sites will never ask you to send them private information through email,
and they won’t solicit things out of the blue. Don’t trust Email that looks like this,
even if it looks like a source you recognize. (e.g. Amazon.com saying “we lost your
credit card info! Could you send it again?”)
Real Life applies: don’t do anything you wouldn’t do in a real store, and
you should be fine!
105. i yths v 3.0
Brought to you by Gladys
Well...there are a lot of scams out there, created by tech-savvy people
looking to make a quick buck. But if you keep your wits about you,
they should be easy to spot.
Avoid clicking or opening anything with generic language (e.g. “check this link out!”)
Legitimate sites will never ask you to send them private information through email,
and they won’t solicit things out of the blue. Don’t trust Email that looks like this,
even if it looks like a source you recognize. (e.g. Amazon.com saying “we lost your
credit card info! Could you send it again?”)
Real Life applies: don’t do anything you wouldn’t do in a real store, and
you should be fine!
106. i yths v 3.0
Brought to you by Gladys
Don’t open Emails or click on links unless you
know their origins.
Make sure you trust a website completely before
you give them any information. (If you have any
doubt, check out BizRate.com)
Well...there are a lot of scams out there, created by tech-savvy people
looking to make a quick buck. But if you keep your wits about you,
they should be easy to spot.
Avoid clicking or opening anything with generic language (e.g. “check this link out!”)
Legitimate sites will never ask you to send them private information through email,
and they won’t solicit things out of the blue. Don’t trust Email that looks like this,
even if it looks like a source you recognize. (e.g. Amazon.com saying “we lost your
credit card info! Could you send it again?”)
Real Life applies: don’t do anything you wouldn’t do in a real store, and
you should be fine!
107. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
108. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
109. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
110. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
The Internet is like an Elephant. It never forgets.
111. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
The Internet is like an Elephant. It never forgets.
Even if the most recent version of a website appears to have removed an item,
there are always ways to dredge up that information.
112. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
The Internet is like an Elephant. It never forgets.
Even if the most recent version of a website appears to have removed an item,
there are always ways to dredge up that information.
This can have effects later in life that younger generations are just starting to
realize. A goofy picture now might come up in a job search later. The same goes
for something you write on your Blog.
113. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
The Internet is like an Elephant. It never forgets.
Even if the most recent version of a website appears to have removed an item,
there are always ways to dredge up that information.
This can have effects later in life that younger generations are just starting to
realize. A goofy picture now might come up in a job search later. The same goes
for something you write on your Blog.
114. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
The Internet is like an Elephant. It never forgets.
Even if the most recent version of a website appears to have removed an item,
there are always ways to dredge up that information.
This can have effects later in life that younger generations are just starting to
realize. A goofy picture now might come up in a job search later. The same goes
for something you write on your Blog.
115. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
The Internet is like an Elephant. It never forgets.
Even if the most recent version of a website appears to have removed an item,
there are always ways to dredge up that information.
This can have effects later in life that younger generations are just starting to
realize. A goofy picture now might come up in a job search later. The same goes
for something you write on your Blog.
If you are watching the world... the world is watching you.
116. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
The Internet is like an Elephant. It never forgets.
Even if the most recent version of a website appears to have removed an item,
there are always ways to dredge up that information.
This can have effects later in life that younger generations are just starting to
realize. A goofy picture now might come up in a job search later. The same goes
for something you write on your Blog.
If you are watching the world... the world is watching you.
Remember that every time you are looking at someone else’s profile, they
probably are looking at yours. The fact that it’s a two way street sounds
obvious... but it is good to be reminded.
117. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
The Internet is like an Elephant. It never forgets.
Even if the most recent version of a website appears to have removed an item,
there are always ways to dredge up that information.
This can have effects later in life that younger generations are just starting to
realize. A goofy picture now might come up in a job search later. The same goes
for something you write on your Blog.
If you are watching the world... the world is watching you.
Remember that every time you are looking at someone else’s profile, they
probably are looking at yours. The fact that it’s a two way street sounds
obvious... but it is good to be reminded.
Treat the Internet like a tattoo: it’s highly visible and will last
the rest of your life.
118. Cyberbullying
v 2.0 Cyberbullying is when a child, preteen
o r teen is to r m ente d, threaten e d,
harassed, humiliated, embarrassed or
otherwise targeted by another minor
using the Internet, interactive and digital
technologies or mobile phones.
119. Cyberbullying
v 2.0 Cyberbullying is when a child, preteen
o r teen is to r m ente d, threaten e d,
harassed, humiliated, embarrassed or
otherwise targeted by another minor
using the Internet, interactive and digital
technologies or mobile phones.
Cyberbullying often flourishes on social networking sites, where
there is no strict monitoring system in place.
120. Cyberbullying
v 2.0 Cyberbullying is when a child, preteen
o r teen is to r m ente d, threaten e d,
harassed, humiliated, embarrassed or
otherwise targeted by another minor
using the Internet, interactive and digital
technologies or mobile phones.
Cyberbullying often flourishes on social networking sites, where
there is no strict monitoring system in place.
When schools try to get involved with off-campus cyberbullying, they have
been sued for exceeding their authority.
121. Cyberbullying
v 2.0 Cyberbullying is when a child, preteen
o r teen is to r m ente d, threaten e d,
harassed, humiliated, embarrassed or
otherwise targeted by another minor
using the Internet, interactive and digital
technologies or mobile phones.
Cyberbullying often flourishes on social networking sites, where
there is no strict monitoring system in place.
When schools try to get involved with off-campus cyberbullying, they have
been sued for exceeding their authority.
Remember, online changes the playing field.
122. Cyberbullying
v 2.0 Cyberbullying is when a child, preteen
o r teen is to r m ente d, threaten e d,
harassed, humiliated, embarrassed or
otherwise targeted by another minor
using the Internet, interactive and digital
technologies or mobile phones.
Cyberbullying often flourishes on social networking sites, where
there is no strict monitoring system in place.
When schools try to get involved with off-campus cyberbullying, they have
been sued for exceeding their authority.
Remember, online changes the playing field.
A child can be whoever they want to be, even completely changing their persona.
If they feel weak in life, they can act strongly online - just like the bullies who
might pick on them in person. Many kids don’t realize that the internet can cross
into the real world, so they are even more willing to say mean and hurtful things
in a digital space.
123. Cyberbullying
v 2.0 Cyberbullying is when a child, preteen
o r teen is to r m ente d, threaten e d,
harassed, humiliated, embarrassed or
otherwise targeted by another minor
using the Internet, interactive and digital
technologies or mobile phones.
Cyberbullying often flourishes on social networking sites, where
there is no strict monitoring system in place.
When schools try to get involved with off-campus cyberbullying, they have
been sued for exceeding their authority.
Remember, online changes the playing field.
A child can be whoever they want to be, even completely changing their persona.
If they feel weak in life, they can act strongly online - just like the bullies who
might pick on them in person. Many kids don’t realize that the internet can cross
into the real world, so they are even more willing to say mean and hurtful things
in a digital space.
Teach children to respect others - in real life and online. Create a
safe space for kids to talk openly about bullying.
124. Cyberbullying
v 2.0 Cyberbullying is when a child, preteen
o r teen is to r m ente d, threaten e d,
harassed, humiliated, embarrassed or
You otherwise targeted by another minor
can find
using the Internet, interactive and digital
resources for bothmobile phones.
technologies or
children and adults
Cyberbullying often flourishes on social networking sites, where
at
there is no strict monitoring system in place.
stopcyberbullying.org
When schools try to get involved with off-campus cyberbullying, they have
been sued for exceeding their authority.
Remember, online changes the playing field.
A child can be whoever they want to be, even completely changing their persona.
If they feel weak in life, they can act strongly online - just like the bullies who
might pick on them in person. Many kids don’t realize that the internet can cross
into the real world, so they are even more willing to say mean and hurtful things
in a digital space.
Teach children to respect others - in real life and online. Create a
safe space for kids to talk openly about bullying.
126. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
127. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
128. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
129. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
No
130. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
No
Is there a way to get your child to make the right decision EVERY TIME?
131. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
No
Is there a way to get your child to make the right decision EVERY TIME?
Do we even need to answer this one? No
132. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
No
Is there a way to get your child to make the right decision EVERY TIME?
Do we even need to answer this one? No
Does this mean that you have to give up all control?
133. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
No
Is there a way to get your child to make the right decision EVERY TIME?
Do we even need to answer this one? No
Does this mean that you have to give up all control?
No. Of course not. You know what your kid is ready for and what responsibilities
they can handle. Together, you can make rules that allow them to use the internet
for good, and create an environment where your child is willing to come to you if
they find things that are evil.
134. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
No
Is there a way to get your child to make the right decision EVERY TIME?
Do we even need to answer this one? No
Does this mean that you have to give up all control?
No. Of course not. You know what your kid is ready for and what responsibilities
they can handle. Together, you can make rules that allow them to use the internet
for good, and create an environment where your child is willing to come to you if
they find things that are evil.
Despite popular opinion to the contrary... Kids are willing to talk about this stuff
with you. Not only does an open conversation give them more freedom, but they
might enjoy getting to teach you a thing or two.
135. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
No
Is there a way to get your child to make the right decision EVERY TIME?
Do we even need to answer this one? No
Does this mean that you have to give up all control?
No. Of course not. You know what your kid is ready for and what responsibilities
they can handle. Together, you can make rules that allow them to use the internet
for good, and create an environment where your child is willing to come to you if
they find things that are evil.
Despite popular opinion to the contrary... Kids are willing to talk about this stuff
with you. Not only does an open conversation give them more freedom, but they
might enjoy getting to teach you a thing or two.
If you come into the discussion knowing what’s out there and what’s going on online,
your child is more likely to listen.
136. Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
No
Is there a way to get your child to make the right decision EVERY TIME?
Do we even need to answer this one? No
Does this mean that you have to give up all control?
No. Of course not. You know what your kid is ready for and what responsibilities
they can handle. Together, you can make rules that allow them to use the internet
for good, and create an environment where your child is willing to come to you if
they find things that are evil.
Despite popular opinion to the contrary... Kids are willing to talk about this stuff
with you. Not only does an open conversation give them more freedom, but they
might enjoy getting to teach you a thing or two.
If you come into the discussion knowing what’s out there and what’s going on online,
your child is more likely to listen.
137. You Know Your Child
bett
Are there hard and fast rules er th
about when
v 3.0 a kid is old enough to use anyo n
the web?
e els
an
No e
Are there parts of the internet that you
can guarantee will always be safe?
No
Is there a way to get your child to make the right decision EVERY TIME?
Do we even need to answer this one? No
Does this mean that you have to give up all control?
No. Of course not. You know what your kid is ready for and what responsibilities
they can handle. Together, you can make rules that allow them to use the internet
for good, and create an environment where your child is willing to come to you if
they find things that are evil.
Despite popular opinion to the contrary... Kids are willing to talk about this stuff
with you. Not only does an open conversation give them more freedom, but they
might enjoy getting to teach you a thing or two.
If you come into the discussion knowing what’s out there and what’s going on online,
your child is more likely to listen.
139. Social Networks and Privacy Settings
Protect Yourself
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
140. Social Networks and Privacy Settings
Protect Yourself
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
141. Social Networks and Privacy Settings
Protect Yourself
Customize privacy settings for each section of your
profile. (e.g. Allow everyone to see your photos, but
only “friends” to see your address)
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
142. Social Networks and Privacy Settings
Protect Yourself
Customize privacy settings for each section of your
profile. (e.g. Allow everyone to see your photos, but
only “friends” to see your address)
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
You can block an individual (a Cyberbully... or
a Boss) from seeing your profile.
143. Social Networks and Privacy Settings
Protect Yourself
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
144. Social Networks and Privacy Settings
Protect Yourself
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
Privacy Settings, and the discussions they raise, should
be the first step in engaging with a new social network.
145. Social Networks and Privacy Settings
Protect Yourself
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
Privacy Settings, and the discussions they raise, should
be the first step in engaging with a new social network.
146. Social Networks and Privacy Settings
Protect Yourself
Every piece of information in a profile is usually customizable.
Going through Privacy Settings with your child provides a
great time to talk about what they should and should not put
Any Social Network worth its salt has
online.
options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
Privacy Settings, and the discussions they raise, should
be the first step in engaging with a new social network.
147. Social Networks and Privacy Settings
Protect Yourself
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
Privacy Settings, and the discussions they raise, should
be the first step in engaging with a new social network.
148. Social Networks and Privacy Settings
Protect Yourself
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
Privacy Settings, and the discussions they raise, should
be the first step in engaging with a new social network.
If you utilize privacy settings (and are smart about who
you accept as connections) many of the previous Myths
and Realities can be minimized.
150. Social Networks and Privacy Settings
It’s not ALL on you
Don’t worry: much of the appeal of Social Networks is tied
in with being part of a community. And the community can
give back.
151. Social Networks and Privacy Settings
It’s not ALL on you
Don’t worry: much of the appeal of Social Networks is tied
in with being part of a community. And the community can
give back.
152. Social Networks and Privacy Settings
It’s not ALL on you
The message board Craigslist prides itself in policing its posts
and protecting its users. They have a place to report abuse
(Craig is very responsive), and they have bred a culture of
responsible users who protect each other.
Don’t worry: much of the appeal of Social Networks is tied
in with being part of a community. And the community can
give back.
153. Social Networks and Privacy Settings
It’s not ALL on you
The message board Craigslist prides itself in policing its posts
and protecting its users. They have a place to report abuse
(Craig is very responsive), and they have bred a culture of
responsible users who protect each other.
Don’t worry: much of the appeal of Social Networks is tied
in with being part of a community. And the community can
give back.
Violating the
trust of a
Craigslist post
is very bad
juju.
154. Social Networks and Privacy Settings
It’s not ALL on you
Don’t worry: much of the appeal of Social Networks is tied
in with being part of a community. And the community can
give back.
155. Social Networks and Privacy Settings
It’s not ALL on you
Don’t worry: much of the appeal of Social Networks is tied
in with being part of a community. And the community can
give back.
You can also expect that a site will be on the look-out for
spammers who are out to trick users. Good sites will work
with you, not against you.
156. Social Networks and Privacy Settings
It’s not ALL on you
Don’t worry: much of the appeal of Social Networks is tied
in with being part of a community. And the community can
give back.
You can also expect that a site will be on the look-out for
spammers who are out to trick users. Good sites will work
with you, not against you.
157. Social Networks and Privacy Settings
It’s not ALL on you
Don’t worry: much of the appeal of Social Networks is tied
in with being part of a community. And the community can
This warning appeared when we tried to
give back. change our privacy settings without
logging in. See? MySpace has our backs.
You can also expect that a site will be on the look-out for
spammers who are out to trick users. Good sites will work
with you, not against you.
158. Social Networks and Privacy Settings
It’s not ALL on you
Don’t worry: much of the appeal of Social Networks is tied
in with being part of a community. And the community can
give back.
You can also expect that a site will be on the look-out for
spammers who are out to trick users. Good sites will work
with you, not against you.
159. Social Networks and Privacy Settings
It’s not ALL on you
Don’t worry: much of the appeal of Social Networks is tied
in with being part of a community. And the community can
give back.
You can also expect that a site will be on the look-out for
spammers who are out to trick users. Good sites will work
with you, not against you.
You are opting in to a community for a reason (which we
hope you think about). Let that community work with you!
164. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
165. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
166. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
There are two approaches
a parent can take to
teach their kids
about internet safety.
First, you could...
167. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
168. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
169. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
170. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
Or, you could
listen to what they
have to say...
171. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
172. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
You can talk to me -- if you’re willing to listen.
173. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
You can talk to me -- if you’re willing to listen.
“Ask us instead of sneaking
around and reading all our
messages.”
174. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
You can talk to me -- if you’re willing to listen.
175. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
You can talk to me -- if you’re willing to listen.
We can define some boundaries -- but trust me to keep them.
176. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
You can talk to me -- if you’re willing to listen.
We can define some boundaries -- but trust me to keep them.
“My mom knows my passwords. She logs
into my email. I think she can watch what
I’m doing sometimes, but I don’t want her to
know my passwords.”
177. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
You can talk to me -- if you’re willing to listen.
We can define some boundaries -- but trust me to keep them.
178. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
You can talk to me -- if you’re willing to listen.
We can define some boundaries -- but trust me to keep them.
Once I know that each site is different, and that each has its
own strengths and its own problems, let’s talk about which ones
to use.
179. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
You can talk to me -- if you’re willing to listen.
We can define some boundaries -- but trust me to keep them.
Once I know that each site is different, and that each has its
own strengths and its own problems, let’s talk about which ones
to use.
We can have the computer in a common room -- but don’t
be reading over my shoulder.
180. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
You can talk to me -- if you’re willing to listen.
We can define some boundaries -- but trust me to keep them.
Once I know that each site is different, and that each has its
own strengths and its own problems, let’s talk about which ones
to use.
We can have the computer in a common room -- but don’t
be reading over my shoulder.
“They look over my shoulder when I’m
looking at anything and ask me who I’m
talking to or who the pictures are of. They
know I’m not doing anything bad- it’s soo
annoying!!!”
181. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
You can talk to me -- if you’re willing to listen.
We can define some boundaries -- but trust me to keep them.
Once I know that each site is different, and that each has its
own strengths and its own problems, let’s talk about which ones
to use.
We can have the computer in a common room -- but don’t
be reading over my shoulder.
182. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
You can talk to me -- if you’re willing to listen.
We can define some boundaries -- but trust me to keep them.
Once I know that each site is different, and that each has its
own strengths and its own problems, let’s talk about which ones
to use.
We can have the computer in a common room -- but don’t
be reading over my shoulder.
Let’s do some things online together -- but not everything. (and
don’t stalk my every click or join every network I’m in, k?)
183. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
You can talk to me -- if you’re willing to listen.
We can define some boundaries -- but trust me to keep them.
For Example:
Once I know that each site is different, and that each has its
own strengths and its owna problems,for parents and
YouthNoise.com is great site let’ talk about which ones
s
to use. kids to use together. It takes Social
Networking to another level, bringing it
We can have the computer in a common room -- but don’t
offline (some might call it “real life”). People
be reading overmeet shoulder. up in person, in safe
you my online meet
and controlled way, to participate in volunteer
Let’s do some things online together -- but not everything.
events. (and
don’t stalk my every click or join every network I’m in, k?)
184. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
You can talk to me -- if you’re willing to listen.
We can define some boundaries -- but trust me to keep them.
Once I know that each site is different, and that each has its
own strengths and its own problems, let’s talk about which ones
to use.
We can have the computer in a common room -- but don’t
be reading over my shoulder.
Let’s do some things online together -- but not everything. (and
don’t stalk my every click or join every network I’m in, k?)
185. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
You can talk to me -- if you’re willing to listen.
We can define some boundaries -- but trust me to keep them.
Once I know that each site is different, and that each has its
own strengths and its own problems, let’s talk about which ones
to use.
We can have the computer in a common room -- but don’t
be reading over my shoulder.
Let’s do some things online together -- but not everything. (and
don’t stalk my every click or join every network I’m in, k?)
I know this stuff backwards and forwards, so if I roll my eyes
when you call them the intertubes...it’s a gesture of love.
Really.
186. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
You can talk to me -- if you’re willing to listen.
We can define some boundaries -- but trust me to keep them.
Once I know that each site is different, and that each has its
own strengths and its own problems, let’s talk about which ones
to use.
We can have the computer in a common room -- but don’t
be reading over my shoulder.
“Most kids aren’t dummies, and if
contacted by creepers, most decline
Let’s do some things online together -- but not everything. (and
and block. Most kids are very careful
with their names and info.”
don’t stalk my every click or join every network I’m in, k?)
I know this stuff backwards and forwards, so if I roll my eyes
when you call them the intertubes...it’s a gesture of love.
Really.
187. A Kids-Eye View
They don’t know everything, but they probably know more than you think.
Especially about the internet!
You can talk to me -- if you’re willing to listen.
We can define some boundaries -- but trust me to keep them.
Once I know that each site is different, and that each has its
own strengths and its own problems, let’s talk about which ones
to use.
We can have the computer in a common room -- but don’t
be reading over my shoulder.
Let’s do some things online together -- but not everything. (and
don’t stalk my every click or join every network I’m in, k?)
I know this stuff backwards and forwards, so if I roll my eyes
when you call them the intertubes...it’s a gesture of love.
Really.
192. Resources
“FrontLine,” a PBS production
“Social Networking in Plain English,” a Common Craft production
www.StopCyberBullying.org
www.YouthNoise.com
www.BizRate.net
www.PostSecret.com
www.FaceBook.com
www.Twitter.com
www.MySpace.com
www.WiredSafety.org
www.KidsHealth.org
www.Technorati.com
www.Digg.com
www.Stumbleupon.com
www.wikipedia.com
193. Let’s Talk About...
is brought to you by
Cornell University Cooperative Extension of Orange County
in cooperation with
The Orange County Parenting Coalition
Funded by
Orange County Partners for Children, Youth and Families
through the Orange County Youth Bureau and the
Orange County United Way.
With Input from
The Orange County Youth Development Action Team
!"#$%&'()# *%+(!,