This document does not provide enough context or content to generate a meaningful 3 sentence summary. No verbs, subjects or objects are included to understand the intent or essential information being conveyed.
The document discusses various topics around interaction, content creation, content consumption, and research online and through technology. It specifically mentions video, music, books, search portals, online shopping, electronics functionality for teens, communication tools, and user-generated writing. Content consumption focuses on video, music and books while content creation discusses writing for audiences and on websites.
This document discusses online safety tips for teens regarding social media and internet usage. It provides statistics on teen internet use and risks like online solicitation. Dangers discussed include sharing too much private information, exposure to inappropriate content, and interactions with online predators. The document recommends using privacy settings, being wary of strangers, keeping personal information private, and reporting any suspicious behavior or threats to a trusted adult.
The document describes the contents of a "digital citizenship survival kit" which is meant to teach students important lessons about being safe and responsible online. The kit contains various items like a padlock, permanent marker, toothpaste, each intended to represent a different lesson. For example, the padlock reminds students to use strong passwords, while permanent marker shows that anything posted online can persist forever. The goal is to use tangible objects to help students understand abstract digital citizenship concepts.
7 Tips for teen safety online
-Check your comments and images
- Talk to your friends about what is ok to post
- Review your account settings
- Know your friends, contacts and followers
- Keep an eye on 3rd party apps
- Don't forget mobile
- Report
This document discusses dyslexia and how technology can help students with dyslexia. It begins with defining dyslexia as a neurological difference that causes difficulties with word recognition, spelling, and decoding. It discusses the neurological aspects of dyslexia and recent legislation in New Jersey regarding dyslexia. Instructional practices and assistive technologies are presented, including apps, websites, fonts and software that can help students with reading, writing, organization and accessing content. The document provides an overview of dyslexia and strategies to support students through technology.
Teens Online: Keeping Your Child Safe From CyberbullyingTeenSafe
Cyberbullying is an epidemic among our youth, yet 90% of children who experience or witness cyberbullying will not tell an adult! Learn how you can protect your child in the digital age, and visit TeenSafe.com to learn more!
Youth are getting exposed to high‐tech devices such assmart phones and internet at earlier ages. While there are many benefits of these devices,they have opened up opportunities for others to negatively exploit users. This workshopwill educate educators and youth about these predatory activities, ways to avoid them, andwhat to do when you or others encounter them.
The document discusses the Holy Trinity of Christianity - the Father, Son, and Holy Spirit. It provides descriptions of each person of the Trinity: the Father is the presence in heaven, the Son is the Word of God known through the incarnation, and the Spirit is God's abode on Earth. It also touches on themes of forgiveness, mercy, and God's compassion for humanity.
The document discusses various topics around interaction, content creation, content consumption, and research online and through technology. It specifically mentions video, music, books, search portals, online shopping, electronics functionality for teens, communication tools, and user-generated writing. Content consumption focuses on video, music and books while content creation discusses writing for audiences and on websites.
This document discusses online safety tips for teens regarding social media and internet usage. It provides statistics on teen internet use and risks like online solicitation. Dangers discussed include sharing too much private information, exposure to inappropriate content, and interactions with online predators. The document recommends using privacy settings, being wary of strangers, keeping personal information private, and reporting any suspicious behavior or threats to a trusted adult.
The document describes the contents of a "digital citizenship survival kit" which is meant to teach students important lessons about being safe and responsible online. The kit contains various items like a padlock, permanent marker, toothpaste, each intended to represent a different lesson. For example, the padlock reminds students to use strong passwords, while permanent marker shows that anything posted online can persist forever. The goal is to use tangible objects to help students understand abstract digital citizenship concepts.
7 Tips for teen safety online
-Check your comments and images
- Talk to your friends about what is ok to post
- Review your account settings
- Know your friends, contacts and followers
- Keep an eye on 3rd party apps
- Don't forget mobile
- Report
This document discusses dyslexia and how technology can help students with dyslexia. It begins with defining dyslexia as a neurological difference that causes difficulties with word recognition, spelling, and decoding. It discusses the neurological aspects of dyslexia and recent legislation in New Jersey regarding dyslexia. Instructional practices and assistive technologies are presented, including apps, websites, fonts and software that can help students with reading, writing, organization and accessing content. The document provides an overview of dyslexia and strategies to support students through technology.
Teens Online: Keeping Your Child Safe From CyberbullyingTeenSafe
Cyberbullying is an epidemic among our youth, yet 90% of children who experience or witness cyberbullying will not tell an adult! Learn how you can protect your child in the digital age, and visit TeenSafe.com to learn more!
Youth are getting exposed to high‐tech devices such assmart phones and internet at earlier ages. While there are many benefits of these devices,they have opened up opportunities for others to negatively exploit users. This workshopwill educate educators and youth about these predatory activities, ways to avoid them, andwhat to do when you or others encounter them.
The document discusses the Holy Trinity of Christianity - the Father, Son, and Holy Spirit. It provides descriptions of each person of the Trinity: the Father is the presence in heaven, the Son is the Word of God known through the incarnation, and the Spirit is God's abode on Earth. It also touches on themes of forgiveness, mercy, and God's compassion for humanity.
Digital footprints can provide benefits like not having to repeatedly log in or submit personal details. However, they also carry costs like revealing what websites and searches you use and who is in your social circle. This information can then be used by companies for commercial purposes like tracking you, customizing ads for you, and marketing to you. There are three ways to manage your digital footprint - improve your understanding of privacy issues, develop habits like keeping different parts of your online presence separate, and using privacy settings to secure your personal data instead of having it disclosed by default.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost feelings of calmness, happiness and focus.
This document discusses using movies to teach religious concepts and sacraments. It suggests that movies tell stories and can reveal inner realities and signs of the divine. It recommends the strategy of media mindfulness to become aware of values presented in movies and talk about what matters. Specific movie clips are linked to sacraments like baptism in The Lion King and reconciliation in Shrek to show how movies can illustrate religious ideas. Resources for parenting advice and media education are also provided.
The document provides links to various YouTube videos including videos about the inventor of the pop-up book, a train arriving at a station, a clip from The Wizard of Oz, Google Exodus, a surprise bear video, junior high football, a cyberbullying suicide attempt, and the song Brave. It also mentions a video about a timer from 0:45 to 0:55 and beginning the Wizard of Oz clip from 4:04 to the end.
This document discusses resources for Catholic schools to strengthen their Catholic identity, including book fairs run by nuns and presentations on media mindfulness. It also provides a media questionnaire for students to complete that asks about their media consumption habits and the influence of faith on their media choices and creation. The questionnaire covers topics like music, television, movies, online activities, news sources, and the role of faith when encountering media.
This document discusses finding spiritual meaning in popular culture through developing awareness and using critical thinking. It provides examples of media clips and examines how to thoughtfully engage with media through principles like love, forgiveness, empathy and respect. The document encourages considering different perspectives and looking for opportunities to make a positive difference through greater understanding of media's messages and impact.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Digital footprints can provide benefits like not having to repeatedly log in or submit personal details. However, they also carry costs like revealing what websites and searches you use and who is in your social circle. This information can then be used by companies for commercial purposes like tracking you, customizing ads for you, and marketing to you. There are three ways to manage your digital footprint - improve your understanding of privacy issues, develop habits like keeping different parts of your online presence separate, and using privacy settings to secure your personal data instead of having it disclosed by default.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost feelings of calmness, happiness and focus.
This document discusses using movies to teach religious concepts and sacraments. It suggests that movies tell stories and can reveal inner realities and signs of the divine. It recommends the strategy of media mindfulness to become aware of values presented in movies and talk about what matters. Specific movie clips are linked to sacraments like baptism in The Lion King and reconciliation in Shrek to show how movies can illustrate religious ideas. Resources for parenting advice and media education are also provided.
The document provides links to various YouTube videos including videos about the inventor of the pop-up book, a train arriving at a station, a clip from The Wizard of Oz, Google Exodus, a surprise bear video, junior high football, a cyberbullying suicide attempt, and the song Brave. It also mentions a video about a timer from 0:45 to 0:55 and beginning the Wizard of Oz clip from 4:04 to the end.
This document discusses resources for Catholic schools to strengthen their Catholic identity, including book fairs run by nuns and presentations on media mindfulness. It also provides a media questionnaire for students to complete that asks about their media consumption habits and the influence of faith on their media choices and creation. The questionnaire covers topics like music, television, movies, online activities, news sources, and the role of faith when encountering media.
This document discusses finding spiritual meaning in popular culture through developing awareness and using critical thinking. It provides examples of media clips and examines how to thoughtfully engage with media through principles like love, forgiveness, empathy and respect. The document encourages considering different perspectives and looking for opportunities to make a positive difference through greater understanding of media's messages and impact.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Using the Internet safely is important because it’s such a big part of our lives. What are some of the things that you like to do online?
(Pause for audience response. If you need to prompt the audience, use the questions below. Take note of their answers and tailor your presentation to their current interests.)
How many of you like to:
Play games online or on a console like PlayStation or Xbox?
Post images or videos on sites like Instagram, Pinterest or YouTube?
Use Google to research homework assignments?
Shop online through sites like Amazon?
Talk with friends and family through sites like Skype or Facebook?
Download apps to your smartphones?
Throughout this presentation, we’ll discuss some ways that you can stay safer while doing these things.
The Church’s support for the integration of communication technology began even before the internet
Decree on the Media of Social Communications “Inter Mirifica”
Solemnly promulgated by His Holiness Pope Paul VI on December 4, 1963
All the Popes since 1937 “Media are gifts of God” even if only referring to cinema
How do we interact with media we experience?
Some risks come from the people you meet online, like online predators. Which one of these people – 1, 2, 3 or 4 – looks like the stereotypical online predator? Why?
(Pause for audience response. Encourage teens to share their stereotypes about online predators.)
Number three may look like a stereotypical predator – a creepy, old man – but in reality any adult who tries to get a minor to meet offline for sex is an online predator. Even if he or she is a cute 22-year-old who says that they want to be your boyfriend or girlfriend.
The good news is that teens rarely meet offline with predators. In fact, they are more likely to be abused by someone they know in person. However, you could come across a predator online. If you do, here some things you should know. Online predators:
Can be male or female, but are usually male.
Are usually honest about being adults.
Target females and males.
Are clear about what they want - to have a sexual relationship with you.
Are attracted by certain online behaviors, such as talking to unknown people about sex and posting revealing pictures.
In addition to predators, there are also people who make inappropriate requests, such as:
A friend jokingly asking you to flash a webcam.
Someone online who’s inviting you to click a link they’ve posted to an adult website.
These people may not be trying to exploit you like a predator would, but these requests are still not okay.
Video: truth behind online dating
https://www.youtube.com/watch?v=N33q303jSy0
Ryan says, “I knew better than to meet in person with someone I’d met on the Internet,” but he still continues the relationship online and gives the predator information about where he lives. How does the predator get him to do that? (Pause for audience response.)
The predator persuades Ryan that he is a friend who understands him and puts him first. This makes Ryan drop his guard and do something he knows is dangerous. The method the predator uses to gain Ryan’s trust is called “grooming.” A predator who is trying to groom you might:
Flatter you.
Send you gifts, like cellphones or bus tickets.
Discuss adult subjects, like sex.
Ask you to keep secrets, such as not telling anyone about the relationship.
Turn you against your family and friends - Predators want you to depend on them.
Share or ask for revealing images
Blackmail you - If you’ve shared revealing images or secrets with predators, they may threaten to make them public unless you send more. You should never give in. Instead, tell an adult you trust immediately so they can help report it to law enforcement.
Examples from the News
An online predator convinced a 15-year-old MA teen to send him nude photos by pretending to be in the modeling industry. He then threatened to distribute the photos unless she had sex with him.5
An online predator manipulated teen boys into performing sex acts on webcam and then threatened to publish the videos on pornography websites if the boys did not continue performing sex acts for him.6
Predators are so good at manipulating teens that sometimes the teens don’t even realize they’ve been tricked until the predators’ bad intentions are exposed. Then, they might be afraid to say anything about it because:
The predator has threatened them.
They feel guilty and think people will blame them.
They think that no one will believe them.
It’s never your fault, and you should not be ashamed to tell someone and ask for help. The fault lies with the adult because responsible adults do not start or have romantic relationships with teens. If an adult acts interested in a romantic relationship with you, it’s a red flag that you cannot trust them.
If someone online sends you an inappropriate request or you think that it’s an online predator, here are some steps you can take:
Don’t engage them - Refuse to talk about sex, and don’t accept or share sexual images.
Block them or unfriend them.
Don’t meet them offline.
Tell an adult you trust.
Telling an adult you trust is important even if you’ve already handled the situation. Some teens don’t want to talk to an adult because they:
Worry the adult will overreact.
Are afraid they’ll be blamed.
Think the adult can’t help.
Are embarrassed.
But someone like a teacher, school counselor, parent or other relative can help you get some perspective on the situation. No one should make you uncomfortable online, especially adults. Get an adult that you feel comfortable talking with to help you handle and report the situation.
Suggested Activity
Divide the audience into pairs and have each pair answer the question, “What advice would you give a friend who was thinking of meeting someone offline?” If you have more time, ask the pairs to act out their scenarios with one teen giving advice and the other teen receiving advice.
How many of you know people that share information about themselves through social media sites like Facebook, Twitter and Instagram? It can be easy to put a little bit of information about yourself in a lot of places online. You may not even realize how much you’re sharing. You should try to be careful about how much you reveal because online information can:
Spread quickly and to a lot of people.
Reach people that you don’t want it to.
Be permanent.
In this video, a researcher asks teens “What can we find out about you in just 6 clicks?” While you’re watching it, think about what 6 clicks could tell someone about you.
(Click to show video.)
(Video plays.) 6 degrees of information
https://www.youtube.com/watch?v=GYHbanR3EiU
Suggested Activity
Visit www.NetSmartz.org to download the discussion guide which accompanies “6 Degrees of Information.” Use it to lead the audience in a more in-depth conversation about the video. You may also write the questions on a board and have teens answer them in discussion groups.
Take a minute to think about how much information you are comfortable sharing online. Are you the type of person who posts status updates 12 times a day or 12 times a year? No matter which type you are, you should be careful about sharing personal information like:
Home and school addresses, or the addresses of places where you like to hang out.
Financial information, like credit card numbers.
Passwords.
Home and cellphone numbers.
Schedules.
Social security numbers.
It’s not that you should never share this information. There are lots of great, legitimate sites that require it. But once you put information online, it’s easy to lose control of who sees it and what they do with it. Revealing personal information online can make you a target for identity theft, scams, computer hacks and other trouble.
Examples from the News
A 14-year-old English girl posted details about her birthday party online only to have it crashed by 800 people. Her uninvited “guests” did more than $48,000 of damage to her parents’ home.7
A 17-year old MD teen was playing a game on Facebook which asked users to fill out loan applications for extra points. The teen was later contacted by a car dealership that wanted to discuss his application.8
Guard your personal information online:
Have a different password for online accounts - If they all use the same password, they will be easier to hack into.
Use privacy settings to limit who has access to your information - These can change often, so don’t forget to check back and make sure that your information is still limited to the people that you want to see it.
Remember who you friend - Your friends have access to whatever you post, make sure they are people you trust.
Limit access to your location - A lot of services and devices have GPS capabilities which let you share where you are. For example, geolocation tags may be automatically embedded in the pictures you take with smartphones and tablets. Make sure to disable these functions and only give people you trust information about your whereabouts.
Look for a lock symbol or “https” in the address bar of websites that ask for financial information.
Don’t share others’ personal information, for example, sharing a friend’s cell phone number online.
Don’t share passwords, even with close friends, a boyfriend or a girlfriend.
Suggested Activity
NetSmartz Workshop offers the tip sheet “Your Guide to Social Networking” at www.NetSmartz.org/tipsheets. Have teens read it and discuss why they are or are not following the tips.
In addition to being careful when revealing personal information online, you should be cautious about posting images and comments which contain inappropriate information such as:
Drinking, drug use and other criminal activities.
Hate speech - such as slurs against someone’s sexuality, race or religion.
Lewd or offensive gestures.
Profanity.
Revealing or suggestive images.
Threats.
Posting these things online may:
Ruin your reputation.
Get you in trouble with your parents, school or the law.
Damage future opportunities, such as getting into college or getting a job.
Examples from the News
Three 14-year-old girls from IN were joking online about which classmate they would like to kill. They used smiley faces and other emoticons to show that they were joking, but their school didn’t take it that way. After a parent alerted school officials, all three girls were expelled.9
A MO cheerleader got in trouble after a picture of her pretending to drink beer was posted to Instagram. Her school suspended her from cheering for a game and gave her community service.10
More than 100 TN high school students were suspended after a video showing students swearing was posted on YouTube. The video was shot during the school day.11
A 17-year-old MA boy was fired from his job at a sandwich shop after making racist tweets.12
Defining what information is inappropriate can be tricky, but here’s a good rule of thumb. If it can get you in trouble offline, it can probably get you in trouble online too.
In order to limit misunderstandings, consider the following before posting content online:
Would the adults in my life - parents, relatives, teachers, coaches and employers - think this is appropriate?
Could this get me into trouble at school or with the law?
Who might be hurt or embarrassed by this content?
Does it give any information about me or another person that should not be shared?
What does this content say about the kind of person I am? Is that how I want to be seen?
How could this impact my future opportunities, such as scholarships, college acceptances and employment?
Sexting is one way that some teens share inappropriate information. Sexting is the sharing of nude or suggestive pictures and videos through text messages. Although only 4% of teens are sexting, stories about it have been all over the news. 13 You may even know people who have been asked to do it. Teens who get involved with sexting are usually:
Joking around with friends.
In a relationship, where a girlfriend or boyfriend asks for a photo.
Flirting or trying to impress a crush.
Getting a request to sext might make you feel:
Flattered, because it means that someone thinks you’re attractive.
Angry, because someone is asking you for something so private.
Pressured, especially if it comes from a boyfriend, girlfriend or crush.
As you watch this video, think about how the girl feels when she gets a request to sext from her boyfriend. Then, think about how she feels after it has been sent.
(Click to show video.)
(Video plays.) Your Photo Fate
https://www.youtube.com/watch?v=kiGfpt2hjAE
The girl in the video thinks that only her boyfriend will see the image. But she soon learns that once you share an image, it is out of your control. One study estimated that 88% of the self-made sexual or suggestive images that teens post online are re-posted to adult websites.14
If you take a revealing image of yourself:
It could be lost if you misplace or lose your cell phone.
It may be passed around without your permission. For example, an ex-boyfriend or girlfriend may share the sext to get revenge.
People may bully or judge you because of the image. Some teens have been bullied so badly because of sexting images that they have been afraid to go to school.
The person that receives the image might try to use it to blackmail you into sending more images.
You may get in trouble with your school or with law enforcement, especially if there is evidence of blackmail, bullying or forwarding without permission. Some teens have been suspended from class, sports teams and other activities. Others have been charged with a crime and had to complete community service or educational programs.
Examples from the News
Sixteen KY students were suspended and banned from their school’s homecoming dance after nude photos were found on their cell phones.15
Three WA teens who got in trouble for forwarding the nude photo of a classmate had to complete community service, apologize to their classmate and start a program at their school to educate their peers about the dangers of texting.16
A 16-year-old GA teen was suspended for six days after tweeting a revealing photo that a classmate posted to his Facebook page. The school suspended him on a bullying violation.17
Once a sexting picture or video gets out of your hands, it is out of your control. Fortunately, you can choose to stay in control before it ever gets to that point.
Don’t take images of yourself that you wouldn’t want everyone to see.
Don’t forward anyone else’s picture or video. Imagine how betrayed you’d feel if this happened to you.
Don’t ask or pressure anyone to share an image. Many teens send sexts because they’ve been asked to by a boyfriend, girlfriend or crush. But you shouldn’t ask anyone to take this kind of risk, especially if it’s someone you care about.
Talk to a trusted adult if you receive a revealing image, are being pressured into sending one or have sent one.
While talking to an adult may seem difficult or embarrassing, it is important that you get one involved. An adult can help you by:
Talking to your school to stop any bullying that has happened because of the image being shared.
Working with law enforcement to investigate the situation.
Getting the image removed from any websites that it’s on.
Suggested Resource
NetSmartz Workshop offers a tip sheet about sexting for teens called “Tips to Prevent Sexting for Teens” at www.NetSmartz.org/tipsheets.
You’ve probably heard the saying, “Sticks and stones may break my bones, but words can never hurt me.” I want you to ask yourself, is that really true? People used words to hurt Amanda – words telling her that they’d be happy if she died and asking her to kill herself. Think about how that would make you feel. Perhaps you would:
Have low self-esteem.
Feel lonely and isolated from friends and family.
Be nervous about going online or to school.
Sometimes teens who are cyberbullied feel like hurting themselves, although suicide is rare. If a cyberbullied teen does commit suicide, he or she is usually dealing with other problems too. But it shouldn’t take that type of tragedy for us to care about people who are being cyberbullied.
We can all be careful about what we do and say to people, both on- and offline. And if you know that one of your friends is thinking about harming his or herself, bring it to the attention of a teacher, school counselor or other trusted adult immediately.
(If your state has a local suicide hotline, you may want to share the contact information here. Or, you may want to share the National Suicide Prevention Lifeline, 1-800-273-8255. )
Suggested Activity
Ask the teens to share aloud how being cyberbullied would make them feel or have them write a paragraph from the perspective of someone who is being cyberbullied.
If you are being cyberbullied, it may feel like there’s nothing you can do, but that isn’t true. Here are some steps you can take:
Don’t respond - That could make things worse.
Block the bully - Check out what options the websites and your cellphone provider have for blocking other users.
Save the evidence - You can take and save screenshots.
Set up new accounts - Make sure that only people you trust can contact you.
Make a report - Many websites have terms of service which prohibit cyberbullying and will remove offensive posts.
Talk to an adult you trust.
Some teens don’t want to tell an adult if they’re being cyberbullied. They may worry they’ll be told to stay offline or think that an adult can’t help. But adults can be very helpful in dealing with cyberbullying. They can:
Help you set up new accounts, especially if you need a new cellphone number.
Talk to your school - If a classmate is bullying you, your teachers and other school administrators may be able to help.
Work with law enforcement - If the bullies are threatening to harm you, have your trusted adult report it to law enforcement immediately.
Offer support - Sometimes it just helps to know that someone is on your side and available if you need to talk.
If you aren’t being cyberbullied, you may know someone who is experiencing it. Online there are often many bystanders – people who see the bullying happen, but aren’t involved. Bystanders may want to help, but are often afraid that:
The bully will turn on them.
They will be labeled a “snitch.”
That saying something will make the bullying worse.
But bystanders are important. They can help bring cyberbullying to an end by making it clear that bullying behaviors won’t be tolerated in their schools and friend groups. If you are comfortable standing up to a bully, then you can try the following steps:19
Document what you see and when - Save text messages or take screenshots.
Don’t encourage bullying behavior - For example, don’t “like” or share mean comments and posts.
Don’t participate in the bullying just to fit in.
Stand up for the victim - You can offer support through actions such as sending a friendly text message, making a positive post on their page or walking with them in the hallway.
Report the bullying to the website or service provider and to an adult you trust.
Suggested Activities
Ask the audience to work with the person or people next to them to brainstorm more ways that bystanders can help cyberbullying victims.
Sometimes people feel like they have good reasons to cyberbully someone, like if that person has been bullying them too. But a cyberbullying situation can easily get out of control, and you don’t know what could happen. You could really hurt someone’s feelings or get in trouble at school or with the law. If you’re tempted to cyberbully, remember:
While you don’t have to like everyone, you can keep critical comments to yourself.
You don’t have to forward rumors or embarrassing photos.
You don’t have to comment on insulting or harassing posts.
Instead of cyberbullying, focus on creating a better online environment by treating others with respect.
Suggested Resource
You may want to review the school’s rules about bullying and online harassment and its specific consequences. You may also want to review the state’s laws about cyberbullying and talk to the audience about those.
Examples from the News
Two FL teenagers were charged with aggravated stalking of a minor under 16 after they set up a fake profile for a classmate. They had altered images of her to make it look like she was engaged in sexual acts.20
A Canadian teen was arrested and charged after posting a fight video on his Facebook page.21
Middle school students in CA were investigated by the law enforcement for allegedly hacking into a classmate’s Instagram account and placing sexually derogatory content on it.22