The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost feelings of calmness, happiness and focus.
The document discusses social media and its use by schools. It notes that social media is a form of media based on online conversations and interactions. It then discusses why schools use social media, including to communicate about activities, build community, and stay connected with alumni. The document provides examples of schools that have successfully used social media and offers tips for schools on ensuring privacy and getting started with social media.
Be a Digital Trailblazer When Building Your Brand Carrie Kerpen
The document discusses the importance of personal branding, especially online, and becoming a "digital trailblazer." It provides 5 reasons for developing a strong personal brand, including that jobs may not be permanent and others are searching for you online. It encourages the reader to think about what makes them unique and compelling and how to tell their story succinctly across social media platforms. Examples are given of digital trailblazers leveraging different networks and some resources are listed to help readers craft their personal brand online.
The document discusses the benefits of meditation for reducing stress and anxiety. Regular meditation practice can help calm the mind and body by lowering heart rate and blood pressure. Studies have shown that meditating for just 10-20 minutes per day can have significant positive impacts on both mental and physical health over time.
The document discusses the Holy Trinity of Christianity - the Father, Son, and Holy Spirit. It provides descriptions of each person of the Trinity: the Father is the presence in heaven, the Son is the Word of God known through the incarnation, and the Spirit is God's abode on Earth. It also touches on themes of forgiveness, mercy, and God's compassion for humanity.
Digital footprints can provide benefits like not having to repeatedly log in or submit personal details. However, they also carry costs like revealing what websites and searches you use and who is in your social circle. This information can then be used by companies for commercial purposes like tracking you, customizing ads for you, and marketing to you. There are three ways to manage your digital footprint - improve your understanding of privacy issues, develop habits like keeping different parts of your online presence separate, and using privacy settings to secure your personal data instead of having it disclosed by default.
This document does not provide enough context or content to generate a meaningful 3 sentence summary. No verbs, subjects or objects are included to understand the intent or essential information being conveyed.
This document discusses using movies to teach religious concepts and sacraments. It suggests that movies tell stories and can reveal inner realities and signs of the divine. It recommends the strategy of media mindfulness to become aware of values presented in movies and talk about what matters. Specific movie clips are linked to sacraments like baptism in The Lion King and reconciliation in Shrek to show how movies can illustrate religious ideas. Resources for parenting advice and media education are also provided.
The document discusses social media and its use by schools. It notes that social media is a form of media based on online conversations and interactions. It then discusses why schools use social media, including to communicate about activities, build community, and stay connected with alumni. The document provides examples of schools that have successfully used social media and offers tips for schools on ensuring privacy and getting started with social media.
Be a Digital Trailblazer When Building Your Brand Carrie Kerpen
The document discusses the importance of personal branding, especially online, and becoming a "digital trailblazer." It provides 5 reasons for developing a strong personal brand, including that jobs may not be permanent and others are searching for you online. It encourages the reader to think about what makes them unique and compelling and how to tell their story succinctly across social media platforms. Examples are given of digital trailblazers leveraging different networks and some resources are listed to help readers craft their personal brand online.
The document discusses the benefits of meditation for reducing stress and anxiety. Regular meditation practice can help calm the mind and body by lowering heart rate and blood pressure. Studies have shown that meditating for just 10-20 minutes per day can have significant positive impacts on both mental and physical health over time.
The document discusses the Holy Trinity of Christianity - the Father, Son, and Holy Spirit. It provides descriptions of each person of the Trinity: the Father is the presence in heaven, the Son is the Word of God known through the incarnation, and the Spirit is God's abode on Earth. It also touches on themes of forgiveness, mercy, and God's compassion for humanity.
Digital footprints can provide benefits like not having to repeatedly log in or submit personal details. However, they also carry costs like revealing what websites and searches you use and who is in your social circle. This information can then be used by companies for commercial purposes like tracking you, customizing ads for you, and marketing to you. There are three ways to manage your digital footprint - improve your understanding of privacy issues, develop habits like keeping different parts of your online presence separate, and using privacy settings to secure your personal data instead of having it disclosed by default.
This document does not provide enough context or content to generate a meaningful 3 sentence summary. No verbs, subjects or objects are included to understand the intent or essential information being conveyed.
This document discusses using movies to teach religious concepts and sacraments. It suggests that movies tell stories and can reveal inner realities and signs of the divine. It recommends the strategy of media mindfulness to become aware of values presented in movies and talk about what matters. Specific movie clips are linked to sacraments like baptism in The Lion King and reconciliation in Shrek to show how movies can illustrate religious ideas. Resources for parenting advice and media education are also provided.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
Creative operations teams expect increased AI use in 2024. Currently, over half of tasks are not AI-enabled, but this is expected to decrease in the coming year. ChatGPT is the most popular AI tool currently. Business leaders are more actively exploring AI benefits than individual contributors. Most respondents do not believe AI will impact workforce size in 2024. However, some inhibitions still exist around AI accuracy and lack of understanding. Creatives primarily want to use AI to save time on mundane tasks and boost productivity.
Organizational culture includes values, norms, systems, symbols, language, assumptions, beliefs, and habits that influence employee behaviors and how people interpret those behaviors. It is important because culture can help or hinder a company's success. Some key aspects of Netflix's culture that help it achieve results include hiring smartly so every position has stars, focusing on attitude over just aptitude, and having a strict policy against peacocks, whiners, and jerks.
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
PepsiCo provided a safe harbor statement noting that any forward-looking statements are based on currently available information and are subject to risks and uncertainties. It also provided information on non-GAAP measures and directing readers to its website for disclosure and reconciliation. The document then discussed PepsiCo's business overview, including that it is a global beverage and convenient food company with iconic brands, $91 billion in net revenue in 2023, and nearly $14 billion in core operating profit. It operates through a divisional structure with a focus on local consumers.
Content Methodology: A Best Practices Report (Webinar)contently
This document provides an overview of content methodology best practices. It defines content methodology as establishing objectives, KPIs, and a culture of continuous learning and iteration. An effective methodology focuses on connecting with audiences, creating optimal content, and optimizing processes. It also discusses why a methodology is needed due to the competitive landscape, proliferation of channels, and opportunities for improvement. Components of an effective methodology include defining objectives and KPIs, audience analysis, identifying opportunities, and evaluating resources. The document concludes with recommendations around creating a content plan, testing and optimizing content over 90 days.
How to Prepare For a Successful Job Search for 2024Albert Qian
The document provides guidance on preparing a job search for 2024. It discusses the state of the job market, focusing on growth in AI and healthcare but also continued layoffs. It recommends figuring out what you want to do by researching interests and skills, then conducting informational interviews. The job search should involve building a personal brand on LinkedIn, actively applying to jobs, tailoring resumes and interviews, maintaining job hunting as a habit, and continuing self-improvement. Once hired, the document advises setting new goals and keeping skills and networking active in case of future opportunities.
A report by thenetworkone and Kurio.
The contributing experts and agencies are (in an alphabetical order): Sylwia Rytel, Social Media Supervisor, 180heartbeats + JUNG v MATT (PL), Sharlene Jenner, Vice President - Director of Engagement Strategy, Abelson Taylor (USA), Alex Casanovas, Digital Director, Atrevia (ES), Dora Beilin, Senior Social Strategist, Barrett Hoffher (USA), Min Seo, Campaign Director, Brand New Agency (KR), Deshé M. Gully, Associate Strategist, Day One Agency (USA), Francesca Trevisan, Strategist, Different (IT), Trevor Crossman, CX and Digital Transformation Director; Olivia Hussey, Strategic Planner; Simi Srinarula, Social Media Manager, The Hallway (AUS), James Hebbert, Managing Director, Hylink (CN / UK), Mundy Álvarez, Planning Director; Pedro Rojas, Social Media Manager; Pancho González, CCO, Inbrax (CH), Oana Oprea, Head of Digital Planning, Jam Session Agency (RO), Amy Bottrill, Social Account Director, Launch (UK), Gaby Arriaga, Founder, Leonardo1452 (MX), Shantesh S Row, Creative Director, Liwa (UAE), Rajesh Mehta, Chief Strategy Officer; Dhruv Gaur, Digital Planning Lead; Leonie Mergulhao, Account Supervisor - Social Media & PR, Medulla (IN), Aurelija Plioplytė, Head of Digital & Social, Not Perfect (LI), Daiana Khaidargaliyeva, Account Manager, Osaka Labs (UK / USA), Stefanie Söhnchen, Vice President Digital, PIABO Communications (DE), Elisabeth Winiartati, Managing Consultant, Head of Global Integrated Communications; Lydia Aprina, Account Manager, Integrated Marketing and Communications; Nita Prabowo, Account Manager, Integrated Marketing and Communications; Okhi, Web Developer, PNTR Group (ID), Kei Obusan, Insights Director; Daffi Ranandi, Insights Manager, Radarr (SG), Gautam Reghunath, Co-founder & CEO, Talented (IN), Donagh Humphreys, Head of Social and Digital Innovation, THINKHOUSE (IRE), Sarah Yim, Strategy Director, Zulu Alpha Kilo (CA).
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
The search marketing landscape is evolving rapidly with new technologies, and professionals, like you, rely on innovative paid search strategies to meet changing demands.
It’s important that you’re ready to implement new strategies in 2024.
Check this out and learn the top trends in paid search advertising that are expected to gain traction, so you can drive higher ROI more efficiently in 2024.
You’ll learn:
- The latest trends in AI and automation, and what this means for an evolving paid search ecosystem.
- New developments in privacy and data regulation.
- Emerging ad formats that are expected to make an impact next year.
Watch Sreekant Lanka from iQuanti and Irina Klein from OneMain Financial as they dive into the future of paid search and explore the trends, strategies, and technologies that will shape the search marketing landscape.
If you’re looking to assess your paid search strategy and design an industry-aligned plan for 2024, then this webinar is for you.
5 Public speaking tips from TED - Visualized summarySpeakerHub
From their humble beginnings in 1984, TED has grown into the world’s most powerful amplifier for speakers and thought-leaders to share their ideas. They have over 2,400 filmed talks (not including the 30,000+ TEDx videos) freely available online, and have hosted over 17,500 events around the world.
With over one billion views in a year, it’s no wonder that so many speakers are looking to TED for ideas on how to share their message more effectively.
The article “5 Public-Speaking Tips TED Gives Its Speakers”, by Carmine Gallo for Forbes, gives speakers five practical ways to connect with their audience, and effectively share their ideas on stage.
Whether you are gearing up to get on a TED stage yourself, or just want to master the skills that so many of their speakers possess, these tips and quotes from Chris Anderson, the TED Talks Curator, will encourage you to make the most impactful impression on your audience.
See the full article and more summaries like this on SpeakerHub here: https://speakerhub.com/blog/5-presentation-tips-ted-gives-its-speakers
See the original article on Forbes here:
http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/carminegallo/2016/05/06/5-public-speaking-tips-ted-gives-its-speakers/&refURL=&referrer=#5c07a8221d9b
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
Everyone is in agreement that ChatGPT (and other generative AI tools) will shape the future of work. Yet there is little consensus on exactly how, when, and to what extent this technology will change our world.
Businesses that extract maximum value from ChatGPT will use it as a collaborative tool for everything from brainstorming to technical maintenance.
For individuals, now is the time to pinpoint the skills the future professional will need to thrive in the AI age.
Check out this presentation to understand what ChatGPT is, how it will shape the future of work, and how you can prepare to take advantage.
The document provides career advice for getting into the tech field, including:
- Doing projects and internships in college to build a portfolio.
- Learning about different roles and technologies through industry research.
- Contributing to open source projects to build experience and network.
- Developing a personal brand through a website and social media presence.
- Networking through events, communities, and finding a mentor.
- Practicing interviews through mock interviews and whiteboarding coding questions.
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
1. Core updates from Google periodically change how its algorithms assess and rank websites and pages. This can impact rankings through shifts in user intent, site quality issues being caught up to, world events influencing queries, and overhauls to search like the E-A-T framework.
2. There are many possible user intents beyond just transactional, navigational and informational. Identifying intent shifts is important during core updates. Sites may need to optimize for new intents through different content types and sections.
3. Responding effectively to core updates requires analyzing "before and after" data to understand changes, identifying new intents or page types, and ensuring content matches appropriate intents across video, images, knowledge graphs and more.
A brief introduction to DataScience with explaining of the concepts, algorithms, machine learning, supervised and unsupervised learning, clustering, statistics, data preprocessing, real-world applications etc.
It's part of a Data Science Corner Campaign where I will be discussing the fundamentals of DataScience, AIML, Statistics etc.
Time Management & Productivity - Best PracticesVit Horky
Here's my presentation on by proven best practices how to manage your work time effectively and how to improve your productivity. It includes practical tips and how to use tools such as Slack, Google Apps, Hubspot, Google Calendar, Gmail and others.
The six step guide to practical project managementMindGenius
The six step guide to practical project management
If you think managing projects is too difficult, think again.
We’ve stripped back project management processes to the
basics – to make it quicker and easier, without sacrificing
the vital ingredients for success.
“If you’re looking for some real-world guidance, then The Six Step Guide to Practical Project Management will help.”
Dr Andrew Makar, Tactical Project Management
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Editor's Notes
(Introduce yourself)
Social media revolution
https://www.youtube.com/watch?v=s7UcQZCX_LE
What are some of the things you like to do online?
(Pause for audience response. If you need to prompt the audience, use the questions below. Take note of their answers and tailor your presentation to their current interests.)
How many of you like to:
Text or play games on your cell phone or your parent’s phone?
Use Google to help with your homework?
Play computer games or games on a PlayStation Vita or Xbox?
Download music from iTunes?
Watch videos on YouTube?
Play in a virtual world like Club Penguin or Minecraft?
Chat with family and friends on Skype?
Use a social networking site like Facebook or Twitter?
How many of you have learned about Internet safety before?
(Pause for audience response.)
Although you may have already heard about some of these things we’ll be discussing, it’s always important to hear them again. Why?
As you get older, you’ll be facing more and more of these issues.
The Internet is always changing, so you might need new strategies to be safer.
Practice makes perfect!
Today we’ll be talking about:
How to avoid online predators and what to do if one contacts you.
What kind of personal information is not okay to post.
How posting something inappropriate online can have serious consequences.
Why we all need to work together to stop cyberbullying.
No matter what you like to do online, there’s one rule that applies to any situation: avoid the risks! Some examples of taking risks are:
Sending mean messages.
Posting inappropriate pictures.
Talking to people you don’t know.
Visiting adult sites.
All of these are risky because you might get into trouble for doing them or you might be putting yourself in danger. Protect yourself by making responsible choices. This will help you avoid risks.
Online safety video
https://www.youtube.com/watch?v=M-njh8mFvVk
A risk you’ll want to avoid is posting too much online - that includes information and pictures. Revealing too much about yourself online is risky because:
It can spread very quickly.
It can reach people you may not want it to.
Personal information that you shouldn’t share online includes your:
Passwords.
Schedule.
School.
Address.
Home/cell phone number.
Everything you post online can potentially be seen by a lot of people, so you have to be careful about what you tell and who you tell. Sharing personal information online is a security risk. That means that:
You might become the victim of an online scam.
Someone might hack into your computer or online accounts.
Be careful not to share this information with anyone. You should also be careful not to share your family or friends’ personal information online either. Here are two examples of when you should avoid sharing someone else’s personal information:
One friend asks you for another’s phone number. Don’t post it online! Call them with the number instead.
Your friend asks for your email password because she says best friends share everything. Don’t share your password! The only person it’s okay to share your password with is your parent or guardian.
Inappropriate information that you shouldn’t share online includes:
Embarrassing things about you or other people.
Revealing pictures.
Pranks.
Illegal behavior (drugs, alcohol, etc.).
Hate speech.
Posting these things online means you may:
Get a bad reputation.
Be punished at home, at school or even by the law.
Hurt your chances of getting into college or getting a job in the future.
Examples from the News
A middle school student in MI was arrested after posting threatening messages on Facebook saying he was going to hurt students at his old school. He was charged with some very serious crimes.3
Several middle school students in MN were suspended for passing around an inappropriate cell phone photo. Someone had taken a picture of another student in the locker room and sent it to others.4
In this next video, you’ll see how a football player named Tad is worried that the information he’s posted online might not give recruiters and coaches the best impression of him.
(Click to show video.)
As you saw, Tad decided to clean up his profile when his friend pointed out that some posts made him look immature. How many of you:
Have a profile on a social media site or app like Facebook, Instagram or Twitter?
Play in a virtual world like Neopets or Runescape?
Have a gaming account with Xbox or Playstation?
(Pause for audience response.)
For all of these online accounts, you want to be sure you’re not sharing too much. Here are some tips to avoid revealing too much online:
Don’t share personal information - Remember, that includes your address, phone numbers, passwords and schedule.
Use privacy settings and check them often - That means setting your page to private and limiting who can see your posts and pictures.
Choose appropriate screennames - You don’t want to give the wrong impression, so pick something that’s not embarrassing or offensive.
Only accept friends you know in real life - That goes for “friends of friends,” too. If you don’t know them, don’t add them!
Don’t make jokes that are threats - They can be taken out of context and you can get in serious trouble.
A lot of you have probably heard stories about bad people online who hurt kids. These are called online predators. What can you tell me about them?
(Pause for audience response. Let tweens tell you what they’ve heard, even if what they’re saying is exaggerated or false. If you need to prompt the audience, use the possible responses below.)
You might have heard:
They pretend to be kids so you’ll talk to them.
They can show up at your house and hurt you.
They are old and creepy.
A lot of what you’ve heard is not true. Here are some facts about online predators you may be surprised to hear:
It’s not very common for kids your age to meet an online predator.
Most predators don’t pretend to be kids; they’re honest about being an adult.
It happens to both girls and boys.
Certain things are more likely to attract a predator, like talking to people you don’t know online, talking to them about adult things and posting revealing pictures.
If a predator ever contacts you, it’s never your fault!
It’s important to understand what a predator is so you know how to recognize them. An online predator is an adult who:
You talk to online or on a cell phone.
Is too old to be dating you.
Tries to have an adult relationship with you.
May ask for revealing pictures of you.
May want to meet you offline.
Not all people you meet online are predators, but you shouldn’t risk talking to people you don’t know. Watch this video to see how Keyan’s new online friend raises some red flags for his friends.
(Click to show video.)
Some of Tracy’s behavior is also what online predators do, so it’s a good thing Keyan decided not to trust her. Predators try to get you to trust them by flattering you and pretending they care. This is called “grooming.”
A predator who is trying to groom you might:
Send gifts through the mail, like bus tickets, cell phones or webcams.
Turn you against your family and friends.
Make you feel guilty or ashamed.
Talk about adult things.
Share or ask for revealing pictures.
Keep in mind that not everyone who asks you to do something inappropriate is an online predator. Here are two examples of how people online might ask you to do something inappropriate:
You’re in a video chat with friends and one of them jokingly asks you to pull up your shirt.
Someone emails you a link to an adult website they want you to see.
These inappropriate requests do not make someone an online predator. It might just be a friend joking around, but it is still not okay!
Examples from the News
A 12-year-old girl in UT met an older man from VT online. He told her he loved her and asked her to send revealing pictures of herself using her cell phone. She sent the pictures and he was arrested.1
A 12-year-old girl in TX was sending revealing pictures and inappropriate text messages to an older man. He had sent her the cell phone so they could talk without her mother knowing. They had planned to meet up, but her teacher found the text messages and he was arrested.2
Take a look at this journal entry from a teen writing about someone they met online:
“Today he sent me a cell phone. Now we can talk all the time and my parents don’t have to know. He asked me to keep us a secret because my parents won’t understand.”
Can you see any signs that this boy or girl is being groomed?
(Pause for audience response. If you need to prompt the audience, use the answers below.)
Grooming signs include:
Getting a cell phone.
Talking all the time.
Keeping secrets from parents.
Thinking parents won’t understand.
Suggested Activity
Have students brainstorm with the person next to them three things they would say to a friend who was forming a relationship like this with someone online. What would they say to convince their friend it wasn’t a good idea?
If someone you met online is asking you to do things that make you uncomfortable or is trying to get you to meet in person, there are many things you can do. You should:
Block them.
Not accept them as a friend.
Not agree to meet them offline.
Tell a trusted adult.
It may be hard to tell an adult because:
You’re afraid they won’t let you go online anymore.
You may not think an adult can help.
It may be awkward to tell them what’s been going on.
You’re afraid they’ll blame you.
Even though it’s hard, it’s important to talk to an adult you trust, like your parent, another relative, a teacher or a counselor at school. Adults should not be talking to kids online and making them uncomfortable, but you have the power to stop them by telling someone.
Together with an adult you trust, you can report the predator to www.cybertipline.com. You can report anyone who:
Sends you adult pictures or videos.
Talks to you about adult things.
Asks to meet you in person.
Reporting means you’re standing up for yourself and making sure these people don’t bother anyone else.
The next risk we’re going to talk about is probably something you’re already familiar with. Cyberbullying is exactly what it sounds like - the combination of bullying and technology.
Some examples of cyberbullying are:
Sending mean text messages.
Spreading rumors online.
Creating fake profiles to make fun of someone.
Recording and posting fight videos.
Photoshopping pictures to make someone look bad.
Trash talking someone in an online game.
Sometimes people cyberbully others because:
They think it’s funny.
They don’t like someone and want to hurt their feelings.
They think someone is different and call them mean words, like “gay.” (Share this only if you judge the tweens to be mature enough to discuss it or if they have already mentioned it themselves.)
The good news is that most kids aren’t involved in cyberbullying, but it’s still a serious problem that everyone here needs to think about.
Suggested Activity
Ask students to name some examples of cyberbullying they’ve seen. If they aren’t comfortable sharing, they can use fake names.
In this video, you’ll see how Lolo feels when she starts receiving mean text messages on her cell phone.
(Click to show video.)
Sometimes people don’t really understand just how much cyberbullying can hurt. Someone who is cyberbullied might:
Feel sad and alone, like Lolo in the video.
Not want to come to school to face their bullies.
Think the bullying will get worse if they tell someone.
Believe that no one can help.
(Share the following if you judge the tweens to be mature enough to discuss it or if they have already mentioned it themselves. If they have mentioned it, then they are curious and may have heard some incorrect information that you should dispel.)
You might have heard some stories in the news about kids who have been cyberbullied. Maybe you’ve even heard that they committed suicide, but there are a few important things to remember about these cases:
Most kids who are cyberbullied do not try to hurt themselves; these are extreme cases that have made the news, but they are not common.
These kids are usually dealing with other problems in their lives, not just bullying, that lead to them take their own lives.
You never know what other problems someone has going on, so that’s why it’s important you don’t add to them by bullying.
(If your state has a local suicide hotline, you may want to share the contact information here. Or, you may want to share the National Suicide Prevention Lifeline, 1-800-273-8255. )
Examples from the News
A Canadian teen named Amanda Todd committed suicide after she was cyberbullied, harrassed online and bullied by her classmates starting in the seventh grade. She left behind a YouTube video telling her story.5
Jessica Logan was 18 when she committed suicide. Her ex-boyfriend had e-mailed a revealing picture of her to a lot of people. Jessica was bullied in school and online.6
If you are being cyberbullied, here are some steps you can take to make it stop:
Don’t respond to the messages - That will only make it worse.
Block the bully - Most websites and cell phone companies have options for blocking other users.
Save the evidence - Take screenshots of the messages and save them in case you need proof.
Set up new accounts - Only give the new account information to people you trust.
Make a report to the website where the bullying took place - Most websites have ways to report cyberbullies and will remove offensive posts.
Tell an adult you trust - Adults don’t always have all the answers, but they really want to help!
Remember, if someone is being hurt, it’s never wrong to tell an adult. Adults can help by:
Listening to you - Sometimes just talking about it can help.
Talking to the school - If you’re being bullied by a classmate, your teachers should know so they can help protect you during the school day.
Setting up new accounts for you - You’ll especially need their help if you need to change your cell phone number.
Even if you haven’t been cyberbullied yourself, you might have seen it happening to other people. Ignoring it makes you a bystander - that means you stand by and watch while others are being hurt. Bystanders are sometimes afraid to speak up because:
They think the bully might target them next.
They don’t think adults can help.
They don’t want to be seen as a tattletale.
If you see cyberbullying happening, you do have the power to stop it. Here are some ways you can help:
Show support for the person being bullied - This might mean making an extra effort to be nice to them, sending them a friendly message or even just sitting with them at lunch.
Refuse to join in the cyberbullying - Don’t just ignore it; make it clear you won’t participate because it’s wrong.
Tell the cyberbully to stop, but only if you feel safe doing so - Bullies continue being mean when nobody acts to stop them, so make sure they know you don’t support what they’re doing.
Report the cyberbullying to an adult - This could be your parent, a family member you trust or a teacher at school.
Suggested Activity
Ask everyone to brainstorm three ways that they could offer help, rather than be a bystander.
You don’t have to be best friends with everyone. You might have different interests or personalities, but that doesn’t mean you have to be mean to them. Here are some ways you can avoid becoming a cyberbully yourself:
Keep critical comments to yourself - It’s okay not to like someone, but it’s not okay to intentionally hurt them.
Don’t start or forward rumors - Even if you think you’re being funny, rumors can get out of control and can be very hurtful.
Don’t post anything meant to embarrass someone else - It’s not just your friends who can see something mean you’ve posted online; mean comments like that can travel fast and cause a lot of harm.
Remember that if you cyberbully someone, there are consequences:
Your account can be deleted by a website if you break their rules.
You can get in trouble at school if you are cyberbullying a classmate (some kids have been suspended or kicked off of school sports teams for cyberbullying).
You might have to talk to the police if someone reports the cyberbullying to them (some kids have even been charged with crimes for harassing others online).
Examples from the News
More than 20 middle school students in WA were suspended for joining a club on Facebook targeting another student.7
5 NC teens were arrested for cyberbullying. They had to complete a class educating them about cyberbullying, and they were banned from using social media for a year.8
3 IN middle school students were expelled for cyberbullying on Facebook. They had posted messages describing how they would kill other students and a teacher, but claim it was all a joke.9
Cyberbullying is not a problem that we can just ignore. It’s a serious issue and everyone needs to work together to make it stop:
Take steps to protect yourself if it happens to you.
Speak up if you see it happening to someone else.
Above all, be kind to one another.
Suggested Activity
If you are presenting at a school that has its own cyberbullying/bullying policy, review the policy with students so they understand what is expected of them.
Today we talked about many different ways you can be safer online. Here are some of the most important tips to remember:
Be careful who you talk to online - Adults you don’t know should not be contacting you.
Think before you post personal information or something that could be inappropriate - You might regret it later.
Don’t be a cyberbully - Even if you don’t like someone, it’s never okay to be mean.
Tell an adult when you need help - Even if you just need someone to talk to, adults can help!
Most kids already avoid the risks we talked about and are responsible about what they do online:
They don’t talk to online predators.
They don’t post inappropriate information or pictures.
They don’t cyberbully others.
Even though you’re probably already doing these things, your parents and teachers still worry because they hear a lot of stories on the news about what can go wrong. Show them you know what you’re doing! They’ll feel confident that you’re being responsible online and you’ll feel confident turning to them when you need help.
To help you remember what we learned today, check out the videos and games on NSTeens.org.