Talk delivered to 8000 students and women in Lapu Lapu City, Philippines last March 3 advocating for responsible internet use and the fight against cyberprostitution during the opening salvo of their Women's Month Celebration.
Cultural Differences between Americans and UkrainiansRicca Ramos
The document discusses several cultural differences between Americans and Ukrainians, such as eye contact, relationships, advice giving, and views on cheating. Ukrainians are more comfortable with direct eye contact and have very close friendships, while Americans see intense staring as aggressive and value more casual friendships. The document advises being aware of cultural norms to avoid misunderstandings between Americans and Ukrainians.
A Team Approach for Parents and Teachers discusses cyberbullying and provides strategies for parents, teachers, and schools to address this issue. It defines cyberbullying and describes various forms such as flaming, harassment, denigration, outing and trickery, impersonation, exclusion, and cyberstalking. It also discusses legal issues around schools' ability to discipline off-campus cyberbullying and the importance of partnership between parents, teachers, and students to educate about appropriate online behavior and address cyberbullying.
1) The document discusses cyber bullying among adolescents and examines factors that influence their vulnerability to being cyber bullied or becoming cyber bullies.
2) It analyzes different motives for cyber bullying, including anonymity, entertainment, revenge, social status, and discusses how anonymity in particular gives adolescents confidence and makes punishment difficult.
3) The conclusion is that anonymity is a key reason adolescents cyber bully, and reducing anonymous use of technology could help decrease cyber bullying. Further research is still needed as technology continues advancing.
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
This presentation contains Introduction of Phishing attack, its types and Various techniques, their impact with real live example, after that its Avoidance, Prevention and Solution. Also it contains brief introduction of SSL and HTTPS with their working.
This document discusses cyberbullying, including definitions, statistics, causes, effects, those affected, the role of technology, punishment, and how to prevent it. Cyberbullying is defined as bullying using electronic means. Nearly 43% of kids report being bullied online, and it most commonly occurs to ages 15-17 via cell phones. Cyberbullying can cause emotional and psychological harm, and even suicide. While Pakistan does not have the highest cyberbullying rates, it is growing as internet usage increases, especially targeting women. The document recommends blocking bullies, reporting incidents, and educating others to help prevent cyberbullying.
This document discusses cyberbullying, including definitions, types, perpetrators, victims, and prevention strategies. It defines cyberbullying as intentional and repeated harmful behavior through digital means, involving an imbalance of power. Two main types are direct attacks through messages and proxy bullying using others. Perpetrators commonly bully due to anger, revenge or entertainment, while victims are often younger than bullies. Consequences for victims include anxiety, depression, low self-esteem and in some cases suicide. The document recommends blocking and reporting bullies, as well as saving evidence and discussing issues with trusted adults. It emphasizes the importance of privacy online and developing realistic expectations of relationships.
This document discusses cyberbullying, defining it as tormenting, threatening, harassing, humiliating or embarrassing someone using the internet, digital technologies or mobile devices. It notes that a third of youth have experienced cyberbullying but only 10% tell parents or teachers. Examples are given of real cases that resulted in suicide. Cyberbullying can occur on emails, messaging, photos, social media, gaming sites and more. The document provides advice on how to prevent and respond to cyberbullying.
1st Students Led conference of Surefoot International School, presented by Grade 10 students on 17th October, 2014. An ICT Integrated into Leadership and Service program the topic covered is CYBER CRIME.
Cultural Differences between Americans and UkrainiansRicca Ramos
The document discusses several cultural differences between Americans and Ukrainians, such as eye contact, relationships, advice giving, and views on cheating. Ukrainians are more comfortable with direct eye contact and have very close friendships, while Americans see intense staring as aggressive and value more casual friendships. The document advises being aware of cultural norms to avoid misunderstandings between Americans and Ukrainians.
A Team Approach for Parents and Teachers discusses cyberbullying and provides strategies for parents, teachers, and schools to address this issue. It defines cyberbullying and describes various forms such as flaming, harassment, denigration, outing and trickery, impersonation, exclusion, and cyberstalking. It also discusses legal issues around schools' ability to discipline off-campus cyberbullying and the importance of partnership between parents, teachers, and students to educate about appropriate online behavior and address cyberbullying.
1) The document discusses cyber bullying among adolescents and examines factors that influence their vulnerability to being cyber bullied or becoming cyber bullies.
2) It analyzes different motives for cyber bullying, including anonymity, entertainment, revenge, social status, and discusses how anonymity in particular gives adolescents confidence and makes punishment difficult.
3) The conclusion is that anonymity is a key reason adolescents cyber bully, and reducing anonymous use of technology could help decrease cyber bullying. Further research is still needed as technology continues advancing.
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
This presentation contains Introduction of Phishing attack, its types and Various techniques, their impact with real live example, after that its Avoidance, Prevention and Solution. Also it contains brief introduction of SSL and HTTPS with their working.
This document discusses cyberbullying, including definitions, statistics, causes, effects, those affected, the role of technology, punishment, and how to prevent it. Cyberbullying is defined as bullying using electronic means. Nearly 43% of kids report being bullied online, and it most commonly occurs to ages 15-17 via cell phones. Cyberbullying can cause emotional and psychological harm, and even suicide. While Pakistan does not have the highest cyberbullying rates, it is growing as internet usage increases, especially targeting women. The document recommends blocking bullies, reporting incidents, and educating others to help prevent cyberbullying.
This document discusses cyberbullying, including definitions, types, perpetrators, victims, and prevention strategies. It defines cyberbullying as intentional and repeated harmful behavior through digital means, involving an imbalance of power. Two main types are direct attacks through messages and proxy bullying using others. Perpetrators commonly bully due to anger, revenge or entertainment, while victims are often younger than bullies. Consequences for victims include anxiety, depression, low self-esteem and in some cases suicide. The document recommends blocking and reporting bullies, as well as saving evidence and discussing issues with trusted adults. It emphasizes the importance of privacy online and developing realistic expectations of relationships.
This document discusses cyberbullying, defining it as tormenting, threatening, harassing, humiliating or embarrassing someone using the internet, digital technologies or mobile devices. It notes that a third of youth have experienced cyberbullying but only 10% tell parents or teachers. Examples are given of real cases that resulted in suicide. Cyberbullying can occur on emails, messaging, photos, social media, gaming sites and more. The document provides advice on how to prevent and respond to cyberbullying.
1st Students Led conference of Surefoot International School, presented by Grade 10 students on 17th October, 2014. An ICT Integrated into Leadership and Service program the topic covered is CYBER CRIME.
Cyber bullying involves threatening, humiliating, or harassing others using the internet, cell phones, or other digital technologies. Common forms of cyber bullying include posting harmful information or false statements online to ridicule and embarrass victims. While cyber bullying can happen to anyone, girls and middle school students are particularly vulnerable targets. Left unaddressed, cyber bullying can have serious psychological and legal consequences for both bullies and victims.
Popular Issues in (Digital) Media LiteracyAlec Couros
A presentation on Popular & Contemporary issues in (Digital) Media Literacy for EC&I 831, Feb. 10/09, by Dr. Alec Couros. More on the course at http://eci831.wikispaces.com
The document discusses principles of graphics and layout for online environments. It explains that the goals of the lesson are to understand basic design principles, create infographics, use common file formats, edit images, and upload images to Photobucket. It then discusses key principles like balance, contrast, emphasis, movement, pattern, rhythm, proportion, and variety that are important for effective visual design. Finally, it suggests a formative activity where students create images demonstrating each principle.
The document summarizes key provisions of Republic Act No. 11053, which amended the Anti-Hazing Act of 1995. It defines hazing and outlines prohibited acts. Hazing is punishable if it results in death, rape, sodomy, or mutilation. Various persons can be held liable for hazing, including those present, actual participants, planners, and school/barangay authorities with knowledge who failed to prevent it. Regulated initiation rites are allowed with prior notice and no violence.
The document discusses the history of religious sites in Jerusalem including Solomon's Temple and the Dome of Rock. It then outlines major events and organizations such as the Crusades, Cabala, Freemasons, the French Revolution, and Napoleon Bonaparte. It suggests theories about a New World Order controlled by Zionists with one government, currency and ruled illuminati. It provides details on the establishment of Israel in 1948 and wars with neighboring countries as well as information about Israeli government and economy.
What is malware? How can I protect myself against malware on my computer? Helpful tips and information about computer Viruses, Worms, Trojans, Ransomware, Scareware, Spyware, Adware and Phishing mails.
Media and information literacy competency describes how communication is affected by media and information. The document provides procedures for an activity where students will analyze how media impacts communication by doing a bubble map in groups to identify different forms of media. They will then watch a video explaining what media is and discuss how Facebook in particular has changed communication by allowing people to connect online. Finally, students will write a 200 word essay describing how media and information affect communication.
The document discusses how information and communication technologies (ICTs) like social media can empower citizens and enable social change in developing nations. It provides examples of how platforms like Facebook and online petitions were used to disseminate information and garner support during important events in Philippine history like the EDSA Revolution and in the aftermath of disasters like Typhoon Yolanda. The document also outlines the concepts of digital citizenship, digital access, and online safety and ethics that are important for citizens to practice when using digital tools and platforms.
The document is a module on online safety, security, and netiquette for Grade 11 students. It contains the following key points:
1. It introduces the importance of online safety, security, and proper etiquette when using the internet. Personal information should be kept private and secure to avoid risks like identity theft, bullying, and scams.
2. It provides tips on online safety like using strong and unique passwords, only accessing secure websites, not sharing personal details, and knowing how to identify legitimate websites.
3. It discusses netiquette rules like being respectful, helpful, and forgiving online as well as avoiding flaming, spamming, and invading privacy. Following these rules promotes positive online
Cyberbullying involves using electronic communication to harass or threaten others. It can take many forms, such as sending humiliating messages, impersonating someone online, or publishing private information without consent. Victims of cyberbullying often experience anxiety, depression, and may have thoughts of suicide. Both cyberbullies and their victims are more likely to face issues like poor academic performance, substance abuse, and criminal behavior. It is important for parents and schools to educate children about preventing and addressing cyberbullying.
The document discusses several disadvantages and crimes related to information and communication technology (ICT). It identifies issues like phishing, blackmail, hacking, sports betting, merchandise not being delivered after online purchase, electronic harassment, child pornography, prostitution, drug trafficking, and copyright infringement. It notes that while authorities are taking steps like network security, investigation, and penalties to address cybercrimes, these issues still persist and young people need to be aware of associated risks and help shape technology's impact on society for better or worse. The document encourages small group work to research punishments for internet crimes and discuss if they are fair, with potential revisions proposed.
This document provides information on conducting effective online research and evaluating websites. It discusses using search engines to find information, tips for effective searches, and evaluating websites for credibility by considering factors like author credentials, publishing date, purpose, and domain type. The document also covers copyright issues, what constitutes copyright infringement, and exceptions for fair use of copyrighted materials for purposes like research, commentary, or news reporting.
This document discusses cyber safety and cyber crimes. It begins by introducing the objectives of educating students about safe internet use and cyber crimes. It then describes how people are connected to the cyber world through social media, banking, shopping, and browsing online. Several types of cyber crimes are outlined, including those committed against individuals, property, and government. Specific cyber crimes like hacking, child pornography, viruses, and software piracy are defined. The document concludes by offering tips for internet safety like using antivirus software, firewalls, and being anonymous online.
Feel free to share to every aspiring ICT SHS teacher that is starting out. Just please do not take the copyright credit. The content is taken from Rex and Abiva Empowerment Technologies books.
The document discusses the evolution of the World Wide Web from version 1.0 to the proposed version 3.0. Web 1.0 allowed only one-way consumption of information from static web pages. Web 2.0 enabled two-way interaction and user-generated content through technologies like blogs and social media. Proposed Web 3.0 would feature a semantic web with interconnected knowledge and intelligent systems that can understand language and context. It faces challenges of vastness, vagueness, uncertainty, inconsistency, and potential for deceit in user-generated information.
This document discusses how spreadsheets like Microsoft Excel and Google Sheets can be used to account for expenses and determine if a product's estimated sale price will be profitable. It provides an example of using Excel to calculate the total cost of ingredients for a milk tea product and compare it to the estimated sale price to see if it will earn a profit. The document also demonstrates how Excel formulas like SUM, subtraction, COUNTIF, and AVERAGEIF can be used to analyze survey data about a product to help evaluate its potential success in the target market.
DOWNLOAD SLIDE HERE:
http://adf.ly/1n6wDO
For questions, feel free to LIKE and SEND A MESSAGE on my FB Page.
https://www.facebook.com/ayameproductions/
Cyberbullying involves bullying or harassment using electronic means such as phones and computers. A case study describes a teenager, Amanda, who committed suicide after being cyberbullied on Myspace. She had sent obscene photos to someone online who then made the pictures viral, humiliating her at school. The effects of cyberbullying can include anxiety, depression, loneliness and in severe cases, suicide. Statistics show high rates of online and offline bullying among children in India. People who are cyberbullied should not respond or delete evidence but instead block the bully and report the behavior.
Communicating effectively and consistently with students can help them feel at ease during their learning experience and provide the instructor with a communication trail to track the course's progress. This workshop will take you through constructing an engaging course container to facilitate effective communication.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Cyber bullying involves threatening, humiliating, or harassing others using the internet, cell phones, or other digital technologies. Common forms of cyber bullying include posting harmful information or false statements online to ridicule and embarrass victims. While cyber bullying can happen to anyone, girls and middle school students are particularly vulnerable targets. Left unaddressed, cyber bullying can have serious psychological and legal consequences for both bullies and victims.
Popular Issues in (Digital) Media LiteracyAlec Couros
A presentation on Popular & Contemporary issues in (Digital) Media Literacy for EC&I 831, Feb. 10/09, by Dr. Alec Couros. More on the course at http://eci831.wikispaces.com
The document discusses principles of graphics and layout for online environments. It explains that the goals of the lesson are to understand basic design principles, create infographics, use common file formats, edit images, and upload images to Photobucket. It then discusses key principles like balance, contrast, emphasis, movement, pattern, rhythm, proportion, and variety that are important for effective visual design. Finally, it suggests a formative activity where students create images demonstrating each principle.
The document summarizes key provisions of Republic Act No. 11053, which amended the Anti-Hazing Act of 1995. It defines hazing and outlines prohibited acts. Hazing is punishable if it results in death, rape, sodomy, or mutilation. Various persons can be held liable for hazing, including those present, actual participants, planners, and school/barangay authorities with knowledge who failed to prevent it. Regulated initiation rites are allowed with prior notice and no violence.
The document discusses the history of religious sites in Jerusalem including Solomon's Temple and the Dome of Rock. It then outlines major events and organizations such as the Crusades, Cabala, Freemasons, the French Revolution, and Napoleon Bonaparte. It suggests theories about a New World Order controlled by Zionists with one government, currency and ruled illuminati. It provides details on the establishment of Israel in 1948 and wars with neighboring countries as well as information about Israeli government and economy.
What is malware? How can I protect myself against malware on my computer? Helpful tips and information about computer Viruses, Worms, Trojans, Ransomware, Scareware, Spyware, Adware and Phishing mails.
Media and information literacy competency describes how communication is affected by media and information. The document provides procedures for an activity where students will analyze how media impacts communication by doing a bubble map in groups to identify different forms of media. They will then watch a video explaining what media is and discuss how Facebook in particular has changed communication by allowing people to connect online. Finally, students will write a 200 word essay describing how media and information affect communication.
The document discusses how information and communication technologies (ICTs) like social media can empower citizens and enable social change in developing nations. It provides examples of how platforms like Facebook and online petitions were used to disseminate information and garner support during important events in Philippine history like the EDSA Revolution and in the aftermath of disasters like Typhoon Yolanda. The document also outlines the concepts of digital citizenship, digital access, and online safety and ethics that are important for citizens to practice when using digital tools and platforms.
The document is a module on online safety, security, and netiquette for Grade 11 students. It contains the following key points:
1. It introduces the importance of online safety, security, and proper etiquette when using the internet. Personal information should be kept private and secure to avoid risks like identity theft, bullying, and scams.
2. It provides tips on online safety like using strong and unique passwords, only accessing secure websites, not sharing personal details, and knowing how to identify legitimate websites.
3. It discusses netiquette rules like being respectful, helpful, and forgiving online as well as avoiding flaming, spamming, and invading privacy. Following these rules promotes positive online
Cyberbullying involves using electronic communication to harass or threaten others. It can take many forms, such as sending humiliating messages, impersonating someone online, or publishing private information without consent. Victims of cyberbullying often experience anxiety, depression, and may have thoughts of suicide. Both cyberbullies and their victims are more likely to face issues like poor academic performance, substance abuse, and criminal behavior. It is important for parents and schools to educate children about preventing and addressing cyberbullying.
The document discusses several disadvantages and crimes related to information and communication technology (ICT). It identifies issues like phishing, blackmail, hacking, sports betting, merchandise not being delivered after online purchase, electronic harassment, child pornography, prostitution, drug trafficking, and copyright infringement. It notes that while authorities are taking steps like network security, investigation, and penalties to address cybercrimes, these issues still persist and young people need to be aware of associated risks and help shape technology's impact on society for better or worse. The document encourages small group work to research punishments for internet crimes and discuss if they are fair, with potential revisions proposed.
This document provides information on conducting effective online research and evaluating websites. It discusses using search engines to find information, tips for effective searches, and evaluating websites for credibility by considering factors like author credentials, publishing date, purpose, and domain type. The document also covers copyright issues, what constitutes copyright infringement, and exceptions for fair use of copyrighted materials for purposes like research, commentary, or news reporting.
This document discusses cyber safety and cyber crimes. It begins by introducing the objectives of educating students about safe internet use and cyber crimes. It then describes how people are connected to the cyber world through social media, banking, shopping, and browsing online. Several types of cyber crimes are outlined, including those committed against individuals, property, and government. Specific cyber crimes like hacking, child pornography, viruses, and software piracy are defined. The document concludes by offering tips for internet safety like using antivirus software, firewalls, and being anonymous online.
Feel free to share to every aspiring ICT SHS teacher that is starting out. Just please do not take the copyright credit. The content is taken from Rex and Abiva Empowerment Technologies books.
The document discusses the evolution of the World Wide Web from version 1.0 to the proposed version 3.0. Web 1.0 allowed only one-way consumption of information from static web pages. Web 2.0 enabled two-way interaction and user-generated content through technologies like blogs and social media. Proposed Web 3.0 would feature a semantic web with interconnected knowledge and intelligent systems that can understand language and context. It faces challenges of vastness, vagueness, uncertainty, inconsistency, and potential for deceit in user-generated information.
This document discusses how spreadsheets like Microsoft Excel and Google Sheets can be used to account for expenses and determine if a product's estimated sale price will be profitable. It provides an example of using Excel to calculate the total cost of ingredients for a milk tea product and compare it to the estimated sale price to see if it will earn a profit. The document also demonstrates how Excel formulas like SUM, subtraction, COUNTIF, and AVERAGEIF can be used to analyze survey data about a product to help evaluate its potential success in the target market.
DOWNLOAD SLIDE HERE:
http://adf.ly/1n6wDO
For questions, feel free to LIKE and SEND A MESSAGE on my FB Page.
https://www.facebook.com/ayameproductions/
Cyberbullying involves bullying or harassment using electronic means such as phones and computers. A case study describes a teenager, Amanda, who committed suicide after being cyberbullied on Myspace. She had sent obscene photos to someone online who then made the pictures viral, humiliating her at school. The effects of cyberbullying can include anxiety, depression, loneliness and in severe cases, suicide. Statistics show high rates of online and offline bullying among children in India. People who are cyberbullied should not respond or delete evidence but instead block the bully and report the behavior.
Communicating effectively and consistently with students can help them feel at ease during their learning experience and provide the instructor with a communication trail to track the course's progress. This workshop will take you through constructing an engaging course container to facilitate effective communication.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Responsible use of the internet
1. Responsible use of
the Internet
NARCISO TAPIA, MD, MHPED (TWITTER: CEBUMD)
LAPULAPU CITY WOMEN’S MONTH CELEBRATION
HOOPSDOME, LAPU-LAPU CITY, CEBU
MARCH 3, 2014
10. Social media can affect
employment opportunities.
Recruiters/Employers have been found to visit a job seeker’s social
media profiles as part of their screening process.
You can be rejected from a job based on your social media profile.
11. Some of the type of content that
may turn off employers or can
make them think twice about you.
Inappropriate party pics
Pics of you drunk
”Naughty”/seductive poses
Complaints/rants/bashing about work/school, boss
12. May run the risk of
angering/offending someone, so
caution on posts/status
updates/comments regarding
Religion
Politics
Personal beliefs
13. Think also of what others want
Do they want to be tagged?
Are they interested in what you are about to post?
Too much hashtags
Spammy
Too many posts in succession
Too much detail/ each move