SlideShare a Scribd company logo
1 of 13
What if this was your child?
How would you ensure his safety?
One in three youth suicides is a direct result
of bullying!
Alienation
Words Hurt!
Violent Incidences
With no reporting options for kids,
they are silenced.
90% of all teens
ages 10-18 have
experienced bullying
in some form
Bullying awareness has grown, but tools and
processes to address the problem have not
Lack of focus on Cyber Bullying
Out-of-date LegislationInadequate data capture
& processing
Limited Solutions and Control for Parents
Solution
The first company to provide an in-depth, integrated online
and traditional anti-bullying program
TheBullyTracker.com
Framework: Collect, Connect, Protect
Protect children with better technology
•Case management and workflow for documenting specific incidents
•Data analytics applied to identify trends
Collect data from:
•Website, Text messages, Voice, Email, Mobile Web, Mobile App
AND
•Social Media (over 30 different feeds, e.g., Twitter, Reddit, Instagram)
Connect people to important data
•Secure portal for Parents, Researchers, Schools, Law Enforcement
•Real-time alerts notify users of bullying activities of interest
Collect
Connect
Protect
Tweet found:
“@FastrunnerMW you’re fat and
ugly, we all know that!! OMG”
TheBullyTracker.com
Product & Service Offerings
Cyberbullying Protection Service (CPS)
• Child’s name (Michelle Webb)
• Use unique identifiers:
o MWebb (username)
o @FastRunnerMW (Twitter Handle)
o Webby (nickname)
Added to list of keywords and phrases
associated with cyber bullying
Parent
Notification
TheBullyTracker.com
Product & Service Offerings
Tools for Schools
School administrators use the secure Bully
Activity Monitoring dashboard to view data
collected by the Personalized Reporting
Tools
Each school in the Tools for Schools
program has a personalized Web
page that contains their Personalized
Reporting Tools.
TheBullyTracker.com
Product & Service Offerings
Custom Data Services (CDS)
By performing daily searches on over 30
social media sites, we will quickly gather
a very valuable data pool. bullying prevention organizations,
training providers and researchers will
purchase access to our data pool.
Executive Team
Tom Lash - Co-founder
• 20+ years technology and strategy executive
• $100M+ P&L experience, Fortune 500
• Father of five
David A. Ealy, Ed.D - Co-founder
• eLearning and Education Technology
Specialist
• Prior successful startup and exit experience
• Father of three
Two dads protecting kids with better technology
Competitive Advantages
and Differentiation
• We use data from multiple sources
 We can give schools the power to go from collecting data from one source to eight
 We have a propriety classification and reporting engine that analyzes keywords and
phrases, classifies incidents by severity, recommends action, and communicates with
multiple dashboards
• Our actions and results include:
 A critical incident workflow for parents, schools or law enforcement
 Dashboards for administrators, parents and children
 Reporting for administrators, parents and law enforcement
 Data analysis for training providers and bullying services
• There is no other comprehensive archive of bullying incidents and social
media-derived cyber bullying indicators
 Bullying researchers currently use survey data which tends to be dated and not specific to
any particular incident
Next Steps and Milestones
Technical
• Completed: Demo versions of CPS, Tools for Schools, and Custom Data Services
• Recent developments focus on implementing user feedback
• Additional market verticals (non-bullying)
Marketing
• Multi-layered campaign for each target market
• Partnerships and sales channels
Organizational
• Intellectual Property Protection
• Round out Advisory Board
Capital Funding
$500,000
ThinkBIG is looking to exit within 24 months of receiving
funding. Additionally, the Company may consider a Series A
round within the next 6 months to expedite the business
strategy:
• IP protection
• Marketing
• Continued Development
• Advisory Services
• Testing for broad service launch
• Public Relations activities
• Continued Development of Services
Contact Information
After reviewing this Presentation Deck please
feel free to contact Tom Lash or David Ealy
with any questions you may have.
Tom Lash, Co-founder
ThinkBIG Education Technology
tlash@thinkbigcomputing.com
Phone:
David A. Ealy, Ed.D, Co-founder
ThinkBIG Education Technology
dealy@thinkbigcomputing.com
Phone:

More Related Content

What's hot

Impacts of ‘School Chooser’ Digital Tools - Eric Reese (Center for Government...
Impacts of ‘School Chooser’ Digital Tools - Eric Reese (Center for Government...Impacts of ‘School Chooser’ Digital Tools - Eric Reese (Center for Government...
Impacts of ‘School Chooser’ Digital Tools - Eric Reese (Center for Government...mysociety
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awarenessJisc
 
Sexunzipped damien-hampton
Sexunzipped damien-hamptonSexunzipped damien-hampton
Sexunzipped damien-hamptonLuke Raskino
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarMarty Miller
 
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...Bloxx
 
Stop.+think.+connect+michael+kaiser
Stop.+think.+connect+michael+kaiserStop.+think.+connect+michael+kaiser
Stop.+think.+connect+michael+kaiserbhagyasri patel
 
Online Educa Berlin conference: Big Data in Education - theory and practice
Online Educa Berlin conference: Big Data in Education - theory and practiceOnline Educa Berlin conference: Big Data in Education - theory and practice
Online Educa Berlin conference: Big Data in Education - theory and practiceMike Moore
 
It’s time to talk about privacy
It’s time to talk about privacyIt’s time to talk about privacy
It’s time to talk about privacylearnafrica2
 
Social Media: Managing Risk
Social Media:  Managing RiskSocial Media:  Managing Risk
Social Media: Managing Riskshshap
 
Gr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and UseGr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and Useuniversity of education,Lahore
 
INSPRA Tip Sheet Jan. 16
INSPRA Tip Sheet Jan. 16INSPRA Tip Sheet Jan. 16
INSPRA Tip Sheet Jan. 16Donna Petraits
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemFaHaD .H. NooR
 
Ethical mobility policy development & sustainability
Ethical mobility policy development & sustainabilityEthical mobility policy development & sustainability
Ethical mobility policy development & sustainabilityGlobal Business Professor
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 

What's hot (16)

Impacts of ‘School Chooser’ Digital Tools - Eric Reese (Center for Government...
Impacts of ‘School Chooser’ Digital Tools - Eric Reese (Center for Government...Impacts of ‘School Chooser’ Digital Tools - Eric Reese (Center for Government...
Impacts of ‘School Chooser’ Digital Tools - Eric Reese (Center for Government...
 
Doc handout
Doc handoutDoc handout
Doc handout
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awareness
 
Sexunzipped damien-hampton
Sexunzipped damien-hamptonSexunzipped damien-hampton
Sexunzipped damien-hampton
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security Webinar
 
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
 
Stop.+think.+connect+michael+kaiser
Stop.+think.+connect+michael+kaiserStop.+think.+connect+michael+kaiser
Stop.+think.+connect+michael+kaiser
 
Online Educa Berlin conference: Big Data in Education - theory and practice
Online Educa Berlin conference: Big Data in Education - theory and practiceOnline Educa Berlin conference: Big Data in Education - theory and practice
Online Educa Berlin conference: Big Data in Education - theory and practice
 
What is AI?
What is AI?What is AI?
What is AI?
 
It’s time to talk about privacy
It’s time to talk about privacyIt’s time to talk about privacy
It’s time to talk about privacy
 
Social Media: Managing Risk
Social Media:  Managing RiskSocial Media:  Managing Risk
Social Media: Managing Risk
 
Gr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and UseGr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and Use
 
INSPRA Tip Sheet Jan. 16
INSPRA Tip Sheet Jan. 16INSPRA Tip Sheet Jan. 16
INSPRA Tip Sheet Jan. 16
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
Ethical mobility policy development & sustainability
Ethical mobility policy development & sustainabilityEthical mobility policy development & sustainability
Ethical mobility policy development & sustainability
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 

Similar to Bullying Tracker protects youth with data and tech

[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul LanoisAIIM International
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015bellla33
 
Esafety for Ofsted
Esafety for OfstedEsafety for Ofsted
Esafety for Ofstedbellla33
 
Week 5 Final Presentation
Week 5 Final PresentationWeek 5 Final Presentation
Week 5 Final Presentationguest29a8d2
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014emilyensign
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurityJisc
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare OrganizationsAvePoint
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible DataTom Walker
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearningMalinka Ivanova
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearningGabriela Grosseck
 
Digital Ethical Risk Assessment
Digital Ethical Risk AssessmentDigital Ethical Risk Assessment
Digital Ethical Risk AssessmentMarc St-Pierre
 
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Saurabh Mishra
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Optimising digital marketing strategies and tactics through data analysis and...
Optimising digital marketing strategies and tactics through data analysis and...Optimising digital marketing strategies and tactics through data analysis and...
Optimising digital marketing strategies and tactics through data analysis and...Higher Education Consulting Group
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataStephen Cobb
 

Similar to Bullying Tracker protects youth with data and tech (20)

[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015
 
Esafety for Ofsted
Esafety for OfstedEsafety for Ofsted
Esafety for Ofsted
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Week 5 Final Presentation
Week 5 Final PresentationWeek 5 Final Presentation
Week 5 Final Presentation
 
IMSafer Angel Round
IMSafer Angel RoundIMSafer Angel Round
IMSafer Angel Round
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
 
Cybercrime: Understanding the Offender, Victim and Managers
Cybercrime: Understanding the Offender, Victim and ManagersCybercrime: Understanding the Offender, Victim and Managers
Cybercrime: Understanding the Offender, Victim and Managers
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurity
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Digital Ethical Risk Assessment
Digital Ethical Risk AssessmentDigital Ethical Risk Assessment
Digital Ethical Risk Assessment
 
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Optimising digital marketing strategies and tactics through data analysis and...
Optimising digital marketing strategies and tactics through data analysis and...Optimising digital marketing strategies and tactics through data analysis and...
Optimising digital marketing strategies and tactics through data analysis and...
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

Bullying Tracker protects youth with data and tech

  • 1. What if this was your child? How would you ensure his safety?
  • 2. One in three youth suicides is a direct result of bullying! Alienation Words Hurt! Violent Incidences With no reporting options for kids, they are silenced. 90% of all teens ages 10-18 have experienced bullying in some form
  • 3. Bullying awareness has grown, but tools and processes to address the problem have not Lack of focus on Cyber Bullying Out-of-date LegislationInadequate data capture & processing Limited Solutions and Control for Parents
  • 4. Solution The first company to provide an in-depth, integrated online and traditional anti-bullying program
  • 5. TheBullyTracker.com Framework: Collect, Connect, Protect Protect children with better technology •Case management and workflow for documenting specific incidents •Data analytics applied to identify trends Collect data from: •Website, Text messages, Voice, Email, Mobile Web, Mobile App AND •Social Media (over 30 different feeds, e.g., Twitter, Reddit, Instagram) Connect people to important data •Secure portal for Parents, Researchers, Schools, Law Enforcement •Real-time alerts notify users of bullying activities of interest Collect Connect Protect
  • 6. Tweet found: “@FastrunnerMW you’re fat and ugly, we all know that!! OMG” TheBullyTracker.com Product & Service Offerings Cyberbullying Protection Service (CPS) • Child’s name (Michelle Webb) • Use unique identifiers: o MWebb (username) o @FastRunnerMW (Twitter Handle) o Webby (nickname) Added to list of keywords and phrases associated with cyber bullying Parent Notification
  • 7. TheBullyTracker.com Product & Service Offerings Tools for Schools School administrators use the secure Bully Activity Monitoring dashboard to view data collected by the Personalized Reporting Tools Each school in the Tools for Schools program has a personalized Web page that contains their Personalized Reporting Tools.
  • 8. TheBullyTracker.com Product & Service Offerings Custom Data Services (CDS) By performing daily searches on over 30 social media sites, we will quickly gather a very valuable data pool. bullying prevention organizations, training providers and researchers will purchase access to our data pool.
  • 9. Executive Team Tom Lash - Co-founder • 20+ years technology and strategy executive • $100M+ P&L experience, Fortune 500 • Father of five David A. Ealy, Ed.D - Co-founder • eLearning and Education Technology Specialist • Prior successful startup and exit experience • Father of three Two dads protecting kids with better technology
  • 10. Competitive Advantages and Differentiation • We use data from multiple sources  We can give schools the power to go from collecting data from one source to eight  We have a propriety classification and reporting engine that analyzes keywords and phrases, classifies incidents by severity, recommends action, and communicates with multiple dashboards • Our actions and results include:  A critical incident workflow for parents, schools or law enforcement  Dashboards for administrators, parents and children  Reporting for administrators, parents and law enforcement  Data analysis for training providers and bullying services • There is no other comprehensive archive of bullying incidents and social media-derived cyber bullying indicators  Bullying researchers currently use survey data which tends to be dated and not specific to any particular incident
  • 11. Next Steps and Milestones Technical • Completed: Demo versions of CPS, Tools for Schools, and Custom Data Services • Recent developments focus on implementing user feedback • Additional market verticals (non-bullying) Marketing • Multi-layered campaign for each target market • Partnerships and sales channels Organizational • Intellectual Property Protection • Round out Advisory Board
  • 12. Capital Funding $500,000 ThinkBIG is looking to exit within 24 months of receiving funding. Additionally, the Company may consider a Series A round within the next 6 months to expedite the business strategy: • IP protection • Marketing • Continued Development • Advisory Services • Testing for broad service launch • Public Relations activities • Continued Development of Services
  • 13. Contact Information After reviewing this Presentation Deck please feel free to contact Tom Lash or David Ealy with any questions you may have. Tom Lash, Co-founder ThinkBIG Education Technology tlash@thinkbigcomputing.com Phone: David A. Ealy, Ed.D, Co-founder ThinkBIG Education Technology dealy@thinkbigcomputing.com Phone: