Hello ! Everyone. Here I am sharing my PowerPoint Presentation on The Mass Communication and Media Studies Paper on the topic " Online Violence and Internet Harassment of Women." I hope it will helpful to you.
Research seminar Queen Mary University of London (CogSci)Miriam Fernandez
Research Seminar at Queen Mary University of London (CogSci) 2nd December 2020. In this talk, we present and discuss various research and development projects focused on addressing some of the societal challenges of today’s world (misinformation spreading, extremism, child grooming) by means of social data science. These problems are complex, dynamic and heterogeneous, and cannot be looked at from a single lens. We will discuss how these problems are addressed from a multidisciplinary angle, combining theories, models and methods from social science, computer science, or psychology; bringing a deeper understanding of the problems, and their relations to users and their behaviours, to the proposed solutions.
Hello ! Everyone. Here I am sharing my PowerPoint Presentation on The Mass Communication and Media Studies Paper on the topic " Online Violence and Internet Harassment of Women." I hope it will helpful to you.
Research seminar Queen Mary University of London (CogSci)Miriam Fernandez
Research Seminar at Queen Mary University of London (CogSci) 2nd December 2020. In this talk, we present and discuss various research and development projects focused on addressing some of the societal challenges of today’s world (misinformation spreading, extremism, child grooming) by means of social data science. These problems are complex, dynamic and heterogeneous, and cannot be looked at from a single lens. We will discuss how these problems are addressed from a multidisciplinary angle, combining theories, models and methods from social science, computer science, or psychology; bringing a deeper understanding of the problems, and their relations to users and their behaviours, to the proposed solutions.
Common Good Digital Framework Action Plan
PURPOSE
The Common Good Digital Framework (CGDF) will serve as a platform to bring
authoritative knowledge and raise awareness about violations of ethical values
and standards by governments and large organizations.
The platform will monitor and alert against the misuse of Artificial Intelligence
(AI), personal data, and neglect of cyber security. The objectives of the
campaign are to stimulate and galvanize civil society towards the need to create
new norms and regulations, and therein influence public and private AI and
cyber policy.
Online radicalisation: work, challenges and future directionsMiriam Fernandez
Talk at Staffordshire University. 5th of March 2020. Describes some of the work we have conducted for online radicalisation, including some of the challenges identified
Biases in Social Media Research (NoBias EU project)Miriam Fernandez
Biases that emerge in Social Media Research. Talk presented at the NoBias EU project. Inspired by Olteanou et al. Social Data: Biases, Methodological Pitfalls, and Ethical Boundaries (2019)
Diplomacy and Foreign Relations in the Social Media Age: By Nalaka Gunawarden...Nalaka Gunawardene
I made this presentation on 14 November 2015 to students of the Certificate Course in Creative Diplomacy, conducted by the Regional Centre for Strategic Studies (RCSS) in Colombo, Sri Lanka – a think tank on international relations.
In this, I introduce and briefly explore the new kind of real-time, public diplomacy that is being ushered in with the spreading of social media. I show how diplomats and other government officials can no longer ignore this mass medium, but at the same time their traditional ways of communications need to be reoriented to suit the realities of this new information ecosystem that is informal, irreverent and fleeting.
As I spoke on the day after the ISIS terrorist attacks in France, I used (among others) the latest examples of how Gérard Araud, France’s Ambassador to the US, tweeted live as multiple terror attacks unfolded in Paris on Nov 13 night.
To see the bigger picture, I’ve distilled some wisdom of key researchers in this area including: Anne-Marie Slaughter, former Princeton Academic and ex-Director of Policy Planning, US State Department; Philip Seib, Professor of Journalism and Public Diplomacy, University of Southern California; and Ramesh Thakur, Professor, Crawford School of Public Policy, Australian National University (ANU).
I dedicated this presentation to a diplomat and scholar whose mentoring I was privileged to receive 20 years ago: Dr Harlan Cleveland (1918 - 2008) who served as US Ambassador to NATO, 1965–1969 (Johnson Administration), and earlier as US Assistant Secretary of State for International Organization Affairs, 1961–1965 (Kennedy Administration).
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...Oles Kulchytskyy
The symposium was organized by the University of Latvia Faculty of Social Sciences (FSS) on the 10th of December. Latvian researchers and opinion leaders, together with European partners,
presented the latest findings in the disinformation and media literacy field as well as discussed the futur challenges that the digital media landscape presents for scientists, decision-makers as well as every media user.
Engaging Times: 20 Years of E-Democracy LessonsSteven Clift
Key lessons from twenty years of e-democracy, open government, civic technology, and citizen participation online.
Extended slide deck combining almost all slides used by Steven Clift across 14 presentations across Taiwan and the Philippines to different audiences.
Media law for community journalists and bloggersjtownend
A presentation given to participants at the Community Journalism Conference, Cardiff University, 16 January 2013, setting out the legal landscape for online publishers and asking for responses to a survey
On the Application of Social Data Science to Address Societal ChallengesMiriam Fernandez
Tutorial at Universidad Politecnica de Madrid. May 2020. Overview of some of the projects done at the Knowledge Media Institute to address societal challenges by applying social data science
Digital development and Online Gender-Based ViolenceAnand Sheombar
Online talk held for Cordaid 18th November 2021, on the concept of digital development, and what online gender-based violence (GBV or eVAW) means for the activities of international development NGOs.
Common Good Digital Framework Action Plan
PURPOSE
The Common Good Digital Framework (CGDF) will serve as a platform to bring
authoritative knowledge and raise awareness about violations of ethical values
and standards by governments and large organizations.
The platform will monitor and alert against the misuse of Artificial Intelligence
(AI), personal data, and neglect of cyber security. The objectives of the
campaign are to stimulate and galvanize civil society towards the need to create
new norms and regulations, and therein influence public and private AI and
cyber policy.
Online radicalisation: work, challenges and future directionsMiriam Fernandez
Talk at Staffordshire University. 5th of March 2020. Describes some of the work we have conducted for online radicalisation, including some of the challenges identified
Biases in Social Media Research (NoBias EU project)Miriam Fernandez
Biases that emerge in Social Media Research. Talk presented at the NoBias EU project. Inspired by Olteanou et al. Social Data: Biases, Methodological Pitfalls, and Ethical Boundaries (2019)
Diplomacy and Foreign Relations in the Social Media Age: By Nalaka Gunawarden...Nalaka Gunawardene
I made this presentation on 14 November 2015 to students of the Certificate Course in Creative Diplomacy, conducted by the Regional Centre for Strategic Studies (RCSS) in Colombo, Sri Lanka – a think tank on international relations.
In this, I introduce and briefly explore the new kind of real-time, public diplomacy that is being ushered in with the spreading of social media. I show how diplomats and other government officials can no longer ignore this mass medium, but at the same time their traditional ways of communications need to be reoriented to suit the realities of this new information ecosystem that is informal, irreverent and fleeting.
As I spoke on the day after the ISIS terrorist attacks in France, I used (among others) the latest examples of how Gérard Araud, France’s Ambassador to the US, tweeted live as multiple terror attacks unfolded in Paris on Nov 13 night.
To see the bigger picture, I’ve distilled some wisdom of key researchers in this area including: Anne-Marie Slaughter, former Princeton Academic and ex-Director of Policy Planning, US State Department; Philip Seib, Professor of Journalism and Public Diplomacy, University of Southern California; and Ramesh Thakur, Professor, Crawford School of Public Policy, Australian National University (ANU).
I dedicated this presentation to a diplomat and scholar whose mentoring I was privileged to receive 20 years ago: Dr Harlan Cleveland (1918 - 2008) who served as US Ambassador to NATO, 1965–1969 (Johnson Administration), and earlier as US Assistant Secretary of State for International Organization Affairs, 1961–1965 (Kennedy Administration).
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...Oles Kulchytskyy
The symposium was organized by the University of Latvia Faculty of Social Sciences (FSS) on the 10th of December. Latvian researchers and opinion leaders, together with European partners,
presented the latest findings in the disinformation and media literacy field as well as discussed the futur challenges that the digital media landscape presents for scientists, decision-makers as well as every media user.
Engaging Times: 20 Years of E-Democracy LessonsSteven Clift
Key lessons from twenty years of e-democracy, open government, civic technology, and citizen participation online.
Extended slide deck combining almost all slides used by Steven Clift across 14 presentations across Taiwan and the Philippines to different audiences.
Media law for community journalists and bloggersjtownend
A presentation given to participants at the Community Journalism Conference, Cardiff University, 16 January 2013, setting out the legal landscape for online publishers and asking for responses to a survey
On the Application of Social Data Science to Address Societal ChallengesMiriam Fernandez
Tutorial at Universidad Politecnica de Madrid. May 2020. Overview of some of the projects done at the Knowledge Media Institute to address societal challenges by applying social data science
Digital development and Online Gender-Based ViolenceAnand Sheombar
Online talk held for Cordaid 18th November 2021, on the concept of digital development, and what online gender-based violence (GBV or eVAW) means for the activities of international development NGOs.
A Systematic Survey on Detection of Extremism in Social MediaRSIS International
Extremism is an uncommon feature of a person or a group. These extreme features pertain to beliefs, attitudes, feelings, actions, or strategies, etc. Extremist activities happen on various platforms on the Internet. These platforms are constantly being utilized to spread extremist agenda, influence people and create virtual organizations and communities. Automatic detection of such a level of extremism in social media is a technically challenging problem that has recently gained popularity in the research community. This paper provides a systematic, critical and detailed literature review of the state of the art techniques used in automatic detection of extremism of different forms and in different types of social media. The survey outcome is systematically presented using several dimensions like machine learning techniques used to detect extremism, features and datasets employed in research studies, emerging trends in extremism, limitation of existing work and possible prospects in future. Several findings from the survey have been identified as potential directions for future work. Specifically to mention, spatial-temporal features have not been fully utilized to detect extremism. Such features, if systematically used, can play a very vital role in tracing the location as well as time of promoting extremists activities.
Fake news detection for Arabic headlines-articles news data using deep learningIJECEIAES
Fake news has become increasingly prevalent in recent years. The evolution of social websites has spurred the expansion of fake news causing it to a mixture with truthful information. English fake news detection had the largest share of studies, unlike Arabic fake news detection, which is still very limited. Fake news phenomenon has changed people and social perspectives through revolts in several Arab countries. False news results in the distortion of reality ignite chaos and stir public judgments. This paper provides an Arabic fake news detection approach using different deep learning models including long short-term memory and convolutional neural network based on article-headline pairs to differentiate if a news headline is in fact related or unrelated to the parallel news article. In this paper, a dataset created about the war in Syria and related to the Middle East political issues is utilized. The whole data comprises 422 claims and 3,042 articles. The models yield promising results.
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP
The Internet and social media today provide huge opportunities: access to communities and networks, online information and learning, business and entertainment. However online connected technologies can also present challenges for children and young people and other vulnerable groups who may not have the critical digital literacies and life skills to recognise risk, or the resilience to manage online stresses and challenges.
This presentation highlights some of the themes to address when developing the digital literacies and digital well-being of children and young people, and those who work with or support them.
Role of Information Communication Technologies in Violence PreventionCat Meurn
Background Paper for "mPreventViolence: Communication and Technology for Violence Prevention - A Workshop" held by the Institute of Medicine.
http://www.iom.edu/Activities/Global/ViolenceForum/2011-DEC-08.aspx
Experimenting with Big Data and AI to Support Peace and SecurityUN Global Pulse
UN Global Pulse is working with partners to explore how data from social media and radio shows can inform peace and security efforts in Africa. The methodology, case studies, and tools developed as part of these efforts are detailed in this report.
Social Media Networking Site Usage Demographics Statsrishibajaj8
Social media are interactive, computer-mediated technologies that facilitate the creation and
exchange of ideas, information, professional skills and other forms of expression across virtual
communities and networks, to estimate the social media technology using among population.
A Pattern Language of Social Media in Public SecuritySebastian Denef
This report summarizes practices of social media use in public security. Our goal is to create an inventory of best practices, lessons-learned, and roles and responsibilities, to analyse specifically how social media is being used by police and other public security planners, within and outside Europe. By providing an overall description, we aim to spark discussions and provide a common language for social media use in the field of public security planning.
Using data from academic literature review, the review of blogs, books, existing best practice descriptions and expert knowledge this report compares social media practices. Inspired by Christopher Alexander’s work on ‘pattern languages’ for urban spaces and buildings, we analysed the data and looked for patterns. To further refine our findings, we presented the practice patterns to social media and security experts and interviewed them about their perspective and current practices.
As a result, we identified 74 practice patterns that describe and structure the use of social media for public security. The patterns are structured in three groups, describing how (1) law enforcement agencies (LEAs), such as the police, (2) citizens and (3) criminals are using social media and impact public security. With 50 patterns, the focus of our work is on group (1), the LEAs.
Anti ulcer drugs and their Advance pharmacology ||
Anti-ulcer drugs are medications used to prevent and treat ulcers in the stomach and upper part of the small intestine (duodenal ulcers). These ulcers are often caused by an imbalance between stomach acid and the mucosal lining, which protects the stomach lining.
||Scope: Overview of various classes of anti-ulcer drugs, their mechanisms of action, indications, side effects, and clinical considerations.
Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...VarunMahajani
Disruption of blood supply to lung alveoli due to blockage of one or more pulmonary blood vessels is called as Pulmonary thromboembolism. In this presentation we will discuss its causes, types and its management in depth.
Explore natural remedies for syphilis treatment in Singapore. Discover alternative therapies, herbal remedies, and lifestyle changes that may complement conventional treatments. Learn about holistic approaches to managing syphilis symptoms and supporting overall health.
Factory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in Stockrebeccabio
Factory Supply Best Quality Pmk Oil CAS 28578–16–7 PMK Powder in Stock
Telegram: bmksupplier
signal: +85264872720
threema: TUD4A6YC
You can contact me on Telegram or Threema
Communicate promptly and reply
Free of customs clearance, Double Clearance 100% pass delivery to USA, Canada, Spain, Germany, Netherland, Poland, Italy, Sweden, UK, Czech Republic, Australia, Mexico, Russia, Ukraine, Kazakhstan.Door to door service
Hot Selling Organic intermediates
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?bkling
Are you curious about what’s new in cervical cancer research or unsure what the findings mean? Join Dr. Emily Ko, a gynecologic oncologist at Penn Medicine, to learn about the latest updates from the Society of Gynecologic Oncology (SGO) 2024 Annual Meeting on Women’s Cancer. Dr. Ko will discuss what the research presented at the conference means for you and answer your questions about the new developments.
Couples presenting to the infertility clinic- Do they really have infertility...Sujoy Dasgupta
Dr Sujoy Dasgupta presented the study on "Couples presenting to the infertility clinic- Do they really have infertility? – The unexplored stories of non-consummation" in the 13th Congress of the Asia Pacific Initiative on Reproduction (ASPIRE 2024) at Manila on 24 May, 2024.
These lecture slides, by Dr Sidra Arshad, offer a quick overview of physiological basis of a normal electrocardiogram.
Learning objectives:
1. Define an electrocardiogram (ECG) and electrocardiography
2. Describe how dipoles generated by the heart produce the waveforms of the ECG
3. Describe the components of a normal electrocardiogram of a typical bipolar leads (limb II)
4. Differentiate between intervals and segments
5. Enlist some common indications for obtaining an ECG
Study Resources:
1. Chapter 11, Guyton and Hall Textbook of Medical Physiology, 14th edition
2. Chapter 9, Human Physiology - From Cells to Systems, Lauralee Sherwood, 9th edition
3. Chapter 29, Ganong’s Review of Medical Physiology, 26th edition
4. Electrocardiogram, StatPearls - https://www.ncbi.nlm.nih.gov/books/NBK549803/
5. ECG in Medical Practice by ABM Abdullah, 4th edition
6. ECG Basics, http://www.nataliescasebook.com/tag/e-c-g-basics
Title: Sense of Taste
Presenter: Dr. Faiza, Assistant Professor of Physiology
Qualifications:
MBBS (Best Graduate, AIMC Lahore)
FCPS Physiology
ICMT, CHPE, DHPE (STMU)
MPH (GC University, Faisalabad)
MBA (Virtual University of Pakistan)
Learning Objectives:
Describe the structure and function of taste buds.
Describe the relationship between the taste threshold and taste index of common substances.
Explain the chemical basis and signal transduction of taste perception for each type of primary taste sensation.
Recognize different abnormalities of taste perception and their causes.
Key Topics:
Significance of Taste Sensation:
Differentiation between pleasant and harmful food
Influence on behavior
Selection of food based on metabolic needs
Receptors of Taste:
Taste buds on the tongue
Influence of sense of smell, texture of food, and pain stimulation (e.g., by pepper)
Primary and Secondary Taste Sensations:
Primary taste sensations: Sweet, Sour, Salty, Bitter, Umami
Chemical basis and signal transduction mechanisms for each taste
Taste Threshold and Index:
Taste threshold values for Sweet (sucrose), Salty (NaCl), Sour (HCl), and Bitter (Quinine)
Taste index relationship: Inversely proportional to taste threshold
Taste Blindness:
Inability to taste certain substances, particularly thiourea compounds
Example: Phenylthiocarbamide
Structure and Function of Taste Buds:
Composition: Epithelial cells, Sustentacular/Supporting cells, Taste cells, Basal cells
Features: Taste pores, Taste hairs/microvilli, and Taste nerve fibers
Location of Taste Buds:
Found in papillae of the tongue (Fungiform, Circumvallate, Foliate)
Also present on the palate, tonsillar pillars, epiglottis, and proximal esophagus
Mechanism of Taste Stimulation:
Interaction of taste substances with receptors on microvilli
Signal transduction pathways for Umami, Sweet, Bitter, Sour, and Salty tastes
Taste Sensitivity and Adaptation:
Decrease in sensitivity with age
Rapid adaptation of taste sensation
Role of Saliva in Taste:
Dissolution of tastants to reach receptors
Washing away the stimulus
Taste Preferences and Aversions:
Mechanisms behind taste preference and aversion
Influence of receptors and neural pathways
Impact of Sensory Nerve Damage:
Degeneration of taste buds if the sensory nerve fiber is cut
Abnormalities of Taste Detection:
Conditions: Ageusia, Hypogeusia, Dysgeusia (parageusia)
Causes: Nerve damage, neurological disorders, infections, poor oral hygiene, adverse drug effects, deficiencies, aging, tobacco use, altered neurotransmitter levels
Neurotransmitters and Taste Threshold:
Effects of serotonin (5-HT) and norepinephrine (NE) on taste sensitivity
Supertasters:
25% of the population with heightened sensitivity to taste, especially bitterness
Increased number of fungiform papillae
1. 10/24/2017
1
8th Milestones meeting:
Cyber violence roundtable
19 October 2017
Michele Ybarra MPH PhD
Center for Innovative Public Health Research
*Thank you for your interest in this presentation. Please
note that analyses included herein are preliminary. More
recent, finalized analyses may be available by contacting
CiPHR for further information.
The scope of digital violence
Image from: https://media2.s-nbcnews.com/j/msnbc/components/video/__new/n_qc_30stkdomestic_140915.nbcnews-ux-1080-600.jpg
2. 10/24/2017
2
A concrete example: Myanmar
According to a Human Rights Council Report1:
“Social media platforms have also been used to
disseminate hate speech content against groups, which
has fuelled intercommunal tensions and led, in some
cases, to violent clashes among communities.
Following a country visit in July 2014, the Special
Rapporteur on the situation of human rights in
Myanmar expressed her concern over the spread of
misinformation, hate speech and incitement to
violence, discrimination and hostility in the media
and Internet, particularly targeted against Muslim
communities.”
1http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session28/Documents/A_HRC_28_64_ENG.doc, pg. 9
Another example: Worldwide
Image from: https://ichef-1.bbci.co.uk/news/660/media/images/79076000/jpg/_79076746_manwithflag.jpg
Citation: Http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session28/Documents/A_HRC_28_64_ENG.doc
3. 10/24/2017
3
The scope: Worldwide
Across the world, youth report rates of
violence online as well as offline.1 For
example:
One-third of Serbian youth have been
‘treated in a hurtful way’ by their peers
Less than one in twenty youth in South
Africa and the Philippines say they’ve
been targeted by an unwanted sexual
experiences online
Most youth see the Internet as beneficial
even if they have experienced something
upsetting online.
1 http://blogs.lse.ac.uk/gko/wp-content/uploads/2016/11/Synthesis-report_07-Nov-2016.pdf
The scope: The United States
Among people 15 years of age and older who use the Internet:
47% have experienced online harassment or abuse1
30% have had their privacy invaded online
17% have been the victim of a denial of access attack
12% of people who have been in a romantic relationship have
experienced intimate partner digital abuse2
Men and women are equally likely to be victims
People who are LGB and younger in age are more likely to be
victims than their peers
1https://innovativepublichealth.org/wp-content/uploads/2_Online-Harassment-Report_Final.pdf
2https://dev.innovativepublichealth.org/wp-content/uploads/4_Intimate-Partner-Digital-Abuse-Report_FINAL.pdf
4. 10/24/2017
4
Current efforts to reduce digital violence:
Panzagar Movement
https://www.facebook.com/panzagar/
Current efforts to reduce digital violence:
WePROTECT
5http://www.weprotect.org/the-model-national-response/
5. 10/24/2017
5
Current efforts to reduce digital violence1
Started in 2012, the Umati Project was created to monitor online
hate speech in Kenya and report them to the appropriate
authorities. According to Human Rights Watch, they identified over
7,000 incidents of digital hate speech in English and local
languages over a 12 month period. Similar efforts have been / are
being piloted in Ethiopia and Nigeria.2
The International Network Against CyberHate (INACH) partnered
with Facebook, Twitter, YouTube, and Microsoft to implement a
Code of Conduct aimed at reducing digital hate speech. The
amount of offensive content removed doubled.4
1http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session28/Documents/A_HRC_28_64_EN
G.doc;
2https://dangerousspeech.org/kenya; https://yourstory.com/2014/09/umati-hate-speech/
4http://europa.eu/rapid/press-release_IP-17-1471_en.htm
Existing evidence-based interventions
Center for Justice and Crime Prevention, Data & Society, and the
Dublin Institute of Technology have been contracted by UNICEF to
conduct a review of policies and frameworks that significantly affect
digital youth violence as documented by data. Stay tuned…1
1http://www.cjcp.org.za/online-child-safeguarding.html
Image from:
https://static1.squarespace.com/static/56143376e4b0f9222d2c64d9/t/562e783ee4b0de5de65bc5a0
/1445886016764/
6. 10/24/2017
6
How can we use technology to promote
healthy behavior and reduce violence?
Images from: https://www.textedly.com/template/default/images/icon_mass_text.png; http://d.ibtimes.co.uk/en/full/1355484/facebook-
being-sued-allegedly-monitoring-selling-information-private-messages-advertisers.jpg;
https://www.pgeveryday.com/Assets/Modules/Editorial/Article/Images/Dinner-Conversation-Starters-5-Ways-to-Start-the-Chatter-6-size-3.jpg;
http://www.napractice.org/portals/0/Public%20Policy.png
The gaps in the digital violence
literature
Methodological strategies that can well measure the
impact of large scale approaches (e.g., public policies
that are implemented, ISP-based approaches)
While there is an understandable focus on victims, we
know much less about perpetrators, and therefore
the dynamics and overlaps between victimization and
perpetration
There needs to be a greater focus on how digital
violence fits within the larger rubric of violence –
what happens online also happens offline; what is the
overlap and what does it mean for prevention efforts?
7. 10/24/2017
7
Discussion
1. How do the opportunities that I raised
reflect what you are seeing in your
country?
2. What should we be prioritizing for the
next 2-3 years in terms of advocacy,
research, interventions, and policies?
Round up of suggestions to reduce
cyberviolence
Within the understanding that cyberviolence spans a *wide* spectrum of experiences, from cyber-harassment
and bullying to human trafficking and child pornography, here are our thoughts for the priorities towards digital
harm reduction in the next 2-3 years:
1. Policy
1. Encourage platforms to develop and implement (and monitor) child and adult protection prolicies
2. Legislation
1. Ensure that laws are keeping up with technology (e.g., a law against ‘revenge porn’)
3. Research
1. Research / interventions for youth – and adults – about how to healthyfully navigate technology (e.g., digital literacy,
self-esteem promotion, social emotional learning programs)
2. Identify existing evidenced-based prevention programs (e.g., Greendot) that might be expanded to include a cyber-
component; or might be used as a blueprint for what we can design for digitial interventions
3. Giving parents the tools to talk to their children about and set boundaries to promote healthy digital use
4. Understanding the phenomena and their impacts (and we need to be sure that we’re not projecting our sensibilities on to
children)
4. Advocacy
1. Understand the rights and responsibilities of the sharing of children’s photos and other personal information
2. Help people understand what the laws actually are (what *is* a criminal offence)
8. 10/24/2017
8
For more information, please contact:
Michele Ybarra, MPH PhD
Center for Innovative Public Health Research
P: 1-877-302-6858 ext. 801
F: 1-877-302-6858
michele@innovativepublichealth.org