Let's Stop Bullying: Advice for Young People Let's stop Advice for Young People Nobody has the right to hurt other people by hitting them, kicking them, calling them names, spreading rumours about them or by doing anything else which is intended to be upsetting. Bullies try to justify their actions by saying that it is their victim's fault for being different. If this is happening to you tell yourself that it is not your fault, and that it is the bullies who need to change, not you. What To Do Talk to someone you can trust, a teacher, parent, older friend or relative.Be persistent. What Not To Do Don't try to deal with the problem on your own- there is nothing wrong in asking for help.Don't hit the bullies- you might end up being accused of bullying yourselfAlways tell the truth about what has happened. Adult Bullying Bullying is wrong whatever the age of the person who is bullying you. If this is happening at school you can talk to your parents. Working Together You do not have to be a victim to act. Getting Help
The Definitive Guide to Online Reputation Management There are a lot of misconceptions about online reputation management. Some people think it’s just social media monitoring, while others believe it has something to do with public relations, and still others literally have no idea how it can impact business and sales. In this guide, I’m going to explain the role of online reputation management in today’s business and media landscape. Companies of every size can benefit from having a clear outline of its main concepts. They Are Talking About You Just a few years ago, the internet was very different. The situation has radically changed. No matter the size of your business, they (prospects, customers, clients…anyone and, potentially, everyone) are talking about you. If you think you can skip this, or if you think you can make it without taking into account people’s voices, opinions, and reviews, think again. The Transparency Risk One of the most recent business commandments is “Be transparent.” What does being “transparent” mean? 1. 2. 3. 4.
Our Mission Common Sense Media is dedicated to improving the lives of kids and families by providing the trustworthy information, education, and independent voice they need to thrive in a world of media and technology. We exist because our nation's children spend more time with media and digital activities than they do with their families or in school, which profoundly impacts their social, emotional, and physical development . As a non-partisan, not-for-profit organization, we provide trustworthy information and tools, as well as an independent forum, so that families can have a choice and a voice about the media they consume. We believe in media sanity, not censorship.We believe that media has truly become "the other parent" in our kids' lives, powerfully affecting their mental, physical, and social development.We believe in teaching our kids to be savvy, respectful and responsible media interpreters, creators, and communicators.
Snapchat and Periscope: A Grown-Up’s Guide GREETINGS, FELLOW adult! We’re here to discuss the latest development in social media: broadcasting your life. (If you’re a teenager and still reading, please go LOL in that corner with the beanbag chairs.) Whoa, hold on, isn’t this already happening, you ask? Don’t the huevos rancheros that I posted to Instagram count as self-broadcasting? Or what about this selfie of my daughter and me on Facebook? None of that has changed. We’re also seeing a similar idea with Snapchat. One big difference between these apps and Instagram and Facebook is that, by default, everything you post disappears. I’m too old for this. I understand your skepticism. So, yes, you could ignore them. OK, I’m intrigued. Let’s begin with Snapchat simply because, with over 100 million users, it’s the most established of the three. When you first launch it, the app asks to search your contacts for other Snapchat users. Periscope and Meerkat are a bit different. So what should I, ordinary grown-up, do to start sharing?
DOOMED TO REPEAT HISTORY? LESSONS FROM THE CRYPTO WARS OF THE 1990s Below is the executive summary for "Doomed to Repeat History? Lessons From the Crypto Wars of the 1990s." Read the full paper here. In the past year, a conflict has erupted between technology companies, privacy advocates, and members of the U.S. law enforcement and intelligence communities over the right to use and distribute products that contain strong encryption technology. Encryption is a method by which two parties can communicate securely. The act that truly launched the Crypto Wars was the White House’s introduction of the “Clipper Chip” in 1993. Nonetheless, the idea that the government could find a palatable way to access the keys to encrypted communications lived on throughout the 1990s. While the domestic fight over key escrow wore on throughout the mid-1990s, another related battle was brewing on the international front over U.S. export controls and encryption technology. It seems like we may once again be on the verge of another war: a Crypto War 2.0.
Introducing Our New Safety Center Bullying, Students with Disabilities, and Federal Law - Cyberbullying Research Center Posted by Sameer Hinduja on May 6, 2015 At a recent conference in Chester County, Pennsylvania, I had the privilege of getting to know Andy Faust, who is an authority on special education law at Sweet, Stevens, Katz & Williams LLP. In particular, I was impressed by his level of expertise and intrigued by his astute observations about the Individuals with Disabilities Education Act (IDEA), and how some kids who are bullied – and some kids who bully others – may be entitled to the federal law’s protections as “children with disabilities.” Based on my review of certain court cases, Office of Civil Rights opinions, and “Dear Colleague” guidance documents, as well as informed inference and anecdotal experience acquired over 28 years of practice, many kids who chronically engage in bullying behaviors (e.g., aggressors, offenders) can be categorized as “children with disabilities” under the IDEA. Among those characteristics are: ~ identify the circumstances that trigger these feelings;
Cybersecurity in K-12 education: Schools face increased risk of cyber attacks - Fedscoop Editor’s Note: This is part 1 of a three-part series on cybersecurity in K-12 education. Part 2 will focus on the National Initiative for Cybersecurity Education. When Terry Van Zoeren came out of retirement this year to be interim superintendent at a New Jersey school district, he didn’t anticipate dealing with a cyber attack. But the 20-year administration veteran was forced into action in March when a savvy foreign hacker held the Swedesboro-Woolwich School District’s computer system for a ransom — making it impossible for kids at four elementary schools to take their online statewide tests as scheduled. “I hadn’t expected anything like this to happen,” Van Zoeren said in an interview last week with FedScoop. “It made us think really long and hard about the security necessary to make sure something like this is less likely to happen again.” There’s also the wealth of data that schools routinely collect on students and store on their servers, from attendance records to medical issues.
Internet Safety Online Curriculum Home Browse: By Categories All Administrator ResourcesAssessment & Review Blended LearningBloggingBundles & ToolkitsBusiness EducationClassroom ManagementCollege & Career ReadinessCommon CoreCommunication & CollaborationDesktop ApplicationsDifferentiated LearningDigital CitizenshipDigital MediaDigital StorytellingESL/ELLGoogleInteractive WhiteboardsInternet SearchesiPads & Mobile LearningLearning Theories & StrategiesMembershipsNETS-TOrganizational & Time-saving ToolsPersonal EnrichmentPodcastingReading & WritingResponse to Intervention (RTI)School SafetySocial MediaSpecial Education STEMTech Integration BasicsTools for Student ProjectsVirtual LearningWeb Tool OverviewsWebsite CreationWikisWorkplace more... Favorites Welcome to your Favorites, the perfect place to store your favorite Community resources and training. To mark an item as a favorite, click on "Add to Favorites" button on webinars, courses, shared resources, or discussion topics.
Dealing with Cyberbullying: Tips for Kids and Parents to Prevent and Stop Cyberbullying Cyberbullying and Suicide If cyberbullying means you, or someone you know, feels suicidal, please call 1-800-273-TALK (8255) in the U.S., or visit IASP or Suicide.org to find a helpline in your country. What is cyberbullying? Cyberbullying occurs when a child or teen uses the Internet, emails, text messages, instant messaging, social media websites, online forums, chat rooms, or other digital technology to harass, threaten, or humiliate another child or teen. Unlike traditional bullying, cyberbullying doesn't require physical strength or face-to-face contact and isn't limited to just a handful of witnesses at a time. Need help with face-to-face bullying? If you’re being physically or verbally bullied at school or elsewhere outside the home, read Dealing with Bullying. If you or a loved one is currently the victim of cyberbullying, it's important to remember that you're not alone. How cyberbullying harms The effects of cyberbullying Tips for kids or teens dealing with cyberbullying
Computers, Freedom, and Privacy in a Networked Society (2010) -- the 20th annual CFP conference. iLearn Technology Cyberbullying - what it is, how it works and how to understand and deal with cyberbullies what is it? :: how it works :: why cyberbully? :: prevention :: take action :: what's the law? :: stop cyberbullying toolkit :: 2013 Summit Join us for the 2014 StopCyberBullying Youth Summit in New Brunswick on March 22nd, 2014 starting at 8:00am at NBCC Woodstock! Home of "Don't Stand By, Stand Up," StopCyberbullying was the first cyberbullying prevention program in North America. Click here to See Pictures and Videos from the 2013 International Stopcyberbullying Youth Summit Contributions from Montague Consolidated Students for the International Stop Cyberbullying Youth Summit in Charlottetown on November 9th, 2013.
Welcome to INHOPE | Inhope - The International Association of Internet Hotlines