This includes: Chat rooms, video games, e-mail, blogs, and even over cell phones.
Cyberbullying isn't just kids picking on other kids. If handled incorrectly, it can escalate from rude jokes and gossip to cyberthreats.
Examples of these threats can include physical threats to others or be self-inflicted.
Online conflicts will sometimes start in the real world, a.k.a. schools, and then transfer into the virtual world. Bullying is pushed to the virtual world because cyberbullies are mostly, if not completely, anonymous.
This gives the cyberbully the false idea that their actions have no repercussions. Now that more and more kids have cell phones, cyberbullying often takes place through texting and picture messaging as well.
When a bully is accused of breaking criminal laws, they can be subject to prosecution and even arrest.
Luckily, there are practices you can put in place today to prevent cyber bullying from happening. Even though there's no "one size fits all" solution, here are some of the steps you can take:
While there are many ways for your identity to get stolen, the easiest way to become a victim of identity theft is by sharing personal information over the internet. If you aren't careful, criminals could steal your identity by finding any of the following:
The best way to make sure that your identity never gets stolen is to act right now and follow these steps to protect yourself before an identity theft attacks.
Creating a strong password is an easy step that goes a long way. The lock on your front door is a complicated system of tumblers that isn't easily opened without a key. Like the lock, your password should seem complicated to others but simple to you.
To do so visit, http://ftc.gov/idtheft
Or call 1-877-438-4338
If you are a citizen of Australia and become a victim of identity theft, you will need to fill out a Commonwealth Victims' Certificate, which can be found here:
If you ever come across an email that you believe to be a phisher email, forward the email to firstname.lastname@example.org for U.S. citizens or email@example.com for other countries. Also, you should email the company or bank that is being impersonated in the email, if that's the case. If you were the victim of a phishing attack, file a report with the FTC at www.ftc.gov/complaint.
To report any other scams fill out this form for the Australian Competition and Consumer Commission:
Plagiarizing is a very serious situation so before we get into safely using copyrighted works, let's go through some things that might happen if you directly copy another's work.
There are some sources that you can copy from without having to cite. This method of copyrighting is called fair use. There is a large gray area for which works fall under fair use, though.
The public domain contains creative works that aren't protected bay any copyrights and may be freely used by anyone.
Works end up in the public domain because:
Using copyrighted works for educational purposes such as criticism, comment, news reporting, teaching, scholarship, and research also fall under fair use.
An easy and foolproof way to safely use someone else's work is to cite all of your sources and quotations and then include a works cited at the end of your work. In a nutshell, your works cited is a brief description of where you got your quote. It includes information like the author's name, the work you used, the publisher, the date their work was created, and so on.
The examples given above were citing books only. Citing works in medias other than printed in a book will look different but will follow the same structure.
Parenthetical Citations are used in the middle of your work and are placed directly after a quotation. They refer to your works cited by briefly indicating which source that specific quotation came from.
Lunsford, Andrea, and Robert Connors. St. Martin's Handbook. 3rd. ed. New York: St. Martin's Press, 1995.
As you can see, the parenthetical citation always comes directly after the quoted material. It can contain the author's name, the page number from where the quote came from, or both.
Paraphrasing is when you take in an outside source's information and put it into your work using your own words. All of the information will stay the same, but the sentence structure will change. Even though you aren't directly copying the author, you are using their information so you still must cite them.
Paraphrase As Herrera explains, Frida's surrealistic vision was unlike that of the European Surrealists. (258)
Hayden Herrera, Frida: A Biography of Frida Kahlo (258)
First things first, always be careful when downloading files off of the internet and make sure you're downloading files from a trusted source. Viruses must be executed to have any effect on your computer, so there are a couple of file types that have no chance of containing a virus. These files are predominantly sound, image, and text file types.
These are just a few of the most common file types that viruses can be attached to. These file types are known as program files and they are able to activate or execute viruses that may be hidden in them. A virus cannot be activated just by downloading it though; it must be triggered by opening the program file.
The first and best step you can take to protecting your computer from viruses is to install an anti-virus program.
Computer Associates International, Inc.
Norman Data Defense Systems
Frisk Software International
Network Associates, Inc.
Trend Micro, Inc.
It's always good to be cautious while on the internet. There are people in the cyber world who want to do harm to you or your computer.
Social networks are great, but just like everything else on the web, you need to be careful when using them. What you put on your social networking site defines you. Anyone and everyone on the web will be able to see what you put up. Always think before posting a status or picture that might come back to haunt you.
(Answers found after quiz)
The internet is the one of the best resources for learning and entertainment and your children have it at their fingertips! It's important for you to teach them to use the internet because they're going to be using it for the rest of their lives.
No talking to strangers.
No giving out personal information.
Unfortunately, there are dangers when it comes to the internet and kids. Your child's safety might be in danger if one or more of the following happen: