SlideShare una empresa de Scribd logo
1 de 17
 
Worst Fears
Best Hopes
Empowering Kids
 
Is Privacy Dead?
Research
“ So first fact is that the predominant online sex crime victims are not young children. They are teenagers. There’s almost no victims in the sample that we collected from – a representative sample of law enforcement cases that involved the child under the age of 13.”
[object Object],[object Object],http://flickr.com/photos/atouchofcolor/
“ Our research, actually looking at what puts kids at risk for receiving the most serious kinds of sexual solicitation online, suggests that it’s not giving out personal information that puts kid at risk. It’s not having a blog or a personal website that does that either.”
“ What puts kids in danger is being willing to talk about sex online with strangers or having a pattern of multiple risky activities on the web like going to sex sites and chat rooms, meeting lots of people there, kind of behaving in what we call like an  internet daredevil .”
 
“… three and seven percent of young people are targeted by frequent bullying on the internet and text messaging. By frequent I mean at least once a month or more often.”
Building your Online Profile
55% Teens have online profiles
65% Of teens have private settings
 

Más contenido relacionado

La actualidad más candente

prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online PedophilesJustine
 
Social media and inappropriate behaviour
Social media and inappropriate behaviourSocial media and inappropriate behaviour
Social media and inappropriate behaviourcpsocialmedia
 
A perspective on a controversial topic
A perspective on a controversial topicA perspective on a controversial topic
A perspective on a controversial topicj-bush90
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineMichael Heron
 
A presentation on child pornography
A presentation on child pornographyA presentation on child pornography
A presentation on child pornographySAMBIT SWAIN
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Erwc period 1cyber bullying
Erwc period 1cyber bullyingErwc period 1cyber bullying
Erwc period 1cyber bullyingkcurranlitlover
 
Anissaandgabbywithsong 130320081154-phpapp02
Anissaandgabbywithsong 130320081154-phpapp02Anissaandgabbywithsong 130320081154-phpapp02
Anissaandgabbywithsong 130320081154-phpapp02kcurranlitlover
 
Anissa and gabby with song
Anissa and gabby with songAnissa and gabby with song
Anissa and gabby with songkcurranlitlover
 
2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying2012 06 Sexting and Cyberbullying
2012 06 Sexting and CyberbullyingRaleigh ISSA
 
Your online presence
Your online presenceYour online presence
Your online presencePamela Comer
 

La actualidad más candente (19)

prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online Pedophiles
 
cyberworld
cyberworld cyberworld
cyberworld
 
Social media and inappropriate behaviour
Social media and inappropriate behaviourSocial media and inappropriate behaviour
Social media and inappropriate behaviour
 
Sexting
SextingSexting
Sexting
 
Sexting
SextingSexting
Sexting
 
A perspective on a controversial topic
A perspective on a controversial topicA perspective on a controversial topic
A perspective on a controversial topic
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Sexting
SextingSexting
Sexting
 
A presentation on child pornography
A presentation on child pornographyA presentation on child pornography
A presentation on child pornography
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Erwc period 1cyber bullying
Erwc period 1cyber bullyingErwc period 1cyber bullying
Erwc period 1cyber bullying
 
Anissaandgabbywithsong 130320081154-phpapp02
Anissaandgabbywithsong 130320081154-phpapp02Anissaandgabbywithsong 130320081154-phpapp02
Anissaandgabbywithsong 130320081154-phpapp02
 
Anissa and gabby with song
Anissa and gabby with songAnissa and gabby with song
Anissa and gabby with song
 
2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying
 
Your online presence
Your online presenceYour online presence
Your online presence
 

Destacado

Destacado (20)

Remembering Kindergarten
Remembering KindergartenRemembering Kindergarten
Remembering Kindergarten
 
Web 2.0 Consider the Possibilities
Web 2.0 Consider the PossibilitiesWeb 2.0 Consider the Possibilities
Web 2.0 Consider the Possibilities
 
Back to the Basics...What Really Matters Now
Back to the Basics...What Really Matters NowBack to the Basics...What Really Matters Now
Back to the Basics...What Really Matters Now
 
Re-Discovering Joy
Re-Discovering JoyRe-Discovering Joy
Re-Discovering Joy
 
Sharing P B S 2009
Sharing  P B S 2009Sharing  P B S 2009
Sharing P B S 2009
 
Evidencias día 2
Evidencias día 2Evidencias día 2
Evidencias día 2
 
Evolucion de la programacion
Evolucion de la programacionEvolucion de la programacion
Evolucion de la programacion
 
Programa Completo
Programa CompletoPrograma Completo
Programa Completo
 
Globalizacion
GlobalizacionGlobalizacion
Globalizacion
 
Mi Primer Powert Point
Mi Primer Powert PointMi Primer Powert Point
Mi Primer Powert Point
 
Trabajo colaborativo nrc 813
Trabajo colaborativo nrc 813Trabajo colaborativo nrc 813
Trabajo colaborativo nrc 813
 
Análises de conteudos
Análises de conteudosAnálises de conteudos
Análises de conteudos
 
Cláusulas contratuais
Cláusulas contratuaisCláusulas contratuais
Cláusulas contratuais
 
A poliomielite
A poliomieliteA poliomielite
A poliomielite
 
blogs
blogsblogs
blogs
 
Astronomia
AstronomiaAstronomia
Astronomia
 
Guitarras rápidas
Guitarras rápidasGuitarras rápidas
Guitarras rápidas
 
Elizabeth arquitectura
Elizabeth arquitecturaElizabeth arquitectura
Elizabeth arquitectura
 
Revista da turma da mônica sobre drogas
Revista da turma da mônica sobre drogasRevista da turma da mônica sobre drogas
Revista da turma da mônica sobre drogas
 
Set natalizi
Set nataliziSet natalizi
Set natalizi
 

Similar a Digital Citizens

Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshopforensicsnation
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshopforensicsnation
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletLockley
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)Chris Jagger
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Eng 101 essay 2 revisied
Eng 101 essay 2 revisiedEng 101 essay 2 revisied
Eng 101 essay 2 revisiedAliciaHamrick
 

Similar a Digital Citizens (16)

Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Cyrenne Madlangsakay
Cyrenne MadlangsakayCyrenne Madlangsakay
Cyrenne Madlangsakay
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshop
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)
 
NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Eng 101 essay 2 revisied
Eng 101 essay 2 revisiedEng 101 essay 2 revisied
Eng 101 essay 2 revisied
 

Más de Dean Shareski

What's Your Unfair Advantage?
What's Your Unfair Advantage?What's Your Unfair Advantage?
What's Your Unfair Advantage?Dean Shareski
 
When The Answer is Both
When The Answer is BothWhen The Answer is Both
When The Answer is BothDean Shareski
 
From Storytelling to StoryMaking
From Storytelling to StoryMakingFrom Storytelling to StoryMaking
From Storytelling to StoryMakingDean Shareski
 
New Culture of Leaders
New Culture of LeadersNew Culture of Leaders
New Culture of LeadersDean Shareski
 
Personal and Personalized Learning
Personal and Personalized LearningPersonal and Personalized Learning
Personal and Personalized LearningDean Shareski
 
That's So Fake: Exploring Critical Literacy
That's So Fake: Exploring Critical LiteracyThat's So Fake: Exploring Critical Literacy
That's So Fake: Exploring Critical LiteracyDean Shareski
 
Better Presentations
Better Presentations Better Presentations
Better Presentations Dean Shareski
 
Rethinking digital citizenship
Rethinking digital citizenshipRethinking digital citizenship
Rethinking digital citizenshipDean Shareski
 
Discovery Education Free Resources
Discovery Education Free ResourcesDiscovery Education Free Resources
Discovery Education Free ResourcesDean Shareski
 
Engaging Learners with Technology
Engaging Learners with TechnologyEngaging Learners with Technology
Engaging Learners with TechnologyDean Shareski
 
Is Sharing a Moral Imperative?
Is Sharing a Moral Imperative?Is Sharing a Moral Imperative?
Is Sharing a Moral Imperative?Dean Shareski
 
Myth busting and the Nigerian Prince
Myth busting and the Nigerian PrinceMyth busting and the Nigerian Prince
Myth busting and the Nigerian PrinceDean Shareski
 
Airing of grievances
Airing of grievancesAiring of grievances
Airing of grievancesDean Shareski
 
Interactiv 15: From So What to Now What?
Interactiv 15: From So What to Now What?Interactiv 15: From So What to Now What?
Interactiv 15: From So What to Now What?Dean Shareski
 
The Great Canadian Educator
The Great Canadian EducatorThe Great Canadian Educator
The Great Canadian EducatorDean Shareski
 
Whatever Happened to Joy?
Whatever Happened to Joy? Whatever Happened to Joy?
Whatever Happened to Joy? Dean Shareski
 
Rethinking digital citizenship
Rethinking digital citizenshipRethinking digital citizenship
Rethinking digital citizenshipDean Shareski
 

Más de Dean Shareski (20)

What's Your Unfair Advantage?
What's Your Unfair Advantage?What's Your Unfair Advantage?
What's Your Unfair Advantage?
 
When The Answer is Both
When The Answer is BothWhen The Answer is Both
When The Answer is Both
 
From Storytelling to StoryMaking
From Storytelling to StoryMakingFrom Storytelling to StoryMaking
From Storytelling to StoryMaking
 
New Culture of Leaders
New Culture of LeadersNew Culture of Leaders
New Culture of Leaders
 
Personal and Personalized Learning
Personal and Personalized LearningPersonal and Personalized Learning
Personal and Personalized Learning
 
That's So Fake: Exploring Critical Literacy
That's So Fake: Exploring Critical LiteracyThat's So Fake: Exploring Critical Literacy
That's So Fake: Exploring Critical Literacy
 
Better Presentations
Better Presentations Better Presentations
Better Presentations
 
Rethinking digital citizenship
Rethinking digital citizenshipRethinking digital citizenship
Rethinking digital citizenship
 
Real or fake?
Real or fake?Real or fake?
Real or fake?
 
Discovery Education Free Resources
Discovery Education Free ResourcesDiscovery Education Free Resources
Discovery Education Free Resources
 
The Story of STEM
The Story of STEMThe Story of STEM
The Story of STEM
 
Engaging Learners with Technology
Engaging Learners with TechnologyEngaging Learners with Technology
Engaging Learners with Technology
 
Is Sharing a Moral Imperative?
Is Sharing a Moral Imperative?Is Sharing a Moral Imperative?
Is Sharing a Moral Imperative?
 
Myth busting and the Nigerian Prince
Myth busting and the Nigerian PrinceMyth busting and the Nigerian Prince
Myth busting and the Nigerian Prince
 
Airing of grievances
Airing of grievancesAiring of grievances
Airing of grievances
 
Interactiv 15: From So What to Now What?
Interactiv 15: From So What to Now What?Interactiv 15: From So What to Now What?
Interactiv 15: From So What to Now What?
 
The Great Canadian Educator
The Great Canadian EducatorThe Great Canadian Educator
The Great Canadian Educator
 
Whatever Happened to Joy?
Whatever Happened to Joy? Whatever Happened to Joy?
Whatever Happened to Joy?
 
Rethinking digital citizenship
Rethinking digital citizenshipRethinking digital citizenship
Rethinking digital citizenship
 
Future classrooms
Future classroomsFuture classrooms
Future classrooms
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Digital Citizens

  • 1.  
  • 5.  
  • 8. “ So first fact is that the predominant online sex crime victims are not young children. They are teenagers. There’s almost no victims in the sample that we collected from – a representative sample of law enforcement cases that involved the child under the age of 13.”
  • 9.
  • 10. “ Our research, actually looking at what puts kids at risk for receiving the most serious kinds of sexual solicitation online, suggests that it’s not giving out personal information that puts kid at risk. It’s not having a blog or a personal website that does that either.”
  • 11. “ What puts kids in danger is being willing to talk about sex online with strangers or having a pattern of multiple risky activities on the web like going to sex sites and chat rooms, meeting lots of people there, kind of behaving in what we call like an internet daredevil .”
  • 12.  
  • 13. “… three and seven percent of young people are targeted by frequent bullying on the internet and text messaging. By frequent I mean at least once a month or more often.”
  • 15. 55% Teens have online profiles
  • 16. 65% Of teens have private settings
  • 17.