SlideShare uma empresa Scribd logo
1 de 19
CYBER WORLD   Conquers Adolescents
SOCIAL NETWORKING
Generation Divide 9th grader: “My parents don’t understand that I’ve been online since I was in 2nd grade.  I know what to watch out for.” Parent: “I feel like I’m always on the outside looking in.  Technology is making it hard to relate to my child.” Teacher: “I need to find way to entertain my students.  We have to cut through the cloud of information and media surrounding them to capture their attention
[object Object],[object Object],[object Object],[object Object],[object Object],Survey of social networking
 
Some of the Popular Social-Networking Sites ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ADULT SITES
ADULT SITES   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Adult sites are the great evil   ,[object Object],[object Object],[object Object],[object Object]
ADULT SITES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Effects of ADULT sites   ,[object Object],[object Object],[object Object],[object Object],[object Object]
CYBER BULLYING
[object Object],[object Object],[object Object],WHAT IS BULLYING ?
About 25% of teens report being victims of cyberbullying, and over a third (35%) of teens reported feeling unaffected by it .......Yet, the vast majority of victims reported  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Children's after cyber bullying
 
Cyber bullying typically starts at about 9 years of age and usually ends after 14 years of age; after 14, it becomes cyber or sexual harassment due to nature of acts and age of actors  Affects 65-85% of kids in the core group directly or indirectly through close friends  Problems in studies: not assessing the ‘real thing’ i.e. Only 15% of parent polled knew what cyber bullying was 65% of their students between 8-14 have been involved directly or indirectly in a cyber bullying incident as the cyber bully, victim or friend 21% of kids have received mean or threatening e-mail or other messages 58% have not told their parents or an adult about something mean or hurtful that happened to them online. Report of bullying
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Best Advise for Parents
The End  By Gocool  BCA 1 st  year

Mais conteúdo relacionado

Mais procurados

Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson Martinez
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineMichael Heron
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Anissa and gabby with song
Anissa and gabby with songAnissa and gabby with song
Anissa and gabby with songkcurranlitlover
 
Erwc period 1cyber bullying
Erwc period 1cyber bullyingErwc period 1cyber bullying
Erwc period 1cyber bullyingkcurranlitlover
 
Anissaandgabbywithsong 130320081154-phpapp02
Anissaandgabbywithsong 130320081154-phpapp02Anissaandgabbywithsong 130320081154-phpapp02
Anissaandgabbywithsong 130320081154-phpapp02kcurranlitlover
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 

Mais procurados (20)

Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Sexting?What would your Grandma Think?
Sexting?What would your Grandma Think?Sexting?What would your Grandma Think?
Sexting?What would your Grandma Think?
 
Anissa and gabby with song
Anissa and gabby with songAnissa and gabby with song
Anissa and gabby with song
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Erwc period 1cyber bullying
Erwc period 1cyber bullyingErwc period 1cyber bullying
Erwc period 1cyber bullying
 
Anissaandgabbywithsong 130320081154-phpapp02
Anissaandgabbywithsong 130320081154-phpapp02Anissaandgabbywithsong 130320081154-phpapp02
Anissaandgabbywithsong 130320081154-phpapp02
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 

Destaque

Nanobeam implantation
Nanobeam implantationNanobeam implantation
Nanobeam implantationSam Brown
 
Guia eventos sostenibles
Guia eventos sosteniblesGuia eventos sostenibles
Guia eventos sosteniblesAlbert Hereu
 
Anessentialguidetopossibilitiesandrisksofcloudcomputing apragmaticeffectivean...
Anessentialguidetopossibilitiesandrisksofcloudcomputing apragmaticeffectivean...Anessentialguidetopossibilitiesandrisksofcloudcomputing apragmaticeffectivean...
Anessentialguidetopossibilitiesandrisksofcloudcomputing apragmaticeffectivean...Nitish Bhardwaj
 
Anessentialguidetopossibilitiesandrisksofcloudcomputing apragmaticeffectivean...
Anessentialguidetopossibilitiesandrisksofcloudcomputing apragmaticeffectivean...Anessentialguidetopossibilitiesandrisksofcloudcomputing apragmaticeffectivean...
Anessentialguidetopossibilitiesandrisksofcloudcomputing apragmaticeffectivean...Nitish Bhardwaj
 
Macroeconomics
MacroeconomicsMacroeconomics
Macroeconomicskxtan2
 
Sandcamp SEO Presentation 1/24/10
Sandcamp SEO Presentation 1/24/10Sandcamp SEO Presentation 1/24/10
Sandcamp SEO Presentation 1/24/10Max Thomas
 

Destaque (7)

Nanobeam implantation
Nanobeam implantationNanobeam implantation
Nanobeam implantation
 
C R C T Study Guide Gr1
C R C T  Study Guide  Gr1C R C T  Study Guide  Gr1
C R C T Study Guide Gr1
 
Guia eventos sostenibles
Guia eventos sosteniblesGuia eventos sostenibles
Guia eventos sostenibles
 
Anessentialguidetopossibilitiesandrisksofcloudcomputing apragmaticeffectivean...
Anessentialguidetopossibilitiesandrisksofcloudcomputing apragmaticeffectivean...Anessentialguidetopossibilitiesandrisksofcloudcomputing apragmaticeffectivean...
Anessentialguidetopossibilitiesandrisksofcloudcomputing apragmaticeffectivean...
 
Anessentialguidetopossibilitiesandrisksofcloudcomputing apragmaticeffectivean...
Anessentialguidetopossibilitiesandrisksofcloudcomputing apragmaticeffectivean...Anessentialguidetopossibilitiesandrisksofcloudcomputing apragmaticeffectivean...
Anessentialguidetopossibilitiesandrisksofcloudcomputing apragmaticeffectivean...
 
Macroeconomics
MacroeconomicsMacroeconomics
Macroeconomics
 
Sandcamp SEO Presentation 1/24/10
Sandcamp SEO Presentation 1/24/10Sandcamp SEO Presentation 1/24/10
Sandcamp SEO Presentation 1/24/10
 

Semelhante a cyberworld

Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011daniel_eukids
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshopforensicsnation
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshopforensicsnation
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura BatesCranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura BatesCranleigh School
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online PedophilesJustine
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internetVictor Font
 
Cyberbullying research
Cyberbullying researchCyberbullying research
Cyberbullying researcha2cole13
 

Semelhante a cyberworld (20)

Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
 
Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011
 
Week 5
Week 5Week 5
Week 5
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshop
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
102009
102009102009
102009
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura BatesCranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online Pedophiles
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
 
Cyberbullying research
Cyberbullying researchCyberbullying research
Cyberbullying research
 
Presentation1
Presentation1Presentation1
Presentation1
 

Último

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Último (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

cyberworld

  • 1. CYBER WORLD Conquers Adolescents
  • 3. Generation Divide 9th grader: “My parents don’t understand that I’ve been online since I was in 2nd grade. I know what to watch out for.” Parent: “I feel like I’m always on the outside looking in. Technology is making it hard to relate to my child.” Teacher: “I need to find way to entertain my students. We have to cut through the cloud of information and media surrounding them to capture their attention
  • 4.
  • 5.  
  • 6.
  • 8.
  • 9.
  • 10.
  • 11.
  • 13.
  • 14.
  • 15.  
  • 16. Cyber bullying typically starts at about 9 years of age and usually ends after 14 years of age; after 14, it becomes cyber or sexual harassment due to nature of acts and age of actors Affects 65-85% of kids in the core group directly or indirectly through close friends Problems in studies: not assessing the ‘real thing’ i.e. Only 15% of parent polled knew what cyber bullying was 65% of their students between 8-14 have been involved directly or indirectly in a cyber bullying incident as the cyber bully, victim or friend 21% of kids have received mean or threatening e-mail or other messages 58% have not told their parents or an adult about something mean or hurtful that happened to them online. Report of bullying
  • 17.
  • 18.
  • 19. The End By Gocool BCA 1 st year