Narratives of Violence Against Women and Minorities
Here stands the spring whom you have stain’d with mud,
This goodly summer with your winter mix’d.
You kill’d her husband, and for that vile fault
Two of her brothers were condemn’d to death,
My hand cut off and made a merry jest;
Both her sweet hands, her tongue, and that more dear
Than hands or tongue, her spotless chastity,
Inhuman traitors, you constrain’d and forced.
Titus Andronicus, Act 5, Sc. II.
How Kids Cyberbully
Verbal or emotional abuse is the most prevalent form of bullying online. Social bullying, another pervasive form – particularly with girls – includes social exclusion and spreading gossip and rumours.
Cyber Security: Special Issues for Young Children
Children may be particularly at risk online because they’re not always aware of the risks associated with what they’re doing. For that reason, children need close supervision when using digital devices and also need to be taught basic cyber security skills as early as possible.
Cyber Security: Special Issues for Teens
Teens use the internet as much, and in similar ways, as adults. But they also often engage in risky behaviour such as downloading sketchy apps or pirated music. Social networking sites can also expose teens to a variety of security risks.
Legislation and Regulation
Many online threats are covered by existing civil and criminal law in Canada and other countries. In addition, many countries have specific legislation to deal with online crime. This section looks at Canadian and American laws that apply to cyber security.
Cyber Security: Spam, Scams, Frauds and Identity Theft
Spam, online scams and frauds, identity theft and issues related to online purchases are a serious issue in the online world. Navigating the Web while avoiding these threats can be a challenging task.
Cyber Security: Software Threats
Software threats are malicious pieces of computer code and applications that can damage your computer, as well as steal your personal or financial information. For this reason, these dangerous programs are often called malware (short for “malicious software”).
What Can I do About Privilege?
First of all, you can’t choose to give up privilege – privilege is by definition an unearned advantage and you cannot choose to not have it. Guilt and shame are not, however, productive ways to deal with this.
The impact of stereotyping on young people
Generations of North American children have grown up watching “cowboys and Indians” films and TV shows and reading books such as The Adventures of Tom Sawyer and Little House on the Prairie. Popular films and novels reinforced the notion that Indigenous people existed only in the past—forever chasing buffalo or being chased by the cavalry. These images showed them as destined to remain on the margins of “real” society. Such impressions and childhood beliefs, set at an early age, are often the hardest to shake: as Anishinaabe writer Jesse Wente explains, “In the absence of appropriate representations of Indigenous Peoples in the media, misrepresentations become the accepted ‘truth.’”[1]