Who Steals My Purse Steals Trash
“Who steals my purse steals trash,” Shakespeare wrote, “but he that filches from me my good name robs me of that which not enriches him, and makes me poor indeed.”
“Who steals my purse steals trash,” Shakespeare wrote, “but he that filches from me my good name robs me of that which not enriches him, and makes me poor indeed.”
If you have children who have access to a phone and the ability to text, you may be venturing into a completely new area of communication with them. Have you noticed emoji replies? Or abbreviated statements? GIF-only responses or memes that you have to Google to understand? You aren’t alone.
So what should parents make of this?
For most of us, the Internet has become an indispensable part of our social lives: we use it to keep up with old friends, keep in touch with our families and meet new people. Unfortunately, not all online interactions are as positive as these. This tip sheet will explain some of the issues we face when we socialize online and provide tips for dealing with them.
Most of what we do online falls into one of three categories: Talk, Shop and Play. There are risks associated with all these activities that consumers need to be aware of so they can take the necessary steps to protect themselves and their computers.
The Canadian Internet Registration Authority (CIRA), in partnership with MediaSmarts wants to make sure you stay safe online. We have developed the following list of potential risks you may encounter during your online experience and suggested tools that may assist in lowering the level of risk.
Talking to kids about violence in the media they consume – television, movies, video games, music and the Internet – can help them put media violence into perspective and perhaps diffuse some of its power.
The term “Web 2.0” was coined to describe (and, in part, predict) the rise in user-created content on the Net. Recently there have been two stories that show interesting developments in Web 2.0's evolution: bumps in the road to the anticipated convergence with television, and the rise of 2.0 as alternative journalism.
Time Management
The nature of online sexual exploitation is widely misunderstood: “Instead of pedophiles (ie individuals with sexual interests in children) preying on young children, most Internet-initiated sex crimes involve young adults (mostly men) who target and seduce teenagers into sexual encounters.” Similarly, child sexual abuse material is most frequently produced by victims’ family members, with fathers being the single most common perpetrators. Even in cases of sextortion, 60 percent of youth who are victims know the perpetrators offline.
We got a new tech toy at Christmas this year – a Google Home. I must admit, I’d only learned that such a device existed a couple of weeks before I ordered one as a gift for my husband. I wasn’t sure what it would do or how we would use it, but it seemed like fun and it was on sale, so I picked one up.
One of the biggest changes in our understanding of bullying over the past few years has been our increased awareness of the important role that witnesses, or bystanders, play in any bullying situation. Research on offline bullying has shown that witnesses can be just as important as targets or perpetrators in determining how a bullying scenario plays out. This is especially relevant in the case of electronic bullying, where witnesses have many more choices in how they might engage: they can choose to be invisible, to join in anonymously, to re-victimize someone by forwarding bullying material – or they can choose to intervene, to offer support to the person being targeted and to bear witness to what they have seen