FEMALE PRIVACY AND CLOUD SECURITY 1

Size: px
Start display at page:

Download "FEMALE PRIVACY AND CLOUD SECURITY 1"

Transcription

1 FEMALE PRIVACY AND CLOUD SECURITY 1 Female Privacy and Cloud Security via Smartphones Jasmijn Kol, Dominik Terweh, Judith Weda Cyber-Crime Science Prof Dr Pieter Hartel, Prof Dr Marianne Junger , University of Twente

2 FEMALE PRIVACY AND CLOUD SECURITY 2 Abstract This research tries to determine whether or not an educational game could be a satisfying prevention method against the leakage of personal data from clouds. Due to recent leakage of celebrity nude photos, women are getting aware that they have insufficient knowledge about protecting their own privacy on phones and clouds. Through questionnaires and a serious game or task list, participants are examined on their cloud and phone skills. Participants using a list to complete tasks take a significant amount of more time to complete tasks compared to participants who use the game. Introduction Due to a recent leakage of celebrity nude photos, women are getting aware that they have insufficient knowledge about protecting their privacy on the Internet. This is a big problem, since many (young) women have private pictures on their phones. They often do not know that these pictures get stored, automatically, in huge databanks or clouds. Leakage of these images to the wrong people could have huge consequences for their future career and private life. Therefor, it is key to educate women on the dangers of cloud storage, prevention and security as best as possible, for their own protection. Literature study Harassment, cyber stalking and cyber-pornography are the most used crimes against women worldwide. (Agarwal, 2013) The second being the most relevant to this paper, since posting someone s private pictures online is a type of cyber-stalking. It is also stated by Agarwal, that Cyber stalking usually occurs with women, who are stalked by men, or children who are stalked by adult predators. [ ] It is believed that over 75% of the cyber-stalking victims are female. The motives behind cyber stalking have been divided into four reasons, namely, for sexual harassment, for obsession for love, for revenge and for ego and power trips. (2013, p.

3 FEMALE PRIVACY AND CLOUD SECURITY 3 2). It is supported by Halder and Jaishankar, that these crimes mostly seem to be in a sexual nature. They state that: In most cases male harassers attack the victim for sexual purposes like morphing, using the image for pornographic purposes, cyber stalking etc. [...] (2009, p. 12). In this new age females are at a higher risk of these crimes, especially when they act carelessly when sharing or storing sensitive information. Individuals may increase their chances of coming in contact with potential harassers by regularly using computer-mediated communications such as chat rooms or social networking sites to connect with others (Finn, 2004). These are all very basic services, used by practically everybody. Any individual that does not know how to protect him or herself could be a potential victim of cybercrimes. The Internet and easy sharing shows to be a threat to women around the globe especially those that are unaware of the dangers and consequences of sharing indiscriminately. The obvious danger associated with sexting is that the material can be easily and widely disseminated. Once the message or image is in cyberspace, the sender loses control over the material and cannot assume that it will remain private. (Katzman, 2010) It is easy to forget that once something has been placed on the Internet, on a cloud or otherwise, it is unlikely for it to ever be fully deleted. Therefore women have to be educated about the risks they take when they take pictures and store them. The goal of the research is to find ways to improve cloud- and phone safety awareness, in women. Finn claims that: Individuals must become savvy both online and offline; know how to take precautionary measures in cyberspace and how to seek recourse if their rights are violated. (Finn, Banach, 2000) Dashora introduces a list of things one can do to protect oneself from cyber crime. (2011) They are useful tips, but they might not reach people, as they are stated in a scholarly paper. Misra mostly talks about several remedies to help prevent cyber crime. The most important thing for this research is the introduction of raising awareness about cyber culture and it s drawbacks. (2011) The intention is to educate through a game, designed to help women secure their phone and data.

4 FEMALE PRIVACY AND CLOUD SECURITY 4 It has been shown that serious games are powerful learning tools, not limited to training but useful for a vast diversity of educational purposes. (Mouaheb, Fahli, Moussetad, Eljamili, 2012) Computer and videogames can be regarded as providing authentic, meaningful and powerful contexts for learning. [ ] Further, when contrasted with traditional views of education, games provide a learner-centred rather than teacher-centred approach to education. (Stapleton, 2004, p.5) The game should make the users more aware of the dangers of the Internet and make them better at securing their phone in comparison to their peers. This is a prevention method. It will not solve the problem of hackers trying to get personal data from women (or male users). However, helping women to secure their phones will, hopefully, prevent another leakage of personal photos from happening again. Method The study that will be performed is whether or not an educational game is a good way to teach women about how their phone security works and how to prevent big security leakages. There will be a test group and a control group. Both groups will fill out the same questionnaire. After the first questionnaire, the control group will do six tasks without the help of any medium. The test group will get an educational game, which will guide them through the same tasks. The game provides both an explanation and enjoyment while completing the tasks. What will be tested, is if participants have a better ability to find the things they need to do to protect their phone and why, with an educational game. In Appendix B, a description of this educational game, the intervention, will be provided. At the end of their session, the test subjects will fill out another questionnaire, to see if their skills and knowledge about phone and cloud security has improved. During the second part of the research (the completion of the tasks), both groups will be observed by one of the researchers. The observer will be present to assess the subject and their skill and skill

5 FEMALE PRIVACY AND CLOUD SECURITY 5 improvement, as well as their reactions to the game, if the subject is part of the test group. Which group a subject is part of will be randomly decided before their session begins. Both groups will consist of women only, as they are the main target group. The subject group will be a small, random sample of women between the ages of 18 and 30. This is the group that is most vulnerable to online cyber stalking attacks of a sexual nature. The observer will write down the time that each participant spends on each task, how much difficulty the participant had while completing each task (at a scale of 1 to 5), and if the task was completed or not. The tasks that the participants will need to complete are: 1. Check whether your system is up to date 2. Turn off add tracking. This prevents companies from using your browser data to give you personalized ads. 3. Turn off location tracking completely or for certain apps. 4. Access your cloud (icloud for iphone users, Google Drive for Android). 5. Turn off the automatic back-up function 6. Turn off the iphone keychain (iphone) or the function which codes your documents (Drive) There are two hypotheses in this research that need to be taken into account. First and foremost, one assumption is that the test group will give a better performance when it comes to the completion of the tasks. This means that they will either take less time in completing the tasks, they will complete more tasks, or they struggle less compared to the participants in the control group. The second hypothesis is that the test group will have a better understanding of how to secure their phone and why. This can be measured using the outcome of the second test. There should be a significantly larger improvement between the first and second test, compared to the control group, to support this hypothesis.

6 FEMALE PRIVACY AND CLOUD SECURITY 6 The independent variables are: age, study and the skill of the participant when it comes to their phone and its security. Age and study can be of influence. Knowledge can come with age or younger women might be better in securing their phones because of recent technological developments, instead. The study of the participant could be of importance since some studies have a higher regard for technology than others, which might influence the abilities of the participant. The last of these dependent variables is likely to have the most influence on the dependent variable. The dependent variable in this research is whether the subject can successfully secure their phone or not. The independent variables are measured using the questionnaires. The skill of the participant is measured based on the subject s own perception of their skills. Questions such as: Do you have an affinity for technology?, How well do you know your phone on a scale from 1 to 5? and Do you think that your phone is secured well? try to give a rough estimate of the participants skills about their phone usage. This estimate might have an influence on the participant s ability to secure their phone, which is why this is an independent variable. The dependent variable is measured by observing the participants while they complete the tasks. Results The results that are found will be discussed in this section of the document. There was a significant difference between the performances of the participants in the test group, compared to those in the control group. The observers classified the participant s abilities per task, by determining the amount of struggle that was seen in the participant (Figure 1+2). Figure 2: All over average times for the two groups needed to perform the tasks.

7 FEMALE PRIVACY AND CLOUD SECURITY number of people tasks little rather little okay a lot very much STRUGGELING Figure 1: the control group performs the tasks with observations number of people tasks little rather little okay a lot very much STRUGGELING Figure 2: the test group performs the tasks with observations From this figure, it is clear that people without the educational game, struggled more compared to those who could play the game. The differences are especially obvious for task 3 (Appendix C, TASK 3) and 5 (Appendix C, TASK 3). The test group had no issues at all in completing this task, while about half of the control group participants struggled on these same tasks. With task 2 both groups seemed to struggle. However, 70% of the participants of the control group struggled very much compared to 10% of the test group. Also 20% of the participants of the control group do not have any struggles at all, compared to 40% of the test participants. Therefor, based on the numbers, we can state that the test group performed better on average, compared to the control group.

8 FEMALE PRIVACY AND CLOUD SECURITY task no control group test group time in seconds Figure 1: the control group performs the tasks with observations (Appendix C, TIME) The time spent per task was also measured. The average time needed per task can be found in Figure 3. For the second task, the control group needed a lot more time then the test group. The same goes for task 5. For task 4, the test group needed more time then the control group, on average, which is slightly surprising. Conclusion and discussion Concluding from this research, it can be said that the interference of a game is a positive teaching method. This, because the game caused a better performance under the participants, compared to the participants who did not use the game. It appears that the women who participated had a better understanding of how to secure their phone once done with the tasks in the game. They also thought they would use some of the things learned in the game, in the future. This is a very positive observation. However, the amount of participators (20 total, 10/10) is not a big enough sample to draw this conclusion over a larger group of people. Not enough information has been gathered for this research to actually qualify as valid. For further research, more participants need to be found. Also the game is quite simple. It fulfilled its use during the research, but on a bigger scale, it would be better to have a somewhat more professional game.

9 FEMALE PRIVACY AND CLOUD SECURITY 9 References Agarwal, R. (2013) Cyber Crime Against Women and Regulations in India <http://www.tmu.ac.in/gallery/viewpointsdcip2013/pdf/track4/t-403.pdf> Dashora, K. (2011) Cyber Crime in Society: Problems and Preventions. Journal of Alternative Perspectives in the Social Sciences. 3 (1) Finn, Jerry A Survey of Online Harassment at a University Campus. Journal of Interpersonal Violence 19 ( 4 ): Finn, J. & Banach, M. (2000) Victimization online: The downside of seeking human services for women on the Internet. CyberPsychology & Behavior. Halder, D. & Jaishankar, K. (2009) Cyber Socializing and Victimization of Women, Temida, p Katzman, D.K. (2010) Sexting: Keeping Teens Safe in a Technologically Savvy World <http://www.cps.ca/documents/position/sexting> Misra, R. (2013) Cyber Crime Against Women <http://papers.ssrn.com/sol3/papers.cfm?abstract_id= > Mouaheb, H., Fahli, A., Moussetad & M., Eljamili, S. (2012) The Serious Game: What Educational Benefits?, Procedia Social and Behavioral Sciences, Vol.46, p

10 FEMALE PRIVACY AND CLOUD SECURITY 10 Stapleton, A.J. (2004) Serious Games: Serious Opportunities. Melbourne, VIC. Appendix A Checklist ethical permissibility of research. This version of the checklist is only to be used for proposed research conducted as part of the Cyber-crime Science Course. Items that are greyed-out should not be changed. If you would like to answer one of the greyed-out questions differently, you must complete the regular (full) checklist instead, which can be found on the web site of the ethical committee: General When answering the questions, it is advisable to consult the chapter on standardized research (see the protocol on the web site of the ethical committee) because the answers will be considered with this in mind. 1. Title of the project: Cloud and phone safety awareness 2. Principal researcher: Pieter Hartel 3. Researchers: Jasmijn Kol, Dominik Terweh, Judith Weda 4. Department responsible for the research: EWI/SCS 5. Location where research will be conducted: University of Twente 6. Short description of the project (about 100 words): The research will explore whether cloud and phone security can be improved by playing a simple game guiding female users through their phone and maximize their safety as well as teaching the users about the importance of cloud and phone security. 7. Expected duration of the project and research period: 3 weeks 8. Number of experimental subjects: EC member of the department: Roel Wieringa Questions about general requirements and conditions 1. Has this research or similar research by the department been previously submitted to the EC? Yes, No If yes, what was the number allocated to it by the EC? (See the Website of the Ethical Committee) 2. Under which category does the research fall with regard to the consideration of Medical / Not medical? Category D Category A Category B Category C Uncertain, explain why Explanatory notes: This is non-medical research with negligible risk, hence category D. 3. Are adult, competent subjects selected? Yes, indicate in which of the ways named in the general requirements and conditions this is so No, explain Uncertain, explain why Explanatory notes: Only females between the ages of 18 and 28 are selected to join this research

11 FEMALE PRIVACY AND CLOUD SECURITY Are the subjects completely free to participate in the research, and to withdraw from participation whenever they wish and for whatever reason? Yes No, explain why not Uncertain, explain why Explanatory notes: Subjects are completely free to deny participating in the research and are free to leave at any time during their session. 5. In the event that it may be necessary to screen experimental subjects in order to reduce the risks of adverse effects of the research: Will the subjects be screened? Screening is not necessary, explain why not Yes, explain how No, explain why not Uncertain, explain why Explanatory notes: The risk for subjects is nil, hence no screening is required. 6. Does the method used allow for the possibility of making an accidental diagnostic finding which the experimental subject should be informed about? (See general conditions.) No, the method does not allow for this possibility Yes, and the subject has given signed assent for the method to be used Yes, but the subject has not given signed assent for the method to be used Uncertain, explain why Explanatory notes: 7. Are subjects briefed before participation and do they sign an informed consent beforehand in accordance with the general conditions? Yes, attach the information brochure and the informed consent form to be signed No, explain why not Uncertain, explain why Explanatory notes: 8. Are the requirements with regard to anonymity and privacy satisfied as stipulated in 5.2.7? Yes No, explain why not Uncertain, explain why Explanatory notes: All researchers will complete and sign a PII form (as attached to this document) to state that they will treat all data according to of the protocol 9. If any deception should take place, does the procedure comply with the general terms and conditions (no deception regarding risks, accurate debriefing)? No deception takes place The deception which takes place complies fully with the conditions (explain) The deception which takes place does not comply with the conditions (explain) If deception does take place, attach the method of debriefing Explanatory notes: 10. Is it possible that after the recruitment of experimental subjects, a substantial number will withdraw from participating because, for one reason or another, the research is unpleasant? No Yes, that is possible Questions regarding specific types of standard research Answer the following questions based on the department to which the research belongs. 11. Does the research fall entirely within one of the descriptions of standard research as set out in the described standard research of the department? Yes, go to question 12 No, go to question 13

12 FEMALE PRIVACY AND CLOUD SECURITY 12 Uncertain, explain what about, and go to question 13 Explanatory notes: 12. Give a more detailed specification of the research. Provide all possible data that is relevant for an ethical consideration. I.e. is there any risk for stress for the subjects? If they self-select, explain how and consider any possible discomfort they may experience when taking part in the experiment. No deception will take place during the research. The game will be carefully designed as to not cause stress for the subject. Appendix B Description of the intervention The intervention was given to the test group, consisting of ten, randomly picked, female students between the ages of 18 and 30. The intervention was done by an educational game, or a playful guide. This would help the participants understand how to secure their devices as best as possible. The game will go through the following tasks: 1. Check whether your system is up to date 2. Turn off add tracking. This prevents companies from using your browser data to give you personalized ads. 3. Turn off location tracking completely or for certain apps. 4. Access your cloud (icloud for iphone users, Google Drive for Android). 5. Turn off the automatic back-up function 6. Turn off the iphone keychain (iphone) or the function which codes your documents (Drive) The tasks are explained by Jenny, a virtual personality that tells the users about the tasks and why these tasks are important to complete. Using screenshots from Android phones and iphones, the game guides the participant through all the steps that are necessary to take to complete each task. The participant can click through each task using the mouse button. Some screenshots of the intervention method can be found in Figure B1 and B2.

13 FEMALE PRIVACY AND CLOUD SECURITY 13 Figure B1: First question to be answered by the participant.

14 FEMALE PRIVACY AND CLOUD SECURITY 14 Figure B2: One of the tasks given to an iphone user. Appendix C Calculations for significance TASK 3: Calculations for the control group for the performance on task 3 For the test group the mean is 5 since there are only 5 in the sample. Since the mean of the test group is out of the boundaries of the 90% confidence interval we can say that the hypothesis that the game influences the performance of the players (in this case in task 3) is true with a probability of 90%.

15 FEMALE PRIVACY AND CLOUD SECURITY 15 TASK 5: Calculations for the control group for the performance on task 5 For the test group the mean is 5 since there are only 5 in the sample. Since the mean of the test group is out of the boundaries of the 95% confidence interval we can say that the hypothesis that the game influences the performance of the players (in this case in task 3) is true with a probability of 95%.

16 FEMALE PRIVACY AND CLOUD SECURITY 16 TIMES: Calculations for the control group for the testing times Calculations for the test group for the testing times Since the mean of the test group is out of the boundaries of the 85% confidence interval we can say that the hypothesis that the game influences the time of the tasks is true with a probability of 5%.

A Parents Guide to. 2014 ConnectSafely.org

A Parents Guide to. 2014 ConnectSafely.org A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.

More information

A Parents' Guide to. 2014 ConnectSafely.org

A Parents' Guide to. 2014 ConnectSafely.org A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram

More information

15 Dangerous Apps Every Parent Should Know About

15 Dangerous Apps Every Parent Should Know About 15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges

More information

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2 Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

SEXUAL PREDATORS ON MYSPACE:

SEXUAL PREDATORS ON MYSPACE: SEXUAL PREDATORS ON MYSPACE: A DEEPER LOOK AT TEENS BEING STALKED OR APPROACHED FOR SEXUAL LIAISONS Short Report 2006-01 Larry D. Rosen, Ph.D. California State University, Dominguez Hills July 2006 I recently

More information

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012 Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents

More information

Stalking 101: Understanding the lethality of stalking in today s world

Stalking 101: Understanding the lethality of stalking in today s world Stalking 101: Understanding the lethality of stalking in today s world Objectives Participants will be able to recognize the dynamics of stalking and the its impact on victims Participants will understand

More information

Privacy and the Internet AUSTRALIAN ATTITUDES TOWARDS PRIVACY IN THE ONLINE ENVIRONMENT

Privacy and the Internet AUSTRALIAN ATTITUDES TOWARDS PRIVACY IN THE ONLINE ENVIRONMENT APRIL MAY 2011 2012 ISSUE ISBN 40 978-1-922017-02-4 ISBN XXX-X-XX-XXXXXX-X Privacy and the Internet AUSTRALIAN ATTITUDES TOWARDS PRIVACY IN THE ONLINE ENVIRONMENT Key Findings 85% of online Australians

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human

More information

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

Backing Up Your Files. External Hard Drives

Backing Up Your Files. External Hard Drives Backing Up Your Files As we become more and more dependent on technology to help accomplish our everyday tasks, we tend to forget how easily the information stored on our computers can be lost. Imagine

More information

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 ) Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

Unit title: Cyber Security Fundamentals (SCQF level 4)

Unit title: Cyber Security Fundamentals (SCQF level 4) National Unit specification General information Unit code: H9T5 44 Superclass: CC Publication date: October 2015 Source: Scottish Qualifications Authority Version: 01 Unit purpose The purpose of this Unit

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

Working with Youth to Develop Critical Thinking Skills On Sexual Violence and Dating Violence: Three Suggested Classroom Activities

Working with Youth to Develop Critical Thinking Skills On Sexual Violence and Dating Violence: Three Suggested Classroom Activities Working with Youth to Develop Critical Thinking Skills On Sexual Violence and Dating Violence: Three Suggested Classroom Activities The Southern Arizona Center Against Sexual Assault s Rape Prevention

More information

exaggerated, electronic, gaming clan, meetup, pact, savvy

exaggerated, electronic, gaming clan, meetup, pact, savvy Lesson Plan # 4 Online/Electronic Lure Presenter Overview: Most teens regularly and safely interact online with people they don t know via social networking, media and gaming sites. Although news organizations

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

Cyberbullying, Sexting & Predators Oh My!

Cyberbullying, Sexting & Predators Oh My! Cyberbullying, Sexting & Predators Oh My! Addressing Youth Risk in the Digital Age in a Positive and Restorative Manner Nancy Willard Center for Safe and Responsible Internet Use Cyber Savvy Cyber Savvy

More information

Norton Online Reputation Report:

Norton Online Reputation Report: Norton Online Reputation Report: Why Millennials should manage their online footprint France May 2016 Methodology A quantitative survey was conducted online among 3,038 mobile users aged 18-34 years who

More information

IRB 101: HUMAN SUBJECTS PROTECTION PROGRAM

IRB 101: HUMAN SUBJECTS PROTECTION PROGRAM 1 IRB 101: HUMAN SUBJECTS PROTECTION PROGRAM Wednesday, April 23, 2014 Cohen Lounge Hila Berger, MPH, CIP Research Compliance Administrator Amy Krenzer, CIP IRB Coordinator 2 Objectives What is the IRB

More information

2012 NCSA / McAfee Online Safety Survey

2012 NCSA / McAfee Online Safety Survey 2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security

More information

2011 NCSA / McAfee Internet Home Users Survey

2011 NCSA / McAfee Internet Home Users Survey 2011 NCSA / McAfee Internet Home Users Survey National Cyber Security Alliance McAfee Zogby International October 2011 Methodology and Sample Characteristics IBOPE Zogby International was commissioned

More information

Abilene Independent School District. Bring Your Own Device Handbook

Abilene Independent School District. Bring Your Own Device Handbook Abilene Independent School District Bring Your Own Device Handbook Abilene ISD BYOD Handbook Revised 2012 Definition Bring Your Own Device (BYOD) is a policy that allows students to bring and use their

More information

ABSTRACT OF THE DOCTORAL THESIS BY Cătălin Ovidiu Obuf Buhăianu

ABSTRACT OF THE DOCTORAL THESIS BY Cătălin Ovidiu Obuf Buhăianu ABSTRACT OF THE DOCTORAL THESIS BY Cătălin Ovidiu Obuf Buhăianu Thesis submitted to: NATIONAL UNIVERSITY OF PHYSICAL EDUCATION AND SPORTS, Bucharest, Romania, 2011 Thesis Advisor: Prof. Dr. Adrian Gagea

More information

UAB Psychology Department Participant Pool Guide for Researchers 1 GUIDE FOR RESEARCHERS CONDUCTING RESEARCH WITH INTRODUCTORY PSYCHOLOGY STUDENTS

UAB Psychology Department Participant Pool Guide for Researchers 1 GUIDE FOR RESEARCHERS CONDUCTING RESEARCH WITH INTRODUCTORY PSYCHOLOGY STUDENTS UAB Psychology Department Participant Pool Guide for Researchers 1 GUIDE FOR RESEARCHERS CONDUCTING RESEARCH WITH INTRODUCTORY PSYCHOLOGY STUDENTS Introduction It is important that all students taking

More information

Google: Trust, Choice, and Privacy

Google: Trust, Choice, and Privacy Google: Trust, Choice, and Privacy Gus Meuli, Caitlin Finn Trust is hard to earn, easy to loose, and nearly impossible to win back. 1 This statement seems to ring true in the constantly changing world

More information

When should this tool be used?

When should this tool be used? Protecting adults at risk: The London Multi-agency policy and procedures to safeguard adults from abuse. Practice Guidance: Safeguarding Adults Risk Assessment & Risk Rating Tool Why do we need this tool?

More information

Email Address Co-Principal Investigator Information Co- Principal Investigator Faculty Staff Grad. Student Undergrad. Student

Email Address Co-Principal Investigator Information Co- Principal Investigator Faculty Staff Grad. Student Undergrad. Student Illinois State University Institutional Review Board Research with Human Subjects Protocol Submission Form IRB Number (Number to be completed by REC) Federal regulations and Illinois State University policy

More information

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Guidance on IRB Continuing Review of Research

Guidance on IRB Continuing Review of Research NOTE: THIS GUIDANCE SUPERSEDES OHRP S JANUARY 15, 2007 GUIDANCE ENTITILED GUIDANCE ON CONTINUING REVIEW. CLICK HERE FOR THE JANUARY 15, 2007 GUIDANCE. Office for Human Research Protections Department of

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Cyberbullying. Welcome!

Cyberbullying. Welcome! Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also

More information

Background. Executive Summary

Background. Executive Summary Background The Interdisciplinary Research Centre in Cyber Security at the University of Kent in Canterbury recently launched a second online survey 1 in order to get a better picture of the prevalence

More information

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. It can range

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Internet Safety Guide for Parents

Internet Safety Guide for Parents Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both

More information

e-safety for Parents

e-safety for Parents e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology

More information

Psychology. The Effects of Facebook on Jealousy in Relationships Jennifer L. Eby. This paper was written for Dr. Kraemer s Survey Research course.

Psychology. The Effects of Facebook on Jealousy in Relationships Jennifer L. Eby. This paper was written for Dr. Kraemer s Survey Research course. Psychology The Effects of Facebook on Jealousy in Relationships Jennifer L. Eby This paper was written for Dr. Kraemer s Survey Research course. What makes Facebook Facebook? And why are people are so

More information

Anonymity, Privacy, and Security Online

Anonymity, Privacy, and Security Online www.pewresearch.org SEPTEMBER 5, 2013 Anonymity, Privacy, and Security Online 86% of adult internet users have taken steps from time to time to avoid surveillance by other people or organizations when

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

2014 Teen Internet Safety Survey. Conducted by The Futures Company

2014 Teen Internet Safety Survey. Conducted by The Futures Company 2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Outsmarting On-line Predators. Christina Kilbourne

Outsmarting On-line Predators. Christina Kilbourne Outsmarting On-line Predators Christina Kilbourne Some Surprising Stats 26% believe their parents would be concerned if they knew what they were doing on-line over half have given out personal information

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Miami University: Human Subjects Research General Research Application Guidance

Miami University: Human Subjects Research General Research Application Guidance Miami University: Human Subjects Research General Research Application Guidance Use the accompanying Word template for completing the research description. You must provide sufficient information regarding

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

2013 NORTON REPORT 13,022 ONLINE ADULTS AGED 18-64

2013 NORTON REPORT 13,022 ONLINE ADULTS AGED 18-64 2013 NORTON REPORT 2013 NORTON REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA,

More information

Planning of the Pilot Program

Planning of the Pilot Program With the financial support from the European Commission - Justice DAPHNE III Programme of the European Planning of the Pilot Program This publication has been produced with the financial support of the

More information

Computer Facilities and External Networks Acceptable Use by Students

Computer Facilities and External Networks Acceptable Use by Students Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

Teen Online & Wireless Safety Survey

Teen Online & Wireless Safety Survey Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications

More information

G Data Mobile MalwareReport. Half-Year Report July December 2013. G Data SecurityLabs

G Data Mobile MalwareReport. Half-Year Report July December 2013. G Data SecurityLabs G Data Mobile MalwareReport Half-Year Report July December 2013 G Data SecurityLabs Contents At a glance... 2 Android malware: share of PUPs increasing significantly... 3 Android.Application consists of

More information

Common Facebook issues

Common Facebook issues Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young

More information

Sharing Personal Images and Videos Among Young People

Sharing Personal Images and Videos Among Young People Sharing Personal Images and Videos Among Young People Dr Andy Phippen, University of Plymouth Sexting is the act of sending sexually explicit messages or photos electronically, primarily between cell phones.

More information

Computing and Communication Policy on Acceptable Use of Electronic Resources

Computing and Communication Policy on Acceptable Use of Electronic Resources Computing and Communication Policy on Acceptable Use of Electronic Resources Summary This policy defines the boundaries of "acceptable use" of electronic resources, including computers, networks, electronic

More information

Free Article PHYSICAL PENTESTING A WHOLE NEW STORY IN PENETRATION TESTING 2/2011. by Trajce Dimkov & Wolter Pieters

Free Article PHYSICAL PENTESTING A WHOLE NEW STORY IN PENETRATION TESTING 2/2011. by Trajce Dimkov & Wolter Pieters Free Article 2/2011 PHYSICAL PENTESTING A WHOLE NEW STORY IN PENETRATION TESTING by Trajce Dimkov & Wolter Pieters FREE ARTICLE Physical Penetration Testing A Whole New Story In Penetration Testing Physical

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information

Institutional Review Board for the Use of Human Subjects in Research GUIDELINES FOR A PROPOSAL NARRATIVE

Institutional Review Board for the Use of Human Subjects in Research GUIDELINES FOR A PROPOSAL NARRATIVE Institutional Review Board for the Use of Human Subjects in Research GUIDELINES FOR A PROPOSAL NARRATIVE In your narrative, address each of the topics outlined below. Every application for IRB review must

More information

E-Safety Policy (Parent/Pupil) March 2013

E-Safety Policy (Parent/Pupil) March 2013 E-Safety Policy (Parent/Pupil) March 2013 1 ICT, Internet, Intranet and E-Mail Policy (Parent/Pupil) 1. Policy statement The purpose of this document is to set out detailed guidance for parents of pupils

More information

Sida. Andrew Lewman andrew@torproject.org. 26 May 2014

Sida. Andrew Lewman andrew@torproject.org. 26 May 2014 Sida Andrew Lewman andrew@torproject.org 26 May 2014 Who is this guy? Tor, a non-profit organization dedicated to the research and development of technologies for online anonymity and privacy. https://www.torproject.org

More information

Cybersecurity Protecting Yourself, Your Business, Your Clients

Cybersecurity Protecting Yourself, Your Business, Your Clients Cybersecurity Protecting Yourself, Your Business, Your Clients Global Summit of Women June 7, 2014 Celina B. Realuyo Professor of Practice of National Security Affairs William J. Perry Center for Hemispheric

More information

Mobile Security & BYOD Policy

Mobile Security & BYOD Policy Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers

More information

Computer Ethics. (Ethics) Ethics in Computer System (COMPUTER ETHICS AND COMPUTER SECURITY) Computer Ethics and Computer Security

Computer Ethics. (Ethics) Ethics in Computer System (COMPUTER ETHICS AND COMPUTER SECURITY) Computer Ethics and Computer Security 3 (COMPUTER ETHICS AND COMPUTER SECURITY) (Ethics) 4 Computer Ethics 2 Ethics in Computer System 4 Issues in Information Ethics* Consequences of Ethical Issues 5 6 *Richard O. Mason, Four Ethical Issues

More information

Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016

Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 PURPOSE Christian Academy of Knoxville provides technology resources for the school community with a belief that the educational

More information

Basic Computer Security Part 3

Basic Computer Security Part 3 Basic Computer Security Part 3 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9

September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9 Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

An investigation of the Issues and Solutions to Cyberspace Identity Theft and Crimes

An investigation of the Issues and Solutions to Cyberspace Identity Theft and Crimes Volume 1 Issue, Jan 13 @1 IJSK & K.J.A. All rights reserved ISSN 3-193 An investigation of the Issues and Solutions to Cyberspace Identity Theft and Crimes Amos Olagunju 1, Solomon Demmessie Computer Science

More information

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

Topline Report. Prepared for: June 9, 2011. 2011 Knowledge Networks, Inc.

Topline Report. Prepared for: June 9, 2011. 2011 Knowledge Networks, Inc. Topline Report Prepared for: June 9, 2011 2011 Knowledge Networks, Inc. Table of Contents Background & Objectives Methodology Key Findings Summary of Key Findings Prevalence of Dating Abuse Among College

More information

OAuth Web Authorization Protocol Barry Leiba

OAuth Web Authorization Protocol Barry Leiba www.computer.org/internet computing OAuth Web Authorization Protocol Barry Leiba Vol. 16, No. 1 January/February, 2012 This material is presented to ensure timely dissemination of scholarly and technical

More information

Why Email Encryption is Essential to the Safety of Your Business

Why Email Encryption is Essential to the Safety of Your Business Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Hendrix College Psychology Department Sona Systems Guide for Researchers

Hendrix College Psychology Department Sona Systems Guide for Researchers Hendrix College Psychology Department Sona Systems Guide for Researchers https://hendrix.sona-systems.com This document will describe your responsibilities as a researcher and the policies and procedures

More information

WHEN YOU CONSULT A STATISTICIAN... WHAT TO EXPECT

WHEN YOU CONSULT A STATISTICIAN... WHAT TO EXPECT WHEN YOU CONSULT A STATISTICIAN... WHAT TO EXPECT SECTION ON STATISTICAL CONSULTING AMERICAN STATISTICAL ASSOCIATION 2003 When you consult a statistician, you enlist the help of a professional who is particularly

More information

safe surfer seminar Martin Hellweg, Author

safe surfer seminar Martin Hellweg, Author safe surfer seminar PRIVACY PROTECTION & REPUTATION MANAGEMENT IN THE DIGITAL AGE We race at speeds of 300 thousand kilometers per second on data highways, but still know far too little about how to adequately

More information

Measuring the Effectiveness of Encrypted Email Surveys as a Non-Response Reduction Technique

Measuring the Effectiveness of Encrypted Email Surveys as a Non-Response Reduction Technique Measuring the Effectiveness of Encrypted Email Surveys as a Non-Response Reduction Technique Herson Esquivel-Vargas, Sandip Pandey and Tamunomiebaka Dibi {h.t.esquivelvargas, s.pandey, t.c.dibi}@student.utwente.nl

More information

Online Harassment and Victimization of College Students

Online Harassment and Victimization of College Students Online Harassment and Victimization of College Students M. Alexis Kennedy and Melanie A. Taylor* Volume 7 No. 1 Spring 2010 *M. Alexis Kennedy is an Assistant Professor in the Department of Criminal Justice

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS

RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS RESPONDING TO EXTREMIST SPEECH ONLINE 10 FREQUENTLY ASKED QUESTIONS 1. WHY CAN T THE GOVERNMENT BAN USE OF THE INTERNET TO SPREAD HATEFUL AND RACIST IDEOLOGY IN THE UNITED STATES? The Internet is probably

More information

Chapter 3. Online Bullying

Chapter 3. Online Bullying Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.

More information

1) Outsourcing ERP systems helps to lower the cost of software ownership and maintenance. Answer: TRUE Diff: 1 Page Ref: 268

1) Outsourcing ERP systems helps to lower the cost of software ownership and maintenance. Answer: TRUE Diff: 1 Page Ref: 268 Enterprise Systems for Management, 2e (Motiwalla/Thompson) Chapter 10 Global, Ethics, and Security Management 1) Outsourcing ERP systems helps to lower the cost of software ownership and maintenance. Diff:

More information