Free Essay

A Guide for the Internet?

In:

Submitted By bbab13373
Words 1520
Pages 7
In 2006, Megan Meir was the victim of cyber bullying which led to her suicide. The mother of a former friend of Megan created a fake social network account under the name of Josh to monitor Megan online. The mother became friends with Megan, but Megan only thought it was just a boy that she knew from school. After a while, everything went from sweet talk to verbal abuse. Terms such as" Megan is a slut. Megan is Fat" were being posted all over the social network by the mother. Devastated by all this bullying, Megan was found hung in her bedroom closet a few days before her fourteenth birthday. After the death of Megan, they found out it was the mother of her former friend who was behind this cyber bullying. Megan's Father, Ron Meir stated, "That's the biggest tragedy of this whole thing. An adult did this."
Living in the 19th century, everything we do is revolved around the Internet. Nowadays more than 50% of people can’t go a few hours without going on the internet since they have developed smartphones that bring it right into the palm of our hands which makes it harder for parents to monitor their kid’s internet behaviors. Basically whatever you do is connected to the Internet, from talking on the phone, video chatting and texting. But most people do not realize that there are consequences, which relates to all of the above if not taken certain measures and precautions that would lessen the risk of such threats that might arise while using Internet. Don’t get me wrong, the Internet is a wonderful tool that benefits everyone but others who are the rotten apples in the bunch use it to take advantage of the innocent users online. In this paper, I will argue on why it is important to have certain knowledge and guidelines to follow to protect us from predators and dangers of the Social Networks.
I remember being a kid and my parents would complain that I stayed too much outside playing but now it is the complete opposite where parents are complaining about their children spending so much time inside. After all, you might think that spending time inside on the computer is safer for the child, however when the child is not aware on how to properly use the social network, dangers might arise. Many children today have merely experience cyber bullying with the increase in social networking. A child who gets bullied usually develops symptoms such as depression, anxiety and low self-esteem. Also most young teens today are using the social media to make new friends. Someone who has a thousand friends on Facebook is considered popular but in reality, out of those thousands “friends”, twenty maximum are the people who you are likely to contact, the rest is just a consumption of useless space for popularity. You are not fooling anyone by having a thousand friends. But the teens that seek out online friends are most likely predators targets. Sex offenders can easily create a fake profile to lure children into meeting them while the young victim is too immature to identify the danger right in front of them.
Sex offenders are only a percentage of the threat in this Internet world. Personal Information is something that should be taken seriously also. Reports have shown that the average person only lies about their birth date on the social networks because they are either young and want to be much older to attract a broader crowd of people or those sexual offenders with fake profiles. Beside the birth date, all the other personal information from town, cite, address, email, and phone numbers are posted correctly, which can cause harm to those users with identity theft or even kidnapping. After threats from sex offenders and identity theft or possible kidnapping, comes the psychological effects social medias have on teenage kids or even young adults. While posting a picture on Facebook or instagram, people want to look their best or capture the best moment, not for their own memorabilia pleasures, but rather to impress others. When you have people posting pictures of the lavish life and celebrities living the life of luxury, it causes a psychological effect on the users where they might feel jealousy, envy which might lead to anxiety and depression. These posts sucks you into a life where envy is number one and then you forget about whom you are and do not appreciate what you already have. People who put their whole life on the Internet are usually the victims of abuse and they need to be aware of what the reality is and it is not the Internet. I personally see the social media as a misconception. People use it to hide their true self while portraying something that they’re really not. By doing so, it is like you get sucked into a hole, where you do not realize what is reality and what is not. And when you cannot identify them, it is like being stuck in limbo and that is the real danger. While researching online, I came across a tragic news that recently happened which involved meeting up with strangers online. The title of this article is” Pregnant woman, boyfriend murdered after craigslist arrangement for sex”. Apparently the pregnant women and boyfriend linked up with a stranger through the online service craigslist for a sexual encounter. And when they met up the stranger kidnapped them, decapitated the boyfriend and strangled the pregnant woman. A few days later, police chased him and as his car crashed, he fatally shot himself. This is a statement released by the victim’s family of this tragedy.
“First and foremost we want to express our extreme love for Brooke ... and Audi (Slocum's unborn daughter), the truly innocent creation that was already so loved. We have no doubt that they are now dancing with Jesus. Yes, Brooke had made previous mistakes within the world that is online, including those that led to her involvement (with Charles Oppenneer) in this situation, Yes, the family tried to curtail, inform, protect and advise against the evils that this tragedy has brought forward. But God gave each of us free will, and that is something that no one can control. The secret part of Brooke's life that none of us knew about is a testament to that.” People need to acknowledge the reality of this. There are some sick people in this world, out in the street you can avoid them because you see them and you sense their vibe, but it is not the same through a computer screen which hold many disadvantages for the innocents and sadly many advantages for the predators.
The technology culture is rising and it is offering us advance forms of communication and interaction that the older generation never experienced. Many blame the behaviors of today’s youth on the progressing technology of social media. So can we say that social media is to blame or the mentors are to blame? In reality, many of these dangers arise because people do not properly use the Internet. All those social medias provide you with the tool to protect yourself against strangers but for some weird reason, they seem to ignore it. One of the first things to take into consideration is not to provide all your personal information, because one must know that since it is the Internet, every single word is available to the world and might be used against you. Sharing of credit card information is strictly advised against on the Internet, even through email with a close friend. Users should properly know how to limit other people’s access on their profile. Public computers and Internet accesses are a high risk for such matter. VPN, which stand for Virtual Private Network, is one tool that can be helpful to avoid hackers on accessing your location. It hides your IPN address and makes it undoubtedly difficult for some to get into your computer. This tool is recommended for users who heavily use the Internet for streaming and downloading, Trojans and worms are highly unlikely to access your computer with this tool. The companies provide you with the tools necessary to protect yourself from those who want to harm others. People will never try to acknowledge the bad in something that they enjoy doing. So I believe that to lessen the circumstances of all of the above, we should integrate classes that properly teaches you how to function and go around the internet, these classes can have a branch of psychology where you learn to have a strong self esteem and also to learn about the dangers that there is out there. It wont bring the percentage of people affected by the internet to zero but I am positive that their would be a dramatic change. The technology is here, it won’t go anywhere, it will be here even stronger for generations and generations to come, and hence this is the time to reinforce the teaching to our youth about the dangers that lies between the matrixes.

Similar Documents

Premium Essay

Instructional Design Plan: Introduction to Internet Explorer

...Introduction to Internet Explorer Instructional Designer: James Smith Scenario The accounting division of ACME Global Transportation has recently implemented an Intranet that is to be used by the supervisory staff to access the new web based version of the corporate Human Resource Management System (HRMS). The new system is being phased in over a 90-day period. The supervisors are tasked with entering on-line, on a weekly basis, the regular and over-time hours worked by their staff. They are also supposed to print out a report of the hours that they have entered, and submit this to the manager of the department in which they work. They also have the option of sending the report to the manager via e-mail. The HRMS system is accessed via the corporate standard browser, Internet Explorer (IE). Thirty days into the implementation of the new HRMS package, the payroll manager has complained to the I/T director that the hours worked by staff are not being accurately captured. The department managers have also complained that they are not getting their payroll reports on a timely basis from their supervisors. A meeting was held to discuss the problems with the new version of the HRMS system. In attendance was the I/T team responsible for the HRMS project as well as the department managers and supervisors. In the course of the meeting it was discovered that the supervisors had received little or no training with Internet Explorer. The...

Words: 3947 - Pages: 16

Free Essay

Siteprotector Database Tuning Guide

...Database Tuning and Administration Guide for SP6.1 February 22, 2007 IBM Internet Security Systems, Inc. 6303 Barfield Road Atlanta, Georgia 30328-4233 United States (404) 236-2600 http://www.iss.net © IBM Internet Security Systems, Inc. 1994-2006. All rights reserved worldwide. Customers may make reasonable numbers of copies of this publication for internal use only. This publication may not otherwise be copied or reproduced, in whole or in part, by any other person or entity without the express prior written consent of Internet Security Systems, Inc. Patent pending. Internet Security Systems, System Scanner, Wireless Scanner, SiteProtector, Proventia, Proventia Web Filter, Proventia Mail Filter, Proventia Filter Reporter ADDME, AlertCon, ActiveAlert, FireCell, FlexCheck, Secure Steps, SecurePartner, SecureU, and X-Press Update are trademarks and service marks, and the Internet Security Systems logo, X-Force, SAFEsuite, Internet Scanner, Database Scanner, Online Scanner, and RealSecure registered trademarks, of Internet Security Systems, Inc. Network ICE, the Network ICE logo, and ICEpac are trademarks, BlackICE a licensed trademark, and ICEcap a registered trademark, of Network ICE Corporation, a wholly owned subsidiary of Internet Security Systems, Inc. SilentRunner is a registered trademark of Raytheon Company. Acrobat and Adobe are registered trademarks of Adobe Systems Incorporated. Certicom is a trademark and Security Builder is a registered trademark of Certicom...

Words: 5367 - Pages: 22

Free Essay

Information Technology Acts

...functioning of retrieving information from the internet. Thus access to the internet is available to everyone no matter the age. In order to protect all ages of internet users, the United States Congress has passed several Acts to protect users. With the advances in information technology the ethical issues of privacy and appropriate content in regards to children have lead to the United States Congress passing the Children’s Internet Protection Act of 2000 (CIPA) and Children’s Online Privacy Protection Act of 1998 (COPPA). Each Act has its own ethical issues as to it’s creation with the importance of children’s safety as the main concern. Introduction With the advancement of information technology in which all ages of users are being accommodated, everyone in today’s society has access to utilize all forms of information technology. The usage of information technology can include but is not limited to listening to music, watching movies/videos, playing games, communicating via email, social networks, or chat rooms, and getting help with school assignments. The researching of information via information technology has no limits to what the user will find, see, or read. Therefore, in order to protect the children utilizing information technology via the internet, there have been Information TechnologyActs passed by Congress. Two of these Information Technology Acts include Children’s Internet Protection Act of 2000 (CIPA) and Children’s...

Words: 994 - Pages: 4

Premium Essay

Learning-Guide

...Learning Guide INFS2233 Foundations of Electronic Commerce UQ Business School Faculty of Business, Economics and Law St. Lucia Campus Semester 1, 2009 Any student with a disability who may require alternative academic arrangements in this course is encouraged to seek advice at the commencement of the semester from a disability adviser at Student Support Services. Authors Dr Chris Manning Dr Marta Indulska Dr Dongming Xu Updated by Dr Paul O’Brien Produced by the Teaching and Educational Development Institute, The University of Queensland www.tedi.uq.edu.au Copyright materials contained herein have been reproduced under the provisions of the Copyright Act 1968, as amended, or with the permission of the copyright owner. This material may not be reproduced in any manner whatsoever except for the purposes of individual study. University Provider Number 00025B © The University of Queensland contents Contents Module 1 Introduction to electronic commerce Objectives Basic elements of electronic commerce (EC) 1 1 3 Differences between electronic commerce and traditional commerce 5 New ways of doing business with electronic commerce History of electronic commerce (EC) Planning an e-commerce project Legal, ethical and international issues Case study guidelines 6 8 10 10 11 Module 2 Business decision-making and planning for electronic commerce 17 Objectives Planning an e-commerce project Economic models Competitive advantage and electronic marketplaces...

Words: 38720 - Pages: 155

Premium Essay

Masteral

...Stanford Technology Ventures Program (STVP) STVP-1998-005 Revised August 22, 2001 Yahoo! 1995: First-Round Financing “I guess, three and a half years ago, if we were looking to start a business and make a lot of money, we wouldn’t have done this.” - Jerry Yang, 1997. It was April of 1995 – a key decision point for Jerry Yang and David Filo. These two Stanford School of Engineering graduate students were the founders of Yahoo!, the most popular Internet search site on the World Wide Web. Yang and Filo had decided that they could transform their Internet hobby into a viable business. While trying to decide between several different financing and partnering options that were available to them, they attended a meeting with Michael Moritz, a partner at Sequoia Capital. Sequoia, one of the leading venture capital firms in Silicon Valley, had been discussing the possibility of investing in Yahoo!. Michael Moritz leaned forward in his chair. As he looked across the conference table at Jerry and Dave, he laid out Sequoia’s offer to fund Yahoo!: As you know, we have been working together on this for some time now. We have done a lot of hard work and research to come up with a fair value for Yahoo!, and we have decided on a $4 million valuation. We at Sequoia Capital are prepared to offer you $1 million in venture funding in exchange for a 25% share in your company. We think that with our help, you have a real chance to make Yahoo! something special. Our first order...

Words: 7265 - Pages: 30

Premium Essay

Childhood Obesity

...ENGLISH FOR ORAL PRESENTATION ELC 590 Name: Muhammad Aiman Bin Shahfri ID No: 2014142551 Group: AD228 4B Topic: CHILDHOOD OBESITY Central Idea: I. Causes of Childhood Obesity II. Effects of Childhood Obesity III. Prevention of Childhood Obesity Submitted to: Pn. Mastura Misdan Submission Date: 6th November 2015 Color Coding ARTICLE 1 GENERAL INTERNET JOURNAL ARTICLE 2 GENERAL INTERNET ARTICLE ARTICLE 3 GENERAL INTERNET ARTICLE ARTICLE 4 GENERAL INTERNET ARTICLE Bibliography Internet Sources Journal Mahshid Dehghan, Noori Akhtar-Danesh, and Anwar T Merchant, P. R. (2005). Childhood obesity, prevalence, and prevention. Nutrition Journal 4:24 Article Childhood Obesity Causes & Consequences. (2015, June 19). Retrieved November 5, 2015, from http://www.cdc.gov/obesity/childhood/causes.html Childhood Obesity Facts. (2015, August 27). Retrieved November 5, 2015, from http://www.cdc.gov/healthyschools/obesity/facts.htm Obese Youth over Time. (2015, September 27). Retrieved November 5, 2015, from http://www.cdc.gov/healthyschools/obesity/obesity-youth.htm Obese Youth Over Time. (2015, September 22). Retrieved November 5, 2015, from http://www.cdc.gov/healthyschools/obesity/obesity-youth-txt.htm Childhood Obesity Facts. (2015, June 19). Retrieved November...

Words: 437 - Pages: 2

Free Essay

Marketing

...The PPC Marketing Guide The PPC Marketing Guide -1- The PPC Marketing Guide The PPC Marketing Guide “How to Have Red Hot Targeted Traffic Delivered Straight into Your Website for Massive Profits!” LEGAL NOTICE The Publisher has strived to be as accurate and complete as possible in the creation of this report, notwithstanding the fact that he does not warrant or represent at any time that the contents within are accurate due to the rapidly changing nature of the Internet. While all attempts have been made to verify information provided in this publication, the Publisher assumes no responsibility for errors, omissions, or contrary interpretation of the subject matter herein. Any perceived slights of specific persons, peoples, or organizations are unintentional. In practical advice books, like anything else in life, there are no guarantees of income made. Readers are cautioned to reply on their own judgment about their individual circumstances to act accordingly. This book is not intended for use as a source of legal, business, accounting or financial advice. All readers are advised to seek services of competent professionals in legal, business, accounting, and finance field. You are encouraged to print this book for easy reading. The PPC Marketing Guide -2- The PPC Marketing Guide Table of Contents How to Make Your Business “Click” Maximum Web Promotion with PPC How to Create a Profitable PPC Campaign Management PPC Bid Management In Closing: To SEO...

Words: 4308 - Pages: 18

Premium Essay

Looko

...User Guide Version 9 Document version 9501-1.0-18/08/2007 Cyberoam User Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of any kind, expressed or implied. Users must take full responsibility for their application of any products. Elitecore assumes no responsibility for any errors that may appear in this document. Elitecore reserves the right, without notice to make changes in product design or specifications. Information is subject to change without notice. USER’S LICENSE The Appliance described in this document is furnished under the terms of Elitecore’s End User license agreement. Please read these terms and conditions carefully before using the Appliance. By using this Appliance, you agree to be bound by the terms and conditions of this license. If you do not agree with the terms of this license, promptly return the unused Appliance and manual (with proof of payment) to the place of purchase for a full refund. LIMITED WARRANTY Software: Elitecore warrants for a period of ninety (90) days from the date of shipment from Elitecore: (1) the media on which the Software is furnished will be free of defects in materials and workmanship under normal use; and (2) the Software substantially conforms to its published specifications except for the foregoing, the software is provided AS IS. This limited warranty extends only to the customer as the original...

Words: 48399 - Pages: 194

Premium Essay

Sex Is Fun

...WIRELESS MINI ROUTER QUICK SETUP GUIDE A. SETUP 1. SATECHI or Wireless-N Plug the Wireless Mini Router into the wall. After approximately one minute, the WLAN light on the Mini Router will turn on — the Mini Router is now broadcasting a wireless network called “SATECHI” or “Wireless-N.” In your computer or other internet-accessible device, go to your wireless settings and connect to the “SATECHI” or “Wireless-N” network. To do this, you may have to disconnect from your current network. If your computer asks for a PIN or to “set up” your network, click “connect without setting up.” 2. User: admin Pass: admin Once connected to “SATECHI” or “Wireless-N” in your internet browser navigate to the address “192.168.10.253” If prompted to enter a username and password, enter “admin” in both fields. This will direct you to the Mini Router’s settings page. 3. Click “Wizard” in the left sidebar. You will be directed to the mode select menu. Once you select a mode, you will be guided through the setup process for that mode. After mode setup is complete, you will need to disconnect from the “SATECHI” or “Wireless-N” network and reconnect to your existing or newly-created network before you can use the internet. More information about the Wireless Mini Router’s modes can be found in Section B “Modes” of this Quick Setup Guide. B. MODES 1. Router Modem Internet Router Internet 2. Repeater 3. Access Point Internet 4. Bridge New SSID ...

Words: 634 - Pages: 3

Premium Essay

Network Plus

...Network+ Study Guide by MC MCSE Page 1 of 22 The best free certification study guides, practice tests and forums! Join Us! | Login | Help SEARCH Home | Exam Details | Free Tests | Study Guides | Glossary | Articles | Books & Training | Forums | Career & Jobs Certifications Microsoft CompTIA Cisco CIW LPI Red Hat IBM Site Tools Free Magazines White Papers Top Sites Contributors Site Map FAQ Sponsor Network+ Study Guide (N10-004) This is our free study guide for CompTIA's Network+ certification exam (N10-004). If you would like to report an error or contribute additional information, please use the contact link at the bottom of the site, or post in our forums. We hope you find this guide useful in your studies. Sponsor Domain 1.0: Network Technologies Domain 1.1: Common Networking Protocols TCP - TCP breaks data into manageable packets and tracks information such as source and destination of packets. It is able to reroute packets and is responsible for guaranteed delivery of the data. IP - This is a connectionless protocol, which means that a session is not created before sending data. IP is responsible for addressing and routing of packets between computers. It does not guarantee delivery and does not give acknowledgement of packets that are lost or sent out of order as this is the responsibility of higher layer protocols such as TCP. UDP - A connectionless, datagram service that provides an unreliable, best-effort delivery. ICMP - Internet Control Message...

Words: 1264 - Pages: 6

Premium Essay

Iunno

...Harvard UWS Referencing Style Guide Overview         Referencing Intellectual honesty and plagiarism About the Harvard UWS style In-text citation: Referencing sources within the text Reference list Electronic items Referencing secondary sources Different works of the same author and same year Books, book chapters and brochures      Single author Two or three authors Four to six authors     Corporate author / authoring body Edited book Chapter or article in book  Other materials        Acts of Parliament (includes bills) Australian Bureau of Statistics Brochure Government report    Legal authorities (cases) Microfiche / microfilm document Patent/ Trademark (electronic database) Podcast (from the Internet) Government report (online) Image on the Internet Lecture (unpublished) / personal communication E-book Seven or more authors No author (incl. dictionary or encyclopaedia) Chapter or article in an edited book         Standard Study guide Thesis / dissertation Tutorial / lecture handout Video recording, television program or audio recording Video or audio (from the Internet) Web page / document on the Internet Journal articles, newspaper articles and conference papers          Journal article (print version) Journal article (full-text from electronic database) Newspaper article (available in print) ...

Words: 4767 - Pages: 20

Premium Essay

Grand Canyon Bus 340 All Modules 1- 8 Assignment (2014)

...Grand Canyon BUS 340 All Modules 1- 8 Assignment (2014) BUS 340 Module 1 Assignment Problems: Chapters 1, 2, and 4 Details: Using the Module 1 readings, course website links, the GCU Library, the Internet, and/or other sources of literature as needed, complete the following problems: Chapter 1 – Online Research: Common Law Chapter 2 – Problems and Problem Cases: Problem 6 Chapter 4 – Problems and Problem Cases: Problems 4 and 7 Responses should not typically exceed 200 words for each problem and should contain citations from relevant sources if applicable. Complete the problems for each chapter first by stating the question(s) you are addressing, then by stating your responses. All problems and answers should be turned in on the same page/document. Prepare this assignment according to the APA guidelines found in the GCU APA Style Guide, located in the Student Success Center. An abstract is not required. BUS 340 Module 2 Assignment Problems: Chapters 5 and 6 Details: Using the Module 2 readings, course website links, the GCU Library, the Internet, and/or other sources of literature as needed, complete the following problems: Chapter 5 – Problems and Problem Cases: Problem 13 Chapter 6 – Problems and Problem Cases: Problem 11 Responses should not typically exceed 200 words for each problem and should contain citations from relevant sources if applicable. Complete the problems for each chapter first by stating the question(s) you are addressing...

Words: 1087 - Pages: 5

Free Essay

Job Analysis

...sample of all employees in the job title or representative job titles. Preferably, this would be an online survey due to the ease of distribution to employees whether they are located in different areas or in some cases in different countries (Rama Rao, 2009). If it is possible, I would prefer to distribute this survey over the company’s intranet for the ease of use and ability to accomplish many related tasks (Kuzmits & Dos Santos, 2000). If the corporation lacked the ability to conduct such a survey by intranet, I would have the surveys distributed in the employee’s mail box, folder, or other communication area. In composing the survey, I would speak with immediate supervisors of the group to identify the major duties of each job (HR-Guide). Using this information, I would compose a questionnaire that asks employees about their jobs based on the duties identified by the supervisors and those identified by the O*NET system as standard to certain jobs (US Department of Labor). To try to get the broadest reach and the most number of responses, I would allow sufficient time for employees to complete the survey. The time given may be as much as a month in a large work group or as little as one week in a very small work group (Insightlink Communications) . After all the questionnaires are collected, the answers would be compiled into a spread sheet as I have found such databases to be excellent ways to tally responses to get a better idea of what the...

Words: 563 - Pages: 3

Premium Essay

Benifits of Technology in Classroom

...1 - The technology plays the role of the guide , which helps the teacher in guiding the scientific material for students, and replaces the traditional method of education in explaining the lesson and providing information. The technology, by all its means of development, can simply do a major change in the private educational level of the teacher and his ability in introducing the approach to the student in a way that gives the opportunity to greater and easier chance in understanding the lessons. This will reflect the student's ability to develop his mental and intellectual learning, and refine his creative talents and capabilities in his school activities. 2 - A modern and educational tool like computer could focus the attention of students for using it in the field of education. Taking it as a guide or electronic assistant will guide them, by its various programs and functions, in the field of learning and discovering new talent and the development of mental abilities in various subjects and education. As well as the Internet opens a new door that helps students per semester to participate in educational activities in the field of research and exchange of information through these activities. 3 - Technology provides an abundant source of information that both the teacher and student need it. Internet has become a broad sea and has a wealth of information such as encyclopedias, dictionaries, maps and other information sources that are difficult to obtain through traditional...

Words: 435 - Pages: 2

Premium Essay

Mr Gracia

...Psychological Association (APA) Referencing Style Guide Overview Other materials         Referencing Intellectual honesty and plagiarism About the APA style In-text citation: Referencing sources within the text Reference list Electronic items Referencing secondary sources Different works of the same author and same year            Audio recording Australian Bureau of Statistics (AusStats) Brochure Government report (online) Image on the Internet Lecture (unpublished)/ personal communication Podcast (from the Internet) Thesis Video recording, television broadcast or episode in a series Video (from the Internet) Web page / document on the Internet Books and book chapters          Single author Two authors Three to six authors More than six authors No author (inc dictionaries/encyclopaedias) Edited book Chapter, article or section in a book Chapter or article in an edited book E-book Journal articles, newspaper articles and conference papers         Journal article (print version) Journal article (full-text from electronic database) Non-English journal article translated into English Newspaper article (available in print) Newspaper article (from electronic database) Article (from the Internet, not available in print version) Proceedings of meetings and symposiums, conference papers Systematic reviews University of Western Sydney Library APA Referencing Style Guide Referencing Referencing acknowledges the sources...

Words: 4555 - Pages: 19