Premium Essay

Internet Safety Speech

Submitted By
Words 1310
Pages 6
Internet Safety for Teens
Nakayla , Paris
November.3, 2017
Internet safety Internet safety is one of the most important things to know about. Especially if you are a teen. Here are a few tips and tricks that you should know about the internet and its safety for teens. Main subtopic you have to be focused on is Social media alerts, Teen suicide and cyberbullying, Never trust a Predators, how to be safe on social media. Teen suicide
When teens are on the internet some people are getting ridiculously, bullied and this bullying causes teen suicide
Hurts people because of a post a judgment of what they feel
The teen internet safety edgerly falls in with teen suicide
Telling people your …show more content…
Being safe on social media is a life hazard in the world. One way of being safe on social media is never give your information to anyone. The problem is, most people don’t know if they should give their information out or not . The best way to solve this problem is to not go on websites that cannot be trusted. Try to stay on websites with the following links: www, .gov, .edu, and https://. The internet can lead you into hurt-harm and danger to you or your family. For example, intruders coming to your house, being exposed on the internet, and even your location/home getting told to everyone on the internet, and everywhere else. You still always need to understand that you cannot tell anyone where you live or your address. Being safe on social media requires a few things but, you have to be able to no get personal on the internet; be wary of links-and don't overshare. Dont tell all of your personal information on social media and the internet. By doing these things, you can be safe on social media or/and the …show more content…
If someone ask for your social security number-or phone number dont do it. They are mostly predators that go for little kids or teens. This also falls in with child mostliers. they are the strangers and predators. You always have to be careful who you talk to, because you never know if they could be the next intruder coming to your house or a child molester. These are the social media alerts you have to be aware of. You can really be left in dangerous harm.
Teen suicide and Cyberbullying
Teen suicide and cyberbullying are usually caused by social media . Lesson to learn is not to listen to anyone that cyber bullies you, teen suicide is very important to talk about to any adult, guardian or teacher, as well as a counselor . About 50% half of americans decides to commit suicide, but about the other 50% half of americans doesn’t commit suicide . Its best not to commit suicide at all because people will ask what are those scars on your arms as well as your parents- they will be furious.You were put on this earth for a reason and that isn’t your job to take your own life way because your family would be so hurt; as well as your parents would be hurt if died. What is cyberbullying ? cyberbullying is when someone gets bullied in life once every blue moon for something that they didn’t do- sometimes whenever someone gets bullied someone wants to kill themselves or have suicidal thoughts never do that just don’t

Similar Documents

Premium Essay

Cyber Bullying

...Cyberbullying Imagine coming home from school and sitting at the computer to get away from the stress of the day. Within a few minutes you're bombarded with messages like "You're ugly…We hate you…Why don't you make us all happy and end your miserable life". Welcome to a world too many teenagers are facing. A world where bullying no longer takes place in the hallways at school or on the way home. Bullying is now more likely to takes place in the murky, often anonymous world of the Internet. About a third (31%) of all students ages 12-14 have been bullied online according to a study by Opinion Research Corporation (2006). This research paper will examine some of the reasons for "cyberbullying," and what may be done about it. What is Cyberbullying? Bill Belsey, President of Bullying.org Canada says, "Cyberbullying involves the use of information and communication technologies such as e-mail, cell phone and pager text messages, instant messaging, defamatory personal Web sites, and defamatory online personal polling Web sites, to support deliberate, repeated, and hostile behavior by an individual or group that is intended to harm others". Nancy Willard, author of "An Educators Guide to Cyberbullying and Cyberthreats" breaks down cyberbullying into the following categories: -Flaming. Online fights using electronic messages with angry or vulgar language. -Harassment. Repeatedly sending nasty, mean, an insulting messages. -Denigration. "Dissing" someone online. Sending or posting...

Words: 4129 - Pages: 17

Free Essay

Cruel and Unusual Punishment Clause

...FINAL EXAM Course Name: ________________CRIMINAL LAW CLJ2100________________ School Name: _____________PALM BEACH STATE COLLEGE___________________ Any words, works, or statement are solely my own, And I shall not cheat, take another words, plagiarize or commit any violations of this course, this Professor’s rules, or the University’s Policies, Otherwise seek the consequences of a failure and possible suspension or expulsion. 1 Explain the Eighth Amendment (Cruel and Unusual Punishment Clause). The Cruel and Unusual Punishment Clause can be found in the English Bill of Rights in 1689 and later adopted by the Eighth Amendment to the United States Constitution in 1787. The phrase describes “punishment which is considered unacceptable due to the suffering, pain or humiliation it inflicts on the condemned person”. This amendment also includes the text that “excessive bail shall not be required, nor excessive fines imposed...”. It is thought that defendants who are not bailed have a more difficult time preparing for their defense. And by being “imprisoned” they are therefore being “punished” for the duration. That is why that questions of bail are always to be taken seriously by the courts. However, the Cruel and Unusual Punishment Clause did not make our Founding Fathers necessarily opponents against the Death Penalty. The Crimes Act of 1790 mandated the death penalty for treason, and also the mutilation of the corpse. There is no doubt, our modern courts...

Words: 3204 - Pages: 13

Premium Essay

Civil Liberties and the Book Matched

...this can bring; such as inference of the government in our daily lives and restriction of the fundamental rights that we are entitled to. In the book Matched, the government keeps an eye on every citizen. This constant surveillance is evidence of the lack of privacy going on in their society. The issue of lack of privacy is a major one in the story, and it was an issue that America has had to deal with. I cite the Patriot Act as an example. The purpose of this act was to “deter and punish terrorist acts in the United States and around the world, to enhance law enforcement investigatory tools, and for other purposes.” “The Patriot Act allowed federal agents to monitor electronic communications, which includes wireless phones, email, and internet, without much oversight. It also allowed the government to seize business records of...

Words: 1055 - Pages: 5

Premium Essay

Persuasive Essay On Net Neutrality

...not the most, well known Amendment. The freedom of speech, petition, religion, press, and assembly is important to all Americans. However, the government feels that they hold power to monitor content on the internet, on a federal, state, and local level. This has become a recent controversy with Net Neutrality being in danger of being removed, the growing social media industry, and internet filters that are being put in place by school districts. There are implied powers involved in the Constitution, but with the creation of Net Neutrality, there should be no need for the use of any implied powers. A line that has been drawn, and no level of government should cross that line unless there is someone who is truly suspect as to being a threat to the safety of the citizens of the United States....

Words: 802 - Pages: 4

Premium Essay

Technology Acts

...development of two acts: Children’s Internet Protection Act- 2000, and No Electronic Theft (NET) Act- 1997. Children’s Internet Protection Act The internet has become a very critical tool for children’s learning and success. It has become a threshold to a variety of expression and skills; however, while positive avenues are available to children via internet so are negative. Children are exposed to inappropriate material and materials that can be potentially harmful: promotion of violence, hate sites, pornography, etc… According to Department of Commerce (2003), “In October 2000, Congress passed the Children’s Internet Protection Act (CIPA), which requires schools and libraries that receive federal funds for discounted telecommunications, internet access, or internal connections services to adopt an internet safety policy and employ technological protections that block or filter certain visual depictions deemed obscene, pornographic, or harmful to minors” (para. 3). This implementation was successful after previous Congressional attempts to protect children from inappropriate content online. Congress' first attempt was in 1996 by passing the Communications Decency Act (CDA). The CDA restricted the introduction to inappropriate or obscene material via the internet to individuals under the age of 18; however, the Supreme Court found the law to be unconstitutional. According to Department of Commerce (2003), "The law violated free speech...

Words: 754 - Pages: 4

Free Essay

Copa and Cipa

...are operating an online service or commercial web site aimed at children 13 or less you must comply with the Children’s Online Privacy Act (COPA). To determine this the FTC considers a lot of different factors these include but are not limited to; age of models on the site, subject matter, visual and audio content and whether the site is using animated characters at all. To determine who the operator is the FTC will consider who owns and controls the information and what role the web site plays in its collection of information and maintaining. For CIPA Schools and Libraries may not receive discounts unless they certify that they have an internet safety policy that also includes technology protection measures. The protection must include filters to block obscene and harmful to minors. Before adapting this safety policy they must give a reasonable notice and hold a minimum of one public hearing to address the Proposal. The proposal must address the following; * Access to minors * The security of minors when they use e-mail, chat rooms or other electronic communication. * Unauthorized access by minors including hacking. * Unauthorized disclosure, use or discrimination * Measures to restrict minors access Schools and libraries get E-Rate funding only if they certify compliance with CIPA. The operator for COPA must post the privacy notice on the homepage of their website. They want to make sure it’s noticeable and a way to do...

Words: 712 - Pages: 3

Free Essay

Acceptable Use Policy

...21st Century Safety in Schools Connie Holden Eastern New Mexico University 21st Century Safety in Schools The Internet is a tool for both educators and students. Just as with any tool, especially power tools, we need to read safety precautions before using it. A person who uses a power tool without reading safety guidelines first takes a chance of getting hurt. Although using the Internet may not be physically harmful there still needs to be a set of safety guidelines to adhere to. In 2000 Congress enacted The Children’s Internet Protection Act (CIPA) to address this safety. CIPA imposes that all schools and libraries that receive Internet services at a discounted rate follow certain guidelines to help keep students safe while online. In order to continue receiving the discounted rate schools and libraries must certify that they have an Internet safety policy that includes technology protection measures. Websites that are obscene, contain child pornography, or are harmful to minors must be either blocked or filtered. The policy that schools use is The Acceptable Use Policy (AUP). The Acceptable Use Policy outlines rules regarding internet use so that the students, and staff, are protected. It must address a number of issues including personal safety, illegal activities, system security, privacy, plagiarism, copyright infringement and access to inappropriate materials. In addition, it should make it clear to the student that the school’s technology property is to...

Words: 601 - Pages: 3

Free Essay

Internet Police in China

...article “The Internet police in China: regulation, scope and myths” wrote by Xiaoyan Chen and Peng Hwa Ang, the authors focused on the analysis of the Chinese Internet censorship and the role of the internet police in China. With the emergence and the development of the Internet, the number of Internet users grew rapidly in China and reached 384 million in 2009, which is larger than the US Internet users. In order to keep the Internet community in order, the Chinese government has put a lot of effort to regulate and control the online space. The Internet police was one of the efforts that the Chinese government has been made to regulate and manage the Internet (Chen& Ang, 2011). The public Information and Internet Security Supervision Bureau (PIISS) was set up in 1998, which intended as an online police unit to manage cyber space. This bureau was established at provincial, prefecture and county levels, which contains around 20000 Internet police everywhere in Mainland China (Chen& Ang, 2011). “Internet police work can be understood as supervision of the safety of the computer network and Internet systems, administrative regulation on Internet activities and detection of computer and Internet crimes” (Chen& Ang, 2011, P. 42). For example, to detect and prevent the transmission of the computer viruses, and to protect the security of the important computer information systems are within the scope of the supervision of the Internet police. Meanwhile, the Internet police has...

Words: 858 - Pages: 4

Premium Essay

Obama

...Barack Obama’s speech on Gun violence Gun violence is a huge problem in the United States of America. Each year thousands of people are victims of mass shooting, and mass shooting is a growing problem. Many Americans see this problem but the gun law stays the same. The gun law and the gun culture go way back in American history, and many Americans feel it is their right to bear arms because it is written in the second amendment from 1791. But times have changed, and today most Americans believe that the gun law needs to be stricter. Therefore it can be difficult to understand why nothing happens when the majority of the US population supports stricter gun laws. So why is it that the law cannot be changed? And what can the politicians do to end this nightmare? Barack Obama is trying to highlight this issue in his newest speech on gun violence – “Remarks by the President on Common-Sense Gun Safety Reform” – that he presented at the White House Press Conference on the 5th of January 2016. This paper analyses Obama’s speech. The analysis will focus on the communicative and rhetorical devices in the speech. The sender of the speech is Barack Obama, the current president in the USA. He is representing his own party, the Democrats. Obama is speaking for all Americans and against the gun lobbyists. The speech is built on the foundation of all the gun tragedies, which have happened over the last years, and therefore makes use of al lot of pathos. He expresses his compassion for...

Words: 1219 - Pages: 5

Free Essay

Childs Internet and Electronic Communication Acts

...Childs Internet and Electronic Communication Acts Technology and new forms of communication has continued to evolve and improved our everyday lives. With the advancement of new technology, new laws are evolved to protect those who use it and prosecute to those who abuse it. In this paper, I will be discussing the Children’s Internet Protection Act (CIPA) as well as the Electronic Communication Privacy Act (ECPA). I will state the legal facts of these two topics as well as discuss the ethics that surround the legal issues and how those issues affect us today. The Facts The Children’s Internet Protection Act (CIPA) of 2000 is an Act that is applied to public schools or libraries to receive federal funding while in compliance with technological safety measures. Over the past years, more than $190 million has disbursed to more than 5,000 public libraries through federal programs called E-rate where discounts are given on telecommunications and Internet access under certain conditions (CIPA, 2001). Such conditions that US Supreme Court has argued and agreed that require public libraries and schools must enforce certain software control to protect minors from harmful materials and block pornographic Websites (Mark, 2002). Ethical Issues However, blocking Websites containing protected speech can be an ethical issue in violating our Constitutional right of our First Amendment, our Freedom of Speech. Also filtering or blocking does not always protect children from harmful material...

Words: 734 - Pages: 3

Premium Essay

Persuasive Essay On Cyberbullying

..." Throughout the United States, the conflict between freedom of speech and internet safety is rapidly becoming more prevalent. As tragic cases of cyberbullying, like that of Amanda Todd, rise to the headlines of American newspapers, and centers of crime like the infamous drug website, the Silk Road, cause mayhem, governing bodies across every level of government seek a solution. The government is rapidly being forced to decide whether it must increase control, or let things continue as they will. But higher government control has the very real possibility of destroying free speech as we know it, and in the process, destroying the ethics that our founding fathers held so high. This pressing problem is visible in the trial of Michelle Carter,...

Words: 757 - Pages: 4

Premium Essay

Do Government Internet Surveillance Efforts Threaten Privacy and Civil Rights?

...government Internet surveillance efforts threaten privacy and civil rights. It is a basic human right to allow someone to keep something secret to oneself. We owe no explanation or clarification to anyone for our private matters. With the governments increasing efforts in Internet surveillance this basic right is violated. It is as if we have become completely transparent to people we know nothing about ourselves. New technological tools are vulnerable to exploitation by governments aiming to crush dissent and deny human rights. All governments struggle to balance a need to deal with serious issues such as security, hate speech and child safety for their citizens but in repressive societies, these concerns often serve as convenient pretext to engage in censorship or surveillance of the internet that violates the rights and privacy of users and threatens the free flow of information. We all are aware that he internet and other communication technologies have created a vast amount of opportunities to share information, opening-up paths for pro democracy groups, activists, journalists and individuals around the world to share their opinion and judgment on various policies made by their respective government. I understand why monitoring people’s activity may seem as the right thing to do to ensure security but it is not of utmost importance; there are various other problems that need to be fixed at grass-root levels rather than monitoring people’s activity over the internet and in...

Words: 654 - Pages: 3

Premium Essay

Clouds Computing in Education

...LD, Blind and Visually Impaired. • Worked for or with the following companies: Texthelp Inc, Cambium Learning, Optelec, EVS, AiSquared • Self proclaimed lover of technology Different Types of Assistive Technology Standalone Systems • • • • Work on their own Do not need Word / Outlook / Browser Single task / Simple use Examples: • Clicker • Boardmaker • Simple AAC software Accessibility Layer Systems • Simply put…they help you to do something else. • • • • • • • Jaws Read&Write Gold ZoomText Hal Supernova Braille Output Devices Co Writer How Accessibility Layer Systems Work USER Screen Readers Word Prediction Braille Output Input Devices Magnifiers Etc. Accessibility Layer ( provided by OS ) MS Word Internet Explorer Outlook Firefox Open Office Safari How has computing changed? A few years ago there where only a few viable platforms to develop AT in. Today there are many and the list keeps growing! What does “more platforms” mean? • For AT Companies • More platforms to develop for • Same size budget • Decisions about what to support • For AT Users • More cool platforms to choose from • Sometimes patchy AT support on new platforms • Less choice of AT on new platforms In the real world for AT people…. • There is no way to do accessible Flash on mobile devices • There is no public accessibility layer on Ipad or IPhone or Itouch • Even...

Words: 1763 - Pages: 8

Premium Essay

National Crisis Research Paper

...During a time of national crisis, citizens of the United States will have their freedoms limited. A national crisis would include a war happening within our country, an invasion, and a terrorist attack. In a situation where the United States experiences a national crisis, freedom of speech, expression, and press will be limited to keep everyone in the country and the government safe. Once a situation is declared a national crisis, the Federal government will begin to decide what should be done for the safety of everyone. Congress will make the final decision of what is best for the country depending upon the situation, and the President will announce it publicly to the country. The decision of what freedoms will be taken away is controlled...

Words: 278 - Pages: 2

Free Essay

Cja394 Week 5 Discussion Question

...be paying attention to, versus what their real goals in monitoring the sites may be. I think that to monitor these sites is a necessity as this is usually the very first place that breaking news is released and in the case of a real emergency, the appropriate officials will be aware of what is going on and can mobilize the correct response. Arguments in support of the monitoring relay this same sentiment. Arguments against the monitoring highlight the impact this may have on our right to freedom of speech and to some extent our expected right to privacy. Are the monitoring activities providing security? Yes, I think so. After the events of 9/11, not single statement against the government or any of its agencies should be taken lightly. I think that we do have the right to free speech, but today is a much different day than it was even 20 years ago. Social media has become a terrorists’ recruiting tool and monitoring activity online is in the best interest of the Nation and our safety. I am willing to forego some of my civil liberties to remain safe, although some may not agree with me. DHS states that they only monitor the activity that may prove to be a threat to our Nation, however I am not sure that I think this is completely the case. I think that the government wants to know the sentiment of the people, however I think this is a positive thing if they are using these...

Words: 451 - Pages: 2