<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>cyberwise</title><description>cyberwise</description><link>https://www.cyberwise.org/cyberwiseblog</link><item><title>Why It's So Important to Protect Your Personal Information</title><description><![CDATA[In today's world, online transactions are becoming the norm, rather than the exception. Between social media platforms and online marketplaces, the internet is becoming a virtual thief's dream, with countless identities to steal. Social media platforms continue to ask for more personal information in order for users to gain access. This information can easily be skimmed by a hacker, and later used to access personal accounts fraudulently. Further, many social media sites are intertwined and<img src="http://static.wixstatic.com/media/f6bccd_81cecd575b9644179867326707d39ff3%7Emv2_d_5760_3840_s_4_2.jpg"/>]]></description><dc:creator>Vanessa E. Seward</dc:creator><link>https://www.cyberwise.org/single-post/2019/11/20/Why-Its-So-Important-to-Protect-Your-Personal-Information</link><guid>https://www.cyberwise.org/single-post/2019/11/20/Why-Its-So-Important-to-Protect-Your-Personal-Information</guid><pubDate>Wed, 20 Nov 2019 20:39:42 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_81cecd575b9644179867326707d39ff3~mv2_d_5760_3840_s_4_2.jpg"/><div>In today's world, online transactions are becoming the norm, rather than the exception. Between social media platforms and online marketplaces, the internet is becoming a virtual thief's dream, with countless identities to steal. Social media platforms continue to ask for more personal information in order for users to gain access. This information can easily be skimmed by a hacker, and later used to access personal accounts fraudulently. Further, many social media sites are intertwined and easily accessible with one simple log in, connecting the data thief to every bit of personal information.</div><div>Online marketplaces are also a part of day to day life. From clothing purchases to grocery orders, people are able to buy anything online from their favorite stores. To facilitate quick transactions, online retailers are saving customers' credit card information. If a thief gains access to an account, private bank account information can easily fall into the wrong hands. It is important to have online security to help protect users from identity theft. One way to protect against an attack is by using counteractive technology like VPN protocols. To find our more about these protocols, check out this article by <a href="https://surfshark.com/learn/vpn-protocols">Surfshark</a>, an online security company that provides up to date security technology to stay one step ahead of would be identity thieves. </div><div>What Can You Do?</div><div>It is one thing to keep a purse or wallet protected at all times from physical theft, but how is a person supposed to know when a virtual, online thief is trying to steal information? The truth is, the more technology evolves, the more clever identity thieves become. Currently, there are several online schemes designed to trick people into giving up personal information. Some of these schemes can include:</div><div><div>Phishing emails - A phishing email is an email that is designed to look like it is coming from a reputable and trusted financial source. There is usually a link contained in the email that encourages a person to enter private information. The email and link however are fraudulent, and the person ends up giving private information to an unknown source.  </div><div>Weak Passwords - Be careful of passwords that are connected to valuable personal information. Avoid anything that involves a social security number, birthday, address, or phone number. Make sure that passwords contain a combination of upper case and lower case letters, numbers, and symbols. If possible, try to use websites that require dual authentication to enter the site, These often include a private password as well as a PIN or code texted to a personal phone number. </div><div>Malware - Technically speaking, malware is any type of malicious software that a person unintentionally downloads to a personal computer. This program then sifts through the computer data and files, searching for PII. Any saved bank accounts, tax records, or personal information is at risk if malware has been inadvertently downloaded to a computer. </div><div>Unsecured websites - Before entering personal information into any website, always check to make sure it is secure. A good way to check for security is to make sure the website begins with &quot;https://&quot; instead of &quot;http://&quot;. These websites have an added layer of protection to make sure credit card information or bank account numbers stay secure. </div></div><img src="http://static.wixstatic.com/media/f6bccd_360193999b4048f4b8db57155f44814d~mv2_d_3456_2832_s_4_2.jpeg"/><div>Increase in Data Theft</div><div>Sadly, the more social media and online marketplaces become a part of day to day life, the more <a href="https://www.consumeraffairs.com/finance/identity-theft-statistics.html">frequent</a>occurrences of data theft become. Between 2005 and 2010, online credit card theft increased by 50%. Not only is this problematic for the individual that had his or her information stolen, but the financial institutions responsible for protecting credit card information loose about $150 to $200 per stolen credit card.</div><div>But data theft does not just stop at individual theft. Large scale breaches are on the rise too. In fact, last year there were almost 1,300 different <a href="https://www.marketwatch.com/story/how-the-number-of-data-breaches-is-soaring-in-one-chart-2018-02-26">breaches</a> that impacted major corporations. Compare this to only 200 large scale breaches in 2005. Identity thieves are quickly learning that hacking into large corporations can give access to countless account numbers and credit card numbers. Not only do these breaches affect the individual company, but each breach can impact hundreds of thousands of customers. Equifax, Target, and Dropbox were all victims of online data theft on a large scale in recent history.</div><div>It can be hard to understand online data theft since there is not a physical opportunity for a person to steal a wallet or purse. It is more important than ever before to protect personal information from would be thieves skimming the internet searching for personal information. With a heightened vigilance and enhanced security measures, it is possible to still interact on social media and in a digital marketplace while keeping information safe and secure.</div><img src="http://static.wixstatic.com/media/f6bccd_c467fb911af945fea07da932f7b14fba~mv2.png"/><div>Photo Credits:</div><div>Brooke Lark on Unsplash </div><div>Sincerely Media on Unsplash</div></div>]]></content:encoded></item><item><title>I’m a Parent and I Don’t Know What The Heck a Meme Is: An Explainer</title><description><![CDATA[These strange pictures you keep seeing are mostly just a fun way for kids (and adults!) to communicate. When we feel left out of a joke or confronted with a really, really weird image, it’s our first response to shake our fists and grumble about how the Internet is rotting our children’s brains. But language evolves and summer turns into fall and, come on, some of these Internet kids are pretty funny! What the Heck is a Meme?As we do for most things, let's turn to Wikipedia for a nice & succinct<img src="http://static.wixstatic.com/media/f6bccd_27c5342e39874f3ba9727eb84ba91e3a%7Emv2.png/v1/fill/w_636%2Ch_422/f6bccd_27c5342e39874f3ba9727eb84ba91e3a%7Emv2.png"/>]]></description><dc:creator>A Millennial</dc:creator><link>https://www.cyberwise.org/single-post/2019/10/20/I%E2%80%99m-a-Parent-and-I-Don%E2%80%99t-Know-What-the-Hell-a-Meme-is-An-Explainer</link><guid>https://www.cyberwise.org/single-post/2019/10/20/I%E2%80%99m-a-Parent-and-I-Don%E2%80%99t-Know-What-the-Hell-a-Meme-is-An-Explainer</guid><pubDate>Tue, 29 Oct 2019 16:02:44 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_27c5342e39874f3ba9727eb84ba91e3a~mv2.png"/><div>These strange pictures you keep seeing are mostly just a fun way for kids (and adults!) to communicate. When we feel left out of a joke or confronted with a really, really weird image, it’s our first response to shake our fists and grumble about how the Internet is rotting our children’s brains. But language evolves and summer turns into fall and, come on, some of these Internet kids are pretty funny! </div><div>What the Heck is a Meme?</div><div>As we do for most things, let's turn to <a href="https://en.wikipedia.org/wiki/Internet_meme">Wikipedia</a> for a nice &amp; succinct definition:</div><img src="http://static.wixstatic.com/media/f6bccd_df07c4194c7545abac2fb97ca600b124~mv2.png"/><div>As friendly as this definition is, trying to understand &quot;memes&quot; with little to no prior context is decidedly less so. Because memes (for the most part) are born and bred through the Internet, the forms they take rapidly evolve, as they are available to anyone to remix or reconstruct. </div><div>Let's put it another way. Just like both of these would be considered art:</div><img src="http://static.wixstatic.com/media/f6bccd_9d42364aeb254baa9f4244bc46ccfda3~mv2.png"/><div><a href="https://gagosian.com/exhibitions/2019/richard-serra-triptychs-and-diptychs/">Richard Serra &amp;</a><a href="https://en.wikipedia.org/wiki/Mona_Lisa">Leonardo da Vinci, respectively.</a></div><div>Both of these would be considered memes:</div><img src="http://static.wixstatic.com/media/f6bccd_9dcf7fcb402c4247b4d30567b1312f3e~mv2.png"/><div><a href="https://knowyourmeme.com/">Memes for every sensibility.</a></div><div>Now do you get it? So, how did we end up here?</div><div>A Little Context For You</div><div>The word “meme” first appeared in evolutionary biologist Richard Dawkins’ 1976 book <a href="https://www.amazon.com/gp/product/0198788606/ref=dbs_a_def_rwt_bibl_vppi_i1">The Selfish Gene</a>, as shorthand for explaining how ideas mutate and spread, like genes being passed along through population groups. </div><div>If we define a meme as a mass circulation of an idea or in-joke, then lots of cultural phenomenons that've happened before the birth of the Internet would fit the bill, from “<a href="https://en.wikipedia.org/wiki/Kilroy_was_here">Kilroy was here</a>” to the line “<a href="https://en.wikipedia.org/wiki/Play_it_again,_Sam">Play it again, Sam</a>.” Could the penises we carved into school desks and bathroom stalls be considered memes? Probably. Although today we mostly understand memes in the context of the Internet, it can be helpful to view them through the lens of a wider cultural lexicon.</div><div>Internet memes took off as a concept during the 1990s, and with the introduction of social media sites like YouTube, Twitter, and Facebook, in-jokes could be shared with bigger audiences and achieve viral status much more quickly. Remember <a href="https://www.youtube.com/watch?time_continue=22&amp;v=4hpEnLtqUDg">Harlem Shake</a> or <a href="https://www.youtube.com/watch?v=_OBlgSz8sSM">Charlie bit my finger</a>?</div><div>As ridiculous as it can feel to read the terms “meme” and “cultural lexicon” in the same sentence, it’s important to remember that memes have become an increasingly popular way for people to communicate. Your child will likely get the chance to enroll in a “meme” course at their university, and major news outlets now write about and refer to memes more than anyone would ever reasonably expect. <div>The significance of the President of the United States consistently <a href="https://abcnews.go.com/Politics/trumps-nickelback-meme-twitter-copyright-violation/story?id=66032500">tweeting</a>memes shouldn’t be lost on us.</div></div><div>As a parent, you’re likely familiar with the format of the above baby meme. This “above text below text” configuration, called <a href="https://en.wikipedia.org/wiki/Image_macro">image macros</a>, was popular on Facebook (and maybe still is, depending on the age demographic of your friends).</div><div>But as we’ve now officially entered the age of Gen Z, meme humor has <a href="https://www.theguardian.com/tv-and-radio/2019/aug/13/how-did-millennial-comedy-get-so-surreal">gotten</a>, <a href="https://www.washingtonpost.com/outlook/why-is-millennial-humor-so-weird/2017/08/11/64af9cae-7dd5-11e7-83c7-5bd5460f0d7e_story.html">well</a>, <a href="https://knowyourmeme.com/memes/why-is-millennial-humor-so-weird">weirder</a>. Watched a commercial on TV lately and thought, what the hell? That would be consumerism catering to your kids’ sensibilities.</div><img src="http://static.wixstatic.com/media/f6bccd_b7efc78277b54948b01608ffcb179b82~mv2.png"/><div><a href="https://knowyourmeme.com/">Image macro,</a><a href="https://knowyourmeme.com/memes/cropped-image-macros">recontextualized</a><a href="https://knowyourmeme.com/">.</a></div><div>The Internet’s attention span is short &amp; thrives on instant gratification, meaning a meme’s popularity lasts about as long as its ability to be morphed and remixed. Take, for example, the <a href="https://knowyourmeme.com/memes/you-know-i-had-to-do-it-to-em">You Know I Had to Do It to Em</a> meme:</div><div>Its humble origins, like so many other memes, was a fairly standard and not particularly attention-grabbing Twitter post. Something in this regular photo of a regular guy with the accompanying caption, “You know I had to do it to em” contained the illusive, baffling, unknowable makings of a meme:</div><img src="http://static.wixstatic.com/media/f6bccd_cec49cc7dcba45c0b69b53a4469f7c4a~mv2.png"/><div><a href="http://nymag.com/intelligencer/2019/07/the-many-lives-of-the-you-know-i-had-to-do-it-to-em-meme.html">Now we all know he had to do it to em.</a><a href="https://knowyourmeme.com/"></a></div><div>Soon, people latched on to this image and created all sorts of reiterations, including:</div><div><img src="http://static.wixstatic.com/media/f6bccd_75da206434d941fabfbb1c3584b1666a~mv2.png"/><img src="http://static.wixstatic.com/media/f6bccd_2963df4dd05f42319d3d53326a4452e9~mv2.png"/><img src="http://static.wixstatic.com/media/f6bccd_ad70c073b88340fb8d8d68d1aaf2165e~mv2.png"/><img src="http://static.wixstatic.com/media/f6bccd_9f76a5e692c0436f90e139e618e39204~mv2.jpg"/></div><div>Without knowledge of the first image, the image below would make no god-damn sense:</div><img src="http://static.wixstatic.com/media/f6bccd_c5ed830bc394431d965ad86d0f05aff0~mv2.png"/><div>A now infamous pose.<a href="http://nymag.com/intelligencer/2019/07/the-many-lives-of-the-you-know-i-had-to-do-it-to-em-meme.html"></a></div><div>To the outside observer, this sort of humor won't track and is easily chalked up to baffling gibberish. </div><img src="http://static.wixstatic.com/media/f6bccd_b5db71a5d53848349331bbf2d907994c~mv2.png"/><div><a href="https://knowyourmeme.com/memes/galaxy-brain">Baffling gibberish? Not with context!</a></div><div>&quot;Dank Meme&quot; Demystified</div><div>Familiar with the term <div>dank meme? </div>A phrase that both sounds ridiculous to <a href="https://www.youtube.com/watch?time_continue=15&amp;v=raZkWL2mndY">hear</a> and say, it emerged from the ether of messaging platforms 4chan and Reddit, and often refers to a meme that is deliberately idiosyncratic and nihilistic, outside of the mainstream, or sometimes just &quot;really good.&quot;</div><div>Essentially, memes are fun images and inside jokes that we share with friends. But considering how capricious the meaning of a meme can be, it can be hard to keep up or to know exactly the kind of message being spread by an incomprehensible image. Endless recontextualizing of images means that even seemingly innocuous jokes get picked up and remixed by some truly nasty ideologies. The popular internet meme Pepe the Frog, a green cartoon frog face, was <a href="https://edition.cnn.com/2016/09/28/us/pepe-the-frog-hate-symbol-trnd/index.html">placed</a> on the <a href="https://www.adl.org/education/references/hate-symbols/pepe-the-frog">Anti-Defamation League's database of hate symbols</a>, after the image’s widespread use in racist contexts.</div><div>These strange pictures you keep seeing are mostly just a fun way for kids (and adults!) to communicate. When we feel left out of a joke or confronted with a really, really weird image, it’s our first response to shake our fists and grumble about how the internet is rotting our children’s brains. But language evolves and summer turns into fall and, come on, some of these Internet kids are pretty funny! </div><div>The best way to learn a new language is to be taught by a fluent speaker, so why not ask your kid to let you in on their jokes. By the time you’re reading this, there are likely a million new memes to replace the ones here, and your kids will probably get a kick out of trying to explain them to you.</div><img src="http://static.wixstatic.com/media/f6bccd_078cb0d99f20494b8018905792ad40f2~mv2.png"/><div>Either a really, really weird image or a good joke.</div><div>Editor's Note: For a deeper look into how adults sometimes misinterpret memes--and the terrible consequences that can come of this--we urge you to listen to The Hidden Brain's <a href="https://www.npr.org/2019/09/06/758281834/you-cant-hit-unsend-how-a-social-media-scandal-unfolded-at-harvard">&quot;Online Behavior, Real-Life Consequences, The Unfolding of a Social Media Scandal.&quot;</a></div></div>]]></content:encoded></item><item><title>On Writing Screen Captured: Helping Families Navigate Technology with Confidence</title><description><![CDATA[My goal has always been to create a better way for kids to experience technology, so when I founded my own kid-tech company, Kinzoo, I did a lot of research. What I learned along the way helped my own family navigate technology with more confidence—and I wrote this book so others could do the same. For me, Screen Captured and Kinzoo share a common purpose: empowering parents to harness the best of technology, while protecting their kids from the worst of it. I'm thrilled to be sharing my book<img src="http://static.wixstatic.com/media/f6bccd_f71a07b996de4a6db24ac89e2d65699a%7Emv2.jpeg"/>]]></description><dc:creator>Sean Herman</dc:creator><link>https://www.cyberwise.org/single-post/2019/10/28/On-Writing-Screen-Captured-Helping-Families-Navigate-Technology-with-Confidence</link><guid>https://www.cyberwise.org/single-post/2019/10/28/On-Writing-Screen-Captured-Helping-Families-Navigate-Technology-with-Confidence</guid><pubDate>Mon, 28 Oct 2019 20:37:25 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_f71a07b996de4a6db24ac89e2d65699a~mv2.jpeg"/><div>My goal has always been to create a better way for kids to experience technology, so when I founded my own kid-tech company, <a href="https://kinzoo.com">Kinzoo</a>, I did a lot of research. What I learned along the way helped my own family navigate technology with more confidence—and I wrote this book so others could do the same. For me, <a href="https://screencapturedbook.com">Screen Captured</a> and Kinzoo share a common purpose: empowering parents to harness the best of technology, while protecting their kids from the worst of it. I'm thrilled to be sharing my book and I <div>also invite you to sign up at <a href="http://kinzoo.com/early-access">kinzoo.com/early-access</a> if your family is interested in trying out our new kid safe messenger!</div></div><div><div>While Researching Kid-Tech for my Company, I Learned Enough to Write a Book. So I Did Just That. September 24th marked the official release of my book </div><a href="https://screencapturedbook.com">Screen Captured</a>, and it is now available for purchase on Amazon (please excuse the product plug). Even though it still feels odd to see “author” added to my bio, this feels like a </div><img src="http://static.wixstatic.com/media/f6bccd_d5fba1a93c2d4a2fa65715d4b9be5094~mv2.jpg"/><div>proud moment — and one I want to share with my family, my team and the wider community.</div><div>I imagine some authors choose a topic they’re passionate about and then decide to write a book. For me, the process was somewhat inverted. I arrived at writing in a roundabout way as I was doing research for Kinzoo, the kid-tech company I founded in 2018. We were in the early stages of building our messaging app for kids and the team and I were thinking about what kinds of features we wanted to include in our platform. As a father myself, I knew how important it was to get this kind of thing right. We had high standards and wanted to build an app that kids would love and parents would feel good about — so I did an awful lot of research on the topic of kid-tech.</div><div>A Deep Dive Into the Literature.</div><div>At the time, there were many headlines floating around about the addictive nature of tech — and many of the tech world’s founders were speaking candidly about the manipulative features they had built (intentionally or otherwise) into their platforms. I read books like Adam Alter’s Irresistible: The Rise of Addictive Technology and began learning how apps are designed to keep us screen captured. I felt I had to learn everything I could about the ways tech could go wrong so we didn’t inadvertently include addictive or manipulative features in Kinzoo. So down the rabbit hole I went, devouring as many resources and studies as I could — and it took a while before I started to feel like I had a foothold on the topic.</div><div>In the course of researching, I’d implemented a few changes around tech use in my own household. We used to “timestamp” tech with my kids, imposing limits on total screen time, but we started to find it more useful to think critically about what the kids were doing instead of focusing only on duration. After reading so extensively on the topic, I’d been able to draw my own conclusions and felt more confident than ever that tech could be a positive force for my kids. But, not every parent has the time to devote to an extensive kid-tech literature review. I knew first-hand how intimidating it can be to bring technology into your home, and I realized that others could probably benefit from the legwork I’d done while building Kinzoo.</div><div>Learning To Ask the Right Questions.</div><div>While any kind of consensus is tough to come by in the screen time debate, one thing is crystal clear: technology is here to stay. It’s deeply ingrained in our society and our kids will use it (and likely sooner than later). So, the most important question parents can ask is how to set their kids up for success in this important aspect of life. While I don’t have all the answers, I do feel much more confident after all the research I’ve done — and I even find it easier now to differentiate a helpful, balanced resource from alarmist clickbait.</div><div>Initially, I wasn’t sure I’d be able to write a whole book. I worried I wouldn’t have enough to say and it was difficult for me to picture the finished product. But as I took stock of the genre, I had a sense that I could offer a different perspective on this very important topic. So I set about writing.</div><div>Empowering Families To Talk About Tech.</div><div>Screen Captured is not a step-by-step guide, and that’s quite intentional. I’m not a psychologist or professional researcher, but I am a dad with stories about my own lived experience introducing tech to my daughter. For me, this book isn’t about telling parents what to do. Rather, it’s about sharing what I’d learned on this journey — and hopefully equipping others to have productive conversations about the role of technology in their families. It’s about pulling back the curtain on the tech industry and bringing some transparency to the way apps and platforms operate — and what that means for our kids.</div><div>My hope is that Screen Captured can be a tool to help parents cut through the noise and gain the confidence to tell good tech from bad. In it, I spell out the difference between positive screen time — which is educational, creative and connecting — and screen capture, which uses manipulative mechanisms to keep us scrolling ad infinitum. All the research that I did really helped to simplify the role of technology in my household, and has made it a much less contentious subject within my family. I think the book can do the same for other parents, and I’m really excited by to share my learnings.</div><div>Recently, I shared an advanced copy of the audiobook with a friend and fellow parent. She’s been listening to it one chapter at a time with her kids on their drive to school, and she shared some interesting insights: it’s prompted her son to share stories about how he and his friends use tech, and it’s inspired her daughter to experiment with phone-free time during the day. She noted that sharing the book with her kids (as opposed to reading it and relaying the information), opened up a collaborative conversation in her family around tech use.</div><div>I was relieved and thrilled to hear my friend’s story about listening to the book, and I can’t wait to hear what other readers have to say. If Screen Captured can help people feel even a little bit better about introducing tech to their kids, then I’d call it a great success. I really hope all parents out there enjoy it!</div><img src="http://static.wixstatic.com/media/f6bccd_873d747587a248c5b9c12c242584c0eb~mv2.jpg"/><div>Sean Herman is the father of an 8-year-old daughter and a 2-year-old son. The experiences his daughter had online inspired him to start Kinzoo, a private messenger that turns screen time into family time. As Founder and CEO, Sean aims to make Kinzoo the most trusted brand in the world for incorporating technology into our children’s lives, and he wants to help parents mold their kids into responsible digital citizens. As a CFA Charterholder, Sean is uniquely qualified to analyze the future of technology from both the consumer and company perspectives. He lives in Vancouver with his two children and wife of twelve years.</div></div>]]></content:encoded></item><item><title>It's National Bullying Prevention Month</title><description><![CDATA[It's National Bullying Prevention Month! Download and share our handy infographic. It will help young people know what they can do if they become the target of cyberbullying and/or witness another being bullied. Download It Here!<img src="http://static.wixstatic.com/media/f6bccd_6aba2611aee34f1baa022c7e8b038a90%7Emv2.png"/>]]></description><dc:creator>Cyberwise</dc:creator><link>https://www.cyberwise.org/single-post/2019/10/07/Its-National-Bullying-Awareness-Month</link><guid>https://www.cyberwise.org/single-post/2019/10/07/Its-National-Bullying-Awareness-Month</guid><pubDate>Mon, 07 Oct 2019 19:37:32 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_6aba2611aee34f1baa022c7e8b038a90~mv2.png"/><div>It's National Bullying Prevention Month! Download and share our handy infographic. </div><div>It will help young people know what they can do if they become the target of cyberbullying and/or witness another being bullied. </div><img src="http://static.wixstatic.com/media/f6bccd_0b58e453051b4188a5c92b5788cd6f17~mv2.png"/></div>]]></content:encoded></item><item><title>Online Education: How to Get a Degree from Home</title><description><![CDATA[Ed. Note: One of the best attributes of the Internet, is the ability it offers to learn anything, anytime, anywhere! That's why we thought you'd enjoy this post!Not too long ago, there was a debate over whether online education could replace the physical classroom. Academics argued that there was no way that one could evaluate and assess a candidate’s work accurately. Apart from the tools that were lacking at the time, the main argument was that no one could be sure that the actual candidate<img src="http://static.wixstatic.com/media/f6bccd_f3cdbe1c383c47c696545e7d7af32aef%7Emv2_d_4193_2785_s_4_2.jpg/v1/fill/w_636%2Ch_422/f6bccd_f3cdbe1c383c47c696545e7d7af32aef%7Emv2_d_4193_2785_s_4_2.jpg"/>]]></description><dc:creator>Ray Campbell</dc:creator><link>https://www.cyberwise.org/single-post/2019/10/07/Online-Education-How-to-Get-a-Degree-from-Home</link><guid>https://www.cyberwise.org/single-post/2019/10/07/Online-Education-How-to-Get-a-Degree-from-Home</guid><pubDate>Mon, 07 Oct 2019 16:31:58 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_f3cdbe1c383c47c696545e7d7af32aef~mv2_d_4193_2785_s_4_2.jpg"/><div>Ed. Note: One of the best attributes of the Internet, is the ability it offers to learn anything, anytime, anywhere! That's why we thought you'd enjoy this post!</div><div>Not too long ago, there was a debate over whether online education could replace the physical classroom. Academics argued that there was no way that one could evaluate and assess a candidate’s work accurately. </div><div>Apart from the tools that were lacking at the time, the main argument was that no one could be sure that the actual candidate completed the assignment. Who could say that outside help was not used? Things have changed though and you can even earn a master’s degree where a research paper is required. </div><div>The online degree has come and is here to stay. But what do you need to do to get a degree from home?</div><div>What you want to study matters</div><div>Although you can obtain a degree online, not all degrees meet the requirements to be able to be completed away from campus. Take a medical degree, for example. You can do the degrees that are <a href="https://www.independence.edu/blog/3-healthcare-degrees-can-get-online">allied fields</a> in health administration but medicine studies are not available online. For study in medicine, you can do the theory online and many universities require that all written assignments be submitted online. </div><div>In these cases, you can make use of writing helper or of homework help online service. There is the practical side of things that you cannot exactly do on a computer. You need actual people and cadavers for the practical stuff. </div><div>There are other reputable degrees that fit the bill perfectly for an online degree, though. Some of these you could even take up to masters or Ph.D. level. Degrees in business administration, graphic design and IT are just some of them. </div><div>For these degrees, you could easily choose a <a href="https://edubirdie.com/research-papers-writing-services">research writing service</a> to help you out with those difficult research paper topics. The writing experts you hire online can guide you through the entire process and deliver the work in quick time.</div><div>How do these courses stack up?</div><div>Many people might find the idea of earning a degree online to be less worthy of a degree that was obtained from a physical university. Granted, certain courses are not accredited, so you have to do your homework before you decide to fork out money to get your online degree. </div><div>To put your mind at ease though, if you get your online degree through an accredited university, the degree will be equal to one earned at a physical campus. </div><div>In addition to being on par with a normal degree, an online degree is often much more affordable. The course material is provided digitally and you can review your lectures as often as you like. The sessions are mostly recorded and all other materials and resources can be downloaded with ease. </div><div>What format does an online degree have?</div><div>For one, wherever you have a good internet connection, there is your classroom. You can study anywhere at whatever time suits you. This is one of the key benefits of an online degree. </div><div>Many people cannot get to the campus during the day time due to various constraints. Obviously, all of your course material is digital, including your lectures. These can be livestreams that are recorded or just pre-recorded sessions. </div><div>In terms of the assignments and assessments, they vary greatly and they continue to change as technology develops. The great thing about online coursework is that you are already in an online environment. So, you are much more accustomed to finding <a href="https://topicsmill.com/term-paper/">term paper topics</a> list or other useful resources like a research paper example to spark your own creativity. </div><div>You also have the freedom to use a service that can <a href="https://au.edubirdie.com/do-my-assignment">write my assignment</a>, ranging from dissertation to thesis, college essays to term papers and all other college and university level writing requirements. </div><div>When you do an online master’s degree, the research paper format stays the same, the only thing that changes the is communication from the university.</div><img src="http://static.wixstatic.com/media/f6bccd_a2b3427b70d9461f85c0bae51f41d79f~mv2.png"/><div>What is communication like?</div><div>When you are on campus, you have the luxury of speaking with your lecturers after a class, but most of the time, you have to make an appointment beforehand if you need assistance. </div><div>This is an area that is both beneficial and one of the drawbacks of an online degree. While you don’t always have instant access to one of your lecturers, you do have email. Though an email is not the fastest mode of communication, you can be certain that your queries will be met in due time. There are many other <a href="https://elearningindustry.com/digital-education-tools-teachers-students">digital tools</a> that are used by students and teachers to facilitate communication.</div><div>The great thing about email conversations is that lecturers can attach digital resources for you in an instant. This allows you to have time to phrase your queries much better. </div><div>Conclusion</div><div>As time goes on, more and more people are turning to online degrees to get their qualifications. The variety in degrees is also expanding rapidly and who knows what you will be able to do online in the future? </div><div>Online degrees have made it possible for people from all walks of life to get an education. No longer are we restricted by national borders either. The only thing that stands between you and your degree is your willingness to see the degree through. </div><div>Author Bio:</div><div>Ray Campbell is a renowned academic writer, editor and student mentor. He has trained many students to become successful authors, bloggers and academic writers and excel in their academics with the help of their superior writing skills. When he’s not at work, he meditates, loves to prepare Thai dishes for his family and goes out for long walks at the beach.</div></div>]]></content:encoded></item><item><title>Teen Tech Lingo Parents Should Know</title><description><![CDATA[Teens seem to add new words to their vocabulary every other day, and many of these are used online. That’s why we have created a handy list to help you! THE RELATIVELY INNOCENT TERMS11:11 - 11:11 AM or 11:11 PM; it’s commonly believed that making a wish at these times makes it come true! Has connections to numerology and spirituality.Awks - Short for ‘awkward.’BTS - A popular boy band in Korea.Bruh - Another slang for ‘bro’ or ‘dude.’CYA - Two very different possible meanings: 1. See you. 2.<img src="http://static.wixstatic.com/media/f6bccd_2c3d3b4a9f614507b787a4be66392f87%7Emv2_d_4218_3290_s_4_2.jpeg/v1/fill/w_636%2Ch_496/f6bccd_2c3d3b4a9f614507b787a4be66392f87%7Emv2_d_4218_3290_s_4_2.jpeg"/>]]></description><dc:creator>Prithiv Sassisegarane, Mobicip</dc:creator><link>https://www.cyberwise.org/single-post/2019/09/07/Teen-Tech-Lingo-Parents-Should-Know</link><guid>https://www.cyberwise.org/single-post/2019/09/07/Teen-Tech-Lingo-Parents-Should-Know</guid><pubDate>Sat, 07 Sep 2019 23:55:56 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_2c3d3b4a9f614507b787a4be66392f87~mv2_d_4218_3290_s_4_2.jpeg"/><div>Teens seem to add new words to their vocabulary every other day, and many of these are used online. That’s why we have created a handy list to help you! </div><div>THE RELATIVELY INNOCENT TERMS</div><div>11:11 - 11:11 AM or 11:11 PM; it’s commonly believed that making a wish at these times makes it come true! Has connections to numerology and spirituality.</div><div>Awks - Short for ‘awkward.’</div><div>BTS - A popular boy band in Korea.</div><div>Bruh - Another slang for ‘bro’ or ‘dude.’</div><div>CYA - Two very different possible meanings: 1. See you. 2. (See RUDE list.)</div><div>Chillaxin’ - A compound word formed by adding ‘chilling’ with ‘relaxing.’</div><div>Dabbing - Again, two very different possible definitions! 1. (See DRUGS list.) 2. A trending dance move.</div><div>Dope - Awesome.</div><div>GOAT - Greatest of All Time.</div><div>GTG/G2G - Got To Go. Used to end a conversation.</div><div>Gucci - Not just the brand! Implies anything that’s extremely expensive.</div><div>High Key - Very much. The opposite of Low Key!</div><div>Hundo P - One hundred percent.</div><div>ILY - I Love You.</div><div>IRL - In Real Life.</div><div>ISO - In Search Of.</div><div>JK - Just Kidding. Used after pulling someone’s leg.</div><div>LMP - 1. Like My Pic. Used to ask someone to like one’s picture online. 2. (See SEXUAL list.)</div><div>Low Key - A little bit. The opposite of High Key!</div><div>Lit - Someone/something that is popular.</div><div>LMAO - Laughing My Ass Off. Used when a particular content is found to be extremely funny.</div><div>LOL - Laughing Out Loud. Sent after reading something funny.</div><div>NP - No problem.</div><div>Noob - Used to describe a novice in a field.</div><div>ROFLMAO - Rolling On the Floor Laughing My Ass Off. Used to refer to the funniest things you read!</div><div>Salty - To be bitter or irritable about something.</div><div>SMH - Shaking My Head. Used to express exasperation or frustration.</div><div>Snatched - Someone that looks good or is well-styled.</div><div>SIC - Something that Is Cool.</div><div>Squad - The social group someone belongs to.</div><div>TBH - To Be Honest.</div><div>WUF - Where You From? (Where are you from?)</div><div>WYA - Where You At? (Where are you?)</div><div>WYD - What You Doing? (What are you doing?)</div><div>Yeet - A very emphatic ‘Yes’.</div><div>RUDE, SWEAR WORDS OR BORDERLINE ABUSIVE TERMS</div><div>AF - As F*ck. Used as a suffix to exaggerate something. For example, ‘She was boring AF.’</div><div>As B*lls - Used exactly the same as ‘AF’, this suffix is also used to exaggerate simple statements.</div><div>Basic - Someone who is boring.</div><div>Bih - Short form for b*tch.</div><div>CYA - Cover Your Ass.</div><div>KMS - Kill Myself.</div><div>KYS - Kill Yourself.</div><div>OMFG - Oh My F*cking God. Used in the same way as ‘Oh my god’ or ‘OMG’.</div><div>Shading - To gossip about someone/something without naming them.</div><div>SH - Sh*t Happens. Used when something unforeseen happens (Note: Not sympathetic).</div><div>SMDH - Shaking My D*mn Head. Usage similar to SMH.</div><div>STFU - Shut The F*ck Up.</div><div>Tool - Someone who is either stupid or geeky.</div><div>Throw Shade - A subtle, sneering expression of contempt, either verbal or non-verbal.</div><div>Wanksta - A person who acts tough in public but is mellow or soft on the inside.</div><div>DRUG REFERENCES</div><div>4:20 - Marijuana reference.</div><div>Dabbing - A concentrated dose of cannabis.</div><div>Dexing - Overdosing on cough syrup to feel drunk.</div><div>Hulk - A 2mg benzodiazepine bar; a party drug.</div><div>Juul - Small pods or e-cigarettes used for smoking.</div><div>Molly- 3, 4-Methylenedioxymethamphetamine. A drug that alters moods and perceptions.</div><div>School Bus - Yellow Xanax, often now being misused as a party drug.</div><div>Turnt Up - Someone who is high on drugs or drunk.</div><div>Zip Ghost - Someone who has a hard time functioning in society as a result of being high on Marijuana.</div><div>MOST IMPORTANT FOR PARENTS TO KNOW!</div><div>CD9 - Code 9. A quick warning to alert friends when parents are near!</div><div>Finsta - A fake Instagram account.</div><div>FOMO - Fear Of Missing Out.</div><div>LMIRL - Let’s Meet In Real Life. Sent between individuals whose communication has thus far been restricted to online messaging.</div><div>POS - Parents Over Shoulder. Used to warn the other person not to type or discuss anything explicit.</div><div>Spam - To have a fake social media profile.</div><div>Swoop - To be picked up in a car.</div><div>YOLO - You Only Live Once. Often used as a justification to perform dangerous stunts.</div><div>RELATING TO SEXUAL OR ROMANTIC RELATIONSHIPS</div><div>53X - Sex.</div><div>ASL - Age/Sex/Location. Used to ask for basic information about a prospective partner.</div><div>Bae - A sweet term for crush or partner.</div><div>Beat Cake - Term for rough sex.</div><div>BMS - Breaks My Scale. Someone who’s so attractive they’ve broken the ‘beauty scale’.</div><div>CU46 - See You For Sex.</div><div>FWB - Friends With Benefits. Two friends who regularly hook up sexually without any emotions or feelings.</div><div>GNOC - Get Naked On Camera.</div><div>Hentai - Graphic anime pornography which originated in Japan.</div><div>Netflix and Chill - Getting together to hook up.</div><div>NIFOC - Naked In Front Of the Computer.</div><div>PMYOS - Put Me On Your Snapstory. Used between friends or partners to show everyone how close they are.</div><div>Sexting - To share sexually explicit messages between two individuals.</div><div>Ship - The desire to see two individuals (often fictional characters) as a romantic couple.</div><div>Smash - Casual sex.</div><div>Snack - An attractive person.</div><div>Snapstreak - The continuous number of days in which two individuals ‘snap’ each other. A snap could be either a photo or a video, created using Snapchat.</div><div>Thirsty - Someone who is desperate for sexual attention.</div><div>Thot - That Hoe Over There. Used to describe someone as a ‘slut’.</div><div>TDTM - Talk Dirty To Me. Used for sexting.</div><div>Thicc - A hefty person who is considered attractive.</div><div>Tight - In a close relationship with someone.</div><div>WTTP - Want To Trade Photos?</div><div>While a few of these terms are innocent enough, there are quite a few that should raise concern if you find your teen using them online. At the delicate age where they require both independence and guidance, the perfect way to strike a balance would be to talk the subject through with your teens. Meanwhile, forewarned is forearmed. Go through this list so that you know what your kids are saying online. All the best!</div><div>Writing credit: Authored by Prithiv, a Mobicip researcher who writes about the effects of technology on health and well-being. Keep in touch with the latest on parenting, technology and education. Subscribe to the Mobicip newsletter. Learn more at <a href="http://www.mobicip.com">www.mobicip.com</a>.</div></div>]]></content:encoded></item><item><title>Sextortion: What It Is And How To Avoid It</title><description><![CDATA[The online world is full of possibility, but security issues exist too. In particular, there is a growing danger of sextortion on the internet. Here is everything you need to know about the topic, along with what you can do if you get caught up in it.What is Sextortion? According to the FBI, sextortion is, “a serious crime that occurs when someone threatens to distribute your private and sensitive material if you don’t provide them images of a sexual nature, sexual favors, or money.” Sextortion<img src="http://static.wixstatic.com/media/f6bccd_390c0003d536402794e2daad33f05ffa%7Emv2.jpg/v1/fill/w_636%2Ch_424/f6bccd_390c0003d536402794e2daad33f05ffa%7Emv2.jpg"/>]]></description><dc:creator>Aimee Laurence</dc:creator><link>https://www.cyberwise.org/single-post/2019/09/07/Sextortion-What-It-Is-And-How-To-Avoid-It</link><guid>https://www.cyberwise.org/single-post/2019/09/07/Sextortion-What-It-Is-And-How-To-Avoid-It</guid><pubDate>Sat, 07 Sep 2019 23:28:25 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_390c0003d536402794e2daad33f05ffa~mv2.jpg"/><div>The online world is full of possibility, but security issues exist too. In particular, there is a growing danger of sextortion on the internet. Here is everything you need to know about the topic, along with what you can do if you get caught up in it.</div><div>What is Sextortion?</div><div> According to the FBI, sextortion is, “a serious crime that occurs when someone threatens to distribute your private and sensitive material if you don’t provide them images of a sexual nature, sexual favors, or money.” </div><div>Sextortion is not just about someone getting their hands on sensitive material for nefarious purposes, however. The intent is usually financially motivated blackmail.</div><div>What Can Be Done?</div><div>Remain vigilant. If you are a parent, make sure you have security measures in place with regards what content and websites your children can access (especially on mobile devices) and run regular scans and checks for flagged words and content (there is software available which can assist in this approach). Most importantly, educate your children regarding the dangers that lurk online, and dissuade them from sending sensitive material online, or engaging in conversations with people they do not know.</div><div>Follow the same advice yourself. Never share sensitive content, especially images of yourself. Even if the person you are sending to is completely trusted, accounts can and do get hacked.</div><div>In the online world, sextortion is a real threat, and something everyone should be wary of. At the very least, think about how you conduct yourself online and the type of images and content that you share. If you share something on one medium of communication, the chances are that those images could be accessed and sent or posted elsewhere. Let that always determine the type of imagery you share, and ask the question: ‘Is this something that I wouldn’t mind everyone seeing?”</div><div>Of course, this is a worst-case scenario. Those who have sent intimate pictures of themselves to partners never believe that those images could be shared with the greater online community, but that, unfortunately, is what happens sometimes.</div><img src="http://static.wixstatic.com/media/f6bccd_300a4c9ca46b4f30a0159614eb952ea5~mv2_d_1920_1296_s_2.jpg"/><div>Are There Any Specific Scams To Be Aware Of?</div><div>One particular scam running currently is an email that you will receive purportedly stating that they have access to sensitive materials belonging to you, and this will be revealed in the public domain unless you comply with the request (which is usually for money). To validate the threat, a sensitive password that you once used is usually shared.</div><div>“At this stage we in the security community do not believe that these blackmailers have access to your materials, but have instead gained your password through past breaches. Change all your passwords immediately, and report the email to the relevant authorities, but absolutely do not comply with the demand,” says Richard O’Connor, a security blogger at <a href="https://australianhelp.com/coursework-writing">Coursework Writing Service</a>and <a href="https://oxessays.com/essay-help">Online Paper Help</a>.</div><div>What Should You Do If You Are a Victim?</div><div>It is easy to say that you should tell someone, but that may be the very last thing you want to do. If there really are compromising pictures of you, actually telling someone about them can be as bad as the images themselves getting leaked. In some ways it is a ‘no win’ situation.</div><div>But that is not the case. Telling someone you trust, and ultimately reporting it to the right authorities is absolutely the right thing to do, and is a ‘win’ situation for you.</div><div>“Do not be ashamed, that is the first thing to know. We are all human and all of us engage in private activities, so you are not doing anything that other people may do too. Of course, as a young person this is the last conversation you want to have with your parents, but they will understand more than you realize! And very often it’s not even your fault. Even if it is (you deliberately took and shared some photos, for example), you simply made a mistake that has been made countless times before you. And we all mistakes, just ask your parents,” counsels Monica Hart, an educator at Best Research Paper Writing and OxEssays.</div><div>You need the support of someone you trust through this, so report it. Although the perpetrators may not get caught, by telling people you have removed the very aspect of their approach that they hoped to use to blackmail you. You have taken their power away, so they will now go away. Telling people and reporting it removes the threat. Absolutely do not suffer in silence, as that is how they win. Do not give them anything that they want, immediately tell someone, and let an adult deal with the situation. You can and will get past this.</div><div>Aimee Laurence can be found offering her expert insights as an educator at <a href="https://ukwritings.com/do-my-assignment">UKWritings</a> and <a href="https://boomessays.com/essay-for-sale">BoomEssays</a>, where she mostly writes about college life. Aimee also tutors at <a href="https://essayroo.com/essay-writer">Online Essay Writer</a>academic service.</div></div>]]></content:encoded></item><item><title>How to Protect Against Cyber-Stalking</title><description><![CDATA[The increased amount of online presence we all have today makes it relatively easy for malicious people to stalk or harass us online. Cyber-stalking is a sad and creepy reality that modern society faces. Let’s take a look at its definition, types of cyber-stalking and how to stay safe. What is Cyber-Stalking?The English definition of stalking is unwanted, obsessive attention to a particular individual. Physical stalking can range from persistent texting, manipulation and watching secretly. In<img src="http://static.wixstatic.com/media/f6bccd_5240224f3998483391ee56b04d8f8ed7%7Emv2_d_1920_1280_s_2.jpg/v1/fill/w_636%2Ch_424/f6bccd_5240224f3998483391ee56b04d8f8ed7%7Emv2_d_1920_1280_s_2.jpg"/>]]></description><dc:creator>Douglas Parker</dc:creator><link>https://www.cyberwise.org/single-post/2019/08/31/How-to-Protect-Against-Cyber-Stalking</link><guid>https://www.cyberwise.org/single-post/2019/08/31/How-to-Protect-Against-Cyber-Stalking</guid><pubDate>Sat, 31 Aug 2019 21:01:30 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_5240224f3998483391ee56b04d8f8ed7~mv2_d_1920_1280_s_2.jpg"/><div>The increased amount of online presence we all have today makes it relatively easy for malicious people to stalk or harass us online. <a href="https://www.fbi.gov/news/stories/sentences-in-separate-cyberstalking-cases-103018">Cyber-stalking</a> is a sad and creepy reality that modern society faces. Let’s take a look at its definition, types of cyber-stalking and how to stay safe. </div><div>What is Cyber-Stalking?</div><div>The English definition of stalking is unwanted, obsessive attention to a particular individual. Physical stalking can range from persistent texting, manipulation and watching secretly. In the digital world, malicious people also stalk unaware online users, except they rely on technology to do it. Cyber-stalkers’ motive is to threaten, harass and embarrass their victim. Instant messaging, email, personal data, and social networks are available to cyber-stalkers. All this data can be used to make inappropriate contact with victims.</div><div>Types of Cyber-Stalking</div><div>Catfishing</div><div><a href="https://freebackgroundchecks.com/learn/catfishing-online-statistics-and-how-to-avoid-it/">Online catfishing</a> is a scam that occurs on social media sites, where the online stalkers create fake profiles. Then they approach their victims as friends or someone interested in having a romantic relationship. A cat fisher is likely to have few friends on their profile and most of their photos don’t look real.</div><div>Trolling</div><div>Trollers live out of other people’s social media posts. They post offensive comments because they feel that you don’t have a way of getting to them. Sadly, some make false statements to incite or upset others. If you ever face such an incident, consider consulting a criminal defense attorney. Trolling is a criminal act that is punishable by law.</div><div>Hijacking Your Webcam</div><div><a href="https://www.usatoday.com/story/tech/columnist/saltzman/2018/03/01/has-someone-hacked-your-webcam-heres-how-stop-cyber-snoopers/377676002/">Hijacking a PC's webcam</a> is one of the creepiest methods that cyber-stalkers use to invade their victim’s privacy. The offenders trick you into downloading a malware-infected file that grants them access to your webcam when installed. They make it sneaky such that the user doesn’t suspect anything strange. The thought of someone watching your actions through your webcam is very creepy.</div><div>Visiting You Virtually Through Google Maps Street View</div><div>If a cyber-stalker knows your home address, they can use <a href="https://www.google.com/maps/">Google Maps</a> to see how your house looks without stepping on to your property. The stalker can also research about your neighbors, the surrounding environment and the alleys in your area.</div><div>How to Protect Yourself</div><img src="http://static.wixstatic.com/media/f6bccd_ea4b95366aba46028231d06c6373926d.jpg"/><div>1. Avoid posting personal information on social media</div><div>Apps like Snapchat, Facebook, Instagram, and Twitter are meant to link up people from all over the world. Unfortunately, they can cause havoc when misused. Most people don’t consider the harm that posting personal information would cause. When you <a href="https://manshoorylaw.com/blog/be-careful-what-you-post-online/">post online</a> your mobile number, home address or email address, you are making it easier for cyber-stalkers to reach you. To be safe, use a separate email address from your official one to open social media accounts.</div><div>2. Be mindful of your accounts</div><div>The importance of a unique password can never be overemphasized. Stalkers use various methods to get access to their victims’ social media accounts, and a robust password is your first defense. That is why you should create one that is both unique and strong. Avoid using personal information such as your birthday or anniversary date as the password.</div><div>3. Change all your accounts’ details when you end a relationship</div><div>In most cases, the offender is usually a victim’s ex-boyfriend or ex-girlfriend. It is common in instances where there was abuse in the relationship for there to be stalking afterwards, because the dominant partner will want to remain in control. Cyber-stalking is the perfect way for them to showcase their power.</div><div>4. Carry out an internet search of your name regularly</div><div>You might not be posting stuff about yourself, but your family and friends could be doing it. Strive to <a href="https://infotracer.com/resources/identity-theft-prevention/">keep your identity and name protected</a> by conducting a regular internet search of your name. It will also help you to know whether a cyber-stalker might be posting false information about you.</div><div>5. Get professional assistance if you are cyber-stalked</div><div>If the stalking and harassment escalates, it is essential to consult the<a href="https://manshoorylaw.com">top criminal defense attorneys in Los Angeles</a>. They will guide you on how to report the offense to the authority. If the stalker’s identity is unknown, you may have to hire a private investigator. In case you need to pursue the case, a lawyer will also help you with filing and prosecution.</div><img src="http://static.wixstatic.com/media/f6bccd_7a408b24b9424709a9505ab2f9c76599~mv2_d_1340_1731_s_2.jpg"/><div>Douglas Parker is a creative content marketer at <a href="https://manshoorylaw.com">Manshoory Law Group, APC</a>. He has always had a special interest in the sphere of Law and Human Rights. Dedicating a lot of his free time to understanding the small details and specifics of these fields, Douglas enjoys exploring and analyzing them in his articles. His main goal is to make this sometimes complicated information available and transparent for everyone.</div></div>]]></content:encoded></item><item><title>Up and Coming Online Trends: How to Stay Safe</title><description><![CDATA[With the internet advancing at such a fast pace, trends seem to come and go with the breeze. A new website might be offering an unheard-of online service or product one day, and then be more or less forgotten within the month; a budding trend may lie dormant for years only to explode in popularity over the course of a week. And with all this going on, it's become more important than ever to be vigilant regarding your own safety and security. To that end, we're using this piece to point to a few<img src="http://static.wixstatic.com/media/f6bccd_cef78e8cb7e349d3a63c3878001aeca3%7Emv2.jpg"/>]]></description><link>https://www.cyberwise.org/single-post/2019/07/22/Up-and-Coming-Online-Trends-How-to-Stay-Safe</link><guid>https://www.cyberwise.org/single-post/2019/07/22/Up-and-Coming-Online-Trends-How-to-Stay-Safe</guid><pubDate>Mon, 22 Jul 2019 17:27:37 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_cef78e8cb7e349d3a63c3878001aeca3~mv2.jpg"/><div>With the internet advancing at such a fast pace, trends seem to come and go with the breeze. A new website might be offering an unheard-of online service or product one day, and then be more or less forgotten within the month; a budding trend may lie dormant for years only to explode in popularity over the course of a week. And with all this going on, it's become more important than ever to be vigilant regarding your own safety and security.  To that end, we're using this piece to point to a few major emerging trends in mobile app and internet use, just to make sure they won't catch anyone off guard. Investment Apps<a href="https://www.barrons.com/articles/best-stoc-apps-51556394796">Apps that allow you to quickly and easily invest</a> in companies and alternative finances have been on the rise these last few years. For the most part these apps offer invaluable services, simplifying processes that were once prohibitively complex, and often operating with no fees. But that doesn’t mean it's a good idea to start using these apps on a whim, or to approach them haphazardly. Some are more reliable than others, and it's always important to read the fine print and ensure you aren't doing anything with your money you'll later regret.  The app Robinhood strikes a nice balance when it comes to apps like these. It lets you invest freely from your mobile phone or tablet on the go, gives you updates on your investments regularly, and also provides advice regarding your specific portfolio and potential areas of interest. This is not to say Robinhood is necessarily the best or the one you should use, but it is a decent model to follow as you sift through what's becoming a very crowded category. A reputable, popularly-used app like this, with clear features and functionality, can help you to get in on this trend in a responsible manner. Online Gambling Online gambling is nothing new, but it's been on a roll lately as well. With sites getting more tech-savvy, apps making bets more accessible, and <a href="https://www.topnjsportsbooks.com">New Jersey's new sportsbooks</a> opening up the U.S. market, it's fair to say this entire practice is getting trendy all over again. And for the most part, it can be a great way to pass the time, enhance your existing enjoyment of sports and other public events, and potentially pick up some spare cash. Here too, though, it's important to be careful as the trend continues.  The most important thing when engaging in online gambling is to make sure you're dealing with a licensed and regulated site or app. There are plenty of trusted, mainstream options, but there are also various smaller or less-established companies that can be less reliable when handling your money. In addition to picking the right site, you also want to make sure you're gambling responsibly. Betting for fun, with the hope of getting lucky, is a perfectly reasonable hobby; betting because you need to, or because you expect to make money, can quickly become problematic. Messaging Clients It seems that every year, new messaging clients become hits, growing into industry leaders and outstripping competition despite relatively familiar methodology and functionality. We’ve seen it happen with Slack, Skype, Discord, and going even further back, AIM and Stride. So, while the idea of new messaging systems isn't a trend in and of itself, the next specific service you build a profile for probably will be.  As always with these types of online messaging clients, be wary of any unknown friend or contact requests from people you don’t know. Avoid links that look suspicious or that come from unknown services. And, beyond these basics, keep an eye out for more specific modern concerns, such as uninvited bot activity (which can <a href="https://www.2-spyware.com/remove-discord-virus.html">lead to some pretty serious stuff)</a> or deceitful subscription models. Most messaging clients are fairly harmless, and can be very convenient - but that doesn't mean they can't land you in a tricky spot now and then if you let your guard down.  These are just three of the many, trends occurring on the internet of late. But hopefully considering how to handle them safely can renew your interest in digital vigilance and help you to continue to navigate the ever-evolving web as safely as possible.</div></div>]]></content:encoded></item><item><title>Speaking Tour Resumes in August!</title><description><![CDATA[We're busy updating the Cyber Civics curriculum, expanding our team, and getting ready for an awesome Fall. See where we'll be:8/5 | Santa Rosa Academy, Menifee, CA8/12 | St. Eudes School, Chatsworth, CA8/29 | NY Jets Tackle Cyberbullying Symposium, MetLife Stadium, NJ9/6 | United Way of Central West Virginia, WV9/17 | Heilecher Jewish Day School, Minneapolis, MN9/24 | Novato Charter School, Novato, CA9/25 | Marin Waldorf School, Marin, CA10/1 | Infinity Kids Pediatric Group, Lake Forest,<img src="http://static.wixstatic.com/media/f6bccd_d846ae7135d34493b170d4a1865bee6a%7Emv2.gif"/>]]></description><link>https://www.cyberwise.org/single-post/2019/07/16/Speaking-Tour-Resumes-in-August</link><guid>https://www.cyberwise.org/single-post/2019/07/16/Speaking-Tour-Resumes-in-August</guid><pubDate>Wed, 17 Jul 2019 03:25:51 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_d846ae7135d34493b170d4a1865bee6a~mv2.gif"/><div>We're busy updating the <a href="http://www.cybercivics.com">Cyber Civics curriculum,</a>expanding our team, and getting ready for an awesome Fall. See where we'll be:</div><div>8/5 | Santa Rosa Academy, Menifee, CA</div><div>8/12 | St. Eudes School, Chatsworth, CA</div><div>8/29 | NY Jets Tackle Cyberbullying Symposium, MetLife Stadium, NJ</div><div>9/6 | United Way of Central West Virginia, WV</div><div>9/17 | Heilecher Jewish Day School, Minneapolis, MN</div><div>9/24 | Novato Charter School, Novato, CA</div><div>9/25 | Marin Waldorf School, Marin, CA</div><div>10/1 | Infinity Kids Pediatric Group, Lake Forest, CA</div><div>10/16 | Sandpoint Waldorf School, Sandpoint, ID</div><div>10/21-23 Wall Street Journal Tech Live, Laguna Beach, CA</div><div>10/28-30 | Texas Charter School Conference, Austin, TX</div><div>11/13 | CETPA Conference, Anaheim, CA</div></div>]]></content:encoded></item><item><title>How Technology is Hooking Teens Up With Drugs</title><description><![CDATA[If you’re one of those parents who constantly find their children gazing into their computers and smartphones and worry about the technology’s influence on them, relax a bit. It can actually be good for them. Aside from making their (and our) lives more convenient and helping teens connect with their peers, technology provides useful information to inquiring minds. It can broaden their outlooks, and expand cultural views and diversity. Different types of media can help teenagers develop their<img src="http://static.wixstatic.com/media/f6bccd_8b57d16ce7c0415c86d5b80dad86d407%7Emv2_d_1920_1280_s_2.jpg/v1/fill/w_636%2Ch_424/f6bccd_8b57d16ce7c0415c86d5b80dad86d407%7Emv2_d_1920_1280_s_2.jpg"/>]]></description><dc:creator>Gordon Goad</dc:creator><link>https://www.cyberwise.org/single-post/2019/06/20/How-Technology-is-Hooking-Teens-Up-With-Drugs</link><guid>https://www.cyberwise.org/single-post/2019/06/20/How-Technology-is-Hooking-Teens-Up-With-Drugs</guid><pubDate>Thu, 20 Jun 2019 19:10:12 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_8b57d16ce7c0415c86d5b80dad86d407~mv2_d_1920_1280_s_2.jpg"/><div>If you’re one of those parents who constantly find their children gazing into their computers and smartphones and worry about the technology’s influence on them, relax a bit. It can actually be good for them. Aside from making their (and our) lives more convenient and helping teens connect with their peers, technology provides useful information to inquiring minds. It can broaden their outlooks, and expand cultural views and diversity. Different types of media can help teenagers develop their reading, writing and critical-thinking skills, not to mention creativity.</div><div>At the same time, the Internet has some hidden dangers. According to the National Survey of American Attitudes on Substance Abuse XVI: Teens and Parents, American teenagers aged 12-17 who have a habit of spending time on social networking sites daily, are twice more likely (in comparison with teens that aren’t hooked on social nets) to smoke marijuana, 3 times more likely to drink alcohol, and 5 times more likely to smoke cigarettes.</div><div>While parents, teachers, and the federal government are trying to teach a younger generation to say no to drugs, more than $25 billion are spent each year on the advertising of cigarettes, alcohol, and prescription drugs. Moreover, TV shows and movies demonstrate considerable amounts of substance use. Consequently, impressionable young minds develop misconceptions about alcohol and drug use and their effects. What makes the situation even worse is the fact that any drug can be easily found and bought online.</div><img src="http://static.wixstatic.com/media/f6bccd_18951e2063874f96a4cd839a8571f7f4~mv2_d_1920_1440_s_2.jpg"/><div>How do teenagers get drugs through the Internet?</div><div>Many young people who become clients of teen drug rehabilitation <a href="https://addictionresource.com/drug-rehab/teen/">(Addiction Resource</a><a href="https://addictionresource.com">)</a>reveal that one of the sources where they obtained substances was the net. And there are three main ways:</div><div>1. Social Networks</div><div>It turns out that Facebook is not just a place to connect with friends. The platform has also become a fruitful marketplace for drug sellers. The trade mainly occurs through Facebook’s secret groups were dealers push ecstasy, LSD, Xanax, and cocaine.</div><div>Some sellers do their “business” even more blatantly. Make a quick search of “oxycodone” on Facebook. You’ll see the pics of pills and profiles of fake pharmacies that offer sleeping pills, opioid painkillers, sedatives, and other prescription drugs. As you’ve already understood, to buy these, your child doesn’t need any prescription. Some media resources report that such illegal trade takes place on Instagram and Snapchat.</div><div>2. The Dark Web</div><div>The dark web (or darknet, deep net) is part of the internet that can be accessed only through special software. Criminals use it for various illegal activities, including drug trafficking. Since this part of the net is not regulated, black market sites that offer illegal substances operate freely.</div><div>Fortunately, one of the largest black markets called Silk Road was shut down in 2013 by the FBI. Before the shutdown, Silk Road had facilitated more than a million transactions that totaled over $1.2 billion in its short lifetime (just 2 years).</div><div>However, there are still many shady sites in the darknet. It goes without saying that teenagers are very tech-savvy. It wouldn’t be a problem for them to access the dark web and purchase something there.</div><div>3. Illegitimate Online Pharmacies</div><div>Psych Central reports that around 10% of prescription abusers obtain their drugs from online pharmacies. In addition to the deep net, the internet is full of illicit pharmacy sites.</div><div>Many of these stores are based abroad, so they are not subject to U.S. governance. People of any age can go online, place an order, and get it delivered in discreet packaging. Again, there’s no need to obtain a prescription to these purchases.</div><div>The additional danger of buying drugs off the net is that buyers don't truly know what they are really getting when they receive an order. The World Health Organization <a href="https://www.who.int/en/news-room/fact-sheets/detail/substandard-and-falsified-medical-products">estimates</a> that about 50% of illicit “no-prescription” online pharmacies are selling counterfeit medications. At best, customers might get just sugar pills; at worst, the substances might be mixed with additional ingredients to make them more potent and deadly.</div><img src="http://static.wixstatic.com/media/02288d1e6bbb44ec813b5e7c5b56e196.jpg"/><div>How to prevent your child from buying drugs over the net?</div><div>Given that youth can easily get any type of drug on the net, parents should watch their kids closer. If you have any doubts, check out your child’s browser history and Facebook, Instagram or another social networking site they use. If you find some unfamiliar hashtags, <a href="https://www.verywellmind.com/glossary-of-drug-related-slang-terms-67907">look for them here</a>. It may be street terms for various drugs.</div><div>Most importantly, you should keep a direct and candid dialogue with your children. You should educate them on the dangers and risks involved with substance use and addiction. Make them feel comfortable telling you about what’s going on at school, including alcohol and drug use among their peers, if it happens. Understanding the environment your children live in and relationships they have with peers can help you understand how to protect them from detrimental influences.</div><div>What parents can do about teen drug use?</div><div>The younger the individual who experiments with drugs is, the higher the risk of serious health consequences. For teenagers, it’s vital to get help early on. When it comes to substance abuse, rehabilitation is the best solution. Teen rehab centers traditionally offer two types of treatment programs:</div><div>Inpatient (residential) programOutpatient program.</div><div>The choice of rehab depends on the type of addiction, mental or other health condition that your child may suffer from, the duration of usage, and the level of the teen’s maturity.</div><div>For someone with a relatively mild addiction, outpatient teen drug rehab is a suitable option. It’ll allow your kid to continue studying at school and leading a normal family life while undergoing treatment at the center.</div><div>If your offspring was unlucky enough to develop a severe addiction that has already caused serious problems at home or school, or already had one or more unsuccessful attempts to quit drugs, inpatient teenage drug rehabilitation would suit more.</div><div>No matter what type of rehabilitation you choose, it’ll provide a lasting and life-changing experience. Teen drug programs are designed to treat addiction and co-occurring health problems caused by abuse. And what is more, they teach teenagers coping techniques to prevent relapse and enable them to sober lifestyles after treatment.</div></div>]]></content:encoded></item><item><title>Harvard Rescinds Student Admission, Take 2. Let's Teach Kids To Do Better.</title><description><![CDATA[I wrote about the first Harvard admissions incident in "Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology" (HarperCollins Leadership) and, in light of a current event, decided to post the following excerpt.It’s imperative to talk to kids about their digital reputations, early and often. Many schools address this by inviting online safety experts to their campus. But often these “experts” either lecture kids or rely on scare tactics that either don’t<img src="http://static.wixstatic.com/media/f6bccd_551706838c0a459880a4f103e83bf21b.jpg"/>]]></description><dc:creator>Diana Graber</dc:creator><link>https://www.cyberwise.org/single-post/2019/06/18/Harvard-Rescinds-Student-Admission-Take-2-Lets-Teach-Kids-To-Do-Better</link><guid>https://www.cyberwise.org/single-post/2019/06/18/Harvard-Rescinds-Student-Admission-Take-2-Lets-Teach-Kids-To-Do-Better</guid><pubDate>Tue, 18 Jun 2019 19:45:09 +0000</pubDate><content:encoded><![CDATA[<div><div>I wrote about the <a href="https://www.mic.com/articles/178904/harvard-rescinds-10-offers-to-students-who-sent-hateful-memes-in-a-private-facebook-group-chat">first Harvard admissions incident</a> in <a href="https://www.amazon.com/Raising-Humans-Digital-World-Relationship/dp/0814439799">&quot;Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology&quot;</a>(HarperCollins Leadership) and, in light of a <a href="https://www.cbsnews.com/news/parkland-shooting-survivor-kyle-kashuv-claims-harvard-admission-rescinded-over-past-racist-remarks-2019-06-17/">current event</a>, decided to post the following excerpt.</div><img src="http://static.wixstatic.com/media/f6bccd_551706838c0a459880a4f103e83bf21b.jpg"/><div>It’s imperative to talk to kids about their digital reputations, early and often. Many schools address this by inviting online safety experts to their campus. But often these “experts” either lecture kids or rely on scare tactics that either don’t work or backfire completely.</div><div>Kids take to adults talking at them about their digital world like birds take to dogs telling them how to fly.</div><div>A better way to help kids understand the importance of maintaining a positive digital reputation is by letting them experience it from a different perspective.</div><div>A Lesson on Digital Reputation That Sticks</div><div>During our first year of <a href="http://www.cybercivics.com">Cyber Civics</a> lessons, I tell my sixth grade students the story of the almost-Harvard students who lost acceptance to this prestigious university because of racist posts in a &quot;private&quot; Facebook group. To help the story sink in, I challenge students to imagine they are college admissions officers. I even let them decide what college they want to pretend to represent. Since we are in California, the ones that come to their minds include Stanford, UCLA, and Cal, some of the hardest in the state, and country, to get into. Next, the students peruse online content I have gathered (all made up, of course) about two fictional applicants and use that information to decide which candidate is most worthy of receiving the full scholarship they are (supposedly) awarding.</div><div>They start by reading each student’s (fake) application letter. The candidates—one male</div><img src="http://static.wixstatic.com/media/f6bccd_6d5405d4bbfd4f95a8ec859246b19005~mv2.png"/><div>and one female—describe themselves and tell of their high GPAs, excellent test scores, and numerous extracurricular activities. Both claim to be outstanding athletes. Since it’s impossible to decide which one is more deserving based solely upon this self-reporting, students turn to each applicant’s (fake) “digital billboard” to learn more.</div><div>Before this activity, students have already learned that a digital billboard is a collection of a person’s online activities—their digital reputation. While often referred to as a digital footprint, we call it a billboard for a couple of reasons. First, as students have pointed out to me, footprints are easily washed away. To them, a billboard seems more permanent. Second, anyone and everyone on the “information superhighway” can see a billboard. It advertises what kind of person you are.</div><div>Students quickly discover that the content of each applicant’s digital billboard isn’t so stellar. The male applicant, David, a talented soccer player, posted a picture of himself toilet-papering a neighbor’s house and also posted a YouTube video of the escapade. Ouch. Plus, a newspaper article said he’d allegedly been caught hacking into his school’s computer to access a biology test. Furthermore, a club he said he belonged to posted on its Facebook page that he had been dropped for missing too many meetings.</div><img src="http://static.wixstatic.com/media/f6bccd_19b5f54bd76c4d45ab19ef88a1a37caf~mv2.png"/><div>When the students turn their attention to the female applicant, Kate, a prospective English major in the school’s honor society, they discover her food blog is full of grammatical errors and misspelled words. On her Instagram feed, someone had accused her of using a photo that belonged to someone else. She appears scantily dressed in another social media post, and her name does not appear in the list of honor society members on the school’s website.</div><div>My young students, most of whom are just starting to use social media themselves, judge these applicants harshly. Neither, they decide, is worthy of a scholarship.</div><div>But Wait, There's More!</div><div>After students make their decision, they must go back to take another look at each candidate’s digital trail. Upon closer inspection, they notice that the “Dave” who was accused of hacking was a different person from the “David” who had applied for the scholarship. It is not uncommon for two students at a large school to share a last name, I explain. Besides, had they studied the information I gave them more carefully, they would have noticed that the “Dave” in the article plays lacrosse, not soccer. Plus, I point out, the Facebook post that said he was being dropped from the club’s roster was several months old. Something else they had overlooked.</div><div>Students realize they missed some important details about Kate as well. Her school’s website had not been updated in nearly a year, which explains why she did not appear in its honor society list. Oftentimes, this closer inspection leaves my students feeling deflated. </div><div>“It’s not fair,” they say. “It’s so easy for mistakes to happen online, even mistakes that aren’t your fault. Plus, sometimes other people post stuff about you that’s not true.” They also say, “Kids joke around online a lot,” and they wonder if adults can tell when kids post things in jest, or when they are being sarcastic. “Do adults take all of this into consideration?” they want to know. My answer?</div><div>Maybe, but don’t count on it.</div><div>People Are Judging You By What They See Online</div><div>Just as my students made snap judgments about the two fictional applicants, based on a cursory review of each one’s digital billboard, people in real life do this all the time. Bradley Shear, a D.C.-based lawyer specializing in social media law, thinks this is a big problem. In <a href="https://www.nytimes.com/2013/11/10/business/they-loved-your-gpa-then-they-saw-your-tweets.html">an interview with the New York Times</a>, Shear says, “Colleges might erroneously identify the account of a person with the same name . . . or even mistake an impostor’s account—as belonging to the applicant, potentially leading to unfair treatment. ‘Often . . . false and misleading content online is taken as fact.’”</div><div>As founder and general counsel of a company called <a href="https://www.digitalarmourgroup.com">Digital Armour</a>, Shear advises </div><img src="http://static.wixstatic.com/media/f6bccd_d2d07afb9de44db3936c01c1296053dd~mv2.png"/><div>students, professionals, and corporate clients about the legal, privacy, reputation, and security issues inherent in the digital age. “Kids are going to make mistakes,” says Shear. “Why should these mistakes be tied to them for the rest of their lives?”</div><div>Shear told me about a client of his who had been admitted into one of the most prestigious universities in the world. This applicant had his offer and a $250,000 scholarship revoked because of an alleged inappropriate Facebook like and an emoji about the 2016 presidential election.</div><div>“This was a kid with the highest privacy settings,” Shear said. Despite this, one of the applicant’s “Facebook friends” had taken a screenshot of the alleged inappropriate “like” and emoji, saved it for months, and then sent it anonymously to the admissions office of the school Shear’s client had been accepted to. The school contacted the applicant, who verified the long- deleted “like” and emoji. Subsequently, the applicant’s offer and scholarship were rescinded.</div><div>I'd Heard This Story Before</div><img src="http://static.wixstatic.com/media/f6bccd_cba92d611fec4acc9b7e66d7919575a7~mv2.png"/><div>Shear’s story is eerily similar to one I heard from an admissions officer who works for a California university. She told me she’d received a manila envelope in the mail, no return address, filled with screenshots allegedly from the “fake” social media accounts of a female applicant. A note that accompanied the images claimed they were being sent by another prospective student. It read, “You need to know what this girl is really like; she’s not as squeaky-clean as you think.”</div><div>“The envelope was filled with half-naked selfies, posts strewn with foul language,” the admissions officer told me. “Not only could I not believe what I was seeing, I also couldn’t believe that another student would go to such lengths to bring this to my attention. I thought to myself, ‘Is this really what we’ve come to?’”</div><div>According to Shear, “Colleges, graduate schools, and employers do not revoke offers because applicants lack a robust digital life; however, they have and will continue to reject applicants if they find something online that raises a question about an applicant’s character, integrity, or judgment.”</div><div>Please tell your kids that anything they say or do online, or that others say or do about them, speaks volumes about their character. And that character still matters.</div><div>Excerpted from<a href="https://www.amazon.com/Raising-Humans-Digital-World-Relationship/dp/0814439799">&quot;Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology&quot;</a> (HarperCollins Leadership).</div></div>]]></content:encoded></item><item><title>Is Your Child Using AirDrop To Cyber Flash?</title><description><![CDATA[Cyber flashing is when an explicit or inappropriate media file is sent to your phone anonymously and without your permission. This is most common with iPhone users, using an application called AirDrop, which allows anyone within 30 feet to send images and other media files as long as their AirDrop is set to receive the files without explicit permission.Even as adults, it is never pleasant to receive unsolicited images. However, we at least know how to handle the situation. Can the same be said<img src="http://static.wixstatic.com/media/19bb7779894f4dc7bf25ee90c4cad7ab.jpg/v1/fill/w_636%2Ch_424/19bb7779894f4dc7bf25ee90c4cad7ab.jpg"/>]]></description><dc:creator>Suren Ramasubbu, CEO, Mobicip.com</dc:creator><link>https://www.cyberwise.org/single-post/2019/06/12/Is-Your-Child-Using-AirDrop-To-Cyber-Flash</link><guid>https://www.cyberwise.org/single-post/2019/06/12/Is-Your-Child-Using-AirDrop-To-Cyber-Flash</guid><pubDate>Wed, 12 Jun 2019 23:04:48 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/19bb7779894f4dc7bf25ee90c4cad7ab.jpg"/><div>Cyber flashing is when an explicit or inappropriate media file is sent to your phone anonymously and without your permission. This is most common with iPhone users, using an application called AirDrop, which allows anyone within 30 feet to send images and other media files as long as their AirDrop is set to receive the files without explicit permission.</div><div>Even as adults, it is never pleasant to receive unsolicited images. However, we at least know how to handle the situation. Can the same be said of your teens? Since plenty of us parents like to equip children with iPhones, this essentially places multiple iPhones within 30 feet of each other during school and on the bus ride home. If their AirDrop settings are set to 'accept files from everyone,' you are putting them at the risk of receiving unsolicited images.</div><div>The Problem With AirDrop</div><img src="http://static.wixstatic.com/media/f6bccd_367fa0838bd44371ae0ba1a280822c21~mv2.png"/><div>AirDrop comes pre-installed on all iPhones and the default setting for receiving files is from ‘everyone.’ While it is easy to change the settings in a few simple steps, most people make changes to their settings only after the first time they've received an unwanted image from a stranger! Another problem with AirDrop is that a person sending you a file can also access your name from the image transfer. For example, if your child’s name is Christina, her device will typically be named and appear as Christina’s iPhone on a stranger’s device.</div><div>With children whose AirDrop settings allow anyone to send them an image, you risk exposing their personal information to a stranger, including adults who have no business knowing these details. Given the physical proximity that is a prerequisite for AirDrop, it's easy enough for predators to figure out their victim's appearance, name and location from simply the instinctive disgusted reaction of viewing the inappropriate message. Such a risk calls for an immediate application review of AirDrop.</div><div>AirDrop, when used right, is an excellent tool to transfer files between devices. However, with a sharp increase in cyber flashing, there is no clear method to circumvent the loophole that comes with this application, even if you have parental controls in place.</div><div>Apple accounts are opened using the user's birthday, but this information is not used intelligently to adapt AirDrop settings on phones that belong to a child.</div><div>Changing AirDrop Settings</div><img src="http://static.wixstatic.com/media/f6bccd_65c5e21206ce440a8b3b19fc6d92273f~mv2.jpg"/><div>There is only one way to resolve this issue, but it is straightforward and foolproof. Click the ‘Settings’ icon on the main menu, go to ‘General’ and then ‘AirDrop.’ Once you enter the application settings, you’ll find that the receive option is set to ‘Everyone.’.Change this by choosing between ‘Receiving Off,’ ‘Contacts Only,’ and ‘Everyone.’ We recommend 'Contacts Only.'</div><div>While this is recommended for everyone, make sure that this step is taken for all children and teenagers in your care.</div><div>Sending and Receiving a Photo With AirDrop</div><div>To send a photo using AirDrop, you can go to your gallery, choose an image and click on the ‘share’ icon. Of all the sharing options displayed, choose ‘AirDrop’ - this will allow you to send your images to a particular device or to everyone within a 20-30 feet radius from you. However, you can transmit only to devices running on MacOS or iOS.</div><div>When you receive an image via AirDrop, it appears as a popup with a preview of the image. Your children don't even have to open the image, to be exposed to cyber flashing.</div><div>When AirDrop Becomes Unsafe</div><div>As mentioned earlier, AirDrop is not entirely harmful if used right. However, abusers don’t necessarily use an application in the way it is intended to be used, do they?</div><div>Imagine your children sitting on the school bus when one child decides to click an embarrassing photograph of a fellow student and decides to AirDrop it into available devices. (If your children’s AirDrop setting is set for ‘everyone,’ they will also be one of the recipients.) Imagine the trauma that one child could go through in such a situation! Apart from this, AirDrop can also be used to spread hateful and embarrassing memes about a particular student or teacher.</div><div>Another scenario is during public events, when an abuser might send an image of his/her private parts to all and sundry, including kids.</div><div>HERE IS ANOTHER GREAT STORY ABOUT THIS TOPIC:<a href="https://www.theatlantic.com/technology/archive/2019/06/why-teens-try-airdrop-you-memes-concerts/591064/?utm_source=facebook&amp;utm_medium=social&amp;utm_campaign=share&amp;fbclid=IwAR3HpYpaJQQ4tr9oZ67s7nY7JV1EhhEUgovfHHh8wGW5v9gWRL2fNBtV4c0"></a></div><div><a href="https://www.theatlantic.com/technology/archive/2019/06/why-teens-try-airdrop-you-memes-concerts/591064/?utm_source=facebook&amp;utm_medium=social&amp;utm_campaign=share&amp;fbclid=IwAR3HpYpaJQQ4tr9oZ67s7nY7JV1EhhEUgovfHHh8wGW5v9gWRL2fNBtV4c0">WHEN GROWNUPS GET CAUGHT IN TEENS' AIRDROP CROSSFIRE</a> VIA THE ATLANTIC</div><div>What Can Be Done About It?</div><div>The least that Apple can do remedy this situation is to change the default setting to ‘Contacts Only.’ The company could also go further and bring it under the purview of any parental control installed on a phone.</div><div>At this point, however, they haven't! So what parents can, and should, do is manually change your children’s AirDrop settings to ‘Contacts Only.’ This way, your children will at least know who they are receiving messages from and, to an extent, expect safe images. </div><div>You can also talk to them about receiving abusive images and what to do in such cases. Explain clearly to them that it is not their fault and that you should be immediately notified when they receive any kind of image from an unknown person, or disturbing content from someone they know. In this way, you can equip them to face the situation without being scared or scarred.</div><div>Writing credit: Suren, the co-founder and CEO of Mobicip, and a passionate advocate for mobile learning and Internet safety. Suren speaks or hosts panels at conferences and seminars on these topics for parents and educators. He also serves as a consultant for educational technology projects in K-12 schools and school districts. </div><div>Keep in touch with the latest on parenting, technology and education. <a href="https://us1.list-manage.com/subscribe?u=7e025be256c83c884c6e219f3&amp;id=d79046fb92">Subscribe to the Mobicip newsletter</a>. Learn more at <a href="http://www.mobicip.com">www.mobicip.com</a>.</div></div>]]></content:encoded></item><item><title>Devices, FOMO, and Insomnia: How to Cope</title><description><![CDATA[There are many things that interfere with our sleep on a daily basis. For starters, you may find it difficult to sleep when you’re constantly using electronics before bed. This can have negative side effects on rest, as you can imagine, ruining your sleep cycles and leaving you with little to no energy for day-to-day activities.There are many causes for electronically-induced insomnia, all of which could be quite easy to fix. First, know that how long you use electronics before bed can be a big<img src="http://static.wixstatic.com/media/f6bccd_220c5642e59045deb842f380eca8f7e6%7Emv2_d_1920_1280_s_2.jpg/v1/fill/w_636%2Ch_424/f6bccd_220c5642e59045deb842f380eca8f7e6%7Emv2_d_1920_1280_s_2.jpg"/>]]></description><dc:creator>Michael Dawson</dc:creator><link>https://www.cyberwise.org/single-post/2019/05/18/Devices-FOMO-and-Insomnia-How-to-Cope</link><guid>https://www.cyberwise.org/single-post/2019/05/18/Devices-FOMO-and-Insomnia-How-to-Cope</guid><pubDate>Sat, 18 May 2019 16:00:06 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_220c5642e59045deb842f380eca8f7e6~mv2_d_1920_1280_s_2.jpg"/><div>There are many things that interfere with our sleep on a daily basis. For starters, you may find it difficult to sleep when you’re constantly using electronics before bed. This can have negative side effects on rest, as you can imagine, ruining your sleep cycles and leaving you with little to no energy for day-to-day activities.</div><div>There are many causes for electronically-induced insomnia, all of which could be quite easy to fix. First, know that how long you use electronics before bed can be a big contributing factor to why you may not be able to sleep well at night.</div><div>Fear Of Missing Out -- or FOMO for short -- is basically what happens when you obsessively check your phone every single minute to get updates on social media or text messages. It is called this because you usually do it out of a desire to stay up to date on whatever your friends are doing.</div><div>While this is healthy in short bursts, it absolutely can be devastating to your sleep. We’re going to go over some ways to identify and fix this problem, leading you to getting better overall sleep and feeling much more energized throughout the day.</div><div>How do I know if FOMO is disrupting my schedule?</div><div>There are a few ways to tell if FOMO is being an active problem in your life. For starters, ask yourself if you tend to check Facebook or Twitter a lot while in bed. Do you have a nervous breakdown when you go five minutes without checking status updates before you go to sleep?</div><div>If so, you could have FOMO. It might be daunting not knowing what’s going on in the lives of your friends and family, but this can often lead to stress, which can absolutely compound a sleep deprivation problem if you’re not terribly careful with it.</div><div>Usually, when we keep our cell phones, laptops, or any other internet-connected device near us when we sleep, the constant checking of statuses <a href="https://sova.pitt.edu/social-media-guide-losing-sleep-over-fomo">can definitely cause us to get less sleep</a>. Simply moving your phone away from your bed could have a major impact. Or try using Do Not Disturb and other bedtime modes to discourage sleep disruption.</div><div>Is it bad to watch television before bed?</div><div>You might be wondering if watching tv before bed is a good idea, but this too can damage your sleep cycles. TV emits what is called blue light, <a href="https://www.webmd.com/sleep-disorders/features/power-down-better-sleep#1">which can severely interfere with your body’s ability to make melatonin</a>, your body’s hormone for sleep cycle regulation.</div><div>When this happens, it can be very difficult to fall back to sleep, if not next to impossible. That’s why it’s often recommended to shut down tv before bed, so you can get a full, proper night’s rest.</div><div><a href="https://www.sleepadvisor.org/sleeping-with-television-on/">Falling asleep with the television on especially can do damage to sleep.</a> So, while some people believe they cannot sleep without the sound of a TV on, you could be damaging your sleep cycle and health more in the long run by using it as a sleep aid.</div><img src="http://static.wixstatic.com/media/f6bccd_852a1075bc734c14b86caa21678411bb~mv2_d_1920_1280_s_2.jpg"/><div>What are some ways I can help prevent this?</div><div>There are a few ways you can help fix this. For starters, you need to limit how much you use your electronics at night, as well as set a day schedule for use. That way you can accomplish everything you need to do on your computer, as well as social media accounts, before you go to bed. Set early ‘bedtimes’ for your devices, turning them off a good hour or so ahead of sleep.</div><div>For social media, you can help curb FOMO by not checking updates well before bedtime. You can always find out in the morning what your friends are up to, so keep that in mind while doing this. For children, you should also help them to cut out electronics, <a href="https://www.cyberwise.org/single-post/2019/02/26/Kids-Having-Trouble-Sleeping-Try-Cutting-Out-Electronics">as they too can have their sleep affected by it.</a></div><div>You should set a schedule for television as well, getting all of your shows and movies done before you go to bed. Catch up on the latest episodes earlier in the day, or wait until the next day to get your binge on. It might be rough going without TV before bed at first, but your sleep will definitely be improved by it.</div><div>Conclusion</div><div>It might seem difficult at first to completely adjust your life schedule around cutting out electronics before bed, but it really can do wonders in helping you to sleep more soundly. You should be aware of how your habits in the digital world can affect your sleep cycles, as well as be conscious about what it takes to fix these issues.</div><div>You can implement new schedules in your routine, so as to curb the amount of time spent on these devices, which should go a long way in improving your sleep at night. It’s vital that your body be able to produce melatonin properly, which can be interrupted by blue light and stress-inducing FOMO. Knowing balance in terms of using devices and restricting use when necessary is a great first step in fighting insomnia and sleep deprivation.</div></div>]]></content:encoded></item><item><title>21 Videos To Help You Discuss Bullying with Kids</title><description><![CDATA[At Mobicip we believe that there are two components that determine how effectively a message is delivered. One—the relevance of the message itself. Two—the medium of communication used to get the message across. Anti-bullying has taken center stage across the world in the past few years, with a significant number of children coming forward to report the adverse effects of new-age bullying. Although country-wide campaigns have been conducted in the US to address the issue, the problem lies in how<img src="http://img.youtube.com/vi/ptHPSI7GVDQ/mqdefault.jpg"/>]]></description><dc:creator>Prithiv Sassisegarane, Mobicip</dc:creator><link>https://www.cyberwise.org/single-post/2019/04/30/21-Videos-To-Help-You-Discuss-Bullying-with-Kids</link><guid>https://www.cyberwise.org/single-post/2019/04/30/21-Videos-To-Help-You-Discuss-Bullying-with-Kids</guid><pubDate>Tue, 30 Apr 2019 17:45:56 +0000</pubDate><content:encoded><![CDATA[<div><iframe src="https://www.youtube.com/embed/ptHPSI7GVDQ"/><div>At <a href="https://www.mobicip.com/?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">Mobicip</a> we believe that there are two components that determine how effectively a message is delivered. One—the relevance of the message itself. Two—the medium of communication used to get the message across. Anti-bullying has taken center stage across the world in the past few years, with a significant number of children coming forward to report the adverse effects of new-age bullying. Although country-wide campaigns have been conducted in the US to address the issue, the problem lies in how the message is conveyed and who it comes from. Most of the anti-bullying announcements come from a figure of authority—and children, generally, are unable to relate to this.</div><div>An effective way of communicating the harms of bullying is through video, made by students and popular brands and shared online. We have compiled a list of such videos you can watch with your children to feel more comfortable while discussing this sensitive topic.</div><div>1. The Bully</div><div>This short film, directed beautifully by 12-year-old Jonah Maxwell, shows us the heartbreaking reality of bullying and its effects. The message is delivered directly by children and the video ends with how beautiful school life could be… if only bullies chose to be nice. More importantly, the video talks about how bullying can happen 24x7, thanks to the internet and several social media platforms through which bullies abuse their victims.</div><iframe src="https://www.youtube.com/embed/IOV7pSoib5s"/><div>2. Silent</div><div>This award-winning short film directed by Lindsey Hunter goes on to depict the horrific bullying faced by a deaf high school girl. We think this video is a must-watch for your children even if they do not show any signs of being a bully or a victim. It might just help them protect friends who could be going through a tough time.</div><iframe src="https://www.youtube.com/embed/_an9aIryJb8"/><div>3. Thirteen</div><div>Written for the ‘Young Actors Project’ by Robert Randall, this film talks about bullying in middle school and how bullying actually knows no age. Another important point this movie makes is that parents, while they have their kids’ best interests in mind, might sometimes be oblivious to their children’s needs and wants. The key lies in paying close attention to the way your child reacts to your suggestions and then deciding upon an appropriate course of action. For example, if your child doesn’t want to join a club, it might not be prudent to force them into it.</div><iframe src="https://www.youtube.com/embed/tqhjX0bHutw"/><div>4. Strain</div><div>This short film is a silent movie revolving around a pretty common situation between best friends in high school. One of them succumbs to peer pressure and gets inducted into the ‘cool’ gang, which tends to bully the rest of the school. The movie also captures the struggles of a teenager navigating through her mother’s alcohol dependency and the longing to be accepted by her old friend again.</div><iframe src="https://www.youtube.com/embed/9QbrRsOF0YA"/><div>5. Sincere Compliment</div><div>This video places a special emphasis on online bullying and was directed by Jeremiah, a high school junior. Jeremiah has also created an online group for teens to spread positivity in an otherwise vile social media environment. The group aims to help kids from diverse and minority backgrounds find comfort in American schools and ensure they do not fall prey to cyber bullying.</div><iframe src="https://www.youtube.com/embed/2InkWRc1zww"/><div>6. Danger Point</div><div>This video shows us a new perspective! It follows what a middle school bully goes through when he confronts himself and introspects as to why he has become a bully. The reason is straightforward - bullying a defenseless classmate made his friends laugh and, in turn, made him popular in the school. The movie also goes on to show that apologizing makes everything better and that a genuine friendship can bloom out of sincere and transparent communication.</div><iframe src="https://www.youtube.com/embed/4JphNM9UzTU"/><div>7. Anti-bullying 2017</div><div>This adorable video about the different types of bullying and how they can be overcome will speak well to the smaller kids in your family. The video depicts how bullying can happen even during the primary school years and why it is crucial to talk to an adult about it. The video is easy to understand and can help foster a healthy attitude in your children about handling bullies at a very young age.</div><iframe src="https://www.youtube.com/embed/z2LjCJQBKW0"/><div>8. Stand Up!</div><div>This short film by nine-year-old Alexander Boston has been adopted by Wenston School District’s second-grade counseling curriculum. The video teaches how children can stand up against bullying without putting themselves in harm’s way. Once again, this video is great to show to the smaller children at home as it was made by a 9-year-old who knows how to get a message across to that particular age group. </div><iframe src="https://www.youtube.com/embed/6I7Xfx7ULIg"/><div>9. Bully-Free Zone</div><div>This movie is made by fifth graders from Collin Rhodes and talks about the school’s policy on bullying and how it cannot be tolerated. It also encourages students to stand up and support those who are being bullied. Accompanied by cheerful music and delightful images, Bully-free Zone is a must-watch before your kids head to middle school. If you feel your children do not want to talk about school, sitting down with them and casually watching this movie together can help them open up.</div><iframe src="https://www.youtube.com/embed/xRb8Xsm9c4o"/><div>10. All Different, All Equal </div><div>This video was made for Anti-bullying Week, 2017, and talks about finding equality within diversity. For a heart-melting three minutes that are almost too pure to handle, the children themselves tell us what they understand about diversity and equality. You can surely add this video to the list for your younger children, to ensure that they know enough to put differences aside and find friendships in diversity and adversity.</div><iframe src="https://www.youtube.com/embed/tPNfHSfQgxU"/><div>11. LMS Anti-bullying Assembly Video</div><div>This powerful video shows us a series of school children, who perfectly convey through charts and body art, how bullying makes them feel and how you can stand up with them to make all the difference. The video drives home the perfect message - there is no place for hate in schools. We do not recommend showing this video to very young children, as they might not be able to fully comprehend the level of bullying older students can face.</div><iframe src="https://www.youtube.com/embed/xrm0_P4nDQM"/><div>12. Do What’s Right Online</div><div>This movie was made for the ‘Better Internet’ campaign and focuses on how cyberbullying can hurt just as much as physical and verbal bullying. The movie vividly shows us how bullying affects both the parties involved - the victim and yes, the bully too. It also demonstrates how empathizing with the victim can expand the bully’s perception to the true harm he/she is causing. This video is short and crisp; suitable for your busy teenagers!</div><iframe src="https://www.youtube.com/embed/SbB4Mo3MnVo"/><div>13. I’m Fine</div><div>Another one about cyberbullying, this movie shows us the ugly truth behind every victim’s “I am fine”. The movie also places emphasis on how problems can be solved by communicating with friends and loving adults. The message is that, sharing not only helps you take action against bullying but also makes you feel emotionally lighter. The next time your child gives you a nonchalant “I’M FINE,” you might want to look closer for the hidden signs of “HELP ME.”</div><iframe src="https://www.youtube.com/embed/fw2HEOkS8pI"/><div>14. Friends Can Be Bullies Too</div><div>If you can watch just one video during the conversation against bullying, this should be it! The video portrays, very realistically, how a friend’s casual body shaming and irresponsibility can hurt. Children should immediately be distanced from such toxic friends. While other types of bullying come with clear labels, this can be harder to define, especially for children who are desperate to fit in. This video will teach your children the importance of self-worth and how nobody, not even their closest friend, gets to treat them poorly.</div><iframe src="https://www.youtube.com/embed/f-hozTI6PvA"/><div>15. Burger King - Bullying Jr.</div><div>Burger King, in its anti-bullying video, shows us a non-scripted video in which only 12% of its customers stand up to high school bullies, but 95% complain about a ‘bullied’ burger (a burger punched in the middle by a worker). The video closes with powerful messages from school children expressing how much better they felt when someone stood up to their bullies. The campaign went viral and we’d like to think that it made a positive difference with at least a handful of people. Light yet powerful, this video makes for a great message on anti-bullying that should be watched with high schoolers.</div><iframe src="https://www.youtube.com/embed/mnKPEsbTo9s"/><div>16. One Person Can Make a Difference</div><div>With over ten million views on YouTube, this video appeals to teenage girls who might be wallowing in their own pain as a result of constant bullying. The video explains that all it takes is one person to empathize and stand up for what is right. Even if your children are neither bullies nor victims, it is crucial to show them that they should watch out for signs of bullying around them, and go straight to a teacher if they do find someone being bullied.</div><iframe src="https://www.youtube.com/embed/Xuc8Pt5CinY"/><div>17. Words DO Hurt</div><div>This viral video of Ally Pollak, an eighth grader, shows the teen holding up cards with information about the constant bullying she has been facing for the last two years. Her message struck a chord with adults and teenagers alike, and she successfully created a positive impact in the anti-bullying initiative. While most of the other videos listed here are dramatized, scripted or edited, Ally’s video gives a powerful first-person account of the real harms of bullying.</div><iframe src="https://www.youtube.com/embed/37_ncv79fLA"/><div>18. Kids React to Bullying</div><div>Although this video was released in 2011, it still makes for an interesting watch. Kids, as young as four and as old as twelve, react to a viral video of bullying. In the ‘question time’ of the video, the children are asked about what they think is the right course of action in that situation. Although the children in the video might not provide you with the perfect barometer against which you can measure your own children’s reaction to bullying, it is still important for your children to know the various reactions to bullying and what other children think about it.</div><iframe src="https://www.youtube.com/embed/Xre8zZ_B8Mk"/><div>19. How to Stop a Bully</div><div>Author Brooks Gibbs talks about the psychology of bullying and ‘dominance behaviour’ in this video. He addresses a group of high schoolers and gives them a simple solution to take the power away from the bully. Watch this video with your children and then have a serious discussion about it, together. The video is also widely played in several schools across the country to increase awareness on how to stop bullying.</div><iframe src="https://www.youtube.com/embed/7oKjW1OIjuw"/><div>20. To This Day… For The Bullied and The Beautiful</div><div>In this TED Talk, Shane Koyczan gives adults and children an insight into dealing with bullying and how you need not define your entire life based on being a victim. With a soothing voice and a strong message, Koyczan’s video is a great watch for the entire family. It’s a great way to teach your children how to cope with bullying and encourage them to come to you with their problems.</div><iframe src="https://www.youtube.com/embed/sa1iS1MqUy4"/><div>21. How To Be an Upstander to Cyberbullying</div><div>This video from Cyber Civics teaches students what they can do to 'stand up' to cyberbullying.</div><iframe src="https://www.youtube.com/embed/ptHPSI7GVDQ"/><div>With bullying becoming an everyday occurrence at schools, there is no ‘better’ time to talk about this subject. Grab the bull by the horns and discuss this delicate subject with confidence and kindness. We hope that this comprehensive list of videos will make it easy for your children to do the right thing if they find themselves in a tough situation.</div><div>Authored by Prithiv, a Mobicip researcher who writes about the effects of technology on health and well-being. Keep in touch with the latest on parenting, technology and education. Subscribe to the Mobicip newsletter. Learn more at <a href="http://www.mobicip.com">www.mobicip.com</a>.</div></div>]]></content:encoded></item><item><title>Teens, Screens, and the Whole Tech Scene Workshop</title><description><![CDATA[DID YOU KNOW? Teenagers who spend hours per day playing video games and other Internet activity are more susceptible to attention problems, feelings of loneliness and sadness, and possible suicidal thoughts. Excessive amount of screen time can also cause a myriad of effects on your teenager's overall health. So how do we help our teens? Discover the answers on this workshop:Monday, April 15, 8 p.m. ESTWe are thrilled to be part of this! Join Cyberwise's Diana Graber, author of Raising Humans in<img src="http://static.wixstatic.com/media/f6bccd_4fc349b8c81241d0a9dcbc427491f51a%7Emv2.png/v1/fill/w_636%2Ch_435/f6bccd_4fc349b8c81241d0a9dcbc427491f51a%7Emv2.png"/>]]></description><dc:creator>Cyberwise</dc:creator><link>https://www.cyberwise.org/single-post/2019/04/12/Teens-Screens-and-the-Whole-Tech-Scene</link><guid>https://www.cyberwise.org/single-post/2019/04/12/Teens-Screens-and-the-Whole-Tech-Scene</guid><pubDate>Fri, 12 Apr 2019 21:28:32 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_4fc349b8c81241d0a9dcbc427491f51a~mv2.png"/><div>DID YOU KNOW? Teenagers who spend hours per day playing video games and other Internet activity are more susceptible to attention problems, feelings of loneliness and sadness, and possible suicidal thoughts. Excessive amount of screen time can also cause a myriad of effects on your teenager's overall health. </div><div>So how do we help our teens? Discover the answers on this workshop:</div><div>Monday, April 15, 8 p.m. EST</div><div>We are thrilled to be part of this! Join Cyberwise's Diana Graber, author of Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology &amp; Deborah Gilboa M.D., the founder of AskDrG.com.</div><div><a href="https://ytmworkshops.com/techworkshop?affiliate_id=1621076">SIGN UP HERE</a></div><div>Here's what you get when you sign up!</div><div>Solid advice that can change your teenager’s tech habits so they are making even better decisions. </div><div> Workshop Recording for your reference ($27 value)  Transcript &amp; Audio to read / download to your SmartPhone ($17 value) Tech &amp; Teens Article Bundle a collection of our best tech related information, studies and relevant content ($37 value) Bark access, two months free! ($19 value) </div><div>TOTAL VALUE = $100+</div></div>]]></content:encoded></item><item><title>Parents: 7 Apps You Should Know</title><description><![CDATA[EDITORS NOTE:While we believe no app is inherently "good" or "bad" (it's how they are used!), one thing we've learned is this... Parents want to know what apps kids are using and what the potential for danger is on those apps. So we turned to our friends at Mobicip for a rundown on 7 apps you should know...It is a tricky world out there, especially for parents trying to ensure that their children do not fall prey to online abuse and fake news. While it might be futile to try and tame the big bad<img src="http://static.wixstatic.com/media/f6bccd_13bd961f68ab480e862d7ca7aa01562a%7Emv2.jpg"/>]]></description><dc:creator>Suren Ramasubbu, CEO, Mobicip.com</dc:creator><link>https://www.cyberwise.org/single-post/2019/04/02/Parents-7-Apps-You-Should-Know</link><guid>https://www.cyberwise.org/single-post/2019/04/02/Parents-7-Apps-You-Should-Know</guid><pubDate>Mon, 08 Apr 2019 14:30:00 +0000</pubDate><content:encoded><![CDATA[<div><div>EDITORS NOTE:</div><div>While we believe no app is inherently &quot;good&quot; or &quot;bad&quot; (it's how they are used!), one thing we've learned is this... Parents want to know what apps kids are using and what the potential for danger is on those apps. So we turned to our friends at Mobicip for a rundown on 7 apps you should know...</div><img src="http://static.wixstatic.com/media/f6bccd_13bd961f68ab480e862d7ca7aa01562a~mv2.jpg"/><div>It is a tricky world out there, especially for parents trying to ensure that their children do not fall prey to online abuse and fake news. While it might be futile to try and tame the big bad wolf that is the world wide web, there are a few things you can do to protect your teens from exposing themselves to online dangers. One of these things is knowing about the apps they might be downloading and using, like these:</div><div><a href="https://yubo.live">1. Yubo</a></div><img src="http://static.wixstatic.com/media/f6bccd_273714164b7d43668ce5fc0cc823441d~mv2.jpg"/><div>This app, popularly known as the ‘tinder for teens’, comes with a ‘discover’ section for teenagers who are looking to make new friends. In most cases, when apps make tall claims that their software is ‘strictly’ for children, it is a piece of cake to bypass the age-gate. For example, in the Yubo app it is pretty easy for any very young child or adult to create an account as a 14-year-old, making the age-gate effectively useless. In addition, Yubo also requires location permissions. Just an added risk, for no real reason? In any case, any app that says ‘adults strictly not allowed’ needs no place in your children’s phones!</div><div><a href="https://monkey.cool">2. Monkey</a></div><img src="http://static.wixstatic.com/media/f6bccd_e26b20228128413c93f665f3770b754d~mv2.png"/><div>In this app, users can select common interests and have video discussions with strangers. Once such a user with similar interests is identified, a 15-second video chat is started immediately. For children who, by and large, have poor impulse control, the pressure to get everything out in 15 seconds might prompt them into revealing personal information. The topic of discussion can be anything from ‘parents’ to ‘politics’. Like Yubo, Monkey also requires geolocation permission to be granted. Again, setting the absurdly dangerous nature of the app aside, why does this application need the user’s location for having a discussion?</div><div><a href="https://play.google.com/store/apps/details?id=com.exutech.chacha&amp;hl=en_US">3. Holla</a></div><img src="http://static.wixstatic.com/media/f6bccd_4601db06bcf048fcbc36f42e8fa32a5b~mv2.png"/><div>Although this app is rated 17+ on the App Store and the Play Store, it is, once again, relatively simple to bypass the age-gate. Similar to Monkey, Holla allows users to video chat with strangers about common interests. For an application that ‘promotes’ video interaction and collaboration, we find it baffling that the in-app purchases allow users to choose the sex of the person they want to chat with. According to its terms and conditions, Holla has the right to review and remove any content which is found to be inappropriate. However, the terms also have a clause which mentions that Holla does not review all the content!</div><div><a href="https://play.google.com/store/apps/details?id=com.blendr.mobile&amp;hl=en_US">4. Blendr</a></div><img src="http://static.wixstatic.com/media/f6bccd_293d98dab53d429692f7ec24f6aad5d1~mv2.jpeg"/><div>Blendr is similar to Tinder and uses the same ‘swipe right’ methodology to pair users. The only difference is that Blendr is used more for hook-ups while Tinder is (supposed to be) used for relationships. Blendr also gives users a feed of potential matches which users can browse through and ‘swipe right’ if they like a profile. When someone signs up with the app, the minimum age, by default, starts with 18. However, there is no way in which Blendr can verify whether the information entered is true. As a word of caution, we also suggest uninstalling Tinder from your children’s phones if they have it. Neither Tinder nor Blendr is age-appropriate for teens and that’s something that should be spoken about openly.</div><div><a href="https://afterschoolapp.com">5. After School</a></div><img src="http://static.wixstatic.com/media/f6bccd_cd3284d595a4402abb6f3d4d0c0c047b~mv2.png"/><div>After School is an app which aimed to be a school’s digitized message board. However, students can post messages and content anonymously on the platform. The nature of the content being shared is often that of misguided revenge in the form of leaking naked images of classmates, cyberbullying, and sharing private information of others without consent, or ‘doxing’. The app is said to have fixed their interface with live monitors to ensure that the content is clean, but parents have still reported finding nudes and porn in their children’s feed. </div><div><a href="https://www.kik.com">6. Kik</a></div><img src="http://static.wixstatic.com/media/f6bccd_ccb57eb0e17f4c579e66a871dc7425d0~mv2.png"/><div> Kik is an anonymous chatting app which allows users to join public and private chat groups based on similar interests. (fyi... David Eisenhauer, 18, was sentenced to 50 years in prison for <a href="https://www.cbsnews.com/news/ex-virginia-tech-student-gets-50-years-in-fatal-stabbing-of-girl-13/?_ga=2.212269975.221098780.1551240680-1262367743.1551240680">murdering 13-year-old Nicole Lovell—</a>they met through this app.) Shockingly, even the groups that are marked ‘strictly teen’ are rife with messages asking for nudes! There are also groups full of adults who are willing to pay for nudes, as well. The risks of this app far outweigh the benefits!</div><div><a href="https://play.google.com/store/apps/details?id=com.hideitpro&amp;hl=en_US">7. Hide It Pro</a></div><img src="http://static.wixstatic.com/media/f6bccd_a28a6c6248b0429686e7fc2d3d09e4e5~mv2.png"/><div>Of all the apps listed here, the most harmful one has to be ‘Hide It Pro’. It allows users to disguise their more risqué apps as boring and harmless apps like calculators and alarm clocks. A secret pin or fingerprint unlocks access to the real app. Parents looking to keep an eye on their children’s online activities might not even know what their kids are using! The only way to get around this is for them to open up themselves.</div><div>Parents – this article is not designed to scare you into becoming paranoid or to transform you into sleuths who are always on top of everything their children do. We believe at Mobicip that forewarned is forearmed, when it comes to keeping your children safe online. </div><div>Truth be told, these apps are just the tip of the iceberg. You also need to stay aware of internet trends like the <a href="https://www.mobicip.com/blog/tide-pod-challenge">‘Tide Pod Challenge’</a> and the<a href="https://www.mobicip.com/blog/momo-challenge-latest-suicidal-social-media-game-among-teens">‘MOMO Challenge’.</a>Keep an eye on your children’s online activity, either manually or with the help of <a href="https://www.mobicip.com/?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">app blocking software like Mobicip</a>. With your work cut out for you, it always helps to talk to fellow parents and understand what tools they use to ensure that their children are safe from the world wide web!</div><img src="http://static.wixstatic.com/media/f6bccd_d329c538c79e41eaac8be11d3c844aed~mv2.jpg"/><div>Author:</div><div>Suren, the co-founder and CEO of <a href="https://www.mobicip.com/?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">Mobicip</a>, and a passionate advocate for mobile learning and Internet safety. Suren speaks or hosts panels at conferences and seminars on these topics for parents and educators. He also serves as a consultant for educational technology projects in K-12 schools and school districts. </div><div>Keep in touch with the latest on parenting, technology and education. Subscribe to the <a href="https://us1.list-manage.com/subscribe?u=7e025be256c83c884c6e219f3&amp;id=d79046fb92">Mobicip newsletter</a>. Learn more at <a href="http://www.mobicip.com">www.mobicip.com</a>.</div></div>]]></content:encoded></item><item><title>Kids, Creativity, and Copyright</title><description><![CDATA[Not so long ago, students’ creative work was mostly set down on paper, and sharing it meant taping it to the family refrigerator. Today, students use digital tools to create music and movies, photos, graphics, slide shows, video games, and more. They then share, re-share, and comment on it all via social media. They are both creators and publishers, to a much larger degree than prior generations.In many ways, this is empowering. But it also means that kids need to understand the basic ground<img src="http://static.wixstatic.com/media/f6bccd_3f0d02ee363544c68ffba2ca185e28d4.jpg/v1/fill/w_636%2Ch_422/f6bccd_3f0d02ee363544c68ffba2ca185e28d4.jpg"/>]]></description><dc:creator>Dana Greenspan</dc:creator><link>https://www.cyberwise.org/single-post/2019/04/02/Kids-Creativity-and-Copyright</link><guid>https://www.cyberwise.org/single-post/2019/04/02/Kids-Creativity-and-Copyright</guid><pubDate>Sun, 07 Apr 2019 14:34:00 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_3f0d02ee363544c68ffba2ca185e28d4.jpg"/><div>Not so long ago, students’ creative work was mostly set down on paper, and sharing it meant taping it to the family refrigerator. Today, students use digital tools to create music and movies, photos, graphics, slide shows, video games, and more. They then share, re-share, and comment on it all via social media. They are both creators and publishers, to a much larger degree than prior generations.</div><div>In many ways, this is empowering. But it also means that kids need to understand the basic ground rules around creative work. For example, when is it okay to reuse or share some or all of someone else’s creative work – like if a student wants to use some music for a soundtrack or an image to illustrate a blog post or presentation? And how should students expect others to treat their own work? These are questions of copyright and fair use – which are now important elements of digital literacy and citizenship.</div><img src="http://static.wixstatic.com/media/f6bccd_e4cabe1c87444de291e2021210ba131a~mv2.png"/><div>With that in mind, the folks over at <a href="https://www.copyrightandcreativity.org">Copyright and Creativity</a>have crafted a series of lessons that cover what copyright means for students. Rather than just emphasizing what copyright prohibits, they aim to offer useful and positive information about what copyright allows and encourages, so that students can successfully navigate and rely on copyright in their own roles as creators.</div><div>For educators, there are in-class lesson plans for grades K-12, ready to go and available at C&amp;C’s new website: <a href="https://www.copyrightandcreativity.org">Copyright and Creativity for Ethical Digital Citizens</a>. There’s also a <a href="https://www.copyrightandcreativity.org/professional-development/">professional development course</a>for educators, since teachers themselves often don’t have a full grasp of how copyright operates.</div><div>For students, meanwhile, there’s an additional series of <a href="https://www.copyrightandcreativity.org/high-school/independent-learning-videos/">independent learning videos</a> that walk through many of the key concepts. These videos are intended to supplement and reinforce C&amp;C’s in-class lessons but could serve as a freestanding introduction to the topic as well.</div><div>The good news is, it’s all available for free. If you’re looking to create or flesh out the copyright and fair use components of a program on digital citizenship, information literacy, or student creativity, these resources make it easy.</div><div>TWITTER: @CopyrightCreate</div><div>FACEBOOK: @CopyrightCreate</div><div>YOUTUBE: <a href="https://www.youtube.com/channel/UCMObn372kN0Z3ANk9A7CtuQ">https://www.youtube.com/channel/UCMObn372kN0Z3ANk9A7CtuQ</a></div><iframe src="https://www.youtube.com/embed/GPNWvU_IphU"/><img src="http://static.wixstatic.com/media/f6bccd_ca9f28d0c3ec42fdbb487b0e48ef51bf~mv2.png"/><div>Author:</div><div>Retired from the Ventura County Office of Education as an Educational Technology Specialist, Dana Greenspan now serves as a consultant specializing in student data privacy, copyright and fair use, and education technology planning. She was instrumental in working with CETPA to bring a statewide data privacy registry, the CA Student Privacy Alliance, to all California schools. Currently, Dana is leading the CA roll-out of curriculum and professional development for <a href="http://CopyrightandCreativity.or">CopyrightandCreativity.or</a>g.</div></div>]]></content:encoded></item><item><title>Why Multi-Factor Authentication is Critical for Business Cyber Security</title><description><![CDATA[The digital era is in full swing and it has made the daily lives of those who use tech easier. However, it has also made it much easier for cybercriminals to get your personal information. Multi-factor authentication may be the answer to keeping your personal and business information and data cybercrime secure.This is true for both personal information cyber security, as well as any business cybersecurity or corporate accounts, data, and information you may have on your computer too. Your mobile<img src="http://static.wixstatic.com/media/f6bccd_8831902d45b24f76ae579f7dd40e22bc%7Emv2.jpg"/>]]></description><dc:creator>Steve Barker</dc:creator><link>https://www.cyberwise.org/single-post/2019/04/08/Why-Multi-Factor-Authentication-is-Critical-for-Business-Cyber-Security</link><guid>https://www.cyberwise.org/single-post/2019/04/08/Why-Multi-Factor-Authentication-is-Critical-for-Business-Cyber-Security</guid><pubDate>Sun, 07 Apr 2019 01:53:00 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_8831902d45b24f76ae579f7dd40e22bc~mv2.jpg"/><div>The digital era is in full swing and it has made the daily lives of those who use tech easier. However, it has also made it much easier for cybercriminals to get your personal information. Multi-factor authentication may be the answer to keeping your personal and business information and data cybercrime secure.</div><div>This is true for both <a href="http://www.cyberwise.org/single-post/2019/03/19/6-Ways-To-Protect-Your-Personal-Information-Online">personal information cyber security</a>, as well as any business cybersecurity or corporate accounts, data, and information you may have on your computer too. Your mobile phone is also at risk of being hacked and used to make your life much more challenging.</div><div>Everyone is at Increased Risk for Cybercrime</div><div>In fact, there will be an estimated 5.6 billion mobile subscribers by 2020. And currently 8 out of 10 of those mobile users want to do more banking via their smartphones. The cost of cybercrime is in the billions, and everyone appears to be vulnerable.</div><div>Businesses and corporate offices definitely have <a href="http://www.cyberwise.org/single-post/2018/12/05/The-Complete-Guide-to-Online-Security-During-the-Holiday-Season">online security</a> issues to deal with too. According to reports, 74 percent of businesses are affected by online fraud. And the amount of identities put at risk due to online fraud increased by 23 percent with 500 million people affected.</div><div>This makes keeping taps on cyber security essential. And smartphones are not the only gateway for hackers. A lot of the business cybercrime is happening via the server that business WordPress websites are parked. Working with a professional <a href="https://www.dreamhost.com/wordpress/">WordPress hosting</a> providers is a vital first step. But not all security measures will be effective.</div><div>Heightened Security Efforts are Critical, But Does it Matter?</div><div>Banks have taken the first step in battling the tech savvy criminals that destroy lives using cybercrime. The implementation of chips on bank cards may be a fantastic way to deter and decrease banking fraud and identity theft.</div><div>However, there will be a spike in fraud, identity theft, and cybercrime before the bankcard chip is in full swing. In fact, counterfeit-card fraud will increase to <a href="https://www.bloomberg.com/news/articles/2016-06-17/crooks-rush-to-beat-clock-as-u-s-retailers-switch-to-chip-cards">$4.5 billion in 2016 alone</a>, Julie Conroy, at financial-industry researcher Aite Group told Bloomberg.</div><div>That is a 12.5 percent rise from the previous year. This is an indicator cybercrime is going to take a big hit once the chip is used universally. However, you may still be at <a href="https://www.cnbc.com/2016/05/06/those-new-chip-cards-will-cause-14-billion-in-fraud-by-2020.html">risk after switching to the chip,</a> since mobile banking and transactions will still be commonplace. So how can you, and businesses worldwide keep information, data, and banking information safe?</div><div>Multi-factor Authentication (MFA) Provides a Solution</div><div>Multi-factor authentication (MFA) is possibly the newest and most secure solution to cybercrime. MFA typically<a href="https://www.cnet.com/news/two-factor-authentication-what-you-need-to-know-faq/">combines two or more login/password credentials</a> independent of one another. For example, it may include something you know, something you have, and what the user is, or biometric verification.</div><div>Multifactor authentication is an advanced cybercrime defense system with complex layers cyber criminals will have trouble peeling back to get at your personal information. Things like a physical location of the user may be asked, making a security breach far more challenging.</div><div>In fact, if one piece of the multifactor authentication process is compromised, there are several more in place to keep the cybercrime from happening. Multi-factor <a href="https://searchsecurity.techtarget.com/definition/multifactor-authentication-MFA">authentication includes</a>swiping and entering a pin, entering a one-time password (OTP), downloading a VPN client, scanning a fingerprint, answering a security question, or using a USB hardware token, among others.</div><div>What Should be Top Priority?</div><div>Of course the obvious holds true. Securing both your financial data and personal information at the same time is ideal. However, there is a bit of a difference when examining the loss after a cybercrime.</div><div>For example, many bank and financial institutes simply focus on securing banking assets, rather than the detailed personal information compiled by most corporations. However,<a href="https://www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure">securing your personal information</a> from cybercrime is potentially more important.</div><div>Your personal information is essentially not a number, and therefore it is impossible to quantify it. It is also more long lasting than any financial amount, because your personal identity stays with you for life, whereas money often comes and goes, and insured by banking institutions.</div><div>Your health records are an excellent example of this. If multifactor authentication is not in place, a cybercrime could happen, leaving your personal health information in the wind. To combat this, for example, online health platforms take extra steps to ensure they meet HIPAA compliance and personal information is safe.</div><div>Wrapping Up . . . </div><div>Ensuring you and your business have complete security, it is vital to employ a multifactor authentication system. This will ensure you have the most secure credentials available, because 76 percent of security breaches occurred due to lost, weak, or stolen credentials.</div><div>You and your company simply need to develop a multifactor authentication everyone can use at home and the office. You and your company can use smartphones as “something you have,” a mobile network as “something you know,” and a location as a “real-time” credential.</div><div>Develop an online security plan that fits your needs and is easy to use. This could be a three-stage multifactor authentication system using your smartphone. Don’t let cybercrime ruin your digital era experience, and your identity, . Take the next steps to embrace it.</div></div>]]></content:encoded></item><item><title>Don't Let Technology Stop You from Doing This</title><description><![CDATA[I have wanted to write for the Cyberwise Blog for some time now. I greatly admire their work and as a Parent Coach, I often refer to Diana Graber and her writing to assist parents with the tech challenges they face with their kids. Admittedly, I am no expert on the nuances of keeping our kids safe from the overuse or misuse of technology; but I do know how to build strong relationships between parents and children as a means to keep them safe. So for the purposes of this blog post, I decided to<img src="http://static.wixstatic.com/media/f6bccd_85c0757df6684e0e99436202c834f087%7Emv2.png/v1/fill/w_636%2Ch_465/f6bccd_85c0757df6684e0e99436202c834f087%7Emv2.png"/>]]></description><dc:creator>Mary Wheatley, Inspiredparentcoach.com</dc:creator><link>https://www.cyberwise.org/single-post/2019/04/02/Dont-Let-Technology-Stop-You-from-Chasing-Chickens-in-the-Park</link><guid>https://www.cyberwise.org/single-post/2019/04/02/Dont-Let-Technology-Stop-You-from-Chasing-Chickens-in-the-Park</guid><pubDate>Mon, 01 Apr 2019 14:34:00 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_85c0757df6684e0e99436202c834f087~mv2.png"/><div>I have wanted to write for the Cyberwise Blog for some time now. I greatly admire their work and as a Parent Coach, I often refer to Diana Graber and her writing to assist parents with the tech challenges they face with their kids. </div><div>Admittedly, I am no expert on the nuances of keeping our kids safe from the overuse or misuse of technology; but I do know how to build strong relationships between parents and children as a means to keep them safe. So for the purposes of this blog post, I decided to add an alternate invitation to parents. One not resting in the use of technology at all, but one sitting in the value of physical, joy filled play.</div><img src="http://static.wixstatic.com/media/242229e2404b4161a60a74d8cf3da058.jpg"/><div>Here in Hawaii, I live near a public golf course that many local residents frequent for daily walks. It’s a wonderfully organic park, not overly manicured and home to a fair sized population of wild chickens and roosters.</div><div>Many folks will empty bags of stale bread out onto the parking lot pavement and then watch the feeding frenzy happen, as these chickens are kept fat and happy. Occasionally there is a dog pursuing a stray chicken, most often it’s at the end of the owner’s lead. The only other natural “prey” that these chickens have to be concerned with is children.</div><div>Recently, while walking up at the park, I witnessed a dad with his young family engaging the wild chickens. They were not dumping stale bread for a feeding frenzy; but rather chasing after them. The young daughter around the age of 6, and her two younger brothers, around 5 and 3 were running, chasing and screaming in delight while in active pursuit of chickens. The dad stood off in the distance watching the kids burn off some energy and gave them plenty of space to do so. (My first thought at this scene was quite maternal. I thought the kids were likely to get Ukus if they caught one of the chickens. Uku is the Hawaiian word for jumping flea or lice). It took me a minute to process the beauty of what I had just witnessed and I continued on my walk with a smile on my face, reflecting on how much fun they were all having. As I was finishing my walk I had to circle back to the family to exit the park. This time the scene had shifted a bit and the kids were standing off to the side, as the dad was now in hot pursuit of the chickens himself. The kids were wild with delight as they cheered him on. He soon disappeared into the cavernous bushes where the fowl had now retreated, and the kids ran screaming after him. </div><img src="http://static.wixstatic.com/media/f6bccd_e53c346f61684984bc9447673d2ff447~mv2_d_1280_1920_s_2.jpg"/><div>The chicken population was in an uproar; they were clucking up a storm and the roosters were crowing as if their world was coming to a swift end. The kid’s laughter was intoxicating and I left the park with an even bigger grin on my face as I reflected on how happy that dad had made his kids that afternoon.</div><div>So much of parenting is about meeting deadlines, carrying out tasks, fulfilling obligations and spending time on screens.  When was the last time you “chased chickens in the park” with your kids? Is there an opportunity for simple play in your day that you are missing? Can you put down your social media or step away from your laptop to carve out some playtime for just you and your children. The joy and laughter shared will no doubt carry you all through the inevitable challenges to come and the memories you create will bring smiles for years to come. So I invite you to take stock in your time priorities and look for opportunities to connect with your kids. They may not remember what play you actually engaged in but they will certainly remember how you made them feel… important, valued and loved. No screen can provide this for them or for you!</div><div>Author:</div><img src="http://static.wixstatic.com/media/f6bccd_f2a89ad8de1f497ea28ffd6b38e4fd42~mv2.jpeg"/><div>Mary Wheatley is the founder of <a href="https://inspiredparentcoach.com">Inspired Parent Coach</a>. She coaches parents to become the optimal parent for their children and encourages parents to see parenting as an experience to grow and learn from. Working from the premise that there is great joy and self-discovery in parenting, Mary enjoys co-creating solutions with parents and helps them overcome the immense challenges they face in today’s chaotic world.</div><div>Creative by nature, she began her “encore” career after 30 years in the design field. She is a Graduate of Seattle Pacific University’s accredited Graduate program for Parent Coaching and is a certified Parent Coach. Mary and her husband live in Hawaii; where her two now young adult daughters were born and raised. You may learn more about her services by visiting <a href="https://inspiredparentcoach.com">inspiredparentcoach.com</a></div><div>You can also follow Mary on Facebook.</div></div>]]></content:encoded></item><item><title>6 Ways To Protect Your Personal Information Online</title><description><![CDATA[Keeping personal information safe from online hackers is a universal concern. Virtually half the world’s population have an online presence and, of course, private information is being stored in online platforms. So online security is very pertinent today. Thankfully, there are measures you can take to protect your personal information online and stay secure. Here are six of them:1. Use Unpredictable PasswordsYour password is your gatekeeper and the ultimate security guard to your online<img src="http://static.wixstatic.com/media/f6bccd_4474f187f6164f9d9422b076babfbe9c.png/v1/fill/w_376%2Ch_305/f6bccd_4474f187f6164f9d9422b076babfbe9c.png"/>]]></description><dc:creator>Annabelle Short</dc:creator><link>https://www.cyberwise.org/single-post/2019/03/19/6-Ways-To-Protect-Your-Personal-Information-Online</link><guid>https://www.cyberwise.org/single-post/2019/03/19/6-Ways-To-Protect-Your-Personal-Information-Online</guid><pubDate>Wed, 20 Mar 2019 00:30:52 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_4474f187f6164f9d9422b076babfbe9c.png"/><div>Keeping personal information safe from online hackers is a universal concern. Virtually half the world’s population have an online presence and, of course, private information is being stored in online platforms. So online security is very pertinent today. Thankfully, there are measures you can take to protect your personal information online and stay secure. Here are six of them:</div><div>1. Use Unpredictable Passwords</div><div>Your password is your gatekeeper and the ultimate security guard to your online information. If you use weak, predictable passwords, you will leave your online information to the mercy of intruders and cybercriminals.</div><div>To make your password complex and unpredictable, you need to include letters, numbers, signs, and symbols. With letters, make them a blend of upper and lowercase. No matter where you use a password—your email, social media accounts, private home network, or personal computer— make every password complex and give hackers a hard nut to crack.</div><div>2. Always Remember To Back Up Your Data</div><div>Even with a security software running on your personal computer, it is still vulnerable to a dangerous attack by malware and ransomware. So back up all your data as often as you can (whether you back up every week or month, don’t throw all your data into just one basket). If a hacker or malware strikes without warning, you will need your backed up files.</div><div>3. Turn On Your Browser’s “Incognito Mode”</div><div>This is called private browsing. When your browser is set on incognito mode, your browsing history is wiped as soon as you’re done. This includes your cookies and bookmarks. Sometimes you might be careless and leave your computer awake while you go to sleep and someone could start poking into the sites you've visited. Some of these sites contain very confidential data about you. In addition, companies running online advertisements are on regular surveillance, keeping track of all the sites you visit, your social networks and more, so they can serve you ads you didn’t ask for.</div><div>You can also use a Virtual Private Network (VPN) to surf the web. A VPN helps you surf the web in a ghost-like mode without being detected.</div><div>4. Stop Clicking On Random Links</div><div>It’s common to find links and attachments pop up every now and then when surfing the net. Some of them are legitimate ads while some are baits set by hackers and cyber fraudsters.</div><div>If you fall into the trap of clicking, others might gain access to your private information. Always be careful, in fact be paranoid, about clicking! Check the URL of sites on Google and find out about them. Be suspicious, check for errors, scrutinize properly, don’t just click because links are enticing.</div><div>Better yet, just avoid them entirely.</div><div>5. Always Be on the Look Out For Unsecured Sites </div><div>Every link to a website or the website itself comes with either the prefix “Http” or “Https.” The “s” at the end of the “Http” stands for secure, meaning the site is safe for any financial transactions.</div><div>You can afford to overlook this if you are just surfing the web, but you can’t afford to ignore this prefix if you are on a site that asks you to make payments using your credit card details. It’s highly risky. You can always click on the VeriSign to check if the site’s <a href="http://www.homesecurityheroes.com/identity-guard-vs-lifelock/">identity is genuine.</a></div><div>6. Update Your Passwords</div><div>Changing passwords often reduces the risk of your private information being tampered with by cybercriminals. This might be tedious, but don’t choose convenience at the expense of your security. </div><div>If you’ve been careless about the way you’ve been divulging your personal details online and on social media, changing your passwords is the best way to stay secure. This is why Google always recommends that you change your password when you suspect any suspicious activity is going on in your account.</div><div>Conclusion</div><div>Your private information online is always vulnerable to attack. It is time you get involved with the security measures available to protect your personal data. These tips will provide you with a head start and help you stay secure.</div><div>DON'T FORGET TO VISIT OUR ONLINE SECURITY HUB</div><img src="http://static.wixstatic.com/media/f6bccd_73b43d5d933146a5be71b4b197888cef~mv2.jpg"/><div>Annabelle Carter Short is a mother, blogger and a lifelong techy. Writing about healthier lifestyles, safety online as well as about her various hobbies she strives to bring awareness to all the topics that can help others.</div></div>]]></content:encoded></item><item><title>3 Things Scarier Than &quot;Momo&quot;</title><description><![CDATA[The “Momo Challenge,” it turns out, was a huge viral hoax spawned on social media, spread by news organizations, stoked by schools and community organizations, and gobbled up by freaked out parents. To date, there have been no credible reports of a bugged-eyed monster instructing kids to complete increasingly dangerous tasks via WhatsApp, YouTube, or any other social media network. Albeit creepy, “Momo” is simply a sculpture created by artist Keisuke Aisawa for a Japanese special-effects company<img src="http://static.wixstatic.com/media/f6bccd_6d46ff349d824029a6f9cb8f4bde6abb%7Emv2_d_1920_1434_s_2.jpg/v1/fill/w_647%2Ch_483/f6bccd_6d46ff349d824029a6f9cb8f4bde6abb%7Emv2_d_1920_1434_s_2.jpg"/>]]></description><dc:creator>Diana Graber</dc:creator><link>https://www.cyberwise.org/single-post/2019/03/05/3-Things-Scarier-Than-Momo</link><guid>https://www.cyberwise.org/single-post/2019/03/05/3-Things-Scarier-Than-Momo</guid><pubDate>Tue, 05 Mar 2019 17:21:22 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_6d46ff349d824029a6f9cb8f4bde6abb~mv2_d_1920_1434_s_2.jpg"/><img src="http://static.wixstatic.com/media/f6bccd_4203cb3c15c2499593b69d87a8c8c9ba~mv2.jpeg"/><div>The “Momo Challenge,” it turns out, was a <a href="https://www.vox.com/2019/3/3/18248783/momo-challenge-hoax-explained">huge viral hoax</a> spawned on social media, spread by news organizations, stoked by schools and community organizations, and gobbled up by freaked out parents. To date, there have been <a href="https://www.theguardian.com/technology/2019/feb/28/viral-momo-challenge-is-a-malicious-hoax-say-charities">no credible reports</a> of a bugged-eyed monster instructing kids to complete increasingly dangerous tasks via WhatsApp, YouTube, or any other social media network. Albeit creepy, “Momo” is simply a sculpture created by artist Keisuke Aisawa for a Japanese special-effects company called Link Factory. As of last Friday, parents everywhere were advised to breathe a huge sigh of relief and go back about their business.</div><div>But maybe not so fast.</div><div>While the media and parents were transfixed by the “Momo”-scare, three very real and arguably scarier Internet dangers flew entirely under the radar last week.</div><div>Soft Porn and Other Problems on YouTube.</div><img src="http://static.wixstatic.com/media/f6bccd_096bf94c7f564be48a9e7f847f4e5f96~mv2.png"/><div>A former Yo<div>uTube content creator by the name of Matt Watson posted a <a href="https://www.theguardian.com/technology/2019/feb/28/viral-momo-challenge-is-a-malicious-hoax-say-charities">video on Reddit</a> that exposed a “wormhole into a softcore pedophile ring” on the video-sharing site. According to Watson, with just a few clicks, users could easily locate videos of children that were laden with provocative and inappropriate comments. Some comments even timestamped certain parts of the video that sexualized minors and a network of pedophiles were communicating with one another via these comment streams. Some prominent YouTube advertisers, like Epic Games (the makers of Fortnite), quickly pulled their ads from the site. The video giant, to its credit, took swift action—disabling the comments from “tens of millions of videos that could be subject to predatory behavior.” It also <a href="https://www.techspot.com/news/78979-youtube-disables-comments-videos-featuring-kids.html">announced</a> it would disable any future comments on videos featuring children and strengthen algorithms that would detect inappropriate content. </div></div><div>And as if that were not enough bad news for YouTube, a parenting blog called <a href="http://pediamom.com">pediamom.com</a>, and later the Washington Post, reported that <a href="https://arstechnica.com/science/2019/02/youtube-kids-cartoons-include-tips-for-committing-suicide-docs-warn/">instructions on how to commit suicide</a> were spliced smack into the middle of a cartoon on YouTube Kids. Yes you read that right. This scare, which appears to be legitimate, underscores that young children should not be watching anything online unsupervised.</div><img src="http://static.wixstatic.com/media/f6bccd_e32e84a8695b4dbf8a4abe67754f77b0~mv2.png"/><div>TikTok’s Record Fine for Violating the Child Online Privacy Protection Act (COPPA).</div><div>The popular app, formerly known as Musical.ly, got caught red-handed for collecting the personal information of users under the age of 13 (COPPA requires that apps and websites get parental approval for users under 13). It has agreed to pay a whopping fine of <a href="https://www.cnn.com/2019/02/28/tech/tiktok-ftc-fine-children/index.html">$5.7 million</a>. This app is beloved by kids, especially young ones, because they can make and share music videos that they dance and sing along to. In order to comply with COPPA, TikTok will now require users to enter their birthdate if they want to use the app (are you, like me, wondering why this was not already a requirement?). This means that children under 13 will have to figure out how to make themselves appear to be at least 13 years of age. But don’t worry about them. <a href="https://www.statista.com/statistics/250176/social-network-usage-of-us-teens-and-young-adults-by-age-group/">Millions of kids</a> have had plenty of practice doing this already on Instagram and SnapChat. Today's kids don't seem to have a problem with simple math. But telling the truth online? That's a problem.</div><div>THE Scariest Thing of All?</div><div>Of all the scary online events of last week, this one should leave us shaking in our boots: </div><div>Our concerning inability to detect online misinformation and our eagerness to share it. </div><div>Everyone—media outlets (large and small), schools, community organizations, and parent groups—got caught up on the “Momo” frenzy without first taking a moment to carefully question and analyze sources of information. Worse, by sharing news of the scare so quickly and remarkably proficiently, we gave “Momo” the legs she needed. This week it is nearly impossible to find a kid who hasn’t seen or heard about “Momo.” Undoubtedly, many of these kids are now sharing their own “Momo”-inspired memes and posts online, thanks entirely to us, and that’s a crying shame.</div><div>Let’s not forget…the Internet offers tremendous benefits: unparalleled access to information, connection to friends and family, and access to educational opportunities, just for starters. But, as last week showed us, it is still fraught with problems. Young kids left alone with their devices are not well-equipped to enjoy the positives and avoid the negatives. They need our help. Parents must know what their offspring are doing online so they can help them navigate the online world safely and wisely.</div><div>And we could ALL use some <a href="http://www.cybercivics.com">media literacy lessons.</a></div><div>Diana Graber is the author of <a href="http://bit.ly/raisinghumansamazon">“Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology”</a> (HarperCollins Leadership) and is the founder of <a href="http://www.cybercivics.com">Cyber Civics.com</a> and <a href="http://www.cyberwise.org">Cyberwise.org,</a> organizations that advocate for digital literacy for kids and adults. She resides in Southern California.</div></div>]]></content:encoded></item><item><title>YouTube Celebrities Are The New Role Models for Kids</title><description><![CDATA[YouTube stars have become celebrities to young audience and the content produced by these stars are consumed by kids and have a powerful hold over them. Recently, a seven-year-old YouTube star named Ryan became a toy tycoon after catching the attention of the world’s largest retailer Walmart earlier this year. His namesake toy line “Ryan’s World” is one of the season’s biggest sellers, according to Brad Bedwell, a senior buyer in toys for Walmart."[My nephew] exclaimed ‘Combo Panda!’ And I was<img src="http://static.wixstatic.com/media/f6bccd_489fe4a61d8a485c89b206953b1cdefe%7Emv2.png/v1/fill/w_647%2Ch_381/f6bccd_489fe4a61d8a485c89b206953b1cdefe%7Emv2.png"/>]]></description><dc:creator>Anitha, Mobicip.com</dc:creator><link>https://www.cyberwise.org/single-post/2019/02/26/YouTube-Celebrities-Are-The-New-Role-Models-for-Kids</link><guid>https://www.cyberwise.org/single-post/2019/02/26/YouTube-Celebrities-Are-The-New-Role-Models-for-Kids</guid><pubDate>Tue, 26 Feb 2019 18:16:36 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_489fe4a61d8a485c89b206953b1cdefe~mv2.png"/><div>YouTube stars have become celebrities to young audience and the content produced by these stars are consumed by kids and have a powerful hold over them. Recently, a seven-year-old <a href="https://uk.style.yahoo.com/walmart-scores-lucrative-win-7-year-old-millionaire-youtube-star-155505411.html?guccounter=1">YouTube star named Ryan became a toy tycoon</a> after catching the attention of the world’s largest retailer Walmart earlier this year. His namesake toy line “Ryan’s World” is one of the season’s biggest sellers, according to Brad Bedwell, a senior buyer in toys for Walmart.</div><div>&quot;[My nephew] exclaimed ‘Combo Panda!’ And I was like, I can’t believe he recognizes this character. This is a character that’s on Ryan’s YouTube channel and nowhere else. And he recognized it at the drop of a hat”, exclaimed Bedwell.</div><div>YouTube celebrities are very influential in shaping trends, guiding pop culture and impacting opinions. According to Common Sense Media, it's smart to have some awareness of your kids' media idols because plenty are not age-appropriate. For example, the Swedish gamer <a href="https://uk.style.yahoo.com/walmart-scores-lucrative-win-7-year-old-millionaire-youtube-star-155505411.html?guccounter=1">PewDiePie</a> was discovered to have created racists and anti-Semitic videos (which caused YouTube to cancel a reality show he was set to star in). A lot of YouTubers take advantage of the platform's freewheeling nature to swear and make sexist, homophobic, and other offensive remarks.</div><div>It's completely age-appropriate for kids to become devoted to certain media figures. But you want to help your kids find positive role models and being aware that, to your kids, these YouTubers have something meaningful to offer is step one. Stay involved by watching together when you can. Ask questions about the hosts your kids like, what subjects they cover, and most important, what these topics mean to your kids. </div><div>With<a href="https://www.mobicip.com/?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">Mobicip Parental Control's rich reporting feature</a>, keep an eye on the YouTube videos watched both in the app or through a browser and have a meaningful conversation with your kids about what they are watching.</div><div>VISIT OUR YOUTUBE HUB TO LEARN MORE</div><div>Writing credit: Authored by Anitha, a mother of two children with interests in EdTech and a strong advocate for Digital Citizenship.</div></div>]]></content:encoded></item><item><title>Kids Having Trouble Sleeping? Try Cutting Out Electronics</title><description><![CDATA[At 6, our daughter began crying in the middle of the night, making nights hard, just like parenting a baby! How did we stop it? Check out our experiments and find out what worked!As a baby, my daughter was a terrible sleeper. The first 8 months were hell for us as we were running on little to no sleep nearly every night trying to console and feed throughout the night. Even her then “longer” hour stints of sleep, I couldn’t sleep because my body had been trained that she’d go off any minute<img src="http://static.wixstatic.com/media/f6bccd_1ee4a69ca5e24ac0b615ab9030074a7c%7Emv2.png/v1/fill/w_330%2Ch_493/f6bccd_1ee4a69ca5e24ac0b615ab9030074a7c%7Emv2.png"/>]]></description><dc:creator>Ivy Boyter</dc:creator><link>https://www.cyberwise.org/single-post/2019/02/26/Kids-Having-Trouble-Sleeping-Try-Cutting-Out-Electronics</link><guid>https://www.cyberwise.org/single-post/2019/02/26/Kids-Having-Trouble-Sleeping-Try-Cutting-Out-Electronics</guid><pubDate>Tue, 26 Feb 2019 18:14:37 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_1ee4a69ca5e24ac0b615ab9030074a7c~mv2.png"/><div>At 6, our daughter began crying in the middle of the night, making nights hard, just like parenting a baby! How did we stop it? Check out our experiments and find out what worked!</div><div>As a baby, my daughter was a terrible sleeper. The first 8 months were hell for us as we were running on little to no sleep nearly every night trying to console and feed throughout the night. Even her then “longer” hour stints of sleep, I couldn’t sleep because my body had been trained that she’d go off any minute anyway.</div><div>Then, we figured out she was intolerant of dairy and soy. We made the switch from breastfeeding to hypoallergenic formula and in a few short weeks, she was <a href="https://www.sahmplus.com/10-tips-get-baby-to-sleep/">sleeping through the night</a>. She’s now 7 and up until about the age of 6, she continued to be a 10- to 12-hour a night sleeper. I’d say I considered myself lucky, but it was a lot of work getting to that point. Still, it was really nice putting her down to bed around 6:30 or 7 pm and not hearing from her again until morning.</div><div>But, sometime before she turned 7, we went through a few weeks where she’s wake up crying in the middle of the night.</div><div>Every. Damned. Night.</div><div>Just as we’d settle into bed for the night, she’d wail. If she didn’t interrupt our final show at the end of the night, she was interrupting our sleep within the first hour.</div><div>As if that weren’t bad enough, you could go in her room and she’d be sitting straight up looking around as though she’s totally coherent. But, when you started to ask what’s wrong, she’d mumble or babble and you’d realize she wasn’t really awake.</div><div>If you had the audacity to ask her to lay back down to get some sleep, she’d huff and throw her head into her pillow as if throwing a tantrum for having to do something she didn’t want to do.</div><div>We had to find out how to get the crying in the middle of the night to stop. It took us weeks and trying several things to find something that worked for us.</div><div>THINGS WE TRIED TO END OUR CHILD’S CRYING IN THE MIDDLE OF THE NIGHT</div><div>I’m not one for seeking medical advice or prescriptions unless I’ve research and tested things at home and come up without answers or an improvement. When it came time to put a stop to our 7 year old crying in the middle of the night, I approached it the same way I do everything else. Try to add or eliminate things that make sense before seeking medical treatment.</div><div>MELATONIN</div><div>To stop kids crying in the middle of the night, we tried kids melatonin You may be wondering<a href="https://www.healthline.com/nutrition/melatonin-for-kids">is melatonin safe for kids?</a> The truth is, we’re not exactly sure, but we’d been given the okay by her pediatrician, but we were also instructed to wean her off and not use it long-term.</div><div>Melatonin is designed to help one fall asleep faster and stay asleep. And, while your body naturally produces melatonin, I don’t believe we should rely on a pill just because it mimics our bodies’ natural hormones unless we medically have to.</div><div>So, we tried melatonin at night again, but we only used melatonin specifically designed for kids (<a href="https://www.healthline.com/nutrition/melatonin-for-kids">this is the one we rely on</a>). We cut the low-dose melatonin in half (or quarters), because that makes me feel better.</div><div>DID IT WORK?</div><div>Not really. We’ve found melatonin useful in situations where the kids can’t shut off their brains (like when we’re on travel), but that at home, it’s no more effective than if she’d spent the day playing.</div><div>TURN DOWN THE MUSIC</div><div>We let our daughter listen to music at night, but she’s always done that. It seems, however, she’d been increasing the volume at night, so we instilled a rule that whatever we set the volume at for the <a href="https://www.sahmplus.com/travel/">Google Home</a> in her room, it had to be left there. If she messed with the volume, we were taking it out of the room. Our assumption was that something in a song would wake her from sleep, so a quieter setting would likely help.</div><div>DID IT WORK?</div><div>Nope. There was no change in the regularity of waking in the middle of the night crying.</div><div>READ BEFORE SLEEP</div><div>While we always read to her before bed, we wondered if having her read to herself would help her body and mind settle down. I know that reading at night makes my eyes heavy, so I figured we’d let her try it too.</div><div>DID IT WORK?</div><div>Not at all. While it did help keep her in bed not running around playing, it didn’t improve the quality of her sleep and she continued crying in the middle of the night, she at least stayed in bed and relaxed. Way better than her running around the room or sneaking into the bathroom to clean because she “wasn’t tired.”</div><div>ELECTRONICS CUT OFF TIME</div><div>This final attempt came with tons of rejection from the family. My husband knew our daughter was going to cry when I told her there would be no electronics after dinner. Plus, it meant we would have to entertain the kids a little more, whether or not we were feeling like it.</div><div>My daughter, of course, rejected the idea because she was straight up hooked on YouTube videos.</div><div>Knowing what we know about the <a href="https://www.sleep.org/articles/ways-technology-affects-sleep/">ways technology affects sleep,</a> I stood my ground. I figured, the worst that could happen was I’d have upset everyone for something that didn’t work. But, I was desperate for my daughter to stop crying in the middle of the night!</div><div>DID IT WORK?</div><div>YES! From the very first night and every night thereafter, our 7 year old hasn’t been waking up crying in the middle of the night.</div><img src="http://static.wixstatic.com/media/f6bccd_7f2608e399a046afa0292a4ea5d96cf1~mv2.png"/><div>Author: Ivy Boyter</div><div>Ivy is a wife and stay at home mom to 2 amazing (<a href="https://www.sahmplus.com/what-is-high-needs-baby-not-every-baby/">high-need</a>) kids. I spend my days trying to figure out how to do this parenting thing and still get everything done. But, I’m more than just a mom. I’m here to share my secrets for women who are looking for ways to give time to themselves, their husbands, and their kids. <a href="https://www.sahmplus.com/what-is-high-needs-baby-not-every-baby/">Click here to learn more about SAHM</a>, plus…</div></div>]]></content:encoded></item><item><title>Engage in Random Acts of Online Kindness</title><description><![CDATA[It’s more important than ever to teach empathy from the very beginning, because our kids are going to need it.—Melinda GatesNearly every expert I spoke with while writing “Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology,” told me that if they could equip kids with one digital superpower, it would be empathy. Empathy is the ability to put oneself in another’s shoes. It encompasses perspective taking, and it allows you to feel what another is feeling.<img src="http://static.wixstatic.com/media/1953aefcf25b4f6f950342297eb09b5b.jpg/v1/fill/w_291%2Ch_318/1953aefcf25b4f6f950342297eb09b5b.jpg"/>]]></description><dc:creator>Diana Graber</dc:creator><link>https://www.cyberwise.org/single-post/2019/02/12/Engage-in-Random-Acts-of-Online-Kindness</link><guid>https://www.cyberwise.org/single-post/2019/02/12/Engage-in-Random-Acts-of-Online-Kindness</guid><pubDate>Wed, 13 Feb 2019 00:54:30 +0000</pubDate><content:encoded><![CDATA[<div><div>It’s more important than ever to teach empathy from the very beginning, </div><div>because our kids are going to need it.</div><div>—Melinda Gates</div><img src="http://static.wixstatic.com/media/1953aefcf25b4f6f950342297eb09b5b.jpg"/><div>Nearly every expert I spoke with while writing <a href="https://www.amazon.com/UnSelfie-Empathetic-Succeed-All-About-Me-World/dp/1501110071">“Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology</a>,” told me that if they could equip kids with one digital superpower, it would be empathy. </div><div>Empathy is the ability to put oneself in another’s shoes. It encompasses perspective taking, and it allows you to feel what another is feeling. Educational psychologist Michele Borba, author of an indispensable parent’s guide to raising kind kids called <a href="https://www.amazon.com/UnSelfie-Empathetic-Succeed-All-About-Me-World/dp/1501110071">UnSelfie: Why Empathetic Kids Succeed in Our All-About-Me World,</a> explains that empathy is “the cornerstone for becoming a happy, well-adjusted, successful adult. It makes our children more likable, more employable, more resilient, better leaders, more conscience-driven, and increases their lifespans.”</div><div>Unfortunately, empathy is on the decline. Between 1979 and 2009, American college students’ scores on two measures of empathy dropped a whopping 40 percent, with the steepest decline occurring from 2000 onward. During the same time period, narcissism was shown to be on the rise.</div><div>I was curious to learn if empathy has continued to decline since 2009, the last year of this study, so I asked Borba. She told me that it has “continued to free-fall and seems to be falling faster in hyper-competitive countries and ones that are more technologically plugged-in as well.”</div><div>The researchers who conducted the empathy-dip study, Sara Konrath and Edward O’Brien from the University of Michigan Institute for Social Research, also believe technology may contribute to empathy’s decline. According to O’Brien, “The ease of having ‘friends’ online might make people more likely to just tune out when they don’t feel like responding to others’ problems, a behavior that could carry over offline.” The pair also noted that the generation of college students they studied grew up with video games, and a growing body of research is establishing that “exposure to violent media numbs people to the pain of others.”</div><div> Even so, Borba warned me to be careful about placing empathy’s plunge entirely on technology’s shoulders. “But, that said, technology is definitely playing a role because the gateway to empathy is emotional literacy.” Emotional literacy, she explained, is the ability to “read somebody’s face or body language and understand that he looks upset or he looks sad. Empathy is feeling with another person, and you can’t feel with another person unless you can read or understand that person’s emotions.”</div><div> Like ethical thinking, the capacity for empathy grows as the child grows. When an infant feels attachment to a parent or loving caregiver, the seeds of empathy are sown. Little by little, Borba explains, “as egocentricity fades, and social-centricity comes up, kids become more aware of others and are slowly able to cognitively step into another person’s shoes.” But children need experiences, nurturing, and deliberate attempts from adults to help these seeds grow, she says. “While children are hardwired for empathy, there are lots of things you can do to cultivate it. Intentionality, particularly in a plugged-in, trophy-driven world, is crucial.”</div><div>Growing Empathy </div><img src="http://static.wixstatic.com/media/10298514ff5b4c75a885a62baa3f4578.jpg"/><div>Like almost everything related to technology, a direct correlation hasn’t been drawn between empathy’s decline and technology. But you don’t have to be a rocket scientist with a big research budget to figure out that digital interaction has some serious deficits. Lack of eye contact, facial expression, human touch, and voice intonation are a few. Learning how to read and understand these human cues are empathy-building experiences. In the absence of such practice, it stands to reason that kids might end up with an empathy deficit. </div><div>Don’t believe me? Fair enough. Here’s a study to prove it. </div><div>In 2014, scientists from UCLA studied two groups of sixth graders from a Southern California public school. One group spent five days at a nature camp just outside of Los Angeles, which didn’t allow students to use digital devices. The other group of students used their digital devices as usual. After only five days at camp, the non-tech-using kids showed significant improvement in their abilities to read facial expressions and nonverbal cues, as compared to the other group of kids. Which means that those kids—the digital device–using ones—were less adept at reading human emotions. </div><div>According to the study’s lead author, Yalda Uhls, “If you’re not practicing face-to-face communication, you could be losing important social skills.”</div><div>A Cyber Civics Moment of Empathy</div><div>You can help your children grow empathy! </div><div> of the many Cyber Civics moments offered in my book. These at-home activities that families can do together to help kids build a healthy, happy, and positive relationship with technology. This one, called —seemed perfect for Valentine's Day. It can help your children practice their empathy skills. Enjoy!</div><div>Excerpted from <a href="https://www.amazon.com/UnSelfie-Empathetic-Succeed-All-About-Me-World/dp/1501110071">“Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology</a>,” all citations are in the book.</div><img src="http://static.wixstatic.com/media/f6bccd_c7575b23fcf7481aae43fff9d1f5a082~mv2.png"/></div>]]></content:encoded></item><item><title>6 Teen &quot;Hookup&quot; Apps Parents Should Know About</title><description><![CDATA[Flirting, dating (and, yes, even "hooking up") are a lot easier to do in the digital age. Today, downloading a dating app, like the most well-known one--Tinder--takes no more than a moment, and suddenly you have a whole world of possible "dates" at your fingertips. Many of these dating apps have found an eager and enthusiastic user base amongst teens, with new apps popping up regularly.ONLINE DATING AND RELATIONSHIPS: HOW TO KEEP KIDS SAFEWhile apprehensive about online dangers in general, U.S.<img src="http://static.wixstatic.com/media/f6bccd_949f9ccbf94949c49a0acc475faf85b4%7Emv2.jpg"/>]]></description><dc:creator>Cynthia Lieberman</dc:creator><link>https://www.cyberwise.org/single-post/2017/02/21/6-TEEN-HOOKUP-APPS-PARENTS-SHOULD-KNOW-ABOUT</link><guid>https://www.cyberwise.org/single-post/2017/02/21/6-TEEN-HOOKUP-APPS-PARENTS-SHOULD-KNOW-ABOUT</guid><pubDate>Tue, 12 Feb 2019 19:40:00 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_949f9ccbf94949c49a0acc475faf85b4~mv2.jpg"/><div>Flirting, dating (and, yes, even &quot;hooking up&quot;) are a lot easier to do in the digital age. Today, downloading a dating app, like the most well-known one--<a href="https://en.wikipedia.org/wiki/Tinder_(app)">Tinder</a>--takes no more than a moment, and suddenly you have a whole world of possible &quot;dates&quot; at your fingertips. Many of these dating apps have found an eager and enthusiastic user base amongst teens, with new apps popping up regularly.</div><div>ONLINE DATING AND RELATIONSHIPS: HOW TO KEEP KIDS SAFE</div><div>While apprehensive about online dangers in general, U.S. parents are also becoming increasingly aware and concerned about the kinds of digital relationships their teens are having. According to <a href="http://pewrsr.ch/1E6RQLr">Pew Research</a>:</div><div>Aided by the convenience and constant access provided by mobile devices, especially smartphones, 92% of teens report going online daily — including 24% who say they go online “almost constantly. In fact, the number of 18-24 year-olds college age students using online or mobile dating apps has increased nearly fourfold over the past three years (from 5% to 22%), and 15% of adults use consider them a legitimate way to meet someone.</div><div>By the time most of kids are teens, they’re practically experts at forging digital friendships, sometimes making the progression to online dating a natural next step. As a result, more young people use mobile and digital dating apps than any other age group.</div><div><a href="https://www.al.com/living/index.ssf/2016/01/teen_dating_in_the_digital_age.html">ONE IN FOUR TEENS</a>HAVE DATED OR HOOKED UP WITH SOMEONE THEY FIRST MET ONLINE</div><div>For today's teens, social media and modern tech play a huge role in how teens are meeting, communicating and breaking up. Mobile devices provide freedom for teens to test boundaries, meet people outside of their peer group and attempt to feel and appear more mature—often without a parent peering over the shoulder.</div><img src="http://static.wixstatic.com/media/f6bccd_bf802e97ab8f446d84ffbecd64146c3d~mv2.jpg"/><div>This means parents need to keep an open line of communication with their kids about digital friendships and later, romance.</div><div>&quot;One of the biggest issues I see over and over as a lawyer,” says <a href="https://streaming.lawyer">Streaming Lawyer</a>, Mitch Jackson, “is when it comes to teens engaging with each other and developing new ‘digital relationships,’ this ease of use and perceived social acceptance causes many teens to fail to appreciate the potential safety risks and long-term privacy consequences as they relate to their digital interactions and dating efforts. Lives are being turned upside down with a quick tap or swipe of a finger.&quot;</div><div>A teen’s privacy isn’t the only worry, though. Broadcasting their physical location to strangers is a concern too.</div><div>Online relationship and sexting expert, <div><a href="http://drmichelledrouin.com">Dr. Michelle Drouin</a>,</div> warns, “As with all online daters, teen online daters need to be very cautious when chatting or meeting with people they don’t know. I would be especially wary of my teen using any apps that use geo-location to make matches.”</div><img src="http://static.wixstatic.com/media/f6bccd_47693574431c44b88e4c2aecb7f4a27f~mv2.png"/><div>Here’s why: In 2012, in <a href="http://readwrite.com/2012/06/15/skout-disaster-reveals-grim-flaws-in-teen-social-networks/">three separate incidents</a> underage teens connected with predators online via Skout, a location-based “flirting” app. All three cases ended with alleged sexual assault or rape at the hands of men who were masquerading as teens to lure potential victims. To Skout’s credit, they briefly suspended operations in order to tighten safety protocols. As result, a teen's exact location is no longer revealed on the app, only a general region.</div><div>“Compared to some social media targeting teens, Skout is more PG-13 than NC-17,” says one parent, “probably due to increased moderation. Still, it's not perfectly safe, and parents and teens might want to communicate about the potential dangers of any meet-up app.”</div><img src="http://static.wixstatic.com/media/f6bccd_14a98c3403044434a5735847c8410878~mv2.jpg"/><div>PARENTAL MONITORING</div><div>While geo-location software can open the door to dangers like the</div><div>ones  described above, they can</div><div>also be useful for parents seeking to stay more closely connected with their digital kids. Parental monitoring tools that use geo-location can help shield kids from possible online problems such as cyberbullying, sexting and predators.</div><div>For example,<a href="http://bit.ly/CWTeenHookupApps">Mobicip</a> is a state-of-the-art parental control filtering app that works on all devices, including PCs, mobile phones and tablets, and includes geo-fencing software plus other great features. It:</div><div>Manages and blocks specific apps kids use, including social media and online dating sites.Offers an easy-to-use interface that allows parents to tailor desired device usage for each child by age.Lets parents schedule and manage when and how much time kids spend online.Alerts parents to offensive content and language.</div><div>_______________________________________________________________________________________________________</div><div>View and/or  the infograph to learn about six of today’s most popular “Dating Apps.”</div><img src="http://static.wixstatic.com/media/f6bccd_215b92b2d7b64cc2bdf7ee2add92d8fe~mv2.png"/><div> This blog post was originally published 2-17-17.</div><img src="http://static.wixstatic.com/media/f6bccd_1d8d835ec4ca483eaf12e43c62fd7bad~mv2.jpg"/><div>Cynthia Lieberman co-founder, CyberWise.org and has a graduate degree in Media Psychology and Social Change. She serves as a content marketing and PR consultant for Fortune 500 companies, including major Hollywood studios, Virtual Reality and healthcare, serves on the Board of Directors for the National Association for Media Literacy Education (NAMLE), and teaches Social Media Marketing at UCLA Extension. @liebermanc </div></div>]]></content:encoded></item><item><title>Hooking Your Kids Up with Safe Dating Practices</title><description><![CDATA[Today’s teens have grown up with the Internet, so many of their social structures revolve around social media. Therefore, it should be no surprise that online dating platforms often play a role in their romantic relationships.As the mother of a 13-year-old and 17-year-old, Fielding Graduate University faculty memberand Media Psychologist Dr. Karen Dill-Shackelford understands first-hand that, “Teen dating itself, with or without apps, is never going to be worry or trouble-free, but it’s normal,<img src="http://static.wixstatic.com/media/f6bccd_569b2cdd8cc242dcb33fb0dc2500c8a1%7Emv2.jpg/v1/fill/w_302%2Ch_177/f6bccd_569b2cdd8cc242dcb33fb0dc2500c8a1%7Emv2.jpg"/>]]></description><dc:creator>Cynthia Lieberman, CyberwiseWise.org</dc:creator><link>https://www.cyberwise.org/single-post/2018/02/12/Hooking-Your-Kids-Up-with-Safe-Dating-Practices</link><guid>https://www.cyberwise.org/single-post/2018/02/12/Hooking-Your-Kids-Up-with-Safe-Dating-Practices</guid><pubDate>Sun, 10 Feb 2019 00:15:00 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_569b2cdd8cc242dcb33fb0dc2500c8a1~mv2.jpg"/><div>Today’s teens have grown up with the Internet, so many of their social structures revolve around social media. Therefore, it should be no surprise that online dating platforms often play a role in their romantic relationships.</div><div>As the mother of a 13-year-old and 17-year-old, <div><a href="http://www.fielding.edu/our-programs/school-of-psychology/">Fielding Graduate Universit</a><a href="http://www.fielding.edu/our-programs/school-of-psychology/">y</a></div> faculty member</div><div>and Media Psychologist <a href="http://narrativepower.com">Dr. Karen Dill-Shackelford</a> understands first-hand that, “Teen dating itself, with or without apps, is never going to be worry or trouble-free, but it’s normal, and can be a very healthy, part of teen development.”</div><div>Still, online dating and friending apps can expose teenagers to certain safety risks, such as identity theft, cyberbullying, and the dangers of online predators. That’s why, explains Dr. Dill-Shackelford, “A parent’s best friend and first line of defense is to have good information, and then keep the conversation open with their kids.” </div><div>“Unlike adults on dating apps, teenagers lack essential offline experience in communicating with potential partners,” adds Aleksandra Atanasova, a social media consultant at the <a href="https://www.linkedin.com/company/1809/">European Commission</a> in Brussels and founder of <a href="http://SocialMediaPsychology.eu">SocialMediaPsychology.eu</a>. “Online dating platforms can become a comfort zone for teens who have not started dating in real life, and it can also hamper them developing the soft skills needed for communication. Security and all privacy issues aside,” she continues, “teens need to be made aware that online relationships cannot equal real life ones, and that meeting people in person can sometimes be more challenging than online chatting.”</div><div>So what are some of the best ways for a parent to open up communication with their kids about a delicate topic like online dating? First and foremost, ask kids what they are doing online and then really listen to why they like or don’t like what’s going on there. Dr. Dill-Shackelford recommends you also encourage them to open up by “letting your kids show you how the apps they are using work.”</div><div>Parents must be diligent about staying on top of the latest trends. For starters (and just in time for Valentine’s Day and <a href="https://nrcdv.org/dvam/tdvam">Teen Dating Violence Awareness Month</a>), why not download our latest  infographic, which has just been updated with new (and shocking) information for parents. Other great parenting and online dating tips can be found in our <a href="http://www.cyberwise.org">Cyberwise.org</a> Learning hubs <a href="http://www.cyberwise.org/learning-hubs">here</a>.</div><div>Raising teens has never been easy. But rest assured, however, that the more knowledge both you and your teens are equipped with, the more prepared you'll be if a situation arises, and the better chance they’ll have of developing safe and healthy relationships in the future.</div><div>About Cynthia Lieberman: Cynthia Lieberman is co-Founder, CyberWise.org and owner of Lieberman Communications, a content marketing and PR consultancy firm for Fortune 500 companies. Equipped with a graduate degree in Media Psychology and Social Change, Lieberman is a Board of Director for the National Association for Media Literacy Education (NAMLE). She teaches Social Media Marketing at UCLA Extension and recently served as an Adjunct Professor in Mass Communications at California State University, Northridge.</div><div>This blog post originally ran 2-12-18</div><div>DOWNLOAD THE LATEST &quot;5 TEEN HOOKUP APPS &quot; INFOGRAPHIC </div><img src="http://static.wixstatic.com/media/f6bccd_4f8f41de135547298f42c3b34ce49e9c~mv2.jpg"/></div>]]></content:encoded></item><item><title>#SaferInternetDay: Social Media and Your Family</title><description><![CDATA[Did you know that every minute adds 48 hours of video to YouTube, 3600 photos on Instagram, 3125 photos to Flickr, 10000 tweets and 684478 individual pieces of content on Facebook?Parental Control Software is a powerful way to give parents and caregivers peace of mind through monitoring their children's online activities.Although there is no substitute for communication and education, adults need all the help they can get keeping kids safe online-- that's why we are excited to endorse Mobicip,<img src="http://static.wixstatic.com/media/f6bccd_53dd6525493245a5adf447abb756e364%7Emv2.jpg"/>]]></description><dc:creator>Mobicip Parent Control Software</dc:creator><link>https://www.cyberwise.org/single-post/2019/02/05/SaferInternetDay-Social-Media-and-Your-Family</link><guid>https://www.cyberwise.org/single-post/2019/02/05/SaferInternetDay-Social-Media-and-Your-Family</guid><pubDate>Mon, 04 Feb 2019 20:39:00 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_53dd6525493245a5adf447abb756e364~mv2.jpg"/><div>Did you know that every minute adds 48 hours of video to YouTube, 3600 photos on Instagram, 3125 photos to Flickr, 10000 tweets and 684478 individual pieces of content on Facebook?</div><div>Parental Control Software is a powerful way to give parents and caregivers peace of mind through monitoring their children's online activities.</div><div>Although there is no substitute for communication and education, adults need all the help they can get keeping kids safe online-- that's why we are excited to endorse<a href="http://www.mobicip.com?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">Mobicip</a>, the most effective and easy-to-use parental control software we've found yet! Learn more in our <a href="http://www.cyberwise.org/parental-control-software">Parental Control Software Hub</a>here and download their free downloadable tip sheet on ways to manage &quot;Social Media and Your Family&quot;<a href="https://www.mobicip.com/assets/resources/sid/factsheet_social_media_and_your_family-3bfc40aa303017474f5ab8785fcc02c3acd544bc99bcef4b8ea6925ee9c9d701.pdf?utm_content=bufferd2a91&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer">here!</a></div><div>SOCIAL MEDIA AND YOUR FAMILY via <div><a href="http://www.mobicip.com?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">Mobicip:</a><a href="http://www.mobicip.com?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1"></a></div>Parental Controls designed to protect your family on the Internet, limit screen time, manage apps, and help keep track of their location.</div><img src="http://static.wixstatic.com/media/f6bccd_d5187a28018b4e98ba325bf85bc9d067~mv2.jpg"/></div>]]></content:encoded></item><item><title>Raising Humans in a Digital World: Diana Graber from Cyberwise with Josh Ochs from Smart Social</title><description><![CDATA[Really loved this conversation with Josh Ochs of Smart Social. If you have not already checked out his entire series of podcasts, we highly recommend you head over right now (see links below) and add them to your listening cue! He tackles nearly every topic a digital parent should know about!You can listen to our conversation below.Smart Social Podcast links on: iTunes – Google Play – Stitcher Radio – Spotify – Web Player<img src="http://img.youtube.com/vi/b7TP9NyqGLY/mqdefault.jpg"/>]]></description><dc:creator>Cyberwise</dc:creator><link>https://www.cyberwise.org/single-post/2019/01/29/Raising-Humans-in-a-Digital-World-Diana-Graber-from-Cyberwise-with-Josh-Ochs-from-Smart-Social</link><guid>https://www.cyberwise.org/single-post/2019/01/29/Raising-Humans-in-a-Digital-World-Diana-Graber-from-Cyberwise-with-Josh-Ochs-from-Smart-Social</guid><pubDate>Tue, 29 Jan 2019 23:11:12 +0000</pubDate><content:encoded><![CDATA[<div><iframe src="https://www.youtube.com/embed/b7TP9NyqGLY"/><div>Really loved this conversation with Josh Ochs of <a href="https://smartsocial.com">Smart Social</a>. If you have not already checked out his entire series of podcasts, we highly recommend you head over right now (see links below) and add them to your listening cue! He tackles nearly every topic a digital parent should know about!</div><div>You can listen to our conversation below.</div><div>Smart Social Podcast links on: <a href="https://itunes.apple.com/us/podcast/id1269872857">iTunes</a>– <a href="https://play.google.com/music/listen?u=0#/ps/Ikvg45xcfqi3cz5vxy7vsryf3uq">Google Play</a> – <a href="https://www.stitcher.com/podcast/smartsocialcom/smart-social-podcast?refid=stpr">Stitcher Radio</a> –<a href="https://open.spotify.com/show/7qARbijEjiTHlttMaa2sZd?si=7AUFWl6PSQmBsq8DEjDghw">Spotify</a> – <a href="https://smartsocialpodcast.com">Web Player</a></div><iframe src="//static.usrfiles.com/html/c1255b_4e9efab03f5a376b88a3d2c0aac5e7be.html"/></div>]]></content:encoded></item><item><title>The Problem with Snapchat</title><description><![CDATA[If you have teens at home, they are probably on Snapchat. With Snapchat being relatively new amongst its social media peers, the platform is a tad difficult for an older generation of parents to understand. In fact, most teenagers attribute the long hours they spend on Snapchat to the fact that their parents don’t understand how Snapchat works and therefore are not on the platform!Discover Snapchat's 'Discover' FeatureSnapchat has a feature called ‘Discover’, which shows its users content based<img src="http://static.wixstatic.com/media/f6bccd_8f74ab3597ea46e38c011510736037c4%7Emv2.png/v1/fill/w_225%2Ch_225/f6bccd_8f74ab3597ea46e38c011510736037c4%7Emv2.png"/>]]></description><dc:creator>Anitha, Mobicip.com</dc:creator><link>https://www.cyberwise.org/single-post/2019/01/29/The-Problem-with-Snapchat</link><guid>https://www.cyberwise.org/single-post/2019/01/29/The-Problem-with-Snapchat</guid><pubDate>Tue, 29 Jan 2019 22:17:28 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_8f74ab3597ea46e38c011510736037c4~mv2.png"/><div>If you have teens at home, they are probably on Snapchat. With Snapchat being relatively new amongst its social media peers, the platform is a tad difficult for an older generation of parents to understand. In fact, most teenagers attribute the long hours they spend on Snapchat to the fact that their parents don’t understand how Snapchat works and therefore are not on the platform!</div><div>Discover Snapchat's 'Discover' Feature</div><img src="http://static.wixstatic.com/media/f6bccd_01f65e4efa6b47bea9863073237ce8da~mv2.png"/><div>Snapchat has a feature called ‘Discover’, which shows its users content based on pop culture. Individuals and companies can create channels on ‘Discover’ and put up content to encourage Snapchat users to visit their channel. While the minimum age requirement to join Snapchat is 13, individual channels on Discover age-gate R-rated content.</div><div>The content on Discover ranges from innocent and friendly to vulgar and crass. Despite a lot of the content on Discover being age-gated, meaning you have to be over 18 to access it, a few channels have been known to have removed the age-gate in order to get more users to its channel.</div><div>This means that over 23 million children, who are on Snapchat, could have unmoderated access to such content. What is even more infuriating is that, the uncensored content could be misleading, wrong, potentially harmful or even ‘mature’ content, impacting what naïve readers of the content could be influenced to do.</div><div>Incidentally, it is extremely easy to lie about your age before signing up on Snapchat. It’s a breeze for children below 13 to give a false date of birth, and it’s almost impossible for Snapchat to verify the truth.</div><div>Why would Snapchat potentially expose millions of children to R-rated content? To understand this you need to understand how Snapchat makes money out of its 'free’ service.</div><div>What’s In It for Snapchat?</div><img src="http://static.wixstatic.com/media/f6bccd_6f352cfba2d94782a36d69f96a14dce3~mv2.jpg"/><div>Snapchat makes money from brands and companies willing to advertise their products and services on its platform. And when do companies choose to advertise on a particular platform? When millions of users are actively using it! Therefore, to ensure that users aren’t “bored” and going to look for other social media alternatives, Snapchat brings out new features to keep its audience engaged. Towards this end, Snapchat had previously introduced image filters. </div><div>It has now introduced the 'Discover' feature.</div><div>But this is just half the story.</div><div>In order to encourage content generation, Snapchat had to incentivize the whole process, rewarding channels that have greater traction. And like most online content, virality requires a clickbait headline (and body content that, more often than not, provides little to no value to its readers). In other words, the content is light on the brain.</div><div>What does a company do when it depends upon catchy headlines and has a falling stock price? It goes all out to protect itself and its shareholders. It encourages creators to produce content that is extremely engaging, keeping barriers to access light and flexible. In some cases, morals go out the window in the face of an opportunity for virality. Accountability is no longer of maximum value.</div><div>Vi-ral-i-ty (noun). The tendency of an image, video, or piece of information to be circulated rapidly and widely from one Internet user to another; the quality or fact of being viral.</div><div>By continuing to allow channels to post irresponsibly on a platform where 30% of the users are below 18 years of age and 70% are female, Snapchat has refused to acknowledge its popularity and the impressionability of its minor users. In this day and age, it takes very little for a fad to catch on, and when channels on Discover don’t acknowledge their responsibilities, it only makes matters worse for parents who are trying to protect children from the harms of the Web.</div><div>The solution, it seems, is simple—increase the minimum age required to join Snapchat considerably and enforce age-gates! This would ensure that even its youngest users are mature enough to consume explicit content without getting carried away. However, this measure must be coupled with a strong yet secure verification process which ensures that nobody can lie about their birthdate. To implement such a verification process would require government ID proof to be shared with Snapchat, raising concerns of data breaches. A complicated process indeed!</div><div>Therefore, the real solution goes back to having a good talk with your teens (and maybe using a parental control software like <a href="http://www.mobicip.com?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">Mobicip</a>?).</div><div>What Parents Can Do</div><img src="http://static.wixstatic.com/media/f6bccd_a5a0bf77bab1499a9c379473a2e03d47~mv2.jpg"/><div>Until Snapchat becomes accountable about the content on its platform, we strongly encourage parents to speak out and alert cyber police if they happen upon vulgar content. We also advise you to monitor the social media activities of your children. Open up the channels of communication to ensure that your kids feel free to discuss with you what they come across online.</div><div>Don't Forget to Visit Our Snapchat Hub To Learn More</div><div>Writing credit: Authored by Anitha, a mother of two children with interests in EdTech and a strong advocate for Digital Citizenship.</div></div>]]></content:encoded></item><item><title>Why I Wrote “Raising Humans in a Digital World”</title><description><![CDATA[It's tough deciding what to talk to parents about in a :90 minute presentation. Impossible even. There are so many important topics to cover when it comes to raising digital kids! For example: Screen Time. Certainly this is the topic of the day. Every parent is worried about the amount of time kids spend staring at screens and they want to know what to do. Reputation Management: Parents also hope their kids will go to college or get a job someday. So they want to know how to help their offspring<img src="http://static.wixstatic.com/media/f6bccd_c390ba78d418446ca41b870b9e28a2a3%7Emv2_d_1792_2700_s_2.jpg/v1/fill/w_239%2Ch_360/f6bccd_c390ba78d418446ca41b870b9e28a2a3%7Emv2_d_1792_2700_s_2.jpg"/>]]></description><dc:creator>Diana Graber</dc:creator><link>https://www.cyberwise.org/single-post/2019/01/11/Why-I-Wrote-%E2%80%9CRaising-Humans-in-a-Digital-World%E2%80%9D</link><guid>https://www.cyberwise.org/single-post/2019/01/11/Why-I-Wrote-%E2%80%9CRaising-Humans-in-a-Digital-World%E2%80%9D</guid><pubDate>Sat, 12 Jan 2019 22:08:32 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_c390ba78d418446ca41b870b9e28a2a3~mv2_d_1792_2700_s_2.jpg"/><div>It's tough deciding what to talk to parents about in a :90 minute presentation. Impossible even. There are so many important topics to cover when it comes to raising digital kids! For example:</div><div>Screen Time. Certainly this is the topic of the day. Every parent is worried about the amount of time kids spend staring at screens and they want to know what to do.</div><div>Reputation Management: Parents also hope their kids will go to college or get a job someday. So they want to know how to help their offspring build online reputations that will open doors, not close windows, to future opportunities. </div><div>Cyberbullying and Sexting. Naturally they also want to know how to help their kids avoid big dangers online, like these two.</div><div>Social Media. Snapchat, Instagram, YouTube, Ask.fm, TikTok, and more. The list of social media sites and apps that kids love and parents want to learn about is long (and changes regularly).</div><div>Online Games. This topic deserves a talk of its own. Parents want to know why kids are so “addicted” to games like Fortnite, Minecraft, Roblox, and more.</div><div>Privacy and Personal Information. Parents ask: What should kids keep private online? What do companies, and schools for that matter, do with the personal information they collect?</div><div>Certainly you can see my dilemma.</div><div>This is far too much to cram into a 90-minute presentation. On top of that, most schools and communities don’t have the time or budget to bring in experts to address all of the above. </div><div>So I’m delivering the experts to you.</div><div>While writing <a href="http://www.dianagraber.com">&quot;Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology,&quot;</a> I interviewed dozens of experts—each one is passionate, smart, and experienced in his or her field—to give you the most cutting edge and vital information on these topics (please see list below). Plus, I share my own stories--collected from teaching digital literacy (via <a href="http://www.cybercivics.com">Cyber Civics</a>) for nearly a decade, meeting students and parents across the U.S., studying media psychology, and raising two digital kids of my own. I didn't want to leave a stone unturned!</div><div>Finally, not every school in America will find the time or acknowledge the urgency of teaching digital literacy. While that’s a crying shame, it’s also why I wrote this book. You’ll find it full of “Cyber Civics” moments—fun, easy “digital literacy” activities that any busy family can do together at home. </div><div>How To Use This Book</div><img src="http://static.wixstatic.com/media/f6bccd_766b032e992848b5bc29ea25903fdcf1~mv2.png"/><div>In the book I compare the task of helping kids build a healthy relationship with technology to building a house. This building project is divided into three parts. You can start at the part that pertains to you and your kids:</div><div>Part One: A Solid Foundation. </div><div>Your child’s house must be built upon a solid foundation, and part one explains where to start. The skills you nurture in your children while they are young will pay off in spades as they grow older. </div><div>Part Two: A Sturdy Structure.</div><div>The next step is to help your children build a sturdy structure, comprised of four strong pillars, that will withstand any digital storms that may blow their way. It will be as durable and secure as the effort you both put into it. </div><div>Part Three: A Vibrant Community.</div><div>Here’s the fun part. Once you have a strong foundation and sturdy structure in place, part three will show you how to help your children connect and engage— critically and confidently—with new communities and opportunities online. The goal is for youth to use digital technologies to learn, inspire, be inspired, and share their unique talents with the world. </div><div>Use the Discussion Guide</div><img src="http://static.wixstatic.com/media/f6bccd_057a69415d534a6281ac7c658935fc30~mv2.png"/><div>Finally, I hope this book inspires contemplation and discussion. You are encouraged to <a href="https://www.dianagraber.com/discussion-guide">download its comprehensive discussion guide</a> and to organize meetings between the parents, grandparents, and teachers in your community to talk about these very important topics.</div><div>Remember, our generation has made connected devices a fact of life for the next one. We thrust gadgets into their little palms with virtually no guidance, no role models, and sometimes even years before they were cognitively prepared to use them well. We owe it to kids to make time to understand the complex online world, and to help them navigate it successfully. </div><div>And I hope this book will help!</div><iframe src="https://www.youtube.com/embed/EFbB_swQ06k"/><div>Experts featured in this book (I urge you to visit their sites to learn more about their work):</div><div>Dr. Michele Borba: <a href="http://micheleborba.com">&quot;UnSelfie: Why Empathetic Kids Succeed in Our All-About-Me World&quot;</a></div><div>Sue Scheff: <a href="http://shamenationbook.com">&quot;Shame Nation: Choosing Kindness and Compassion in an Age of Cruelty...&quot;</a></div><div>Alan Katzman, <a href="https://socialassurity.com">Social Assurity</a></div><div>Richard Guerry, <a href="https://www.iroc2.org">Institute for Responsible Online and Cellphone Communication</a></div><div>Sameer Hinduja, <a href="https://cyberbullying.org">Cyberbullying Research Center</a></div><div>Justin Patchin, <a href="https://cyberbullying.org">Cyberbullying Research Center</a></div><div>Ross Ellis, <a href="https://www.stompoutbullying.org">STOMPOutBullying</a></div><div>Dr. Pamela Rutledge, <a href="http://mprcenter.org">Media Psychology Research Center</a></div><div>Matthew Soeth, <a href="https://www.icanhelpdeletenegativity.org">#ICANHELP</a></div><div>Michelle C Lipkin, <a href="https://namle.net">National Association of Media Literacy Education</a> @ciullalipkin d</div><div>Chip Donohue, <a href="http://teccenter.erikson.edu">Technology in Early Childhood Center</a></div><div>Dr. Michelle Drouin, <a href="http://drmichelledrouin.com">Relationship and Technology Expert</a></div><div>Dr. Pamela Hurst Pietra, <a href="http://www.childrenandscreens.com">Children and Screens</a></div><div>Erin Reilly, <a href="http://www.ebreilly.com/bio.html">reillyWorks</a></div><div>Liz Repking, <a href="http://www.cybersafetyconsulting.com">Cyber Safety Consulting</a></div><div>Bradley Shear, <a href="https://www.digitalarmourgroup.com">Digital Armour</a></div><div>Joni Siani, <a href="http://noappforlife.com">No App For Life</a></div><div>David Kleeman, <a href="https://www.dubitlimited.com">Dubit Limited</a></div><div>Shauna Leff, <a href="https://www.privo.com">PRIVO</a></div><div>Cynthia Lieberman, Cyberwise &amp; <a href="https://www.theinfluencercode.com">The Influencer Code</a></div><div>Jack McArtney, <a href="https://www.linkedin.com/in/jackmcartney/">Formerly, Verizon</a></div><div>Kelly Mendoza, <a href="https://www.commonsense.org">Common Sense Media</a></div><div>Jason Ohler, Author, <a href="https://www.amazon.com/Digital-Community-Citizen-Jason-Ohler/dp/1412971446">&quot;Digital Community, Digital Citizen&quot;</a></div><div>Brittney Ohler: <a href="https://www.kidsemail.org">KidsEmail</a></div><div>Jennifer L. Alvarez: Author, <a href="http://www.theguardianherd.com">&quot;The Guardian Heard&quot;</a></div><div>Michele Whiteaker: <a href="https://funorangecountyparks.com/start-here">Fun Orange County Parks</a></div><div>Gabe Zichermann: <a href="http://www.gamification.co/about-gabe-zichermann/">Gamification Expert</a></div><div>Patti Connolly: <a href="https://www.youtube.com/watch?v=yXKYKT1ZKos">Five Secrets to Happy Parenting</a></div><div>Shelley Glaze Kelley: <a href="http://www.journeyschool.net">Journey School</a></div><div>Shaheer Faltas: <a href="http://www.greenwoodschool.org">Greenwood School</a></div><div>Lucy Cadova: <a href="https://www.faceup.com/en-us/">FaceUp</a></div><div>Ouri Azoulay: <a href="http://www.puresight.com">PureSight</a></div><div>Peter Kelly: <a href="https://www.dubitlimited.com">Cyber Civics</a></div></div>]]></content:encoded></item><item><title>How Instagram Tries to Nudge Users Away From Excessive Use - Does it Work?</title><description><![CDATA[As evidenced by increases in app downloads, app earnings, and smartphone penetration over the last five years, mobile application usage seems to be on the rise. The smartphone has managed to take up even more of our time. However, usage does not distribute evenly across types of mobile apps. Five social media apps in particular, have gained disproportionate shares of overall app use.The makers of these apps, of course, want people to use and spend time using them, and consumers have obliged. But<img src="http://static.wixstatic.com/media/f6bccd_323881ab558b4b96bf61c5877ee696da%7Emv2.jpg/v1/fill/w_304%2Ch_304/f6bccd_323881ab558b4b96bf61c5877ee696da%7Emv2.jpg"/>]]></description><dc:creator>Brian Thomas, Enlightened Digital</dc:creator><link>https://www.cyberwise.org/single-post/2019/01/11/How-Instagram-Tries-to-Nudge-Users-Away-From-Excessive-Use---Does-it-Work</link><guid>https://www.cyberwise.org/single-post/2019/01/11/How-Instagram-Tries-to-Nudge-Users-Away-From-Excessive-Use---Does-it-Work</guid><pubDate>Sat, 12 Jan 2019 01:38:37 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_323881ab558b4b96bf61c5877ee696da~mv2.jpg"/><div>As evidenced by <a href="http://www.businessofapps.com/data/app-statistics/"></a><a href="http://www.businessofapps.com/data/app-statistics/">increases in app downloads</a>, app earnings, and smartphone penetration over the last five years, mobile application usage seems to be on the rise. The smartphone has managed to take up even more of our time. However, usage does not distribute evenly across types of mobile apps. Five social media apps in particular, have gained <a href="https://themanifest.com/app-development/mobile-app-usage-statistics-2018">disproportionate shares</a>of overall app use.</div><div>The makers of these apps, of course, want people to use and spend time using them, and consumers have obliged. But more recent trends also stress the importance of balanced mobile device usage. In accordance with this, users or parents of users, aim to <a href="https://www.mobicip.com/">gauge and monitor</a> screen time so that daily productivity is not lost. Healthy device usage also aims to balance the potential addictive, mental, or emotional <a href="https://www.forbes.com/sites/alicegwalton/2017/06/30/a-run-down-of-social-medias-effects-on-our-mental-health/#38113e722e5a">effects of screen technology</a> and the social media they enable. In response to this, some application and <a href="https://www.wired.com/story/how-to-use-screen-time-ios-12/">device makers</a> have found it appropriate, even lucrative, to engage with these goals. Among them, Instagram, has decided to employ on-screen features in a seeming attempt to nudge users away from excessive use.</div><div>You’re all caught up</div><div>In July,<a href="https://instagram-press.com/blog/2018/07/02/introducing-youre-all-caught-up-in-feed/">Instagram introduced</a> the “You’re All-Caught Up” feature to help reduce users’ unnecessary screen time in the app. This feature consists of a message that appears on the timeline if the user has scrolled far enough down to posts that they had already scrolled through in the past. The goal of this feature is to nudge users away from looking through strings of posts multiple times.</div><div>Although it could be argued users naturally recognize landing upon pictures they’ve already seen once, an in-timeline update coming in the form of a tangible message leaves no question as to their recognition of the occurrence. It allows the act of scrolling through already-seen content to be even more front of mind. Explicitly calling it out like this may serve as a mechanism to break users’ habits of somewhat mindlessly scrolling through posts they’ve already viewed. Beyond increasing awareness of when one recycles back through pictures on the timeline, this feature might serve to further strengthen the following association in users’ minds: “Instagram is telling me I’m all caught up and that I’ve already seen what I’m scrolling through; should I not be scrolling through this again?Why would they shed light on this if it didn’t matter that I kept scrolling? It therefore might not be desirable for me to scroll through this content again.”</div><img src="http://static.wixstatic.com/media/f6bccd_6fb775466d2f45e9be8698fd1b54113b~mv2.jpg"/><div>It is important to note however, that at times people do want to revisit older content on their timeline.. This is normal, but it is important to know when to stop scrolling, since one can technically scroll back endlessly; the interface won’t physically stop you. Though, by increasing awareness and hinting at its potential non-desirability, this non-binding message can in theory nudge users away from viewing pictures multiple times, such that on average, a user spends less time scrolling through things they’ve already seen.</div><div>Less time revisiting content but possibly more time in the app?</div><div>It’s yet to be seen if this feature effectively fulfills the objective of decreasing overall time on the app. Additional possibilities such as users seeing, but ignoring, the message as well as other potential “unintended consequences” complicate the situation. A potential unintended consequence includes users obliging the message and then feeling as though they’re more responsibly allocating time to Instagram. They might then feel like they now possess the slack to have more liberal time on the app and actually end up more frequently opening it and looking at more new posts than they might’ve otherwise. Furthermore, posts found and viewed via search and explore tabs bypass the “You’re all caught up” feature since it only applies the message when crossing the point in the timeline where unseen posts end, and it does not indicate posts found in search or discovery as “already seen.” Such additions could possibly find themselves strategically worked in to the discovery feed, but that content is largely fresh, so it wouldn't mechanically work the same.</div><div>An interesting case ensues if users feel “safer” about their Instagram usage thanks to this feature. They might open the app more than they would have otherwise, and then actually spend longer sessions looking at new content on the top of their feed they might not have otherwise given themselves the time to check out before. This is because users might also feel inclined to view all new posts up until the message comes up, and some of these users might not have scrolled all that way otherwise.</div><div>If there is some “my instagram use is responsible effect” that causes users to feel as though they have more “usage slack,” this could also manifest in more time in discovery or in conducting searches. It seems the impact of this feature may operate on a user by user basis depending on how, and how often, they use the app in the first place.</div><div>Time Since Last Active</div><div>Last January,<a href="https://www.theverge.com/2018/1/18/16905776/instagram-activity-status-new-feature">Instagram deployed</a>a feature in its messenger that displays the amount of time passed since the thread’s other participant was active on the platform. Though apps have already commonly offered the ability to display activity-based time stamped information, such as when a message is read, expression of time-based activity first found its place on Instagram with this addition. After all, Facebook has long incorporated “time since last active” as a feature on its native messenger, and then on its separate messenger app when it came out. Instagram then followed its parent company’s suit in opening visibility to time-based activity to peers as they message.</div><div>This addition to Instagram’s messenger throws user activity up to social norms, such that it may help govern usage of the app. This dynamic may create a force to deter extreme usage, if users don’t want their friends to see that they are on the app all the time. The same effect may present itself when opening Instagram during late hours. Do you want that person you’re chatting with to see that you were up until 4 a.m.? Whether this dynamic actually causes impact on behavior really depends on the individual. Furthermore, if this feature does in fact act as a deterrent to some users, and they don’t want to be “constrained” by it, they can just delete given message threads or simply turn off this overall functionality to prevent peers with active threads seeing the timings of their Instagram activity.</div><img src="http://static.wixstatic.com/media/f6bccd_7aedd3beebce4314b6edefdd22706f7e~mv2.jpg"/><div>Bringing It All Together</div><div>In the end, users respond in different ways to strategic in-app notifications like “You’re all caught up.” Depending on how they perceive and internalize the message, as well as their initial degree of usage, users can in theory be nudged away from spending time on revisiting content or pushed towards more consistently viewing enough content to hit this message. Users might also relax their self-accountability in monitoring or reducing screen time if they feel that apps are assuming the role for them. This effect might cause an increase in usage beyond the timeline such that the decrease in time spent scrolling through old timeline content gets mitigated or outweighed by time spent in discovery or searches. Switching out time spent viewing old posts in timeline with time spent in discovery, for example, might register as lucrative for Instagram since discovery curates larger pools of content for the user, widening their net of potential accounts to see and follow. This extra viewing value can also trickle into timeline if they end up following more accounts.</div><div>Deterrence to unnecessary app usage, derived from social cues and activity sharing, offers an interesting potential to make an impact. Though such features have been around for a while, they are subject to cycles of normality agreed upon by the combination of app users. If it slowly becomes more and more normal to use an app often, and doing so is not looked down upon, this form of deterrence loses efficacy as it encounters a feedback loop working against it.</div><div>App makers building features to seemingly help monitor and deter excessive usage might showcase an honest desire to act in the consumer’s best interest. These moves toward nudging healthy screen time could at the same time help augment the image of these companies, as such an objective should. With this said, these features might nudge usage in lucrative ways actually desired by the app makers, while also providing them a positive image by appearing to look out for consumers. That would be the best of both worlds for them.</div><div>In the end, these different possibilities are only theories if not they are not played out against usage, user experience data, decision-making analysis, or psychological testing. In this case, Instagram (Facebook) is the main entity owning the usage data before and after entrance of the “You’re All Caught Up” and “time since last active” features. Maybe another entity will try to acquire some of this data or run its own test in order to gauge plausibility of different theories on the effects of Instagram’s screen time features. </div><div><div>Reposted with permission from www.mobicip.com. Authored by Brian Thomas, a contributor to <div><a href="https://enlightened-digital.com/">Enlightened Digital</a><a href="https://enlightened-digital.com/">.</a></div></div><div>Keep in touch with the latest on parenting, technology and education. <a href="https://us1.list-manage.com/subscribe?u=7e025be256c83c884c6e219f3&amp;id=d79046fb92">Subscribe to the Mobicip newsletter</a>. </div></div></div>]]></content:encoded></item><item><title>5 Reasons Why iOS Parental Controls &amp; Screen Time Don't Work for Families</title><description><![CDATA[It is not by accident that smartphones, tablets and computers have become ubiquitous today. While they serve as valuable productivity tools, the companies that make them, along with those that make apps, have relentlessly focused on making them engaging. But there comes a point when these tools have become so engaging to be considered "addictive," especially among younger users.The behavioral effects of such hyper-engagement with screens and technology is not a new phenomenon (the television was<img src="http://static.wixstatic.com/media/f6bccd_c9ee961b60c748d184ee411d4eeb78f7%7Emv2_d_1920_1281_s_2.jpg/v1/fill/w_369%2Ch_246/f6bccd_c9ee961b60c748d184ee411d4eeb78f7%7Emv2_d_1920_1281_s_2.jpg"/>]]></description><dc:creator>Suren Ramasubbu, CEO, Mobicip.com</dc:creator><link>https://www.cyberwise.org/single-post/2018/10/14/5-Reasons-Why-iOS-Parental-Controls-Screen-Time-Dont-Work-for-Families</link><guid>https://www.cyberwise.org/single-post/2018/10/14/5-Reasons-Why-iOS-Parental-Controls-Screen-Time-Dont-Work-for-Families</guid><pubDate>Mon, 07 Jan 2019 23:36:00 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_c9ee961b60c748d184ee411d4eeb78f7~mv2_d_1920_1281_s_2.jpg"/><div>It is not by accident that smartphones, tablets and computers have become ubiquitous today. While they serve as valuable productivity tools, the companies that make them, along with those that make apps, have relentlessly focused on making them engaging. But there comes a point when these tools have become so engaging to be considered &quot;addictive,&quot; especially among younger users.</div><div>The behavioral effects of such hyper-engagement with screens and technology is not a new phenomenon (the television was a forerunner), but the level of personalization and one-to-one usage is indeed unprecedented in history. The very companies that made these products <a href="https://www.bloomberg.com/news/articles/2018-01-08/jana-calpers-push-apple-to-study-iphone-addiction-in-children">face a backlash</a> around what made them successful, and are being <a href="https://www.bloomberg.com/news/articles/2018-01-08/jana-calpers-push-apple-to-study-iphone-addiction-in-children">asked to create tools</a> to keep the engagement level in check. Apple and Google have indeed taken steps to address this issue, each launching parental control and screen time tools in quick succession. </div><img src="http://static.wixstatic.com/media/f6bccd_8c68885ab2194f70832a07d5a22fa013~mv2.jpg"/><div>In September, Apple officially launched iOS 12 with <a href="https://www.apple.com/families/">enhanced parental control and screen time features</a>.</div><div>While it sounds good in theory, Apple's offering only serves to tide over the criticism as it doesn't address the real problem in a holistic manner.</div><div>1. Parental Control for the iPhone and iPad, Only!</div><div>The typical American family has 5 devices - 2 smartphones, 2 computers, and 1 tablet, according to the <a href="http://www.pewresearch.org/fact-tank/2017/05/25/a-third-of-americans-live-in-a-household-with-three-or-more-smartphones/">Pew Research Center.</a></div><img src="http://static.wixstatic.com/media/f6bccd_93306e3b4c004fcc8ba9c9d8ba01b485~mv2.png"/><div>That means iOS parental controls can protect only a third or half the number of devices in a family, assuming those are Apple devices. Any parent taking away a screen from a highly engaged child or teenager knows the first reaction is to find another screen that serves the purpose. Apple's iOS 12 Screen Time is a standalone feature that works only on iOS devices and surprisingly not even the Mac. Not to mention the fact that 1 in 5 families is hyper-connected with 10 or more devices. How does setting up parental controls on just a couple of devices make sense in such families?</div><div>2. Doesn't Work on Shared Devices</div><div>iOS 12 parental controls and screen time assume there is only one user per device. Unlike the iPhone, which is typically a single user device, iPads are often shared by family members. Nearly 40% of children 0- to 8- years-old use a shared tablet at home.</div><img src="http://static.wixstatic.com/media/f6bccd_aa2ebfeb06fb49748bdd12c8423ec03f~mv2_d_2300_1654_s_2.png"/><div>Setting up screen time and Internet limits on such a device for one child means constantly over-riding the settings or modifying them through the day when it is shared. <a href="https://www.washingtonpost.com/technology/2018/08/23/we-tested-apples-new-screen-time-parental-controls-first-came-tears-then-frustration/?noredirect=on&amp;utm_term=.41172bb9f295">Geoffrey Fowler, Technology Columnist for the Washington Post, after reviewing the new iOS 12 parental controls</a>, concludes that it makes parenting more difficult, not less. He writes,</div><div>&quot;I was surprised how difficult Apple’s parental software was to use. Even discounting for beta-software bugs Apple will hopefully squash, Screen Time is one of Apple’s weakest software launches in years. Apple treats parents like IT administrators for their kids, saddled with a zillion choices to make and knobs to adjust.&quot;</div><div>3. Rudimentary Internet Filtering</div><div>The Internet Filtering and controls on iOS are very basic, protect only the Safari browser and not Chrome or other apps with built-in browsers, and offer only two choices:</div><div>Restrict adult websites, relying on categorization known only to AppleRestrict specific websites identified by the parent</div><div>This may work well for children 0-2 years old, arguably. Even if you're a parent with plenty of time on your hands, adding websites manually to allow them one-by-one is nothing short of a nightmare. There are 2 billion websites on the Internet and 200 million active ones!</div><img src="http://static.wixstatic.com/media/f6bccd_029f1db113024600a35411fa3d2442fa~mv2.png"/><div>As t<a href="https://www.mobicip.com/?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">he developer of the most comprehensive Internet Filter in existence today, Mobicip</a> knows a thing or two about this problem. Content on the Internet is evolving and proliferating at an alarming rate. Expecting a parent to keep track of and add to the list ridiculous. Apple, by declaring this on i<a href="https://www.apple.com/families/">ts new Families page</a>, in a nod to third-party <a href="https://www.mobicip.com/?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">parental control software like Mobicip, tacitly acknowledges this deficiency:</a></div><div>&quot;You can also install special web browsers that are designed to display kid-friendly content and nothing else.&quot;</div><div>4. Parents With Android Smartphones</div><div>iOS 12 parental controls require the parent and the child to have iOS devices, connected through Family Sharing. The average American family owns 2.6 Apple products, <a href="https://www.cnbc.com/2017/10/09/the-average-american-household-owns-more-than-two-apple-products.html">according to a CNBC poll</a>, and so it must be ok, you would think. After all, a whopping 82% of American teenagers own iPhones, according to the <a href="http://www.piperjaffray.com/3col.aspx?id=4986">Piper Jaffray Teen Survey</a>. However, Android is still the most widely used smartphone OS in America with 6<a href="https://www.techspot.com/news/75658-iphone-sales-help-ios-grow-us-market-share.html">5% market share (Kantar WorldPanel).</a></div><img src="http://static.wixstatic.com/media/f6bccd_c11b506d5c914ac19d6454c047e855e4~mv2.png"/><div>This means most parents and adults in households have Android smartphones while the next generation has iPhones. Such blended households, more the norm than the exception, have no choice but to go with a reliable and holistic cross-platform <a href="https://www.mobicip.com/?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">parental control app such as Mobicip</a> that allows the parent to use the app on Android to protect an iPhone and vice versa.</div><div>5. On-demand Permissions and Interactions</div><div>One of the most popular features in <a href="https://www.mobicip.com/?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">Mobicip's Parental Controls</a> that families engage with is the interaction between the child and parent. When content is blocked, your child can request an override or extension of time. This pops up a request on the parents' phone, who can then approve it instantly. Mobicip customers often mention real-life examples where this comes in very handy—like when a daughter made a request from Human Anatomy class in high school, the parent was in a work meeting but saw the request, and approved it instantly. This goes to show that the concept of Parental Controls today is evolving from a big brother approach to a collaborative and interactive one, where what is acceptable media or screen time is not fixed but is a moving target that is adjusted over time and age.</div><div>While Apple has clearly responded to the demands to do more to curb excessive use by children, the solution offered is centered on furthering its own interests, platforms, and features rather than address the real problem. As we often cite within the Mobicip team as something we would like to avoid, it reflects a typical engineering worldview and solution to a problem. That is why holistic parental control and screentime software such as <a href="https://www.mobicip.com/?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">Mobicip</a> continue to be the only practical and effective options available to parents in reality.</div><div>Author Bio:</div><img src="http://static.wixstatic.com/media/f6bccd_d329c538c79e41eaac8be11d3c844aed~mv2.jpg"/><div>Suren Ramasubbu is a passionate advocate for digital citizenship and the use of technology for learning, the co-founder and CEO of <a href="https://www.mobicip.com/?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">Mobicip</a>, who believes (obviously) that Mobicip offers the most powerful and best-in-class tools for parents to manage technology in the household.</div></div>]]></content:encoded></item><item><title>Parents: 3 Digital Resolutions for 2019</title><description><![CDATA[It's 2019! Hurrah, there's a whole new year of digital parenting ahead. Out with the old and in with the new!In other words, if last year found you complaining that your kids spent more time playing Fortnite than building actual forts, or that they communicated with emoji’s more than words, then it’s time for you to grab the digital bull by the horns. Make this the year you help your children build a healthy relationship with technology and reconnect with you.Start by resolving to do these three<img src="http://static.wixstatic.com/media/f6bccd_1de0e30d40c84f6982ec0512c1a550df%7Emv2_d_1920_1920_s_2.jpg/v1/fill/w_317%2Ch_317/f6bccd_1de0e30d40c84f6982ec0512c1a550df%7Emv2_d_1920_1920_s_2.jpg"/>]]></description><dc:creator>Diana Graber</dc:creator><link>https://www.cyberwise.org/single-post/2019/01/04/Parents-3-Digital-Resolutions-for-2019</link><guid>https://www.cyberwise.org/single-post/2019/01/04/Parents-3-Digital-Resolutions-for-2019</guid><pubDate>Fri, 04 Jan 2019 21:29:45 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_1de0e30d40c84f6982ec0512c1a550df~mv2_d_1920_1920_s_2.jpg"/><div>It's 2019! Hurrah, there's a whole new year of digital parenting ahead. Out with the old and in with the new!</div><div>In other words, if last year found you complaining that your kids spent more time playing Fortnite than building actual forts, or that they communicated with emoji’s more than words, then it’s time for you to grab the digital bull by the horns. Make this the year you help your children build a healthy relationship with technology and reconnect with you.</div><div>Start by resolving to do these three things: </div><div>1. Never Ever Say, &quot;I'm Not Very Techy&quot; Again. </div><div>Technology is ubiquitous, so saying you’re &quot;not very techy&quot; is analogous to claiming you don't breath air. Chances are you’ve &quot;Googled,&quot; asked Siri for directions, tapped out a text message, or answered a ringing cellphone. Heck, you’ve probably even “liked” a cat video or two on Facebook. So face it, by simply living in a technology-enhanced world, you’re “techy” whether you realize it or not. Claiming you “don’t know a thing” about technology is not a valid excuse for excusing yourself from at least attempting to help your children navigate new technological terrain.</div><div>2. Embrace This Fact: The Most Important Digital Skills are Social Skills. </div><div>Learning how to swipe, download an app, send a group text, or even give Snapchat a fake birthdate is easy. Most kids can do any of the above without your help at all. What they need help with is knowing how to use technology safely and wisely. For example, recognizing when someone needs a kind word online, knowing what photos are appropriate to post to Instagram, or understanding that midnight is simply too late to be sending text messages to friends--these are the things kids need help with. Online decisions require offline skills, like empathy, good judgment, compassion, and respect. Your lived experience on this earth make you the perfect person to teach these “digital” life skills to your kids. They will rely on these human capacities to make good decisions when they do join online communities that are devoid of rules and role models.</div><div>3. Speaking of Role Models, Be a Super-Duper One. </div><div>Believe it or not, research shows that children learn digital skills at home, mostly through observation and mirroring their parents. So if you’re that parent who’s checking text messages at the dinner table or sending emails during your kids’ soccer games, then please don’t be surprised when your children use their devices at times you wish they wouldn’t. Remember, the old adage “do as I say, not as I do” doesn’t apply well to technology. Today’s devices are just too powerfully alluring. Social media “likes,” the ding of a text message, and endless social media notifications activate the reward center of the brain, providing it with the same shot of dopamine it gets from food, exercise, and sex. This makes it really, really hard for kids to resist their devices. Model this life skill for them. Whenever the urge strikes to grab your phone at a time you should be connecting with others in real life, stop yourself! Remember, there just might be a young person watching who will learn his or her online behavior by observing yours.</div><div>Instead of focusing on what you don’t know about Snapchat, Instagram, Fortnite, TikTok, and more, remember you can always use tech to learn about tech. Simply do some online research about new social media apps, online games, or to find out what’s popular on YouTube. If this sounds too daunting, make it easy on yourself and ask your children to tell you about their digital world. Chances are they’ll be surprised, and pleased, to enlighten you.</div><div>Make this the year you resolve to become an A+ digital parent. Because when we master technology, it will it stop mastering us.</div><img src="http://static.wixstatic.com/media/f6bccd_c390ba78d418446ca41b870b9e28a2a3~mv2_d_1792_2700_s_2.jpg"/><div>By: Diana Graber. Author of “Raising Humans in a Digital World: &quot;<a href="http://www.dianagraber.com">Helping Kids Build a Healthy Relationships with Technology”</a> (HarperCollins Leadership/Jan. ’19). Co-founder of Cyberwise.org and founder of CyberCivics.com.</div></div>]]></content:encoded></item><item><title>Safe Holiday Shopping: Tips and Best Practices</title><description><![CDATA[Although the deals are tempting, the abundance of special holiday listings makes it easy for cybercriminals and scammers to exploit the savviest of deal seekers. Finding ways to protect your online identity is important. When shopping for gifts for your friends and family online, keep these tips in mind for a safer shopping experience this season.To keep your devices and information protected: Avoid public Wifi networks, unsecured sites, outlandish offers, and suspicious email offers Create a<img src="http://static.wixstatic.com/media/f6bccd_4474f187f6164f9d9422b076babfbe9c.png/v1/fill/w_317%2Ch_258/f6bccd_4474f187f6164f9d9422b076babfbe9c.png"/>]]></description><dc:creator>Brent Scott</dc:creator><link>https://www.cyberwise.org/single-post/2018/12/05/Safe-Holiday-Shopping-Tips-and-Best-Practices</link><guid>https://www.cyberwise.org/single-post/2018/12/05/Safe-Holiday-Shopping-Tips-and-Best-Practices</guid><pubDate>Wed, 05 Dec 2018 23:42:30 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_4474f187f6164f9d9422b076babfbe9c.png"/><div>Although the deals are tempting, the abundance of special holiday listings makes it easy for cybercriminals and scammers to exploit the savviest of deal seekers. Finding ways to protect your online identity is important. When shopping for gifts for your friends and family online, keep these tips in mind for a safer shopping experience this season.</div><div>To keep your devices and information protected:</div><div>Avoid public Wifi networks, unsecured sites, outlandish offers, and suspicious email offersCreate a new email address for online purchases and store accountsUtilize two-factor-authentication on accounts and devices when possibleDefend devices and stored data by updating firmware and utilizing antivirus softwareCheck for inaccuracies on your bank statements and credit card bills</div><img src="http://static.wixstatic.com/media/f6bccd_c9b4ecb7f5b846e0aa80c4552d52e809~mv2.jpg"/><div>What To Avoid</div><div>Public or other unlocked Wifi Networks</div><div>If actively monitored by a cybercriminal, the information you exchange through an unsecured network could be intercepted and exploited.</div><div>It’s recommended that you wait until you’re connected to a private and secure network before making purchases.</div><div>Suspicious looking emails and phishing attacks</div><div><a href="https://support.microsoft.com/en-us/help/4033787/windows-protect-yourself-from-phishing">Phishing</a> is a common email strategy used during the holiday season. It’s designed to lure vulnerable online shoppers into willingly handing over their private information. These tactics are successful because the emails seem like an authentic warning or opportunity at first glance.</div><div>If you’re suspicious, trust your gut and handle the email with care. Don’t open unknown attachments, links, or share login information that could be “required to resolve an issue”. </div><div>Fake websites and unbelievable deals</div><div>We’ve all seen websites and deals that are obviously fake. They tend to pop up around the holiday season, so Google advises checking the authenticity of the site, cart, and checkout pages to<a href="https://security.googleblog.com/2016/09/moving-towards-more-secure-web.html">confirm the URL say HTTPS</a>. Marking domains labeled HTTP as unsecured sites make it easier to identify sources that should be avoided.</div><img src="http://static.wixstatic.com/media/f6bccd_d3de7cd46dc647439087fc88b7346d29~mv2.jpg"/><div>Tools To Utilize</div><div>New email address</div><div>Create a new email using a secure password, use it only for online purchases and store accounts to easily track orders and shipping related emails.</div><div>Advanced security tools</div><div>When it comes to security tools, you have plenty of options; from free to paid subscriptions, widgets, or apps. Many online accounts and devices can be protected by two-factor-authentication, however, if that’s not an option, a unique and highly secure password is recommended.</div><div>For an added layer of security while making online purchases this season, consider utilizing a Virtual Private Network to encrypt and hide your online transactions.</div><div>Software updates and patches</div><div>Enabling automatic updates is an easy way to keep your devices operating smoothly and data secure. All Internet-connected devices, apps, and security software utilize regular updates to identify and fix critical issues. However, it’s still recommended that you install <div><a href="https://us.norton.com/internetsecurity-how-to-how-to-choose-antivirus-software.html#protect">antivirus software</a><a href="https://us.norton.com/antivirus?inid=nortoncom_nav_antivirus_homepage:homepage"></a></div>on your devices to identify and remove contaminated files or downloads the update may not have addressed.</div><img src="http://static.wixstatic.com/media/f6bccd_68df745f78044ddfa04304e5c8be0581~mv2.jpg"/><div>After Shopping Online</div><div>Review Your Bank and Billing Statements</div><div>Look for unauthorized purchases, mistakes, or suspicious spending activity after making an online purchase. If you notice something isn’t right, notify your bank and creditors, as it could be a sign you’re a victim of fraud.</div><div>Monitor Your Online Accounts for Unauthorized Activity</div><div>Identifying an issue early on is the best way to resolve it in a timely manner and avoid further complications. Avoid storing personal information on these online accounts, and after making the purchase, be sure to remove your saved credit card information, unsubscribe from the service, and log out from the account. Regularly check your new email address for any notifications, and if you see issues, contact the online retailer. </div><img src="http://static.wixstatic.com/media/f6bccd_4fd396a122534384b1e52bef047cab7f~mv2_d_1400_3727_s_2.jpg"/></div>]]></content:encoded></item><item><title>The Complete Guide to Online Security During the Holiday Season</title><description><![CDATA[The home of today is very different to that of 10 or even five years ago – everything from your fridge to your TV links up to the internet and has more processing power than you thought white goods would ever need.With this new-fangled technology, however, comes a raft of new security issues that most of us simply can’t afford to ignore. Here are a few things to consider and do, to protect yourself in this new domestic landscape, look after your family online and make your home network highly<img src="http://static.wixstatic.com/media/f6bccd_94e4240d747548db9f09ff3ab946507d%7Emv2_d_4896_3264_s_4_2.jpg/v1/fill/w_647%2Ch_431/f6bccd_94e4240d747548db9f09ff3ab946507d%7Emv2_d_4896_3264_s_4_2.jpg"/>]]></description><dc:creator>Tabby Farrar</dc:creator><link>https://www.cyberwise.org/single-post/2018/12/05/The-Complete-Guide-to-Online-Security-During-the-Holiday-Season</link><guid>https://www.cyberwise.org/single-post/2018/12/05/The-Complete-Guide-to-Online-Security-During-the-Holiday-Season</guid><pubDate>Wed, 05 Dec 2018 23:42:11 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_94e4240d747548db9f09ff3ab946507d~mv2_d_4896_3264_s_4_2.jpg"/><div>The home of today is very different to that of 10 or even five years ago – everything from your fridge to your TV links up to the internet and has more processing power than you thought white goods would ever need.</div><div>With this new-fangled technology, however, comes a raft of new security issues that most of us simply can’t afford to ignore. Here are a few things to consider and do, to protect yourself in this new domestic landscape, look after your family online and make your home network highly secure.</div><div>The Internet of Things</div><div>The <a href="https://www.wired.co.uk/article/internet-of-things-what-is-explained-iot">Internet of Things (IoT)</a> refers to the growing number of devices we use around the house that connect to the internet. From virtual assistants to smart toasters, these new devices simplify our lives – however, they also offer those who would do us harm the opportunity to break in to our networks.</div><div>The problem with these new devices isn’t that they’re inherently susceptible to cyber attack, but that we very rarely take the necessary steps to properly secure them. How often do any of us fully read the instructions for a new gadget before ripping off the packaging and pressing the on button? Let alone take the time to change the password to anything but the default.</div><div>Being over-excited when you buy a new piece of tech isn’t anything unusual, but by not taking the time to set your new device up properly, you can leave it vulnerable to being hacked. Make sure your network is protected against cyber attacks by setting new, secure passwords on every smart device you bring home.</div><div>Stay Up To Date</div><div>Staying up to date may sound like an obvious thing to do, but you’d be surprised by just how many people jeopardize their security by not updating their computers, tablets or mobile phones.</div><div>We’ve all ignored a pop-up message on our computer before – they have a terrible habit of reminding us about software updates at the most inconvenient time. But neglecting to update your computer straight away can mean the difference between having the latest protection against a particularly harmful computer virus, and being totally defenceless.</div><div>Updates cost nothing and only take a few moments to install, so it’s always wise to update your software as soon as possible.</div><img src="http://static.wixstatic.com/media/f6bccd_5725328efb42424496abd36bfb74587f~mv2.jpg"/><div>Use a VPN</div><div>A VPN, or virtual private network, is a service that allows you to connect to the internet via a server on a independent network rather than through your internet service provider. This conceals your real IP address and means that you and your family can surf the web with greater anonymity. VPNs also encrypt your data, ensuring that everything you transfer online gets from A to B without being viewed or stolen.</div><div>VPN services are an inexpensive way to protect your personal details, especially if you’re doing something that poses a risk to your data like banking or shopping online. If you’re technically minded you can configure <a href="https://www.avast.com/en-us/secureline-vpn#mac">a VPN client</a>on your router, but if not, you can simply install app versions to protect your family across multiple devices.</div><div>Passwords</div><div>Cyber criminals know plenty of ways for getting past your digital defenses, but it may surprise you to learn that one of the most common is simply guessing your password.</div><div>Using the same password for everything, or a <a href="http://time.com/5071176/worst-passwords-2017/">commonly used password</a>, is a bad idea. Take a few minutes to log in to your accounts and strengthen yours if this is something you’re guilty of.</div><div>If you think you’ll struggle to remember lots of different secure passwords, you can always adopt a password manager too. These securely store your passwords, meaning you only need to focus on remembering the one that logs you into the password manager itself rather than dozens.</div><img src="http://static.wixstatic.com/media/f6bccd_b7d6f9543d4d40e98c436f5d3d2c3175~mv2.jpeg"/><div>Social Media</div><div>With <a href="https://www.theguardian.com/technology/2018/oct/12/facebook-data-breach-personal-information-hackers">high-profile data breache</a>s appearing in the media all the time, being aware of the risks that social media pose to your privacy is important – particularly if you have gregarious teenagers in the house.</div><div>Young children and teenagers who have grown up with social media, though they may be aware of its pitfalls, can still unwittingly post information that can put them at risk. For example, if you haven't changed your privacy settings on certain social media platforms, you can end up sharing your location when making posts or uploading photos.</div><div>For this reason, it’s wise to talk to your children about the dangers of the digital world and to explain how they can protect themselves online. It’s also worth discussing what and how much they share on social media, either by changing their settings or reminding them to take a moment before each post to consider what they’re sharing.</div><div>Back-Up Your Data</div><div>Backing up your data is the cornerstone of online security and is one of the simplest methods of safeguarding against ransomware, a particularly devious form of cyber attack that works by preventing you from accessing your data and then demanding a payment to get it back.</div><div>Backing up your data offline or on a cloud service is an easy way of circumventing this sort of attack. That way, if someone in your family does happen to download ransomware accidentally, you can ignore the threats about permanently losing your data. Instead, you’ll know it’s safely stored somewhere else and can be replaced.</div><div>Protecting your family is paramount. Fortunately, keeping your family and their data safe online is much easier than you might think and there are lots of precautions that you can take.</div><div>Like locking your front door, regularly updating your computer software and using complex passwords can protect your family from online threats. While using antivirus may now be commonplace, with up-to-date software and the other basics in place you can move on to extra security, like VPNs, to double bolt your digital door and keep everyone free from danger.</div><div>Don’t forget that <a href="http://www.cybercivics.com">educating your children</a> about online security and the perils of social media is also important, and will mean they know how to navigate the challenges of growing up in a digital age without you constantly looking over their shoulder.</div><img src="http://static.wixstatic.com/media/f6bccd_d80dd3944a434168b000074f6a17ddc4~mv2.jpg"/><div><a href="https://www.linkedin.com/in/tabby-farrar-631507129/">Tabby Farrar</a> is a professional researcher and copywriter, specializing in content around technology, health &amp; wellness. When she isn't putting together tips and tricks around online security, using insight from well-known companies like <a href="https://www.avast.com/en-us/secureline-vpn#mac">Avast VPN</a>, she can be found writing for her own website,<a href="https://justcantsettle.com">JustCantSettle</a>.</div></div>]]></content:encoded></item><item><title>Ditching Devices at Thanksgiving Dinner (and Every Dinner!)</title><description><![CDATA[When was the last time you saw your children look up from their social media feed and voluntarily engage in a conversation with you? If you have to think about it, we feel you! You’ve probably spoken to them, scolded them or even pleaded with them to stop with their online obsession, but all your efforts have gone in vain. The only solace is the fact that you’re definitely not alone. The obsession with smartphones and social media has become an endemic as a result of very young children owning<img src="http://static.wixstatic.com/media/f6bccd_26970815047d4d5a8f136ae0b8ed1832%7Emv2.png/v1/fill/w_601%2Ch_398/f6bccd_26970815047d4d5a8f136ae0b8ed1832%7Emv2.png"/>]]></description><dc:creator>Prithiv Sassisegarane, Mobicip</dc:creator><link>https://www.cyberwise.org/single-post/2018/11/19/Ditching-Devices-at-Thanksgiving-Dinner-and-Every-Dinner</link><guid>https://www.cyberwise.org/single-post/2018/11/19/Ditching-Devices-at-Thanksgiving-Dinner-and-Every-Dinner</guid><pubDate>Mon, 19 Nov 2018 16:38:14 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_26970815047d4d5a8f136ae0b8ed1832~mv2.png"/><div>When was the last time you saw your children look up from their social media feed and voluntarily engage in a conversation with you? If you have to think about it, we feel you! You’ve probably spoken to them, scolded them or even pleaded with them to stop with their online obsession, but all your efforts have gone in vain. The only solace is the fact that you’re definitely not alone. The obsession with smartphones and social media has become an endemic as a result of very young children owning and using mobile phones, especially here in North America. According to surveys, <div><a href="http://www.pewinternet.org/2018/05/31/teens-social-media-technology-2018/">more than 95% of American teens own a smartphone</a>… just let that sink in! </div></div><div>There is no denying that smartphones come with their own perks -- they have bridged communication gaps like never before, allowed us to keep track of where our children are, and ultimately made life so much easier and (yes) richer, with the plethora of apps providing access to news, information and beyond. But where do we draw the line? And how do we begin?</div><div>Let’s start with something as simple, yet as difficult, as having dinners without any electronic devices.</div><div>Dinners used to be the time for families to catch up with each other’s lives, discussing issues or simply engaging in light-hearted verbal conversations with the people at the table, rather than interacting over text with friends far away. Let’s return to that simpler time at least for the hour or so it takes to consume the evening meal.</div><div>The Effects of Smartphone Addiction</div><div>The sad reality now is that, irrespective of the age of a family member, you will find that heads are tilted not towards each other nor their food, but only towards their smartphones. The long-term effects of this behavior are harmful for both the physical and mental well-being of a person. And for digital natives who have grown up to become tech savvy, smartphone addiction is very real and the effects of cutting down on smartphone usage is similar to that of substance withdrawal. That being the case, a phased withdrawal is recommended.</div><div>Benefits of Arranging a ‘Device Free’ Dinner</div><div>How far can an “easy” device-free dinner go to cement your relationship with your children? Well, the most obvious answer is that your children will be free of distractions and have no other option but to engage in actual conversation with you!</div><div>It could be difficult initially for them to set aside their phones for even thirty minutes, but it does eventually get easier. Young parents who have themselves had to deal with excessive technology dependance will also find it challenging at first. But the undivided attention of your children is its own reward. Take this time to discuss and shape their outlook on key issues in their young lives. </div><div>Small practices like device-free dinners can open up avenues for other activities you and your children could engage in together, based on their interests. And when relationships are fostered off the screen, they tend to become more meaningful. Your relationships will grow more meaningful as you enjoy deeper conversations with your children.</div><img src="http://static.wixstatic.com/media/f6bccd_f01650f6c21149349236c37933088e5f~mv2.png"/><div>How to Arrange a Device-Free Dinner</div><div>As simple and easy as it might sound, arranging a dinner without devices can be hard. You can start by establishing clear rules about where the phones are to be kept for the duration of the meal. We also recommend you set a minimum timeframe, as children have a tendency to rush their dinners just to get back to their phones! Parents could also turn to screen time parental controls to effectively restrict device usage during dinnertime. For example, <a href="https://www.mobicip.com/features/screentime">Mobicip's Family Time feature</a> allows parents to instantly lock all home devices up to 30 minutes or an hour at a time, to ensure participative family meals and healthy conversations. </div><div>LEARN MORE ABOUT PARENTAL CONTROL</div><div>SOFTWARE ON OUR LEARNING HUB</div><div>Lead by Example</div><div>This means that you have to put your device away and make dinner more engaging. This doesn’t mean replacing one distraction with another. For example, there’s no purpose to staring at the TV instead of the smartphone! Find out what your children enjoy talking about and share your thoughts on the subject. Discuss their day at school. The key is to be approachable and not judgmental about the things they like. </div><div>Sadly, children are heavily influenced by their peers and parents are inherently considered ‘uncool’ or ‘lame’! It’s easy for a negative idea about parents to spread virally among a social group. It becomes crucial therefore that you don’t come across as overbearing, as this can drive them to becoming defensive and rejecting the concept. Once they understand that you are always there for them, and that you are depriving them of their phones for a greater purpose, they will instinctively close any gaps that were developing. You will then find it easy to get through to them about other concerns as well. </div><img src="http://static.wixstatic.com/media/f6bccd_17b594648be343c7adb992b5171b63e5.jpg"/><div>Relate to Their Issues</div><div>Ensure that the rules are adhered to without any exception. Children often blow things out of proportions in their minds. They take it upon themselves to stay connected and respond to their social group. This is partly due to peer pressure, but it’s also fueled by FOMO: a fear of missing out. It becomes extra hard for children to stay offline for long. They also feel the pressure of responding to every single message they receive during dinner… and we are talking about hundreds of messages here! Have an open talk with them on this subject; be firm about enforcing the rules, but don’t be dismissive of their concerns. </div><div>Follow Through</div><div>The last and most important step to implementing device-free dinners, is to follow the same restrictions every single night. It can get increasingly difficult amidst protests and the subsequent mental exhaustion, night on night… especially since you can’t hide from the complaints in your own phone! But don’t give up. One day, your family will simply accept that they should put away their devices before reaching the dinner table… and from that day, device-free dinners will be the norm.</div><div>Writing credit:</div><div>Authored by Prithiv, a Mobicip researcher who writes about the effects of technology on health and well-being. Keep in touch with the latest on parenting, technology and education. Subscribe to the Mobicip newsletter. Learn more at <a href="http://www.mobicip.com">www.mobicip.com</a>.</div></div>]]></content:encoded></item><item><title>3 Key Ways to Keep Your Child’s Identity and Information Protected From Hackers and Predators</title><description><![CDATA[These days, children of all ages, even very young ones, spend a lot of their waking hours on smartphones, tablets and computers. This is the world we live in, and while there can be certain advantages of this tech, there are also numerous issues that come along with it.As a parent, you’re no doubt concerned about who might come across your child’s identity and other personal information. Unfortunately, there are many predators who keep coming up with ways to break into computer systems. In fact,<img src="http://static.wixstatic.com/media/f6bccd_b891e3adb65245c98e1a41ec07dd5e64%7Emv2.png/v1/fill/w_621%2Ch_410/f6bccd_b891e3adb65245c98e1a41ec07dd5e64%7Emv2.png"/>]]></description><dc:creator>Jackie Roberson</dc:creator><link>https://www.cyberwise.org/single-post/2018/11/19/3-Key-Ways-to-Keep-Your-Child%E2%80%99s-Identity-and-Information-Protected-From-Hackers-and-Predators</link><guid>https://www.cyberwise.org/single-post/2018/11/19/3-Key-Ways-to-Keep-Your-Child%E2%80%99s-Identity-and-Information-Protected-From-Hackers-and-Predators</guid><pubDate>Mon, 19 Nov 2018 16:36:38 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_b891e3adb65245c98e1a41ec07dd5e64~mv2.png"/><div>These days, children of all ages, even very young ones, spend a lot of their waking <a href="https://www.bbc.com/news/technology-32067158">hours on smartphones</a>, tablets and computers. This is the world we live in, and while there can be certain advantages of this tech, there are also numerous issues that come along with it.</div><div>As a parent, you’re no doubt concerned about who might come across your child’s identity and other personal information. Unfortunately, there are many predators who keep coming up with ways to break into computer systems. In fact, according to research, more than <a href="https://www.cnbc.com/2018/04/24/child-identity-theft-is-a-growing-and-expensive-problem.html">one million children</a>were victims of identity theft or fraud last year. </div><div>As such, you must take steps to protect your family. Read on for three key ways in which you can keep your children safer online.</div><div>Utilize Security Software</div><div>One of the simplest things you can do is utilize security software on all the devices used by your family. Search for quality software that provides a range of coverage, <a href="http://shop.trendmicro.com/Official-Site/">including antivirus protection</a>, along with security against ransomware, spyware, spam, malware, etc.</div><div>Excellent products are those that keep passwords and other online information safe from prying eyes and that protect against a variety of identity- and data-stealing applications. Also look for something that will help maintain user privacy when browsing the internet and that will block incoming dangerous attachments and emails, as well as suspicious websites and links.</div><div>Make sure you add firewalls to your devices, too. This adds another layer of protection for sensitive information and is a line of defense when hackers use the internet to try to get into systems and networks. Firewalls work to filter out possible threats from real, secure, credible data that comes in when you’re browsing online or downloading information.</div><div>To keep cybercriminals from learning details about your children, continually update all these protection tools. These won’t be able to work at optimum levels if you don’t update them when manufacturers release new versions (which they do when they discover there are security gaps that need to be plugged). Always set up software to update automatically, so you’re continually running the latest versions.</div><img src="http://static.wixstatic.com/media/f6bccd_c9b4ecb7f5b846e0aa80c4552d52e809~mv2.jpg"/><div>Visit Our Online Security Hub</div><div> Use Hard-to-Crack Passwords</div><div>Another top step to take is to protect devices and the information on them as well as accounts you and your kids log in to, with hard-to-crack passwords. Many hackers are able to learn sensitive details because people don’t use proper codes on their computers, tablets, smartphones, other internet-enabled gadgets and the like.</div><div>Teach your children how to create, the kinds of passwords that really protect. These codes are eight characters in length at a minimum and made up of a mixture of symbols, upper- and lower-case letters and numbers. It’s also necessary to avoid using words, phrases or numbers meaningful to you and your kids because hackers could guess it from public information. For example, avoid details shared on social media sites relating to things like birthdays, names, addresses, lucky numbers and so on. Of course, you must also steer clear of generic passwords such as the word “password,” or the numbers “123456.”</div><img src="http://static.wixstatic.com/media/f6bccd_4a7d0142b8d140f9b09fdb6b0a140c16~mv2.png"/><div>Educate Your Children on Do's and Don’ts</div><div>Lastly, help your children protect themselves now and into the future by educating them about some of the key dos and don’ts for online security. For example, make sure your kids know not to open emails or attachments from people they don’t know or to accept friend requests on social media sites from those they’re not properly familiar with.</div><div>Children also need to learn to be careful about which links they click on when they’re browsing online or reading emails. For instance, a common scam known as “pharming” can be a real issue. This term was created to reference a particular type of phishing attack where cybercriminals post links to seemingly commonly-visited and trusted websites (think social media pages, popular blogs, and big news sites), which are really fake versions created to look like the real ones.</div><div>If people click on these hacker-created websites, they’ll be asked to login or otherwise provide personal details. Many consumers, including children, get stung here because they think they’re inputting their sensitive details into proper accounts, but really it’s just cybercriminals finding a way to hijack data and accounts. Teach your kids, then, to only ever type in the URL address of sites where they need to login rather than following a link to get there.</div><img src="http://static.wixstatic.com/media/f6bccd_8dae6a4c85234792b54711b2821f44f4~mv2.jpg"/><div>Author Bio:</div><div>Jackie is a content coordinator and contributor that creates quality articles for topics like technology, home life, and education. She studied business management and is continually building positive relationships with other publishers and the internet community. </div></div>]]></content:encoded></item><item><title>Media Literacy: In California, It’s the Law.</title><description><![CDATA[California Governor Jerry Brown recently signed a bill that will help California students get the training they need to discern legitimate sources of information. The new bill requires the state Department of Education to provide schools with a list of resources and instructional materials on media literacy. Connecticut, Rhode Island, New Mexico, and Washington state have already passed similar legislation, and several other states are considering it. This should go a long way in solving the<img src="http://static.wixstatic.com/media/f6bccd_2aeb28a9d26a42d1a62bd5e0498b6e4d%7Emv2.jpg/v1/fill/w_647%2Ch_375/f6bccd_2aeb28a9d26a42d1a62bd5e0498b6e4d%7Emv2.jpg"/>]]></description><dc:creator>Diana Graber</dc:creator><link>https://www.cyberwise.org/single-post/2018/10/31/Media-Literacy-In-California-It%E2%80%99s-the-Law</link><guid>https://www.cyberwise.org/single-post/2018/10/31/Media-Literacy-In-California-It%E2%80%99s-the-Law</guid><pubDate>Wed, 31 Oct 2018 17:52:13 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_2aeb28a9d26a42d1a62bd5e0498b6e4d~mv2.jpg"/><div>California Governor Jerry Brown recently signed <a href="https://www.sfgate.com/news/bayarea/article/Gov-Brown-Signs-Media-Literacy-Bill-From-Napa-13236838.php">a bill</a> that will help California students get the training they need to discern legitimate sources of information. The new bill requires the state Department of Education to provide schools with a list of resources and instructional materials on media literacy. Connecticut, Rhode Island, New Mexico, and Washington state have already passed similar legislation, and several other states are considering it. This should go a long way in solving the problem of “fake” news.</div><div>I have two things to say about this: Hurrah! and What took so long?</div><div>It’s not new news that teaching media literacy, or how to critically evaluate media, is an essential skill that, sadly, most students lack. In 2016, researchers at the Stanford Graduate School of Education discovered that “despite their apparent social media savvy, young people’s ability to reason about the information on the Internet can be summed up in one word: bleak.”</div><div>Between January 2015 and June 2016, these researchers gathered data from students across 12 states and found that a majority were unable to discern the difference between actual news, advertisements, and sponsored content. According to the Stanford <a href="https://stacks.stanford.edu/file/druid:fv751yt5934/SHEG%20Evaluating%20Information%20Online.pdf">report</a>:</div><div>Our “digital natives” may be able to flit between Facebook and Twitter while simultaneously uploading a selfie to Instagram and texting a friend. But when it comes to evaluating information that flows through social media channels, they are easily duped.</div><div>This, of course, shouldn’t come as a surprise. After all, most adults are easily duped by online </div><img src="http://static.wixstatic.com/media/f6bccd_9403b23874584d378b793599794b3a67~mv2_d_1920_1314_s_2.jpg"/><div>information. But democracy works best when citizens operate from the same set of verifiable facts. And the best way to ensure that future citizens know how to discern fact from fiction is to teach them how to do this while we hold them captive in school.</div><div>Thankfully, two organizations have been working diligently towards this end. <a href="https://namle.net">NAMLE</a>, the National Association for Media Literacy in Education, is the leading voice, convener and resource to foster critical thinking and effective communication for empowered media participation. <a href="https://medialiteracynow.org">Media Literacy Now</a>is the leading national advocacy organization for media literacy education policy. This organization has provided much of the muscle behind the bill that was just signed in California.</div><div>The CA Bill</div><div>I live in Southern California and have been teaching media literacy for nearly a decade. Our school is home to <a href="http://www.cybercivics.com">Cyber Civics</a>, a three-year digital and media literacy curriculum now being taught at schools in 41 U.S. states and four other countries. These weekly in-classroom lessons for middle school students teach them digital citizenship, information literacy, and media literacy skills. Our </div><img src="http://static.wixstatic.com/media/f6bccd_0258703f75ca466b868ca7e3abff8020~mv2.jpg"/><div> philosophy is that media literacy is best served upon a foundation of digital citizenship (understanding how to use digital tools safely and wisely). Curiously, there are currently no standards in California for teaching students about digital citizenship (which covers cyberbullying, sexting, privacy, digital reputation management, and more), even though many would argue that these skills are just as important, if not more so, than knowing how discern credible information online. </div><div>Regardless, many schools are addressing digital citizenship and media literacy in the classroom, without a new law telling them they have to. The bill just signed will simply make it easier for all schools in California to find resources to do this. the State Department of Education is required to provide on its website, by July 1, 2019, a list of resources and instructional materials on media literacy, including media literacy professional development programs for teachers.</div><div>But Please Don’t Wait</div><div>There's no reason for teacher to wait until next summer to get a list of media literacy</div><div>resources, or to start teaching these lessons to their students. Waiting means that a whole class of seniors—some 1.7 million kids in California alone—will leave high school without the benefit of these lessons. This is unacceptable.</div><div>In addition to our own full year of media literacy lessons (<a href="http://www.cybercivics.com/year-3">the final level of Cyber Civics)</a>, here is a list of media literacy resources you can use today. Learn more about media literacy on our page devoted to the topic on this site.</div><div><a href="http://www.medialit.com/educator-resources">Center for Media Literacy, Educator Resources</a><a href="https://www.consortiumformedialiteracy.org/index.php?option=com_content&amp;view=category&amp;layout=blog&amp;id=12&amp;Itemid=24">Consortium for Media Literacy, Media Lit Moments</a><a href="http://www.cybercivics.com">Cyber Civics, Digital Citizenship, Information Literacy, and Media Literacy Curriculum</a><a href="http://lamplatoon.thelamp.org">LAMP, We Put Ads on Notice</a><a href="https://mediaeducationlab.com/curriculum/materials">Media Education Lab, Teaching Resources</a><a href="http://mediasmarts.ca/teacher-resources/find-lesson">Media Smarts, Lessons and Resources</a><a href="https://www.projectlooksharp.org/?action=kits">Project Look Sharp, Lesson Plans</a><a href="https://sheg.stanford.edu/history-lessons">Stanford History Education Group, Reading Like a Historian</a><a href="https://newslit.org/educators/checkology/">The News Literacy Project, Checkology</a></div></div>]]></content:encoded></item><item><title>Safety Strategies: What to Do When Your Child Has NO Awareness of Danger</title><description><![CDATA[If you’ve ever ‘lost’ your child in a department store or even your own neighborhood, you know the ice cold feeling of panic. Your heart races, palms sweat, and you run through a thousand negative scenarios in a matter of seconds. It’s every parents’ nightmare. Even when you’re reunited with your child and they’re safe and sound, it’s hard to shake the feelings of fear and anxiety when you consider what could have happened. These feelings are only magnified when you have a child who is on the<img src="http://static.wixstatic.com/media/f6bccd_992a0a4852cc4a2baeab07586961c42c%7Emv2.jpg/v1/fill/w_647%2Ch_363/f6bccd_992a0a4852cc4a2baeab07586961c42c%7Emv2.jpg"/>]]></description><dc:creator>Jackie Nunes, Wondermoms.org</dc:creator><link>https://www.cyberwise.org/single-post/2018/09/20/Safety-Strategies-What-to-Do-When-Your-Child-Has-NO-Awareness-of-Danger</link><guid>https://www.cyberwise.org/single-post/2018/09/20/Safety-Strategies-What-to-Do-When-Your-Child-Has-NO-Awareness-of-Danger</guid><pubDate>Thu, 20 Sep 2018 22:07:00 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_992a0a4852cc4a2baeab07586961c42c~mv2.jpg"/><div>If you’ve ever ‘lost’ your child in a department store or even your own neighborhood, you know the ice cold feeling of panic. Your heart races, palms sweat, and you run through a thousand negative scenarios in a matter of seconds. It’s every parents’ nightmare. Even when you’re reunited with your child and they’re safe and sound, it’s hard to shake the feelings of fear and anxiety when you consider what could have happened. These feelings are only magnified when you have a child who is on the autism spectrum or has other special needs.</div><div>Why Some Children Don’t Perceive Danger</div><div>When a person doesn’t respond to danger with fear, it means a small almond-shaped part of their brain called the amygdala is not correctly processing, identifying, and remembering what things are safe and what things are dangerous. When faced with danger, the amygdala’s job is to understand what the danger is and what to do about it. While known for determining danger levels, the amygdala has long been thought to play a <a href="http://snagglebox.com/article/autism-danger-awareness/">part in autism</a> as well. In addition, children with autism sometimes have difficulties with things like language skills, cause and effect, picturing scenarios that have not actually taken place, and interpreting feedback from their own bodies. Luckily, there are <a href="https://www.safety.com/autism-safety/#gref">precautions</a> you can take to keep your children safe.</div><div>Tips to Keep Your Kids Safe</div><div>If they’re prone to wandering: <a href="http://pediatrics.aappublications.org/content/130/5/870?sso=1&amp;sso_redirect_count=1&amp;nfstatus=401&amp;nftoken=00000000-0000-0000-0000-000000000000&amp;nfstatusdescription=ERROR%3a+No+local+token">Studies</a> have shown that kids who are on the autism spectrum are more likely to wander away from home, schools, and shopping center.</div><div>The most important thing to know when trying to locate a child who has wandered off is what type of wanderer your child is. Are they just trying to explore, or do they have a favorite place to go to? Is your child trying to get somewhere in particular, or are they running away from a potentially stressful situation?Speak to your child and see if you can figure out what triggers their need to wander off. Then address the issue appropriately by helping your child deal with their triggers in a healthier way.<div>Additionally, consider having your child wear an ID necklace or bracelet that has your contact information on it. Find out if your local law enforcement agency participates in <a href="https://projectlifesaver.org">Project Lifesaver</a>.</div></div><div>At Home: For most families, childproofing and hypervigilance are part of the toddler stage. Parents can often start breathing a bit more easily by the time their kids are ready for kindergarten. But if your child has no awareness of danger, you may never get to let your guard down. Your home should be one of the safest places for your child. There are a lot of precautions to consider when making your home a safe haven both when they’re young and as they get older.</div><div>Make sure you use brackets to secure furniture to walls, especially top-heavy items.Make sure all cleaning products are locked away somewhere out of reach of children. Think about storing them in the garage.Consider using key locks on your doors and setting up door alarms as a backup to prevent your child from leaving the home without you knowing. Always keep keys out of your child’s reach. If your child is prone to wandering, use a child locator.<div>Water can be a problem for children who have autism in more ways than one. First, it is very important to fence off any pools with self-closing gates and latches that are out of your child’s reach. Secondly, hot water can pose difficulties for children who have autism as they sometimes have trouble with their sensory perceptions, meaning they cannot feel temperatures as well. To counteract this, many parents simply <a href="https://www.cnet.com/how-to/how-to-adjust-the-temperature-of-your-water-heater/">turn down the temperature</a> on the home’s hot water heater. In an effort to make your children more independent, teach them to turn both the hot and cold water on, or place a mark on faucet handles showing the point at which the water becomes too hot.</div>Fire safety is one of the most important things to practice with your kids. Consider buying an alarm that will let you record your voice, as to not scare your child when it goes off. Take your child to visit the fire station so they can get used to what the firemen would look like dressed up in an emergency situation.</div><img src="http://static.wixstatic.com/media/f6bccd_1cb46b8461dc40f08dd4e7c0ed9dc7a2~mv2_d_1920_1275_s_2.jpg"/><div>Online: All children are vulnerable online, but kids with special needs are even more so. Children with no awareness of danger are unlikely to recognize inappropriate questions or behavior online.</div><div>Download games and other content onto computers and mobile devices and limit access to the Web. You can put devices into “airplane mode” or require a password to connect to WiFi or go online.Keep computers in common areas of your home, where you can monitor online activity.<div>Use filters andparental controls to block unapproved websites and images.</div>Install child-friendly browsers that are specifically designed to let young children explore safely.</div><div>At School: It’s vital that your children are safe while they’re trying to learn, and they spend a considerable amount of their time at school.</div><div>Make sure you become familiar with your child’s school and classroom before school begins. See if they can visit beforehand too, to familiarize themselves with the environment and meet their teacher.Meet with the principal and your child’s teacher and relay key information about your child.Be an active parent in your child’s school community.</div><div>In Public: Going on an outing can be a dangerous thing for a child with autism, as public environments can be unpredictable.</div><div>Explain to your child what will happen while you’re on the outing. Create a schedule for the outing and show your child photos of the places you will see.Practice traffic safety rules and possible scenarios like the checkout process at the store so your child knows what to expect.Make sure to keep outings short and have reasonable expectations for your child’s behavior.</div><img src="http://static.wixstatic.com/media/f6bccd_c9f8a4f594b84f9291e7275a45c54a84.jpg"/><div>Things to Remember When Creating a Safety Plan</div><div>School staff, therapists, extended family members, and neighbors are all people to keep in mind when creating a safety plan for your child. Make sure the people who take care of your child are aware of your safety plan at all times. Discuss any concerns about your child's safety with them.Visit places like school, friends’ houses, after-school facilities, and any other place your child will be regularly, and evaluate the safety of those places.Be aware of your child’s top safety risks. Some kids are prone to wander off, while others are more likely to consume something dangerous. Make sure you know your child’s predispositions and practice safety skills involving those things.<div>Take a <a href="https://www.cprcertified.com/our-courses">CPR and first aid class</a>. In a worst-case scenario, seconds can make a huge difference.</div>Make sure your child has some form of identification on their person at all times, with contact names and numbers listed. Alternatively, purchase a child locator and clip it to your child’s clothes.If your child is likely to need care and supervision as an adult, look into guardianship and other legal protections well before they turn 18.</div><div>To Sum It All Up</div><div>Being a parent of a child who has no awareness of danger can be a tough and sometimes scary job. Fortunately, there are many steps that can be taken to ensure your child’s safety. Measures taken at home, at school, and before trips out in public result in a better, safer time for you and your child. Having a safety plan in place is also a great way to be prepared for the unexpected on a day to day basis. It’s also an efficient way to keep friends, family, therapists, and anyone important in your child’s life informed on what they can do to keep your child as safe as possible.</div><img src="http://static.wixstatic.com/media/f6bccd_9ab3e5bd2d124ed0af1dfb1e72d8046d~mv2_d_2988_2988_s_4_2.jpg"/><div>Author: Jackie Nunes is a blogger at <a href="http://WonderMoms.org">WonderMoms.org</a>. She is a former pediatric nurse and now a full-time homeschool educator. She and her husband have three children. Their middle child suffered a traumatic brain injury when she was 4. Now 11 years old, she is hearing impaired and uses a wheelchair. Jackie and two other moms created Wonder Moms as a project to share real talk, helpful information, and practical advice with parents of kids who have intellectual disabilities, Down syndrome, autism, language and speech delays, deafness, chronic illness, and traumatic brain injury.</div></div>]]></content:encoded></item><item><title>Introducing The Next Generation in Parental Controls</title><description><![CDATA[Raising healthy and happy children in the digital age is a challenge for most parents. The use of smartphones, computers, and tablets for learning and communication has exploded. Most schools have integrated devices into their curriculum. Younger children get exposed to information that is far beyond their capacity to handle. This leads to technology addiction, internet/social media obsession, exposure to profanity & violence in games, exposure to mature content and unhealthy themes, online<img src="http://static.wixstatic.com/media/f6bccd_5b0dc7f10320426b858d1788fee395de.jpg/v1/fill/w_647%2Ch_431/f6bccd_5b0dc7f10320426b858d1788fee395de.jpg"/>]]></description><dc:creator>Suren Ramasubbu, CEO, Mobicip.com</dc:creator><link>https://www.cyberwise.org/single-post/2018/09/20/Introducing-The-Next-Generation-in-Parental-Controls</link><guid>https://www.cyberwise.org/single-post/2018/09/20/Introducing-The-Next-Generation-in-Parental-Controls</guid><pubDate>Thu, 20 Sep 2018 20:35:43 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_5b0dc7f10320426b858d1788fee395de.jpg"/><div>Raising healthy and happy children in the digital age is a challenge for most parents. The use of smartphones, computers, and tablets for learning and communication has exploded. Most schools have integrated devices into their curriculum. Younger children get exposed to information that is far beyond their capacity to handle. This leads to technology addiction, internet/social media obsession, exposure to profanity &amp; violence in games, exposure to mature content and unhealthy themes, online harassment &amp; cyber-bullying, peer pressure, and other related behavioral/health concerns.</div><div><a href="http://www.mobicip.com?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">Mobicip</a>, as the pioneer in mobile parental controls, has been at the forefront of innovation and our award-winning content filtering is a clear testament to that. From being “just a safe browser” and a very popular one at that, it has now evolved into a holistic parental control tool. After months of heavy lifting and R&amp;D, we are excited to introduce you to the all-new Mobicip Parental Control App. (Existing users, please check out <a href="https://content.mobicip.com/content/mobicip-stopped-working-why">how the update might affect your user experience</a>.)</div><div><a href="https://www.mobicip.com/features/screentime">Limit Screen Time</a>NEW!</div><div><a href="http://www.mobicip.com?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">Mobicip</a>allows you to setup a practical and healthy screen time schedule for your children. You can lock family devices as per schedule to ensure quality sleep, limit digital/screen addiction, practice safe driving, and have distraction-free study time.</div><div>Care for quality, gadget-free, family conversation during dinner? Check out the <a href="https://www.mobicip.com/features/screentime">Family Time for All</a> feature, which locks down all devices instantly.</div><img src="http://static.wixstatic.com/media/f6bccd_799c2619329440b3a0b3b7ffc2ab8615~mv2.png"/><div><a href="https://www.mobicip.com/features/location">Track Location</a>NEW!</div><div>Tired of constantly checking on your kids to see if they reached school or a friend’s home safely?</div><div>Mobicip’s <a href="https://www.mobicip.com/features/location">Location Tracker</a> is designed to offer parents well-deserved peace of mind. You can instantly locate your children and check on their whereabouts with a simple tap. You can also use this tool to find lost devices. Here’s a quick, simple, and nagging-proof way of keeping tabs on your child’s location.</div><img src="http://static.wixstatic.com/media/f6bccd_24e2927cb42842ee8e415db0225809d2~mv2.png"/><div><a href="https://www.mobicip.com/features/appmonitoring">Manage Apps &amp; Games</a>NEW!</div><div>Concerned about apps or games that your child has access to? Violent games, anonymous messaging apps, and dangerous/viral online challenges are warning signals.</div><div>Using Mobicip’s <a href="https://www.mobicip.com/features/appmonitoring">Manage Apps and Games</a>feature, you can keep an eye on apps that your children use, and restrict their use based on your family rules. Keeping up with the need for pre-emptive intervention in modern parenting, it allows you to block inappropriate apps even before they are downloaded!</div><img src="http://static.wixstatic.com/media/f6bccd_fc07c042b15f43cd99450f49791dbb97~mv2.png"/><div><a href="https://www.mobicip.com/features/blockwebsite">Advanced Internet Filtering</a>NEW!</div><div>Mobicip’s best-in-class award-winning <a href="https://www.mobicip.com/features/blockwebsite">filtering technology</a> allows only age-appropriate websites and blocks all other content. Mobicip can now filter Safari, Chrome &amp; other browsers. (Save your Mobicip Browser bookmarks before updating!) While Mobicip provides suggested filtering levels based on extensive parental feedback, you can customize the filtering categories based on your requirements. Draw a healthy boundary around the web and create a productive learning environment by keeping kids safe online and on task. Our advanced internet filter scans websites in real-time for inappropriate content, going far beyond traditional URL and keyword searches.</div><img src="http://static.wixstatic.com/media/f6bccd_8eb7378644994b23a8f3dcca53e6466f~mv2.png"/><div><a href="https://www.mobicip.com/features">Supervise Videos</a>NEW!</div><div>Supervise the video content your kids watch through popular streaming services. Control or limit streaming services your child has access to. </div><img src="http://static.wixstatic.com/media/f6bccd_452c11be7b6b4afd925d4525d43ae2ca~mv2.png"/><div><a href="https://www.mobicip.com/features">View Browsing History</a></div><div>View your family's browsing history on the go, at your convenience. With rich reporting that shows the title, image, or video, check what was seen at a glance. Set up weekly or daily email reports to receive an overview of browsing trends in your inbox.</div><img src="http://static.wixstatic.com/media/f6bccd_054c875ce2464c9a9780247b060a2cb4~mv2.png"/><div><a href="https://www.mobicip.com/features">Invite Co-Parent</a>NEW!</div><div>Invite another parent (or parents, or guardian, or babysitter, or anyone you share parenting duties with). Mobicip can be used in Parent Mode on any number of devices, giving only the required level of the access and controls. Work together as a team to educate your kids on the values of digital citizenship.</div><img src="http://static.wixstatic.com/media/f6bccd_c70f60ac9c1846f880c7cf6fe715da12~mv2.png"/><div><a href="https://www.mobicip.com/features">Simple Setup</a>NEW!</div><div>You can install and setup Mobicip on all family devices within a few minutes:</div><div>Download the Mobicip app on all the family devices.<div><a href="https://www.mobicip.com/content/how-do-i-setup-mobicip-parent-mode-my-iphone-or-ipad">Sign up as the parent</a> on your device and set up your family. Mobicip recommends age-appropriate restrictions that you can customize.</div>Scan the QR code to add a child device.</div><img src="http://static.wixstatic.com/media/f6bccd_eb0e62a0e8cb4216b386cc431e0e7438~mv2.png"/><div><a href="https://www.mobicip.com/features">All Family Devices</a>NEW!</div><div>Manage all family devices through an intuitive dashboard. Make informed decisions regarding your family’s digital experience.</div><img src="http://static.wixstatic.com/media/f6bccd_35dc0fbb35934f2baf19bf51a8180116~mv2.png"/><div>To check out these cool new features, update Mobicip on your family devices. Before you do so, check out how the update might affect your user experience.</div><div>New users can choose the free 1-device plan or a paid multi-device plan to accommodate all family devices.</div><div><a href="http://www.mobicip.com?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">CONVINCED? SIGN UP TODAY--IT'S FREE!!</a></div><div>Writing credit: </div><div>Authored by Suren, the co-founder and CEO of Mobicip, and a passionate advocate for mobile learning and Internet safety. Suren speaks or hosts panels at conferences and seminars on these topics for parents and educators. He also serves as a consultant for educational technology projects in K-12 schools and school districts. </div><div>Keep in touch with the latest on parenting, technology and education. Subscribe to the Mobicip newsletter. Learn more at www.mobicip.com.</div></div>]]></content:encoded></item><item><title>Protecting Your Child From a Romeo Pimp</title><description><![CDATA[“I thought he loved me and then he sold me.” -Romeo Pimp SurvivorHuman trafficking is the fastest growing criminal activity in the world. The term refers to a bevy of acts that includes both forced labor and sexual exploitation. Many people think of the movie “Taken” when they think of young girls being sex trafficked. More than 100,000 children a year are forced into sex trade, but this isn’t because of a massive kidnapping organization. Instead, it is because pimps now have easy access to<img src="http://static.wixstatic.com/media/f6bccd_d3aafa7ee91843658cedb35fde4c2aca%7Emv2_d_1920_1280_s_2.jpg"/>]]></description><dc:creator>Kazia Conway</dc:creator><link>https://www.cyberwise.org/single-post/2018/09/20/Protecting-Your-Child-From-a-Romeo-Pimp</link><guid>https://www.cyberwise.org/single-post/2018/09/20/Protecting-Your-Child-From-a-Romeo-Pimp</guid><pubDate>Thu, 20 Sep 2018 17:51:51 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_670334445922486caa15e6f5f95e2f7b~mv2.png"/><div>“I thought he loved me and then he sold me.” </div><div> -Romeo Pimp Survivor</div><div>Human trafficking is the fastest growing criminal activity in the world. The term refers to a bevy of acts that includes both forced labor and sexual exploitation. Many people think of the movie “Taken” when they think of young girls being sex trafficked. More than 100,000 children a year are forced into sex trade, but this isn’t because of a massive kidnapping organization. Instead, it is because pimps now have easy access to children through the internet and cell phones. One of the ways traffickers target girls and young women is through romantic relationships, both online and in person. These types of traffickers are often referred to as Romeo Pimps.</div><div>What is a Romeo Pimp?</div><div>A Romeo Pimp, or Loverboy, is the type of human trafficker who tries to get young girls, teens or women to fall in love with them. Romeo pimps will treat their victims as girlfriends upfront often showering them with gifts such as jewelry or clothing. This relationship and the victim’s trust will eventually be used to the pimp's advantage. The Romeo pimp will use his influence to exploit his victim by forcing her into the sex industry. </div><div>Gaining a victim’s trust can occur online or in person. In both online and in person scenarios, the pimp will promise a better future. If the victim and the pimp have never met the pimp will use these promises to lure his victims to his town. </div><div>While all of this is going on, the pimp will slowly work to isolate his intended victim from his or her family, friends and community. In essence, he creates an environment where the victim is totally dependent on him (or her) for material and emotional needs. </div><div>Once the brainwashing is complete, things will quickly change. The pimp will then convince her that he needs her help to make money. The money will support them and their dream. Refusal to turn tricks may result in a beating or other abuse until the victim complies. </div><img src="http://static.wixstatic.com/media/f6bccd_d3aafa7ee91843658cedb35fde4c2aca~mv2_d_1920_1280_s_2.jpg"/><div>How to Spot a Romeo Pimp</div><div><div>As a parent or guardian, you walk a fine line between giving your child age-appropriate privacy while trying to keep a watchful eye on who they are with and what they are doing online. But it is no coincidence that the increase in sex trafficking among children correlates with the rise of social media use.</div>The estimated age of entry into child prostitution is 12 years old. However, the Federal Bureau of Investigation also reports that girls as young as 9 years old have been known to be recruited for prostitution. </div><div>While the world may seem scarier today than it did 30 years ago, there are a few proactive steps you can take to protect your child from Romeo Pimp brainwashing.</div><div>Educate Yourself</div><div>The more you know about pimps, Romeo and otherwise, you’ll have a better chance at spotting the kinds of manipulation pimps use on girls and young women. It is also important that you become familiar with anti-trafficking organizations in your community.</div><div>Educate Your Daughters (And Sons)</div><div>We tend to get into little bubbles where we think our world is safe. This false sense of security may prevent us from speaking to our children about the harsh realities that exist in the world. As a result, most girls are unaware of the threats that surround them. Without knowledge, they become easy targets. Share information with your children based on their maturity level. Research indicates that pimps may begin recruiting as young as ten years old. </div><div>Your child should know: </div><div>What to do if he or she is approached by a stranger. What to do if adults in authority positions start giving your child special attention or gifts. That secrets between adults and children are inappropriate.</div><div>Monitor Outings</div><div>In general, we think of bars and dark alleys when we think of sex traffickers. However, the scary truth is in many cases they are in wholesome places like neighborhood or community parks, schools, malls and movie theaters looking for vulnerable young girls. Determining if your child is in a safe environment and being supervised by a trusted adult is necessary for their safety. If no adult is present, always encourage your child to stick with her group friends and never go off alone with anyone.</div><div>Monitor Communication and Web Use </div><div>The secrecy of text messaging is a benefit to sex traffickers. In many cases, they can quietly brainwash your child while you’re in the same room. Keep an eye on any new numbers that appear in your child’s call log. Moreover, ask questions! In addition, it is important that you ensure your child is not a part of any social media before they are old enough. Many of the popular sites have minimum age requirements spelled out during the registration process. If your child is old enough to have social media, always remind them to be mindful of what they post online. Identifying information such as the school name or sports team location can lead a trafficker right to your neighborhood or front door.</div><div>Know Your Child’s Friends</div><div>And their parents. Recruiters can be students at your child’s school or parents of students there looking to make some money. They’ll introduce your child to a pimp and get paid for bringing in a new girl. It is best that you know your child’s friends, as well as their families.</div><div>Keep An Eye Out For Older Boyfriends</div><div>Perhaps the most telling sign of a Romeo Pimp is an older guy seeking the affections of your child. Pimps don’t usually kidnap, they manipulate. The most prevalent form of trafficking is a man in his late teens or 20s selecting a teenage girl to make her fall in love. These men are constantly thinking of ways to trick young girls into doing what they want them to do. You should always be wary of whom your child is dating and thoroughly investigate them. Even if your child is over 18, he or she is not too old or mature to escape sex trafficking. </div><div>Shower Your Daughter With Love</div><div>Yes, it sounds cliche, but these pimps are often able to brainwash their victims because of self-esteem issues, broken homes or generally troubled childhoods. While all genders are affected by sex trafficking, low self-esteem particularly affects adolescent and teenage girls. This is exactly why Romeo Pimps prey on this age group. Because of this, it is important that you reaffirm your child’s self-worth every chance you get. The best way to combat low self-esteem is to give your child a shield of love. Reminding your child of her worth will do wonders to protect from her attempts to lure her into the trafficking web. Additionally, reminding your child that she is loved and that your home is a safe place will protect her from the threats of a pimp. Girls who are trafficked are often living in constant fear. </div><div>Her pimp may threaten her by saying, “If you stop working or if you tell anyone, I’ll kill your family;” or they may say “If you stop I’ll tell your parents what you did and they’ll be disgusted that they will never love you again.” Make your home a safe place you are reminding your children that you will do anything to help and protect them. Open communication with your child is the best preventative measure.</div><img src="http://static.wixstatic.com/media/f6bccd_fef402c22d614b09a87a4d1c43db33e0~mv2.png"/><div>Get Involved!</div><div>Your child might be safe, but as noted, traffickers often prey on girls who come from broken homes. Don’t let your concern for this issue begin and end at your child. By helping girls with no families to look after them you are taking the power away from sex traffickers. Look for opportunities to volunteer, fundraise and raise awareness around the issue of sex trafficking.</div><div>Getting the Help You Deserve</div><div>If you are a victim of human trafficking or suspect that internet sex trafficking is occurring in your community, we suggest you <div>call the <a href="https://polarisproject.org">Polaris Project</a>.</div> Polaris is a nationwide non-profit. The organization employs experienced professionals to guide victims and survivors of human trafficking. Also, you may c<div>all the <a href="https://humantraffickinghotline.org">National Human Trafficking Hotline.</a></div></div><div>Professionals undergo training to respond to human trafficking victims with shelter and security. Additionally, the can help victims get access to medical treatment, food, clothing, legal services, counseling, and other aid. If you are a human sex trafficking victim, or if you know of a situation of human trafficking, we can help you get assistance and navigate the legal system.</div><div>Please don’t hesitate to contact a human trafficking lawyer from <a href="https://www.carlsonattorneys.com">The Carlson Law Firm</a>. If you or a loved one has been a victim of human trafficking or you suspect human trafficking is occurring in your community give us a call.</div><div>We care and we can help.</div><div>When you are looking for a compassionate and yet hard-hitting legal advocate, you can be confident that you will find the right representative at The Carlson Law Firm! </div><div><a href="https://www.carlsonattorneys.com/contact/">Contact us for a free consultation now</a>.</div></div>]]></content:encoded></item><item><title>Kids on Devices: Where Should You Draw the Line?</title><description><![CDATA[What part of your children’s online activity do you monitor? But wait, SHOULD you even monitor what they are up to on the internet? Ever since the inception of the World Wide Web, parents have been faced with the very dangerous yet very real problem of exposing their children to the dangers on the internet. Cyberbullying, identity theft, and extraction of sensitive data and information from the unguarded, innocent minds of children are some of the real online concerns out there.This debate over<img src="http://static.wixstatic.com/media/f6bccd_99b2ba467d004b54b5cb2f08044b9ea9%7Emv2.jpg"/>]]></description><dc:creator>Anitha, Mobicip.com</dc:creator><link>https://www.cyberwise.org/single-post/2018/08/16/Kids-on-Devices-Where-Should-you-Draw-the-line</link><guid>https://www.cyberwise.org/single-post/2018/08/16/Kids-on-Devices-Where-Should-you-Draw-the-line</guid><pubDate>Thu, 16 Aug 2018 22:46:04 +0000</pubDate><content:encoded><![CDATA[<div><div>What part of your children’s online activity do you monitor? But wait, SHOULD you even monitor what they are up to on the internet? Ever since the inception of the World Wide Web, parents have been faced with the very dangerous yet very real problem of exposing their children to the dangers on the internet. Cyberbullying, identity theft, and extraction of sensitive data and information from the unguarded, innocent minds of children are some of the real online concerns out there.</div><div>This debate over whether or not parents should monitor their children’s online activity has intensified over the past few years. And there’s really no surprise there, considering that in the last decade alone, the number of mobile apps and sites coming under the social media umbrella have increased exponentially.</div><div> The <a href="https://www.smartinsights.com/social-media-marketing/social-media-strategy/new-global-social-media-research/">number of internet users</a>around the world is increasing by 7% each year on an average, and currently, more than 3 billion of the 4 billion internet users are on one or more social media platforms. That is 3 billion strangers who could potentially contact or influence your children.</div><div>There is an undeniable pressure on children to integrate into a system which their peers have deemed as “cool”… and if they don’t, they might be considered misfits! The compulsion to join and maintain a fashionable social media profile is straining the lives of millions of children and young adults around the globe. This is stunting their cognitive abilities and personality development in the long run. More than <a href="https://www.telegraph.co.uk/news/health/children/12147629/Children-ignore-age-limits-by-opening-social-media-accounts.html">75% of children in the US</a>aged 10-12 have lied on their social media profile to open an account while being under-aged. More than 95% of children between 13-18 are on social media!</div><div>There is no dearth of examples of online abusers manipulating and blackmailing children into being helplessly submissive. And clearly, the owners of social media platforms have failed to foolproof the registration process. As the world is going through a paradigm shift, moving to the online world, fake account holders and propagators of hate are arguably the biggest threat to society today.</div><div>So, is the solution to this problem not allowing children to join these social networking sites? Or is it to constantly monitor their online activity?</div><img src="http://static.wixstatic.com/media/f6bccd_99b2ba467d004b54b5cb2f08044b9ea9~mv2.jpg"/><div>It is unfortunate for your children that everything they say or do online leaves behind a digital footprint. You cannot turn a deaf ear to the issues of cyber-bullying either.</div><div> On the other hand, if you monitor their online activity too closely, your children may see you as an overbearing parent who ignores their privacy. Think about whether you would have wanted your parents to know everything you were up to as a child! The answer would, in all probability, be a resounding ‘NO’!</div><div>What is the solution then? The answer to this problem lies in collective cooperation and effective implementation. There are several aspects to this approach, and only when they all work in unison can there be a resolution to this conundrum. From the children’s side, schools need to take on part of the moral responsibility to properly educate them about the consequences of having an uber-active social media profile. The education system needs to address the issue of cyberbullying and work carefully to nurture children in a healthy way and equip them with the necessary support system it takes to handle and report bullying.</div><div> Until social media matures into a space for healthy collaboration and learning for children, parents do have to keep an eye on their children’s online activity. But it is imperative that parents do not go about it in an overbearing fashion that could embarrass their children. Parents can make social media fun for their children and make them look forward to healthy virtual socialization with their peers. There are several <a href="http://www.mobicip.com?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">applications</a>that parents can use to monitor their children’s activity on the web without being too invasive.</div><div> Social media platform owners have a societal obligation to duly authenticate and verify every user who signs up to use their application. If the proper criteria are not met, then stringent rules have to be kept in place to deny access to the application. On the contrary, the current reality is that not even adults are spared the ill effects of social media: fake news, fake accounts, and online hate. As the gatekeepers of the virtual world, tycoons like Mark Zuckerberg, Kevin Systorm, and Jack Dorsey have much to do when it comes to proper authentication and curbing of online hate speech.</div><img src="http://static.wixstatic.com/media/f6bccd_390c0003d536402794e2daad33f05ffa~mv2.jpg"/><div>Several children are unwilling to attend school because of their sincerely held fear of confrontation with their online bullies. Many adults would be heartbroken by the intense pressures and pains that children have to go through in today’s digital world. Peer pressure and <a href="https://www.teentor.com/articles/protect-your-child-from-social-media-addiction.htm">addiction</a> mean far different and far more damaging things now than they did twenty years ago. As our children take on this new world of online bullying and cyber crimes, we need to join forces with them to tackle these issues together.</div><div>So, should you be monitoring your children’s online activity? We are leaning towards: Yes.</div><div>Writing credit: Authored by Anitha,, a mother of two teens with interests in EdTech and a strong advocate for Digital Citizenship.</div><div>Keep in touch with the latest on parenting, technology and education. Subscribe to the Mobicip newsletter. Learn more at <a href="http://www.mobicip.com/?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">http://bit.ly/mobicipcyberwise</a></div></div>]]></content:encoded></item><item><title>Don't Tweet Stupid Stuff</title><description><![CDATA[Don’t tweet stupid stuff. Seems like no-brainer advice, doesn’t it? Yet, if one's brain is not fully-functional (we’ll get to that in a minute), following this simple guideline is harder than it seems.Case(s) in point… In the past few weeks, the offensive tweets of three Major League Baseball players came back to bite each of them in very public and embarrassing ways. In each case, the racist and homophobic tweets now causing their P.R. nightmares were posted when each athlete was still in high<img src="http://static.wixstatic.com/media/f6bccd_6672b703f9d246d690677694b39503cd%7Emv2.png/v1/fill/w_450%2Ch_344/f6bccd_6672b703f9d246d690677694b39503cd%7Emv2.png"/>]]></description><dc:creator>Diana Graber</dc:creator><link>https://www.cyberwise.org/single-post/2018/08/03/Dont-Tweet-Stupid-Stuff</link><guid>https://www.cyberwise.org/single-post/2018/08/03/Dont-Tweet-Stupid-Stuff</guid><pubDate>Fri, 03 Aug 2018 22:43:30 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_6672b703f9d246d690677694b39503cd~mv2.png"/><div>Don’t tweet stupid stuff. Seems like no-brainer advice, doesn’t it? Yet, if one's brain is not fully-functional (we’ll get to that in a minute), following this simple guideline is harder than it seems.</div><div>Case(s) in point… In the past few weeks, the offensive tweets of three Major League Baseball players came back to bite each of them in very public and embarrassing ways. In each case, the racist and homophobic tweets now causing their P.R. nightmares were posted when each athlete was still in high school:</div><div>Milwaukee Brewers’ <a href="https://www.huffingtonpost.com/entry/josh-hader-tweets-all-star-game_us_5b4f10bce4b0fd5c73c0a8f2">Josh Hader’s teenage Twitter history</a> shows a string a messages filled with racist, homophobic and misogynist sentiments.</div><div>Atlanta Braves pitcher <a href="http://www.chicagotribune.com/sports/baseball/ct-spt-sean-newcomb-offensive-tweets-20180730-story.html">Sean Newcomb’s offensive teenage tweets</a> include a racial epithet that was part of a rap lyric, and several others that include gay slurs.</div><div>Washington Nationals shortstop <a href="https://www.si.com/mlb/2018/07/31/trea-turner-apology-racist-homophobic-tweets-nationals">Trea Turner’s embarrassing tweets</a>, posted when he was 18-years-old, include anti-gay comments and a joke with racist undertones.</div><img src="http://static.wixstatic.com/media/f6bccd_e9eea0ddd3854497868d14e0ae3d777a~mv2_d_1400_1316_s_2.jpeg"/><div>While these tweets speak volumes about each athlete’s (albeit, still under development) character, lots of people are asking if it is fair to judge each man by his adolescent posts. But that’s the wrong question, because fair or not, we live in a world where each of us is judged by what we post online. </div><div>They Were Educationally-Disadvantaged</div><img src="http://static.wixstatic.com/media/f6bccd_4c3200f463ca49ed8a54c7d71b6023dc~mv2.jpg"/><div>I’m guessing these athletes didn’t benefit from digital literacy lessons in school. Had they been one of my <a href="http://www.cybercivics.com">Cyber Civics</a>students they would have participated in a “digital background check” lesson in sixth grade, well before they started tweeting dumb stuff.</div><div>During this activity students pretend to be college admissions officers tasked with the job of deciding who to award a full athletic scholarship to. They make their decision based upon a careful review of each candidate’s (fictional) digital reputation (a collection of everything that person had posted and that others had posted about that person online).</div><div>This lesson thrusts students into the proverbial driver’s seat, because when you’re about to cruise the Information Superhighway, it’s important to know how to drive.</div><div>Digital literacy lessons benefit teenage brains still under construction. Sure, even after lessons like the one described above, some kids still post stupid stuff. But often a more clear-headed classmate (who also participated in the lesson) will see or hear about the offending tweet and warn their classmate of its stupidity. How do I know this? I’ve seen it happen time and again. Peers are much more effective digital mentors than parents.</div><div>When It Comes To Tweeting, Teenagers Have a Brain Deficit</div><img src="http://static.wixstatic.com/media/f6bccd_b2b23e30d9a042c5922679f851cafd16~mv2_d_1231_1238_s_2.png"/><div>Now, getting back to the brain. Aside from the fact that each of these tweets were, at the very least, mean-spirited, these men were not only educationally-disadvantaged, they were biologically disadvantaged too.</div><div>Recent advances in brain imaging reveal that certain parts of the brain are not fully functional until about age twenty-five. One of the last areas of the brain to fully mature is the prefrontal cortex, which is largely responsible for rational thought and good judgment, two capacities that come in handy when using social media. Without a fully developed prefrontal cortex, teens process information with their amygdala, or their emotions, and that makes them more likely to:</div><div>Act on impulseMisread or misinterpret social and emotional cues<div>Engage in dangerous or risky behavior.1</div></div><div>For example, although a teenager might understand the possible consequences of posting a stupid tweet, the part of his brain that should be warning, “Hey, hold on a minute—better not post this one,” isn’t fully operational yet. So guess what happens? The unfortunate tweet gets posted, shared, and might come back to haunt him later, as in the cases of these MLB players.</div><div>The only silver lining to the latest of a long string of stupid tweets that come back to haunt tweeters later, is that these unfortunate events shed light on the importance of teaching kids to be smart online. Perhaps we should thank these MLB players for their very public service--reminding us of our collective failure...neglecting to teach the first generation of digital kids that there can be serious offline consequences, even years later, for their online actions.</div><div>1. American Academy of Child and Adolescent Psychiatry, “The Teen Brain: Behavior, Problem Solving and Decision Making,” Facts for Families, no. 95 (September 2016). Retrieved on December 29, 2017 from https://www.aacap.org/App_Themes/AACAP/docs/facts_for_families/95_the_teen_brain_behavior_problem_solving_and_decision_making.pdf. </div><img src="http://static.wixstatic.com/media/f6bccd_eba3a73272a54e8f9fc5c6308951a2c6~mv2_d_1800_2700_s_2.jpg"/><div>Written By: Diana Graber and partially excerpted from her forthcoming book &quot;<a href="https://www.amazon.com/Raising-Humans-Digital-World-Relationship-ebook/dp/B07C64HR9R/ref=sr_1_1?ie=UTF8&amp;qid=1530976032&amp;sr=8-1&amp;keywords=raising+humans+in+a+digital+world&amp;dpID=51idVwNgtyL&amp;preST=_SY445_QL70_&amp;dpSrc=srch">Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship With Technology&quot;</a>(HarperCollins Leadership/December 2018).</div></div>]]></content:encoded></item><item><title>Is OMEGLE Okay for Kids? What Every Parent Should Know</title><description><![CDATA[Getting to meet new people is fun! There's the excitement of bouncing off one's ideas on someone new and exploring alternate perspectives with another person who has similar interests. Besides, there’s the novelty of it. As parents, we all want our kids to be exposed to a variety of people, places, and experiences that shape them into dynamic and inspired adults. But when the person our child is interacting with is a total stranger, with a completely virtual experience that goes beyond our<img src="http://static.wixstatic.com/media/f6bccd_3cf48d0bb4a14340ab06e7c728c1ed42%7Emv2.jpg"/>]]></description><dc:creator>Prithiv Sassisegarane, Mobicip</dc:creator><link>https://www.cyberwise.org/single-post/2018/07/31/IS-OMEGLE-OK-FOR-KIDS-WHAT-EVERY-PARENT-SHOULD-KNOW</link><guid>https://www.cyberwise.org/single-post/2018/07/31/IS-OMEGLE-OK-FOR-KIDS-WHAT-EVERY-PARENT-SHOULD-KNOW</guid><pubDate>Wed, 01 Aug 2018 05:31:15 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_3cf48d0bb4a14340ab06e7c728c1ed42~mv2.jpg"/><div>Getting to meet new people is fun! There's the excitement of bouncing off one's ideas on someone new and exploring alternate perspectives with another person who has similar interests. Besides, there’s the novelty of it. As parents, we all want our kids to be exposed to a variety of people, places, and experiences that shape them into dynamic and inspired adults. But when the person our child is interacting with is a total stranger, with a completely virtual experience that goes beyond our purview and control, is the benefit worth the risk?</div><img src="http://static.wixstatic.com/media/f6bccd_6635653ebbd2400fb24a16b0bbbf98ac~mv2.jpg"/><div><a href="https://www.omegle.com/"></a></div><div><a href="https://www.omegle.com/">Omegle</a> is a website that provides teenagers the enticing proposition of talking to people who are totally unknown. The website's tagline says it all: 'Talk to Strangers'!</div><div>So what happens on Omegle? Randomly paired adolescent users engage in chats that are primarily based on instant text message (although conversations can be video-enabled with webcams as well). Invariably, dialogue is initiated by a request for the other person’s age, sex and location - ASL. An acronym the site's subscribers are well acquainted with! Since the website is intended specifically for chatting anonymously with strangers, these three pieces of information - age, sex and location - are valuable filters. Unfortunately, this information can also be used by adults with malicious intentions to identify potential targets.</div><div>So why you should be concerned? Well for starters, even the creators of Omegle advise parental supervision for users up to the age of eighteen. Secondly, the activity on the site does not go unnoticed - the time the user's chat began, the user's IP address, their computer's ID tag that is randomly generated along with the same information for the user's chat partner. Everything that the users disclose about themselves - even seemingly harmless yet sensitive and revealing information - is archived on the website's servers for about four months.</div><div>Conversations with strangers can be monitored or unmonitored, depending on the user's preference. But while privacy might make it seem like ‘unmonitored’ is the obvious way to go, note that users are warned by Omegle that there is a greater possibility they will find themselves at the receiving end of explicit and inappropriate content when initiating an unmonitored conversation.</div><div>And finally, users can save conversations at the end of a session. One, therefore, has no real control over how these strangers your child is interacting with on the website might use all the chat related information in order to serve their ends.</div><div>Users can even enter into what is known as 'Spy Mode' in Omegle. In ‘Spy Mode’, they can ask a question to two people engaged in a chat conversation and also view their conversation. Alternately, the 'Spy Mode' feature also allows a user to discuss with another person a question posed by a stranger.</div><div>The website hasn't exactly been free from controversy. In 2014, a twenty-two-year-old man sexually assaulted two thirteen-year-old girls he made friends with on Omegle. The girls were lured into a private meeting and later taken to the assaulter's house where the atrocities were perpetrated. In 2017, a virtual assailant manipulated two underage girls into engaging in explicit and inappropriate conversations that were later used to threaten the girls. These are just two examples in a long list of notorious incidents that has earned Omegle dubious credibility.</div><div>So how do you safeguard your children from using such a site? In an ideal situation, the best way to steer clear of danger would be to avoid using the site completely. Mentoring your child on the perils of such sites and applications also helps immensely. Setting limits and ground rules while they surf the internet is also advisable. Nevertheless, there are commercially available parental control options that to some extent can help you curb, although not completely rule out, the probability of possible harm.</div><img src="http://static.wixstatic.com/media/f6bccd_d21f5fcf8b2d4be7825cfe2f69e662ef~mv2.jpg"/><div>The question parents ought to be asking themselves is &quot;Is it worth it?&quot; When the site's homepage itself confesses that &quot;Predators have been known to use Omegle&quot;, what good could possibly come out of indulging in such websites? And even assuming the positives that can be attributed to the website, they can, perhaps, be accessed in greater measure and with more benefits from other healthier and more transparent avenues. Parental supervision is not just advised, but necessary.</div><div>Writing credit: Authored by Prithiv, a Mobicip researcher who writes about the effects of technology on health and well-being.</div></div>]]></content:encoded></item><item><title>Pop-up Mania: Cookies at Every Turn</title><description><![CDATA[Have you noticed an increase lately in updates and emails from your social media, shopping, or email accounts? Noticed that businesses that you have accounts with (like your bank) are sending you more notices about new privacy policies in the past few months? Are you suddenly getting popup messages about cookies with every site you visit?Thanks to a massive overhaul to privacy regulations that went into effect in May, companies are required to update their privacy policies. While it may be<img src="http://static.wixstatic.com/media/f6bccd_e901ea649f5d4d788aced7eae764039d%7Emv2.jpg/v1/fill/w_647%2Ch_303/f6bccd_e901ea649f5d4d788aced7eae764039d%7Emv2.jpg"/>]]></description><link>https://www.cyberwise.org/single-post/2018/07/31/Pop-up-Mania-Cookies-at-Every-Turn</link><guid>https://www.cyberwise.org/single-post/2018/07/31/Pop-up-Mania-Cookies-at-Every-Turn</guid><pubDate>Wed, 01 Aug 2018 05:01:47 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_e901ea649f5d4d788aced7eae764039d~mv2.jpg"/><div>Have you noticed an increase lately in updates and emails from your social media, shopping, or email accounts? Noticed that businesses that you have accounts with (like your bank) are sending you more notices about new privacy policies in the past few months? Are you suddenly getting popup messages about cookies with every site you visit?</div><div>Thanks to a massive overhaul to privacy regulations that went into effect in May, companies are required to update their privacy policies. While it may be annoying, it signals a new wave in personal privacy protection and is actually good news for you. In fact, now is an excellent time to take advantage of these changes and do some updating yourself.</div><div>I’m sure you’ve seen all the news stories about companies and social media outlets like Facebook sharing your personal information with outside companies. All the changes to privacy policies that you’re seeing are not just a reaction to that. Rather, they have been in the works for a long time in the form of a new law passed in Europe called<a href="https://www.eugdpr.org/">General Data Protection Regulation</a> (or “GDPR” for short).</div><img src="http://static.wixstatic.com/media/f6bccd_f67d6fd8223442c7ae0ffc183751e489~mv2.jpg"/><div>GDPR is the most significant change to data privacy in over 20 years. It forces companies to be more transparent about what personal information they collect and what they do with that data. Their privacy policies can no longer be vague and full of legal jargon.</div><div>Organizations must be clear, and their policies must be easy to read and understand. Plus, organizations must now ask for your permission to access any of your data and can no longer use a generic release that gives them the rights to all your data in order to buy their goods or use their service.</div><div>This new law and others around the world are changing how organizations handle your personal data. GDPR in particular affects any organization that does business with individuals in the EU. While GDPR is specific to EU citizens, most international companies have updated their policies and standards across the board to avoid heavy fines. </div><div>All this serves as a reminder to review what information sites may store about you and what they do with that information. So, what do you need to do? Well, you could do what you have probably done in the past, which is nothing, and things will be set for you by the company. However, I recommend that you take this opportunity to review your privacy settings for the sites you visit frequently and reset all your privacy settings on all of your accounts. Take a moment to read what each site asks for before clicking “yes.” You no longer have to be an attorney to understand most of their policies and settings, so it won’t take you too long to do this.</div><div>Typically, you will find a few different options that you need to review and set that will help keep your private information private. In most cases, you no longer must agree to receive ALL of a company’s emails or notices. Instead, you can opt in or out of specific ones. If you don’t want them to contact you about special offers or specials, you can now say no while remaining on their general mailing list. </div><img src="http://static.wixstatic.com/media/f6bccd_759747686163446e9be2fa353076af76~mv2_d_1920_1280_s_2.jpg"/><div>Now is the perfect opportunity to review the hygiene of your personal data. Be sure to go through all your social media and other online accounts, look them over again and change your privacy settings to protect your data.</div><div>And when done with yours, help your children or elderly parents reset theirs.</div><div>Most of all, remember that when in doubt, “Less is Best.”</div><div>` ` `<div>` ` `<div>` ` `<div>` ` `<div>` ` `<div>` ` `<div>` ` `<div>` ` `` ` `</div></div></div></div></div></div></div></div><img src="http://static.wixstatic.com/media/f6bccd_e93e42b007b34f28a80df11b296ef184~mv2.jpg"/><div>About the author: Patrick Craven is the director for the Center for Cyber Safety and Education (Center), a non-profit charitable trust committed to making the cyber world a safer place for everyone. The Center works to ensure that people across the globe have a positive and safe experience online through their educational programs, scholarships, and research. Visit <a href="http://www.iamcybersafe.org">www.iamcybersafe.org</a>. If you have questions or topic ideas, please send them to center@isc2.org</div></div>]]></content:encoded></item><item><title>Screen Time and Technology &quot;Addiction&quot;</title><description><![CDATA["Technology addiction"* is a new and rapidly growing problem among today’s population, but most susceptible are children and teens. Their brains are not fully developed, and without careful family rules and regulations, it may be difficult to tear them away from the seductive embrace of a tablet, phone, or video game system. Teens who struggle with issues like depression or anxiety may have even more problems with screen addiction, as they can withdraw from the stressful outside world and<img src="http://static.wixstatic.com/media/f6bccd_1c0c724be32a48e7b755f39587d3238a%7Emv2.png/v1/fill/w_626%2Ch_358/f6bccd_1c0c724be32a48e7b755f39587d3238a%7Emv2.png"/>]]></description><dc:creator>Sandi Lilly</dc:creator><link>https://www.cyberwise.org/single-post/2018/07/23/Screen-Time-and-Technology-Addiction</link><guid>https://www.cyberwise.org/single-post/2018/07/23/Screen-Time-and-Technology-Addiction</guid><pubDate>Mon, 23 Jul 2018 15:45:14 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_1c0c724be32a48e7b755f39587d3238a~mv2.png"/><div>&quot;Technology addiction&quot;* is a new and rapidly growing problem among today’s population, but most susceptible are children and teens. Their brains are not fully developed, and without careful family rules and regulations, it may be difficult to tear them away from the seductive embrace of a tablet, phone, or video game system. Teens who struggle with issues like depression or anxiety may have even more problems with screen addiction, as they can withdraw from the stressful outside world and retreat into the “seemingly safer” world inside their phone or tablet.</div><div>Over time, adolescents can begin to experience <a href="http://theinstitute.ieee.org/ieee-roundup/blogs/blog/medical-experts-say-addiction-to-technology-is-a-growing-concern">symptoms of withdrawal</a> when they are removed from their technological devices if they use them to excess. They may behave similarly to other addicts, becoming angry, anxious, and even somewhat aggressive if they are asked to take time away and do alternative activities.</div><div>Avoiding technology addiction is very difficult, as the society, peer pressure, and a desire for convenience make allowing children and teens access to electronic devices more and more necessary. The devices aren’t simply used for entertainment any longer, instead, they’re used to keep track of family calendars, communicate with loved ones, send and receive important messages in emergencies, and share pictures quickly and easily. While technology allows us to stay more connected with our friends and families than ever before, it can also have a darker side. Many applications that are used by and marketed to teens are designed with one thing in mind -- continued daily use.</div><div>An Environment Designed to Create Addictive Tendencies</div><img src="http://static.wixstatic.com/media/f6bccd_7a25311e64c14a6f83e99865a41a2e6c~mv2.png"/><div>Many technologies, particularly social media and games, are specifically designed to deeply engage users to keep them playing or scrolling through their feed. This is an explicit design choice and is supported by psychologists and design specialists whose goal is to increase ‘stickiness.’ The goal is to ensure that users log in on a regular basis, stay attached to the application, and engage with it as frequently as possible. In exchange, the individual using it gets the reward of a notification, a “like”, and response to a message. This doesn’t occur on any type of regular schedule, but it occurs just frequently enough to keep the teen brains engaged and interested. The very design of the app is stacked against the parent, and it’s nearly impossible to win. The programs themselves are designed to be addictive, to keep kids logging in and responding. And that’s just <a href="http://content.mobicip.com/content/age-social-media">social networking applications</a> -- gaming applications are far more overt and addictive.</div><div>Children Obtain Phones at Young Ages</div><img src="http://static.wixstatic.com/media/f6bccd_4446288c5a1746769966513159a2123c~mv2.png"/><div>Children are getting cell phones at younger and younger ages, with a large percentage obtaining their first smartphone around the age of ten. This is almost always done for good intentions, to allow connectivity between child and parent and to help keep the child safe, but can easily lead to negative consequences. Parents who want to keep their children in contact, but who don’t want them to have access to all of the elements of a smartphone, may want to opt for more than one device in the home, a flip phone for texting and calls and a tablet or computer for gaming and other communication. </div><div><a href="http://www.mobicip.com/?tap_a=478-0cfcfe&amp;tap_s=246567-4e0cb1">TRY PARENTAL CONTROL SOFTWARE</a></div><div>Teenage and Adolescent Brains</div><img src="http://static.wixstatic.com/media/f6bccd_171f26b188a74abbb2d41d597c71abc2~mv2.png"/><div>The human brain isn’t fully developed for <a href="https://www.npr.org/templates/story/story.php?storyId=141164708">rational decision making</a> until around the age of 25. This means that when you hand a teenager a smartphone with no parental controls on it, you’re providing them with free access to the internet, in the privacy of their bedroom, bathroom, and friends’ homes, without them having adult decision-making skills. It’s important to ask yourself if this is the decision that you want to make. Essentially, you’re setting the child up for failure, as their impulse control skills are far less than those of an adult, and while they may try to do the morally right thing, it can be extraordinarily difficult for them to always make the best decision. In some cases, they will be experiencing peer pressure to do the wrong thing. In others, they will be exposed to media that grown adults have issues staying away from. In still others, they may just make incorrect decisions. Their brains simply aren’t developed enough to fully process all of the risks at hand.</div><div>What Can Parents Do?</div><img src="http://static.wixstatic.com/media/f6bccd_fed3039db730429d987ac58c68f67aba~mv2.png"/><div>For this reason, it’s extremely important for you to take advantage of <a href="http://www.cyberwise.org/parental-control-software">parental control</a> options. While you can start with the built-in options that the phone comes with, and they will provide you quite a bit of control, you may also find that you want to install a specific software package to monitor what they are doing online. Some parents prefer to take a tiered approach, beginning with the controls that come with the device and then moving up to a more advanced program with additional features as it becomes necessary.</div><div>There are many options for parental control software available for nearly every platform. These programs and apps allow you to monitor your child’s website and app usage, when and for how long these are used and put software enforced rules around that usage. If the child’s bedtime is 9, you can disable their ability to get online or even send text messages after that time. These limits can help keep the child from making poor decisions about device use, as they will actually help the device assist you in maintaining the house rules.</div><div>Another option is to have a place in your home that is a dedicated charging station for all devices. Devices go into the docking station and are charged, then not accessed after bedtime. This can help ensure that <a href="https://www.cnet.com/how-to/how-to-stop-sleeping-with-your-phone/">everyone in the family gets good sleep</a> and that no one is using a device when they should be spending time with their loved ones.</div><div>As much as we need to trust and honor our children’s privacy, the unfortunate truth is that it helps to trust them to make good decisions but to also reinforce our rules. This allows them to learn limits with regard to technology so that they can, in turn, set limits for themselves.</div><div>*Tech &quot;addiction&quot; is not a clinical diagnosis.</div><div>Sandi Lilly, a Mobicip blogger who writes about health and technology, while homeschooling her two children full time.</div></div>]]></content:encoded></item><item><title>20 YouTube Channels Your Kids Probably Already Follow</title><description><![CDATA[YouTube is one of the world's largest online platforms... period. It's become such an encyclopedia of content that almost anything and everything can be found on it, whether it's travel tips, step-by-step DiY processes, lifestyle, health, sports or, really, anything else! There's no denying YouTube's popularity among the younger generation.However, it's important that children be influenced by the right kind of online content. Here's a list of YouTube personalities and channels your children are<img src="http://static.wixstatic.com/media/f6bccd_5c2a57d121184decb21063b1023c3406%7Emv2.jpg"/>]]></description><dc:creator>Suren Ramasubbu, CEO, Mobicip.com</dc:creator><link>https://www.cyberwise.org/single-post/2018/06/29/20-YouTube-Channels-Your-Kids-Probably-Already-Follow</link><guid>https://www.cyberwise.org/single-post/2018/06/29/20-YouTube-Channels-Your-Kids-Probably-Already-Follow</guid><pubDate>Thu, 05 Jul 2018 19:15:00 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_5c2a57d121184decb21063b1023c3406~mv2.jpg"/><div><a href="https://www.youtube.com/user/CyberWise1">YouTube</a> is one of the world's largest online platforms... period. It's become such an encyclopedia of content that almost anything and everything can be found on it, whether it's travel tips, step-by-step DiY processes, lifestyle, health, sports or, really, anything else! There's no denying YouTube's popularity among the younger generation.</div><div>However, it's important that children be influenced by the right kind of online content. Here's a list of YouTube personalities and channels your children are mostly following, and what you should watch out for.</div><div>1) <a href="https://www.youtube.com/channel/UC-lHJZR3Gqxm24_Vd_AJ5Yw">PewDiePie - 63 million subscribers</a></div><div>A pioneer in YouTube, PewDiePie is the user with the single largest subscriber base on the entire platform. This Swedish content creator is an institution! He basically invented the now-popular gaming genre on YouTube. He's a big-time influencer who is witty, charismatic and hilarious. Your kids should follow him if they’re into gaming. PewDiePie occasionally goes off-script and has put up a few controversial videos in the past, so proceed with caution!</div><img src="http://static.wixstatic.com/media/f6bccd_8c8f594fa8c74b379c4beb8a8d19e405~mv2.jpg"/><div><div>2) <a href="https://www.youtube.com/user/nigahiga">NigaHiga</a></div><a href="https://www.youtube.com/user/nigahiga">- 21 million subscribers</a></div><div>One of the more popular stars in YouTube, Ryan Higa's outrageously funny comedy skits will bring you to tears! This 28-year-old Hawaiian works to ensure that his content is kept ‘PG’, and it’s mostly slice-of-life work. A 12-year veteran on the platform, he has the 31st largest subscriber base as of June 2018.</div><div>3) <a href="https://www.youtube.com/channel/UCWRV5AVOlKJR1Flvgt310Cw">Zoella - 12 million subscribers</a></div><div>Zoe Elisabeth Sugg is a beauty-lifestyle guru. She talks about a wide range of topics, from lipstick and makeup to pets and beyond. Catering primarily to a female demographic, she openly talks about her issues with anxiety and how to deal with them, making her a great influence on younger viewers dealing with similar issues.</div><div>4) <a href="https://www.youtube.com/channel/UCC552Sd-3nyi_tk2BudLUzA">AsapSCIENCE - 7.9 million subscribers</a></div><div>Science can sometimes be a burden to children in school, but not if there's a cooler and more fun way to learn it. AsapSCIENCE takes a cooler and simple approach to explaining some of life's difficult questions, a method which kids happen to love!</div><div>5) <a href="https://www.youtube.com/channel/UCV9_KinVpV-snHe3C3n1hvA">Shane Dawson - 13 million subscribers</a></div><div>Shane Dawson started off with comedy sketches, parodies and celebrity impersonations, which saw him go viral. He spoofed several music videos and TV shows, before eventually moving on to pursuing a music career! His channel offers a plethora of entertaining content for teenagers.</div><div>6) <a href="https://www.youtube.com/user/JoeyGraceffa">Joey Graceffa - 8.7 million subscribers</a></div><div>The American Teen Choice nominee YouTuber has a channel that is primarily vlog-based but has various forms of content. Some of his most popular videos are challenges with other YouTubers! He also has his own mini web series called &quot;Storytellers&quot;, which has gone viral.</div><img src="http://static.wixstatic.com/media/f6bccd_2162fead555043a29772929a177f4411~mv2.jpg"/><div> PEWDIEPIE VS KSI</div><div>7) <a href="https://www.youtube.com/channel/UCVtFOytbRpEvzLjvqGG5gxQ">KSI - 18.75 million subscribers</a></div><div>One of Youtube's most popular stars, this British sensation has one of the most popular gaming channels on the platform. He's interacted with and even interviewed some of the biggest celebrities across the globe, including Dwayne &quot;The Rock&quot; Johnson.</div><div>8) <a href="https://www.youtube.com/channel/UCLk9wddjT0F-HILLRFXodtg">Joe Weller - 4.9 million subscribers</a></div><div>Joe Weller's channel is a library of content. From exploring haunted houses to embarrassing himself in public (!) to performing WWE moves in a swimming pool, he's truly made a name for himself among the younger generation of today, doing almost all there is to do!</div><div>9) AndrewSchrock - 1.8 million subscribers</div><div>Andrew Schrock posts videos on almost a daily basis. Most of these involve skateboarding, pranks and skits... and more!</div><div>10) <a href="https://www.youtube.com/channel/UCAoMPWcQKA_9Af5YhWdrZgw">MyLifeAsEva - 8.6 million subscribers</a></div><div>Starting off with DiY videos, this channel has evolved to include hit comedy sketches, music videos and lifestyle videos.</div><div>11) <a href="https://www.youtube.com/user/soulpancake">SoulPancake - 2.7 million subscribers</a></div><div>SoulPancake is a channel filled with several different kinds of content, from the light-hearted - “Kid President” is a running series of videos, and they also do a series on “Puppet News” - to the serious, like people dealing with their last days or emotional stories of human relationships. This is the ideal channel for kids to learn and expand their horizons.</div><div>12) <a href="https://www.youtube.com/channel/UC0v-tlzsn0QZwJnkiaUSJVQ">FBE: Kids &amp; Teens React - 17 million subscribers</a></div><div>Under Fine Brothers Entertainment (FBE), the 'Kids &amp; Teens React' section is a huge hit - and for good reason! The younger generation watches videos of the most bizarre and hilarious things, capturing organic, natural reactions. An older viewer can easily feel the disconnect and generation gap, and it can be quite hilarious! Watch with your kids!</div><div>13) J<a href="https://www.youtube.com/user/JennaMarbles">ennaMarbles - 18 million</a></div><div>Popular for her video series &quot;Things Guys/Girls Do&quot;, Jenna Marbles has ventured into other videos involving makeup, pets and more. Her</div><div>14) AwesomenessTV - 6.4 million subscribers</div><div>Founded in 2012, AwesomenessTV creates content for the teen and preteen demographic, creating web series, TV shows, Hollywood news and even movies.</div><img src="http://static.wixstatic.com/media/f6bccd_27daa8a119b24cd5b1a522b4fc318f7a~mv2.jpg"/><div>15) <a href="https://www.youtube.com/user/smosh">Smosh - 23.1 million subscribers</a></div><div>Starting from the very early days of YouTube, for over 13 years, Smosh has delved into the world of comedy and gaming, making a name for themselves as one of YouTube's most popular videos have been viewed over a staggering two billion times!</div><div>channels!</div><div>16) <a href="https://www.youtube.com/user/IISuperwomanII">IISuperwomanII - 13 million subscribers</a></div><div>One of the biggest stars on YouTube, Indian-Canadian Lilly Singh's videos parodying her parents went viral and shot her to fame! Her quirky sense of humour and ability to make fun of herself has resulted in widespread popularity, especially among teen and preteen girls. If you’re Indian, or have a lot of Indian friends, then you’ll really relate to these videos.</div><div>17) <a href="https://www.youtube.com/user/Theekholms">Theekholms - 113,000 subscribers</a></div><div>Theekholms is a channel for children, posting a web series called &quot;Mermaid Secrets of the Deep&quot;. This fantasy adventure, starring mermaids, is now in its 10th season. It’s very popular among pre-teens, and new episodes release every Saturday.</div><div>18) Markiplier - 20 million subscribers</div><div>Mark Fischbach's viral channel is the 32nd most subscribed channel on YouTube and focuses on survival games and his own animated sketch series.</div><div>19) <a href="https://www.youtube.com/user/DanAndPhilGAMES">Dan and Phil - 3.1 million subscribers</a></div><div>Taking audience engagement to a new level, Dan and Phil's YouTube channel sees the charismatic duo play the games that are most popular among the younger generation. Their chemistry makes for hilarious interaction… and makes them very popular among youngsters!</div><div>And finally...</div><div>20) <a href="https://www.youtube.com/channel/UC9yCYZfNqYTKfPxbxe2GwAA">Studio B - 33,000 subscribers</a></div><img src="http://static.wixstatic.com/media/f6bccd_1a56fea234a34c7e876fffc1549478c0~mv2.jpg"/><div>A hidden gem, Studio B is a smaller channel featuring a young girl named Brooke who takes viewers on her journey of reading! She's very interactive with her fans and it's a great platform for children to know which books to read. Her reviews are interesting and engaging, and very accessible as she’s a preteen herself! This channel can also be quite inspiring for other preteens who are interested in starting a YouTube channel of their own!</div><div>YouTube entertains people of all kinds around the world, and it's important that children today follow YouTubers who not only entertain but also direct children on the right path.</div><div>_____________</div><div>Authored by Suren, the co-founder and CEO of Mobicip, and a passionate advocate for mobile learning and Internet safety. Suren speaks or hosts panels at conferences and seminars on these topics for parents and educators. He also serves as a consultant for educational technology projects in K-12 schools and school districts. </div></div>]]></content:encoded></item><item><title>5 Young YouTube Stars Who Use Their Influence to Support Charities</title><description><![CDATA[[This post was updated July 3 2018]Influencer marketing has grown at an incredible rate over the last year, especially among teens. This has resulted in the birth one of the 21st century’s newest breed of celebrity: The YouTube Star.For those who don’t know, influencers are individuals who have a significant impact or influence on a social media platform, and brands partner with these influencers to promote their product or service.Recent consumer insights reveal that 70% of teenage YouTube<img src="http://static.wixstatic.com/media/f6bccd_576265cce9754dc19ffa12dfd5399231%7Emv2.jpg/v1/fill/w_440%2Ch_254/f6bccd_576265cce9754dc19ffa12dfd5399231%7Emv2.jpg"/>]]></description><dc:creator>Cynthia Lieberman, Cyberwise</dc:creator><link>https://www.cyberwise.org/single-post/2018/06/28/5-Young-YouTube-Stars-Using-Influence-for-Social-Change</link><guid>https://www.cyberwise.org/single-post/2018/06/28/5-Young-YouTube-Stars-Using-Influence-for-Social-Change</guid><pubDate>Tue, 03 Jul 2018 17:22:24 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_576265cce9754dc19ffa12dfd5399231~mv2.jpg"/><div>[This post was updated July 3 2018]</div><div>Influencer marketing has grown at an incredible rate over the last year, especially among teens. This has resulted in the birth one of the 21st century’s newest breed of celebrity: The YouTube Star.</div><div>For those who don’t know, influencers are individuals who have a significant impact or influence on a social media platform, and brands partner with these influencers to promote their product or service.</div><div>Recent consumer insights reveal that <a href="https://www.thinkwithgoogle.com/consumer-insights/youtube-stars-influence/">70% of teenage YouTube subscribers</a> favor influencer opinions over traditional celebrity endorsements, causing a monumental shift in the way the </div><div>highly-sought after youth consumer is being marketed to.</div><img src="http://static.wixstatic.com/media/f6bccd_6b07c7e481ea4954a9cc6418da50a05c~mv2.jpg"/><div>Even the White House recognizes the power of these influencers. In 2014, U.S. President Barack Obama met with a <a href="https://www.tubefilter.com/2014/03/02/obama-meets-with-youtube-advisors-on-how-to-reach-online-audiences/">super group of prominent digital influencers</a> to discuss ways the White House could do a better job reaching the YouTube generation.</div><div>Imagine if this influential group collectively reached out to their combined 35 million+ subscribers and 300 million monthly views to share messages for social good!?</div><div>While fame and fortune are exciting and admirable for top tier online celebs, many are recognizing that one great way to celebrate their success is to give back to the people who have that helped them get where they are today. </div><div>This is a great thing, but there is a catch. Until YouTube's app for kids gains traction, the original YouTube channel is still a major draw for kids. If you really want to know what social media is and how it's being used today, look to the young people in your life! If they &quot;love&quot; social media (and YouTube stars), watch our Cyberwise video, <a href="https://youtu.be/YdLR4ANs2AI">&quot;What Kids Are Really Doing Online&quot;</a> on our YouTube Channel and get more great tips in our free Social Media Learning Hub <a href="http://www.cyberwise.org/social-media-hub">here.</a></div><div>With that in mind, below is a look at five prominent YouTube stars who are using their fame to help charities raise money and awareness for social causes, with a few flag mentions for parents of younger kids. </div><img src="http://static.wixstatic.com/media/f6bccd_1abf63574af14c1fa6b7abe1bb4a20c2~mv2.jpg"/><div><a href="https://www.youtube.com/channel/UC-lHJZR3Gqxm24_Vd_AJ5Yw">PEWDIEPIE</a> - Pop Culture Influencer: </div><div>YouTube pioneer, PewDiePie – aka Felix Kjellberg – reaches 63 million subscribers and has the single largest subscriber base on the entire platform. Known for his wit and charisma, this Swedish, sometimes controverisal content creator celebrated via <a href="https://www.youtube.com/watch?v=ulIwePLwFns">video</a>that he and his fans raised over $1 million for charity!in just one year for many charities, including <div><a href="https://www.worldwildlife.org">World Wildlife Fund</a>,</div><a href="https://www.stjude.org">St. Jude</a>, <a href="https://www.savethechildren.org/">Save the Children</a>, and <a href="https://www.charitywater.org/">Charity: Water</a>, who personally thanked the PewDiePie army for providing water to 10,000 Rwandans. </div><div>Red Flags? Unfortunately yes. PewDiePie has so many followers it would have been erroneous to exclude him from this list. Setting his good deeds aside, parents should be aware that Disney and <div><a href="https://www.theverge.com/2017/2/14/14608518/youtube-cancels-scare-pewdiepie-season-2">YouTube</a><a href="https://www.theverge.com/2017/2/14/14608518/youtube-cancels-scare-pewdiepie-season-2"></a></div>pulled their original reality shows with him last year after being accused of making <a href="https://www.vox.com/culture/2017/9/11/16288826/pewdiepie-n-word-playerunknown-battlegrounds">racist</a>and <div>anti-Semitic remarks</div> in videos. As a result, we recommend parents use caution before permitting under-aged kids to view his content. </div><div><a href="https://www.youtube.com/channel/UCWRV5AVOlKJR1Flvgt310Cw">ZOELLA</a> – Lifestyle Influencer: </div><div>With over 12 million subscribers and over 1 billion video views, it’s hard to dispute the amazing success of Zoella – aka Zoe Sugg, whose popularity expands beyond online fame, including three New York Times bestselling novels, sponsorships, endorsements and even her own 50-product beauty line in the U.K.</div><div>Zoella, who openly talks about her battles with anxiety, is utilizing the power of social media to raise support for charities that aim squarely at her young viewership. This includes serving as a digital ambassador for the mental health charity <a href="https://www.mind.org.uk">Mind</a> and being one of the world’s first ‘vloggers’ to participate in <a href="https://www.telegraph.co.uk/culture/music/11234306/Band-Aid-30-falters-amid-criticism-of-vloggers-and-snubbing-by-Albarn-and-Adele.html">Sir Bob Geldof’s Band Aid 30</a> song to fight Ebola. She has also participated in funding raising for the <a href="https://www.stroke.org.uk">Stroke Association</a> an <div><a href="https://www.trekstock.com/">Trekstock</a>,</div> a non-profit that helps young adults with cancer in the UK. Red flags? Zoella unapologetically boasts about the joys of shopping, and, consequently, Zoella has advertisers eating out of her hand.</div><div><a href="https://www.youtube.com/tyleroakley">TYLER OAKLEY</a> – LGBT Youth Activist: </div><div>Since becoming famous on YouTube, Tyler has raised more than $1 million for<div><a href="https://www.thetrevorproject.org">The Trevor Project</a>, </div>the leading national non-profit for crisis and suicide prevention for LGBT youth. His Trevor Project<a href="https://youtu.be/X09MYZaizjk">birthday fundraising video</a> received 1.3 million views on his YouTube channel and was honored with a DoGooder.tv <div>“<a href="http://www.dayswithdestiny.com/tyler-oakley-is-the-2015-dogooder-youtube-creator-for-good/">YouTube Creator for Good Award</a>”</div> for his efforts.</div><img src="http://static.wixstatic.com/media/f6bccd_15e6423793a94560bd0a2fd8a74da831~mv2.jpg"/><div>Tyler Oakley's successful social media prominence among youth (particularly YouTube) also took him to the White House twice, including a <a href="https://youtu.be/f0ZCb4tPJqM">one-on-one sit down chat</a> with First Lady Michelle Obama that garnered 2.4 million views in support of her “Reach Higher” education initiative, as well as inclusion in President Barack Obama’s <a href="https://mashable.com/2014/03/06/obama-youtube-strategy">separate meeting with</a> other prominent digital influencers to discuss how they can better reach online audiences about important issues such as cyberbullying, healthcare and education.  Red flags? Tyler has been known to toss frequent f-bombs and blunt sex talk are peppered throughout many videos, making some of his videos clearly inappropriate for kids. </div><div><div><a href="https://fitstrongandsexy.com">AMANDA RUSSELL</a> – Fitness and Lifestyle Influencer: </div>Canadian-born YouTube sensation Amanda Russell was born to run. She was living the dream as an Olympian-in-training for team USA when tragedy struck. Just weeks before the start of the Beijing Olympics, a serious injury crushed her life-long aspiration to be an Olympic star, threatened to end her running days forever and brought all her endorsement deals, awards, records and sponsorships came to a screeching halt.</div><img src="http://static.wixstatic.com/media/f6bccd_c81d7612f73044f7b78fdff6dbdd380d~mv2.jpg"/><div>Amanda turned her devastation into restoration, powering through a painstaking recovery with all the perseverance and of an Olympic champion. Today she is the founder of<div><div><a href="https://fitstrongandsexy.com">fitstrongandsexy.com</a>, </div>teaches Influencer Marketing at UCLA </div>and travels around the world as a motivational speaker guiding people—including young girls—on how to be the leading characters in their own lives, physically and mentally. She uses her influencer fame to support <div><a href="https://www.girlsontherun.org">Girls on the Run®</a>,</div> a non-profit dedicated to activating the limitless potential of young girls through interactive lessons and running games. She is also a book author and will be releasing a new book, &quot;The Influencer Code&quot; next year on the business of influencer marketing.</div><div><div><a href="https://www.youtube.com/channel/UCwf9TcLyS5KDoLRLjke41Hg">MOLLY BURKE</a>- Beauty and Lifestyle Influencer: </div>Last but not least is Molly Burke, an inspirational role model for any social media influencer seeking to use their celebrity voice for social good. You see, Molly is not your average beauty blogger. She's blind, yet she is more <a href="https://youtu.be/xvOZQweFOZg">adept at putting on her own make up</a>and outfits even better than most of us. She began as a prominent motivational speaker at the young age of five and began sharing stages with major celebrities such as Macklemore, Justin Trudeau and Demi Lovato, all while managing the challenges of her slowly deteriorating eyesight.</div><div>Today she is a fearless motivational speaker who has grown into a YouTube sensation after she began posting raw, genuine content and &quot;blind girl&quot; hacks for fashion, beauty, and useful dad-to-day tasks. In a recent interview in <div><a href="http://www.papermag.com/molly-burke-youtube-interview-2532528332.html">PaperMag.com</a>, </div>Molly revealed the real “aha moment” for her on the power that influencers can have on people came after she posted her <a href="https://www.youtube.com/watch?v=sWNrzwfWKyc">10 Amazing Tips to Overcome Bullying</a> video on YouTube. </div><div>“I read this comment on that video that said, ‘I planned on killing myself tonight, but I came across the video I saw you posted. So I watched the video because you're my favorite YouTuber, and everything you said was exactly the motivation I needed to hear to not kill myself.’ And it was like, to know that you have that power is crazy. I unfortunately don't think that everyone takes it to heart and as seriously as I do, but I think there are a lot of people who understand it…and there's nothing that irritates me more than social media influencers…who say, ‘I'm not trying to be a role model, if people choose to follow me that's up to them.’ No, you're putting yourself out there, and by doing that you have to realize that you will become a role model to some people.” </div><div>Molly was 14 when she ventured into the world of influencer marketing a decade ago. Since then, she has developed strong relationships with other YouTube superstars, including YouTube segments with <a href="https://www.youtube.com/watch?v=5Ry8enKPzSM">Kandee Johnson</a> and <a href="https://www.youtube.com/watch?v=r110C5bz4RA">Casey Neistat</a> — and even taught supermodel Karlie Kloss how to read Braille on her channel!</div><img src="http://static.wixstatic.com/media/f6bccd_c4cd9c031b494c7e9e826f9bdbd2c843~mv2.jpg"/><div>GOING VIRAL: </div><div>Kudos to these brave members of YouTube celebrity royalty. Tapping into their clearly charitable fanbases validates how influencers can become incredible allies for charitable causes.</div><div>Let’s hope these efforts will go viral and continue to grow and provide inspiration for any fellow influencers seeking to support cause-related efforts through their social media channels.</div><div>For more information about other YouTube stars that kids are admire, visit the Cyberwise guest blog courtesy of MobiCip on the <div><a href="http://www.cyberwise.org/single-post/2018/06/29/20-YouTube-Channels-Your-Kids-Probably-Already-Follow">“20 YouTube Channels Your Kids Probably Already Follow.</a><a href="http://www.cyberwise.org/parental-control-software">”</a></div></div><div>________________________________________________________________________________________________________</div><img src="http://static.wixstatic.com/media/f6bccd_ce87e4cae0a14c1d93e22d300321fef9~mv2.jpg"/><div>Cynthia Lieberman is co-Founder, CyberWise.org and owner of Lieberman Communications, a content marketing and PR consultancy firm for Fortune 500 companies. Equipped with a graduate degree in Media Psychology and Social Change, Lieberman is a Board of Director for the National Association for Media Literacy Education (NAMLE). She teaches Social Media Marketing at UCLA Extension and recently served as an Adjunct Professor in Mass Communications at California State University, Northridge.</div></div>]]></content:encoded></item><item><title>Why Kids Like YouTube</title><description><![CDATA[YouTube’s popularity has increased significantly in the past few years, with more than 30 million daily users spending an average of 40 minutes on the platform. Owned and intensely promoted by Google, YouTube is now the world’s second largest search engine, processing about 3 billion searches every day.That’s a lot of activity!Adults aren’t the only ones using YouTube, however. Kids have been active users too. With its wide array of videos ranging from tutorials and vlogs to cartoons and<img src="http://static.wixstatic.com/media/f6bccd_b5fdc39bb598434cbacd52701342ebc3%7Emv2.png/v1/fill/w_456%2Ch_217/f6bccd_b5fdc39bb598434cbacd52701342ebc3%7Emv2.png"/>]]></description><dc:creator>Anna Dieckmeyer</dc:creator><link>https://www.cyberwise.org/single-post/2018/06/29/Why-Kids-Like-YouTube</link><guid>https://www.cyberwise.org/single-post/2018/06/29/Why-Kids-Like-YouTube</guid><pubDate>Fri, 29 Jun 2018 19:08:02 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/f6bccd_b5fdc39bb598434cbacd52701342ebc3~mv2.png"/><div><a href="https://www.youtube.com/user/CyberWise1">YouTube</a>’s popularity has increased significantly in the past few years, with more than 30 million daily users spending an average of 40 minutes on the platform. Owned and intensely promoted by Google, YouTube is now the world’s second largest search engine, processing about 3 billion searches every day.</div><div>That’s a lot of activity!</div><div>Adults aren’t the only ones using YouTube, however. Kids have been active users too. With its wide array of videos ranging from tutorials and vlogs to cartoons and reviews, YouTube has become this generation’s color TV. Keep scrolling to find out why.</div><img src="http://static.wixstatic.com/media/f6bccd_e9bc3d775bef4629ab670c1a6673d2b1~mv2.png"/></div>]]></content:encoded></item></channel></rss>