Read the latest news and brand new pieces on youth, social media, and emerging technologies! We focus on preventing harm and promoting positive online behaviors.

Jostens Renaissance 2011: You Make it Matter post thumbnail

Jostens Renaissance 2011: You Make it Matter

As regular readers of this blog will know, Sameer and I have had a long partnership with Jostens. When I was in high school in the mid-1990s, our class rings and yearbooks came from Jostens, so I knew of the brand. About four years ago, Charley Nelson, who is the director of educator services for […]

Cyberbullying Prevention and Response: Expert Perspectives post thumbnail

Cyberbullying Prevention and Response: Expert Perspectives

Given the prominence of several high-profile incidents in recent months, cyberbullying has been all over the media. As a result, parents, educators, and other youth-serving adults are looking for information to educate themselves about this problem. Even though cyberbullying may seem fairly new to many, a core group of researchers and Internet safety advocates have […]

How young is too young for Facebook? post thumbnail

How young is too young for Facebook?

This is a common question I receive from many parents: “At what age should I give my child a cell phone or allow them to be on Facebook?” Of course this is not an easy question to answer since every child is different and parents themselves are probably in the best position to determine the […]

Formal Rules for Students and their Devices at School post thumbnail

Formal Rules for Students and their Devices at School

As we continue to work with public and private schools around the nation, we see much variability in the formal policies in place related to student-owned electronic devices and their display and use on campuses. Some schools have simply elected to ban all netbooks, tablets and iPads, laptop computers, smartphones (e.g., iPhones, Blackberrys, Evos), Nintendo […]

Prevention and Response Campaign using our Cyberbullying Book as the Anchor post thumbnail

Prevention and Response Campaign using our Cyberbullying Book as the Anchor

We remain very proud of our award-winning cyberbullying book from Sage Publications, and continue to receive great feedback about it.  More and more school districts are purchasing it for their educators, and we are very thankful for that.  Our goal is (and has always been) to meaningfully equip those on the front lines of this […]

A Potential Response to Cyberbullying: Talking to the Parents of the Bully post thumbnail

A Potential Response to Cyberbullying: Talking to the Parents of the Bully

I received an email from an educator who attended a recent presentation.  She asked if it is advisable for the parents of cyberbullying victims to contact the parents of the cyberbullies to try to resolve the situation.  This can be a very tricky proposition.  In theory, this seems like a very good approach and for […]

Using Public Service Announcements To Prevent Cyberbullying post thumbnail

Using Public Service Announcements To Prevent Cyberbullying

A fun and often-recommended activity to engage youth in considering the responsible use of technology and promoting that message across the student body (or beyond) involves the creation of Public Service Announcements (PSAs). These are creative and informative videos designed to bring attention to a problem relevant to a certain audience, and make a memorable […]

CDC Resource Featuring Our Cyberbullying Survey Items post thumbnail

CDC Resource Featuring Our Cyberbullying Survey Items

We often have researchers and practitioners call or email us inquiring about our bullying and cyberbullying assessments, offline and online surveys, focus group questions, and interview measures. We are happy to share them with others because we must all continue to work together to collect methodologically-sound data and conduct meaningful and rigorous analysis of those […]

Password Safety Among Teens post thumbnail

Password Safety Among Teens

Passwords are necessary to access personal accounts on a computer network. They serve as “authentication” devices and uniquely identify someone as being who they claim to be. Of course, correct authentication prevents others from accessing or altering your personal data. In our current Information Age, passwords are a part of everyday life. However, some users […]