default_cyberbullying

Password Safety Among Teens

Passwords are necessary to access personal accounts on a computer network. They serve as “authentication” devices and uniquely identify someone as being who they claim to be. Of course, correct authentication prevents others from accessing or altering your personal data. In our current Information Age, passwords are a part of everyday life. However, some users…

default_cyberbullying

Cyberbullying Evidence and Cell Phone Service Provider Data Retention

Educators and parents are often interested in learning about digital evidence and its collection. Many times, they (or the youth they care for) help with collecting evidence to depict cyberbullying instances by taking screenshots (see our instructional guide here) or using freeware or commercial software to record chat logs, instant messaging conversations, emails, and social…

default_cyberbullying

Tattling vs Telling

As we work with increasingly younger kids to educate them about the responsible use of technology, we find it extremely important to discuss how they should respond to being cyberbullied. Central to this conversation is covering the difference between “tattling” and “telling.” Perhaps you are extremely familiar with this distinction – but if not, read…

default_cyberbullying

White House Bullying Conference

On Thursday March 10, 2011, the White House convened a conference to address the issue of bullying. First Lady Michelle and President Obama welcomed parents, students, researchers, industry leaders and others to discuss the negative effects of bullying and highlight some of the best-practices and promising approaches in prevention and response. I was honored to…