SlideShare a Scribd company logo
1 of 19
Download to read offline
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
CHILD SAFETY ONLINE (CSO)
INTERNET AND SOCIAL MEDIA
Internet and Social Media sites are
very ADDICTIVE and hugely
POPULAR among youths. They have
many risks of PRIVACY and other
cyber securities where one has to be
very CAREFUL about using and
understanding their PURPOSE.
One has to understand that these
sites are developed for
COMMERCIAL purpose with the
intention of REVENUE generation.
These factors may look cool but they
are the basic THREATS.
ALWAYS understand what looks and
feel real in internet may not be
TRUE.
Internet is just a medium of
COMMUNICATION it is part of our
lifestyle but not our LIFE.
INTERNET CORE VALUES FOR
CHILDREN
1. Internet is a means of
COMMUNICATION & LEARNING
2. Internet should be used under
SUPERVISION of adults only
3. STOP endorsing and
acknowledging anyone or
anything that you DO NOT
KNOW
4. Be FOCUSED when you use the
Internet
5. If there is any problem or issues
ALWAYS TALK with your parents
or guardian
6. Access or being sexually explicit,
racist, violent, extremist or other
harmful material, either through
choice or in error is ALWAYS
WRONG
7. STOP USING Spyware, Viruses
and Malware for any purpose in
your computer, smartphone,
tablet or games console
8. Always RESPECT your parents
TOLERANCE
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
Risks or Vulnerabilities of Children Online
 Curiosity and incline of children
towards violent, sexual and
pornographic content
 Understanding the validating
process of inaccurate or false
information and extreme views
 Dealing and facing issues of harmful
behaviors including self-harm,
anorexia and suicide
 Being more lively and public by
sharing personal information online
 Actively or unintentionally getting
involved in bullying or hurtful
behavior
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
Current evolving issues and problems:
Issues and problems Indicators
Online Gaming
 Addiction and long-term use causes
physical abnormalities
 Cause increase in Aggression,
restlessness and/or irritability
 Isolation and the child becomes
dulls
 Migraines due to intense
concentration or eye strain
 Carpal tunnel syndrome caused by
the overuse of a controller or
computer mouse
Mobile Applications  Screen Addiction
 Impulsive behavior
 Eyes straining
 Limited thinking no creativity
Virus and
Spyware
 Opening infected email attachments
such as .exe files.
 Opening infected files from web-
based digital file delivery companies
(for example Hightail - formerly
called YouSendIt, and Dropbox).
 Visiting corrupt websites.
 Via the internet, undetected by the
user (worms are an example of this).
 Macros in application documents
(word processing, spreadsheets etc).
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
 USB connected devices (eg memory
sticks, external hard drives, MP3
players).
 CDs/DVDs
Viruses and spyware can cause very
serious consequences including:
 Identity theft
 Fraud
 Deletion, theft and corruption of
data
 A slow or unusable computer
Spam and Scam
emails
 Free and easy Advertising, for
example online pharmacies,
pornography, dating, gambling
 Easy and quick links of exciting
offers and getting rich quick and
work from home schemes
 Scanning option of Hoax virus
warnings.
 Appeals of Hoax charity and serving
humanity
 Good luck emails of forwarding it to
your contacts often to bring ‘good
luck’
 Use of Free webmail address or sent
from a completely different address
 The email may not use your proper
name, but a non-specific greeting
such as “Dear customer.”
 A sense of urgency; for example the
threat that unless you act
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
immediately your account may be
closed.
 A prominent website link. These can
be forged or seem very similar to
the proper address, but even a
single character’s difference means
a different website
 A request for personal information
such as username, password or bank
details.
 You weren't expecting to get an
email from the organization that
appears to have sent it.
 The entire text of the email may be
contained within an image rather
than the usual text format. The
image contains an embedded link to
a bogus site
 Use email safely
 Do not open emails which you
suspect as being scams.
 Do not forward emails which you
suspect as being scams.
 Do not open attachments from
unknown sources.
There wide range of downloadable music,
videos, software and documents. One has
to Find out how your child can benefit
from these legally and without risking
becoming a victim of grooming, bullying,
identity theft or viruses.
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
Downloading
and file sharing
 viruses – downloading files or
software can put computers at risk
from potentially harmful programs
 theft – file sharing can allow other
computers to view all the files on
your computer, which means that
your personal information might be
stolen
 unsuitable images – if your child is
using an illegal download site they
could be exposed to pornographic,
violent or age-inappropriate content
 exposure to potentially dangerous
strangers – it's possible to chat on
some file sharing sites, which could
leave your child open to grooming,
bullying and abuse
Hate content
Hate content are easy spread and can easy
victimized children who have no
understand of the issues and human rights
values. Digital Literacy skills is something
that always requires updates :
 The Other: The most basic element
of hate is the idea of “the Other” – a
group that is seen as being
completely different from the
author’s group, sometimes even
portrayed as inhuman.
 The Glorious Past: Another
important element of hate is the
idea that the group has fallen from
its once-glorious past. This fall is
shown as being the fault of the
Other, and it is only by defeating
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
and destroying the Other that this
glorious past can be regained.
 Victimhood: Hate groups typically
portray themselves, and the group
they claim to represent, as victims of
the Other.
Privacy and
Identity Theft
Children may be at risk of having their
online identity stolen and misused. It can
be difficult to maintain a child’s privacy as
they may not understand what
information is safe to share online, or what
default privacy settings are on the sites
and devices they’re using.
The internet offers access to a world of
products and services, entertainment and
information. At the same time, it creates
opportunities for scammers, hackers, and
identity thieves. Learn how to protect your
computer, your information, and your
online files.
Cyberstalking
Cyberstalking can be defined as using
Internet, emails, social networking sites
and other technology to stalk, harass or
intimidate a victim which can cause mental
distress, anguish and even trauma to the
victim.
Cyberstalking can be direct or indirect.
Direct cyberstalking includes sending
threatening or obscene emails, messages
or voice mails. Indirect cyberstalking
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
involves impersonating the victim,
spreading rumors about them or using
Internet to post hate/obscene messages
about them.
A cyber stalker might just follow a person
from one social media account to another,
persistently messaging them, commenting
on or liking all their status.
Why Parents need to be cautious about
Cyberstalking
Cyberbullying
Cyberbullying is bullying that takes place
over digital devices like cell phones,
computers, and tablets. Cyberbullying can
occur through SMS, Text, and apps, or
online in social media, forums, or gaming
where people can view, participate in, or
share content.
Cyberbullying includes sending, posting, or
sharing negative, harmful, false, or mean
content about someone else. It can include
sharing personal or private information
about someone else causing
embarrassment or humiliation. Some
cyberbullying crosses the line into unlawful
or criminal behavior.
The most common places where
cyberbullying occurs are:
 Social Media, such as Facebook,
Instagram, Snapchat, and Twitter
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
 SMS (Short Message Service) also
known as Text Message sent
through devices
 Instant Message (via devices, email
provider services, apps, and social
media messaging features)
 Email
Texting and
Sexting
Texting is currently one of the most instant
forms of communication. While texting
might be the perfect platform to say a
quick "hi," there are some things to watch
out for in a textual relationship with your
partner.
Sexting is sending sexually explicit text or
photographs via mobile devices.
Sometimes teens share the photographs
voluntarily, but at other times teens may
be coerced into taking or sending the
photographs. Once the photos are sent,
some kids use them to bully, harass,
intimidate, or embarrass victims online or
via mobile devices.
Sexting between minors is a felony and can
have serious legal consequences. You
could be charged with a crime. If
convicted you could be labeled as a sex
offender for the rest of your life. Think
before you "sext."
Never send or post sexually provocative
pictures. Once the picture is out there, it
will never go away.
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
Online Abuse and
Harassment
Online abuse is any type of abuse that
happens on the web, whether through
social networks, playing online games or
using mobile phones. Children and young
people may experience cyberbullying,
grooming, sexual abuse, sexual
exploitation or emotional abuse.
Parents tools and option available
 Educate and update yourself about the issues and problems about
child online safety
 Parental Control software
 Firewall
 Antivirus
 Talking more about Safe internet browsing
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
Primitive Measure
 Apart from installing internet security software and keeping it updated,
we recommend a number of other ways in which to keep your computer
protected against viruses and spyware. After all, prevention is better than
cure.
 Email from an unknown, suspicious or untrustworthy source should not
be open
 Before installing an antivirus always check and make sure there is no
other antivirus installed
 Always scan the USB devices and be careful with USB connected devices
(eg memory sticks, external hard drives, MP3 players) as they are
common carriers of viruses and malwares
 Always check and be careful with CDs/DVDs
 Do not open any files from web-based digital file delivery companies (eg
YouSendIt, Dropbox) that have been uploaded from an unknown,
suspicious or untrustworthy source
 Switch on macro protection in Microsoft Office applications like Word
and Excel.
 Always buy registered copies of software, do not use pirated software
 Downloading free software can be great threat so be careful while
downloading
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
Mentality and Strategies
Age Group Values Strategy
0-5 Integration of Internet
values
 Developing the Concepts and
values of internet
 Bonding and sharing with
children
 Creating better
communication strategy
 Priority and preference use of
internet
6-12 Curiosity  Concept of safe browsing
 Concept of human rights
 Threats of cyber bullying
 Social media and intervention
(Parental Software and watch a
must )
12 and above Addiction and
Carelessness
 Listern to what they have to
say
 Talk with them more about
current issues of cybers
securities and issues
 Spent more time
 Make rules of using internet
and home discipline
 Family time
 Try to be a friend
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
Source: UKCISS
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
Things to remember 0-5 years
Always make a point of giving your children access
to internet for learning purpose only and set a
limits for the amount of time they can spend on the
computer
Devices like mobile, tablet or laptop should not be
easily access to children. Always keep your devices
passwords/PINs protected for unauthorized use
Set parental controls on computers and any other
devices your child has access to enabling access to
only appropriate content
Always buy or download only apps, games, online
TV and films which have age ratings, which you
should check before allowing your child to play
with or watch them
Discipline should be maintain in technology rules as
children learn from parents so first parents have to
live by example
While using internet in public place always check
what your child is accessing or looking at, always
keep a watch when you are in public wifi zone and
how your child is reacting to the free service
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
Things to remember 6- 12 years
 Set the parental controls to the appropriate age, and enabling
access to only appropriate content on computers and any other
devices your child has access to
 Update your parental control software and switch it on at all
times
 Build a discipline in terms of when where and how to use
internet and other communication medium. Time setting can
really help them for activities such as using the internet and
games consoles
 Allow only age-appropriate content by checking out the age
ratings on games, online TV, films and apps
 Keep the Internet discipline with all member in the family
discuss with your older children what they should or shouldn’t
be showing their younger siblings on the internet, mobile
devices, games consoles and other devices
 Don’t be pressured by your child into letting them use certain
technologies or view certain online content, if you don’t think
they are old enough or mature enough, no matter how much
they pester you or what their friends’ parents allow
 Give your child a lesson of privacy and how important it is to
keep phones and other devices secure
 Discuss with your child what is safe and appropriate to post and
share online. Written comments, photos and videos all form
part of their ‘digital footprint’ and could be seen by anyone and
available on the internet forever, even if it is subsequently
deleted
 Talk with your child about the kind of content they see online.
They might be looking for information about their changing
bodies and exploring relationships. They also need to
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
understand the importance of not sending other people -
whoever they are - pictures of themselves naked
 Always ask them to respect the rules and regulation in terms of
age restriction and limitation and remember that services like
Facebook and YouTube have a minimum age limit of 13 for a
reason
 Be sure to make them understand that being online doesn’t give
them anonymity or protection, and that they shouldn’t do
anything online that they wouldn’t do face-to-face
Things to remember 13 and above
 Your child is in his or her teens It’s never too late to reinforce
boundaries though there might be a resistance that they may
think they are adult enough, but they definitely still need your
wisdom and guidance
 At this age Technology and internet may seem and sound easy
but always make it your business to keep up to date and discuss
what you know with your child
 This is the times where parents need to do some homework
your child may be curious about health, wellbeing, body image
and sexuality of themselves and others online. They may be
discovering inaccurate or dangerous information on online at
what is a vulnerable time in their lives so parents have to be
very watchful and prompt
 Always Review the settings on parental controls with age of your
child. They may ask you to trust them sufficiently to turn them
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
off completely, but think carefully before you do and agree in
advance what is acceptable online behavior
 Have small talk session about bullying, and posting hurtful,
misleading or untrue comments how they behave towards
others. Make them aware of the dangers of behaviors like
sexting and inappropriate use of webcams
 Don’t give them access to your payment card or other financial
details.
 Be clear about copyrighted material and plagiarism so that you
make a point about what is legal and what is illegal
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
THE MATRIX
EDUCATE YOURSELF
TALK MORE WITH
YOUR CHILDREN
SPEND MORE TIME
BE AN IDOL STOP
LIVING IN INTERNET
WORLD
LISTERN TO YOUR
CHILDREN
Internet Safety
Child Online
Protection
Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”
Information about the Researcher
Shreedeep Rayamajhi
Link: https://en.wikipedia.org/wiki/Shreedeep_Rayamajhi
Email: shreedeep@rayZnews.com
Website: http://www.rayznews.com
Adv. Sajina Karki
Link: https://en.wikipedia.org/wiki/Sajina_Karki
Website: https://learninternetgovernance.blogspot.com/

More Related Content

What's hot

Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of TeensKate Gukeisen
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for ParentsRodolfo Salazar
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...Stevecd
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints HandoutOllie Bray
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High SchoolLiftPotential
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 

What's hot (19)

Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 

Similar to Learn internet governance initiative child online safety by shreedeep rayamajhi and sajina karki

Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 ParentsIwith.org
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sbSafeChildUAE1
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 

Similar to Learn internet governance initiative child online safety by shreedeep rayamajhi and sajina karki (20)

Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Oula 9 a
Oula   9 aOula   9 a
Oula 9 a
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Net Safety
Net SafetyNet Safety
Net Safety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Boushrat 9 a
Boushrat   9 aBoushrat   9 a
Boushrat 9 a
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 

More from Shreedeep Rayamajhi

ICANN80 Mentoring Call 1 By Shreedeep Rayamajhi.pdf
ICANN80 Mentoring Call 1 By Shreedeep Rayamajhi.pdfICANN80 Mentoring Call 1 By Shreedeep Rayamajhi.pdf
ICANN80 Mentoring Call 1 By Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
Social Media Startegy for APrIGF 2024 by Shreedeep Rayamajhi.pdf
Social Media Startegy for APrIGF 2024 by Shreedeep Rayamajhi.pdfSocial Media Startegy for APrIGF 2024 by Shreedeep Rayamajhi.pdf
Social Media Startegy for APrIGF 2024 by Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
Report ICANN79 At-Large Mentor of Shreedeep Rayamajhi.pdf
Report ICANN79 At-Large Mentor  of Shreedeep Rayamajhi.pdfReport ICANN79 At-Large Mentor  of Shreedeep Rayamajhi.pdf
Report ICANN79 At-Large Mentor of Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
.np present and future, a civil society perspective at APTLD 85
.np present and future, a civil society perspective at APTLD 85.np present and future, a civil society perspective at APTLD 85
.np present and future, a civil society perspective at APTLD 85Shreedeep Rayamajhi
 
Report ICANN78 At-Large Mentor of Shreedeep Rayamajhi.pdf
Report ICANN78 At-Large Mentor  of Shreedeep Rayamajhi.pdfReport ICANN78 At-Large Mentor  of Shreedeep Rayamajhi.pdf
Report ICANN78 At-Large Mentor of Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
Introduction and AI and Future Challenges for Sri Lanka Internet Users by Sh...
Introduction and  AI and Future Challenges for Sri Lanka Internet Users by Sh...Introduction and  AI and Future Challenges for Sri Lanka Internet Users by Sh...
Introduction and AI and Future Challenges for Sri Lanka Internet Users by Sh...Shreedeep Rayamajhi
 
ICANN Fellowship Interaction and Meet Up Program.pdf
ICANN Fellowship Interaction and Meet Up Program.pdfICANN Fellowship Interaction and Meet Up Program.pdf
ICANN Fellowship Interaction and Meet Up Program.pdfShreedeep Rayamajhi
 
Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...
Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...
Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...Shreedeep Rayamajhi
 
Challenges of APRALO policy Forum.pdf
Challenges of APRALO policy Forum.pdfChallenges of APRALO policy Forum.pdf
Challenges of APRALO policy Forum.pdfShreedeep Rayamajhi
 
Internet Ecosystem and challenges of IPV6 in Nepal by Shreedeep Rayamajhi.pdf
Internet Ecosystem and challenges of IPV6 in Nepal  by Shreedeep Rayamajhi.pdfInternet Ecosystem and challenges of IPV6 in Nepal  by Shreedeep Rayamajhi.pdf
Internet Ecosystem and challenges of IPV6 in Nepal by Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
Art of Assertive Commnunication, how to be visible in social media by Shreed...
Art of Assertive Commnunication,  how to be visible in social media by Shreed...Art of Assertive Commnunication,  how to be visible in social media by Shreed...
Art of Assertive Commnunication, how to be visible in social media by Shreed...Shreedeep Rayamajhi
 
Internet Ecosystem and its problems, challenges and opportunities Texas Coll...
Internet Ecosystem and its problems, challenges and opportunities  Texas Coll...Internet Ecosystem and its problems, challenges and opportunities  Texas Coll...
Internet Ecosystem and its problems, challenges and opportunities Texas Coll...Shreedeep Rayamajhi
 
Report on Commercial Law Development Program (CLDP)2022 UN Internet Governanc...
Report on Commercial Law Development Program (CLDP)2022 UN Internet Governanc...Report on Commercial Law Development Program (CLDP)2022 UN Internet Governanc...
Report on Commercial Law Development Program (CLDP)2022 UN Internet Governanc...Shreedeep Rayamajhi
 
Recommendation and Suggestion for Global Stakeholder Engagement Team.pdf
Recommendation and Suggestion for Global Stakeholder Engagement Team.pdfRecommendation and Suggestion for Global Stakeholder Engagement Team.pdf
Recommendation and Suggestion for Global Stakeholder Engagement Team.pdfShreedeep Rayamajhi
 
Shreedeep Rayamajhi Presentation on Survey Report on Disinformation and its P...
Shreedeep Rayamajhi Presentation on Survey Report on Disinformation and its P...Shreedeep Rayamajhi Presentation on Survey Report on Disinformation and its P...
Shreedeep Rayamajhi Presentation on Survey Report on Disinformation and its P...Shreedeep Rayamajhi
 
How to enagage with ICANN Community presentation by Shreedeep Rayamajhi.pdf
How to enagage with ICANN  Community presentation by Shreedeep Rayamajhi.pdfHow to enagage with ICANN  Community presentation by Shreedeep Rayamajhi.pdf
How to enagage with ICANN Community presentation by Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
How to enagage with ICANN Youth IGF 2022 presentation by Shreedeep Rayamajhi...
How to enagage with ICANN  Youth IGF 2022 presentation by Shreedeep Rayamajhi...How to enagage with ICANN  Youth IGF 2022 presentation by Shreedeep Rayamajhi...
How to enagage with ICANN Youth IGF 2022 presentation by Shreedeep Rayamajhi...Shreedeep Rayamajhi
 
Recommendation on IGF Expert Group Meeting 2022 By Shreedeep Rayamajhi.pdf
Recommendation on IGF Expert Group Meeting 2022 By Shreedeep Rayamajhi.pdfRecommendation on IGF Expert Group Meeting 2022 By Shreedeep Rayamajhi.pdf
Recommendation on IGF Expert Group Meeting 2022 By Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
Final survey on disinformation and its practice during covid 19 in developing...
Final survey on disinformation and its practice during covid 19 in developing...Final survey on disinformation and its practice during covid 19 in developing...
Final survey on disinformation and its practice during covid 19 in developing...Shreedeep Rayamajhi
 

More from Shreedeep Rayamajhi (20)

ICANN80 Mentoring Call 1 By Shreedeep Rayamajhi.pdf
ICANN80 Mentoring Call 1 By Shreedeep Rayamajhi.pdfICANN80 Mentoring Call 1 By Shreedeep Rayamajhi.pdf
ICANN80 Mentoring Call 1 By Shreedeep Rayamajhi.pdf
 
Social Media Startegy for APrIGF 2024 by Shreedeep Rayamajhi.pdf
Social Media Startegy for APrIGF 2024 by Shreedeep Rayamajhi.pdfSocial Media Startegy for APrIGF 2024 by Shreedeep Rayamajhi.pdf
Social Media Startegy for APrIGF 2024 by Shreedeep Rayamajhi.pdf
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
 
Report ICANN79 At-Large Mentor of Shreedeep Rayamajhi.pdf
Report ICANN79 At-Large Mentor  of Shreedeep Rayamajhi.pdfReport ICANN79 At-Large Mentor  of Shreedeep Rayamajhi.pdf
Report ICANN79 At-Large Mentor of Shreedeep Rayamajhi.pdf
 
.np present and future, a civil society perspective at APTLD 85
.np present and future, a civil society perspective at APTLD 85.np present and future, a civil society perspective at APTLD 85
.np present and future, a civil society perspective at APTLD 85
 
Report ICANN78 At-Large Mentor of Shreedeep Rayamajhi.pdf
Report ICANN78 At-Large Mentor  of Shreedeep Rayamajhi.pdfReport ICANN78 At-Large Mentor  of Shreedeep Rayamajhi.pdf
Report ICANN78 At-Large Mentor of Shreedeep Rayamajhi.pdf
 
Introduction and AI and Future Challenges for Sri Lanka Internet Users by Sh...
Introduction and  AI and Future Challenges for Sri Lanka Internet Users by Sh...Introduction and  AI and Future Challenges for Sri Lanka Internet Users by Sh...
Introduction and AI and Future Challenges for Sri Lanka Internet Users by Sh...
 
ICANN Fellowship Interaction and Meet Up Program.pdf
ICANN Fellowship Interaction and Meet Up Program.pdfICANN Fellowship Interaction and Meet Up Program.pdf
ICANN Fellowship Interaction and Meet Up Program.pdf
 
Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...
Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...
Comments and suggestion on Zero-Draft-Public-Consultations-FOC-Donor-Principl...
 
Challenges of APRALO policy Forum.pdf
Challenges of APRALO policy Forum.pdfChallenges of APRALO policy Forum.pdf
Challenges of APRALO policy Forum.pdf
 
Internet Ecosystem and challenges of IPV6 in Nepal by Shreedeep Rayamajhi.pdf
Internet Ecosystem and challenges of IPV6 in Nepal  by Shreedeep Rayamajhi.pdfInternet Ecosystem and challenges of IPV6 in Nepal  by Shreedeep Rayamajhi.pdf
Internet Ecosystem and challenges of IPV6 in Nepal by Shreedeep Rayamajhi.pdf
 
Art of Assertive Commnunication, how to be visible in social media by Shreed...
Art of Assertive Commnunication,  how to be visible in social media by Shreed...Art of Assertive Commnunication,  how to be visible in social media by Shreed...
Art of Assertive Commnunication, how to be visible in social media by Shreed...
 
Internet Ecosystem and its problems, challenges and opportunities Texas Coll...
Internet Ecosystem and its problems, challenges and opportunities  Texas Coll...Internet Ecosystem and its problems, challenges and opportunities  Texas Coll...
Internet Ecosystem and its problems, challenges and opportunities Texas Coll...
 
Report on Commercial Law Development Program (CLDP)2022 UN Internet Governanc...
Report on Commercial Law Development Program (CLDP)2022 UN Internet Governanc...Report on Commercial Law Development Program (CLDP)2022 UN Internet Governanc...
Report on Commercial Law Development Program (CLDP)2022 UN Internet Governanc...
 
Recommendation and Suggestion for Global Stakeholder Engagement Team.pdf
Recommendation and Suggestion for Global Stakeholder Engagement Team.pdfRecommendation and Suggestion for Global Stakeholder Engagement Team.pdf
Recommendation and Suggestion for Global Stakeholder Engagement Team.pdf
 
Shreedeep Rayamajhi Presentation on Survey Report on Disinformation and its P...
Shreedeep Rayamajhi Presentation on Survey Report on Disinformation and its P...Shreedeep Rayamajhi Presentation on Survey Report on Disinformation and its P...
Shreedeep Rayamajhi Presentation on Survey Report on Disinformation and its P...
 
How to enagage with ICANN Community presentation by Shreedeep Rayamajhi.pdf
How to enagage with ICANN  Community presentation by Shreedeep Rayamajhi.pdfHow to enagage with ICANN  Community presentation by Shreedeep Rayamajhi.pdf
How to enagage with ICANN Community presentation by Shreedeep Rayamajhi.pdf
 
How to enagage with ICANN Youth IGF 2022 presentation by Shreedeep Rayamajhi...
How to enagage with ICANN  Youth IGF 2022 presentation by Shreedeep Rayamajhi...How to enagage with ICANN  Youth IGF 2022 presentation by Shreedeep Rayamajhi...
How to enagage with ICANN Youth IGF 2022 presentation by Shreedeep Rayamajhi...
 
Recommendation on IGF Expert Group Meeting 2022 By Shreedeep Rayamajhi.pdf
Recommendation on IGF Expert Group Meeting 2022 By Shreedeep Rayamajhi.pdfRecommendation on IGF Expert Group Meeting 2022 By Shreedeep Rayamajhi.pdf
Recommendation on IGF Expert Group Meeting 2022 By Shreedeep Rayamajhi.pdf
 
Final survey on disinformation and its practice during covid 19 in developing...
Final survey on disinformation and its practice during covid 19 in developing...Final survey on disinformation and its practice during covid 19 in developing...
Final survey on disinformation and its practice during covid 19 in developing...
 

Recently uploaded

Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 

Recently uploaded (20)

Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 

Learn internet governance initiative child online safety by shreedeep rayamajhi and sajina karki

  • 1. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” CHILD SAFETY ONLINE (CSO) INTERNET AND SOCIAL MEDIA Internet and Social Media sites are very ADDICTIVE and hugely POPULAR among youths. They have many risks of PRIVACY and other cyber securities where one has to be very CAREFUL about using and understanding their PURPOSE. One has to understand that these sites are developed for COMMERCIAL purpose with the intention of REVENUE generation. These factors may look cool but they are the basic THREATS. ALWAYS understand what looks and feel real in internet may not be TRUE. Internet is just a medium of COMMUNICATION it is part of our lifestyle but not our LIFE. INTERNET CORE VALUES FOR CHILDREN 1. Internet is a means of COMMUNICATION & LEARNING 2. Internet should be used under SUPERVISION of adults only 3. STOP endorsing and acknowledging anyone or anything that you DO NOT KNOW 4. Be FOCUSED when you use the Internet 5. If there is any problem or issues ALWAYS TALK with your parents or guardian 6. Access or being sexually explicit, racist, violent, extremist or other harmful material, either through choice or in error is ALWAYS WRONG 7. STOP USING Spyware, Viruses and Malware for any purpose in your computer, smartphone, tablet or games console 8. Always RESPECT your parents TOLERANCE
  • 2. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” Risks or Vulnerabilities of Children Online  Curiosity and incline of children towards violent, sexual and pornographic content  Understanding the validating process of inaccurate or false information and extreme views  Dealing and facing issues of harmful behaviors including self-harm, anorexia and suicide  Being more lively and public by sharing personal information online  Actively or unintentionally getting involved in bullying or hurtful behavior
  • 3. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” Current evolving issues and problems: Issues and problems Indicators Online Gaming  Addiction and long-term use causes physical abnormalities  Cause increase in Aggression, restlessness and/or irritability  Isolation and the child becomes dulls  Migraines due to intense concentration or eye strain  Carpal tunnel syndrome caused by the overuse of a controller or computer mouse Mobile Applications  Screen Addiction  Impulsive behavior  Eyes straining  Limited thinking no creativity Virus and Spyware  Opening infected email attachments such as .exe files.  Opening infected files from web- based digital file delivery companies (for example Hightail - formerly called YouSendIt, and Dropbox).  Visiting corrupt websites.  Via the internet, undetected by the user (worms are an example of this).  Macros in application documents (word processing, spreadsheets etc).
  • 4. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”  USB connected devices (eg memory sticks, external hard drives, MP3 players).  CDs/DVDs Viruses and spyware can cause very serious consequences including:  Identity theft  Fraud  Deletion, theft and corruption of data  A slow or unusable computer Spam and Scam emails  Free and easy Advertising, for example online pharmacies, pornography, dating, gambling  Easy and quick links of exciting offers and getting rich quick and work from home schemes  Scanning option of Hoax virus warnings.  Appeals of Hoax charity and serving humanity  Good luck emails of forwarding it to your contacts often to bring ‘good luck’  Use of Free webmail address or sent from a completely different address  The email may not use your proper name, but a non-specific greeting such as “Dear customer.”  A sense of urgency; for example the threat that unless you act
  • 5. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” immediately your account may be closed.  A prominent website link. These can be forged or seem very similar to the proper address, but even a single character’s difference means a different website  A request for personal information such as username, password or bank details.  You weren't expecting to get an email from the organization that appears to have sent it.  The entire text of the email may be contained within an image rather than the usual text format. The image contains an embedded link to a bogus site  Use email safely  Do not open emails which you suspect as being scams.  Do not forward emails which you suspect as being scams.  Do not open attachments from unknown sources. There wide range of downloadable music, videos, software and documents. One has to Find out how your child can benefit from these legally and without risking becoming a victim of grooming, bullying, identity theft or viruses.
  • 6. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” Downloading and file sharing  viruses – downloading files or software can put computers at risk from potentially harmful programs  theft – file sharing can allow other computers to view all the files on your computer, which means that your personal information might be stolen  unsuitable images – if your child is using an illegal download site they could be exposed to pornographic, violent or age-inappropriate content  exposure to potentially dangerous strangers – it's possible to chat on some file sharing sites, which could leave your child open to grooming, bullying and abuse Hate content Hate content are easy spread and can easy victimized children who have no understand of the issues and human rights values. Digital Literacy skills is something that always requires updates :  The Other: The most basic element of hate is the idea of “the Other” – a group that is seen as being completely different from the author’s group, sometimes even portrayed as inhuman.  The Glorious Past: Another important element of hate is the idea that the group has fallen from its once-glorious past. This fall is shown as being the fault of the Other, and it is only by defeating
  • 7. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” and destroying the Other that this glorious past can be regained.  Victimhood: Hate groups typically portray themselves, and the group they claim to represent, as victims of the Other. Privacy and Identity Theft Children may be at risk of having their online identity stolen and misused. It can be difficult to maintain a child’s privacy as they may not understand what information is safe to share online, or what default privacy settings are on the sites and devices they’re using. The internet offers access to a world of products and services, entertainment and information. At the same time, it creates opportunities for scammers, hackers, and identity thieves. Learn how to protect your computer, your information, and your online files. Cyberstalking Cyberstalking can be defined as using Internet, emails, social networking sites and other technology to stalk, harass or intimidate a victim which can cause mental distress, anguish and even trauma to the victim. Cyberstalking can be direct or indirect. Direct cyberstalking includes sending threatening or obscene emails, messages or voice mails. Indirect cyberstalking
  • 8. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” involves impersonating the victim, spreading rumors about them or using Internet to post hate/obscene messages about them. A cyber stalker might just follow a person from one social media account to another, persistently messaging them, commenting on or liking all their status. Why Parents need to be cautious about Cyberstalking Cyberbullying Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior. The most common places where cyberbullying occurs are:  Social Media, such as Facebook, Instagram, Snapchat, and Twitter
  • 9. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY”  SMS (Short Message Service) also known as Text Message sent through devices  Instant Message (via devices, email provider services, apps, and social media messaging features)  Email Texting and Sexting Texting is currently one of the most instant forms of communication. While texting might be the perfect platform to say a quick "hi," there are some things to watch out for in a textual relationship with your partner. Sexting is sending sexually explicit text or photographs via mobile devices. Sometimes teens share the photographs voluntarily, but at other times teens may be coerced into taking or sending the photographs. Once the photos are sent, some kids use them to bully, harass, intimidate, or embarrass victims online or via mobile devices. Sexting between minors is a felony and can have serious legal consequences. You could be charged with a crime. If convicted you could be labeled as a sex offender for the rest of your life. Think before you "sext." Never send or post sexually provocative pictures. Once the picture is out there, it will never go away.
  • 10. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” Online Abuse and Harassment Online abuse is any type of abuse that happens on the web, whether through social networks, playing online games or using mobile phones. Children and young people may experience cyberbullying, grooming, sexual abuse, sexual exploitation or emotional abuse. Parents tools and option available  Educate and update yourself about the issues and problems about child online safety  Parental Control software  Firewall  Antivirus  Talking more about Safe internet browsing
  • 11. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” Primitive Measure  Apart from installing internet security software and keeping it updated, we recommend a number of other ways in which to keep your computer protected against viruses and spyware. After all, prevention is better than cure.  Email from an unknown, suspicious or untrustworthy source should not be open  Before installing an antivirus always check and make sure there is no other antivirus installed  Always scan the USB devices and be careful with USB connected devices (eg memory sticks, external hard drives, MP3 players) as they are common carriers of viruses and malwares  Always check and be careful with CDs/DVDs  Do not open any files from web-based digital file delivery companies (eg YouSendIt, Dropbox) that have been uploaded from an unknown, suspicious or untrustworthy source  Switch on macro protection in Microsoft Office applications like Word and Excel.  Always buy registered copies of software, do not use pirated software  Downloading free software can be great threat so be careful while downloading
  • 12. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” Mentality and Strategies Age Group Values Strategy 0-5 Integration of Internet values  Developing the Concepts and values of internet  Bonding and sharing with children  Creating better communication strategy  Priority and preference use of internet 6-12 Curiosity  Concept of safe browsing  Concept of human rights  Threats of cyber bullying  Social media and intervention (Parental Software and watch a must ) 12 and above Addiction and Carelessness  Listern to what they have to say  Talk with them more about current issues of cybers securities and issues  Spent more time  Make rules of using internet and home discipline  Family time  Try to be a friend
  • 13. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” Source: UKCISS
  • 14. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” Things to remember 0-5 years Always make a point of giving your children access to internet for learning purpose only and set a limits for the amount of time they can spend on the computer Devices like mobile, tablet or laptop should not be easily access to children. Always keep your devices passwords/PINs protected for unauthorized use Set parental controls on computers and any other devices your child has access to enabling access to only appropriate content Always buy or download only apps, games, online TV and films which have age ratings, which you should check before allowing your child to play with or watch them Discipline should be maintain in technology rules as children learn from parents so first parents have to live by example While using internet in public place always check what your child is accessing or looking at, always keep a watch when you are in public wifi zone and how your child is reacting to the free service
  • 15. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” Things to remember 6- 12 years  Set the parental controls to the appropriate age, and enabling access to only appropriate content on computers and any other devices your child has access to  Update your parental control software and switch it on at all times  Build a discipline in terms of when where and how to use internet and other communication medium. Time setting can really help them for activities such as using the internet and games consoles  Allow only age-appropriate content by checking out the age ratings on games, online TV, films and apps  Keep the Internet discipline with all member in the family discuss with your older children what they should or shouldn’t be showing their younger siblings on the internet, mobile devices, games consoles and other devices  Don’t be pressured by your child into letting them use certain technologies or view certain online content, if you don’t think they are old enough or mature enough, no matter how much they pester you or what their friends’ parents allow  Give your child a lesson of privacy and how important it is to keep phones and other devices secure  Discuss with your child what is safe and appropriate to post and share online. Written comments, photos and videos all form part of their ‘digital footprint’ and could be seen by anyone and available on the internet forever, even if it is subsequently deleted  Talk with your child about the kind of content they see online. They might be looking for information about their changing bodies and exploring relationships. They also need to
  • 16. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” understand the importance of not sending other people - whoever they are - pictures of themselves naked  Always ask them to respect the rules and regulation in terms of age restriction and limitation and remember that services like Facebook and YouTube have a minimum age limit of 13 for a reason  Be sure to make them understand that being online doesn’t give them anonymity or protection, and that they shouldn’t do anything online that they wouldn’t do face-to-face Things to remember 13 and above  Your child is in his or her teens It’s never too late to reinforce boundaries though there might be a resistance that they may think they are adult enough, but they definitely still need your wisdom and guidance  At this age Technology and internet may seem and sound easy but always make it your business to keep up to date and discuss what you know with your child  This is the times where parents need to do some homework your child may be curious about health, wellbeing, body image and sexuality of themselves and others online. They may be discovering inaccurate or dangerous information on online at what is a vulnerable time in their lives so parents have to be very watchful and prompt  Always Review the settings on parental controls with age of your child. They may ask you to trust them sufficiently to turn them
  • 17. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” off completely, but think carefully before you do and agree in advance what is acceptable online behavior  Have small talk session about bullying, and posting hurtful, misleading or untrue comments how they behave towards others. Make them aware of the dangers of behaviors like sexting and inappropriate use of webcams  Don’t give them access to your payment card or other financial details.  Be clear about copyrighted material and plagiarism so that you make a point about what is legal and what is illegal
  • 18. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” THE MATRIX EDUCATE YOURSELF TALK MORE WITH YOUR CHILDREN SPEND MORE TIME BE AN IDOL STOP LIVING IN INTERNET WORLD LISTERN TO YOUR CHILDREN Internet Safety Child Online Protection
  • 19. Learn Internet Governance (Learn IG) initiative for “CHILD ONLINE SAFETY” Information about the Researcher Shreedeep Rayamajhi Link: https://en.wikipedia.org/wiki/Shreedeep_Rayamajhi Email: shreedeep@rayZnews.com Website: http://www.rayznews.com Adv. Sajina Karki Link: https://en.wikipedia.org/wiki/Sajina_Karki Website: https://learninternetgovernance.blogspot.com/