This term is used to describe taking a break from electronic devices to relax, recharge, or engage in offline activities.
What is "Unplug"?
This term describes the act of revealing too much personal information online, which can lead to privacy risks and unwanted consequences.
What is "Oversharing"?
This legal concept grants creators exclusive rights to their original works, including the rights to reproduce, distribute, and display their creations.
What is "Copyright"?
This action involves notifying a platform’s administrators or moderators when you encounter instances of cyberbullying to seek resolution and support.
What is "Report the Behavior"?
This occurs when someone unlawfully obtains and uses your personal information, such as Social Security numbers or credit card details, to commit fraud.
What is "Identity Theft"?
This term refers to the healthy integration of screen time with other activities in your life, ensuring that technology use doesn’t overwhelm other important aspects of well-being.
What is "Media Balance"?
This term refers to the trail of data you leave behind when you interact online, including your posts, comments, and the websites you visit.
What is a "Digital Footprint"?
This term refers to works whose copyright has expired or that were never under copyright, allowing them to be freely used by anyone without permission.
What is the "Public Domain"?
This approach involves offering emotional and practical assistance to someone who is being targeted by cyberbullying, helping them feel less isolated.
What is "Support the Victim"?
This term refers to sensitive data about individuals, such as addresses, phone numbers, or financial details, which should be protected from unauthorized access.
What is "Private Information"?
These are the patterns of behavior and routines we develop around the use of technology and the internet, including how often we check our devices.
What are "Digital Habits"?
This practice involves regularly reviewing and adjusting your online presence to protect your privacy and ensure you’re comfortable with what is visible about you.
What is "Managing Your Digital Footprint"?
This doctrine permits limited use of copyrighted material without permission for purposes such as criticism, comment, news reporting, teaching, scholarship, or research.
What is "Fair Use"?
This step involves keeping records of cyberbullying incidents, such as screenshots or copies of messages, to provide proof if necessary.
What is "Document Evidence"?
This term describes deceptive schemes conducted online to defraud individuals, often involving fake offers or fraudulent websites.
What is an "Internet Scam"?
This term refers to content such as videos, articles, and images that are created, distributed, and consumed using electronic devices.
What is "Digital Media"?
These are tools used by websites to collect information about your browsing habits, which contributes to your digital footprint.
What are "Cookies and Tracking Technologies"?
This practice involves taking a portion of a sound recording and reusing it in a new musical composition, often requiring permission or licensing from the original creator.
What is "Sampling"?
This strategy includes learning about the signs of cyberbullying and sharing this knowledge with others to foster a more informed and proactive community.
What is "Educate Yourself and Others"?
This cybercrime involves sending fraudulent emails or messages that appear to come from legitimate sources in order to steal personal information or login credentials.
What is "Phishing"?
This term describes the uneasy sensation you get when something online doesn't seem right or feels uncomfortable.
What is a "Red Flag Feeling"?
These are tools provided by social media platforms that allow you to control who can see your posts and personal information, helping manage your digital footprint.
What is "Social Media Privacy Settings"?
This artistic method involves creating a new work by assembling various materials, such as photographs, paper, and fabric, onto a surface to form a cohesive piece.
What is a "Collage"?
This preventive measure involves adjusting the privacy controls on social media accounts and other online platforms to limit exposure to potential bullies.
What is "Set Privacy Settings"?
This is a condensed web link that can obscure the destination site, making it a potential tool for phishing attempts to deceive users into visiting malicious sites.
What is a "Shortened URL"?