What is "Be Kind"?
Being nice to everybody while using the internet. Do not hide behind the screen and be a bully, there can still be consequences for your actions even if using a gamer tag or username!
What is "Password Safety"?
Keeping your password secure and private to ensure your personal accounts and information is not able to be hacked into and stolen!
What is "how many social media users are in the world as of 2019"?
2.77 BILLION!
The use of technology to communicate bullying individual(s), this can be in a form of a message, comments, threats, photo's, memes, videos, rumours, et cetera.
hyper-realistic video, audio, or images of someone appearing to do or say things they didn't do or say.
What is "Privacy Settings?"
Create strong privacy settings on your social media accounts to prevent unwanted viewers!
What is "Different Passwords" ?
Using different passwords for each account you have, not just different variations of the same password!
What is "sharing vacation posts"?
Try to post your photo's and vacation posts once you have returned home! If sharing when you are gone, it allows room for strangers to know where you are and that your home may be empty!
What is "Saving the evidence"?
Saving evidence is the act of keeping proof of the bullying you have encountered or experienced (screen shot the comment, save the photo, et cetera). This is for the purpose of reporting it!
What is "how are they made"
They are made using artificial intelligence
What is "keeping personal things personal" ?
Keep your personal information to yourself! (address, name, families information/names, school or job, location)
What is "being creative"?
Password creativity is making your password something personal and creative that only you would know, it is like an inside joke with yourself!
What is "limiting access to data"?
When playing a game/take a quiz on social media, you allow third parties access to your data which can allow them the chance to hack into your account and post onto your social media!
What is "talk to a trusted adult"?
Talking to a trusted adult allows you to feel safe when expressing what you have experienced or witnessed. It also will help them be able to help you!
What is "the word deep fake a mash-up of"
Deep Learning and Fake
What is "meeting new people"?
If making friends online through gaming or social media, talk with a trusted adult to help you ensure the person you are speaking to is who they say they are! safety first!
What is " Keeping them to yourself" ?
Don't share your password with anybody! The only person you should ever share passwords with if anyone would be with your trusting guardian. Keep them in a safe and secure place (in your desk drawer for example)
What is "Spam content"?
Be careful of spam! Do not click on random links from people on your social media or email! These links may take you to websites asking you to download a program or update your software but will download malware onto your computer!
What is "Don't respond"?
Not responding to the bully! Ignore the bullying in the aspect of not responding, and talk to a trusted adult about it.
What is "Why are Deep Fakes no Illegal"?
Technology is moving quicker than the law (Can't keep up), the technology can also be used for good! (Such as helping people with ALS)
What is "usernames and nicknames" ?
Using usernames and nicknames instead of your fully name whenever possible!
What is "Change security questions"?
Change your security questions and keep these personal as well. Every account that has you create security questions, choose different ones so it is harder to hack!
What is "unique passwords"?
Make your passwords unique! Use numbers, symbols, upper and lower case letters, and make it personal to you (like your own inside joke)
What is "Block the bully"?
Blocking the bully is the act of using the "block user" option on your social media accounts to prevent the bully access to your profile and ability to further harass or contact you!
What is "how can deep fakes be prevented from negative use"?
countries must decide which deep fakes are usable and which are not, laws to share deep fake information, develop media forensic techniques