Congressman Sean Maloney
123 Grand Street
2nd Floor
Newburgh, NY 12550
Dear Congressman Maloney,
Hello. I am writing to you to stress the urgency of protecting the children and teens of America from internet predators. I have recently read a book called Want to go Private by Sarah Darer Littman and it has inspired me to bring this to your attention. It is a major problem that is occurring everyday and something needs to be done about it. Children and parents are uneducated about the dangers of it all, and it is time for change.
Most parents have never discussed the importance of internet safety with there children, which is a a huge problem. Children and teens need to be more aware of what and who they can run into while searching the web or chatting online. They do not know any better, and it is the parents and school’s job to make sure that they are well-informed.
93% of teenagers use the internet, and out of that percentage, 63% of teens go on every single day. Most of these teens explore chat rooms and other social networking sites. They give out there personal information, and expose themselves to predators. Most predators prey on teen girls who are depressed or have recently experienced a life changing event. Boys that are gay or confused about there sexuality are at an increased risk when it comes to predators. Some predators use a process called “grooming” where they use their words to gain the trust and love from the teen, and then they trick them into running off and doing sexual acts with them. Situations like internet predators can cause kids and teens to go missing, and sometimes even be found dead. For the kids who return home safely, they usually have many emotional problems afterwards. That was the situation that occurred in the book that I read.
Online sexual solicitation is a type of sexual harassment on the internet. 30% of teen girls have experienced this type of harassment. It comes in many forms, such as exposure to pornography, being asked to do something sexual, or even being asked to give out personal information. Most teens do not tell there parents about this harassment because they are afraid to do so. The Children’s Online Privacy Protection Act (COPPA) was created to help keep children safe while they are online by mandating parental consent when children set up accounts on any website. The issue with this law is that it is not really affective. Kids and teens have their sneaky ways to getting around stuff like that, such as creating fake email accounts and pretending to be there own parents. I think that there should be a more strict law.
The Children’s Internet Protection Act (CIPA) was enacted by Congress in 2000 to address concerns about children’s access to obscene or harmful content over the Internet. CIPA imposes certain requirements on schools or libraries that receive discounts for Internet access or internal connections through the E-rate program – a program that makes certain communications services and products more affordable for eligible schools and libraries. In early 2001, the FCC issued rules implementing CIPA and…
Essay on the External Business Environment In this essay, the organisation that I will be looking at is John Lewis. The outcome of the essay is to analyse how John Lewis is affected by the macro environment, analyse John Lewis using PESTLE and evaluate the strengths and limitations of using PESTLE as a strategic diagnostic tool. To discuss the market system and apply a range of market theories to John Lewis and to understand the organisational environment. There are many factors in the macro…
need to use them because they are essential for their work and makes them available, easy to contact and reachable at any time. Regardless of using them, they should make use of the free-handset or the voice speaker, which could be used as a health safety in order to keep a person’s head away from such a device. In addition, while driving, pulling over and receiving your call would be much safer for you and others that are with you on the road. I think cellular phones are great devices but only…
Large plate Potato masher or fork Very sharp knife Large bowl Chopping board or large plate Vegetable peeler (sometimes called a potato peeler) METHOD (Take a photo of each step) 1. Toast the bread on the oven grill. (For safety reasons, remember to leave the griller door open ) 2. Cut the toast into triangles and leave to cool on a plate. 3. Peel and mash the avocado in large bowl. 4. Squeeze lemon juice over the avocado so it will not go…
University of Phoenix BIS/220 Week 1 Essay: “Advancements in technology resulted from legislated Acts” The advances of information in technology has advanced so much in the past couple of years that it has stemmed into new ethical matters necessary in the establishment of particular acts to be recognized in which the government implemented. These wide-ranging topics in relation to informational electronic systems include the control and access to information, confidentiality and exploitation…
Firewalls: Putting a Limit on Learning High school English teacher, Ms. Smith, searched all night for the perfect tutorial on how to write an essay for her struggling students. She was about to give up when she found the perfect video on YouTube. In the next class, excited for this influential lecture, Ms. Smith opened her laptop to show her students the video, but when she tried to open the link the website simply read “ACCESS DENIED.” The gray ambiance of the projector stared at the faces of…
on-line space such as on a social networking site (e.g. Facebook), Skyping, blogging, in an on-line forum, emailing, posting/commenting on a YouTube video, or gaming. Reflect critically on exactly what is going on in this on-line space. In your essay address the following questions: Which on-line space have you chosen and why? What social relations are taking place in this space? Who else is occupying your chosen space (think about real people, avatars, on-line personas)? How do the other people…
and conclusions. Learning Outcomes: Demonstrate knowledge of individual and collaborative research processes. Develop ideas and synthesize primary and secondary sources within focused academic arguments, including one or more research-based essays. Analyze, interpret, and evaluate a variety of texts for the ethical and logical uses of evidence. Write in a style that clearly communicates meaning, builds credibility, and inspires belief or action. Apply the conventions of style manuals…
how they feel students should appear, behave and learn. School boards often face the onerous task of creating up to date policies on issue ranging on types of logos allowed on a t-shirt to the type of content allowable for students to view on the internet. For this reason, censorship has gone from a few guidelines to becoming a re-occurring disturbance in education. Censorship was once seen as a fundamental tool used to keep provocative material such as sex, drugs, alcohol out of view for minors.…
hGrand Canyon University 13 Comprehensive Classroom Technology Plan Tabitha Garcia Grand Canyon University 13 Comprehensive Classroom Technology Plan Tabitha Garcia Tabitha Garcia EDU 225 March 31, 2013 Dr. Howard Janoff Comprehensive Classroom Technology Plan Outline i. Vision and Mission Statements and Rationale ii. Communications Plan iii. Integrating Instructional Technology iv. Software to Support Assessment v. Technology Ethics in the Classroom…