Page 1

OFC & OBC HT 2009


12:40 PM

Page 1


yberbullying: An Emerging Threat to the “Always On” Generation By Bill Belse y, President, Canada April 20th, 1999 was a day that changed my life. It began like many other days, but somewhere along the way, an emotional tsunami flooded my consciousness as news emerged of a school shooting at Columbine High School in Mid dleton, Colorado. Eight days later, a cop ycat shooting took place at a high school in ruralAlberta.This was clearl y not a“Bigcity” problem or an “American” problem; it was e veryone’s pr oblem, as a Canadian parent and educator, it was also MY problem.

I realized that something new was being experienced and reported by young people around the world. In response, I created, the world's first Web site specifically dedicated to the emerging issue of cyberbullying. It became apparent soon afterwar ds that the young people who committed these heinous acts w ere r elentlessly bullied and teased thr oughout their o yung lives. In response to these deeply disturbing tragedies,I created aWeb site, I decided that the Web site would have three goals;first,to help people, especially young people, learn that they are NOT alone in dealing with bullying in their lives, to help them realize that being bullied is NO T their fault and that they CAN do something positive about it. allows people to connect in a saf e, moderated online comm unity where they can share their stories, poetry, drawings,music, animations and videos.A team of v olunteer reviewers moderates replies and the original submissions.Visitors to the Web site can also use the worlds’ largest online database of helpful resources on to find information about bull ying. began to quickly create quite a buzz online through “wordof-mouth” e rferrals,as it was successfully filling a tremendous need or f information and suppor t.Then,on May 21,2001, I was fortunate enough to do an interview with CBC NationalTelevision News anchor Peter Mansbridge during which Mr. Mansbridge was generous enough to refer to as“One of the best Web sites in the w orld for young people”, that night, was pr opelled to another le vel. The national non-pr ofit educational organization, Canada was cr eated shortly thereafter to help support and expand our national vision. has since received as many as three quarters of a million visitors and contributors fr om acr oss Canada and around the world in one month and is listed as one of the top "bullying" referenced Web sites in the world by and man y other Internet sear ch has since been chosenor f the ChildNet International Award which goes to projects that mak e the Internet a better place or f youth,as well as being a finalist in the Stockholm Challeng e Award which has been called the Nobel Prize of the IT (Inf ormationTechnology) world.


Young Canadians ar e mor e connected than ever • Access is almost univ ersal. Ninety-four percent of y oung people sa y the y g o online fr om home , compared with 79 percent in 2001. Sixty-one per cent report having high-speed access. * • Many students r eport that the y ha ve their o wn Internet connection. In total, 37 percent have their own Internet-connected computer . Twenty per cent of Grade 4 students access the Internet through their o wn personal computer . That n umber climbs to 51 per cent b y Grade 11. * • Points of access include more than computers.Twenty-three percent of students report ha ving their o wn cell phone , 44 percent of which have Internet capability. Fifty-six percent of students’ cell phones have text messaging and 17 percent have cameras. * • Twenty-two per cent of students ha ve their o wn Webcam. In Grade 11 that number is 31 percent. * • A 2002 British sur vey found that one in four y outh, aged 11 to 19 has been threatened via their computers or cell phones, including death threats. - NCH National Children's Home (UK) * Young Canadians in a Wired World – Phase II Conducted by ERIN Research for the Media Awareness Network and funded by the Government of Canada.

We do our work, send our e-mails and the like and then we are done for the most par t. But for the “Always On” generation, the use of ICTs has become a digital umbilical chord to their peer group

through programs such as ICQ, AOL, MSN, or Yahoo! Messenger systems as it is instantaneous, and e-mail is now considered “too slow” for many young people today.

tims f eel that ther e is something wr ong with them, but victims should kno w that there is NOTHING wrong with THEM. It is THE BULLIES who have the real problems.

Adults tend to r elate to the use of various Information and Comm unication Technologies (ICTs) in quite functional ways. We do our w ork, send our e-mails and the lik e and then w e are done f or the most part. But for the “Always On” generation, the use of ICTs has become a digital umbilical chord to their peer group.Among the A-O generation, responses are not only expected, they ar e expected pr omptly, to do so otherwise is consider ed a real social faux-pas.

Cyberbullying is different from other forms of bullying in a n umber of ways. While bullying is something that is often under the radar screen of adults, cyberbullying is even more so as toda y’s y outh, a gr oup that I have dubbed the “Always On” generation, feel it most often and most intensel y. This generation is increasingly communicating in ways that are often unknown by adults and away from their supervision.

If y ou ar e thinking that I-M-ing is some “Tween or teen-fad” that will e ventually go away, to illustrate how mainstream this has become, it might interest you to learn that I-M is growing at a rate 30% faster than email did at its inception. The mobile phone is to toda y’s kids what the Nik e “Air Jordan” sneak er was to pr evious generations to y oung people . The mobile has become the new prototypical “Teen badge” social status item. It is personalized with coloured faceplates, personalized ringtones, still and video cameras and mor e. It used to be that school and home w ere the places wher e kids w ent online and adults had some contr ol o ver when and where the y w ent online , but no mor e. Young people can no w chat via I-M, send text and multimedia messages with still and video images, surf the Web and chat online, all from the palm of their hand from almost anywhere, because toda y’s mobile phones are really powerful, very portable multimedia computers. The ubiquitous natur e of Internet connectivity poses real problems for young people today, and f or w e adults who car e about our kids. One of the v ery r eal thr eats to our kids in this fluid, mobile comm unications environment is cyberbullying.


"Cyberbullying involves the use of inf ormation and comm unication technologies to support deliberate , repeated, and hostile behaviour by an individual or gr oup, that is intended to harm others." –Bill Belse y What Forms Does Cyberbullying Take Cyberbullying can ha ppen through the use of e-mail, cell phone text (SMS) and m ultimedia messages (MMS), instant messaging (IM), defamatory Web logs (Blogs), personal Web sites, and online personal polling sites. How is cyberbull ying diff erent fr om other forms of bullying?

For this “Always On” generation, being connected to one’s peer group means being online often. Increasingly it means being online synchr onously, in “real time” or at the very same time as y our peers. Most of the time these connections are made via “IM” or Instant Messaging. I-M is facilitated

Cyberbullying, like other f orms of bull ying, is about human r elationships, power and control. Those who bull y others ar e tr ying to establish power and control over others that the y per ceive to be “weaker” than them. Those who bull y want to mak e vic-

Victims of cyberbullying are often also afraid to report to adults about being cyberbullied, as they also fear that adults will over-react and take away their mobile phone , computer and/or Internet access . Cyberbullying is also diff erent in that it is a particularly co wardly f orm of bull ying. Cyberbullies can more easily hide behind the anonymity that the Internet can pr ovide. Cyberbullies can communicate their hurtful messages to a v ery wide audience with remarkable speed. Cyberbullying does not pr ovide an y tangible feedback about the consequences of using information technologies to cyberbully others. Cyberbullies do not have to own their actions, as it is usuall y very difficult to identify cyberbullies, so they do not fear being punished for their actions. Cyberbullying is often outside of the legal r each of schools and school boar ds as this beha viour often ha ppens outside of school on home computers or via mobile phones.Victims of bullying are often fearful of telling others about being bullied because they fear that the bull ying ma y actuall y become worse if they tell. Victims of cyberbull ying are often also afraid to r eport to adults about being cyberbullied, as they also fear that adults will o ver-react and tak e a way their mobile phone, computer and/or Internet access. This is something that is incr easingly unthinkable for the “Always On” generation as not being online means not being able to socialize or communicate with their peers, and this fear of exclusion is paramount in the liv es of most adolescents and teens. In most cases, cyberbullies know their victims, but their victims ma y not kno w their cyberbullies, the aggressors may or may not bully their victims thr ough physical, verbal, emotional or psychological means that ar e more easil y identified. With the adv ent of mobile, wireless Internet access, communications have become more ubiquitous. As a result, Cyberbullying can ha ppen an y time and any place and f or many children, home is no linger a r efuge fr om negativ e peer pressure such as bullying.

Technology for the masses

Adults see the Internet as a r esource or a “place that the y can g o to” to ser ve their needs. Young people don’ t think of it as being separate from their lives, increasingly it is a normal and “natural” par t of their world.


Shortly after www‘s launch, I realized that something ne w was being experienced and reported by young people around the w orld. In r esponse, I cr eated, the world's first Web site specificall y dedicated to the emerging issue of cyberbull ying. has often been cited as the first to use this word and define this emerging behaviour.

Some f orms of cyberbull ying ar e consider ed criminal acts. Under the Criminal Code of Canada, it is a crime to comm unicate repeatedly with someone if your communication causes them to f ear for their own safety or the saf ety of others. It is also a crime to publish a “defamatory libel”, writing something that is designed to insult a person or likely to hurt a person’s reputation by exposing him or her to hatr ed, contempt or ridicule. A cyberbully may also be violating the Canadian Human Rights Act, if he or she spreads hate or discrimination based on race, national or ethnic origin, colour, religion, age, sex, sexual orientation, marital status, family status or disability.What can be done about cyberbull ying?



Awareness and education are the keys to the prevention of cyberbullying! Spend some time on the Web site learning what you can do about cyberbullying. It is often a very hurtful, difficult and time-consuming challenge to deal with the eff ects of cyberbull ying after it has occurred. It can tak e a lot of time and eff ort to get Internet Ser vice Providers (ISPs) and Mobile Telecommunications Ser vice Pr oviders (the phone companies who sell you your cell phone and pagers) to respond and deal with your complaints about being cyberbullied.

Technology for the masses


he real threats and dangers of cybercrime are a constant challenge for all who use the internet f or research, business and personal e .mail, surfing, instant messaging and, increasingly, social networking. Costing individuals and companies literall y billions of dollars each year, cybercrime is capitalizing on the trust and naiveté of users of all ages who belie ve their security programs offer protection from scammers and online predators. New security programs and systems are constantly being introduced to combat the scams and viruses that confront everyone – even pre-teens. Not only are they susceptible to sexual predators, but even their school friends use today’s increasingly sophisticated hi tech tools to bull y their peers or even strangers. Addressing this aspect in par ticular is the youth web-proofing site , which was introduced in 2004 by the Ottawa Detachment of the RCMP and, with the added expertise and input of key partners, subsequently launched in 2007 and endorsed b y other police forces and school boards and educators across Canada. One of the www.internet101.cafinancial supporters from the beginning is the RCMP Foundation, which was formed in 1994 to support the work of RCMP members across Canada who tirelessly and voluntarily develop and coordinate programs with groups in their communities to transform the lives of Canada’s youth at risk. The programs support areas such as internet safety, anti-bullying, child safety, drug awareness, crime prevention, literacy and victim assistance. The Foundation also supports, the ‘by youth for youth’ initiative that acts as their voice, provides information on issues important to them, and is a forum for expression. The site also encourages leadership and involvement in school and community activities, and advocates healthy life choices to overcome the challenges of personal, family and community life. A total of approximately $250,000 is contributed each year by the RCMP Foundation to launch or sustain programs for individuals, youth groups and communities at risk. These endeavours have focused on a wide range of issues,

including on-line luring, using actual events to drive home the messages of caution, privacy, trust and security; bullying – in person and on line; building self-esteem and confidence; providing alternatives to vandalism, drugs, alcohol, petty crime – alternatives like developing recreation facilities and coaching, reading challenges, movie nights – in essence , activities that will keep kids out of trouble. The original source of funding revenue is royalties derived from the Foundation’s management of the RCMP image licensing program which licenses manufacturers to produce and market recognized official products that depict the RCMP logo and/or image. This income is now supplemented by the introduction of the Foundation’s own retail marketing facilities - two The Mountie Shop outlets in Ottawa, ON, at the RCMP Headquarters and at the RCMP Musical Ride Centr e, as well as at the RCMP Pacific Region Training Centre in Chilliwack, BC. In addition, the development and launch of allows the integrated website to market RCMP merchandise to enthusiasts the world over, with news, new products and promotions announced monthly. Many new initiatives have been added in the past 14 years, and the future will see increased involvement with new and enlarged programs designed to elicit ad ditional financial support to enable the F oundation to offer a better future for groups and individuals in comm unities large and small across Canada. One such initiative is the corporate-sponsored gala fundraising event which was successfully launched in Ottawa four years ago, with three even more successful galas subsequently held in Toronto.Today, levels of the public and private sectors are also valued as contributors to the g oals and objectives through partnerships in this annual fundraising Gala event in Toronto. All profits are used with the same atrisk youth and communities’ goals in mind. Programs which address concerns or situations in comm unities and involve the ongoing participation of local RCMP members are eligible for consideration for funding matching that contributed in the community. Applications are invited from RCMP members and/or community groups twice annually, Spring and Fall – just visit www.rcmp-f.cafor information, and those approved are funded according to compatibility with criteria. Deadlines for submissions are April and October. Since 1994, the RCMP Foundation has provided nearly $3 million to over 500 community initiatives in support of youth at risk across Canada. All activities link to become the focus of marketing and communications strategies that support the commitment of members to comm unities, and enable our charity to disburse the mer chandise profits for the benefit of Canada’s youth and communities at risk. • www Ann McRoberts Communications Coor dinator The RCMP Foundation

FURTHERMORE, • Pick secure passwords. • Regularly save your data to avoid losing it. • Consumers be ware when buying on line . Take the same pr ecautions as for traditional transactions. • Supervise your children when they surf the Net. Do not set up a computer in your child’s room but rather in a famil y room.



n incr easing n umber of Canadian families ha ve access to Internet. When used with caution, cyberspace is an extraor dinary communication and information medium. However, surfing the Net involves certain risks. The Internet is a netw ork of millions of inter connected computers. Unlike a TV set, the computer provides for two-way communication. In other words, when you connect to another computer, not only do you receive information, but you also transmit data! Furthermore, the Internet is a w orldwide network that is not y et regulated like radio or television. For instance, what is illegal in Canada can be perfectly legal in another country. However, as Canadian citizens, we have to abide by the laws of our countr y. In short, jurisdiction on the Internet is a complex issue. For this reason, the saying,“An ounce of prevention is worth a pound of cure” takes its full meaning when you surf the Net.

PROTECT YOURSELF! Here are three basic precautions you should take in order to surf the Net in a more secure manner: • Make regular updates of your computer system (software, operating system, etc.). • Get a good anti-virus software and update it regularly. • Get a good firewall and update it regularly.

Hacking is the pr ocess of gaining unauthorized access to a computer system. There are many ways this can be accomplished, but the three most common are: 1. Exploiting preexisting bugs in the target system softwar e to gain access. 2. Taking advantage of a system's poorl y configured software security protocols to gain access. 3. Installing a Trojan horse program which, when executed by a user of the target system, provides a back door thus permitting the hacker to enter.

Recommendations • To protect against item # 1, you must download and install y our system software security updates on a r egular basis. This will prevent hackers from taking advantage of kno wn exploits. To protect yourself from yet unknown exploits, you should install a computer firewall. Your computer has 65,536 por ts (like doors, they are the only way to enter your computer), of which you probably only use about fiv e (5). A firewall closes all the doors y ou don't need thus minimizing the chances of a hack er entering. • To protect yourself against item # 2, you should turn off all unnecessary services. For example, if you don't need Telnet or SSH, turn them off.You should use a firewall and you should turn logging on. Make sure you use g ood passwords (at least 8 characters, not a word in the dictionary, using capitals and non capitals, numbers and symbols).There exist products called Intrusion Detection Systems (IDS) which can notify you of a possible attack.They will even send a message to your pager if you wish. • To protect yourself from item # 3, you should install anti-virus software with up-to-date virus definitions (most anti-virus software will detect Trojan horses too).This will help prevent infection.A properly configured firewall will prevent the use of a Trojan horse b y the attack er b y closing the “door” it uses to communicate, thus effectively rendering it useless.

Viruses A computer virus is a small piece of software that attaches itself to other computer pr ograms. Every time the program is run, the virus is run too, which can cause damage to y our system (such as erasing y our hard driv e). Viruses also r eplicate when the program is executed, thus spreading to your computer hard drive and other storage media.

• Never open attachments to e-mail messages r eceived fr om unkno wn or nonsecure sources. • Get g ood quality anti-virus and fir ewall software and update them r egularly. Since ne w viruses ar e generated e very day, software of this natur e is not f oolproof, but it will reduce the risk of contamination of your computer. • Take down information on the person(s) who ha ve sent the viruses and notify your Internet service provider.

Worms, such as Code Red and Code Red II, cause millions of dollars in damage by consuming system resources and overwhelming the Internet. When parts of the Internet go down, millions in revenue are lost. Worms A w orm is a self-r eplicating program that resides in memor y (RAM) and in most cases does not alter files on the hard drive. It pr opagates b y sending itself to other computers in a netw ork. The netw ork could be internal, such as in a compan y, or it could be the Internet itself. Unlike viruses, a worm is a separate entity, it does not attach itself to other files or pr ograms. One of the wa ys a w orm can spr ead is b y

sending itself to e veryone in y our e-mail program's address book. Worms, such as Code Red and Code Red II, cause millions of dollars in damage b y consuming system r esources and o verwhelming the Internet. When par ts of the Internet g o do wn, millions in r evenue ar e lost. Even or dinary citizens can f eel the effects of a w orm as it eats up their system's r esources and slo ws do wn their computer.

Recommendations • Install a firewall that will close all but the ports you actually use. • Install anti-virus softwar e that will pr otect y ou fr om the rar e w orm that will access the hard drive. • Be a ware of suspicious e-mails that come in fr om e veryone y ou kno w, all with the same content. If this is the case, close your network/Internet connection immediately to prevent the spread of the worm. • Install all pr ogram and system security updates as the y become a vailable. This will pr event w orms fr om coming in through a vulnerability in your software.

Trojan Horses

A Trojan horse is a malicious computer program that disguises itself b y pretending or a ppearing to be something that is benign. Trojan horses can pr etend to be a game, screen saver or just about an y program f ound as an e-mail attachment. A Trojan horse is an ex ecutable file, meaning

that when you double click on it, for example, it will run the pr ogram. Some possible file extensions for executable files are: exe, bat, pif, com, vbs. Beware of double extensions such as photo .jpg.exe which ma y appear to be an image file, but instead is an executable pr ogram. By default, Windows hides extensions, so this file w ould appear as “photo.jpg”, a popular type of image file . A Trojan horse, once executed, can destroy files or open up a "backdoor" to your computer, allowing someone to enter and control your system.They can copy and delete files or use y our computer as a stepping stone to hack other computers. They can even watch you via your Web cam!



Recommendations • Install a personal firewall that closes all ports of entr y into and out of y our computer , except for the few that you really need. • Install anti-virus software and keep your virus definitions up to date . Anti-virus software may not detect all Trojan horses, but it will catch some of them. • Never run suspicious ex ecutable pr ograms. • Set up y our computer to sho w complete file names and extensions in your folder options to avoid those evil double extensions. • Consider the use of specific antiTrojan software. • Never use f eatures in pr ograms that pr eview or run attachments automatically. • Apply all a vailable system softwar e security.

Technology for the masses


here was home work bef ore there was a w orldwide w eb. During those strange and primitive times, the librar y was the first stop; not to set up at a computer to surf the net f or material but to find books, periodicals, clippings, and other printed documents.

Authors on the web, across the globe create more and more material every day and an important part of using the internet for research is navigating “infoglut” or “information overload”.

The internet age giv es childr en far greater access to information than ever before. Many students in Canada will not need to wait f or classmates to finish with the same volume of the school library’s onl y encyclopedia. For households even with slo w internet connections and modest computing po wer, a good dictionary is only a few keystrokes and mouse-clicks away. With the w orldwide w eb at their fingertips, there is an abundance of inf ormation on a wide variety of subjects. Authors on the w eb, across the globe create mor e and mor e material e very day and an impor tant part of using the

internet f or r esearch is na vigating “infoglut” or “information o verload”. Without sa vvy internet r esearch skills, students can waste pr ecious time and energy sifting thr ough infoglut and risk relying on misinformation. Smart internet research is based on caution. Expect that a lot of what is posted on the w orldwide web is junk or worse. Not that the w orldwide w eb is all lies and misinf ormation but ther e is so m uch of e very kind of information: the g ood, the bad, and the “junk” (which may not be totall y rotten but still far fr om “good”). The best wa y for families and educators to help students is to help students f ocus their efforts and a void being distracted b y information they don’t need or can’t use. The key to successful r esearch on the web is identifying r eliable sour ces. Reliability of the material published on the worldwide web is serious pr oblem. Take, for example , a popular first stop: Wikipedia (www Wikipedia credits itself as a “free encyclopedia”. Without r eading the site’ s backgr ound information, Wikipedia’s visitors might not a ppreciate that it is primaril y a “wiki” which can be changed b y almost anyone. Traditionally, encyclopedia articles were written b y authors with specialized kno wledge and exper tise. On the contrar y, the mass a ppeal of Wikipedia is that it is easy to be a contributor — no r elevant experience required. As a r esult, there ar e man y good articles, junk articles, and outright bad ar ticles. Unfortunately, a student may la y e yes on a bad or junk ar ticle before a Wikipedia volunteer can post a warning or remove misinformation.

The r eliability of “news” ar ticles published on the web can also be difficult to sor t out, with many web logs (“blogs”) designed to mimic the appearance of articles by mainstream press. For news ar ticles, the saf est home work r esources will be major news providers. Providers include the Canadian Br oadcasting Corporation ( and ne ws netw orks such as

Reuters (www and Associated Press ( Major newspapers such as the Globe and Mail (www not only ha ve cur rent material on-line but man y public libraries subscribe to newspaper archives available on the web.

probably w on’t stick to the “kid saf e” bookmarks Mom and Dad set up, but parents can still keep their watchful eyes on the computer monitor. If you keep asking often enough, the question, “What are you reading?” might lead to an actual conversation.

For students in earlier grades, using sear ch engines lik e Google (www can be unnecessarily overwhelming.To help them,older family members can guide their internet use directly. Parents can set up a set of “kid saf e” bookmarks or links to parent-approved sites for homework resources.

Parents who ar e less familiar with internet resources need not fear. Talk to your children’s school librarians, teachers, and local public librarians. Librarians and teachers familiar with internet resources will be able to provide pointers to good on-line resources.

Older students who ma y want to explor e outside the mainstream will still need to be familiar with the mainstr eam and traditional sour ces. This familiarity will allo w students to compar e sources, and learn to be thoughtful and critical about differences in the material a vailable. Not unlike y ounger students, older students who want to look at alternative sources can still benefit from informed parental guidance.Teenagers


How do w e find r eliable sour ces? That will depend on the inf ormation needed. The best place to start is with “tried and true” sources which had g ood, established r eputations before the y w ere online . As examples, for general references, the Merriam-Webster dictionary (, or traditional encyclopedias such as Encyclopedia Britannica ( w ere ar ound long before the w orldwide w eb. The Canadian Encyclopedia (www .thecanadian is a ne wer publication but it is published in the style of traditional encyclopedias, with ar ticles pr epared b y scholars and specialists.

With guidance, students can learn to use the internet eff ectively. The internet is a po wer tool which can help students get a lot of information and get it fast. With a tool so powerful, it is crucial f or families to be involved and k eep students fr om getting lost in information overload.

Technology for the masses

The The The The The The The

person starts not to value family life and his/her job person's reliability plunges person starts arguments or fights at home person becomes depressed and anxious person lies often just to hide financial problems person is strangely controlling financial matters at home person is obviously showing feelings of helplessness.


• • • • • • •

While it is imperative that the family is proactive in seeking professional support, the major factor in change must be taken by the person who is actually addicted. What must this individual do? Here are steps a problem gambler can take on their own to alleviate the burden of their addiction on family members and individually: • Admitting the existence of a gambling problem • Budgeting • Engaging in conversations with family members and/or friends and being ready to accept advice and support. WHEN GAMBLING BECOMES A VICE

INTRODUCTION: Recreation, this seems to be the primary reason young people are introduced to gambling. Another major factor is the peer pressure and curiosity that young people are susceptible to. In certain frameworks, there is nothing wrong with using gambling (or games related to it) in order to be entertained or thrilled, but the consequences can be alarming. We have to remind ourselves that no matter how big or small an addiction is it generally begins with small degrees of access at a minimal level. Unfortunately for many youngsters, especially for those pre-disposed, many of today’s youth engage in gambling and become addicted long term. For parents, addiction can be a major hurdle in trying to raise children in a positive and progressive manner.Thus, as a guardian, parent, support worker, or in a place of authority, it is imperative to make it a point to be there and go beyond providing simple words of advice to a child and to be there to open his or her eyes to the pros and cons of actively engaging in gambling.

Economic security When the urge to win prizes and try luck goes beyond fun many gamblers cannot stop betting. Consequently, many incur major debts that are unknown to their spouses, family, loved ones. Economic security becomes very uncertain and can often creep up on a family before they can avoid a major pitfall. Family issues Since gambling becomes a vice or an addiction, it can cause major separations and arguments between couples.There are a number of studies that clearly associate problem gambling with physical and emotional abuse of women and children. Further, communities with major casinos are more prone to crimes that affect or involve the family. Psychological issues A number of studies show that suicide can be the ultimate price paid by pathological gamblers. Due to the yearning for luck and triumph, once failure bites, depression follows the soonest. Further, as discussed previously, familial and personal relations take a back seat which can also lead to depression.

GAMBLING AND ITS PINCH ON THE FAMILY The family is the next logical group that becomes affected by an addiction to online gambling. Though there are a number of signs that could alert family members of a problem, the key is to discover the problem at the earliest possible time to avoid a downward spiral. How could you determine that your fellow family member has become addicted to online gambling? These signs may lead you to the realization that you may have to talk with that family member and/or seek professional help:

In Conclusion As the internet expands and becomes more widely available, internet gambling sites will continue to grow, and as they grow, problem gamble will spread at a rapid pace.The side effects are alarming and the results shocking, but like many vices that have a profound impact on society it is an inevitable phenomenon that will continue. Do not let your children become victimized by problem gambling, educate and observe

Technology for the masses

Among the many consequences, gambling can lead to poor academic performance and even worse, a higher rate of youth dropout.

There are different effects caused by gambling, the degree of these effects matter on the length of the time one engages on it. Those on the most serious end can engage in gambling without showing any negative effects or consequences but become experts in hiding the reality of what is really happening.When gambling becomes a vice the following are likely results:

Technology for the masses

WHEN GAMBLING BECOMES A VICE There are different effects caused by gambling, the degree of these effects matter on the length of the time one engages on it.Those on the most serious end can engage in gambling without showing any negative effects or consequences but become experts in hiding the reality of what is really happening. When gambling becomes a vice the following are likely results: Economic security When the urge to win prizes and try luck goes beyond fun many gamblers cannot stop betting. Consequently, many incur major debts that are unknown to their spouses, family, loved ones. Economic security becomes very uncertain and can often creep up on a family before they can avoid a major pitfall. Family issues Since gambling becomes a vice or an addiction, it can cause major separations and arguments between couples. There are a number of studies that clearly associate problem gambling with physical and emotional abuse of women and children. Further, communities with major casinos are more prone to crimes that affect or involve the family.


Psychological issues A number of studies show that suicide can be the ultimate price paid by pathological gamblers. Due to the yearning for luck and triumph, once failure bites, depression follows the soonest. Further, as discussed previously, familial and personal relations take a back seat which can also lead to depression. In Conclusion As the internet expands and becomes more widely available, internet gambling sites will continue to grow, and as they grow, problem gamble will spread at a rapid pace. The side effects are alarming and the results shocking, but like many vices that have a profound impact on society it is an inevitable phenomenon that will continue.


Do not let your children become victimized by problem gambling, educate and observe


Backdoor: A procedure that circumvents a computer's regular user name and password protection. Backdoors are usually created by a worm or virus, allowing for remote access to the affected computer. Chat Rooms: Are online environments where people can instantly "chat" with one another, primarily by using text (but video and audio can also be used).

Cyber bullying: Involves posting or spreading libelous or intimidating material in electronic form (usually on the Internet, but could also appear on cell phone text messages). Reaches a wider audience online.

Cybercrime: A criminal offence involving a computer as the object of the crime, or the tool used to commit a material component of the offence. Examples include distributing computer viruses and child pornography. Cybercrime Unit: A section within a police force that is dedicated to investigating cybercrimes. Cyber Stalking: Using the Internet to stalk someone. It's online harassment. Denial of Service Attack (DoS): Blocks users from a network. For example, by flooding the network with useless traffic that overwhelms the network's server. Dissing: A slang term that refers to someone showing disrespect.

Flaming: Refers to hostile or rude comments sent over the Internet. Hackers: Usually the term is used to refer to people who have expertise in accessing computers and networks.There are two types of hackers: "white hat" and "black hat." The former use their skills to fix and find vulnerabilities, while the latter (also known as crackers) use their skills to create problems. Both have expertise in creating malicious software. Instant Messaging: Instant communication. Messages are sent and received in real time, enabling people to instantly communicate. Instant messaging also allows users to see who else is online. People can see and hear each other, as well as play games together.

E-mail Spoofing: Masks an e-mail's true origin. Often used in fraud cases and to transmit worms. See "phishing."

Internet Luring: Involves the use of chat rooms and other forms of electronic messaging. Pedophiles use Internet luring tactics to obtain illicit images of underage children and/or meet them in person. Because the Internet is quite anonymous, it is easy for pedophiles to pretend they are children.

Firewall: Generally software that protects computers from outside threats (e.g., malicious software).

Jurisdiction: The extent or range of judicial law enforcement.The territory over which authority is exercised.

Technology for the masses

Child Luring: Refers to adults (pedophiles) using the Internet (e.g., chat rooms) to meet children face-to-face. Child luring was added to Canada's Criminal Code in 2002. Cookie: A text file that collects and stores information about what websites you have visited. The information is stored on your computer's hard drive, but websites have access to it. A cookie is supposed to assist websites in assisting you and your personal preferences; however, some people view it as an invasion of privacy. Sometimes the information is given to third parties, such as marketing organizations.

Elementary and secondary school students are often involved in cyber bullying.

Liberal MPP Deb Matthews: Is an Ontario politician who currently (2006) represents London North Centre as a Member of the Provincial Parliament (MPP). Matthews has represented London residents since 2003. The Legislative Assembly of Ontario is located in Toronto at Queen's Park. Malicious Software: Any software (worms, viruses,Trojan horses, etc.) that cause harm. MSN (Microsoft Network): A collection of Internet services provided by Microsoft. MSN is probably best known for its free instant messaging service. OPP: Ontario Provincial Police. Payload: The overall destructive effect of malicious software. It can range from mild to severe. For example, changing your browser's homepage to deleting data from your computer. Sometimes worms with no payload can negatively affect a network if they create and transmit numerous copies of themselves. Phishing: A form of fraud that results when someone pretends to be a trusted person or business. Usually e-mail spoofing is used to elicit the fraud. Sensitive data can be obtained. Safer Communities: 1,000 New Officers: An initiative launched by Canada's Ontario (Liberal) government in 2005. The government provides $37.1 million annually to municipalities across the province of

Ontario to hire new police officers. Script Kiddies: Essentially amateur crackers that use other people's malicious software to attack computer systems. Script kiddies do not fully understand the software they are using. Security Patch: A piece of software designed to either fix or update a computer program. Software Piracy: Stealing software. It's a form of copyright infringement. Spam: An unsolicited e-mail that can clog your inbox with useless e-mail or spread harmful viruses, spyware and Trojan horses. Spoofing: Masking the origin of online information (e.g., e-mail and URLs). Spyware: A program that monitors your computer use. Spyware programs can be installed on your home computer without your knowledge (e.g., when you download other programs). Spyware can track your online activities and allow people access to your computer. Trojan horse: Malicious software that is designed to appear as a legitimate computer file or program. Vishing: A form of fraud using of Voice of Internet Protocol (VoIP) technology to trick the public into revealing personal and financial information. The term is a combination of "voice" and "phishng". Voice over Internet Protocol (VoIP): The routing of voice conversations over

the Internet as well as through other Internet Protocol (IP)-based networks. Wardriving: When people drive around looking for vulnerable wireless networks they can access. There is also "warwalking" which means the same thing, except people are walking around. Areas that have wireless networks are known as "hotspots." See "Wireless Network" below. Webcam: Refers to a video camera on a computer. Webcams can send live video across the Internet.


Keyboard Logger: A device or software that transmits a person's keystrokes. Used to obtain passwords, credit card numbers and other sensitive data.

WiFi: Refers to a set of standards for creating a wireless network. Wireless Network: Connects computers to a network without the use of wires. Unless the wireless network is secure, anyone within a certain distance can access your wireless network. (See "wardriving" above). For example, someone in an apartment building can use his/her neighbour's wireless network to access the Internet if the network is not secure. There is the possibility that this covert use of a network connection could be used for criminal purposes. Worm: A type of malicious software that can spread from one computer to another without the aid of a "host" file. For example, a worm can spread via e-mail or instant messaging. Zombie Computer: A computer that is being surreptitiously used to transmit illicit material. A "backdoor" can be used to turn a regular computer into a zombie computer. Zombie computers can be used for such things as a "distributed denial of service attack" and the transmission of "spam."

Technology for the masses



aleigh, North Car olina —The National Association of Students Against Violence Everywhere (SA VE) and The Guidance Group (, are pr oud to be f ounding partners of the National Youth Violence Pr evention Campaign, celebrating its seventh year from March 23-27, 2009.The goal of this campaign is to raise a wareness and to educate students, teachers, school administrators, counselors, school r esource officers, school staff, parents, and the public on effective ways to prevent or reduce youth violence.

The campaign is also striving to unite communities in their eff orts to ad dress y outh violence by encouraging participating schools to host in-school violence pr evention conf erences during the week. In addition to offering workshops on various pr evention strategies and r ecognizing local eff orts b y those who are effectively working to r educe youth violence, these conferences are intended to provide an oppor tunity to establish local community r oundtables that will de velop action plans to r educe y outh violence thr oughout the y ear. "Such r oundtables, which bring

To further encourage community-wide participation in the e vent, campaign f ounders National SA VE (Students Against Violence Everywhere) and The Guidance Group have recruited a number "Sector Sponsors" who will bring their unique exper tise to the campaign. These gr oups ar e pr oviding leadership to various comm unity sectors r epresented on our community wheel, such as social service agencies, service organizations, and the media. The gr owing list of Sector Sponsors include the National Association Of Student Councils, National Education Association's Health Inf ormation Network, National Association Of Social Workers, National Association of School Safety and Law Enforcement Officers, United Religions Initiative, and YouthNOISE. Tools that y ou will need to coor dinate and promote this impor tant initiativ e ar e a vailable from National SAVE. We hope that y ou will use the inf ormation as general guidelines for planning,and then tailor your efforts to your unique needs and resources of your school and community. Join this nationwide eff ort to show that our youth and our comm unities are committed to being violence-fr ee! For further information on activities planned in y our area con-

tact National SA VE at 1.866.343.SA VE (7283) or visit www.nationalsa The National Association of SA VE is a studentrun, student-initiated violence prevention organization with o ver 1,800 c hapters in 46 states with 210,000+ members in elementary, middle, high sc hools, colleges and comm unities nationwide. SAVEprovides education about the effects and consequences of violence and helps provide safe activities f or students , parents and communities. For over 15 y ears, The Guidance Group has been producing the highest quality guidance and health pr ograms. From the star t, TGG's mission has been to enhance learning and help teachers get students thinking and talking about the difficult issues the y face every da y. TGG's r eputation as the r ecognized leader in the field of guidance and health, is built on its ability to present toughto-teach topics in a realistic, non-judgmental, and captivating manner.TGG prides itself on consistently pr oviding educators with award-winning pr ograms in such ar eas as: anger management, bullying & harassment, character education, violence pr evention, conflict r esolution, drug abuse pr evention, sex education, career education, health, and parenting skills. Ellyn Duvall,Business Manager NationalAssociation of Students Against ViolenceEverywhere (SAVE),Inc. 322 Chapanoke Rd.,Suite 110 Raleigh,NC 27613 Toll Free 866-343-7283 Tel 919-661-7800 •ax F 919-661-7777 www.nationalsav

Technology for the masses

During this week-long national education initiative, various activities will demonstrate the positive role young people can have in making their schools and communities safer.With the support of se veral national pr emier y outhserving organizations, each da y of the w eek will f ocus on a specific violence pr evention strategy. The challenges highlighted f or 2009 were proposed b y the campaign's Youth Advisory Boar d and will include: Promoting Respect and Tolerance, Managing Anger, Resolving Conflicts P eacefully, Supporting Safety and Uniting in Action.

together each sector of the comm unity, are the inspiration f or the campaign slogan, Building Saf er Comm unities...Peace By Peace," stated Dr . Pamela L. Riley, Executive Director of National SAVE.




According to the BSA (Business Software Alliance) and IDC 5th Annual Global Software Piracy Study, revenue losses due to software piracy have increased and were nearly $48 billion in the year 2007.

TYPES OF SOFTWARE PIRACY Softlifting: purchasing a single licensed copy

of software and loading it onto several computers contrary to the license terms. For example, sharing software with friends, co-workers and others. Uploading and downloading: making unauthorized copies of copyrighted software available to end users connected by modem to online service providers and/or the Internet. Software counterfeiting: illegally duplicating and selling copyrighted software in a form designed to make it appear legitimate OEM unbundling: selling standalone software that was intended to be bundled with specific accompanying hardware. Hard disk loading: installing unauthorized copies of software onto the hard disks of personal computers, often as an incentive for the end user to

buy the hardware from that particular hardware dealer Renting: unauthorized selling of software for temporary use, like you would a video.

WHY PROTECT YOUR SOFTWARE? Developing a software application involves a major investment of time, money and effort. Software piracy (including illegal network licenses and unfulfilled upgrades) denies you the revenue you deserve and harms your paying customers, who ultimately bear the cost of illegal use of your products. Piracy limits your ability to be competitive, leading to higher-priced, less advanced products for your customers.

Technology for the masses

Software piracy is the unauthorized duplication of computer software. Although most computer users today are aware that unauthorized use and duplication of software is illegal, many show a general disregard for the importance of treating software as valuable intellectual property.


INTELLECTUAL PROPERTY PROTECTION. Strong intellectual property protection for software is an important part of any nation's economic growth and development, and has numerous benefits: • Encourages individuals and businesses to create new software and new software applications, as well as improving existing applications • Encourages an indigenous software industry • Ensures new ideas and technologies are widely distributed Promotes investment in the national economy • Encourages technology transfers between nations • Increase your sales potential With increased revenues, you are free to invest more in improving your product and offering competitive prices, making it more accessible to a wider customer base. UniKey, the Driverless dongle, reduces the huge work of technical support team for software vendors. Unikey has the lowest industry failure rates in the industry which is guaranteed with lifetime warranty. Unikey technical support team earns the highest rating of customer satisfaction in the industry. Unikey products cost about 50% less than others. UniKey dongles are available in Four models for USB port to meet different requirements, there are UniKey Time (Real Time Version), UniKey PRO (Network Version), UniKey STD (Standalone Version), and UniKey Lite (Lite Version). UniKey Time is specially designed for software vendors who needs to control and manage the software's rental and selling in subscription or maintenance, it allows to pay per use, in this way software vendors can completely control the sales by charging the end users timely and periodically. This function is based on a real time clock deposited in the dongle indicating the specific time (hour, minute, second) and date (day, month, year). The main difference between UniKey PRO and STD is that UniKey PRO can accept up to 65535 remote clients, while UniKey STD can only work with one remote client.

ABOUT SECUTECH SOLUTION INC. SecuTech Solutions Inc. is a company specializing in software license management business systems focusing on the international market with their class leading UniKey product range. Having an extensive and in-depth range of experience within the Software Management Licensing market, SecuTech has drawn upon this experience to utilize today's cutting-edge technologies to introduce a COMPLETE and affordable solution for today's software vendor markets worldwide. SecuTech Solution Inc. ©2009 SecuTech Solution Inc. All rights reserved.

UniKey STD and UniKey PRO are two powerful software protection dongles (hardware key) with lifetime warranty, which has up to 4K bytes memory. The user-defined algorithm can easily have UniKey envolved with protected software and increase the security.

Whether you are new to the idea of Dongle security or knowledgeable about the potential benefits – SecuTech is your trusted partner delivering the right amount of protection for you and your company. How Do I get Free UniKey evaluation Kit? If you are interested in evaluating our products, you may request a FREE SDK simply by completing the application form via

Technology for the masses

UniKey Lite is the compact version of UniKey dongle product. It is simple and easy to be used. UniKey Lite has 1K bytes memory and One Year Warranty only. SecuTech UniKey copy protection products were augmented by the introduction of driverless UniKey Dongles that maintained the same high level of security by means of a small hardware key that fitted into the user's USB port. The innovative design of these devices enabled them to be much easier and less expensive than those of our competitors.



UNLOCKED STORAGE SHEDS If you have a storage shed, make sure you keep it lock ed at all times, because otherwise you're offering thieves free use of all your tools which can cer tainly help them figure out a wa y into y our home . Also, make sure you don't lea ve a lad der laying out in your yard anywhere. Someone could use this to gain access to the second-story windows.

hether or not you hav e a home security system, there are some common mistak es that you should watch out for because they can make your house an easy mark for thieves. Browse through the following no-nos and make sure you are not guilty of committing an y of them.(If you are, for your own safety and for the security of your home , correct them immediately .)


BURGLAR ALARMSTHAT AREN'T TURNEDON A home security system is onl y useful when updated and activated. Test y our alarm on a r egular basis and check f or any upgrades to the software.And don't forget to turn it on when y ou lea ve the house , even if y ou're just planning to run an errand. A single thief can utterl y ransack your house in just a f ew minutes. UNTAMED LANDSCAPING Though y ou ma y lik e the idea of privacy , ultimately your home will be mor e secure if neighbors can see into y our fr ont and back yar d. Burglars lo ve to hide behind bushes and shrubbery; don't give them that opportunity. Keep the f oliage trimmed, especially around the house, and make sure all the outdoor lights ar e in g ood working order (even better, install motion or body heat-sensing outdoor lights).

Source:Tom Patire's Personal Protection Handbook

Technology for the masses

Many homeo wners, afraid the y will lose their keys and lock themselves out, choose to hide a key somewhere on the property. They think they are being sneaky by placing the key under a r ock, under a doormat, in a potted plant, or above the door. Burglars absolutely know about all these commonly used hiding places.Under no circumstances should y ou lea ve the k ey to y our house where it can be f ound. If y ou fr equently lose your keys or lock y ourself out of the house, consider getting a fingerprint or keypad door lock f or y our fr ont door . (Related article: Fingerprint Door Locks) BROKEN LOCKS Some homeo wners neglect to fix br oken locks right a way, putting the job off f or tomorrow (or whenever they feel like it). It is impor tant, however, to mak e sur e all your doors and windows have strong modern locks that ar e in g ood r epair. Don't think that just because a windo w is on a second or thir d stor y that a burglar can't figure out a way to get to it.

KEYS IN THE CAR It's bad enough if y ou lea ve y our car unlocked (y ou shouldn't, even in the garage), but never leave a set of house keys in the car . If y ou do , a burglar who gains access to your car will also ha ve access to your house.


ith obesity levels being at an all time high, the epidemic of type 2 diabetes is growing at an alarming rate, and will only get worse. Between 2001 and 2002, the diagnosis of diabetes went from 5.5 percent of Americans to an alarming 6.5 percent. In just one year!


We are a gluttonous society and ultimately it is affecting how we live and how long we live. And unfortunately, the diabetes epidemic is not just a US problem. It is spreading worldwide with epidemic reports in Asia, the Middle East and the Caribbean. It is estimated that by 2025, the number of dia-

DIABETES IN CHILDREN Diabetes in children is also known as juvenile diabetes, but more commonly known as type 1 diabetes. It is the most common form of diabetes in children with ninety to ninety-five percent of carriers being under 16. Juvenile diabetes is caused by the inability of the pancreas to produce insulin. It is an autoimmune disease, which means the bodies own defense system attacks the body's tissues or organs. In the last 30 years the number of juvenile diabetes had increased three times over and in Europe and the US we are now seeing type 2 diabetes in children for the first time. Obesity easily explains type 2, but not why there is such a rise in type 1 diabetes in children. It is believed that a mixture of genetics and environmental factors are what triggers juvenile diabetes. But the majority of children don't have a family history of diabetes. The symptoms for juvenile diabetes are the same as in adults. Thirst, weight loss, fatigue, frequent urination is typical, but diabetes in children can also increase stomach pains, headaches and behavior problems.

Doctors should consider the possibility of diabetes in children who have unexplained stomach pains for a few weeks, along with the typical symptoms. If you believe your child may be experiencing these symptoms you should schedule them for a thorough examination and tell your doctor what you suspect your child may have. Be sure to tell them about any and all symptoms your child may be experiencing.

DIABETES IN PETS It is not only the human kind that can develop diabetes. Even our beloved pets, no matter how well we care for them, can develop diabetes. This is often a scary situation for the pet owner and the first question that is usually asked of the veterinarian is -will my pet need to be put to sleepOf course this is a difficult issue and the answer may vary on the overall age and health of your pet. Many older pets that are diagnosed with diabetes go on to live many more happy years, but this takes commitment and close care of your pet.

Technology for the masses

Overall, twelve million Americans have been diagnosed and another 5 million Americans have diabetes and don't know it. And yet another 12 millions are on their way to type 2 diabetes because of impaired glucose levels. Not knowing is the worst because risks of untreated diabetes puts us at a terrible risk of complications including but not limited to blindness, amputations and ultimately death. The stickler is, that type 2 diabetes is almost completely preventable. Doctor's say eat less, eat better and exercise. The numbers show just how many Americans are currently overweight. Statistically, people are now living longer, and it has been on the rise for years. But this will not continue if type 2 diabetes is not put under control.

betics worldwide will rise to 380 million. And diabetes is now affecting more of the young and middle-aged population in developing countries between the ages of 40 and 59.

Technology for the masses

Diabetic cats and dogs can live just as long as perfectly healthy pet if the diabetes is diagnosed and treated properly by both the veterinarian and the owner.

attached to the glucose meter, the user is given the number, which represents their blood sugar level.This in turn will let the user know if and when insulin is needed.

This takes great commitment from the owner. Pets must be cared for and watched daily with a high level of care and patience.


There can be no feeding the cat and forgetting until the next day. There is no leaving the pet along to go on a trip. Every day your pet will need medication, fed a proper diet and his behavior will need to be monitored closely.

Diabetes Mellitus is also simply known as diabetes. It is the disease characterized by a malfunctioning metabolism and a high blood sugar level. The result can be low levels of insulin or abnormal insulin resistance.This mixed with inadequate levels of insulin secretion results in diabetes.

This doesn't mean you will have to give up your job and stay home full time with your pet, but it does mean you will have to pay more attention to what his behavior is and know what to do if the situation should change.

Symptoms of diabetes mellitus include increased urine production, excessive thirst, extreme fatigue, and excessive thirst and weight loss. These symptoms though may not be present in those people with only mildly elevated sugar levels.

It is also more of a financial obligation to have a sick pet. So it is something that should be discussed in length with your vet.

Diabetes mellitus includes type 1, type 2 and gestational diabetes, which occur only during pregnancy. Each type has a different cause and different severity of symptoms.

DIABETES MANAGEMENT As of 2007, there is no cure for either type 1 or type 2 diabetes. This may seem like a dim outlook for many people, but the fact is that even though there is no cure, there certainly are ways to manage your diabetes. Proper management can give you many years of healthy living. Diabetes management starts with a visit to your doctor. first, finding out you have diabetes, what type you have then arming yourself with as much information as possible about the diabetes you are diagnosed with. All management begins with controlling the glucose cycle. The glucose cycle is affected by two factors, entry of glucose into the bloodstream and blood levels of insulin to control the transport out.


Your glucose levels are very sensitive to both diet and exercise, so change in either should first be discussed with your physician. Proper management of diabetes can be very intrusive to the patient. Proper management requires a complete lifestyle change and frequent, sometimes multi-daily checks of glucose in the blood. It can change as people grow and develop and no two cases are ever really the same. Today it is easier to measure the blood sugar level. Glucose meters are readily available and are quite easy to use with a little practice and patience. With a small drop of blood to the testing strip

But all forms of diabetes are dangerous if not treated. With proper management though, people with diabetes can live a long, healthy, normal life. The main cause of type 1 diabetes mellitus is the loss of insulin producing cells in the pancreas. This ultimately leads to an insulin deficiency. Type 1 diabetes mellitus is typically found in children and young adults. It is also termed juvenile diabetes. The common treatment for type 1 diabetes mellitus is daily insulin injections to replace the insulin the body is not producing properly, along with careful blood glucose monitoring.

Without careful monitoring and treatment, complications from diabetes could include loss of limps such as arms, legs and feet, blindness and diabetic comas, which can be fatal. It is extremely important that if you suspect you or your child to have symptoms of diabetes, that you visit your doctor to be tested. If the tests are positive it is not the end of the world. With careful monitoring and care, type 1 diabetics can live long healthy lives.

DIABETES SYMPTOMS All too often we get sick but ignore the symptoms we may be feeling, shrugging them off to a cold, stress from work, or just not feeling well. There are certain symptoms that shouldn't be ignored if they develop.These symptoms could lead to blindness, amputation of limbs, coma or even death. Symptoms of type 1 diabetes often come on suddenly and are severely dramatic. The extra stress of diabetes can lead to something called diabetic ketoacidosis.


Zoe and Molly Online an essential toolkit for parents and teachers


algary, Alberta (F ebruary 24, 2009) - A unique , interactive online safety program - Zoe and Molly Online - was launched toda y b y the Canadian Centre for Child Protection,in par tnership with Shaw Comm unications Inc, with grade 4 students at J ennie Elliott Elementary School in Calgar y, Alberta. The Zoe and Molly campaign is being rolled out to almost 10,000 schools nationwide as par t of the 'Be aw are bef ore you shar e' initiative. The launch coincides with Calgary's Online Safety Week, February 21-28.

The new Zoe and Molly website enables parents and educators to teach childr en aged 8 to 10 ho w to be saf e when sharing personal information, pictures and videos o ver the

"Shaw takes great responsibility in ensuring we do our best to keep children safe on the Internet. That's why, as a f ounding par tner of the Canadian Centr e f or Child Protection, we ha ve donated $300,000 to help de velop the Zoe and Molly program," said Brad Sha w, Senior Vice Pr esident of Operations for Shaw Communications Inc. "Together we are reaching out to the entire community to engage all users to patrol the Internet thr ough Cyber and to learn how to keep it a saf e place f or children to learn and grow." "In an y giv en month, a verages about 700 r eports on e verything fr om

Internet luring and child abuse images to exploitive child modeling. This fact onl y underscores ho w criticall y impor tant initiatives like Zoe and Molly are to the overall protection of Canadian childr en, and ho w par tners like Shaw r eally do mak e a diff erence," added McDonald. "We urge parents to go to the website, engage their children and together take steps to make their online experience a safe one." "Internet safety is a key issue for all educators and par ents," said Rita Dickson, Principal of Jennie Elliott Elementar y School. "Students are becoming tech sa vvy at y ounger ages, so it is essential that w e embed online saf ety education strateg y into our cur riculum. The Calgary Boar d of Education consistentl y seeks best practice educational practice . This is the reason that we welcome the oppor tunity to engage our students in new and exciting wa ys, like the launch of Zoe and Molly online. This type of initiativ e will help k eep our students safe as they learn and communicate online." Visit www to learn mor e about Zoe and Molly and to access the online game.

Technology for the masses

"According to our student advisor y gr oups, 89 per cent of grade 4 students pla y games online and by grades 5 and 6 the y're building online r elationships and sending pictur es," said Lianna McDonald, Executive Director of the Canadian Centr e f or Child Pr otection. "While these games can be fun and often educational, it is impor tant that childr en ar e aware of potential risks and kno w strategies to protect themselves from potential danger."

Internet. Children engage thr ough an online game allo wing them to cr eate their o wn avatar and complete the online comic book. The w ebsite tools w ork in tandem with a paper v ersion of the Zoe and Molly comic book, which tells the stor y of tw o grade 5 girls who learn ho w to be saf e on the Internet. Zoe and Molly comic books will be distributed to nearl y 300,000 grade 4 students across Canada and to homes with children wher e Sha w technicians ar e installing internet services.


Technology for the masses

HIGH TECH WEB CRIME The Police and Public Safety Institute at Algonquin College prides itself on being one of the leading educational institutions orf Police Training in Ottawa.This is proven by the fact that or f 3 consecutiv e years the Police and Pub lic Safety Institute was rank ed #1 for student satisfaction. We believe this confirms our commitment to our students, the professionalism of our staff and the quality of our ograms. pr

The Police and Public Safety Institute has been inxistence e since 1971. There is a variety of pub lic safety programs that ar e offered within the institute . Other than the o Plice Foundations Pr ogram, there is the option of taking the Paramedic program, the PreService Fir efighter program, the Comm unity and J ustice Services program and Corporate Security and Risk Mana gement program.The instructors within each of these

well theoretical based knowledge. Each program offers a placement opportunity in which the student can practice the kno wledge they have obtained.This allows them to find out earl y on if this is the joborf them as w ell as providing the e xperience needed to gain employment upon graduating.

Technology for the masses

disciplines ar e or have worked in the field. They come with a w ealth of practical skills as


CHILD SEXUAL ABUSE PREVENTION KIT RELEASED IN RESPONSE TO NATIONWIDE CHILD PORNOGRAPHY ARRESTS Teatree Tells:A kit to help educator s and parents prevent child sexual abuse, which is operated b y the Canadian Centr e f or Child Pr otection,

"These statistics demonstrate the need f or Canadians to r ecognize signs of child sexual abuse. We want the public to kno w that our agency has the r esources a vailable to help them deal with their concerns and to address their questions," said McDonald. In ad dition to the n umerous materials and resources available to the public at its w ebsite,, the Canadian Centre f or Child Pr otection today launched Teatree Tells:A Child Sexual Abuse Prevention kit, to help par ents and educators with children four to six years of age deal with issues related to child sexual abuse . The kit includes a par ent guide on child sexual abuse and disclosur e; two teacher guides with lessons and activities for nursery, kindergarten and grade one childr en; as w ell as three posters, a Teatree book and a Teatree puppet f or use in the classr oom. Teatree is one of the Centre's already established characters used to teach children important safety skills.

"We recognize the issue of child sexual abuse and disclosur es ma y bring about a cer tain level of f ear or discomf ort f or par ents and guardians or an y pr ofessional who w orks with children. This kit is meant to help guide them through it," added McDonald. Earlier toda y the National Child Exploitation Coor dination Centr e (NCECC), in coor dination with la w enforcement units acr oss Canada, held a press conference announcing the ar rest of more than 50 individuals f or possession and distribution of child pornogra phy. The Canadian Centr e f or Child Pr otection applauds the NCECC and la w enf orcement for their joint efforts and continued commitment to k eeping Canada's childr en saf e. The Canadian Centre for Child Protection strongly encourages Canadians to report suspicions of child pornogra phy to Cyber ( and r ecommends visiting the w ebsite to do wnload inf ormation fr om the Teatree Tells kit and other r elevant information and resources. For more information please contact: Tish Best, Director of Communications Canadian Centre for Child Protection Office: (204) 945-6020 Cellular: (204) 250-7992 Email:

Technology for the masses

Ottawa, ON: On the heels of the nationwide child pornogra phy ar rests announced this morning, the Canadian Centr e f or Child Protection has r esponded with r esources to help Canadians deal with the enormity of the investigation and its implication f or children. "Child pornography is child sexual abuse . The scope and size of this in vestigation underscores the impor tance of educating Canadian par ents and those who w ork with childr en on this serious issue . Canadians are g oing to want ans wers on how to pr event child sexual abuse fr om happening, and w e want them to kno w that our agency is her e to help ," said Lianna McDonald, Executive Dir ector of the Canadian Centre for Child Protection.

has r eceived mor e than 35,000 r eports from Canadians. Data collected b y r eveals that almost 70% of the confirmed child pornogra phy images involve children less than 8 y ears of age , and 30% of those ca pture sexual assaults against the child victim.


Other symptoms of diabetes may include extreme fatigue. We all get tired at times, but diabetes triggers a more severe fatigue than normal.

Diabetes is a disease of the metabolism. Our metabolism is what the way our bodies use digested food for energy and growth.

People with diabetes also experience unexplained weight loss. This is because they are unable to process many of the calories they consume. Losing sugar and water in the urine also contributes to the weight loss. Extreme thirst is another symptom of diabetes. Diabetes develops high blood sugar levels and the body tries to compensate by diluting the blood, which translates to our brain that we are thirsty. With this is also excessive urination. It is another way our bodies have of getting rid of the extra sugar in our system. But this can also lead to dehydration. One of the hardest symptoms to deal with is poor wound healing.Wounds heal slowly, if at all when the carrier has diabetes. This along with infections that are not easily remedied can attribute to ulcers and loss of limbs.

Diabetes is a growing problem in this country. With our population at an all time high in weight gain and a low in health care, the problem is only growing.

Most food that is processed through our bodies is broken down by digestive juices into a sugar called glucose. Glucose is the fuel our bodies run on. When we eat, and our food is processed, the pancreas is supposed to produce the right amount of glucose from our blood automatically and release the right amount of insulin into our blood.

source of fuel even though the bloodstream contains good amounts of the natural glucose. There are three types of diabetes, type 1, type 2 and gestational diabetes. People who have type 1 are known as insulin-dependent. This is an autoimmune disease where the body's natural system is fighting against another part of the body. In the case of type 1 diabetes, the system attacks the insulin producing cells and destroys them.


Symptoms of ketoacidosis may include nausea and vomiting, which may also lead to dehydration and serious problems with the blood levels of potassium.This could lead to a diabetic coma and ultimately death.

Therefore the pancreas can produce little to no insulin.These people are in need of daily injections of insulin to live. Five to ten percent of diabetes cases are type 1 in the US.

In people with diabetes, little to no insulin is produced or the body's cells don't respond correctly to the insulin that is produced.Therefore the glucose builds up and overflows into the urine and passes out of the body. This is how the body loses its main

Technology for the masses


he Internet has fast become an efficient and trusted way for companies to market and sell their product. One of the reasons for this has been the rise of "Affiliated Marketing" - which is when a website directs traffic to itself through adverts on other (usually related) websites. Affiliated marketing either pays the affiliate through a pay-per-click program (the affiliate receives money every time an advert is clicked) or a pay-per-sale program (the affiliate receives commission every time a posted advert on their site generates an actual sale or subscription.) Generally, the pay-per-sale program (also called cost-per-sale, or CPS) is the tried and trusted form of affiliate marketing used.


Affiliate marketing is highly cost-effective, and in effect costs both the advertiser and the affiliate nothing, while having the potential of bringing in a very large form of income for both parties.While pay per click (or cost-perclick) mentioned above can present a risk to the advertiser, the cost-per-sale (CPS) system has very little or no risk at all for both parties, and is therefore preferred.

One of the most tried, trusted, and beneficial ways of increasing online sales through marketing and advertising is affiliate marketing. This is basically a revenue share sort of system, where an affiliate is given a form of commission from a merchant, based on how many sales the affiliate has generated through advertising on hisher site. Affiliate marketing began just four years after the world-wide web was launched, and many successful ecommerce sites owe much to this simple yet effective method. There are three types of affiliate marketing methods of payment either pay-per-click (generated by actual clicks or referrals to the merchant from the affiliate's site), pay-per-action or pay-per-sale (very similar, in that the affiliate receives payment, either a fixed amount or commission, based on the sales or subscriptions that have come through referrals or adverts on the affiliate's site.) The last two methods of payment are generally preferred by merchants, due to many fraudsters taking advantage of the click system and setting up sites with forced clicks, pop-ups, adware, spam, false advertising and many other "black hat" techniques. Affiliate marketing is not limited to only displayadverts on an affiliate site, but also comes in the form of email, blogs, rss feeds, content and niche sites, loyalty sites, comparison sites or shopping directories, and other forms. It is an extremely low cost, but highly effective form of marketing and advertising, presenting little to no risk for both the merchant and the affiliate.

THE ADVANTAGES OF AFFILIATE MARKETING The concept of revenue sharing has been around for quite a while, long before the internet. But the idea of affiliate marketing has taken it to new levels, and become a staple form of advertising and bringing in business for all types of e-commerce. Online merchants find affiliate marketing highly advantageous due to the fact that it presents little to no risk both for the merchant and the 'affiliate.' The way it works is that the affiliate earns a type of commission or fixed amount based on the number of sales the affiliate brings to the merchant, either through on-line links on the affiliates website or through email, blogs, rss feeds and many other kinds of on-line communication. Some merchants (only about 1% of affiliate marketing) use a cost-per-click remuneration system, which simply means that the affiliate earns every time an internet searcher clicks on an advert on their site or email. However, due to fraudsters taking advantage of this method (creating ad-ware, sending spam, or useless indexing sites) this form of remuneration is not preferred and becomes too risky for merchants to use. Affiliate marketing also bears no cost on the merchant in the original set-up in other words, it costs nothing to place advertising banners on affiliate's sites, and there is only a cost if a lead or sale has been generated (which is advantageous for all.) Merchants also get to set the parameters, and decide on the incentive schemes.Thus, it is a very inexpensive (but highly efficient way) to grow a business.

Technology for the masses

Affiliate marketing began just four years after the world wide web was launched, originally popularized by well known companies such as CDNOW or Google's Adsense is also a very well known type of affiliated marketing, but is not really considered as true affiliate marketing as the adverts usually centers around the theme of the website they are displayed (known more as contextual advertising.) Google does not also directly sell a specific product, but generates money in other ways.


HIGH TECH WEB CRIME The Ottawa School of Art (OSA), a registered charitable organization, is an educational center for the visual arts providing the community with the opportunity for creative expression, development and growth based on an orderly progression in knowledge and skills. Within a well-defined program, it offers high quality instruction to all levels through direct involvement with professional artists.

Visit us today at 35 George St. in the ByWard Market, Ottawa, ON. Admission to the gallery is always free – everyone is welcome. For more information, please visit:

Technology for the masses

The OSA offers Diploma and Certificate Programs, and a full range of community level art courses, such as; drawing, painting, photography, new media, ceramics, sculpture, printmaking, and a wide variety of specialized short courses and workshops. With an Outreach Program, Children’s and Teens Programs and three exhibition spaces open free to the public seven days a week, the Ottawa School of Art lives by its motto, ‘Art for Everyone!’


t was so real a few students broke down in tears and had to leave their seats. Others put their hands over their mouths in disbelief.


I have a couple of friends who think it's safe to drive drunk. Drinking and driving is still really common . . . cabs are becoming expensive and the person who is throwing the party doesn't want a bunch of people staying over at their house." The scenario hit close to home for Snyder. Her aunt was hit by an impaired driver several years ago. She said at times it was hard for her to watch paramedics and police officers swarming around the scene.

She is confident the message was received by the 700 Grade 11 students in attendance, because the arena was silent for 90 minutes. We really wanted students to see what happens from the beginning to the end," Prieur said.An important part of the event was the legal portion, because after everyone goes home there is still a lot of follow-up." Linsey Callaghan wasn't expecting to get emotional during her performance. She said it was absolutely necessary" to show the graphic details of the injured parties and doesn't believe the Widdifield drama troupe went over the top. The Grade 12 student portrayed one of the two teens killed in the mock crash. I was try-

ing so hard to keep it together," Callaghan said. I could hear the car being torn apart and I was almost breaking into tears." Jesse Beam, 15, tried to put himself into the shoes of an impaired driver who had hit a pedestrian. The entire time the script was running I kept thinking I never want this to happen," he said. Seeing the mother freaking out, well I thought about my mom. She would go so crazy." Beam said if he was the judge and had to deliver a sentence to the driver involved in the accident, it would be a fiveyear prison sentence.

Technology for the masses

The ice surface at Memorial Gardens was transformed into a crash site. On top of a beige sheet was a parent's worst nightmare -- their kids lying helpless in a car driven by an impaired driver that was just involved in a collision. It was really intense. It had a strong message and I think students will remember this," said 16-year-old Katelyn Snyder Wednesday morning.

The idea behind the re-enactment was to get the message out to students who are learning to drive. "We want students to think and understand how their actions affect others, to not drink and drive and don't take drugs and drive," said Wendy Prieur, chairwoman of the Drug Awareness Committee.

Technology for the masses HIGH TECH WEB CRIME

TIPS FOR CHILDREN 1. Never give out personal identifying information - name, home address, school name or telephone number - in a chat room or on a bulletin board. 2. Never include personal information or interests in your Instant Messaging profile, and do not post your photo. 3. Keep passwords private - even from best friends! 4. Don't respond to mean or harassing emails. Log off and tell your parents. 5. Be on alert when someone offers you something for nothing, such as gifts or money. 6. Never agree to meet with someone face-toface without telling your parent or guardian. Then, if your parent or guardian agrees to the meeting, make sure to meet in a public

place with your parent or guardian. 7. Remember that people online may not be who they seem. 8. Remind your parents to keep your computer protected with the latest security patches, anti-virus software and a firewall to prevent hackers. 9. Delete unknown e-mail attachments, as they may contain viruses. 10. Virus scan all files downloaded from the web to your computer.

TIPS FOR PARENTS 1. Create a list of Internet house rules with your children. 2. Keep computers with Internet in a central area - not in child's bedroom. 3. Talk to them about their online activities and friends. 4. Know which chat rooms and message

boards your child visits and who they're talking to. 5. Talk about their Instant Messaging contacts, and make sure they're not talking to strangers. 6. Encourage them to come to you if they encounter messages or content that makes them uncomfortable. And don't "freak out" when they tell you, or they won't turn to you again. 7. Talk to your children about online pornography. 8. Be aware of the websites that your child visits. 9. Discuss gambling and the potential risks. 10. Teach your children responsible Internet behaviour. The Internet should not be used for spreading gossip, bullying or threatening others.


continued from page 54

SIGNS THAT YOUR CHILD MIGHT BEAT RISK ONLINE 1. Your child spends a lot of time online, especially at night. 2. Your child accesses pornography on the computer. 3. Your child receives phone calls from strangers. 4. Your child makes long distance calls to numbers you don't recognize. 5. Your child receives mail, gifts or packages from someone you don't know. 6. Your child turns off the computer monitor or quickly changes screens when you walk in the room. 7. Your child becomes withdrawn from the family. 8. Your child uses an online account that belongs to someone else.

1. Make sure a website is secure and reputable before providing credit card information online. 2. Don't trust a site just because it claims to be secure. 3. If purchasing something online, make sure it is from a reputable source. 4. Reconcile credit card statements promptly to avoid unauthorized charges. 5. Beware of providing credit card information when requested through unsolicited e-mails.

1. Research businesses or websites, to ensure they are legitimate. 2.Try to get a physical address, rather than a P.O. box or maildrop. 3. Never discard credit card or bank statements in usable form. 4. Pay attention to missed bills: they could indicate that your account has been taken over. 5. Be cautious of scams requiring you to give your personal information. 6. Never give out your credit card number over the phone, unless you made the call. 7. Monitor your monthly credit card statements for any fraudulent activity. 8. Report unauthorized transactions to your bank or credit card company as soon as possible. 9. Review a copy of your credit report at least once a year.

Technology for the masses




afe rooms, sometimes referred to as panic


should keep a charged cell phone incase the intruder

rooms, are hideaways in your house where you

has cut the phone line. It's also a good idea to keep a

can quickly escape to if an intruder forces his

first aid kit and fire extinguisher inside.

can also refer to rooms built with protection from high

It is important that a safe room be constructed

winds in mind. For the purpose of this article, we will

soundly incase an intruder finds it and tries to force

discuss safe rooms from a security point of view.

his way in. Some people choose to hide the

way into the house. In storm-ridden areas, safe rooms

entrance behind a bookcase or some such in order to camouflage the entrance, but it should still be

important to select a spot not only that you can

very sturdy. A safe room should have a solid metal-

access quickly but that you can do so in a manner

core door with a double cylinder deadlock that

that won't alert the intruder. A good choice is to

locks from the insider as soon as you enter. (Store

make the safe room accessible from the master bed-

the key in the master bedroom so it's easily acces-

room. Most burglars try to choose times when

sible to you in an emergency.) The safe room should

you're not at home to break in, but in lieu of that,

be well-ventilated incase you're forced to remain

night is the next most popular time. Once inside,

inside for a while.

there should be a phone so you can call the police. In addition to keeping a landline telephone inside, you

Source:The Personal Security Handbook

Technology for the masses

When planning a safe room for your house, it is

It’s true that certain risk factors for breast cancer are beyond a woman’s control. Examples: family history and aging. Fortunately, researchers are finding that certain lifestyle choices may lower risk:


Breast Cancer: 7 Ways to Lower Your Risk Cut the fat. Countries with high-fat diets have the highest rates of breast cancer, although exactly why isn’t certain. Smart: Choose foods high in fiber, such as beans, bran, whole grains, fruits, and vegetables such as cabbage, brussels sprouts and broccoli. Maintain a healthy weight. Why: Obesity may be linked with breast cancer, especially for women over 50. Stay Active. Research suggests that exercise helps prevent breast cancer. Example: One study found that women who exercised at least four hours a week cut their breast cancer risk by 60%, while those who worked out 1-3 hours a week reduced their risk by 30%. Limit alcohol if you drink. More than 40 studies have linked alcohol abuse to an increased risk of breast cancer. Don’t smoke. You already know smoking causes lung cancer. But it also increases the risk of many other cancers. Smokers may be more than twice as likely to develop breast cancer as nonsmokers.

ing mammograms—when to start and how often to have one. Talk to the doctor. If you are planning to take any estrogen-containing pill, carefully discuss the topic with your physician. Increased levels of estrogen are believed to play a role in breast cancer, but the medication’s benefits may well outweigh the risk.

Technology for the masses

Keep screening. Do monthly self-exams and see your doctor regularly. Lifesaver: Ask about hav-

ABOUTTHE COUNSELOR Mrs. Jean Tubhope was born in Orillia, Ontario. She grew up on a farm then married a farmer, Robert Tudhope. Bob & Jean have one son,Tim. He is married to Michelle.They have 5 children.Tim is a school teacher in Ajax Ontario.They love the Lord and are multi-talented.


• Bible Based • Cr eation Temperament • Restoration to a loving God Conveniently located between Barr ie and Orillia On Line 11 Oro on a beautiful wooded f arm 705-487-2331 FEES One to two hours $50.00 Couples sessions $65.00 Group sessions (mar riage, sexual abuse , anger management, etc) are also available at lo w cost. Textbooks must be purchased. Jean is also a vailable as a speaker for Ladies Retreats, Coffee hours, etc.

Jesus Says: “Come unto me and rest, all ye who are weary and heavy-laden, and I will give you rest.”

Mrs.Tudhope accepted Jesus Christ as Savior at 4 y ears of age . At age ten assurance came when she understood salvation is based on God’ s Word, not feelings. When one in vites Christ in, His Holy Spirit Comforter comes in to stay (Hebr ews 13:5) Trials in her lif e which began as a child ha ve caused major trauma and hur t but J ean has never doubted That she is God's Child. Jean has her ARCT degr ee with the Royal Conser vatory, University of Toronto and holds a RMT as a registered Music teacher. Her talent has been giv en to the Lord and is used for His glory. For 16 y ears J ean ~ Bob (&Tim) pioneered and Directed the Fair Ministr y of Child Evangelism F ellowship of Ontario. Some 250,000 childr en and adults hear d the g ospel. Thousands accepted Christ and grew through the Mailbox Club program. Upon r etirement fr om CEF J ean then took her B A in Counseling thr ough Bethany Bible College . Jean is contin uing her studies and will soon ha ve her Masters degree. Jean is a member of the NCCA (National Christian Counselor's Association) She is no w actively counseling from her home office in Oro. Her personal testimon y of healing of damaged emotions from sexual and ritual abuse has prepared her well to understand the pain and shame her clients go through.

For many years, Jean has raised pur ebred bor der collies which also contribute to the counseling sessions as therapy dogs. Jean has written a book called “All that I lost as a Girl”. In the book y ou will find m uch of her personal testimon y plus case studies of some of her clients. You will also find some helpful information within its pages which will help y ou to find out if y ou need to seek counseling. The book is a vailable b y contacting Jean at her home , or deliv ery can be arranged. ABOUTTHE COUNSEL The setting:a restful decor both in the office and outdoors at theTudhope farm in the w oods. Sessions run fr om one to tw o hours depending on the need, client, affordability etc. The basis: for e very pr oblem mankind has is the Bible , God’s way of speaking to us today. It is here we find truth, love, self-esteem, encouragement, direction, & correction. The tools: temperament anal ysis pr oduced by a Pastor & his wif e, is very in depth. It covers the outer, inner will and deep love abilities.This therapy has a 92% success rate in marriage counseling Visuals: are used to help childr en and adults to understand the truths being taught. Bibles, notebooks, flipchart, time-lines, tea, coffee, water to give energy-and a friendly Border Collie for comfort—all help to bring about healing!

High Tech Web Crime Magazine  

High Tech Web Crime Magazine is the most comprehensive safety publication of its kind in Canada. With the internet reaching a broader and yo...