• Our Mission

Think Before You Click: Internet Safety Tips for Parents

"Your clicks have consequences," says Clay Johnson, author of The Information Diet . Johnson writes about the impact of consuming a poor information diet, "unhealthful information deep-fried in our own preconceptions."

We are all one click away from being pulled into an information portal, filled with erroneous, distracting and at times dangerous material. We are also one click away from making a public gaffe, mistakenly sharing information not intended for a wider audience, in the form of an email, a wall post, text or chat message.

We've all heard the admonition "think before you post." The new mantra should be "think before you click." It's hard to stay true to this statement in practice, especially as we endure a fast-paced, real-time information onslaught.

To Filter or Not to Filter

How can parents help to instill the "think before you click" mindset in their child? Should parents use filters to help with this process?

The value of filters is that they make it harder to slip easily into objectionable content. The filter wall asks the user to stop, pause and think before clicking further. The filter in essence serves as the conscience on your shoulder and slows the pace of super-fast clicks that can have consequences, in terms of both faulty information and sharing information that should not be seen by a wide audience.

One advantage of filters, particularly as mobile devices make working in one shared space more difficult to manage, is that the filter creates a walled garden to protect the online content that can enter the household when a parent is not around.

One disadvantage is that the filter creates a false sense of security and abdication on the part of the parents. If there is a filter, the thinking goes, then it's easy for the parent to say, "I'm off the hook, and now I don't need to monitor what my kid does online." Also, kids are savvy and can easily figure out ways to skirt the filter. The parent can end up playing a game of cat and mouse with the child, particularly as the child gets older and grows more sophisticated.

The ideal scenario is one in which the child listens to "the little voice" propped on his or her shoulder. For some children, that means having the additional hurdle of the filter in place, to ensure wait time before forging ahead into questionable online territory.

The key component is to engage in and facilitate regular conversation around responsible use, and help to nurture "the little voice" that sits atop each child's shoulder.

Difficult Choices

As with any parenting choice, the question to consider is what will the child do when confronted with a situation outside of the home, away from the home ground rules, whether or not there are filters imposed.

For example, a child is at a sleepover in a household with no filters and loose supervision. The child is playing online with the friend and they explore a social networking site like Omegle , which advertises the possibility of meeting strangers. The kids start to "play" and encounter a stranger who starts asking personal questions.

What will the child do? Will the child say anything to their parent? Filters won't answer these questions, though the filter might or might not have blocked entry into Omegle in the first place.

This is a tough spot for a kid to be in and it can be especially tricky if the other child wants to continue to "play" and does not see the danger or inappropriateness of the "play."

What options does the child have?

  • Stop "playing" and walk away.
  • Tell the parents.
  • Say nothing and continue to "play," but at a distance.
  • Ask to call home and be picked up right away (some parents choose to use a conversation code for when the child wants to be picked up, so it's not obvious that the child wants out).

It's important for parents to rehearse these types of specific situations so that children can see possible, positive outcomes when uncomfortable online scenarios arise.

The parent is then helping the child develop "the little voice" to use when the parent is not around.

The "information diet" that children consume has consequences, as do the clicks. Parents need to figure out the best way to approach teaching "think before you click," and schools can serve as the sounding board for helping each parent to determine how to handle their individual child and household. It's challenging for parents to do this work alone, and they don't need to. Schools have hundreds of data points and can help parents navigate the best approach to take with their children in the area of clicks and consequences.

Think Before You Click (How social media affect our lives)

ceej 1 / -   Oct 10, 2014   #1 --Please correct me. and please suggest more ideas i can possibly add :)-- Think Before You Click We live today in a world dominated by the internet or World Wide Web, as it is also popularly known. Almost everything can be found on the internet. For most people, not a day goes by without them using the internet for at least two hours a day: be it for work, or fun, or online shopping, or studying, or contacting friends and family. Millions upon millions of people worldwide flock to social networking sites to read and to speak their minds. It is the power of these astounding numbers that makes, without doubt, the internet as the most powerful and influencing media today. But as internet users, do we know how much we must take responsibility for what we write or say or put in the web? Yes, it is known that we have freedom in the internet. But then again, have we asked ourselves to be more mindful of what we post or to think before we hit the enter key? Think before you click: you might hurt someone behind the other side of the screen. Let us stop for a moment and take some time to realize that what or who we are interacting with using the internet are real people: individuals with real feelings like ourselves. Now if we post things about a person like rumors or gossips in order to bring about hatred in other's mind or publish materials severely humiliating them, we can hurt a human being. And we can never know how this can affect them or how they would react to this. With this, we are doing what they call as "cyber bullying or harassment". And what kind of people carry out this deed? Only the lowest of the lowest kinds want to bring about destruction to other people's lives. Think before you click: you might be broadcasting inappropriate information or materials for other people to see. Think about posting sexually-oriented matters. The internet is free for all to navigate. What if a child stumbles upon that post of ours? Would we want to steal that child's innocence? I think not. Now think about things that can be considered as "cheats"? By this, I mean like answers to a test or examinations. Posting excessive information can get in the way of learning and of people's chance to think by themselves. Would we be a tool in promoting internet-dependency? I think not, too. Think before you click: give your own life privacy. Posting everything you do in your own social media pages might not that be as fun as we think it is. We need to maintain appropriate social boundaries because breaches of these boundaries can create awkward social situations and damage our relationships. Just like giving too much personal information, it also has some security issues at stake. I bet we wouldn't want to put at risk our own safety. Think before you click: you might be putting your internet social life over your real and personal social life and relationships. For another moment, let's stop and take some time to think whether or not when we open our computers, we are closing our own doors. Are we too consumed by our virtual social life that we are already neglecting the chances of spending time and interacting personally with the important people in our lives? Think about being unproductive for spending too much time on the internet. Would we really want to live our lives that way, being fruitless and recluse? Definitely not. The internet and social media has indeed become such a powerful tool. But don't forget that we are the ones who operate it. We might have freedom to do whatever we wish on the internet, but we must limit our actions because if we won't be mindful enough, we can destroy lives. We have the power to make the decision. Before clicking that enter key, THINK. Rethink. Help build a healthier, gentler, more loving and constructive online world.

think before you click campaign essay

#CyberMonth: How to Promote a ‘Think Before U Click’ Culture

Photo of James Coker

James Coker

Deputy Editor , Infosecurity Magazine

  • Follow @ReporterCoker

Phishing remains one of the most common and effective forms of cyber-attack. This vector  exploded  since the start of the COVID-19 pandemic, fuelled by increased reliance on digital communications and numerous emotive events that served as effective lures. In February 2022, Proofpoint  research  found that more than nine in 10 (91%) UK organizations were successfully compromised by an email phishing attack in 2021, underlining its ongoing potency.

Such compromises can pose major problems for organizations. “When phishing is used to steal login credentials, it opens up a world of possibilities for the cyber-criminals and a world of hurt for the impacted individual or business,” explained David Richardson, VP of product management at  Lookout . “With one set of credentials, bad actors can then try to log in to a number of common cloud-based services such as Microsoft365, Google Workspace, AWS, Salesforce, etc. Once they’ve successfully logged in to one of these accounts, they can move laterally within an organization and find highly sensitive and valuable information to either encrypt for ransom or exfiltrate to sell on the dark web.”

While there are a growing number of security tools designed to prevent phishing messages from reaching recipients, this issue remains, at its core, a human one. Therefore, a focus on awareness training is key to tackling this ongoing scourge. Too often, however, organizations only  pay lip service to training in this area , such as setting up annual phishing simulations and other tick-box exercises.

This is why one of the focuses for this year’s  European Cybersecurity Month  is phishing, with a theme of ‘Think Before U Click!’, highlighting the need for users to be equipped with the knowledge to avoid falling into the trap of attackers.

Here are five steps organizations can take to enhance their phishing training, achieving greater employee engagement and effectiveness.

Explain the Why

In addition to highlighting how staff can detect and react to potential phishing emails, it is also vital organizations explain why these measures are necessary. In an interview for the October 2022 IntoSecurity podcast , Jessica Barker emphasized the importance of ensuring awareness messaging is relevant to people’s lives, making them much more likely to adhere to recommendations. “Rather than telling people what to do or what not to do, it’s much more helpful to frame it from coming from that context of why we’re making those recommendations,” she noted.

This principle can also be applied to specific training activities. Javvad Malik, lead security awareness advocate at  KnowBe4 , commented: “The security team should be upfront and let their colleagues across the organization know why they are conducting simulated phishing and how it benefits everyone as a whole. Getting people to understand the reasoning behind an activity can greatly reduce the resistance.”

"Getting people to understand the reasoning behind an activity can greatly reduce the resistance”

Short but Frequent

Organizations should carefully consider the effectiveness of training delivery and frequency.  For example, research  has shown that ‘microlearning,’ short sessions of five to 10-minute modules, significantly improves retention compared to single lengthy sessions of up to an hour. These bite-sized sessions are also far easier to fit into  employees’ busy workdays .

Therefore, experts believe that short but frequent phishing training sessions are most effective at ensuring messaging sticks and changing behaviors. Malik said: “Organizations don’t need to try and boil the ocean at once by giving long training sessions on do’s and don’ts. Rather, they can focus on a couple of high-risk behaviors and use small, engaging content on a more frequent basis that reinforces the message. Ultimately, the goal is to change behavior, not to make people security experts. So if the desired behavior can be reinforced through the messaging, it can lead to greater results.”

Teach Cynicism

Cynicism is not always the best trait to follow in life, but it is often crucial in cybersecurity. A fundamental attitude that should be imparted to employees is to be suspicious of certain types of emails and not rush to respond to them. This is recognized in this year’s Cybersecurity Month theme of ‘Think Before U Click.’ Lookout’s Richardson said: “Phishing attacks have continued to evolve in techniques and sophistication, but the basic approach of trying to create a sense of urgency or impersonating a figure of trust or authority has remained pretty constant. When contacted in this manner, it’s important to take a step back, evaluate the situation and find alternative ways to validate the request.”

Phishing messages are generally designed to create a sense of urgency or panic, focusing on topics of tension or concern, such as COVID-19, and demanding immediate action. Tal Memran,  cybersecurity expert at  CYE , explained: “The content of the email is often phrased in a way that pressures the recipient, i.e. if you don’t respond within a certain time limit, your access would be revoked.”

Other suspicious signs highlighted by Memran are when the email includes an attachment with deliberate instructions to open it and the body of the message contains a link, “usually a shortened one for you to click on, and in most cases would ask you for a set of credentials.”

There are a number of actions that can be taken to assess the validity of these types of messages. One is to check the domain from which the email originated, which often attempts to impersonate well-known brands. “Carefully examine the domain for any purposeful typos,” advised Memran.

Other easy techniques include hovering over any links included in the email with the cursor to see if it is a legitimate website. This can also be cross-referenced using a reputable search engine.

Straightforward Reporting Processes

The process of reporting potential phishing messages should be as simplified as possible, involving no more than a click of a button. “If people have to raise a ticket or phone someone, or otherwise take an action which inconveniences them, it won’t be taken,” noted KnowBe4’s Malik.

There should then be acknowledgement given by the security team following a report of a suspicious message, whether it turns out to be a phishing attack or not. This will help encourage vigilance in the future and an understanding that their contributions are helping the organization. Malik added: “The security team should provide feedback whenever a person reports an issue. Even if it’s a false positive, thanking the person encourages greater engagement in the future.”

Record Phishing Attacks

To enhance employees’ awareness and understanding of phishing, security teams should publicize attempts discovered within the organization following employee reports. Memran said: “Make sure to frequently inform your employees about widely known and used phishing campaigns to increase their alert level for suspicious emails.”

This includes sending the email itself to staff as an alert, once made safe, to ensure they are on the lookout for the same type of message. “Phishing schemes often target multiple people in an organization, so letting fellow staff members know what to look out for can make it easier to spot and stop phishing,” commented Paul Bischoff, consumer privacy advocate at  Comparitech .

This approach also enables a record of phishing techniques to be maintained, potentially allowing a deeper analysis of trends in this area to continually update and improve awareness training.

You may also like

#cybermonth: how to protect yourself from phishing attacks, for phishing protection, rely on more than users, #howto enable effective security awareness training, how to create a culture of incident reporting, phishing simulation training escalation, what’s hot on infosecurity magazine.

  • Editor's Choice

Alarming Decline in Cybersecurity Job Postings in the US

Crushftp file transfer vulnerability lets attackers download system files, mitre reveals ivanti breach by nation state actor, how to backup and restore database in sql server, russia's sandworm upgraded to apt44 by google's mandiant, massive brute-force attack on alibaba affects millions, cybersecurity pros urge us congress to help nist restore nvd operation, north korean group kimsuky exploits dmarc and web beacons, report suggests 93% of breaches lead to downtime and data loss, us government and openssf partner on new sbom management tool, nist unveils new consortium to operate national vulnerability database, eu elections: pro-russian propaganda exploits meta's failure to moderate political ads, incident response: four key cybersecurity measures to protect your business, is mfa enough strategies for next-level identity security in 2024, disinformation defense: protecting businesses from the new wave of ai-powered cyber threats, navigating the evolving cybersecurity compliance landscape in 2024, adapting to tomorrow's threat landscape: ai's role in cybersecurity and security operations in 2024, beyond passwords: securing the digital age with mfa, 2fa, and passwordless authentication, infosecurity magazine spring online summit 2024: day one, infosecurity magazine spring online summit 2024: day two, russia’s midnight blizzard accesses microsoft source code, i-soon github leak: what cyber experts learned about chinese cyber espionage, lockbit takedown: what you need to know about operation cronos, women in cybersecurity at infosecurity europe 2024.

facebook tracking pixel

Think before you click!

Stop, think... should i click.

Think before you click

The concept of "think before you click" is actually one of the most important factors in terms of information security.

When you receive an email, download a file(s) from the internet, or click on a link, think of the following:

  • Is the email genuine, such as source address, spelling and context?
  • Is this file(s) from a trustworthy source? 
  • Is the link legitimate, such as the destination of the URL?

Here are five easy rules to protect your information:

  • Never disclose security details, such as your account credentials and security questions
  • Don’t assume an email, text or phone call is authentic. Use the internet to confirm contact details if required
  • Don’t be rushed. A genuine organisation won’t mind waiting
  • Listen to your instincts. You know if something doesn’t feel right
  • Stay in control. Don’t panic and make a decision you’ll regret.

Starmometer

Your total entertainment blog.

  • April 24, 2024 in Fitness and Health: 10 Ways to Feel Great Everyday
  • April 24, 2024 in Food and Drinks: Jollibee Launches Its Newest Addition to Jollibee Coffee Blends – Get That Vibe with the ALL-NEW Iced Mocha!
  • April 24, 2024 in Headlines: Star Cinema and the Ideafirst Company Announce Vice Ganda’s Movie Comeback in ‘And The Breadwinner Is’
  • April 24, 2024 in Headlines: A Summer Vacation in Paradise Turns Deadly in the Official Trailer for ‘Blink Twice’
  • April 24, 2024 in Headlines: Sponge Cola Releases ‘Tatlong Buwan,’ A Track Inspired by Hit K-Drama Queen of Tears

‘Think Before You Click’ by GMA-7 Wins 1st Civility Star Award

Posted on October 10, 2011 by GMA-7 // 0 Comments

Think Before You Click , the advocacy campaign of the Kapuso Network, won the 2011 Civility Star Award.

Think Before You Click

Think Before You Click , GMA 7’s advocacy campaign to promote the responsible use of social media, was recently honored with the 2011 Civility Star Award by the Civility Counts Project, a global initiative of the Association of Image Consultants International (AICI).

The Think Before You Click campaign reminds Filipinos to stop and think twice before posting anything on social media. Dramatic stories showing the consequences of irresponsible posting was shown last night on GMA News TV’s TBYC: Think Before You Click documentary which was hosted by Howie Severino with special participation of Kara David, Iza Calzado, Jun Veneracion and Elmo Magalona .

Olen Juarez-Lim , managing director of OJL Consulting Group and director of Affiliate for the Philippines for Civility Experts Worldwide, said, “The OJL Consulting Group, the premier image consulting company in the Philippines, nominated GMA Network Incorporated for the 2011 award. This prestigious award is given to corporations or organizations that have demonstrated outstanding leadership by promoting civility in their community, thereby contributing significantly to the betterment of society. Civility is defined by the 3 Rs: Respect, Restraint and Responsibility. We are pleased to recognize GMA network for its contribution to social responsibility and raising awareness about considerate and respectful use of the Internet and social media.”

“We are grateful for this great recognition and the support we received from all the personalities involved in the project,” said Sheila Paras , head of Creative Imaging, News. “We’re also extremely happy with the positive response the campaign has received from various sectors. We appreciate that a number of social media users continue to embrace this concept and are now thinking twice before tweeting or posting anything online.”

Watch the TV plugs for “Think Before You Click” here:

think before you click campaign essay

Share this:

  • Think Before You Click

Related Articles

No Picture

GMA-7 on Reported Merger of Kapuso Network with TV5: ‘MVP Clarified that He was Misquoted’

think before you click campaign essay

‘GMA is Now No. 1 Nationwide’ – TV Plug

think before you click campaign essay

GMA 7 Celebrates 10 Years of Superior Drama with ‘Ikaw Lang Ang Mamahalin’ Remake

Gma trade launch set for tonight at smx.

think before you click campaign essay

GMA-7 Wins Big at the 2012 VACC Awards

Leave a comment.

Your email address will not be published.

Copyright © 2024 | Starmometer

boxphish portal

Think Before You Click – What is it?

The Think Before You Click campaign is designed to get you to do exactly that – slow down, consider what or who you’re interacting with online and think about what you’re about to do before you do it.

It has been launched by many cyber security firms over the years, as well as being pioneered by organisations like the BBC to try and make people act safer online.

annie spratt g9KFpAfQ5bc unsplash scaled 1

As more of everyone’s daily lives move online, the risks associated with online security increase. Cybercriminals base a lot of their attacks on getting people to act impulsively and without thinking, whether this is through a phishing email, a malware attack, or a more sophisticated social engineering assault.

Once you have clicked on something you shouldn’t have, you have opened a door for cybercriminals to invade your computer. This could lead to them installing malware on your device, watching your keystrokes through a keylogger, or gaining access to your passwords and accounts.

In many cases, people will click a link instinctively and then suddenly realise they have made a mistake. Think Before You Click is designed to mitigate against this risk.

What to do  

When you receive an email that includes a link, or you come across a message on social media or a pop up online, the first thing you should do – as per the campaign – is stop and think.

If possible, hover your mouse over the link to reveal the true source. Often this will show you that the link is fraudulent, directing you to a malicious website or location. If this isn’t possible, copy the link and paste it into an incognito browser, ensuring it can’t gain access to any of your accounts – though this still poses the risk of installing malware on your device. If you have any suspicions at all, the best course of action is to do nothing. If possible, report the email or link to your IT department.

What attacks might you encounter

Cyber-attacks can occur in many different ways, but there are some which are a lot more common than others. The number one attack nowadays occurs through phishing .

Phishing attacks are when a cybercriminal sends an email to your account, trying to get you to act impulsively and either click on a link, download malicious software or disclose confidential information about yourself. They will use many techniques to try and make the email appear convincing, like impersonating a trusted brand, using urgent language or even pretending to be someone close to you.

In all of these cases, look out for tell-tale red flags like misspellings or grammatical mistakes, time-sensitive requests and spoofed brand names. The emails can be very convincing so the best thing to do is stop and think before you click. As always if you’re in any doubt, err on the side of caution and delete the email.

How Boxphish can help

If you’re reading this and are thinking wow, I know people who click on malicious links all the time or you’ve done this before yourself, then perhaps you need to invest in cyber security awareness training .

Cyber awareness training is designed to educate individuals on the dangers we face through our online activities, covering everything from phishing attacks to malware, social engineering and everything in between.

At Boxphish, we offer bite-sized interactive courses which take you through one topic at a time, teaching everything you need to know about the tactics cyber criminals might use and how best to defend yourself from them. This new knowledge is then tested through a short quiz and can be further put to the test through real-world phishing simulations. These simulations are delivered automatically to your inbox and test you in a real-life environment, instructing you on what you did wrong if you do fall for the phishing email and click on the link.

To find out more about how Boxphish can develop training for you, visit our website and book a demo today .

Want to know more about Boxphish?

Download our service overview, see our platform in action, fill out the form below and a member of the team will be in touch to arrange a 20-minute demo, boxphish get a demo product section, privacy overview.

PhilNews

  • #WalangPasok
  • Breaking News
  • Photography
  • ALS Exam Results
  • Aeronautical Engineering Board Exam Result
  • Agricultural and Biosystem Engineering Board Exam Result
  • Agriculturist Board Exam Result
  • Architecture Exam Results
  • BAR Exam Results
  • CPA Exam Results
  • Certified Plant Mechanic Exam Result
  • Chemical Engineering Exam Results
  • Chemical Technician Exam Result
  • Chemist Licensure Exam Result
  • Civil Engineering Exam Results
  • Civil Service Exam Results
  • Criminology Exam Results
  • Customs Broker Exam Result
  • Dental Hygienist Board Exam Result
  • Dental Technologist Board Exam Result
  • Dentist Licensure Exam Result
  • ECE Exam Results
  • ECT Board Exam Result
  • Environmental Planner Exam Result
  • Featured Exam Results
  • Fisheries Professional Exam Result
  • Geodetic Engineering Board Exam Result
  • Guidance Counselor Board Exam Result
  • Interior Design Board Exam Result
  • LET Exam Results
  • Landscape Architect Board Exam Result
  • Librarian Exam Result
  • Master Plumber Exam Result
  • Mechanical Engineering Exam Results
  • MedTech Exam Results
  • Metallurgical Engineering Board Exam Result
  • Midwives Board Exam Result
  • Mining Engineering Board Exam Result
  • NAPOLCOM Exam Results
  • Naval Architect and Marine Engineer Board Exam Result
  • Nursing Exam Results
  • Nutritionist Dietitian Board Exam Result
  • Occupational Therapist Board Exam Result
  • Ocular Pharmacologist Exam Result
  • Optometrist Board Exam Result
  • Pharmacist Licensure Exam Result
  • Physical Therapist Board Exam
  • Physician Exam Results
  • Principal Exam Results
  • Professional Forester Exam Result
  • Psychologist Board Exam Result
  • Psychometrician Board Exam Result
  • REE Board Exam Result
  • RME Board Exam Result
  • Radiologic Technology Board Exam Result
  • Real Estate Appraiser Exam Result
  • Real Estate Broker Exam Result
  • Real Estate Consultant Exam Result
  • Respiratory Therapist Board Exam Result 
  • Sanitary Engineering Board Exam Result 
  • Social Worker Exam Result
  • UPCAT Exam Results
  • Upcoming Exam Result
  • Veterinarian Licensure Exam Result 
  • X-Ray Technologist Exam Result
  • Programming
  • Smartphones
  • Web Hosting
  • Social Media
  • SWERTRES RESULT
  • EZ2 RESULT TODAY
  • STL RESULT TODAY
  • 6/58 LOTTO RESULT
  • 6/55 LOTTO RESULT
  • 6/49 LOTTO RESULT
  • 6/45 LOTTO RESULT
  • 6/42 LOTTO RESULT
  • 6-Digit Lotto Result
  • 4-Digit Lotto Result
  • 3D RESULT TODAY
  • 2D Lotto Result
  • English to Tagalog
  • English-Tagalog Translate
  • Maikling Kwento
  • EUR to PHP Today
  • Pounds to Peso
  • Binibining Pilipinas
  • Miss Universe
  • Family (Pamilya)
  • Life (Buhay)
  • Love (Pag-ibig)
  • School (Eskwela)
  • Work (Trabaho)
  • Pinoy Jokes
  • Tagalog Jokes
  • Referral Letters
  • Student Letters
  • Employee Letters
  • Business Letters
  • Pag-IBIG Fund
  • Home Credit Cash Loan
  • Pick Up Lines Tagalog
  • Pork Dishes
  • Lotto Result Today
  • Viral Videos

Why We Need To Think Before We Click – Examples Scenarios

Here are some examples of why we need to think before we click.

WE NEED TO THINK – There are several reasons why we need to think before we click anything on the internet.

Because of the internet, there are virtually no limitations to what we could do. Furthermore, there’s an endless ocean of information and content that we can devour.

However, we need to realize that despite all the positives the internet brings, there are some serious negative impacts. As such, among the things that we need to look out for is our privacy.

Why We Need To Think Before We Click – Examples Scenarios

Thinking Before we click reminds us that internet safety is of the utmost importance. The saying is designed to protect teens from overexposing themselves online, especially on social media.

After uploading a picture online, if it’s public, then you’ve basically lost control over it. It could be downloaded, manipulated, and shared without context and consent.

Because of this, we need to think about what we upload on the web. But, thinking about what we download is also important.

For example, when we want to download something from the internet, we need to make sure that it is safe. There’s a lot of viruses and malware online.

Once it has infected your computer, hackers can potentially go through your system, steal personal information, or try to blackmail you.

That’s why it is empirical that we keep ourselves protected when using the internet. And, the best way of doing so is to think before we click.

Thanks for reading. We aim to provide our readers with the freshest and most in-demand content. Come back next time for the latest news here on Philnews.

READ ALSO: Pagsukat Ng Pambansang Kita – Kahulugan At Halimbawa

Leave a Comment Cancel reply

GMA Logo

  • COVID-19 Full Coverage
  • Cover Stories
  • Ulat Filipino
  • Special Reports
  • Personal Finance
  • Other sports
  • Pinoy Achievers
  • Immigration Guide
  • Science and Research
  • Technology, Gadgets and Gaming
  • Chika Minute
  • Showbiz Abroad
  • Family and Relationships
  • Art and Culture
  • Health and Wellness
  • Shopping and Fashion
  • Hobbies and Activities
  • News Hardcore
  • Walang Pasok
  • Transportation
  • Missing Persons
  • Community Bulletin Board
  • GMA Public Affairs
  • State of the Nation
  • Unang Balita
  • Balitanghali
  • News TV Live

My Stream

'Think before you click!' GMA urges responsible tweeting

  • Take a photo of yourself holding up a sign “think before you click" written on a sheet of paper and change that to your Facebook, Twitter, Tumblr, Google+, MySpace or Flickr profile photo. Then upload them to YouScoop.tv .
  • Add a “Think Before You Click" Twibbon to your Twitter DP.
  • Tweet us using the hashtag #thinkB4Uclick and tell us how you can be a more responsible user of social media. Or join ongoing discussions on Facebook and Google+ .
  • Record a video of yourself discussing how you can do your part to promote social media responsibility and upload it to YouScoop.tv.

Verify or search for a PCI Qualified Professional. Select the qualification that best suits your needs.

  • 3DS Assessor
  • Approved Scanning Vendors
  • Card Production Security Assessors
  • Internal Security Assessors
  • Point-to-Point Encryption Assessors
  • Qualified PIN Assessors
  • Qualified Security Assessors
  • Secure Software Assessors
  • Secure Software Lifecycle Assessors
  • PCI Forensic Investigators
  • PCI Professionals
  • Qualified Integrator and Resellers
  • PCI Recognized Laboratories
  • Assessor & Vendor Feedback Forms
  • Verify a Professional

Locate approved devices and payment solutions for use at the point of sale, and point-to-point encryption solutions to protect cardholder data.

  • 3DS Software Development Kits
  • Approved PTS Devices
  • Validated Payment Software
  • Secure SLC Qualified Software Vendors
  • Payment Applications (PA-DSS)
  • Point-to-Point Encryption Solutions
  • MPoC Solutions
  • SPoC Solutions
  • CPoC Solutions

Learn more about PCI SSC’s Training & Qualification programs, class schedules, registration information, corporate group training and knowledge training.

  • 3DS Assessor Training
  • Approved Scanning Vendor Training
  • Associate QSA Training
  • Card Production Security Assessor Training
  • Internal Security Assessor Training
  • PCI Acquirer Training
  • PCI Awareness Training
  • PCI Forensic Investigator Training
  • PCI Professional Training
  • P2PE Assessor Training
  • Qualified Integrator and Reseller Training
  • Qualified PIN Assessor Training
  • Qualified Security Assessor Training
  • Secure SLC Assessor Training
  • Secure Software Assessor Training
  • Working From Home: Security Awareness Training
  • Training Class Schedule
  • Corporate Group Training
  • Knowledge Training
  • Programs Fee Schedule
  • Meet our Trainers
  • Credly Digital Badging

Attend PCI SSC upcoming Community Meetings, programs, webcasts, and industry events where we are speaking.

  • Community Meetings
  • Past Events/Photo Galleries

Get involved with PCI SSC and help influence the direction of PCI Standards.

  • Ways to Participate
  • Associate Participating Organization
  • Principal Participating Organization
  • Request For Comments
  • Special Interest Groups (SIGs)

View the latest news, announcements, and resources from PCI SSC.

  • Press Releases
  • PCI Perspectives Blog
  • Coffee with the Council Podcast
  • Industry Bulletins
  • Media Coverage
  • Join Our Mailing List

Access PCI SSC standard and program documents and payment security resources.

  • Document Library
  • Community Job Board
  • Global Content Library
  • Merchant Resources
  • PCI SSC Glossary
  • PCI SSC Portal
  • PCI Security Essentials
  • PCI SSC Threat Center
  • PCI SSC Leadership
  • Board of Advisors
  • Affiliate Members
  • Strategic Members
  • Principal Participating Organizations
  • Participating Organization Directory
  • Regional Engagement Board (REB)
  • Global Executive Assessor Roundtable (GEAR)
  • Careers at PCI SSC

Back-to-Basics: Think Before You Click

Think-Before-You-Click

As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series , we highlight payment security basics for protecting against payment data theft. Today’s blog focuses on thinking before you click.

Hackers use phishing and other social engineering methods to target organizations with legitimate-looking emails and social media messages. These trick users into providing confidential data, such as credit card numbers, social security numbers, account numbers, or passwords.

These attacks have been around for a while and are at the heart of many of today’s most serious cyber-attacks and can put your business and your customers at risk. It is important to have your guard up when opening emails and engaging in social media. Everyone needs to be aware of how to best protect against phishing and social engineering attacks.

There are many ways to defend against this type of attack including the following best practices:

Reduce unwanted email traffic:

  • Install and maintain basic security protections, including firewalls, anti-malware software and email filters to prevent known malicious IP addresses or domains for example.

Train employees and users on email and browser security best practices, including these key tips:

  • Resist the urge to click links in a suspicious email; visit websites directly.
  • Be cautious of email attachments from unknown sources. Also, many viruses can fake the return address, so even if it looks like it’s from someone you know, be wary about opening any attachments.
  • Only install approved applications.
  • Be sure you’re at the right website when downloading software or upgrades. Even when using a trusted site, double check the URL before downloading to make sure you haven’t been directed to a different site.
  • Recognize the signs that your computer is affected and contact IT.

Update Regularly:

  • Use basic security tools that block malicious intruders and alert you to suspicious activity, including firewalls, anti-virus, malware and spyware detection software.
  • Regularly check that web browsers and security software have the latest security patches and updates.

Separate Personal-Use Devices from Work Devices:

  • Keep computers used for social media sites, email and general internet browsing separate from computers used for processing financial transactions.

Practice good password hygiene:

  • Change the passwords on computers and point-of-sale systems (including operating systems, security software, payment software, servers, modems, and routers) from the default ones the product came with to something personal to you but that is difficult to guess - such as combining upper case letters, numbers and special characters, or using a passphrase.
  • Update system passwords regularly, and especially after outside contractors do hardware, software or point-of-sale system installations or upgrades.
  • Educate employees and users on choosing strong passwords and changing them frequently.

Use two-factor authentication:

  • Many of these attacks rely on getting a password one way or another. Requiring another form of ID, such as security tokens, will make it harder for hackers to falsify an account.

Still working from home? Take this 45-minute training to ensure your work set-up is secure: New Training: Work from Home Security Awareness.

View the Back-to-Basics Series

LIKE WHAT YOU READ?

Subscribe to the PCI Perspectives blog to receive insights, information and practical resources to help your organization protect payment data.

Mark Meissner

Copyright © 2006 – 2022 PCI Security Standards Council, LLC. All rights reserved. Terms and Conditions .

  • Association Management services provided by Virtual, Inc.
  • Antitrust Policy
  • Privacy Policy

Bryant Digital Repository

  • < Previous

Home > Honor > HONORS_COMMUNICATION > 24

Senior Honors Projects

Honors Projects in Communication

Think Before You Click: An Analysis of Facebook as a Source of News

Lauren Malone

Document Type

First faculty advisor.

Baran, Stanley

Digital Media Literacy

  • Bryant University

Rights Management

All rights retained by Bryant University and Lauren Malone

The purpose of this study is to analyze how millennial college students perceive and interpret the news-related content that is posted on the social networking website Facebook. The news that this study is focused on is related to major events in American politics, especially this past Presidential election. One research question was developed to compete this study: what influence are news stories being shared on Facebook having on millennials? In order to determine the answer to this question, focus groups with college students at Bryant University were held in which the students were asked to evaluate a news article and give their thoughts and opinions on current American events and how they are portrayed on social media.

Since May 29, 2018

Included in

Communication Technology and New Media Commons

  • To view the content in your browser, please download Abobe Reader or, alternately,
  • you may Download the file to your hard drive.

Advanced Search

  • Notify me via email or RSS
  • Collections
  • Disciplines
  • Honor Website
  • The Douglas and Judith Krupp Library
  • Helin Digital Commons

Ask a librarian

Home | About | FAQ | My Account | Accessibility Statement | Land Acknowledgment

Privacy Copyright

Show more results...

Logo

ThinkB4UClick

Think B4U Click

Lesson 1 – What is Privacy?

This lesson is designed to help students gain an awareness and understanding of the nature of ‘privacy’. Students will explore the issue of ‘privacy’ for famous people and consequently look at how the same issue could affect their lives.

ThinkB4UClick

Lesson 2 – My Autobiography

This lesson will give students an introduction to the theme of New Media (the internet and mobile phones in particular) using as a starting point the personal experiences of each student.

Think b4U Click

Lesson 3 – The Images

This lesson will allow students an opportunity to consider the creative capacities of young people using the internet and mobile phones.

Think B4U Click

Lesson 4 – Simulation: Privacy Under Threat

Through simulation, students will experience the difficulties and frustrations of several situations in which their privacy is under threat, while exploring the solutions available

Think B4U Click

Lesson 5 – Debating the Issues

Having discussed the importance of protecting one’s online privacy, students will now debate the issue among themselves. The walking debate will give every student the opportunity to express their opinion on the issues under discussion. Consequently the class will create their own slogan to highlight appropriate care around ensuring the safeguarding of their privacy.

Think B4U Click

Lesson 6 – What the Laws Say

In this lesson students will examine privacy as a human right. First students will draft their own version of a law to protect privacy, and consequently will examine four documents which set out a right to privacy.

Think B4U Click

Lesson 7 – Reflecting on Online Rights

This lesson involves a simple activity which allows students to reflect further on the subject of their online rights and responsibilities.

Think B4U Click

Lesson 8 - The Committee

This lesson involves a role-play in which students are divided into groups. Each group represents a point of view shared by parents, teachers and students respectively. Each group must select three online rights and hypothesise during an entire class group session some corrective measures or put forward practical proposals so that the selected rights can become fully respected.

Think B4U Click

Lesson 9 - The Tree of Solutions

Critical abilities linked to internet and mobile phone use.

Think B4U Click

Lesson 10 - Think Before You Click

This is a summary class to pull together all the learning from previous classes. Through deciding on key words, students will establish for themselves the key messages around the threats to privacy which exist online.

Think B4U Click

Action Projects 1& 2

In this lesson students will be given an opportunity to devise guidelines for taking and sharing photos online and for better internet and technology use in general.

Think B4U Click

Comic Strip

think before you click campaign essay

Talk to someone

Worried about something you have seen online or concerned about your child? Childline and the National Parents Council Primary offer free advice and support service.

think before you click campaign essay

Childline is a support service for young people up to the age of 18.There is a 24hr telephone, online and mobile phone texting service.

1800666666 50101 Get started

think before you click campaign essay

The National Parents Council Primary enables and empowers parents to be effective partners in their children’s education.

01 887 4477 [email protected]

think before you click campaign essay

Report Illegal Content

Sometimes you might unwittingly stumble across illegal online content like child abuse imagery. Always remember: you can report it and get it removed using Hotline.ie.

More on illegal content

Make a report

think before you click campaign essay

Technology Military

Pause And Ponder: The Power Of ‘Think Before You Click’ Essay

' src=

In today’s digital age, where a click holds the power to shape our perception of the world, it has become more important than ever to think before we click. The “think before you click essay” is an insightful piece that delves into the significance of our online actions and the consequences they can have. So, what does it mean to think before you click? Simply put, it is about being mindful of the information we consume and share, questioning its authenticity, and considering the potential impact it may have. Join me as we explore this timely topic and learn how we can navigate the virtual realm with responsibility and awareness.

Think Before You Click Essay

The importance of critical thinking in the digital age.

In today’s digital age, where information is just a click away, it is more important than ever to think before you click. The vast amount of information available online can be overwhelming, and not all of it is accurate or reliable. It is crucial to develop critical thinking skills to navigate the digital landscape effectively. This essay will explore the importance of critical thinking and provide practical tips on how to be a discerning online consumer.

The Impact of Fake News and Misinformation

One of the biggest challenges in the digital world is the proliferation of fake news and misinformation. With the click of a button, false information can spread like wildfire, leading to confusion, polarization, and even harm. It is essential to be aware of the impact that fake news can have on society and to cultivate a healthy skepticism when consuming information online.

Recognizing Fake News

Being able to recognize fake news is an essential skill in the digital age. Here are some key signs to look out for:

  • Unreliable sources: Check the credibility of the source before trusting the information. Be wary of websites with no established reputation or dubious agendas.
  • Extreme bias: Fake news often contains a strong bias, with sensationalized headlines and exaggerated claims.
  • Lack of verification: Fake news articles often lack proper verification or supporting evidence. Look for multiple credible sources that corroborate the information.
  • Emotional appeal: Fake news often aims to provoke an emotional response. Be cautious of articles that seem designed to evoke anger or outrage.

Fact-Checking and Verifying Information

To avoid falling victim to fake news, it is important to fact-check and verify information before accepting it as true. Here are some strategies to help you become a more discerning consumer of information:

  • Verify the source: Look for reputable sources that have a history of accurate reporting. Established news organizations and peer-reviewed journals are generally more reliable than personal blogs or social media posts.
  • Check for corroboration: If a piece of information seems dubious, try to find multiple sources that confirm or refute it. Cross-referencing information from different sources can help you get a more accurate picture.
  • Consult experts: If you come across complex or specialized information, seek out experts in the field to provide insights and context. Their expertise can help you make more informed judgments.
  • Use fact-checking tools: There are several fact-checking websites and tools available that can help you verify the accuracy of information. Utilize these resources to double-check questionable claims.

Protecting Personal Information and Online Privacy

In addition to being mindful of fake news and misinformation, it is crucial to protect your personal information and online privacy. The digital landscape presents various risks, such as identity theft, cyberbullying, and online scams. By being cautious about the information you share and the websites you engage with, you can better safeguard yourself against these threats.

Safe Online Practices

To protect your personal information and online privacy, follow these best practices:

  • Use strong, unique passwords: Create strong and unique passwords for each online account you have. Avoid using the same password across multiple platforms to minimize the risk of unauthorized access.
  • Enable two-factor authentication: Two-factor authentication adds an extra layer of security by requiring a second form of verification, such as a code sent to your mobile device, in addition to your password.
  • Be cautious with personal information: Avoid sharing sensitive personal information, such as your full address or social security number, on public platforms or with untrusted sources.
  • Use secure websites: Look for the padlock icon in the browser’s address bar, indicating that the website has an SSL certificate and uses encryption to protect data transmitted between your device and the server.
  • Regularly update software and antivirus programs: Keep your operating system, web browser, and antivirus software up to date to benefit from the latest security patches and protection against malware.

Critical Evaluation of Online Sources

In addition to protecting personal information, it is essential to critically evaluate online sources to ensure their reliability and credibility. Here are some factors to consider when assessing the trustworthiness of a website or source:

  • Author expertise: Investigate the author’s credentials and expertise in the subject matter. Look for evidence of reputable affiliations or relevant experience.
  • Publication date: Check the publication date of the article or information. Outdated information may no longer be accurate or relevant.
  • Editorial standards: Determine whether the website or source has clear editorial standards and a transparent process for fact-checking and verifying information.
  • Domain authority: Consider the domain authority of the website. Websites with higher domain authority are generally more trustworthy.
  • Reviews and feedback: Look for user reviews or feedback on the website or source. Consider the reputation and credibility of the platform.

In conclusion, in the age of information overload, it is essential to develop critical thinking skills and exercise caution when consuming information online. The ability to recognize fake news, verify information, and protect personal information is crucial for maintaining a well-informed and safe digital presence. By thinking before you click, you can navigate the digital landscape with greater confidence and make informed decisions based on reliable information.

Think before you click

Frequently Asked Questions

What are the potential consequences of clicking on links without thinking.

Clicking on links without thinking can expose you to various risks. You might encounter phishing attempts, where cybercriminals try to steal your personal information or login credentials. Additionally, you may unknowingly download malware that can damage your device or compromise your privacy.

How can I determine if a link is safe to click?

Before clicking on a link, always examine it closely. Check the URL to ensure it matches the website or source you expect. Be cautious of shortened URLs or suspicious domain names. Hover over the link (without clicking) to preview the destination URL, and look out for any indicators of suspicious or unfamiliar websites.

What steps should I take to protect myself from malicious links?

To protect yourself from malicious links, exercise caution and follow these steps: 1. Think twice before clicking on any link, especially in emails or messages from unknown senders. 2. Hover over the link to preview the URL and ensure it is legitimate. 3. Double-check the email or message for any signs of phishing attempts, such as grammatical errors or urgent requests for personal information. 4. Install and keep your antivirus software up to date to detect and block potential threats.

How can I identify a phishing email?

Phishing emails often contain red flags that can help you identify them. Look for: 1. Generic greetings instead of personalized ones. 2. Spelling or grammar mistakes. 3. Requests for personal information or login credentials. 4. Urgent or threatening language. 5. Suspicious email addresses or domains.

What actions should I take if I accidentally click on a suspicious link?

If you accidentally click on a suspicious link, there are a few steps you should take: 1. Close the website or pop-up window immediately. 2. Run a scan with your antivirus software to check for any malware. 3. Change your passwords for any accounts you accessed after clicking the link. 4. Monitor your accounts and financial statements for any unusual activity. 5. Consider reporting the incident to the appropriate authorities or your IT department if you are at work.

Final Thoughts

In conclusion, the “think before you click” essay emphasizes the importance of exercising caution and critical thinking while engaging with online content. With the ever-increasing presence of misinformation and clickbait, it is crucial for individuals to be discerning and verify the accuracy and credibility of information before sharing or acting upon it. By being mindful of the potential consequences of our actions online, we can contribute to a more informed and responsible digital community. So, remember to pause, evaluate, and think before you click, ensuring that you do your part in combating the spread of misinformation and promoting a more reliable online environment.

Related Post

Bible verse explained: tagalog technology military insights, learn ang lahat ay magsasaya chords: a complete guide, mga anyong lupa sa pilipinas: exploring the landforms of the philippines, leave a reply cancel reply.

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

4 Pinay Girl Viral Video: A Captivating Sensation!

U.S. flag

An official website of the United States government

Here’s how you know

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Take action

  • Report an antitrust violation
  • File adjudicative documents
  • Find banned debt collectors
  • View competition guidance
  • Competition Matters Blog

New HSR thresholds and filing fees for 2024

View all Competition Matters Blog posts

We work to advance government policies that protect consumers and promote competition.

View Policy

Search or browse the Legal Library

Find legal resources and guidance to understand your business responsibilities and comply with the law.

Browse legal resources

  • Find policy statements
  • Submit a public comment

think before you click campaign essay

Vision and Priorities

Memo from Chair Lina M. Khan to commission staff and commissioners regarding the vision and priorities for the FTC.

Technology Blog

Consumer facing applications: a quote book from the tech summit on ai.

View all Technology Blog posts

Advice and Guidance

Learn more about your rights as a consumer and how to spot and avoid scams. Find the resources you need to understand how consumer protection law impacts your business.

  • Report fraud
  • Report identity theft
  • Register for Do Not Call
  • Sign up for consumer alerts
  • Get Business Blog updates
  • Get your free credit report
  • Find refund cases
  • Order bulk publications
  • Consumer Advice
  • Shopping and Donating
  • Credit, Loans, and Debt
  • Jobs and Making Money
  • Unwanted Calls, Emails, and Texts
  • Identity Theft and Online Security
  • Business Guidance
  • Advertising and Marketing
  • Credit and Finance
  • Privacy and Security
  • By Industry
  • For Small Businesses
  • Browse Business Guidance Resources
  • Business Blog

Servicemembers: Your tool for financial readiness

Visit militaryconsumer.gov

Get consumer protection basics, plain and simple

Visit consumer.gov

Learn how the FTC protects free enterprise and consumers

Visit Competition Counts

Looking for competition guidance?

  • Competition Guidance

News and Events

Latest news, ftc announces rule banning noncompetes.

View News and Events

Upcoming Event

Informal hearing on proposed trade regulation rule on unfair or deceptive fees – april 24, 2024.

View more Events

Sign up for the latest news

Follow us on social media

-->   -->   -->   -->   -->  

gaming controller illustration

Playing it Safe: Explore the FTC's Top Video Game Cases

Learn about the FTC's notable video game cases and what our agency is doing to keep the public safe.

Latest Data Visualization

Visualization of FTC Refunds to Consumers

FTC Refunds to Consumers

Explore refund statistics including where refunds were sent and the dollar amounts refunded with this visualization.

About the FTC

Our mission is protecting the public from deceptive or unfair business practices and from unfair methods of competition through law enforcement, advocacy, research, and education.

Learn more about the FTC

Lina M. Khan

Meet the Chair

Lina M. Khan was sworn in as Chair of the Federal Trade Commission on June 15, 2021.

Chair Lina M. Khan

Looking for legal documents or records? Search the Legal Library instead.

  • Report Fraud
  • Get Consumer Alerts
  • Search the Legal Library
  • Submit Public Comments
  • Cases and Proceedings
  • Premerger Notification Program
  • Merger Review
  • Anticompetitive Practices
  • Competition and Consumer Protection Guidance Documents
  • Warning Letters
  • Consumer Sentinel Network
  • Criminal Liaison Unit
  • FTC Refund Programs
  • Notices of Penalty Offenses
  • Advocacy and Research
  • Advisory Opinions
  • Cooperation Agreements
  • Federal Register Notices
  • Public Comments
  • Policy Statements
  • International
  • Military Consumer
  • Consumer.gov
  • Bulk Publications
  • Data and Visualizations
  • Stay Connected
  • Commissioners and Staff
  • Bureaus and Offices
  • Budget and Strategy
  • Office of Inspector General
  • Careers at the FTC

Heads Up: Stop. Think. Click.

TheBlogPilot.com Logo

Responsible Use of Social Media: Think Twice Before You Click!

' src=

Social media  is a platform that has given us an endless opportunity to connect and engage with people from around the world – but, it must be used wisely.

Thanks to the mighty internet, we can now share our thoughts and experiences, get access to endless information, network professionally, and much more.

However, let’s not overlook the importance of using social media responsibly.

Think Twice Before You Click | An Advocacy Towards Responsible Use of Social Media

Being a responsible social media user is essential if you want these advantages without compromising your reputation or personal data.

Even one careless click can lead to something that you can NEVER be taken back.

This, what you might think is an innocent click, could lead to the ruin of your reputation, the demise of your business, or even interrupt your dinner because the FBI is knocking on your door . It can happen!

More about the FBI to follow…

In this blog post, we’ll discuss how being mindful before clicking any link or instigating any activity on our social media platforms can save us enormous time and energy over the long run in terms of protecting ourselves online.

The moral of the story – think twice before you click!

Let’s get started!

Table of Contents

Generation of Millennials – Synonymous with Using Social Media Platforms

Gone are the days when everything requires manual labor and the painstaking waiting game to obtain the information or results that we desire.

Everything is literally one click away now.

Facebook , Twitter , and Instagram , just to name a few, are some of the most popular social media platforms that we use on a daily basis to channel our daily activities.

Whether it’s as eventful as announcing your engagement, or as mundane as venting out your frustrations over a slow internet connection.

Social media platforms have indeed colonized our daily lives in so many ways possible.

The use of social media accounts has evolved rapidly within a short period of time and along with its evolution comes a different purpose to its users.

What started out as a simple outlet for sharing pictures and videos online has become a vicious tool for spreading misleading information, malicious hearsay, sexually provocative videos, and of course cyber bullying that accounted for numerous innocent deaths, and damaged the reputations of different people and even brands.

Suddenly, everyone is vulnerable.

We become our own perpetrators and victims without consciously realizing it.

The gravity of words that we share online can either bring us popularity and approval or plague us with hatred and bashers.

Responsible social media usage has unfortunately gone astray.

It’s a stigma that we need to halt.

Responsible Use of Social Media Accounts in Business

Logging on to social media platforms these days is like entering a unique universe – one full of opportunities, connections, conversations, and fun.

It’s also an incredibly powerful tool for businesses and organizations when used properly and responsibly.

Social media usage has the potential to boost engagement with your customers, generate leads, and create brand awareness that reaches far beyond traditional marketing methods.

However if not handled properly, it can have serious negative implications for businesses of all sizes.

Thankfully, by following some basic guidelines you can be a responsible social media user effectively while protecting yourself from devastating pitfalls.

Endless Communication

Properly Communication

While social media usage is a popular choice nowadays to rant about our frustrations, it’s wise if you skip the impulse to impulsively post harsh words when you’re angry.

After all, once it’s seen, it cannot be taken back.

Stay away from online dramas and deal with your frustrations by talking to actual people who can really give you sincere counsel.

Try your family, for starters.

Don’t Be a Gossip-Monger

Don’t Be a Gossip-Monger

Another thing that you should never do is to spread rumors.

If your intention is to harass or bully someone that you dislike, then you better think twice about it.

Get your act together!

Know that: “you will reap what you sow,” so better be an ambassador of goodwill.

Choose Your Battles

Do not patronize public feuds.

Public display of abomination is not worth your time, it’s very pointless and unscholarly.

It’s for people who have nothing to do with their time and people recklessly looking for a fight.

Choose your battles and choose them well.

Less is More

Last but not least, do not post or share nude or sexually provocative photos!

Unless you dream of becoming a stripper or a porn star, then maybe that’s your thing.

Keep your private photos private, and provocative videos to yourself.

Again, once they’re on the Net, they are out there forever. Even if you delete them soon after, they’ll be somewhere to be found.

Self-respect is something we owe to ourselves.

Your idea of sexy should be – less is more, the less you reveal, the more people will wonder.

And, for the younger generation, the less possible trouble you could be in with your parents, or other authorities.

Fake News – It’s a Real Problem

We’re living in a world where information is at our fingertips.

But not all information we receive is true, and that’s the reality.

As much as social media has made it easier for us to access news, it has also given way to fake news – false stories or hoaxes circulated on social media platforms.

The consequences of this can be very dangerous, as people often take these fake news stories as facts and spread them further.

This can lead to widespread panic, chaos, and even violence.

So what can we do about it? The responsibility lies in each and every one of us to fact-check information before sharing it on social media.

We should also avoid spreading rumors or unverified news (fake news), as it can have serious consequences.

Let’s use our voices on social media for good, not for spreading false information.

FBI Dinner Interruption

NOTE : This story made the local news, so for his protection, I will not be revealing how long ago this took place, the city, state, social platform, the official, or any additional information that could lead to discovery.

We all know that there are some people that simply enjoy harassing or inserting their opinion towards the person for their wrongdoing, so we’ll keep this private.

Here’s the story…

I have a friend that told me a story where her son shared his unvarnished opinion about a government official.

At the time, his mother was not aware of what he did, until there was a knock on the door.

Her, soon-to-be 18-year-old son at the time, decided to share his opinion about a government official on a social media platform for others to read, thinking that what he had to say was funny.

It very well may have been hilarious, but… let me ask a question, do government officials have a sense of humor? I didn’t think so!

Little did he know, what he thought was funny, was considered a mild threat to the government official.

After a day had passed, receiving some responses to his post with some laughter, and some negative feedback intertwined, he decided to delete the social media post.

Unfortunately, the damage was done – his post was Flagged by the federal government.

Unfortunately for this young man, this meant a visit was inevitable from the, all too well-known, 3 letter acronym of the federal government.

But, thinking that he caught it in time, he wasn’t too worried.

One night, just a few days later, while he was enjoying dinner with his mother, a knock came at the door.

Guess Who it Was?

With his mother at a loss for words, because she has no idea what he did, and beads of sweat starting to form on the young man’s forehead, the FBI was cordially invited in and the interrogation began.

After the FBI left saying they’ll be in touch, and for a nerve-racking few months, he and his mother, feared the worst, thinking that he might do some prison time because their minds were in overdrive thinking he might be treated as an adult for his crime.

Because he was a few days shy of age 18 when he posted and showed remorse for his post, he received a slap on the wrist.

The government, not known for letting people off the hook with a warning, was given community service for a simple click of his mouse, that he couldn’t undue.

Moral of the story – choose wisely when sharing your opinion about government officials, or anyone for that matter.

Something to keep in mind – from what I understand, and it may be worth researching for yourself, the government has an algorithm to monitor everything (understandably so after 9/11).

There are several artificial intelligence, algorithms that scour the Internet (keeping our privacy intact), flagging specific keywords, and monitoring your text messages doing the same, along with an algorithm that listens to your phone calls to pick up specific words.

So, watch what you click to go out on the Internet, the text messages you send, along with what you say while talking on the phone!

The safest thing you can do is to NOT share something that you think might possibly get you in trouble.

If you’re not 100% sure, don’t put it out there!

Regardless of what platform you use, it’s very important that we all take responsibility for what we share on the Internet.

Privacy Settings aren’t made without purpose, utilize them properly.

If you are really fond of using social media, then keep it fun, interesting, and smart.

As we can see there are many risks when it comes to using social media, making it important to make socially responsible decisions.

We should think twice before we click and take advantage of the good that comes with a platform like social media while also protecting ourselves from its potential harm.

We must be conscious of our actions and strive to put an end to cyberbullying, spreading malicious rumors, or providing opportunities for identity theft.

At the same time, we can use the power of these platforms to find genuine connections, spread positive messages, and engage in meaningful conversations.

Thankfully, most social media platforms have features available to help protect users’ privacy and security and we must continue advocating for the responsible use of social media so that every user can benefit from this technology in a thoughtful fashion.

It’s our collective responsibility to be mindful of how we use these tools of communication as they become ever more intertwined within society’s core fabric each day.

' src=

Blogging since 2010, John has found his true calling as TheBlogPilot . He's a serial entrepreneur and business owner, who's mission is to help ambitious individuals find financial freedom through blogging - to start, grow & build a sustainable, money-making blogging business!

Similar Posts

How to Overcome Imposter Syndrome – 10 Proven Tips to Improve Confidence for Bloggers

How to Overcome Imposter Syndrome – 10 Proven Tips to Improve Confidence for Bloggers

Feeling like a fraud? You’re not alone! Here are 10 life-changing tips for bloggers to help you boost your confidence and learn how to overcome imposter syndrome, hopefully, once and for all.

10 Things Rich People Do That Poor People Do NOT – Habits of the Wealthy

10 Things Rich People Do That Poor People Do NOT – Habits of the Wealthy

Are the rich and wealthy people just good with money, or is there a deeper brilliance to their success? Most people including myself would agree that there are certain choices and daily habits that are targeted towards…

The People You Spend the Most Time with WILL Affect Your Chances for Success!

The People You Spend the Most Time with WILL Affect Your Chances for Success!

When it comes to relationships, whether business or personal, the people you spend the most time with will have the greatest impact on your frame of mind. In the work place, those around you can greatly affect your behavior, attitude, and even manipulate the way you think and behave, which…

Feeling Lost or Unmotivated? Find Your WHY & Get Back on Track NOW!

Feeling Lost or Unmotivated? Find Your WHY & Get Back on Track NOW!

Are YOU feeling lost and unmotivated, or feel like you’re running in circles? Wondering why your business isn’t taking off or producing results? Finding your WHY is the key to getting back on track. Here’s how to do it.

Follow Your Passion and You Will Never Work a Day in Your Life

Follow Your Passion and You Will Never Work a Day in Your Life

Are you doing what you love? Are you passionate about what you are currently doing to earn a living? If not, you should NOT settle for less… in this article is a Q & A test to find out if what you’re doing is your true calling. Or, if there…

6 Benefits of Early to Bed Early to Rise – Secrets of Successful Business Leaders

6 Benefits of Early to Bed Early to Rise – Secrets of Successful Business Leaders

Have you ever wondered why one of the habits of the wealthy and successful is to begin their day in the early A.M.? If you understood the power of tapping into the morning hours, you too would begin your day, bright eyed and bushy tailed.

Think Before You Click

How would you like to support this campaign, support this campaign by adding to your profile picture .

think before you click campaign essay

Don't worry , you'll get a chance to preview your Twibbon before it is added.

Tweet my support on Twitter ?

Tweet my support on twitter, tweeting your message of support. this should only take a few seconds....

In the meantime please like us on Facebook!

Other ways to show your support

Send an email encouraging support.

Would somebody you know be interested in this Campaign? Enter their email address below with an optional message, and we'll send them an email with a link encouraging them to show their support.

By clicking 'Send Email', you warrant that you have consent from the recipient for Twibbon to send them an email about this campaign.

Sending your email. This should only take a few seconds...

Download the twibbon, select source.

Use the options above to select the image you would like to add the Twibbon to.

Current profile picture

Upload from your computer.

Show your support anywhere on the web by downloading the Twibbon added to your profile picture and uploading it to other social networks.

When you click 'Add Twibbon and Download' we will add the Twibbon to your selected image before providing you with a link to download the resulting photo for use on other social networks.

Adding your Twibbon

This should only take a few seconds...

Oops, something went wrong!

Please close this window, re-login and try again.

Campaign Details

By gmanews awhile ago.

Power puts a great responsibility on the shoulders of those who wield it. From this thesis statement was born “Think Before You Click” - a campaign... more →

Think Before You Click Campaign Description

Share this campaign, recent activity, you can login to twibbon using facebook or twitter.

  • Share full article

For more audio journalism and storytelling, download New York Times Audio , a new iOS app available for news subscribers.

The Evolving Danger of the New Bird Flu

An unusual outbreak of the disease has spread to dairy herds in multiple u.s. states..

This transcript was created using speech recognition software. While it has been reviewed by human transcribers, it may contain errors. Please review the episode audio before quoting from this transcript and email [email protected] with any questions.

From “The New York Times,” I’m Sabrina Tavernise, and this is “The Daily.”

[MUSIC PLAYING]

The outbreak of bird flu that is tearing through the nation’s poultry farms is the worst in US history. But scientists say it’s now starting to spread into places and species it’s never been before.

Today, my colleague, Emily Anthes, explains.

It’s Monday, April 22.

Emily, welcome back to the show.

Thanks for having me. Happy to be here.

So, Emily, we’ve been talking here on “The Daily” about prices of things and how they’ve gotten so high, mostly in the context of inflation episodes. And one of the items that keeps coming up is eggs. Egg prices were through the roof last year, and we learned it was related to this. Avian flu has been surging in the United States. You’ve been covering this. Tell us what’s happening.

Yes, so I have been covering this virus for the last few years. And the bird flu is absolutely tearing through poultry flocks, and that is affecting egg prices. That’s a concern for everyone, for me and for my family. But when it comes to scientists, egg prices are pretty low on their list of concerns. Because they see this bird flu virus behaving differently than previous versions have. And they’re getting nervous, in particular, about the fact that this virus is reaching places and species where it’s never been before.

OK, so bird flu, though, isn’t new. I mean I remember hearing about cases in Asia in the ‘90s. Remind us how it began.

Bird flu refers to a bunch of different viruses that are adapted to spread best in birds. Wild water birds, in particular, are known for carrying these viruses. And flu viruses are famous for also being shapeshifters. So they’re constantly swapping genes around and evolving into new strains. And as you mentioned back in the ‘90s, a new version of bird flu, a virus known as H5N1, emerged in Asia. And it has been spreading on and off around the world since then, causing periodic outbreaks.

And how are these outbreaks caused?

So wild birds are the reservoir for the virus, which means they carry it in their bodies with them around the world as they fly and travel and migrate. And most of the time, these wild birds, like ducks and geese, don’t even get very sick from this virus. But they shed it. So as they’re traveling over a poultry farm maybe, if they happen to go to the bathroom in a pond that the chickens on the farm are using or eat some of the feed that chickens on the farm are eating, they can leave the virus behind.

And the virus can get into chickens. In some cases, it causes mild illness. It’s what’s known as low pathogenic avian influenza. But sometimes the virus mutates and evolves, and it can become extremely contagious and extremely fatal in poultry.

OK, so the virus comes through wild birds, but gets into farms like this, as you’re describing. How have farms traditionally handled outbreaks, when they do happen?

Well, because this threat isn’t new, there is a pretty well-established playbook for containing outbreaks. It’s sometimes known as stamping out. And brutally, what it means is killing the birds. So the virus is so deadly in this highly pathogenic form that it’s sort of destined to kill all the birds on a farm anyway once it gets in. So the response has traditionally been to proactively depopulate or cull all the birds, so it doesn’t have a chance to spread.

So that’s pretty costly for farmers.

It is. Although the US has a program where it will reimburse farmers for their losses. And the way these reimbursements work is they will reimburse farmers only for the birds that are proactively culled, and not for those who die naturally from the virus. And the thinking behind that is it’s a way to incentivize farmers to report outbreaks early.

So, OK, lots of chickens are killed in a way to manage these outbreaks. So we know how to deal with them. But what about now? Tell me about this new strain.

So this new version of the virus, it emerged in 2020.

After the deadly outbreak of the novel coronavirus, authorities have now confirmed an outbreak of the H5N1 strain of influenza, a kind of bird flu.

And pretty quickly it became clear that a couple things set it apart.

A bald eagle found dead at Carvins Cove has tested positive for the highly contagious bird flu.

This virus, for whatever reason, seemed very good at infecting all sorts of wild birds that we don’t normally associate with bird flu.

[BIRD CRYING]

He was kind of stepping, and then falling over, and using its wing to right itself.

Things like eagles and condors and pelicans.

We just lost a parliament of owls in Minneapolis.

Yeah, a couple of high profile nests.

And also in the past, wild birds have not traditionally gotten very sick from this virus. And this version of the virus not only spread widely through the wild bird population, but it proved to be devastating.

The washing up along the East Coast of the country from Scotland down to Suffolk.

We were hearing about mass die-offs of seabirds in Europe by the hundreds and the thousands.

And the bodies of the dead dot the island wherever you look.

Wow. OK. So then as we know, this strain, like previous ones, makes its way from wild animals to farmed animals, namely to chickens. But it’s even more deadly.

Absolutely. And in fact, it has already caused the worst bird flu outbreak in US history. So more than 90 million birds in the US have died as a result of this virus.

90 million birds.

Yes, and I should be clear that represents two things. So some of those birds are birds who naturally got infected and died from the virus. But the vast majority of them are birds that were proactively culled. What it adds up to is, is 90 million farmed birds in the US have died since this virus emerged. And it’s not just a chicken problem. Another thing that has been weird about this virus is it has jumped into other kinds of farms. It is the first time we’ve seen a bird flu virus jump into US livestock.

And it’s now been reported on a number of dairy farms across eight US states. And that’s just something that’s totally unprecedented.

So it’s showing up at Dairy farms now. You’re saying that bird flu has now spread to cows. How did that happen?

So we don’t know exactly how cows were first infected, but most scientists’ best guess is that maybe an infected wild bird that was migrating shed the virus into some cattle feed or a pasture or a pond, and cattle picked it up. The good news is they don’t seem to get nearly as sick as chickens do. They are generally making full recoveries on their own in a couple of weeks.

OK, so no mass culling of cows?

No, that doesn’t seem to be necessary at this point. But the bad news is that it’s starting to look like we’re seeing this virus spread from cow to cow. We don’t know exactly how that’s happening yet. But anytime you see cow-to-cow or mammal-to-mammal transmission, that’s a big concern.

And why is that exactly?

Well, there are a bunch of reasons. First, it could allow the outbreak to get much bigger, much faster, which might increase the risk to the food supply. And we might also expect it to increase the risk to farm workers, people who might be in contact with these sick cows.

Right now, the likelihood that a farmer who gets this virus passes it on is pretty low. But any time you see mammal-to-mammal transmission, it increases the chance that the virus will adapt and possibly, maybe one day get good at spreading between humans. To be clear, that’s not something that there’s any evidence happening in cows right now. But the fact that there’s any cow-to-cow transmission happening at all is enough to have scientists a bit concerned.

And then if we think more expansively beyond what’s happening on farms, there’s another big danger lurking out there. And that’s what happens when this virus gets into wild animals, vast populations that we can’t control.

We’ll be right back.

So, Emily, you said that another threat was the threat of flu in wild animal populations. Clearly, of course, it’s already in wild birds. Where else has it gone?

Well, the reason it’s become such a threat is because of how widespread it’s become in wild birds. So they keep reintroducing it to wild animal populations pretty much anywhere they go. So we’ve seen the virus repeatedly pop up in all sorts of animals that you might figure would eat a wild bird, so foxes, bobcats, bears. We actually saw it in a polar bear, raccoons. So a lot of carnivores and scavengers.

The thinking is that these animals might stumble across a sick or dead bird, eat it, and contract the virus that way. But we’re also seeing it show up in some more surprising places, too. We’ve seen the virus in a bottle-nosed dolphin, of all places.

And most devastatingly, we’ve seen enormous outbreaks in other sorts of marine mammals, especially sea lions and seals.

So elephant seals, in particular in South America, were just devastated by this virus last fall. My colleague Apoorva Mandavilli and I were talking to some scientists in South America who described to us what they called a scene from hell, of walking out onto a beach in Argentina that is normally crowded with chaotic, living, breathing, breeding, elephant seals — and the beach just being covered by carcass, after carcass, after carcass.

Mostly carcasses of young newborn pups. The virus seemed to have a mortality rate of 95 percent in these elephant seal pups, and they estimated that it might have killed more than 17,000 of the pups that were born last year. So almost the entire new generation of this colony. These are scientists that have studied these seals for decades. And they said they’ve never seen anything like it before.

And why is it so far reaching, Emily? I mean, what explains these mass die-offs?

There are probably a few explanations. One is just how much virus is out there in the environment being shed by wild birds into water and onto beaches. These are also places that viruses like this haven’t been before. So it’s reaching elephant seals and sea lions in South America that have no prior immunity.

There’s also the fact that these particular species, these sea lions and seals, tend to breed in these huge colonies all crowded together on beaches. And so what that means is if a virus makes its way into the colony, it’s very conducive conditions for it to spread. And scientists think that that’s actually what’s happening now. That it’s not just that all these seals are picking up the virus from individual birds, but that they’re actually passing it to each other.

So basically, this virus is spreading to places it’s never been before, kind of virgin snow territory, where animals just don’t have the immunity against it. And once it gets into a population packed on a beach, say, of elephant seals, it’s just like a knife through butter.

Absolutely. And an even more extreme example of that is what we’re starting to see happen in Antarctica, where there’s never been a bird flu outbreak before until last fall, for the first time, this virus reached the Antarctic mainland. And we are now seeing the virus move through colonies of not only seabirds and seals, but penguin colonies, which have not been exposed to these viruses before.

And it’s too soon to say what the toll will be. But penguins also, of course, are known for breeding in these large colonies.

Probably. don’t have many immune defenses against this virus, and of course, are facing all these other environmental threats. And so there’s a lot of fear that you add on the stress of a bird flu virus, and it could just be a tipping point for penguins.

Emily, at this point, I’m kind of wondering why more people aren’t talking about this. I mean, I didn’t know any of this before having this conversation with you, and it feels pretty worrying.

Well, a lot of experts and scientists are talking about this with rising alarm and in terms that are quite stark. They’re talking about the virus spreading through wild animal populations so quickly and so ferociously that they’re calling it an ecological disaster.

But that’s a disaster that sometimes seems distant from us, both geographically, we’re talking about things that are happening maybe at the tip of Argentina or in Antarctica. And also from our concerns of our everyday lives, what’s happening in Penguins might not seem like it has a lot to do with the price of a carton of eggs at the grocery store. But I think that we should be paying a lot of attention to how this virus is moving through animal populations, how quickly it’s moving through animal populations, and the opportunities that it is giving the virus to evolve into something that poses a much bigger threat to human health.

So the way it’s spreading in wild animals, even in remote places like Antarctica, that’s important to watch, at least in part because there’s a real danger to people here.

So we know that the virus can infect humans, and that generally it’s not very good at spreading between humans. But the concern all along has been that if this virus has more opportunities to spread between mammals, it will get better at spreading between them. And that seems to be what is happening in seals and sea lions. Scientists are already seeing evidence that the virus is adapting as it passes from marine mammal to marine mammal. And that could turn it into a virus that’s also better at spreading between people.

And if somebody walks out onto a beach and touches a dead sea lion, if their dog starts playing with a sea lion carcass, you could imagine that this virus could make its way out of marine mammals and into the human population. And if it’s this mammalian adapted version of the virus that makes its way out, that could be a bigger threat to human health.

So the sheer number of hosts that this disease has, the more opportunity it has to mutate, and the more chance it has to mutate in a way that would actually be dangerous for people.

Yes, and in particular, the more mammalian hosts. So that gives the virus many more opportunities to become a specialist in mammals instead of a specialist in birds, which is what it is right now.

Right. I like that, a specialist in mammals. So what can we do to contain this virus?

Well, scientists are exploring new options. There’s been a lot of discussion about whether we should start vaccinating chickens in the US. The government, USDA labs, have been testing some poultry vaccines. It’s probably scientifically feasible. There are challenges there, both in terms of logistics — just how would you go about vaccinating billions of chickens every year. There are also trade questions. Traditionally, a lot of countries have not been willing to accept poultry products from countries that vaccinate their poultry.

And there’s concern about whether the virus might spread undetected in flocks that are vaccinated. So as we saw with COVID, the vaccine can sometimes stop you from getting sick, but it doesn’t necessarily stop infection. And so countries are worried they might unknowingly import products that are harboring the virus.

And what about among wild animals? I mean, how do you even begin to get your head around that?

Yeah, I mean, thinking about vaccinating wild animals maybe makes vaccinating all the chickens in the US look easy. There has been some discussion of limited vaccination campaigns, but that’s not feasible on a global scale. So unfortunately, the bottom line is there isn’t a good way to stop spread in wild animals. We can try to protect some vulnerable populations, but we’re not going to stop the circulation of this virus.

So, Emily, we started this conversation with a kind of curiosity that “The Daily” had about the price of eggs. And then you explained the bird flu to us. And then somehow we ended up learning about an ecological disaster that’s unfolding all around us, and potentially the source of the next human pandemic. That is pretty scary.

It is scary, and it’s easy to get overwhelmed by it. And I feel like I should take a step back and say none of this is inevitable. None of this is necessarily happening tomorrow. But this is why scientists are concerned and why they think it’s really important to keep a very close eye on what’s happening both on farms and off farms, as this virus spreads through all sorts of animal populations.

One thing that comes up again and again and again in my interviews with people who have been studying bird flu for decades, is how this virus never stops surprising them. And sometimes those are bad surprises, like these elephant seal die-offs, the incursions into dairy cattle. But there are some encouraging signs that have emerged recently. We’re starting to see some early evidence that some of the bird populations that survived early brushes with this virus might be developing some immunity. So that’s something that maybe could help slow the spread of this virus in animal populations.

We just don’t entirely know how this is going to play out. Flu is a very difficult, wily foe. And so that’s one reason scientists are trying to keep such a close, attentive eye on what’s happening.

Emily, thank you.

Thanks for having me.

Here’s what else you should know today.

On this vote, the yeas are 366 and the nays are 58. The bill is passed.

On Saturday, in four back-to-back votes, the House voted resoundingly to approve a long-stalled package of aid to Ukraine, Israel and other American allies, delivering a major victory to President Biden, who made aid to Ukraine one of his top priorities.

On this vote, the yeas are 385, and the no’s are 34 with one answering present. The bill is passed without objection.

The House passed the component parts of the $95 billion package, which included a bill that could result in a nationwide ban of TikTok.

On this vote, the yeas are 311 and the nays are 112. The bill is passed.

Oh, one voting present. I missed it, but thank you.

In a remarkable breach of custom, Democrats stepped in to supply the crucial votes to push the legislation past hard-line Republican opposition and bring it to the floor.

The House will be in order.

The Senate is expected to pass the legislation as early as Tuesday.

Today’s episode was produced by Rikki Novetsky, Nina Feldman, Eric Krupke, and Alex Stern. It was edited by Lisa Chow and Patricia Willens; contains original music by Marion Lozano, Dan Powell, Rowan Niemisto, and Sophia Lanman; and was engineered by Chris Wood. Our theme music is by Jim Brunberg and Ben Landsverk of Wonderly. Special thanks to Andrew Jacobs.

That’s it for “The Daily.” I’m Sabrina Tavernise. See you tomorrow.

The Daily logo

  • April 24, 2024   •   32:18 Is $60 Billion Enough to Save Ukraine?
  • April 23, 2024   •   30:30 A Salacious Conspiracy or Just 34 Pieces of Paper?
  • April 22, 2024   •   24:30 The Evolving Danger of the New Bird Flu
  • April 19, 2024   •   30:42 The Supreme Court Takes Up Homelessness
  • April 18, 2024   •   30:07 The Opening Days of Trump’s First Criminal Trial
  • April 17, 2024   •   24:52 Are ‘Forever Chemicals’ a Forever Problem?
  • April 16, 2024   •   29:29 A.I.’s Original Sin
  • April 15, 2024   •   24:07 Iran’s Unprecedented Attack on Israel
  • April 14, 2024   •   46:17 The Sunday Read: ‘What I Saw Working at The National Enquirer During Donald Trump’s Rise’
  • April 12, 2024   •   34:23 How One Family Lost $900,000 in a Timeshare Scam
  • April 11, 2024   •   28:39 The Staggering Success of Trump’s Trial Delay Tactics
  • April 10, 2024   •   22:49 Trump’s Abortion Dilemma

Hosted by Sabrina Tavernise

Produced by Rikki Novetsky ,  Nina Feldman ,  Eric Krupke and Alex Stern

Edited by Lisa Chow and Patricia Willens

Original music by Marion Lozano ,  Dan Powell ,  Rowan Niemisto and Sophia Lanman

Engineered by Chris Wood

Listen and follow The Daily Apple Podcasts | Spotify | Amazon Music

The outbreak of bird flu currently tearing through the nation’s poultry is the worst in U.S. history. Scientists say it is now spreading beyond farms into places and species it has never been before.

Emily Anthes, a science reporter for The Times, explains.

On today’s episode

think before you click campaign essay

Emily Anthes , a science reporter for The New York Times.

Two dead pelicans are pictured from above lying on the shore where the water meets a rocky beach.

Background reading

Scientists have faulted the federal response to bird flu outbreaks on dairy farms .

Here’s what to know about the outbreak.

There are a lot of ways to listen to The Daily. Here’s how.

We aim to make transcripts available the next workday after an episode’s publication. You can find them at the top of the page.

Special thanks to Andrew Jacobs .

The Daily is made by Rachel Quester, Lynsea Garrison, Clare Toeniskoetter, Paige Cowett, Michael Simon Johnson, Brad Fisher, Chris Wood, Jessica Cheung, Stella Tan, Alexandra Leigh Young, Lisa Chow, Eric Krupke, Marc Georges, Luke Vander Ploeg, M.J. Davis Lin, Dan Powell, Sydney Harper, Mike Benoist, Liz O. Baylen, Asthaa Chaturvedi, Rachelle Bonja, Diana Nguyen, Marion Lozano, Corey Schreppel, Rob Szypko, Elisheba Ittoop, Mooj Zadie, Patricia Willens, Rowan Niemisto, Jody Becker, Rikki Novetsky, John Ketchum, Nina Feldman, Will Reid, Carlos Prieto, Ben Calhoun, Susan Lee, Lexie Diao, Mary Wilson, Alex Stern, Dan Farrell, Sophia Lanman, Shannon Lin, Diane Wong, Devon Taylor, Alyssa Moxley, Summer Thomad, Olivia Natt, Daniel Ramirez and Brendan Klinkenberg.

Our theme music is by Jim Brunberg and Ben Landsverk of Wonderly. Special thanks to Sam Dolnick, Paula Szuchman, Lisa Tobin, Larissa Anderson, Julia Simon, Sofia Milan, Mahima Chablani, Elizabeth Davis-Moorer, Jeffrey Miranda, Renan Borelli, Maddy Masiello, Isabella Anderson and Nina Lassam.

Advertisement

IMAGES

  1. Think Before You Click

    think before you click campaign essay

  2. Think Before You Click Essay

    think before you click campaign essay

  3. Think Before You Click! Poster

    think before you click campaign essay

  4. N+ Quick Tip: Think Before You Click

    think before you click campaign essay

  5. Think Before You Click !

    think before you click campaign essay

  6. make a poster with a theme think before you click

    think before you click campaign essay

COMMENTS

  1. Think Before You Click Essay

    Think before you click. It's easy to say but hard to do. There are already internet safety campaigns, and this is one of those they advocate. This message is an awareness for us to be careful in what we publish, say, or post on the internet. The internet never forgets what has been post there are different ways to save and spread this post.

  2. Think Before You Click: Internet Safety Tips for Parents

    Tell the parents. Say nothing and continue to "play," but at a distance. Ask to call home and be picked up right away (some parents choose to use a conversation code for when the child wants to be picked up, so it's not obvious that the child wants out). It's important for parents to rehearse these types of specific situations so that children ...

  3. PDF 'Think Before You Click. Post. Type.' Lessons learned from our

    "Think Before You Click. Post. Type." Lessons learned from our University Cyber Security Awareness Campaign Abstract This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across

  4. Think Before You Click (How social media affect our lives)

    Think Before You Click (How social media affect our lives) We live today in a world dominated by the internet or World Wide Web, as it is also popularly known. Almost everything can be found on the internet. For most people, not a day goes by without them using the internet for at least two hours a day: be it for work, or fun, or online ...

  5. #CyberMonth: How to Promote a 'Think Before U Click' Culture

    Teach Cynicism. Cynicism is not always the best trait to follow in life, but it is often crucial in cybersecurity. A fundamental attitude that should be imparted to employees is to be suspicious of certain types of emails and not rush to respond to them. This is recognized in this year's Cybersecurity Month theme of 'Think Before U Click.'.

  6. Think before you click!

    The concept of "think before you click" is actually one of the most important factors in terms of information security. When you receive an email, download a file (s) from the internet, or click on a link, think of the following: Is the email genuine, such as source address, spelling and context?

  7. European Cybersecurity Month 2020 'Think Before U Click ...

    The campaign first launched in 2012. 'Cybersecurity is a Shared Responsibility' - 'Think Before U Click' Join the campaign on Twitter @CyberSecMonth with hashtags #CyberSecMonth and #ThinkB4UClick, and on Facebook @CyberSecMonthEU. Further European Cybersecurity Month information can be found cybersecuritymonth.eu. Related material

  8. 'Think Before You Click' by GMA-7 Wins 1st Civility Star Award

    151. Think Before You Click, GMA 7's advocacy campaign to promote the responsible use of social media, was recently honored with the 2011 Civility Star Award by the Civility Counts Project, a global initiative of the Association of Image Consultants International (AICI). The Think Before You Click campaign reminds Filipinos to stop and think ...

  9. Pinoy netizens react to Think Before You Click campaign

    Pinoy netizens react to Think Before You Click campaign. Think Before You Click (TBYC), GMA 7's award-winning campaign for the responsible use of social media, gathers more support Monday after the documentary of the same title was aired on GMA News TV on Sunday. The documentary featuring Howie Severino, Kara David, Mark Salazar, Iza Calzado ...

  10. Think Before You Click

    The Think Before You Click campaign is designed to get you to do exactly that - slow down, consider what or who you're interacting with online and think about what you're about to do before you do it. It has been launched by many cyber security firms over the years, as well as being pioneered by organisations like the BBC to try and make ...

  11. Why We Need To Think Before We Click

    Thinking Before we click reminds us that internet safety is of the utmost importance. The saying is designed to protect teens from overexposing themselves online, especially on social media. After uploading a picture online, if it's public, then you've basically lost control over it. It could be downloaded, manipulated, and shared without ...

  12. 'Think before you click!' GMA urges responsible tweeting

    From this thesis statement was born “Think Before You Click" â€" a campaign by GMA News to promote responsible use of social media. You can be the change you want to see in the online world. Online everything is just a click away. And with one click, whether that be to post a tweet, a new status message on Facebook, or a tag on ...

  13. Back-to-Basics: Think Before You Click

    In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today's blog focuses on thinking before you click. Hackers use phishing and other social engineering methods to target organizations with legitimate-looking emails and social media messages.

  14. "Think Before You Click: An Analysis of Facebook as a Source of News

    Abstract. The purpose of this study is to analyze how millennial college students perceive and interpret the news-related content that is posted on the social networking website Facebook. The news that this study is focused on is related to major events in American politics, especially this past Presidential election.

  15. ThinkB4UClick

    Comic Strip. In this lesson students will be given an opportunity to devise guidelines for taking and sharing photos online and for better internet and technology use in general. Think B4U Click helps teachers highlight the importance of online privacy in the digital age to their students, The resource is now available in Irish.

  16. Pause And Ponder: The Power Of 'Think Before You Click' Essay

    Think Before You Click Essay The Importance of Critical Thinking in the Digital Age. In today's digital age, where information is just a click away, it is more important than ever to think before you click. The vast amount of information available online can be overwhelming, and not all of it is accurate or reliable. It is crucial to develop ...

  17. Think Before You Click

    Think Before You Click. communication technology Nov 18, 2022. The Internet has given us a lot of freedom regarding expression. We can instantly share our thoughts and ideas with the world, which sometimes is a good thing. But there are also times when we must be careful about what we say and do online because our words and actions can have ...

  18. think before you click essay.docx

    View think before you click essay.docx from LANGUAGE 101 at Mindanao State University - Iligan Institute of Technology. Social media is one of the easiest access to find information happening around ... That's why the message think before you click is a campaign to control people from posting their personal information, most importantly the ...

  19. "THINK BEFORE YOU CLICK" The responsible use of social media."

    Isolation. A study at the University of Pennsylvania found that high usage of Facebook, Snapchat, and Instagram increases rather decreases feelings of loneliness. Conversely, the study found that ...

  20. Heads Up: Stop. Think. Click.

    Before sharing sensitive information, make sure you're on a federal government site. The site is secure. The https:// ... Think. Click. When you're online, take a second to stop and think before you click. Categories. OnGuard Online. For Kids. Return to top. Menu Secondary Menu. Report Fraud; Get Consumer Alerts; Search the Legal Library;

  21. Responsible Use of Social Media: Think Twice Before You Click

    Conclusion. As we can see there are many risks when it comes to using social media, making it important to make socially responsible decisions. We should think twice before we click and take advantage of the good that comes with a platform like social media while also protecting ourselves from its potential harm.

  22. Think Before You Click

    Support Think Before You Click Campaign on Twibbon - Power puts a great responsibility on the shoulders of those who wield it. From this thesis statement was born "Think Before You Click" - a campaign by GMA News to promote responsible use of social media. Online everything is just a click away. And with one click, whether that be to post a tweet, a new status message on Facebook, or a tag ...

  23. The Evolving Danger of the New Bird Flu

    The Evolving Danger of the New Bird Flu. An unusual outbreak of the disease has spread to dairy herds in multiple U.S. states. April 22, 2024, 6:00 a.m. ET. Share full article. Hosted by Sabrina ...