IROC2_logo_2                                              

National Anti-Bullying Award Recipient

Exemplary School Safety Program Award
Exemplary School Safety Initiative Award

 

INSTITUTE FOR RESPONSIBLE ONLINE AND CELLPHONE COMMUNICATION

2.1C Terminology

2.1C: The Institute’s life saving precept of 21st century digital safety, responsibility and awareness (“2.1C”) practiced through the mindset that use and actions taken with any form of current or future digital technology is [globally] public & permanent.

Cyber Bullying: Cyber bullying is the use of e-mail, instant messaging, chat rooms, pagers, cell phones, or other formsof information digital technology to deliberately harass, threaten, or intimidate someone. The problem is compounded by the fact that a bully can hide behind an electronic veil, disguising his or her true identity. This makes it difficult to trace the source, and encourages bullies to behave more aggressively than they might face-to-face. Cyber bullying can include such acts as making threats, sending provocative insults or racial or ethnic slurs, gay bashing, attempting to infect the victim's computer with a virus, and flooding an e-mail inbox with nonsense messages.

Cyber Exploiter of Life (C.E.L):
A C.E.L is any individual(s) or organization(s) that "gains", "profits" or "benefits" personally or professionally from the exploitation of (digital) citizens through digital tools and technologies or cyber space.

Digital Details: The information discovered during an investigation into a crime or “occurrence” whereby the victim’s digital information and behavior(s) offers insight into the motive for the attack or incident to occur.

Digital Disease™: Digital Disease™ is a term trademarked by The Institute for Responsible Online and Cell-Phone Communication for any current or future malicious, harmful, or socially negative action or trend utilizing digital technologies. Examples of Digital Disease™ include, but are not limited to viruses, spyware, SPAM, cyber bullying, sexting and sextcasting™. The Institute for Responsible Online and Cell-Phone Communication provides today's digital generation with a way to proactively avoid Digital Disease™ through their acclaimed Live Events.

Digital Risk Spike:
An assessment tool to both; (i) illustrate your level of digital risk based on your digital behavior, as well as (ii) illustrate what behaviors you need to modify to minimize your digital risk.

Phishing: In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging,[1] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake.

SextCasting:
A term trademarked by I.R.O.C.2 as the process by which an individual(s) performs actions of a risqué or sexually explicit nature via a (live) webcam (or webcast), digital (image or video) camera, or other form of digital technology and sends and/or saves the content of their actions using digital technologies (i.e. a computer, camera card, email, social website, message board, etc).

Sexting: The act of poor judgment when using a cell-phone, smart phone, or PDA (digital technology) by sending an image, video or text message of an explicit (adult) or risqué nature to another individual.

Spyware: Spyware is a type of malware that is installed on computers and to collect information about users without their knowledge. The presence of spyware is typically hidden from the user as it is secretly installed on the user's computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.

Virus: A digital or computer virus is a program that can copy itself and infect a digital device. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

Ecommerce | Ecommerce Web Design | Ecommerce Website Design | Cookies