TEENS AND ILLICIT POSTS IN TWEETER.

Introduction Advancement with on  technology and the freedom of information has created a very powerful tool that is very useful especially among the youth. The youths are the most active group using the social media. The increase on the use of social media has attracted a growing attention on the type of information shared over …

           

Cyberbullying: Definition, Forms, and Laws

Cyberbullying is defined as the use of electronic correspondence to menace an individual, ordinarily by sending messages of a scary, offending, or compromising nature. It also refers to the bullying that is occasioned through computerized gadgets like PDAs, PCs, and tablets. Electronic bullying can be done offline through sending scary or offending SMS, Text, and …

   2       

Violence in Schools: Solutions to Causes of School Violence

Violence in schools is becoming a major challenge for school administrators and policymakers. This has created a need to come with policies that address the problem by providing sustainable solutions that will not compromise learning but address the challenge efficiently. One significant step to resolving violence in school is understanding the causes of the problem …

           

Phone Call Encryption for Businesses

Phone call encryption: One of the ways to secure the phone calls through encryption is through the use of VoIP technology. This technology consists of two or more (for conference calls) IP phones and IP network that can be connected to traditional phone system. The technologies goal is to not allow person or people to …