BIOS KÓSMOS CHURCH🏖️
  • Home
  • Welcome To Bios
    • Church Schedule
    • The Bios Social
    • Church Calender
    • Church Survey
  • Family Ministry
    • Youth Ministry >
      • Youth Ministry
      • Pre-Youth Department
      • Youth Department
    • Adult Ministry >
      • Young Adult Ministry
      • Seniors Ministry
    • ​Animal Education Unit
    • Looking for A pet?
  • Beliefs
    • Doctrine
    • Fundamental Principles
    • God's Rights for us
  • Sermons
    • 2019 Sermon Archive
    • 2018 Sermon Archive
  • Member Services
    • Employment Application
    • Prayer Request Form
    • Parental Consent Form
    • Resume Upload
    • Request For Spiritual Counselling
    • Marriage Certificate Application
    • COVID-19 Questionnaire
    • Background Check Policy
  • Ecclesiastical Services
    • ​Cyberbullying Prevention >
      • Cyberbullying Reporting Form G65
    • Bios Kosmos Church News
    • Bios Kosmos Church Nazarene Guard
    • ADVANCED COMPLAINT FORM
  • Administration Ministry
    • Employee / Staff Log-In
    • Tithes & Offering
  • Department Of Education
    • E34 Call To Discipleship Covenant
  • Bios Kósmos Church YouTube Center
    • Department Of Unlink And Private Resources
  • Contact
  • Frequently Asked Questions
  • Take MARTA to Bios Kosmos Church!
  • Are you NEW?

Bios Kosmos Church Nazarene Guard

 Warden: -

Thank you for choosing 
The Nazarene Guard
​for all of your security needs.


Psalm 82:4 Rescue the weak and the needy; deliver them from the hand of the wicked.

Hours

This department does not rotate in shifts 

Church-Wide Hours

Administration Hours

Sunday: 5:00 Am - 3:00 Pm
​Monday: 5:00 Am - 9:00 Pm
Tuesday: 5:00 Am - 9:00 Pm
Wednesday: 5:00 Am - 9:00 Pm
Thursday: 5:00 Am - 9:00 Pm
Friday: 5:00 Am - 9:00 Pm
Saturday: 5:00 Am - 9:00 Pm​
Sunday: 8:00 Am - 3:00 Pm
​Monday: 9:00 Am - 9:00 Pm
Tuesday: 9:00 Am - 9:00 Pm
Wednesday: 9:00 Am - 9:00 Pm
Thursday: 9:00 Am - 9:00 Pm
Friday: 9:00 Am - 9:00 Pm
Saturday: 9:00 Am - 9:00 Pm​

Why?

we have three reasons that we formed
Picture

The First

A safe environment
Picture

The Second

A educational environment
Picture

The Third

A God-Fearing enviornment
Are you or someone you know being sold for sex or made/forced to work for little or no pay and cannot leave?
Call the National Human Trafficking Resource Center at 1-888-373-7888  for help.

​All victims of slavery and human trafficking have rights and are protected by international, federal, and state law.

The hotline is:
(1) Anonymous and confidential;
(2) Available 24 hours a day, seven days a week;
(3) Able to provide help, referral to services, training, and general information;
(4) Accessible in 170 languages;
(5) Operated by a nonprofit, nongovernmental organization; and
(6) Toll free. 
​¿Usted o alguien que usted conoce son víctimas de tráfico de personas a cambio de sexo o son obligados a trabajar a cambio de un salario irrisorio o sin salario y no pueden escapar?
Llame al Centro Nacional de Recursos para el Tráfico de Personas (National Human Trafficking Resource Center) para solicitar ayuda.

Todas las víctimas de tráfico de personas y esclavitud tienen derechos y están protegidas por leyes internacionales, federales y estatales.

La línea de asistencia telefónica:
(1) Es anónima y confidencial;
(2) Está disponible las 24 horas del día, los 7 días de la semana;
(3) Puede ofrecer asistencia, recomendación de servicios, capacitación e información general;
(4) Es accesible en 170 idiomas;
(5) Es operada por una organización no gubernamental, sin fines de lucro; y
(6) Es un número de llamada gratuita.
هل أنت أو أي شخص تعرفه يباع لممارسة الجنس أو قام / أجبر على العمل مقابل أجر قليل أو بدون أجر ولا يمكنه المغادرة؟
اتصل بمركز الموارد الوطنية لمكافحة الاتجار بالبشر على الرقم 1-888-373-7888 للحصول على المساعدة.

يتمتع جميع ضحايا العبودية والاتجار بالبشر بحقوقهم ويحميهم القانون الدولي والاتحادي والدولي.

الخط الساخن هو:
(1) مجهول وسرية ؛
(2) متوفر 24 ساعة في اليوم ، سبعة أيام في الأسبوع.
(3) قادرة على تقديم المساعدة والإحالة إلى الخدمات والتدريب والمعلومات العامة ؛
(4) يمكن الوصول إليها في 170 لغة.
(5) تعمل من قبل منظمة غير ربحية وغير حكومية ؛ و
(6) الرقم المجاني.

FOR PARENTS

STARTERS


When it comes to embracing new technology, kids have rapidly outpaced their parents and teachers. By their early school years, many children are already more comfortable on the Internet than their parents. But just because children are smart enough to know how to navigate the Internet, doesn’t mean they have the experience to make good decisions about some of the possibilities they may face online. With the tremendous popularity of social networking sites like MySpace and Facebook, cell phones, text messaging and file sharing, more than ever before, parents don’t know who their kids are talking to. And at times, our kids may not know either.

​CYBERBULLYING

There are many definitions of cyberbullying.  Quite simply, cyberbullying is “Willful and repeated harm inflicted through the use of computers, cell phones and other electronic devices.” Willful: the actions are deliberate, not accidental Repeated: there is a pattern of behavior, not just one isolated incident Harm: the target feels hurt or humiliated Computer, cell phones and other electronic devices: this is what makes it cyberbullying and not bullying†† Cyberbully:  An individual or group that uses information and communication involving electronic technologies to deliberately and repeatedly harass or threaten another individual or group. In cyberspace, bullies can easily (and sometimes anonymously) say and do mean and inappropriate things with just the click of a button. Cyberbullies don’t have to be more physically or socially powerful than their victims. They may use fictitious names to create online social networking and email accounts, which they then use to cyberbully others. For example, in 2006, a 16-year-old boy connected with a 13-year-old-girl via MySpace.com. Over time, the online relationship became flirtatious until the boy turned mean, calling the girl names and suggesting the world would be better off without her. The young girl was deeply hurt and ultimately hanged herself in her bedroom closet. It turned out that the “boy” was, in reality, a virtual identity created by a 47-year-old woman in the neighborhood, who allegedly wanted to find out how the young girl felt about her daughter. How Common is Cyberbullying? Cyberbullying is one of the most common and hurtful ways young people (and some adults) misuse the Internet. They use technology to bully through personal web pages; social networking sites such as MySpace, FaceBook or Flickr; YouTube; cell phone, text, picture and video messages; email and IMing; and blogs and forums. Cyberbullying is widespread. A 2008 study of 1,454 students aged 12 to 17 found that nearly three quarters of students reported being bullied online in the past 12 months (72%) and that they knew the perpetrators (73%).  In the past 12 months: 41% of the students reported being cyberbullied between 1 and 3 times 13% reported 4 to 6 incidents 19% reported 7 or more incidents(Juvonen and Gross, Extending the school grounds?—Bullying experiences in cyberspace, 2008) However, only 1 in 10 students reported it to an adult. Insults were the No. 1 reported problems, and password theft was the second highest ranking issue. This involves someone stealing a password, logging onto an account and sending or uploading content that makes the account owner look bad. The study also found that: 75% of the respondents were female. Girls were far more likely to use blogs, Instant Messaging (IM), email and cell phones than boys. Most often, cyberbullying was done through IM. Students who frequently used webcams were the most likely to be repeatedly bullied. Types of Cyberbullying (From the Center for Safe and Responsible Internet Use, Cyber-Safe Kids, Cyber-Savvy Teens, Cyber-Secure Schools (PDF) unless otherwise indicated.) Cyber Stalking: Repeatedly sending messages that are threatening or intimidating. Engaging in other online activities that make the victim afraid for his or her safety. Cyber Threats: The use of a computer, cell phone or other electronic device to threaten a person’s physical safety and well-being (Hinduja & Patchin 2009). Defamation: “Dissing” someone online. Sending or posting cruel gossip or rumors about a person to damage his or her reputation or friendships. Exclusion: Intentionally excluding someone from an online group, like a buddy list. Flaming or Trolling: Online fighting using electronic messages with angry and crude language. Happy Slapping: A phenomenon that links traditional bullying with cyberbullying where an unsuspected person is recorded being harassed or bullied in a way that usually includes some type of physical abuse.  The digital photo or video is uploaded to the web (Hinduja & Patchin 2009). Harassment: Repeatedly sending offensive, rude and insulting messages. Impersonation: Pretending to be someone else and sending or posting material online that makes the victim look bad, gets the victim in trouble or danger, or damages the victim’s reputation or friendships. Outing and Trickery: Sharing someone’s secret or embarrassing information online. Tricking someone into revealing secrets or embarrassing information that is then shared online. Photoshopping: The modification or alteration of a photo or image.  This becomes cyberbullying if the image is altered in a humiliating or obscene way and uploaded to the Web (Hinduja & Patchin 2009). Signs of Cyberbullying A young person who is being bullied via the Internet or a cell phone may: Be frustrated or angry after computer or cell phone use Avoid discussions about computer or cell phone use Become anxious over instant messages or emails Have sudden changes in mood or disposition Stop using a computer “… Cyberbullying starts in second grade these days, as soon as they’re interactive, which is becoming younger and younger with sites like Webkinz and Club Penguin and kids using text messaging on cell phones and AIM at much earlier ages. It starts at six or seven these days.” —Parry Aftab, Executive director, WiredSafety.org quoted on PBS FRONTLINE The cyberbully may: Avoid discussions about computer use Become agitated when unable to use the computer Use the computer excessively Use multiple accounts that may not be his or her own Close programs down or not allow anyone else to view the screen What to Do For information on how to prevent cyberbullying, see the Teens and Tweens section on What to do if your child is being cyberbullied. National and state freedom of speech laws include and protect Internet speech, even if that speech is critical, annoying, offensive or demeaning, so long as it does not include a direct threat or incite violence. However, if your child is the victim of cyberbullying, help your child follow these guidelines: Keep their parents or another trusted adult informed of the bullying. Speak with their teacher, principal or SRO if it is school related. Remember that cyberbullying is not about them; it’s about bullies who: Want to feel powerful Seek attention Probably have been bullied themselves.  Here are tips to keep in mind: Don’t open or read messages by cyberbullies. Don’t react to the bully – ignore him/her. Walk away from the computer. If ignoring the bully doesn’t work: Again, keep parents or another trusted adult informed of the bullying. Speak with their teacher, principal or SRO if it is school related. Don’t meet with the bully. Block the bully. Don’t erase messages or images from the bully.  Save them to a folder as evidence in case the bullying escalates and law enforcement gets involved. Contact the Internet Service Provider (ISP) to report the harassment. Inform the police if the child is threatened with harm. As a parent, get involved. Establish Internet Responsibility Guidelines in your home. Determine, with your children, what it means to be responsible and respectful when using technology. Ask your children to show you how they use technology and to teach you about the technological tools they use. Reach an agreement with your children about Internet rules. Consider a Family Internet Use Contract (PDF). For statistics and more information on how to prevent and respond to cyberbullying, refer to the following links: Comparitech – Global Cyberbullying Statistics Center for Safe and Responsible Internet Use Cyberbullying Resources i-SAFE NetSmartz – Parents & Guardians The Bullying Awareness Guidebook

INTERNET PREDATORS


a person commits the offense of child sexual abuse if the person “knowingly, by any means of communication, including electronic communication, persuades, entices, counsels, or procures a child under 16 years of age or a person the offender believes to be a child under 16 years of age to engage in sexual conduct, actual or simulated.” Online Stranger Contact According to researchers of the Pew Internet & American Life Project (2007), the number of teens who have felt uncomfortable as a result of an online stranger contact is relatively small; however, whether teens intend to initiate contact with a stranger or not, certain online activities are more likely to bring about that contact. Teens who maintain profiles on social networking sites and who post photos of themselves online are likely to experience stranger contacts regardless of the information they share (e.g., first or last name, school name or email address) or whether they set their profiles to private or not. Girls are more likely to be contacted by strangers than boys. 39% of girls and 24% of boys between the ages of 12 and 17 have been contacted online by someone with no connection to them or their friends 11% of girls and 4% of boys were contacted by a stranger who made them feel scared or uncomfortable Contrary to popular thought, teens using social networking sites report fewer scary or uncomfortable contacts (21%) than teens who do not have an online profile (28%). However, nearly half (45%) of social networking teens report using the sites to make new friends – to connect with people they do not know.  It is possible that teens who are familiar with social networking sites may accept unwanted contacts as a relatively minor, inevitable annoyance and therefore not report them. The greater concern is that some teens portray themselves on social networking sites or in chatrooms as interested in risky behaviors and interacting with people they do not know. According to a recent study, youth are five times more likely to report sexual solicitation or harassment if they engage in three of the following risky behaviors: interacting online with unknown people having unknown people on a buddy list talking online to unknown people about sex seeking pornography online being rude or nasty online Youth who engaged in four of the risky behaviors were 11 times more likely to report sexual solicitation or harassment. The study found more reason to be concerned about the consensual relationships that are initiated online than the extremely rare Internet-facilitated sexual assault. It suggested that parents need to provide: “…developmentally appropriate prevention strategies that target youths directly and acknowledge normal adolescent interests in romance and sex…. These should provide younger adolescents with awareness and avoidance skills while educating older youths about the pitfalls of sexual relationships with adults and their criminal nature.”
Janis Wolak, et al. “Online “Predators” and their Victims: Myths, Realities and Implications for Prevention and Treatment” (PDF) 2008 Typical Steps in Online Grooming Internet predators seek out others online to harm them. Most Internet predators do what is called “grooming.” Many Internet predators are adults who have experience building the trust they need in their victims. They are very manipulative and can appear as extremely sincere, providing information and pictures that seem legitimate but are often false and portray a completely different person. Grooming begins when a predator finds a target online, usually by accessing personal information gathered from a variety of searches. They find out as much as they can, eventually developing a “profile” of their targets. Predators typically make contact with their targets by initiating online conversations in chat rooms or social networking sites. They usually try to appear as though they have things in common with their target. Over time, the communication moves from public sites to more private conversations, like instant messaging (IM) and email. Sexually explicit photos are often introduced to desensitize the person being groomed, thus allowing the target to become gradually comfortable with the images over time. The predator gains the victim’s trust and friendship, while pulling the victim away from family and friends. The most dangerous predators aim to meet their victims in person. [blockquote]If you feel your child is in danger, do not ignore it. Contact local law enforcement and the CyberTipline online or at 1-800-843-5678 immediately.[/blockquote] If you feel your child is in danger, do not ignore it. Contact local law enforcement immediately. Information that could help law enforcement is often time-sensitive and, the sooner you call, the sooner they can investigate the problem. In addition, contact the National Center for Missing and Exploited Children’s CyberTipline online or at 1-800-843-5678. Save all of the email, text messages, documents, chat logs or whatever else you have that may be helpful in an investigation. It is important to let your child know that he or she is not in trouble. Open communication is extremely critical in this situation. Responding with punishment may discourage the child from reporting important details about the circumstances. Often, even making the computer off limits may be viewed as a form of punishment, in turn breaking down communication. If possible, work with the child whenever he or she is online, and notify a school counselor of the situation.

Identification ​


This ID badge looks different from the one you where at school work or even at bios.
Picture

We Would Love to Have You Visit Soon!

Hours

5AM to 11PM

Telephone

316-742-4203
TOLL FREE
678-595-1619
Services
Sunday @ 11:30 AM

Email

bioskosmoschurch@gmail.com
bios@kosmoschurch.org

Bios Kosmos Church heaven bound

Church with love
  • Home
  • Welcome To Bios
    • Church Schedule
    • The Bios Social
    • Church Calender
    • Church Survey
  • Family Ministry
    • Youth Ministry >
      • Youth Ministry
      • Pre-Youth Department
      • Youth Department
    • Adult Ministry >
      • Young Adult Ministry
      • Seniors Ministry
    • ​Animal Education Unit
    • Looking for A pet?
  • Beliefs
    • Doctrine
    • Fundamental Principles
    • God's Rights for us
  • Sermons
    • 2019 Sermon Archive
    • 2018 Sermon Archive
  • Member Services
    • Employment Application
    • Prayer Request Form
    • Parental Consent Form
    • Resume Upload
    • Request For Spiritual Counselling
    • Marriage Certificate Application
    • COVID-19 Questionnaire
    • Background Check Policy
  • Ecclesiastical Services
    • ​Cyberbullying Prevention >
      • Cyberbullying Reporting Form G65
    • Bios Kosmos Church News
    • Bios Kosmos Church Nazarene Guard
    • ADVANCED COMPLAINT FORM
  • Administration Ministry
    • Employee / Staff Log-In
    • Tithes & Offering
  • Department Of Education
    • E34 Call To Discipleship Covenant
  • Bios Kósmos Church YouTube Center
    • Department Of Unlink And Private Resources
  • Contact
  • Frequently Asked Questions
  • Take MARTA to Bios Kosmos Church!
  • Are you NEW?