SlideShare une entreprise Scribd logo
1  sur  37
Invisible Predators: Hidden Dangers of the Internet Presented By: Malissa Martino PASSAGES, Inc.
Topics for Today Introduction Danger Areas The Online Predator Keeping Kids Safe  Your Questions
Introduction of the Problem
What’s Happening Online? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
To Catch A Predator… ,[object Object],[object Object],[object Object],[object Object]
www.pervertedjustice.com ,[object Object],[object Object],[object Object],[object Object]
How big is the problem? ,[object Object],[object Object],[object Object],[object Object]
Danger Areas
Where are children/teens in the most danger online? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What kind of information is posted intentionally? ► Name ► Address ► Phone Number ► Email Address ► School ► Favorite Activities ► Special Messages to Friends www.google.com www.whitepages.com www.phonedetective.com Dubois Area Senior High School Public school · Grades 9-12 · 1412 students 425 Orient Ave, Du Bois, PA 15801 (814) 371-8111 District: Dubois Area School District Dubois Area Middle School Public school · Grades 6-8 · 1052 students 404 Liberty Blvd, Du Bois, PA 15801 (814) 375-8770 District: Dubois Area School District                           
Too much information… ,[object Object],[object Object],[object Object]
Sex Offenders  and MySpace.com ,[object Object],[object Object],[object Object]
Attitudes ,[object Object],[object Object],[object Object],[object Object]
Who are the victims of Internet sex crimes? ,[object Object],[object Object],[object Object],Stats from University of New Hampshire National Study, October 2001-July 2002
Teens most vulnerable… ,[object Object],[object Object],[object Object],[object Object]
The Online Predator
How the online  predator works… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: Julie Posey www.julieposey.com
Victim Selection ,[object Object],[object Object]
Survey of  Family Dynamics ,[object Object]
Introduction to Secrecy ,[object Object],[object Object]
Introduction to Adult Materials/Pornography ,[object Object],[object Object],[object Object]
Offline Contact ,[object Object],[object Object],[object Object]
The Face-to-Face Meeting ,[object Object],[object Object]
The Online Predator ,[object Object],[object Object]
Offenders: Who are they? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Who is the  Online Predator?
Inaccurate Stereotype ,[object Object],[object Object],[object Object]
Inaccurate Stereotype ,[object Object],[object Object]
Inaccurate Stereotype ,[object Object],[object Object],[object Object]
Inaccurate Stereotype ,[object Object],[object Object],[object Object]
Keeping Kids Safe
BASIC Internet Safety Tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REALISTIC  Internet Safety Tips ,[object Object],[object Object],[object Object]
Reporting Online Solicitations ,[object Object],[object Object]
Check these sites out! ,[object Object],[object Object],[object Object],[object Object],[object Object]
As others see it…
Questions? For More Information: Malissa Martino PASSAGES, Inc. 1-800-793-3620 or 814-371-9677 [email_address]

Contenu connexe

Tendances

Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
D4S1 Investigation Strategy.pptx
D4S1 Investigation Strategy.pptxD4S1 Investigation Strategy.pptx
D4S1 Investigation Strategy.pptx30rustiegmailcom
 
police force ppt.pptx
police force ppt.pptxpolice force ppt.pptx
police force ppt.pptxPaul Senthil
 
Lying: NATURE,CAUSES,PREVENTION AND SYMPTOMS
Lying: NATURE,CAUSES,PREVENTION AND SYMPTOMSLying: NATURE,CAUSES,PREVENTION AND SYMPTOMS
Lying: NATURE,CAUSES,PREVENTION AND SYMPTOMSandrianna victoria
 
виды таможенных процедур
виды таможенных процедурвиды таможенных процедур
виды таможенных процедурAMyakota
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacymrzapper
 
Juvenile Justice in Different Countries Age of Criminal responsibility and Tr...
Juvenile Justice in Different Countries Age of Criminal responsibility and Tr...Juvenile Justice in Different Countries Age of Criminal responsibility and Tr...
Juvenile Justice in Different Countries Age of Criminal responsibility and Tr...HAQ: Centre for Child Rights
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation introkscheidy
 
Internet Use, Privacy and security
Internet Use, Privacy and securityInternet Use, Privacy and security
Internet Use, Privacy and securityAwais Haider
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureSonu Mishra
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspaceDr. Arun Verma
 
Criminal justice system
Criminal justice systemCriminal justice system
Criminal justice systemPALLAVI MALIK
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointHannahMorrell
 

Tendances (20)

Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
D4S1 Investigation Strategy.pptx
D4S1 Investigation Strategy.pptxD4S1 Investigation Strategy.pptx
D4S1 Investigation Strategy.pptx
 
police force ppt.pptx
police force ppt.pptxpolice force ppt.pptx
police force ppt.pptx
 
Lying: NATURE,CAUSES,PREVENTION AND SYMPTOMS
Lying: NATURE,CAUSES,PREVENTION AND SYMPTOMSLying: NATURE,CAUSES,PREVENTION AND SYMPTOMS
Lying: NATURE,CAUSES,PREVENTION AND SYMPTOMS
 
виды таможенных процедур
виды таможенных процедурвиды таможенных процедур
виды таможенных процедур
 
Information and Technology Act
Information and Technology ActInformation and Technology Act
Information and Technology Act
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
Juvenile Justice in Different Countries Age of Criminal responsibility and Tr...
Juvenile Justice in Different Countries Age of Criminal responsibility and Tr...Juvenile Justice in Different Countries Age of Criminal responsibility and Tr...
Juvenile Justice in Different Countries Age of Criminal responsibility and Tr...
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Internet Use, Privacy and security
Internet Use, Privacy and securityInternet Use, Privacy and security
Internet Use, Privacy and security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Crime Prevention History And Theory
Crime Prevention History And TheoryCrime Prevention History And Theory
Crime Prevention History And Theory
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
Criminal justice system
Criminal justice systemCriminal justice system
Criminal justice system
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 

En vedette

Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internetmerlyna
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Dangers of internet
Dangers of internetDangers of internet
Dangers of internetgafsa123
 
Positive & Negative Sides of Internet
Positive  &  Negative  Sides of  InternetPositive  &  Negative  Sides of  Internet
Positive & Negative Sides of InternetSagarneel Majumder
 
Perigos Na Internet
Perigos Na InternetPerigos Na Internet
Perigos Na Internetmoniina
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationcey.ruth
 
Lifespan Chapter 12 Online Stud
Lifespan Chapter 12  Online StudLifespan Chapter 12  Online Stud
Lifespan Chapter 12 Online StudMossler
 
Internet Safety For Kids By Tanmay
Internet Safety For Kids By TanmayInternet Safety For Kids By Tanmay
Internet Safety For Kids By Tanmaytsdikshit
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Segurança na internet
Segurança na internetSegurança na internet
Segurança na internetJotaefe93
 
Perigos Da Internet
Perigos Da InternetPerigos Da Internet
Perigos Da InternetAna José
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
As 10 regras da segurança na internet
As 10 regras da segurança na internetAs 10 regras da segurança na internet
As 10 regras da segurança na internetDiogo Guerreiro
 
Laws on children rights and protection
Laws on children rights and protectionLaws on children rights and protection
Laws on children rights and protectionGrace Fabrero
 
10 karapatan ng bawat batang pilipino
10 karapatan ng bawat batang pilipino10 karapatan ng bawat batang pilipino
10 karapatan ng bawat batang pilipinorajnulada
 
Special laws on children 8353, 9262, 9231, 7877, 7610, 920
Special laws on children   8353, 9262, 9231, 7877, 7610, 920Special laws on children   8353, 9262, 9231, 7877, 7610, 920
Special laws on children 8353, 9262, 9231, 7877, 7610, 920Omar Jacalne
 

En vedette (20)

Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internet
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Dangers of internet
Dangers of internetDangers of internet
Dangers of internet
 
Positive & Negative Sides of Internet
Positive  &  Negative  Sides of  InternetPositive  &  Negative  Sides of  Internet
Positive & Negative Sides of Internet
 
Perigos Na Internet
Perigos Na InternetPerigos Na Internet
Perigos Na Internet
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter SchoolCybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter School
 
Lifespan Chapter 12 Online Stud
Lifespan Chapter 12  Online StudLifespan Chapter 12  Online Stud
Lifespan Chapter 12 Online Stud
 
2016 Performance Review
2016 Performance Review2016 Performance Review
2016 Performance Review
 
Internet Safety For Kids By Tanmay
Internet Safety For Kids By TanmayInternet Safety For Kids By Tanmay
Internet Safety For Kids By Tanmay
 
A internet
A internetA internet
A internet
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Segurança na internet
Segurança na internetSegurança na internet
Segurança na internet
 
Perigos Da Internet
Perigos Da InternetPerigos Da Internet
Perigos Da Internet
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
As 10 regras da segurança na internet
As 10 regras da segurança na internetAs 10 regras da segurança na internet
As 10 regras da segurança na internet
 
Laws on children rights and protection
Laws on children rights and protectionLaws on children rights and protection
Laws on children rights and protection
 
10 karapatan ng bawat batang pilipino
10 karapatan ng bawat batang pilipino10 karapatan ng bawat batang pilipino
10 karapatan ng bawat batang pilipino
 
Child protection policy
Child protection policyChild protection policy
Child protection policy
 
Special laws on children 8353, 9262, 9231, 7877, 7610, 920
Special laws on children   8353, 9262, 9231, 7877, 7610, 920Special laws on children   8353, 9262, 9231, 7877, 7610, 920
Special laws on children 8353, 9262, 9231, 7877, 7610, 920
 

Similaire à Invisible Preadators: Hidden Dangers of the Internet

Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?migueltachna
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineMichael Heron
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internetVictor Font
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101Chad Richards
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentationjpl17
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online PedophilesJustine
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 

Similaire à Invisible Preadators: Hidden Dangers of the Internet (20)

Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
102009
102009102009
102009
 
cyberworld
cyberworld cyberworld
cyberworld
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
022010
022010022010
022010
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
 
Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 
102010a
102010a102010a
102010a
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online Pedophiles
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 

Dernier

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 

Dernier (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Invisible Preadators: Hidden Dangers of the Internet

  • 1. Invisible Predators: Hidden Dangers of the Internet Presented By: Malissa Martino PASSAGES, Inc.
  • 2. Topics for Today Introduction Danger Areas The Online Predator Keeping Kids Safe Your Questions
  • 4.
  • 5.
  • 6.
  • 7.
  • 9.
  • 10. What kind of information is posted intentionally? ► Name ► Address ► Phone Number ► Email Address ► School ► Favorite Activities ► Special Messages to Friends www.google.com www.whitepages.com www.phonedetective.com Dubois Area Senior High School Public school · Grades 9-12 · 1412 students 425 Orient Ave, Du Bois, PA 15801 (814) 371-8111 District: Dubois Area School District Dubois Area Middle School Public school · Grades 6-8 · 1052 students 404 Liberty Blvd, Du Bois, PA 15801 (814) 375-8770 District: Dubois Area School District                           
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Who is the Online Predator?
  • 27.
  • 28.
  • 29.
  • 30.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. As others see it…
  • 37. Questions? For More Information: Malissa Martino PASSAGES, Inc. 1-800-793-3620 or 814-371-9677 [email_address]