SlideShare une entreprise Scribd logo
1  sur  17
INTERNET
   PREDATORS;
PARENTS CLUELESS
ABOUT THE DANGER
     ONLINE
        .

 CS-2 Miguel Tachna
PARENTS CLUELESS?
 Most parents know that this predators do
  exist, but they think that, their son will
  never be a victim, and they do nothing
  about it to protect the family.
THE PROBLEM…
 Is that someone who “knows” computers has
  helped to convince the parent that it is some
  strange new territory with new rules and the old
  rules just don't apply anymore. But the old and
  tradicional rules DO apply because the internet
  is a total real world.
ITS A REAL WORLD
 The “net-cops” make conferences with
  parents at schools making this comparations:
 Do you let your kids steal?"
  "Do you let your kids talk to strange adults?"
  "Do you let your kids tell strangers where he
  lives?"
  "Do you let your kids visit places like that
  downtown?"
  "Then why do you let them do it online?
  Because THEY told you it was different?"
How big is the problem?

 1 in 7 children are sexually solicited
  online EVERYDAY
 1 in 3 children are exposed to
  pornographic images online EVERYDAY
 An estimated 80% of convicted sex
  offenders have access to a computer and
  are online DAILY
            SOURCE: National Center for Missing and Exploited Children
Where are children/teens
in the most danger online?
  Chat sites
    ICQ, MSN Messenger, Yahoo Messenger,
     AIM,
  Profile Sites
    Myspace, Facebook, Livejournal, Xanga
  Online Games
    Runescape
What kind of information
 is posted intentionally?

Name
Address
Phone Number
Email Address
School
Favorite Activities
Special Messages to Friends
Too much information…
 Children and teens post information
  about themselves online by their own will.
 Most online profile sites offer very little in
  the way of protection of the information
  that is posted by users
 Facebook is the “safest” online profile
  site for teens to use
Terrible Tragedies
 Spring 2002: Connecticut
   13 year old Christina Long becomes the first murder
    victim because of MySpace.com
 February 2006: Connecticut
   7 teenage girls are sexually assaulted by men they
    met on Myspace.com
 June 2006: Michigan
   16 year old Katherine Lester agrees to fly to Israel
    to meet a 20 year old man that she met on
    Myspace.com authorities intercept her in Jordan
Sex Offenders
    and MySpace.com
 MySpace.com has found 744 registered sex
  offenders with profiles
 Edwin Hall, arrested for the June 2007 murder
  of Kelsey Smith, listed favorite pastimes on his
  MySpace.com account as: “Eating small
  children and harming animals.”
 Little is being done to delete and/or monitor
  suspected sex offender profiles
Attitudes
 “It can’t happen to me”
 “I’m smarter than adults
  online”
 “I would know if I was being
  cyber-stalked”
 “Parents are paranoid”
Who are the victims of
 Internet sex crimes?
 Most are teenagers 12-17 (approximately
  30% being male)
 Most know they’re getting involved in a
  sexual relationship with an adult.

 99% of Internet victims are ages 13-17


                     Stats from University of New Hampshire National Study,
                     October 2001-July 2002
Teens most vulnerable…

 Have poor relationships with parents
 (Adolescent girls who report high degree of conflict with their parents,
 boys who report low parental monitoring)

 Suffer from loneliness or depression
 (Teens turning to the Internet to alleviate their loneliness)

 Are gay or questioning boys
 (Boys who use the Internet to seek out information about homosexuality)

 Compliant or Statutory Victims
 (Those victims who actually cooperate with offenders and develop
 strong sexual attachments to them)
DANGER IN YOUR HOME
 Children are dying at the hands of their
  Internet child molesters and, not all
  sexual exploitation of children happens
  offline.
 Some exploit the victims in their own
  homes.
The Face-to-Face Meeting
 The predator will arrange a meeting with
  the child with the intent of assaulting
  him/her
 The child often willingly agrees to this
  meeting because they believe they have
  made a new “friend”
Offenders: Who are they?
 There is no one “profile” of an online
  predator
 Offenders are:
     Divorced, single, married
     Ages 14-70
     Rich, poor, middle class
     Many are involved with children and teens because
      they live with them, work with them, or volunteer
      with groups that provide activities for youth
                Source: PA Internet Crimes Against
                 Children Taskforce
Internet Safety Tips
 Keep the computer in a common area

 Don’t use chat rooms
 Don’t talk to strangers
 Don’t give out personal
 information
 Monitor what your children do online
 NO MYSPACE!!!!

Contenu connexe

Tendances

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitationmckenln
 
Pornograpy and Its Effects
Pornograpy and Its EffectsPornograpy and Its Effects
Pornograpy and Its EffectsSabitaMahat1
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet SafetySage Lewis
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshopforensicsnation
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101Chad Richards
 
Digital valentinesteensonlinedating
Digital valentinesteensonlinedatingDigital valentinesteensonlinedating
Digital valentinesteensonlinedatingTeenSafe
 
21st Century Bullying Crueler Than Ever
21st Century Bullying   Crueler Than Ever21st Century Bullying   Crueler Than Ever
21st Century Bullying Crueler Than Evermbernstein
 
Cybersmart Sexting
Cybersmart SextingCybersmart Sexting
Cybersmart Sextingmseij1
 
A presentation on child pornography
A presentation on child pornographyA presentation on child pornography
A presentation on child pornographySAMBIT SWAIN
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramDaniel Hanttula
 

Tendances (19)

102009
102009102009
102009
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitation
 
Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…Cyberbullying: What the research is telling us…
Cyberbullying: What the research is telling us…
 
Pornograpy and Its Effects
Pornograpy and Its EffectsPornograpy and Its Effects
Pornograpy and Its Effects
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop
 
022010
022010022010
022010
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101
 
Digital valentinesteensonlinedating
Digital valentinesteensonlinedatingDigital valentinesteensonlinedating
Digital valentinesteensonlinedating
 
21st Century Bullying Crueler Than Ever
21st Century Bullying   Crueler Than Ever21st Century Bullying   Crueler Than Ever
21st Century Bullying Crueler Than Ever
 
Cybersmart Sexting
Cybersmart SextingCybersmart Sexting
Cybersmart Sexting
 
A presentation on child pornography
A presentation on child pornographyA presentation on child pornography
A presentation on child pornography
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
102010a
102010a102010a
102010a
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
 

En vedette

Day 5 Lesson 5 Digital Citizenship
Day 5 Lesson 5 Digital CitizenshipDay 5 Lesson 5 Digital Citizenship
Day 5 Lesson 5 Digital CitizenshipJohanna Riddle
 
Acceptable Use Policy - CTAP Training
Acceptable Use Policy - CTAP TrainingAcceptable Use Policy - CTAP Training
Acceptable Use Policy - CTAP TrainingGlenn Hervieux
 
Aup internet safety presentation - staff
Aup internet safety presentation - staffAup internet safety presentation - staff
Aup internet safety presentation - stafflandonscism
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)scobycakau
 
Acceptable use policies ppt
Acceptable use policies pptAcceptable use policies ppt
Acceptable use policies pptEducatorX
 

En vedette (7)

Day 5 Lesson 5 Digital Citizenship
Day 5 Lesson 5 Digital CitizenshipDay 5 Lesson 5 Digital Citizenship
Day 5 Lesson 5 Digital Citizenship
 
Acceptable Use Policy - CTAP Training
Acceptable Use Policy - CTAP TrainingAcceptable Use Policy - CTAP Training
Acceptable Use Policy - CTAP Training
 
Aup internet safety presentation - staff
Aup internet safety presentation - staffAup internet safety presentation - staff
Aup internet safety presentation - staff
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
Acceptable use policies ppt
Acceptable use policies pptAcceptable use policies ppt
Acceptable use policies ppt
 
SERVICIOS DE RED
SERVICIOS DE REDSERVICIOS DE RED
SERVICIOS DE RED
 
CHEQUE Y PAGARÉ
CHEQUE Y PAGARÉCHEQUE Y PAGARÉ
CHEQUE Y PAGARÉ
 

Similaire à Parents Clueless About Online Dangers

Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshopforensicsnation
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentationjpl17
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
ArticleConnected To Nowhere
ArticleConnected To NowhereArticleConnected To Nowhere
ArticleConnected To Nowheremcneeteach
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internetmerlyna
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineMichael Heron
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 

Similaire à Parents Clueless About Online Dangers (20)

Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshop
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
ArticleConnected To Nowhere
ArticleConnected To NowhereArticleConnected To Nowhere
ArticleConnected To Nowhere
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internet
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 

Plus de migueltachna

Potencial electroestático
Potencial electroestáticoPotencial electroestático
Potencial electroestáticomigueltachna
 
Donacion de organos en Mexico
Donacion de organos en MexicoDonacion de organos en Mexico
Donacion de organos en Mexicomigueltachna
 
LEY DEL SEGURO SOCIAL
LEY DEL SEGURO SOCIALLEY DEL SEGURO SOCIAL
LEY DEL SEGURO SOCIALmigueltachna
 
PSICOLOGIA DE LA GESTALT
PSICOLOGIA DE LA GESTALTPSICOLOGIA DE LA GESTALT
PSICOLOGIA DE LA GESTALTmigueltachna
 
Historia de la Contabilidad
Historia de la ContabilidadHistoria de la Contabilidad
Historia de la Contabilidadmigueltachna
 
Empresa FORD presentacion
Empresa FORD presentacionEmpresa FORD presentacion
Empresa FORD presentacionmigueltachna
 
Efecto invernadero
Efecto invernaderoEfecto invernadero
Efecto invernaderomigueltachna
 

Plus de migueltachna (9)

Potencial electroestático
Potencial electroestáticoPotencial electroestático
Potencial electroestático
 
Donacion de organos en Mexico
Donacion de organos en MexicoDonacion de organos en Mexico
Donacion de organos en Mexico
 
LEY DEL SEGURO SOCIAL
LEY DEL SEGURO SOCIALLEY DEL SEGURO SOCIAL
LEY DEL SEGURO SOCIAL
 
PSICOLOGIA DE LA GESTALT
PSICOLOGIA DE LA GESTALTPSICOLOGIA DE LA GESTALT
PSICOLOGIA DE LA GESTALT
 
Historia de la Contabilidad
Historia de la ContabilidadHistoria de la Contabilidad
Historia de la Contabilidad
 
DESNUTRICIÓN
DESNUTRICIÓNDESNUTRICIÓN
DESNUTRICIÓN
 
Empresa FORD presentacion
Empresa FORD presentacionEmpresa FORD presentacion
Empresa FORD presentacion
 
Papiloma Humano
Papiloma HumanoPapiloma Humano
Papiloma Humano
 
Efecto invernadero
Efecto invernaderoEfecto invernadero
Efecto invernadero
 

Dernier

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 

Dernier (20)

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 

Parents Clueless About Online Dangers

  • 1. INTERNET PREDATORS; PARENTS CLUELESS ABOUT THE DANGER ONLINE . CS-2 Miguel Tachna
  • 2. PARENTS CLUELESS?  Most parents know that this predators do exist, but they think that, their son will never be a victim, and they do nothing about it to protect the family.
  • 3. THE PROBLEM…  Is that someone who “knows” computers has helped to convince the parent that it is some strange new territory with new rules and the old rules just don't apply anymore. But the old and tradicional rules DO apply because the internet is a total real world.
  • 4. ITS A REAL WORLD  The “net-cops” make conferences with parents at schools making this comparations:  Do you let your kids steal?" "Do you let your kids talk to strange adults?" "Do you let your kids tell strangers where he lives?" "Do you let your kids visit places like that downtown?" "Then why do you let them do it online? Because THEY told you it was different?"
  • 5. How big is the problem?  1 in 7 children are sexually solicited online EVERYDAY  1 in 3 children are exposed to pornographic images online EVERYDAY  An estimated 80% of convicted sex offenders have access to a computer and are online DAILY  SOURCE: National Center for Missing and Exploited Children
  • 6. Where are children/teens in the most danger online?  Chat sites  ICQ, MSN Messenger, Yahoo Messenger, AIM,  Profile Sites  Myspace, Facebook, Livejournal, Xanga  Online Games  Runescape
  • 7. What kind of information is posted intentionally? Name Address Phone Number Email Address School Favorite Activities Special Messages to Friends
  • 8. Too much information…  Children and teens post information about themselves online by their own will.  Most online profile sites offer very little in the way of protection of the information that is posted by users  Facebook is the “safest” online profile site for teens to use
  • 9. Terrible Tragedies  Spring 2002: Connecticut  13 year old Christina Long becomes the first murder victim because of MySpace.com  February 2006: Connecticut  7 teenage girls are sexually assaulted by men they met on Myspace.com  June 2006: Michigan  16 year old Katherine Lester agrees to fly to Israel to meet a 20 year old man that she met on Myspace.com authorities intercept her in Jordan
  • 10. Sex Offenders and MySpace.com  MySpace.com has found 744 registered sex offenders with profiles  Edwin Hall, arrested for the June 2007 murder of Kelsey Smith, listed favorite pastimes on his MySpace.com account as: “Eating small children and harming animals.”  Little is being done to delete and/or monitor suspected sex offender profiles
  • 11. Attitudes  “It can’t happen to me”  “I’m smarter than adults online”  “I would know if I was being cyber-stalked”  “Parents are paranoid”
  • 12. Who are the victims of Internet sex crimes?  Most are teenagers 12-17 (approximately 30% being male)  Most know they’re getting involved in a sexual relationship with an adult.  99% of Internet victims are ages 13-17 Stats from University of New Hampshire National Study, October 2001-July 2002
  • 13. Teens most vulnerable…  Have poor relationships with parents (Adolescent girls who report high degree of conflict with their parents, boys who report low parental monitoring)  Suffer from loneliness or depression (Teens turning to the Internet to alleviate their loneliness)  Are gay or questioning boys (Boys who use the Internet to seek out information about homosexuality)  Compliant or Statutory Victims (Those victims who actually cooperate with offenders and develop strong sexual attachments to them)
  • 14. DANGER IN YOUR HOME  Children are dying at the hands of their Internet child molesters and, not all sexual exploitation of children happens offline.  Some exploit the victims in their own homes.
  • 15. The Face-to-Face Meeting  The predator will arrange a meeting with the child with the intent of assaulting him/her  The child often willingly agrees to this meeting because they believe they have made a new “friend”
  • 16. Offenders: Who are they?  There is no one “profile” of an online predator  Offenders are:  Divorced, single, married  Ages 14-70  Rich, poor, middle class  Many are involved with children and teens because they live with them, work with them, or volunteer with groups that provide activities for youth  Source: PA Internet Crimes Against Children Taskforce
  • 17. Internet Safety Tips  Keep the computer in a common area  Don’t use chat rooms  Don’t talk to strangers  Don’t give out personal information  Monitor what your children do online  NO MYSPACE!!!!