SlideShare une entreprise Scribd logo
1  sur  17
 
Worst Fears
Best Hopes
Empowering Kids
 
Is Privacy Dead?
Research
“ So first fact is that the predominant online sex crime victims are not young children. They are teenagers. There’s almost no victims in the sample that we collected from – a representative sample of law enforcement cases that involved the child under the age of 13.”
[object Object],[object Object],http://flickr.com/photos/atouchofcolor/
“ Our research, actually looking at what puts kids at risk for receiving the most serious kinds of sexual solicitation online, suggests that it’s not giving out personal information that puts kid at risk. It’s not having a blog or a personal website that does that either.”
“ What puts kids in danger is being willing to talk about sex online with strangers or having a pattern of multiple risky activities on the web like going to sex sites and chat rooms, meeting lots of people there, kind of behaving in what we call like an  internet daredevil .”
 
“… three and seven percent of young people are targeted by frequent bullying on the internet and text messaging. By frequent I mean at least once a month or more often.”
Building your Online Profile
55% Teens have online profiles
65% Of teens have private settings
 

Contenu connexe

Tendances

prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online PedophilesJustine
 
Social media and inappropriate behaviour
Social media and inappropriate behaviourSocial media and inappropriate behaviour
Social media and inappropriate behaviourcpsocialmedia
 
A perspective on a controversial topic
A perspective on a controversial topicA perspective on a controversial topic
A perspective on a controversial topicj-bush90
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineMichael Heron
 
A presentation on child pornography
A presentation on child pornographyA presentation on child pornography
A presentation on child pornographySAMBIT SWAIN
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Erwc period 1cyber bullying
Erwc period 1cyber bullyingErwc period 1cyber bullying
Erwc period 1cyber bullyingkcurranlitlover
 
Anissaandgabbywithsong 130320081154-phpapp02
Anissaandgabbywithsong 130320081154-phpapp02Anissaandgabbywithsong 130320081154-phpapp02
Anissaandgabbywithsong 130320081154-phpapp02kcurranlitlover
 
Anissa and gabby with song
Anissa and gabby with songAnissa and gabby with song
Anissa and gabby with songkcurranlitlover
 
2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying2012 06 Sexting and Cyberbullying
2012 06 Sexting and CyberbullyingRaleigh ISSA
 
Your online presence
Your online presenceYour online presence
Your online presencePamela Comer
 

Tendances (19)

prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online Pedophiles
 
cyberworld
cyberworld cyberworld
cyberworld
 
Social media and inappropriate behaviour
Social media and inappropriate behaviourSocial media and inappropriate behaviour
Social media and inappropriate behaviour
 
Sexting
SextingSexting
Sexting
 
Sexting
SextingSexting
Sexting
 
A perspective on a controversial topic
A perspective on a controversial topicA perspective on a controversial topic
A perspective on a controversial topic
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Sexting
SextingSexting
Sexting
 
A presentation on child pornography
A presentation on child pornographyA presentation on child pornography
A presentation on child pornography
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Erwc period 1cyber bullying
Erwc period 1cyber bullyingErwc period 1cyber bullying
Erwc period 1cyber bullying
 
Anissaandgabbywithsong 130320081154-phpapp02
Anissaandgabbywithsong 130320081154-phpapp02Anissaandgabbywithsong 130320081154-phpapp02
Anissaandgabbywithsong 130320081154-phpapp02
 
Anissa and gabby with song
Anissa and gabby with songAnissa and gabby with song
Anissa and gabby with song
 
2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying
 
Your online presence
Your online presenceYour online presence
Your online presence
 

En vedette

En vedette (20)

Remembering Kindergarten
Remembering KindergartenRemembering Kindergarten
Remembering Kindergarten
 
Web 2.0 Consider the Possibilities
Web 2.0 Consider the PossibilitiesWeb 2.0 Consider the Possibilities
Web 2.0 Consider the Possibilities
 
Back to the Basics...What Really Matters Now
Back to the Basics...What Really Matters NowBack to the Basics...What Really Matters Now
Back to the Basics...What Really Matters Now
 
Re-Discovering Joy
Re-Discovering JoyRe-Discovering Joy
Re-Discovering Joy
 
Sharing P B S 2009
Sharing  P B S 2009Sharing  P B S 2009
Sharing P B S 2009
 
Evidencias día 2
Evidencias día 2Evidencias día 2
Evidencias día 2
 
Evolucion de la programacion
Evolucion de la programacionEvolucion de la programacion
Evolucion de la programacion
 
Programa Completo
Programa CompletoPrograma Completo
Programa Completo
 
Globalizacion
GlobalizacionGlobalizacion
Globalizacion
 
Mi Primer Powert Point
Mi Primer Powert PointMi Primer Powert Point
Mi Primer Powert Point
 
Trabajo colaborativo nrc 813
Trabajo colaborativo nrc 813Trabajo colaborativo nrc 813
Trabajo colaborativo nrc 813
 
Análises de conteudos
Análises de conteudosAnálises de conteudos
Análises de conteudos
 
Cláusulas contratuais
Cláusulas contratuaisCláusulas contratuais
Cláusulas contratuais
 
A poliomielite
A poliomieliteA poliomielite
A poliomielite
 
blogs
blogsblogs
blogs
 
Astronomia
AstronomiaAstronomia
Astronomia
 
Guitarras rápidas
Guitarras rápidasGuitarras rápidas
Guitarras rápidas
 
Elizabeth arquitectura
Elizabeth arquitecturaElizabeth arquitectura
Elizabeth arquitectura
 
Revista da turma da mônica sobre drogas
Revista da turma da mônica sobre drogasRevista da turma da mônica sobre drogas
Revista da turma da mônica sobre drogas
 
Set natalizi
Set nataliziSet natalizi
Set natalizi
 

Similaire à Empower Kids Online Privacy

Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshopforensicsnation
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshopforensicsnation
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletLockley
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)Chris Jagger
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Eng 101 essay 2 revisied
Eng 101 essay 2 revisiedEng 101 essay 2 revisied
Eng 101 essay 2 revisiedAliciaHamrick
 

Similaire à Empower Kids Online Privacy (16)

Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Cyrenne Madlangsakay
Cyrenne MadlangsakayCyrenne Madlangsakay
Cyrenne Madlangsakay
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshop
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
Essays On Cyber Bullying
Essays On Cyber BullyingEssays On Cyber Bullying
Essays On Cyber Bullying
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)
 
NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Eng 101 essay 2 revisied
Eng 101 essay 2 revisiedEng 101 essay 2 revisied
Eng 101 essay 2 revisied
 

Plus de Dean Shareski

What's Your Unfair Advantage?
What's Your Unfair Advantage?What's Your Unfair Advantage?
What's Your Unfair Advantage?Dean Shareski
 
When The Answer is Both
When The Answer is BothWhen The Answer is Both
When The Answer is BothDean Shareski
 
From Storytelling to StoryMaking
From Storytelling to StoryMakingFrom Storytelling to StoryMaking
From Storytelling to StoryMakingDean Shareski
 
New Culture of Leaders
New Culture of LeadersNew Culture of Leaders
New Culture of LeadersDean Shareski
 
Personal and Personalized Learning
Personal and Personalized LearningPersonal and Personalized Learning
Personal and Personalized LearningDean Shareski
 
That's So Fake: Exploring Critical Literacy
That's So Fake: Exploring Critical LiteracyThat's So Fake: Exploring Critical Literacy
That's So Fake: Exploring Critical LiteracyDean Shareski
 
Better Presentations
Better Presentations Better Presentations
Better Presentations Dean Shareski
 
Rethinking digital citizenship
Rethinking digital citizenshipRethinking digital citizenship
Rethinking digital citizenshipDean Shareski
 
Discovery Education Free Resources
Discovery Education Free ResourcesDiscovery Education Free Resources
Discovery Education Free ResourcesDean Shareski
 
Engaging Learners with Technology
Engaging Learners with TechnologyEngaging Learners with Technology
Engaging Learners with TechnologyDean Shareski
 
Is Sharing a Moral Imperative?
Is Sharing a Moral Imperative?Is Sharing a Moral Imperative?
Is Sharing a Moral Imperative?Dean Shareski
 
Myth busting and the Nigerian Prince
Myth busting and the Nigerian PrinceMyth busting and the Nigerian Prince
Myth busting and the Nigerian PrinceDean Shareski
 
Airing of grievances
Airing of grievancesAiring of grievances
Airing of grievancesDean Shareski
 
Interactiv 15: From So What to Now What?
Interactiv 15: From So What to Now What?Interactiv 15: From So What to Now What?
Interactiv 15: From So What to Now What?Dean Shareski
 
The Great Canadian Educator
The Great Canadian EducatorThe Great Canadian Educator
The Great Canadian EducatorDean Shareski
 
Whatever Happened to Joy?
Whatever Happened to Joy? Whatever Happened to Joy?
Whatever Happened to Joy? Dean Shareski
 
Rethinking digital citizenship
Rethinking digital citizenshipRethinking digital citizenship
Rethinking digital citizenshipDean Shareski
 

Plus de Dean Shareski (20)

What's Your Unfair Advantage?
What's Your Unfair Advantage?What's Your Unfair Advantage?
What's Your Unfair Advantage?
 
When The Answer is Both
When The Answer is BothWhen The Answer is Both
When The Answer is Both
 
From Storytelling to StoryMaking
From Storytelling to StoryMakingFrom Storytelling to StoryMaking
From Storytelling to StoryMaking
 
New Culture of Leaders
New Culture of LeadersNew Culture of Leaders
New Culture of Leaders
 
Personal and Personalized Learning
Personal and Personalized LearningPersonal and Personalized Learning
Personal and Personalized Learning
 
That's So Fake: Exploring Critical Literacy
That's So Fake: Exploring Critical LiteracyThat's So Fake: Exploring Critical Literacy
That's So Fake: Exploring Critical Literacy
 
Better Presentations
Better Presentations Better Presentations
Better Presentations
 
Rethinking digital citizenship
Rethinking digital citizenshipRethinking digital citizenship
Rethinking digital citizenship
 
Real or fake?
Real or fake?Real or fake?
Real or fake?
 
Discovery Education Free Resources
Discovery Education Free ResourcesDiscovery Education Free Resources
Discovery Education Free Resources
 
The Story of STEM
The Story of STEMThe Story of STEM
The Story of STEM
 
Engaging Learners with Technology
Engaging Learners with TechnologyEngaging Learners with Technology
Engaging Learners with Technology
 
Is Sharing a Moral Imperative?
Is Sharing a Moral Imperative?Is Sharing a Moral Imperative?
Is Sharing a Moral Imperative?
 
Myth busting and the Nigerian Prince
Myth busting and the Nigerian PrinceMyth busting and the Nigerian Prince
Myth busting and the Nigerian Prince
 
Airing of grievances
Airing of grievancesAiring of grievances
Airing of grievances
 
Interactiv 15: From So What to Now What?
Interactiv 15: From So What to Now What?Interactiv 15: From So What to Now What?
Interactiv 15: From So What to Now What?
 
The Great Canadian Educator
The Great Canadian EducatorThe Great Canadian Educator
The Great Canadian Educator
 
Whatever Happened to Joy?
Whatever Happened to Joy? Whatever Happened to Joy?
Whatever Happened to Joy?
 
Rethinking digital citizenship
Rethinking digital citizenshipRethinking digital citizenship
Rethinking digital citizenship
 
Future classrooms
Future classroomsFuture classrooms
Future classrooms
 

Dernier

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Dernier (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Empower Kids Online Privacy

  • 1.  
  • 5.  
  • 8. “ So first fact is that the predominant online sex crime victims are not young children. They are teenagers. There’s almost no victims in the sample that we collected from – a representative sample of law enforcement cases that involved the child under the age of 13.”
  • 9.
  • 10. “ Our research, actually looking at what puts kids at risk for receiving the most serious kinds of sexual solicitation online, suggests that it’s not giving out personal information that puts kid at risk. It’s not having a blog or a personal website that does that either.”
  • 11. “ What puts kids in danger is being willing to talk about sex online with strangers or having a pattern of multiple risky activities on the web like going to sex sites and chat rooms, meeting lots of people there, kind of behaving in what we call like an internet daredevil .”
  • 12.  
  • 13. “… three and seven percent of young people are targeted by frequent bullying on the internet and text messaging. By frequent I mean at least once a month or more often.”
  • 15. 55% Teens have online profiles
  • 16. 65% Of teens have private settings
  • 17.