SlideShare une entreprise Scribd logo
1  sur  37
Invisible Predators: Hidden Dangers of the Internet Presented By: Malissa Martino PASSAGES, Inc.
Topics for Today Introduction Danger Areas The Online Predator Keeping Kids Safe  Your Questions
Introduction of the Problem
What’s Happening Online? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
To Catch A Predator… ,[object Object],[object Object],[object Object],[object Object]
www.pervertedjustice.com ,[object Object],[object Object],[object Object],[object Object]
How big is the problem? ,[object Object],[object Object],[object Object],[object Object]
Danger Areas
Where are children/teens in the most danger online? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What kind of information is posted intentionally? ► Name ► Address ► Phone Number ► Email Address ► School ► Favorite Activities ► Special Messages to Friends www.google.com www.whitepages.com www.phonedetective.com Dubois Area Senior High School Public school · Grades 9-12 · 1412 students 425 Orient Ave, Du Bois, PA 15801 (814) 371-8111 District: Dubois Area School District Dubois Area Middle School Public school · Grades 6-8 · 1052 students 404 Liberty Blvd, Du Bois, PA 15801 (814) 375-8770 District: Dubois Area School District                           
Too much information… ,[object Object],[object Object],[object Object]
Sex Offenders  and MySpace.com ,[object Object],[object Object],[object Object]
Attitudes ,[object Object],[object Object],[object Object],[object Object]
Who are the victims of Internet sex crimes? ,[object Object],[object Object],[object Object],Stats from University of New Hampshire National Study, October 2001-July 2002
Teens most vulnerable… ,[object Object],[object Object],[object Object],[object Object]
The Online Predator
How the online  predator works… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: Julie Posey www.julieposey.com
Victim Selection ,[object Object],[object Object]
Survey of  Family Dynamics ,[object Object]
Introduction to Secrecy ,[object Object],[object Object]
Introduction to Adult Materials/Pornography ,[object Object],[object Object],[object Object]
Offline Contact ,[object Object],[object Object],[object Object]
The Face-to-Face Meeting ,[object Object],[object Object]
The Online Predator ,[object Object],[object Object]
Offenders: Who are they? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Who is the  Online Predator?
Inaccurate Stereotype ,[object Object],[object Object],[object Object]
Inaccurate Stereotype ,[object Object],[object Object]
Inaccurate Stereotype ,[object Object],[object Object],[object Object]
Inaccurate Stereotype ,[object Object],[object Object],[object Object]
Keeping Kids Safe
BASIC Internet Safety Tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REALISTIC  Internet Safety Tips ,[object Object],[object Object],[object Object]
Reporting Online Solicitations ,[object Object],[object Object]
Check these sites out! ,[object Object],[object Object],[object Object],[object Object],[object Object]
As others see it…
Questions? For More Information: Malissa Martino PASSAGES, Inc. 1-800-793-3620 or 814-371-9677 [email_address]

Contenu connexe

Tendances

Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Case of JonBenet Ramsey
Case of JonBenet RamseyCase of JonBenet Ramsey
Case of JonBenet RamseyVelika D'Souza
 
Child Sexual Exploitation of Children, CSEC Advocacy Project
Child Sexual Exploitation of Children, CSEC Advocacy ProjectChild Sexual Exploitation of Children, CSEC Advocacy Project
Child Sexual Exploitation of Children, CSEC Advocacy ProjectAlexandra Rupp
 
Human trafficking awareness
Human trafficking awarenessHuman trafficking awareness
Human trafficking awarenessLinh Tang
 
Social Media in Law Enforcement
Social Media in Law EnforcementSocial Media in Law Enforcement
Social Media in Law EnforcementLKinoshita
 
Introducing Clio Grow: The Client-Centered Way to Grow Your Firm
Introducing Clio Grow: The Client-Centered Way to Grow Your FirmIntroducing Clio Grow: The Client-Centered Way to Grow Your Firm
Introducing Clio Grow: The Client-Centered Way to Grow Your FirmClio - Cloud-Based Legal Technology
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
Social Media Impact On Children
Social Media Impact On ChildrenSocial Media Impact On Children
Social Media Impact On Childrenjtheis22
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentationdreamingmoi
 
Dating Violence Powerpoint
Dating Violence PowerpointDating Violence Powerpoint
Dating Violence PowerpointThe REACH Center
 
An Introduction to the Rights of Sex Workers and HB262
An Introduction to the Rights of Sex Workers and HB262An Introduction to the Rights of Sex Workers and HB262
An Introduction to the Rights of Sex Workers and HB262Lindsay A. Roth
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 

Tendances (20)

Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Case of JonBenet Ramsey
Case of JonBenet RamseyCase of JonBenet Ramsey
Case of JonBenet Ramsey
 
Child Sexual Exploitation of Children, CSEC Advocacy Project
Child Sexual Exploitation of Children, CSEC Advocacy ProjectChild Sexual Exploitation of Children, CSEC Advocacy Project
Child Sexual Exploitation of Children, CSEC Advocacy Project
 
Human trafficking awareness
Human trafficking awarenessHuman trafficking awareness
Human trafficking awareness
 
Social Media in Law Enforcement
Social Media in Law EnforcementSocial Media in Law Enforcement
Social Media in Law Enforcement
 
Introducing Clio Grow: The Client-Centered Way to Grow Your Firm
Introducing Clio Grow: The Client-Centered Way to Grow Your FirmIntroducing Clio Grow: The Client-Centered Way to Grow Your Firm
Introducing Clio Grow: The Client-Centered Way to Grow Your Firm
 
Human trafficking
Human trafficking Human trafficking
Human trafficking
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Social Media Impact On Children
Social Media Impact On ChildrenSocial Media Impact On Children
Social Media Impact On Children
 
Human Trafficking Policy-2
Human Trafficking Policy-2Human Trafficking Policy-2
Human Trafficking Policy-2
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentation
 
Dating Violence Powerpoint
Dating Violence PowerpointDating Violence Powerpoint
Dating Violence Powerpoint
 
An Introduction to the Rights of Sex Workers and HB262
An Introduction to the Rights of Sex Workers and HB262An Introduction to the Rights of Sex Workers and HB262
An Introduction to the Rights of Sex Workers and HB262
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

En vedette

Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internetmerlyna
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Dangers of internet
Dangers of internetDangers of internet
Dangers of internetgafsa123
 
Positive & Negative Sides of Internet
Positive  &  Negative  Sides of  InternetPositive  &  Negative  Sides of  Internet
Positive & Negative Sides of InternetSagarneel Majumder
 
Perigos Na Internet
Perigos Na InternetPerigos Na Internet
Perigos Na Internetmoniina
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationcey.ruth
 
Lifespan Chapter 12 Online Stud
Lifespan Chapter 12  Online StudLifespan Chapter 12  Online Stud
Lifespan Chapter 12 Online StudMossler
 
Internet Safety For Kids By Tanmay
Internet Safety For Kids By TanmayInternet Safety For Kids By Tanmay
Internet Safety For Kids By Tanmaytsdikshit
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Segurança na internet
Segurança na internetSegurança na internet
Segurança na internetJotaefe93
 
Perigos Da Internet
Perigos Da InternetPerigos Da Internet
Perigos Da InternetAna José
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
As 10 regras da segurança na internet
As 10 regras da segurança na internetAs 10 regras da segurança na internet
As 10 regras da segurança na internetDiogo Guerreiro
 
Laws on children rights and protection
Laws on children rights and protectionLaws on children rights and protection
Laws on children rights and protectionGrace Fabrero
 
10 karapatan ng bawat batang pilipino
10 karapatan ng bawat batang pilipino10 karapatan ng bawat batang pilipino
10 karapatan ng bawat batang pilipinorajnulada
 
Special laws on children 8353, 9262, 9231, 7877, 7610, 920
Special laws on children   8353, 9262, 9231, 7877, 7610, 920Special laws on children   8353, 9262, 9231, 7877, 7610, 920
Special laws on children 8353, 9262, 9231, 7877, 7610, 920Omar Jacalne
 

En vedette (20)

Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internet
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Dangers of internet
Dangers of internetDangers of internet
Dangers of internet
 
Positive & Negative Sides of Internet
Positive  &  Negative  Sides of  InternetPositive  &  Negative  Sides of  Internet
Positive & Negative Sides of Internet
 
Perigos Na Internet
Perigos Na InternetPerigos Na Internet
Perigos Na Internet
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter SchoolCybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter School
 
Lifespan Chapter 12 Online Stud
Lifespan Chapter 12  Online StudLifespan Chapter 12  Online Stud
Lifespan Chapter 12 Online Stud
 
2016 Performance Review
2016 Performance Review2016 Performance Review
2016 Performance Review
 
Internet Safety For Kids By Tanmay
Internet Safety For Kids By TanmayInternet Safety For Kids By Tanmay
Internet Safety For Kids By Tanmay
 
A internet
A internetA internet
A internet
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Segurança na internet
Segurança na internetSegurança na internet
Segurança na internet
 
Perigos Da Internet
Perigos Da InternetPerigos Da Internet
Perigos Da Internet
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
As 10 regras da segurança na internet
As 10 regras da segurança na internetAs 10 regras da segurança na internet
As 10 regras da segurança na internet
 
Laws on children rights and protection
Laws on children rights and protectionLaws on children rights and protection
Laws on children rights and protection
 
10 karapatan ng bawat batang pilipino
10 karapatan ng bawat batang pilipino10 karapatan ng bawat batang pilipino
10 karapatan ng bawat batang pilipino
 
Child protection policy
Child protection policyChild protection policy
Child protection policy
 
Special laws on children 8353, 9262, 9231, 7877, 7610, 920
Special laws on children   8353, 9262, 9231, 7877, 7610, 920Special laws on children   8353, 9262, 9231, 7877, 7610, 920
Special laws on children 8353, 9262, 9231, 7877, 7610, 920
 

Similaire à Invisible Preadators: Hidden Dangers of the Internet

Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?migueltachna
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineMichael Heron
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internetVictor Font
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101Chad Richards
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentationjpl17
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online PedophilesJustine
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 

Similaire à Invisible Preadators: Hidden Dangers of the Internet (20)

Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
102009
102009102009
102009
 
cyberworld
cyberworld cyberworld
cyberworld
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
022010
022010022010
022010
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
 
Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 
102010a
102010a102010a
102010a
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online Pedophiles
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 

Dernier

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Dernier (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Invisible Preadators: Hidden Dangers of the Internet

  • 1. Invisible Predators: Hidden Dangers of the Internet Presented By: Malissa Martino PASSAGES, Inc.
  • 2. Topics for Today Introduction Danger Areas The Online Predator Keeping Kids Safe Your Questions
  • 4.
  • 5.
  • 6.
  • 7.
  • 9.
  • 10. What kind of information is posted intentionally? ► Name ► Address ► Phone Number ► Email Address ► School ► Favorite Activities ► Special Messages to Friends www.google.com www.whitepages.com www.phonedetective.com Dubois Area Senior High School Public school · Grades 9-12 · 1412 students 425 Orient Ave, Du Bois, PA 15801 (814) 371-8111 District: Dubois Area School District Dubois Area Middle School Public school · Grades 6-8 · 1052 students 404 Liberty Blvd, Du Bois, PA 15801 (814) 375-8770 District: Dubois Area School District                           
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Who is the Online Predator?
  • 27.
  • 28.
  • 29.
  • 30.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. As others see it…
  • 37. Questions? For More Information: Malissa Martino PASSAGES, Inc. 1-800-793-3620 or 814-371-9677 [email_address]