Tricia RayaVanessa AotrizHacel Dela Cruz SCI 10 section J Report by:

Slides:



Advertisements
Similar presentations
Internet Safety Keeping Our Kids Safe Online. How do you use the Internet? News Shopping Banking File Sharing Downloading Music YouTube Chat Instant.
Advertisements

How to protect yourself, your computer, and others on the internet
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Developed by Technology Services 1:1 Laptop Initiative
Thank you for your cooperation. We will begin shortly.
Keeping Your Child Safe on the Internet
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
E-safety EXPOSURE TO INAPPROPRIATE MATERIAL HARASSMENT AND BULLYING PERSONAL INFORMATION AND PRIVACY PHYSICAL DANGER UNWANTED ADVERTISING FINANCIAL RISKS.
Forms of Cyberbullying
Cyber bullying and internet safety Parents meeting: staying safe online.
CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education.
Internet Safety and Awareness Cyberbullies and Predators Enfield High School Computer Network.
$100 $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $200 $300 $400 $500.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Cyber and Internet Safety El Rodeo School September 11, 2013.
How to keep your kids safe online
Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.
1 Children and Families. 2 Children & Families Focus on the Internet Children’s Needs –Education –Entertainment Families’ Needs –Education –Protection.
 Grades 5-8 – 56 out of 66 – 85%  Grades 9-12 – 79 out of 85 – 93%  Grades 5-12 – 135 out of 151 – 89%  100% of the Juniors and Seniors use a social.
Company LOGO Internet Safety A Community Approach.
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
Internet Safety Awareness
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Mueller Elementary Keeping your child safe online--- Things parents should know Created by Gold Hill Elementary Tega Cay, SC Adapted with permission by.
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
Seatbelts for Your Child’s Journeys in Cyberspace.
Welcome to e-safety Training Friday 3 rd Oct 2014.
Kara LaRose, School Counselor Willow Dale Elementary School
Cyber Bullying: Not Something To Be Ignored A Presentation By Tyler Mulford.
Lovejoy Preschool PTA Association January 20, 2011 Terri Harkey Puster Elementary Library Media Specialist.
Two major things to Look for on the Internet  1. Predators. Predators  2. How to Target a PredatorHow to Target a Predator  3. How can Parents Minimize.
Introduction Video Slide Content Links What is School Bullying? What to know about Cyberbulling Social Networking & the Effects of Cyberbullying FaceBook.
If you are talking to a friend in a chat room and they ask you for financial information, you should: a) Ask your friend why they need the information.
Cyber Bullying Challenges for Educators, Legal issues, and Advice for Students and Parents.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
INTERNET SAFETY Tips for becoming a “surfer” dude!
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Internet Safety: Teaching Your Kids to Surf… Is Proud to Offer.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
By: Zach Oltmanns.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Cyber Bullying By Sarah Chaouk and Astede Woldegebriel.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
Internet Safety Your agency. Benefits of the Internet Vast quantity of information for various learning styles Text Graphics Sounds Interactive Information.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Digital Elementary School Kids: Safe, Smart, and Responsible.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
T HINK ! Before You Post A lesson on Internet Safety Source:
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
E-safety Helping your children stay safe on-line A presentation for Parents.
CYBERSAFTEY 101 By: Tarrah Marcus INTRODUCTION  Acceptable Use Policies (AUP)  Policies that govern internet use  Cyberbullying  Technology based.
A Parent’s Guide to Child Safety on the Internet.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
E-safety Training Tuesday, 12 th April, Aims of the session: Examine ‘The Digital Landscape’ – current statistics To underline the message of.
Cyber and Internet Safety (Parents’ Night)
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
GOSSIP and CYBERBULLYING
Ask your friend why they need the information.
MSTI 131: Introduction to Educational Technology
Intervention and Prevention
GOSSIP and CYBERBULLYING
Personal Safety Online
Presentation transcript:

Tricia RayaVanessa AotrizHacel Dela Cruz SCI 10 section J Report by:

What is a Cyber Predator? Someone who uses the internet to take advantage of another in any way: Sexually Financially Emotionally Psychologically

Forms: Accd. To “Cyber Stalking and Internet Harassment: What the Law Can Do” by Judge David Harvey Sending unwanted, abusive, obscene messages s Spamming (sending junk s) Live chat sessions, message boards, newsgroups Indirect Way: Harasser may impersonate the victim and send abusive s in the victim’s name. The victim will then receive the hate mails.

Why the internet? “Cyber Stalking and Internet Harassment: What the Law Can Do” by Judge David Harvey Anonymity Creating an “online persona” with little relationship to one’s own personality Pseudonymity Forging an header to create a digital persona Impersonation Making an appear as if it was sent from a different account R er technology: Mixmaster

Mixmaster uses public key cryptography granting unprecedented anonymity A user may chain several r ers together and send communications safe the trail created would be so complex that it would be impossible to follow Ease of Dissemination Readily available audience One-dimensional nature of online communication Face to face: listener can balance the content of the message with facial expression, body language, intonation, volume Online: Vulnerable to misinterpretation Cheap Without leaving the house Technology of database Becomes easier to search for a victim by typing a name, address, etc. on search engines Why the internet?

Cyber Predators Predators Characteristics: Close to 100% are male 91% are white and non-Hispanic 91% hold a full-time job.

What does this say about cyber predation? Do not stereotype Gives a new meaning to “Don’t talk to strangers.” even though they look trustworthy

Catching a Cyber Predator Counterattack against cyber-predators The Sting of Online Predators Microsoft Collaborates With Global Police

Do not disclose contact details to strangers (text, internet, etc.) Online shopping, read the reviews Detecting predators (Philippine context)

Disturbing Statistics 100,000 Web sites offering child pornography. 79% of teens aren’t careful when giving out information 64% teens do things online without parents knowledge.

$3 billion Child pornography revenue annually. 1 in 5 Children are sexually solicited online only 25% of those told a parent 89% Sexual solicitations occurred in chat rooms Instant Messaging

Death of Megan Meier (Missouri) ; 13 years old “she was a bad person and the world would be better without her” (Josh’s last message to Megan)

Patrick Sicat Transferred from Lasalle to UP Diliman Blog: complains about UP “disgusting chairs…nerdy students” The Oblation: “…the statue that upholds a bold representation of what it means to be a jackass” Got bullied by UP Students “Hindi mo pa nae-encounter ang term na HIT? Pwes, alamin mo before other UP students introduce this word to you the hard way” (“Have you been a victim of cyber-harassment?” by Annelle Tayao, PDI)

According to “Real-Word Dangers in an Online Reality: A Qualitative Study Examining Online Relationships and Cyber Abuse” by Mishna, McLucki, Saini Cyber Harassment/Predation can happen Between strangers And real-life acquaintances

Where predators are found Chat Rooms Instant Messenger Myspace Facebook Xanga

Software You can find software that will Limit the time your child spends online Block inappropriate web pages Monitor Instant Messenger chats Restrict game-play Block file sharing programs Keep your kids from sending personal information online

Protective Settings Set up content advisor on internet explorer List of approved and block sites or Content Advisor Safe Surf

Protective Tools Kid-safe search engines – Hazoo – Yahooligans – KidsClick Internet Filters All in one parental control software Banning Myspace from schools Kinds of Software – Mach 7 the Remote Spy Keylogger

Put a password on the computer. Teach your child about internet safety. Warn your child not to join any mailing lists Encourage your child not to visit strange sites. Reputation Defender Company which offers services such as “Search and Destroy” and “My Child”

Books The Smart Mom’s Guide to Online Safety Learn how to keep your children safe Learn the warning signs Discover what happens on social networking sites, blogs and other online channels.

Learn why nothing is permanently deleted from the Internet Discover online dangers at your public library. Learn why photo and video sharing sites can impact your child’s life

Laws against Cyber Predation Senate Bill Number 818 Modifies various provisions relating to stalking and harassment. June 30, 2008 In Missouri, signed by Governer Matt Blunt removing the requirement in the legislation requiring that such harassing communication be written or made over the telephone. harassment from computers, text messages and other electronic devices may also be considered illegal

..in the Philippines Resolution number 915 By Senator Manny Villar “URGING THE SENATE COMMITTEES ON SCIENCE AND TECHNOLOGY, PUBLIC INFORMATION AND MASS MEDIA AND OTHER APPROPRIATE COMMITTEES TO CONDUCT AN INQUIRY, IN AID OF LEGISLATION, ON THE OCCURRENCE OF CYBER STALKING CASES AND THE MODUS OPERANDI ADOPTE TO PERPETUATE CRIMES IN THE INTERNET WITH THE END IN OF FORMULATING A POLICY THAT WILL CURB CYBER STALKING AND PROTECTONLINE USERS IN THE COUNTRY” Incident Cited Jehzeel Laurete (Blog: Jehzlau’s Concepts) the stalker created another with an address very similar to the genuine address of Laurente and used the fake to ask money from other internet users and annoy and pester others by retorting bad words on comments and web pages, pretending to be the real Laurente