SlideShare uma empresa Scribd logo
1 de 18
Cyber Predators
Lindsay E
Comm 250: Communications &
Technology
“Cyber Predators”: Who are
they?
O Do not fit clinical profile of pedophiles since
primarily target adolescents, not children
O Indeed, 1 in 8 offenders arrested for actually
committed crimes against adolescents (Wolak et
al., 2013)
O Seek certain characteristics: seek admiration
from victims who may be sexually naïve; may
fear adult relationships; want to “feel young”; feel
empowered exerting power or control over naïve
youth (Wolak et al., 2013)
O May be primarily sexually attracted to adults but
target youth for reasons including empowerment,
impulse desires, curiosity, and anger
The “cyber predators”: Who are
they?
(Wolak et al., 2013)
The “cyber predators”: What
do they do?
O Spend as much as 6 hours/day searching for victims
(Myers, 2014)
O Have substantial amount of children in contacts on
social networking sites
O Keep “meticulous” notes on these victims or contacts
O Rapidly shift from “grooming” to upfront sexualized
conversations
O Abandon these traditional “time-consuming”
processes
O “Offenders reported that, if a child did not respond to
their online initiations, the offender would move on to
another child; there was no need to bother with the
process of grooming when immediately asking
children for sex or to meet them produced results”
(Myers, 2014).
O Use the social media to “fast-track” abuse process
“Cyber Victims”: Who are
they?
O 13-17 years old (Wolak et al., 2013)
O ¼ are 13 years old
O Characteristics and risky behaviors that
increase likelihood of victimization:
O Youth questioning their sexuality; youths with
histories of sexual/physical abuse, and other
troubled or confused youth; youths with poor
relationships with parents; youths who
frequent chat rooms, talk online to strangers
about sex or who already engage in risky
sexual behavior offline (Wolak et al., 2013)
The “cyber victims”: Who are
they?
(Wolak et al., 2013)
The “cyber victims”: What do
they do?
O Anonymity and Deception cause victims to not know who
they are interacting with
O 4/5 youth cannot tell difference between “chatting” with peer
or an adult online (Myers, 2014)
O Causes them to engage and respond to these predators
O 5 common behavioral mistakes (Tedeschi, 2009)
1. “Broadcasting personal info to entire internet”
2. “Sharing Passwords”
3. “Befriending strangers”
4. “Baring their souls” (revealing too much intimate
information via CMC)
5. “Forgetting their futures” (posting incriminating
posts/pictures which may lead to unwanted consequences
such as reducing employment chances or college
enrollment opportunities)
Modeling Predation Theory
O Olson et al. Luring Communication
Theoretical (LCT) Model
O 5 phases of predation
1. Gaining access
2. Deceptive trust development
3. Grooming
4. Isolation
5. Approach
Phase 1: Gaining Access
O Predator must be “motivated and able
to gain access to potential victims and
their families” (Olson et al., 2007)
O Exchanging of personal info between
predator and victim
O Gains this access through IM
forums, MySpace or Facebook, chat room
that contain minors
Phase 2: Deceptive Trust
Development
O “a perpetrator’s ability to cultivate relationships with
potential victims and possibly their families that are
intended to benefit the perpetrator’s own sexual
interest” (Olson et al., 2007)
O Exists throughout CMC relationship between victim
and predator
O 4 subcategories
1. Personal information- details about victim and
predator’s locations, names, ages, etc.
2. Relationship details- discuss how each begin or
maintain relationships with friends or family
3. Activities- victim and predators’ preferred hobbies or
social behaviors
4. Compliments- predator or victim complimenting the
other on his or her qualities
Phase 3: Grooming
O “the subtle communication strategies that sexual
abusers use to prepare their potential victims to
accept the sexual conduct” (Olson et al., 2007)
O Two subcategories
1. Communicative desensitization
O Predator uses vulgar sexual language and attempts
to initiate or encourage interest within the victim
about sex
2. Reframing
O “contact or sex play between victim and adults that
may be communicated in ways that would make it
beneficial to the victim later in life” (Olson et
al., 2007)
O Sex portrayed as positive and beneficial learning
experience
Phase 4: Isolation
O Physical isolation- attempt to spend time alone with
victim
O Ensures victim has no parental supervision or is in a
private place when chat online
O Mental isolation- attempt to increase emotional
support and dependency
O Predator may provide sympathy and support to
victim’s problems
O “The predator seeks to isolate the victim and then to
fill the social gaps in the victim’s life as a tool to
facilitate abuse and gain control of the victim”
(Edwards et al., 2010)
Phase 5: Approach
O “The initial physical contact or verbal lead-ins
that occur prior to the actual sexual act”
(Olson et al., 2007)
O “The final step when the predator requests to
meet the victim offline with the intent of
beginning a sexual relationship” (Edwards et
al., 2010).
O After gains trust, provides grooming, isolates
minor from current social offline contacts and
ensures victim’s dependency on the
predator, then approaches
Examples of LCT Model in
Predators’ Language Use
(Edwards et al., 2010)
Examples of CMC between
Predators and Victims
(www.perverted-justice.com)
Where does this CMC occur?
O Internet
O Cell phones
O Social media sites
O Some examples (Datar & Mislan, 2010) :
O Chat rooms
Preventative Measures
O “Perverted-Justice.com”- “the largest and best
anti-predator organization online”
O This website has convicted more than 584 sexual
predators since June 2004 (Perverted-
Justice.com)
O Place “pseudo-adolescents” in chat rooms and
create decoy profiles in attempt to identify
internet predators and convict or incarcerate
them
Cyber Predators via CMC

Mais conteúdo relacionado

Mais procurados

Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingckeeling
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullyinghoskei
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYINGRene Ge
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableKhy Amigable
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 
Revenge Porn and blackmiling
Revenge Porn and blackmilingRevenge Porn and blackmiling
Revenge Porn and blackmilingssuseraa5b90
 
Computer Based Sexual Harassment
Computer Based Sexual HarassmentComputer Based Sexual Harassment
Computer Based Sexual HarassmentSejal Mehta
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingSuphaphonP
 

Mais procurados (20)

Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
 
Cyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingCyber bullying vs traditional bullying
Cyber bullying vs traditional bullying
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cbp
CbpCbp
Cbp
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Revenge Porn and blackmiling
Revenge Porn and blackmilingRevenge Porn and blackmiling
Revenge Porn and blackmiling
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Computer Based Sexual Harassment
Computer Based Sexual HarassmentComputer Based Sexual Harassment
Computer Based Sexual Harassment
 
Bully
BullyBully
Bully
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 

Semelhante a Cyber Predators via CMC

Youth sexting: challenging victim blaming and abstinence, and exploring the r...
Youth sexting: challenging victim blaming and abstinence, and exploring the r...Youth sexting: challenging victim blaming and abstinence, and exploring the r...
Youth sexting: challenging victim blaming and abstinence, and exploring the r...Emily Setty
 
sexting as a tool for victimisation.pdf
sexting as a tool for victimisation.pdfsexting as a tool for victimisation.pdf
sexting as a tool for victimisation.pdfavninarula1
 
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptxDIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptxafhkdfs
 
Adult Attachment Analysis
Adult Attachment AnalysisAdult Attachment Analysis
Adult Attachment AnalysisRachel Davis
 
The Revelation of the Father - Week 11
The Revelation of the Father - Week 11The Revelation of the Father - Week 11
The Revelation of the Father - Week 11PDEI
 
Criminal Behavior Conditioning
Criminal Behavior ConditioningCriminal Behavior Conditioning
Criminal Behavior ConditioningJessica Myers
 
No One Noticed, No One Heard
No One Noticed, No One HeardNo One Noticed, No One Heard
No One Noticed, No One HeardBASPCAN
 
The impact of bullying in adolescents on school
The impact of bullying in adolescents on schoolThe impact of bullying in adolescents on school
The impact of bullying in adolescents on schoolDenni Domingo
 
Perception of Cyberbullying in Young Adults
Perception of Cyberbullying in Young Adults Perception of Cyberbullying in Young Adults
Perception of Cyberbullying in Young Adults AbhramikaChoudhuri
 
1. Using a Microsoft Word document, please post one federal and on.docx
1. Using a Microsoft Word document, please post one federal and on.docx1. Using a Microsoft Word document, please post one federal and on.docx
1. Using a Microsoft Word document, please post one federal and on.docxcroysierkathey
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docxORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docxhoney690131
 
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docxORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docxjacksnathalie
 

Semelhante a Cyber Predators via CMC (19)

Youth sexting: challenging victim blaming and abstinence, and exploring the r...
Youth sexting: challenging victim blaming and abstinence, and exploring the r...Youth sexting: challenging victim blaming and abstinence, and exploring the r...
Youth sexting: challenging victim blaming and abstinence, and exploring the r...
 
sexting as a tool for victimisation.pdf
sexting as a tool for victimisation.pdfsexting as a tool for victimisation.pdf
sexting as a tool for victimisation.pdf
 
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptxDIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
 
Adult Attachment Analysis
Adult Attachment AnalysisAdult Attachment Analysis
Adult Attachment Analysis
 
The Revelation of the Father - Week 11
The Revelation of the Father - Week 11The Revelation of the Father - Week 11
The Revelation of the Father - Week 11
 
Week 5
Week 5Week 5
Week 5
 
Criminal Behavior Conditioning
Criminal Behavior ConditioningCriminal Behavior Conditioning
Criminal Behavior Conditioning
 
No One Noticed, No One Heard
No One Noticed, No One HeardNo One Noticed, No One Heard
No One Noticed, No One Heard
 
The Effects Of Bullying Essay
The Effects Of Bullying EssayThe Effects Of Bullying Essay
The Effects Of Bullying Essay
 
The impact of bullying in adolescents on school
The impact of bullying in adolescents on schoolThe impact of bullying in adolescents on school
The impact of bullying in adolescents on school
 
Effects Of Bullying Essay
Effects Of Bullying EssayEffects Of Bullying Essay
Effects Of Bullying Essay
 
Research Presentation.pptx
Research Presentation.pptxResearch Presentation.pptx
Research Presentation.pptx
 
Perception of Cyberbullying in Young Adults
Perception of Cyberbullying in Young Adults Perception of Cyberbullying in Young Adults
Perception of Cyberbullying in Young Adults
 
1. Using a Microsoft Word document, please post one federal and on.docx
1. Using a Microsoft Word document, please post one federal and on.docx1. Using a Microsoft Word document, please post one federal and on.docx
1. Using a Microsoft Word document, please post one federal and on.docx
 
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´MooreCyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
 
What is sexting
What is sexting What is sexting
What is sexting
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docxORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
 
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docxORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
 

Último

Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 

Último (20)

young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 

Cyber Predators via CMC

  • 1. Cyber Predators Lindsay E Comm 250: Communications & Technology
  • 2. “Cyber Predators”: Who are they? O Do not fit clinical profile of pedophiles since primarily target adolescents, not children O Indeed, 1 in 8 offenders arrested for actually committed crimes against adolescents (Wolak et al., 2013) O Seek certain characteristics: seek admiration from victims who may be sexually naïve; may fear adult relationships; want to “feel young”; feel empowered exerting power or control over naïve youth (Wolak et al., 2013) O May be primarily sexually attracted to adults but target youth for reasons including empowerment, impulse desires, curiosity, and anger
  • 3. The “cyber predators”: Who are they? (Wolak et al., 2013)
  • 4. The “cyber predators”: What do they do? O Spend as much as 6 hours/day searching for victims (Myers, 2014) O Have substantial amount of children in contacts on social networking sites O Keep “meticulous” notes on these victims or contacts O Rapidly shift from “grooming” to upfront sexualized conversations O Abandon these traditional “time-consuming” processes O “Offenders reported that, if a child did not respond to their online initiations, the offender would move on to another child; there was no need to bother with the process of grooming when immediately asking children for sex or to meet them produced results” (Myers, 2014). O Use the social media to “fast-track” abuse process
  • 5. “Cyber Victims”: Who are they? O 13-17 years old (Wolak et al., 2013) O ¼ are 13 years old O Characteristics and risky behaviors that increase likelihood of victimization: O Youth questioning their sexuality; youths with histories of sexual/physical abuse, and other troubled or confused youth; youths with poor relationships with parents; youths who frequent chat rooms, talk online to strangers about sex or who already engage in risky sexual behavior offline (Wolak et al., 2013)
  • 6. The “cyber victims”: Who are they? (Wolak et al., 2013)
  • 7. The “cyber victims”: What do they do? O Anonymity and Deception cause victims to not know who they are interacting with O 4/5 youth cannot tell difference between “chatting” with peer or an adult online (Myers, 2014) O Causes them to engage and respond to these predators O 5 common behavioral mistakes (Tedeschi, 2009) 1. “Broadcasting personal info to entire internet” 2. “Sharing Passwords” 3. “Befriending strangers” 4. “Baring their souls” (revealing too much intimate information via CMC) 5. “Forgetting their futures” (posting incriminating posts/pictures which may lead to unwanted consequences such as reducing employment chances or college enrollment opportunities)
  • 8. Modeling Predation Theory O Olson et al. Luring Communication Theoretical (LCT) Model O 5 phases of predation 1. Gaining access 2. Deceptive trust development 3. Grooming 4. Isolation 5. Approach
  • 9. Phase 1: Gaining Access O Predator must be “motivated and able to gain access to potential victims and their families” (Olson et al., 2007) O Exchanging of personal info between predator and victim O Gains this access through IM forums, MySpace or Facebook, chat room that contain minors
  • 10. Phase 2: Deceptive Trust Development O “a perpetrator’s ability to cultivate relationships with potential victims and possibly their families that are intended to benefit the perpetrator’s own sexual interest” (Olson et al., 2007) O Exists throughout CMC relationship between victim and predator O 4 subcategories 1. Personal information- details about victim and predator’s locations, names, ages, etc. 2. Relationship details- discuss how each begin or maintain relationships with friends or family 3. Activities- victim and predators’ preferred hobbies or social behaviors 4. Compliments- predator or victim complimenting the other on his or her qualities
  • 11. Phase 3: Grooming O “the subtle communication strategies that sexual abusers use to prepare their potential victims to accept the sexual conduct” (Olson et al., 2007) O Two subcategories 1. Communicative desensitization O Predator uses vulgar sexual language and attempts to initiate or encourage interest within the victim about sex 2. Reframing O “contact or sex play between victim and adults that may be communicated in ways that would make it beneficial to the victim later in life” (Olson et al., 2007) O Sex portrayed as positive and beneficial learning experience
  • 12. Phase 4: Isolation O Physical isolation- attempt to spend time alone with victim O Ensures victim has no parental supervision or is in a private place when chat online O Mental isolation- attempt to increase emotional support and dependency O Predator may provide sympathy and support to victim’s problems O “The predator seeks to isolate the victim and then to fill the social gaps in the victim’s life as a tool to facilitate abuse and gain control of the victim” (Edwards et al., 2010)
  • 13. Phase 5: Approach O “The initial physical contact or verbal lead-ins that occur prior to the actual sexual act” (Olson et al., 2007) O “The final step when the predator requests to meet the victim offline with the intent of beginning a sexual relationship” (Edwards et al., 2010). O After gains trust, provides grooming, isolates minor from current social offline contacts and ensures victim’s dependency on the predator, then approaches
  • 14. Examples of LCT Model in Predators’ Language Use (Edwards et al., 2010)
  • 15. Examples of CMC between Predators and Victims (www.perverted-justice.com)
  • 16. Where does this CMC occur? O Internet O Cell phones O Social media sites O Some examples (Datar & Mislan, 2010) : O Chat rooms
  • 17. Preventative Measures O “Perverted-Justice.com”- “the largest and best anti-predator organization online” O This website has convicted more than 584 sexual predators since June 2004 (Perverted- Justice.com) O Place “pseudo-adolescents” in chat rooms and create decoy profiles in attempt to identify internet predators and convict or incarcerate them