SlideShare uma empresa Scribd logo
1 de 82
BE NET SAFE .ORG SM
 
BeNetSafe.Org Founded in September 2002 10/2007 becomes a Non-Profit organization Reached out to 10000+ Students Spoke to thousands of  Parents / Police / Educators Reached out to the state using the GSDLN What we know: ,[object Object],[object Object],[object Object],[object Object]
BeNetSafe.Org ,[object Object],[object Object],[object Object],[object Object],[object Object]
Online “Predators” and Their Victims Myths, Realities, and Implications for Prevention and Treatment February–March 2008  American Psychologist Janis Wolak, David Finkelhor, and Kimberly J. Mitchell, Crimes against Children Research Center and Family Research Laboratory, University of New Hampshire;  Michele L. Ybarra, Internet Solutions for Kids, Inc., Santa Ana, California. The article outlined 9 risky on-line behaviors ●  Posting personal information online, 56% of youth Internet users ●  Interacting online with unknown people, 43% ●  Having unknown people on a buddy list, 35% ●  Using the Internet to make rude and nasty comments to others, 28% ●  Sending personal information to unknown people met online, 26% ●  Downloading images from file-sharing programs, 15% ●  Visiting X-rated sites on purpose, 13%  ●  Using the Internet to embarrass or harass people youths are mad at, 9% ●  Talking online to unknown people about sex, 5%
[object Object],[object Object],[object Object],[object Object],[object Object]
Social Network Required Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],--------   subtract 3 days
OPTIONAL INFORMATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Information Favorite Color:  Screen Name:  Favorite Band:  Favorite Movie:  Favorite Show:  Your Car:  Your Hometown:  Your Present Town:  Your Crushes First Name:  Your Grade:  Your Style:  What is Your Name?  How old are you?  Eye color?  Shoe Size?  Hair color?  Height?  Weight?  Favorite:  Food?  Drink?  Movie?  Music Band?  Animal?  Sport?  What is the link to your website, blog, or myspace?  Place to live?  Subject?  Stuff......  Best thing that happened to you in the last few years?  Do you want to get married?  Kids?  Best place to go on a date?  What is your dream?  What do you want to do when you grow up?  Play an instrument?  List 5 things (inc. brand) you are wearing right now  Friends....  Friend you have known the longest?  Best friend(s)?  Friend that makes you laugh the most?  Friend who you can talk to anything about?  Friend with the best personality?  Last friend to call you?  Last friend to talk to you?  Last friend you hung out with?  Last friend you went to a movie with?  Last friend to make you laugh?  Most memorable experience with a friend?  Anything you plan to do with friends when you get older?  Any trips planned with friends?  Ever traveled anywhere?  What places do you want to visit?  Where do you want to live when you're older?  How happy are you with where you are in life? Why?  What's your most embarrassing moment?  Do you have any art or pictures on your walls? Describe it.
Social Networking Sites But I made my site PRIVATE!!!
Social Networking Sites Facebook signs up 100,000 new users every day. Including one 'Freddi Staur' (an anagram of 'ID Fraudster’) The big test of 2007! a world leader in IT security and control
Social Networking Sites Research shows that 41 percent of users, more than two in five, will divulge personal information - such as email address, date of birth and phone number - to a complete stranger, or at least to Freddi Staur.
Social Networking Sites 43 percent of users contacted responded to Freddi. 41 percent of those approached leaked personal information.
Social Networking Sites 87 percent of respondents provided details about  their education or workplace. 84 percent of respondents listed their full date of birth. 78 percent of respondents listed their current address or location. 72 percent of respondents divulged one or more email address. 26 percent of respondents provided their instant messaging screen name.  23 percent of respondents listed their current phone number.
Social Networking Sites In the majority of cases, Freddi was able to gain access to respondents’ photos of family and friends, information about likes and dislikes, hobbies, employer details and other personal facts. Many users also disclosed the names of their spouses/partners, several included their complete résumés, while one user even  divulged his mother's maiden name.
Social Networking Sites ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Networking Sites UPDATE 2009 Sophos created two female Australian Facebook users,  Daisy Feletin (21, single) and Dinette Stonily (56, married).  Each sent a friend request to 100 randomly-selected contacts  in their age group, and waited two weeks to see who would respond.
Social Networking Sites UPDATE 2009 Daisy Dinette Freddie Friends accepting 46%   41% 43% Full/Partial d.o.b 98%   92%   84% Email address 100%   88% 72% College or workplace 74%   22% 87% Phone number 7%   23% 23% IM screen name 13%   18% 26%
Social Networking Sites ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber Predators ,[object Object],[object Object],[object Object]
Stage One Predator Appears Familiar ,[object Object],[object Object],[object Object],[object Object]
Stage Two Develops Trust ,[object Object],[object Object],[object Object],[object Object]
Stage Three Establishes Secrecy ,[object Object],[object Object],[object Object],[object Object]
The Last Stage The Face to Face Meeting ,[object Object],[object Object],[object Object],[object Object]
Anthony R. Stancl Circuit Court Commissioner Laura Florian Lau  “most horrific allegations she has reviewed in all her years on the bench.”  Posing as a female on Facebook makes contact asking for explicit photos Blackmailed some of the boys under the threat that the pictures would be released to the rest of the high school. Threatens harm to family members  According to criminal complaints filed:
Anthony R. Stancl According to reports 300 naked photos and movie clips of New Berlin boys and another 600 professionally made pornographic movies of children were found on the computer. "The defendant is facing 293 years if convicted on these 12 counts. . . . This crime allegedly involved many, many, many victims.”  Laura Florian Lau
The Last Stage The Face to Face Meeting
 
Mobile Devices The Internet no longer stops at your front door!
Mobile Devices ,[object Object],[object Object]
Mobile Devices ,[object Object],[object Object]
Mobile Devices                                                               Samsung debuted the  Galaxy Tab on Thursday , a portable
Mobile Devices Saved about 10 messages and the last 10 phone calls  Saves almost all received text messages, calls (in, out, and missed) “Google” searches, web browsing and even voice mails. Some phones even attach latitude and longitude to photos taken.
Mobile Devices Sexting Bullying A girl in Ohio was charged for sending nude photos of herself to classmates.  If convicted she could have to register as a sex offender for 20 years. Another concern now with cell phones. Some teens are bullying through repeated and hostile text messages.
Mobile Devices
Mobile Devices ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile Devices
Mobile Devices A 2009 Harris online poll shows that one in five teens admits to having sent naked pictures of themselves or others over a cell phone. But even that number may be low.  Hope Witsell took her life because she was being  bullied  and called a slut after she sexted her boyfriend with a topless picture of herself. Sexting Cyber Bullying
She sent nude pictures of herself to a boyfriend. When they broke up, he sent them to other high school girls. The girls were harassing her, calling her a slut and a whore. She was miserable and depressed, afraid even to go to school. Mobile Devices February 15, 1990 – July 3, 2008 Jessie Logan
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object],[object Object],Kids One has nothing to do with the other Mobile computer Lying is not a big deal They are not monitored (parents just think we are) Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object],[object Object],Source: The Massachusetts Aggression Reduction Center
Cyber Bullying So what should we tell kids who are victims of bullying? •     It’s not your fault, and you haven’t done anything wrong.   •     Let’s separate.   (Mediation is the wrong approach, bullies are not  motivated to help change happen.) •     Talk to us!  Find a safe adult to talk to about what’s  happening . Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object],Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],[object Object],Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object],Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],[object Object]
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object],Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object],19% of male students say they have bullied online and 54% of female students say they have bullied online Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],[object Object],Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],Source: The Massachusetts Aggression Reduction Center
Teen charged with using MySpace to intimidate ACGC teacher, students (Gretchen Schlosser) West Central Tribune Published Saturday, November 17, 2007 OLIVIA — Charges have been filed against a 17-year-old Olivia teen who allegedly hacked into another teenager’s MySpace. com account and used it to threaten students and a teacher at Atwater-Cosmos-Grove City High School. Meeker County Sheriff’s deputies were called to the high school on Oct. 10 to investigate the threats.
When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. "It is absolutely vile,“ her mother said.   ABC News
When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. "It is absolutely vile,“ her mother said.   ABC News
Resources for Parents
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
On-/Offline Activities  Safety Pledges  Internet Safety News www.NetSmartzKids.org Amy's   Choice  Julie's Journey  Tracking Teresa  Teens PSA: "Promises"
WebWiseKids ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
 
 
 
 
 
 
 
Protect yourself with Free Stuff!!
 
 
 
Operating Systems Windows 7
Windows Live
 
The Future In New Hampshire ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Student Mentor Program  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Future In New Hampshire ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Help Fund BeNetSafe.Org Help Fund BeNetSafe.Org
Get us a penny!
Since February 2000 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How do you contact us? Currently the best way is by e-mail.  Send any and all questions and requests to Info@BeNetSafe.Org Events are listed at www.BeNetSafe.org.  BeNetSafe.Org SM
BE NET SAFE .ORG SM

Mais conteúdo relacionado

Mais procurados

Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpumajcullishpum
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineMichael Heron
 
Grade 9 Informative Writing, Journalistic Writing and Literary Writing
Grade 9 Informative Writing, Journalistic Writing and Literary WritingGrade 9 Informative Writing, Journalistic Writing and Literary Writing
Grade 9 Informative Writing, Journalistic Writing and Literary WritingTalugtug National High School
 
What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?CyberSafeFamily
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
 
Social Media and Cyberbullying
Social Media and CyberbullyingSocial Media and Cyberbullying
Social Media and CyberbullyingIsobar Australia
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersSWEET SPOT ACADEMY
 
Willow pk 2011
Willow pk 2011Willow pk 2011
Willow pk 2011Bitbuzz
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Resultsa2columnd12
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social mediaevieasmedia
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsus22
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 

Mais procurados (20)

Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
 
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´MooreCyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
 
Grade 9 Informative Writing, Journalistic Writing and Literary Writing
Grade 9 Informative Writing, Journalistic Writing and Literary WritingGrade 9 Informative Writing, Journalistic Writing and Literary Writing
Grade 9 Informative Writing, Journalistic Writing and Literary Writing
 
Unfriending on Facebook
Unfriending on FacebookUnfriending on Facebook
Unfriending on Facebook
 
Web pp
Web ppWeb pp
Web pp
 
What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Social Media and Cyberbullying
Social Media and CyberbullyingSocial Media and Cyberbullying
Social Media and Cyberbullying
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital Leaders
 
Web pp
Web ppWeb pp
Web pp
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Willow pk 2011
Willow pk 2011Willow pk 2011
Willow pk 2011
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Results
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Be a well aware mom !
Be a well aware mom !Be a well aware mom !
Be a well aware mom !
 
Facebook- Women- Smoking
Facebook- Women- SmokingFacebook- Women- Smoking
Facebook- Women- Smoking
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 

Destaque

Educate A Child, Transform the World
Educate A Child, Transform the WorldEducate A Child, Transform the World
Educate A Child, Transform the WorldJeffrey Lawrence
 
Cp intro en
Cp intro enCp intro en
Cp intro enfapac
 
Each one teach one
Each one teach oneEach one teach one
Each one teach onemirackle9
 
Raising Children - Ephesians 6:1-4
Raising Children - Ephesians 6:1-4Raising Children - Ephesians 6:1-4
Raising Children - Ephesians 6:1-4David Turner
 
TEDx - How Will I Educate My Children?
TEDx - How Will I Educate My Children?TEDx - How Will I Educate My Children?
TEDx - How Will I Educate My Children?Josh Steimle
 
7 Tips for Parents - #LeanInTogether
7 Tips for Parents - #LeanInTogether7 Tips for Parents - #LeanInTogether
7 Tips for Parents - #LeanInTogetherLean In
 
Young Cannes Lions_1_2017_Client presentation
Young Cannes Lions_1_2017_Client presentationYoung Cannes Lions_1_2017_Client presentation
Young Cannes Lions_1_2017_Client presentationAnna Shutova
 
Brand vs. Campaign or Brand + Campaign ?
Brand vs. Campaign or Brand + Campaign ?Brand vs. Campaign or Brand + Campaign ?
Brand vs. Campaign or Brand + Campaign ?Ologie
 
Educate the Girl Child
Educate the Girl ChildEducate the Girl Child
Educate the Girl ChildKshitiz Anand
 
women's education
women's educationwomen's education
women's educationtittuajay
 
Multimedia project
Multimedia projectMultimedia project
Multimedia projectSavanna Lass
 
Young Cannes Lions_2_2017
Young Cannes Lions_2_2017Young Cannes Lions_2_2017
Young Cannes Lions_2_2017Anna Shutova
 
Young Cannes Lions_3_2017_Client presentation
Young Cannes Lions_3_2017_Client presentationYoung Cannes Lions_3_2017_Client presentation
Young Cannes Lions_3_2017_Client presentationAnna Shutova
 
Young Cannes Lions_4_PR_2017
Young Cannes Lions_4_PR_2017Young Cannes Lions_4_PR_2017
Young Cannes Lions_4_PR_2017Anna Shutova
 
The Top 10 Most Remarkable Marketing Campaigns EVER
The Top 10 Most Remarkable Marketing Campaigns EVERThe Top 10 Most Remarkable Marketing Campaigns EVER
The Top 10 Most Remarkable Marketing Campaigns EVERHubSpot
 

Destaque (18)

Viral Ads
Viral AdsViral Ads
Viral Ads
 
A New Partnership with Parents
A New Partnership with ParentsA New Partnership with Parents
A New Partnership with Parents
 
Educate A Child, Transform the World
Educate A Child, Transform the WorldEducate A Child, Transform the World
Educate A Child, Transform the World
 
Cp intro en
Cp intro enCp intro en
Cp intro en
 
Each one teach one
Each one teach oneEach one teach one
Each one teach one
 
Raising Children - Ephesians 6:1-4
Raising Children - Ephesians 6:1-4Raising Children - Ephesians 6:1-4
Raising Children - Ephesians 6:1-4
 
TEDx - How Will I Educate My Children?
TEDx - How Will I Educate My Children?TEDx - How Will I Educate My Children?
TEDx - How Will I Educate My Children?
 
7 Tips for Parents - #LeanInTogether
7 Tips for Parents - #LeanInTogether7 Tips for Parents - #LeanInTogether
7 Tips for Parents - #LeanInTogether
 
Young Cannes Lions_1_2017_Client presentation
Young Cannes Lions_1_2017_Client presentationYoung Cannes Lions_1_2017_Client presentation
Young Cannes Lions_1_2017_Client presentation
 
Brand vs. Campaign or Brand + Campaign ?
Brand vs. Campaign or Brand + Campaign ?Brand vs. Campaign or Brand + Campaign ?
Brand vs. Campaign or Brand + Campaign ?
 
Educate the Girl Child
Educate the Girl ChildEducate the Girl Child
Educate the Girl Child
 
women's education
women's educationwomen's education
women's education
 
Multimedia project
Multimedia projectMultimedia project
Multimedia project
 
Young Cannes Lions_2_2017
Young Cannes Lions_2_2017Young Cannes Lions_2_2017
Young Cannes Lions_2_2017
 
Young Cannes Lions_3_2017_Client presentation
Young Cannes Lions_3_2017_Client presentationYoung Cannes Lions_3_2017_Client presentation
Young Cannes Lions_3_2017_Client presentation
 
Young Cannes Lions_4_PR_2017
Young Cannes Lions_4_PR_2017Young Cannes Lions_4_PR_2017
Young Cannes Lions_4_PR_2017
 
ILLITERACY
ILLITERACY ILLITERACY
ILLITERACY
 
The Top 10 Most Remarkable Marketing Campaigns EVER
The Top 10 Most Remarkable Marketing Campaigns EVERThe Top 10 Most Remarkable Marketing Campaigns EVER
The Top 10 Most Remarkable Marketing Campaigns EVER
 

Semelhante a 102010a

Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetysharon7111
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Disadvantages of Social Networking
Disadvantages of Social NetworkingDisadvantages of Social Networking
Disadvantages of Social NetworkingAshwin Agarwal
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposiumkschermerhorn
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Internet Safety MU version
Internet Safety MU versionInternet Safety MU version
Internet Safety MU versionSteven Knight
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 

Semelhante a 102010a (20)

Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Disadvantages of Social Networking
Disadvantages of Social NetworkingDisadvantages of Social Networking
Disadvantages of Social Networking
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposium
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Internet Safety MU version
Internet Safety MU versionInternet Safety MU version
Internet Safety MU version
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 

Último

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Último (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

102010a

  • 1. BE NET SAFE .ORG SM
  • 2.  
  • 3.
  • 4.
  • 5. Online “Predators” and Their Victims Myths, Realities, and Implications for Prevention and Treatment February–March 2008 American Psychologist Janis Wolak, David Finkelhor, and Kimberly J. Mitchell, Crimes against Children Research Center and Family Research Laboratory, University of New Hampshire; Michele L. Ybarra, Internet Solutions for Kids, Inc., Santa Ana, California. The article outlined 9 risky on-line behaviors ● Posting personal information online, 56% of youth Internet users ● Interacting online with unknown people, 43% ● Having unknown people on a buddy list, 35% ● Using the Internet to make rude and nasty comments to others, 28% ● Sending personal information to unknown people met online, 26% ● Downloading images from file-sharing programs, 15% ● Visiting X-rated sites on purpose, 13% ● Using the Internet to embarrass or harass people youths are mad at, 9% ● Talking online to unknown people about sex, 5%
  • 6.
  • 7.
  • 8.
  • 9. Other Information Favorite Color: Screen Name: Favorite Band: Favorite Movie: Favorite Show: Your Car: Your Hometown: Your Present Town: Your Crushes First Name: Your Grade: Your Style: What is Your Name? How old are you? Eye color? Shoe Size? Hair color? Height? Weight? Favorite: Food? Drink? Movie? Music Band? Animal? Sport? What is the link to your website, blog, or myspace? Place to live? Subject? Stuff...... Best thing that happened to you in the last few years? Do you want to get married? Kids? Best place to go on a date? What is your dream? What do you want to do when you grow up? Play an instrument? List 5 things (inc. brand) you are wearing right now Friends.... Friend you have known the longest? Best friend(s)? Friend that makes you laugh the most? Friend who you can talk to anything about? Friend with the best personality? Last friend to call you? Last friend to talk to you? Last friend you hung out with? Last friend you went to a movie with? Last friend to make you laugh? Most memorable experience with a friend? Anything you plan to do with friends when you get older? Any trips planned with friends? Ever traveled anywhere? What places do you want to visit? Where do you want to live when you're older? How happy are you with where you are in life? Why? What's your most embarrassing moment? Do you have any art or pictures on your walls? Describe it.
  • 10. Social Networking Sites But I made my site PRIVATE!!!
  • 11. Social Networking Sites Facebook signs up 100,000 new users every day. Including one 'Freddi Staur' (an anagram of 'ID Fraudster’) The big test of 2007! a world leader in IT security and control
  • 12. Social Networking Sites Research shows that 41 percent of users, more than two in five, will divulge personal information - such as email address, date of birth and phone number - to a complete stranger, or at least to Freddi Staur.
  • 13. Social Networking Sites 43 percent of users contacted responded to Freddi. 41 percent of those approached leaked personal information.
  • 14. Social Networking Sites 87 percent of respondents provided details about their education or workplace. 84 percent of respondents listed their full date of birth. 78 percent of respondents listed their current address or location. 72 percent of respondents divulged one or more email address. 26 percent of respondents provided their instant messaging screen name. 23 percent of respondents listed their current phone number.
  • 15. Social Networking Sites In the majority of cases, Freddi was able to gain access to respondents’ photos of family and friends, information about likes and dislikes, hobbies, employer details and other personal facts. Many users also disclosed the names of their spouses/partners, several included their complete résumés, while one user even divulged his mother's maiden name.
  • 16.
  • 17. Social Networking Sites UPDATE 2009 Sophos created two female Australian Facebook users, Daisy Feletin (21, single) and Dinette Stonily (56, married). Each sent a friend request to 100 randomly-selected contacts in their age group, and waited two weeks to see who would respond.
  • 18. Social Networking Sites UPDATE 2009 Daisy Dinette Freddie Friends accepting 46% 41% 43% Full/Partial d.o.b 98% 92% 84% Email address 100% 88% 72% College or workplace 74% 22% 87% Phone number 7% 23% 23% IM screen name 13% 18% 26%
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Anthony R. Stancl Circuit Court Commissioner Laura Florian Lau “most horrific allegations she has reviewed in all her years on the bench.” Posing as a female on Facebook makes contact asking for explicit photos Blackmailed some of the boys under the threat that the pictures would be released to the rest of the high school. Threatens harm to family members According to criminal complaints filed:
  • 26. Anthony R. Stancl According to reports 300 naked photos and movie clips of New Berlin boys and another 600 professionally made pornographic movies of children were found on the computer. "The defendant is facing 293 years if convicted on these 12 counts. . . . This crime allegedly involved many, many, many victims.” Laura Florian Lau
  • 27. The Last Stage The Face to Face Meeting
  • 28.  
  • 29. Mobile Devices The Internet no longer stops at your front door!
  • 30.
  • 31.
  • 32. Mobile Devices                                                               Samsung debuted the Galaxy Tab on Thursday , a portable
  • 33. Mobile Devices Saved about 10 messages and the last 10 phone calls Saves almost all received text messages, calls (in, out, and missed) “Google” searches, web browsing and even voice mails. Some phones even attach latitude and longitude to photos taken.
  • 34. Mobile Devices Sexting Bullying A girl in Ohio was charged for sending nude photos of herself to classmates. If convicted she could have to register as a sex offender for 20 years. Another concern now with cell phones. Some teens are bullying through repeated and hostile text messages.
  • 36.
  • 38. Mobile Devices A 2009 Harris online poll shows that one in five teens admits to having sent naked pictures of themselves or others over a cell phone. But even that number may be low. Hope Witsell took her life because she was being bullied and called a slut after she sexted her boyfriend with a topless picture of herself. Sexting Cyber Bullying
  • 39. She sent nude pictures of herself to a boyfriend. When they broke up, he sent them to other high school girls. The girls were harassing her, calling her a slut and a whore. She was miserable and depressed, afraid even to go to school. Mobile Devices February 15, 1990 – July 3, 2008 Jessie Logan
  • 40.
  • 41.
  • 42.
  • 43. Cyber Bullying So what should we tell kids who are victims of bullying? •     It’s not your fault, and you haven’t done anything wrong.  •     Let’s separate.  (Mediation is the wrong approach, bullies are not motivated to help change happen.) •    Talk to us!  Find a safe adult to talk to about what’s happening . Source: The Massachusetts Aggression Reduction Center
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52. Teen charged with using MySpace to intimidate ACGC teacher, students (Gretchen Schlosser) West Central Tribune Published Saturday, November 17, 2007 OLIVIA — Charges have been filed against a 17-year-old Olivia teen who allegedly hacked into another teenager’s MySpace. com account and used it to threaten students and a teacher at Atwater-Cosmos-Grove City High School. Meeker County Sheriff’s deputies were called to the high school on Oct. 10 to investigate the threats.
  • 53. When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. "It is absolutely vile,“ her mother said. ABC News
  • 54. When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. "It is absolutely vile,“ her mother said. ABC News
  • 56.
  • 57. On-/Offline Activities Safety Pledges Internet Safety News www.NetSmartzKids.org Amy's Choice Julie's Journey Tracking Teresa Teens PSA: "Promises"
  • 58.
  • 59.  
  • 60.  
  • 61.  
  • 62.  
  • 63.  
  • 64.  
  • 65.  
  • 66.  
  • 67.  
  • 68.  
  • 69. Protect yourself with Free Stuff!!
  • 70.  
  • 71.  
  • 72.  
  • 75.  
  • 76.
  • 77.
  • 78.
  • 79. Get us a penny!
  • 80.
  • 81. How do you contact us? Currently the best way is by e-mail. Send any and all questions and requests to Info@BeNetSafe.Org Events are listed at www.BeNetSafe.org. BeNetSafe.Org SM
  • 82. BE NET SAFE .ORG SM