Your SlideShare is downloading. ×
0
Online preditors
Online preditors
Online preditors
Online preditors
Online preditors
Online preditors
Online preditors
Online preditors
Online preditors
Online preditors
Online preditors
Online preditors
Online preditors
Online preditors
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Online preditors

843

Published on

by Carol Bleskoski, a student of JUS394, IT & Social Justice, at ASU.

by Carol Bleskoski, a student of JUS394, IT & Social Justice, at ASU.

Published in: Technology, Sports
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
843
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. online preditors By Carol Bleskoski
  • 2. Do you think your alone? <ul><li>According to the company Pandora Recovery, every time you go online, you may be watched by any kind of online predators. They watch and wait until it’s time to strike. This kind of predator can steal any sort of information from you. Or, they can send a virus to your computer attach to any e-mail, web site, etc. These virus’s can corrupt your entire computer and anything on it, and cost you an untold amount of money to repair your computer, or lose valuable information you’ve stored on your computer. Therefore, whenever you go online remember, you may be victimized by any sort of predator. Never assume your alone. </li></ul>
  • 3. Goal and Objective <ul><li>State the desired goal </li></ul><ul><li>State the desired objective </li></ul><ul><li>Use multiple points if necessary </li></ul>
  • 4. Some Statistics <ul><li>1 in 5 U.S. teens who regularly log on to the Internet say they have received an unwanted sexual solicitation via the Web. </li></ul><ul><li>25% of children have been exposed to unwanted pornographic material. </li></ul><ul><li>Only 1/3 of households with Internet access are actively protecting their children with filtering or blocking software. </li></ul><ul><li>75% of children are willing to share personal information. </li></ul><ul><li>Only approximately 25% of children who encountered a sexual approach or solicitation told a parent or adult. </li></ul><ul><li>1 in 33 youth received an aggressive sexual solicitation in the past year . </li></ul><ul><li>77% of the targets for online predators were age 14 or older. Another 22% were users ages 10-13. </li></ul>
  • 5. HR 5319 <ul><li>Because of the Patriot Act, in 2006 legislators came up with the Deleting Online Predators Act (DOPA) which would seek to keep students away from on-line predators by blocking all sites with any interactivity in schools and libraries. Even though this bill would stop on-line stalking, it also defeats the purpose of any site being an educational tool. </li></ul>
  • 6.  
  • 7.  
  • 8. Police Sting Operations <ul><li>Police in virtually every state set up sting operations to arrest and convict on-line predators. Posing as young boys or girls to attract child molesters on-line. Once the conversation has begun, the predator can urge young boys or girls into a private chat room and within a short period of time, can get the child’s name, address, school, etc. It doesn’t take long for a true predator to prey upon their victim and set up a meeting place where any number of things can happen to a child. Perhaps sex, kidnapping, torture, even killing their victim. </li></ul>
  • 9. My Space, Facebook
  • 10.  
  • 11.  
  • 12. Please stay safe while online <ul><li>Know who your talking to </li></ul><ul><li>Don’t give out personal information </li></ul><ul><li>When you turn off your computer and you get the message, “there are other people using your terminal, are you sure you want to shut down?” Think about it, are you really alone on your computer? </li></ul><ul><li>Don’t be afraid to turn someone in if you suspect they are a threat. </li></ul>
  • 13. Any Questions ?
  • 14. Thank you for your attention <ul><ul><ul><ul><ul><li>Happy </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Cyber-surfing! </li></ul></ul></ul></ul></ul>

×