2. CONTENTS
ā¢ Internet Addiction
ā¢ Symptoms of Internet Addiction
ā¢ Addictive Games
ā¢ Blue Whale
ā¢ Blue Whale History
ā¢ Blue Whale Game Signs
ā¢ Parental Control
ā¢ Affected Countries
ā¢ Targeted Social Networks
ā¢ Internet Privacy & Safety Setting for Kids
Designed by:
Adil Awan
3. INTERNET ADDICTION
ā¢ A typical use of the internet that causes the
psychological, social, educational, or
occupational problems for the people.
Students need the internet more than other
people due to their educational or research
needs.
ā¢ Internet addiction disorder (IAD)
ā¢ Internet gaming disorder (IGD).
Designed by:
Adil Awan
4. SYMPTOMS OF INTERNET ADDICTION
DISORDER
ā¢ Depression
ā¢ Dishonesty
ā¢ Feelings of guilt
ā¢ Anxiety
ā¢ Feelings of Euphoria
when using the
Computer
ā¢ Inability to Prioritize or
Keep Schedules
ā¢ Isolation
ā¢ No Sense of Time
ā¢ Defensiveness
ā¢ Avoidance of Work
ā¢ Agitation
ā¢ Mood Swings
ā¢ Fear
ā¢ Loneliness
Designed by:
Adil Awan
5. PHYSICAL SYMPTOMS OF INTERNET
ADDICTION DISORDER
ā¢ Backache
ā¢ Headaches
ā¢ Insomnia
ā¢ Poor Nutrition
ā¢ Poor Personal Hygiene (e.g., not bathing to stay
online)
ā¢ Neck Pain
ā¢ Dry Eyes and other Vision Problems
ā¢ Weight Gain or Loss Designed by:
Adil Awan
6. MOST ADDICTIVE GAMES FOR
ANDROID
ā¢ Crossy Roads
ā¢ PAC-MAN 256
ā¢ Piano Tiles 2 (Donāt Tap the White Tile)
ā¢ Clash of Clans
ā¢ Plants vs. Zombies 2
ā¢ Smash Hit
ā¢ Swing Copters 2
ā¢ Subway Surfers
ā¢ Vainglory
ā¢ Altoās Adventure
Designed by:
Adil Awan
7. MOST ADDICTIVE GAMES FOR
XBOX
ā¢ Mass Effect 3
ā¢ Modern Warfare 2
ā¢ Assassin's Creed Revelations
ā¢ Fifa 11 for XBOX 360
ā¢ Gears of War 2. ...
ā¢ Grand Theft Auto 4. ...
ā¢ WWE Smack down Vs. ...
ā¢ Mortal Kombat Vs DC universe.
Designed by:
Adil Awan
8. WHAT IS THE BLUE WHALE GAME?
ā¢ The blue Whale Challenger consists of a daily
sequence of 50 tasks, the objective is to make the
victim commit suicide
ā¢ The challenges are sent daily to the victim by a
healer/moderator/administrator
ā¢ These tasks range from something simple such as
producing mere drawings
ā¢ such as self mutilation or crimes against third
persons.
Designed by:
Adil Awan
9. HISTORY
ā¢ The term "Blue Whale" is said to come from the
phenomenon of beached whales.
ā¢ Blue Whale Game began in Russia in 2013 with
"F57", one of the names of the so-called "death
group" of the VKontakte social network
Designed by:
Adil Awan
10. PHILIPP BUDEIKIN
ā¢ Philipp Budeikin, a former psychology student who was
expelled from his university, claimed that he invented the
game, stating his purpose was to 'cleanse' society by
pushing to suicide those he deemed as having no value
ā¢ In Russia in 2016, Blue Whale came into broader use among
teenagers after a journalist brought attention to it through
an article that linked many unrelated suicide victims to the
Blue Whale, creating a wave of moral panic in Russia. Later,
Budeikin was arrested and plead guilty to "inciting at least
16 teenage girls to commit suicideā Designed by:
Adil Awan
11. HOW IS A PERSON INVITED TO JOIN
AND PRESSURIZED TO STAY?
ā¢ Joining is initially made through conversations on social networks, where the game
is presented and proposed by so called āfriendsā
ā¢ After this, an administrator validates the acceptance of the victim who has been
āinvitedā and integrates him/her in an application, by conversation through
WhatsApp, through which they interact.
ā¢ The healer/moderator pretends to be interested and understanding of how the
victim feels, offering him/her the possibility of undertaking various tasks in order
to build esteem and feel valued.
ā¢ In truth he is only fooling the victim, involving the victim in a lie, which is physically
auto-destructive and psychologically leading to a breakdown.
Designed by:
Adil Awan
12. BLUE WHALE GAMER SIGNS
ā¢ Teachers, parents and friends need to be aware of this game
and any signs that a person maybe participating in these 50
challenges.
ā¢ Signs are:
o āInscriptionsā in the palms of the hands
o Signs of self-mutilation on arms, legs and lips
o Undertaking unexplained activities late at night or early
hours
o Becoming exposed to danger in areas such as high places
o Taking an interest in the design of Blue Whales
o Remaining uncommunicative for excessively long periods
ā¢ If any of the above are apparent parents should discuss with
school teacher or school psychologist If needed. Designed by:
Adil Awan
13. AFFECTED COUNTRIES
ā¢ Argentina
ā¢ Brazil
ā¢ Bulgaria
ā¢ Chile
ā¢ China
ā¢ India
ā¢ Italy
ā¢ Kenya
ā¢ Portugal
ā¢Pakistan
ā¢Russia
ā¢Saudi Arabia
ā¢Serbia
ā¢Spain
ā¢Turkey
ā¢United States
On September 13, 2017, Pakistan
reported it's first two victims from
the province of KPK.
Designed by:
Adil Awan
14. PARENTS CHECKLIST:
ā¢ Keep your eyes open to the latest internet trends; especially fads among
teens. There should be greater supervision and monitoring of children's
activities on the Internet and social networks;
ā¢ It is also important that parents warn children about the risks of adding
strangers and recommend that only family, friends and school people be
on the social network friends list;
ā¢ Most importantly is to encourage dialogue and discussion in the family
about the issues related to security, privacy dangers regarding the internet
in order to promote greater knowledge on the part of children and young
people. In case you find that your child is playing the Blue Whale
Challenge, Talk to school authorities and also consult a psychologist to
help your child return to the fold of normalcy.
Designed by:
Adil Awan
15. ADVICE FOR PARENTS/CARERS
ā¢ Ask them to show you which social media
apps they use and what they like about them.
ā¢ Talk about how they use them and what
makes them so engaging.
ā¢ Explain how you can use privacy settings to
make sure only approved friends can see posts
& images.
Designed by:
Adil Awan
16. ADVICE FOR PARENTS/CARERS
ā¢ Check if any of their apps have āgeo-locationā
enabled, sharing their location unintentionally.
ā¢ Show them how to report offensive comments
or block people who upset them.
ā¢ Also, get peopleās consent before sharing photos.
ā¢ Encourage your child to come and talk to you if
they see anything that upsets them.
Designed by:
Adil Awan
17. CHILDREN GOING ONLINE WITHOUT
PARENTAL CONTROL FILTERS
Would you take your child to be looked after by:
ā¢ Someone youāve never met
ā¢ Allow them to be picked up and taken to address you
donāt know
ā¢ Have no contact details for them in case of
emergency
ā¢ Leave the child to decide when they get back
Designed by:
Adil Awan
19. HI CALCULATOR
ā¢ Can hide your photos and videos behind a calculator. What
everyone can see is just an ordinary calculator. Until you type
in your pin
Designed by:
Adil Awan
20. TERMS AND CONDITIONS OF SOCIAL
NETWORKS
ā¢ Facebook, Whatās app, Instagram etc
automatically have a License to use photos
uploaded to their sites (till you delete your
account)
ā¢ Pictures uploaded to āthe cloudā are
permanent even if deleted from your own
device and/or account
ā¢ A trail of online activity is never deleted
Designed by:
Adil Awan
21. ā¢ YouTube Kids- It's free, simple to use, has
filters and easy security setting.
ONLINE SAFETY TIPS
Designed by:
Adil Awan
22. ā¢ Safe search engines ā a more family friendly
with built in filters
Designed by:
Adil Awan
23. ā¢ Use https before entering web details (hyper text
transfer protocol secure)
ā¢ Beware of TMI: Too Much Information ā never share
your birth date, home address or home phone no.
ā¢ Protect your passwords, PIN numbers, bank account
and credit card information
ā¢ Customise your privacy settings on social networking
sites
ā¢ Donāt use you real name on social networking sites
ā¢ Donāt share any personal details on open sites online
that you wouldnāt share openly offline
https
Designed by:
Adil Awan
24. PHISHING & TROJAN HORSE SCAMS
Phishing - This scam tricks people into providing personal
information by using fakeābut very official-lookingāemails
or web sites.
How to avoid - Donāt click links in emails that look official. And,
since banks and online shops will never request account or
login information in this way, you should never, ever pass it on
over the telephone or through an email or web site.
Designed by:
Adil Awan
25. PHISHING & TROJAN HORSE SCAMS
ā¢ Trojan Program - A Trojan is a program that secretly
installs itself on your computer in order to record
and send information from your computerālike
passwords or hack your computer to send out spam,
attack other computers by flooding them with
requests or to send itself to other potential victims.
ā¢ How to avoid - be extremely careful about what you
click or open online. You should never open
attachments that donāt come from verifiable sources
Designed by:
Adil Awan
26. ACRONYMS TEEN AGER USE ONLINE
ā¢ LMK - let me know
ā¢ PIR- parent in room
ā¢ (L)MIRL - Let's meet in real life
ā¢ 4COL - for crying out loud
ā¢ 143 - I love you
ā¢ YBS - youāll be sorry
ā¢ KPC- Keeping parents clueless
Designed by:
Adil Awan