This document discusses internet safety and strategies for coping with inappropriate online content and behavior. It covers topics like trusting others online and sharing too much personal information, as well as dealing with cyberbullying, grooming, and exposure to inappropriate websites. The document also describes signs that a child may be experiencing online abuse or using technology inappropriately. It suggests holding group discussions about examples of this and what individuals have done to address it. Finally, it discusses web monitoring software options for improving safety.
3. Agenda
Trust and Too much Information
Strategies to cope
Inappropriate Content
Cyberbullying
Internet connected devices
Social Media
Grooming
7
6
5
4
3
2
1
4. • Find someone you don’t know very well.
• Using conversational techniques – i.e. just
chatting…
– Find out their names
– Where they live
– And at least one other fact (such as musical
taste, hobby, do they have a dog etc).
Activity
5 mins or so
5. • How easy is it to develop trust?
• Do young people in general trust adults?
• How are vulnerable young people different
from main stream young people?
• How ‘tweets’, ‘status updates’, photos and
videos can reveal TMI
Too much Trust?
Or too much information (TMI)?
6. • Did you find out anything that could give
you some information about the person?
• Do you think you could find where they
lived?
• If you bumped into them again, would you
know what to talk about?
Feedback activity 1
7. • What can you tell about this profile page…
– Find out their name
– Where they live
– And at least one other fact (such as musical
taste, hobby, do they have a dog etc).
Activity 2
8.
9. • Did you find out anything that could give
you some information about the person?
• Do you think you could find where they
lived?
• If you bumped into them again, would you
know what to talk about?
Feedback activity 2
10. • Internet safety quiz
• Public wifi hotspots
• Use of gmail and facebook for voip calls
How much do you know?
11. • “Child pornography” is child abuse
• Hate speech and violent content
• Pro-Ana/ thinspiration/Self-Harm/Suicide
Websites and Blogs
• Online gaming and role play
Inappropriate content
17. A teenage girl is believed to have been found hanged just weeks after
posting a heartbreaking video on YouTube detailing her battle with cyber
bullies.
Amanda Todd, 15, was found dead at her home in Port Coquitlam, British
Columbia, Canada, on Wednesday in an apparent suicide.
28. Stage 1: Identifying a Possible Victim
Although paedophiles differ in their “type” regarding age, appearance and
gender, all paedophiles will look for a victim who seems in some way
vulnerable.
Stage 2: Collecting Information
The next step is for the paedophile to collect as much information on the
targeted victim as possible. This is most commonly done through casual
conversations with both the child and the parents or caretaker.
Stage 3: Filling a Need
Once the individual has the information he needs, he then becomes part of the
child’s life by filling a need. If the victim is poor, for example he will act as a
friend/confidante.
Grooming
29. Stage 4: Lowering Inhibitions
The paedophile will then start to lower the child’s inhibitions concerning sexual
matters. He may come up with games or activities that involve getting
undressed, make sexual comments or show the child pornographic images or
pictures. Using films like Ted are commonplace. This can be a long term
process
Stage 5: Initiating the Abuse
At this final stage, the paedophile begins to sexually abuse the child. This can
take many forms, a common one is just watch a child doing something or even
just take pleasure in the knowledge the child is under their control in some way.
Grooming
30. • The signs that a child is being abused, or
is using technology in an inappropriate
manner can be quite hard to spot at first
but there is nothing new in the outcomes.
• Fortunately you don’t have to be technical
to deal with most of these outcomes but
we will discuss software approaches later
Signs:
31. • Can you think of examples of where young
people have used technology in an
inappropriate way?
• What did you do?
• Did it work?
• Discuss in twos and threes.
Activity 3
10 mins max
32. • Net nanny
• cyber patrol
• qustodio
Web monitoring software
37. • Advice received from social workers…
– Make them turn off their phone
– Ban them from the internet
– Don’t let them use facebook
– Tell them not to contact family members
– Delete texts with inappropriate people and
block them on facebook
And finally…
A little humour…LOL