SlideShare a Scribd company logo
1 of 38
Cameron Furnival cameronfurnival@live.co.uk
Foster Care Associates:
Core Assets 2014
Internet Safety
Agenda
Trust and Too much Information
Strategies to cope
Inappropriate Content
Cyberbullying
Internet connected devices
Social Media
Grooming
7
6
5
4
3
2
1
• Find someone you don’t know very well.
• Using conversational techniques – i.e. just
chatting…
– Find out their names
– Where they live
– And at least one other fact (such as musical
taste, hobby, do they have a dog etc).
Activity
5 mins or so
• How easy is it to develop trust?
• Do young people in general trust adults?
• How are vulnerable young people different
from main stream young people?
• How ‘tweets’, ‘status updates’, photos and
videos can reveal TMI
Too much Trust?
Or too much information (TMI)?
• Did you find out anything that could give
you some information about the person?
• Do you think you could find where they
lived?
• If you bumped into them again, would you
know what to talk about?
Feedback activity 1
• What can you tell about this profile page…
– Find out their name
– Where they live
– And at least one other fact (such as musical
taste, hobby, do they have a dog etc).
Activity 2
• Did you find out anything that could give
you some information about the person?
• Do you think you could find where they
lived?
• If you bumped into them again, would you
know what to talk about?
Feedback activity 2
• Internet safety quiz
• Public wifi hotspots
• Use of gmail and facebook for voip calls
How much do you know?
• “Child pornography” is child abuse
• Hate speech and violent content
• Pro-Ana/ thinspiration/Self-Harm/Suicide
Websites and Blogs
• Online gaming and role play
Inappropriate content
• thinspiration
So jealous….
Self harm…
A teenage girl is believed to have been found hanged just weeks after
posting a heartbreaking video on YouTube detailing her battle with cyber
bullies.
Amanda Todd, 15, was found dead at her home in Port Coquitlam, British
Columbia, Canada, on Wednesday in an apparent suicide.
Gaming and online role
play
SMS texting whatsapp
snapchat sexting etc
SMS
• Facebook
• Askfm
– Swedish
politicians block
Ask.fm
Cyberbullying
Snapchat
…its ok as it only exists for 10 seconds….
Stage 1: Identifying a Possible Victim
Although paedophiles differ in their “type” regarding age, appearance and
gender, all paedophiles will look for a victim who seems in some way
vulnerable.
Stage 2: Collecting Information
The next step is for the paedophile to collect as much information on the
targeted victim as possible. This is most commonly done through casual
conversations with both the child and the parents or caretaker.
Stage 3: Filling a Need
Once the individual has the information he needs, he then becomes part of the
child’s life by filling a need. If the victim is poor, for example he will act as a
friend/confidante.
Grooming
Stage 4: Lowering Inhibitions
The paedophile will then start to lower the child’s inhibitions concerning sexual
matters. He may come up with games or activities that involve getting
undressed, make sexual comments or show the child pornographic images or
pictures. Using films like Ted are commonplace. This can be a long term
process
Stage 5: Initiating the Abuse
At this final stage, the paedophile begins to sexually abuse the child. This can
take many forms, a common one is just watch a child doing something or even
just take pleasure in the knowledge the child is under their control in some way.
Grooming
• The signs that a child is being abused, or
is using technology in an inappropriate
manner can be quite hard to spot at first
but there is nothing new in the outcomes.
• Fortunately you don’t have to be technical
to deal with most of these outcomes but
we will discuss software approaches later
Signs:
• Can you think of examples of where young
people have used technology in an
inappropriate way?
• What did you do?
• Did it work?
• Discuss in twos and threes.
Activity 3
10 mins max
• Net nanny
• cyber patrol
• qustodio
Web monitoring software
qustodio
Qustodio
Qustodio
• Advice received from social workers…
– Make them turn off their phone
– Ban them from the internet
– Don’t let them use facebook
– Tell them not to contact family members
– Delete texts with inappropriate people and
block them on facebook
And finally…
A little humour…LOL 
THANK YOU!
Cameron Furnival
cameronfurnival@live.co.uk
Your Logo

More Related Content

What's hot

Keeping our kids e safe parents no animation
Keeping our kids e safe parents no animationKeeping our kids e safe parents no animation
Keeping our kids e safe parents no animationCheshire County Council
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slidesguest7e2cdf
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital CitizensJason Rushing
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying projectvolpila
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingMarc Kuhn
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsLeon Letkeman
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Internet Safety for families
Internet Safety for familiesInternet Safety for families
Internet Safety for familiesScott Burnett
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying jun ijan
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211Saedah
 

What's hot (19)

Keeping our kids e safe parents no animation
Keeping our kids e safe parents no animationKeeping our kids e safe parents no animation
Keeping our kids e safe parents no animation
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slides
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online Safety
Online SafetyOnline Safety
Online Safety
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying project
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School Students
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Internet Safety for families
Internet Safety for familiesInternet Safety for families
Internet Safety for families
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211
 
Safety @ Cyber
Safety @ CyberSafety @ Cyber
Safety @ Cyber
 
Internet savety
Internet savetyInternet savety
Internet savety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 

Viewers also liked

Technology Tools for School Libraries
Technology Tools for School LibrariesTechnology Tools for School Libraries
Technology Tools for School LibrariesLisa Koch
 
10 ways to crank up your infographic design & productivity
10 ways to crank up your infographic design & productivity10 ways to crank up your infographic design & productivity
10 ways to crank up your infographic design & productivityEasel.ly
 
How to Include Clickable Links on Slideshare Presentation
How to Include Clickable Links on Slideshare PresentationHow to Include Clickable Links on Slideshare Presentation
How to Include Clickable Links on Slideshare PresentationDavid Laubner
 
Quick & Dirty Tips for : Better PowerPoint Presentations Faster
Quick & Dirty Tips for : Better PowerPoint Presentations FasterQuick & Dirty Tips for : Better PowerPoint Presentations Faster
Quick & Dirty Tips for : Better PowerPoint Presentations FasterEugene Cheng
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheLeslie Samuel
 

Viewers also liked (6)

Technology Tools for School Libraries
Technology Tools for School LibrariesTechnology Tools for School Libraries
Technology Tools for School Libraries
 
10 ways to crank up your infographic design & productivity
10 ways to crank up your infographic design & productivity10 ways to crank up your infographic design & productivity
10 ways to crank up your infographic design & productivity
 
How to Include Clickable Links on Slideshare Presentation
How to Include Clickable Links on Slideshare PresentationHow to Include Clickable Links on Slideshare Presentation
How to Include Clickable Links on Slideshare Presentation
 
The Ultimate Freebies Guide for Presentations by @damonify
The Ultimate Freebies Guide for Presentations by @damonifyThe Ultimate Freebies Guide for Presentations by @damonify
The Ultimate Freebies Guide for Presentations by @damonify
 
Quick & Dirty Tips for : Better PowerPoint Presentations Faster
Quick & Dirty Tips for : Better PowerPoint Presentations FasterQuick & Dirty Tips for : Better PowerPoint Presentations Faster
Quick & Dirty Tips for : Better PowerPoint Presentations Faster
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Similar to Internet Safety Strategies for Foster Care

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationspringvillegi
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the HomeScott Burnett
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitationmckenln
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?Sarah Welstead
 
Social Media101 V5
Social Media101 V5Social Media101 V5
Social Media101 V5KimBenedict
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the HomeScott Burnett
 
#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parents#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parentsKSHB
 
Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.Bex Lewis
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineLuciusonSecurity
 

Similar to Internet Safety Strategies for Foster Care (20)

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
What Parents Should Know
What Parents Should KnowWhat Parents Should Know
What Parents Should Know
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitation
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
Social Media101 V5
Social Media101 V5Social Media101 V5
Social Media101 V5
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parents#KCSafeOnline: A free forum about online safety for parents
#KCSafeOnline: A free forum about online safety for parents
 
Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Internet Safety St Mary's Wollongong
Internet Safety St Mary's WollongongInternet Safety St Mary's Wollongong
Internet Safety St Mary's Wollongong
 

Recently uploaded

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 

Recently uploaded (20)

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 

Internet Safety Strategies for Foster Care

  • 1. Cameron Furnival cameronfurnival@live.co.uk Foster Care Associates: Core Assets 2014 Internet Safety
  • 2.
  • 3. Agenda Trust and Too much Information Strategies to cope Inappropriate Content Cyberbullying Internet connected devices Social Media Grooming 7 6 5 4 3 2 1
  • 4. • Find someone you don’t know very well. • Using conversational techniques – i.e. just chatting… – Find out their names – Where they live – And at least one other fact (such as musical taste, hobby, do they have a dog etc). Activity 5 mins or so
  • 5. • How easy is it to develop trust? • Do young people in general trust adults? • How are vulnerable young people different from main stream young people? • How ‘tweets’, ‘status updates’, photos and videos can reveal TMI Too much Trust? Or too much information (TMI)?
  • 6. • Did you find out anything that could give you some information about the person? • Do you think you could find where they lived? • If you bumped into them again, would you know what to talk about? Feedback activity 1
  • 7. • What can you tell about this profile page… – Find out their name – Where they live – And at least one other fact (such as musical taste, hobby, do they have a dog etc). Activity 2
  • 8.
  • 9. • Did you find out anything that could give you some information about the person? • Do you think you could find where they lived? • If you bumped into them again, would you know what to talk about? Feedback activity 2
  • 10. • Internet safety quiz • Public wifi hotspots • Use of gmail and facebook for voip calls How much do you know?
  • 11. • “Child pornography” is child abuse • Hate speech and violent content • Pro-Ana/ thinspiration/Self-Harm/Suicide Websites and Blogs • Online gaming and role play Inappropriate content
  • 14.
  • 16.
  • 17. A teenage girl is believed to have been found hanged just weeks after posting a heartbreaking video on YouTube detailing her battle with cyber bullies. Amanda Todd, 15, was found dead at her home in Port Coquitlam, British Columbia, Canada, on Wednesday in an apparent suicide.
  • 18. Gaming and online role play
  • 19.
  • 20.
  • 21.
  • 23. SMS
  • 24. • Facebook • Askfm – Swedish politicians block Ask.fm Cyberbullying
  • 25.
  • 26.
  • 27. Snapchat …its ok as it only exists for 10 seconds….
  • 28. Stage 1: Identifying a Possible Victim Although paedophiles differ in their “type” regarding age, appearance and gender, all paedophiles will look for a victim who seems in some way vulnerable. Stage 2: Collecting Information The next step is for the paedophile to collect as much information on the targeted victim as possible. This is most commonly done through casual conversations with both the child and the parents or caretaker. Stage 3: Filling a Need Once the individual has the information he needs, he then becomes part of the child’s life by filling a need. If the victim is poor, for example he will act as a friend/confidante. Grooming
  • 29. Stage 4: Lowering Inhibitions The paedophile will then start to lower the child’s inhibitions concerning sexual matters. He may come up with games or activities that involve getting undressed, make sexual comments or show the child pornographic images or pictures. Using films like Ted are commonplace. This can be a long term process Stage 5: Initiating the Abuse At this final stage, the paedophile begins to sexually abuse the child. This can take many forms, a common one is just watch a child doing something or even just take pleasure in the knowledge the child is under their control in some way. Grooming
  • 30. • The signs that a child is being abused, or is using technology in an inappropriate manner can be quite hard to spot at first but there is nothing new in the outcomes. • Fortunately you don’t have to be technical to deal with most of these outcomes but we will discuss software approaches later Signs:
  • 31. • Can you think of examples of where young people have used technology in an inappropriate way? • What did you do? • Did it work? • Discuss in twos and threes. Activity 3 10 mins max
  • 32. • Net nanny • cyber patrol • qustodio Web monitoring software
  • 36.
  • 37. • Advice received from social workers… – Make them turn off their phone – Ban them from the internet – Don’t let them use facebook – Tell them not to contact family members – Delete texts with inappropriate people and block them on facebook And finally… A little humour…LOL 