Family Internet Safety - Cyber Bullying

391 views

Published on

http://peakmarketingsystems.com.au/family-internet-resources/ Cyber Safety for children is extremely important

Published in: Education
  • Be the first to comment

  • Be the first to like this

Family Internet Safety - Cyber Bullying

  1. 1. Cyber Safey Presenter: Vanessa Taylor PEAK Marketing Systems http://peakmarketingsystemscom.au
  2. 2. What is Cyber-Safety? Being cyber-safe is about learning to use the internet safely without placing ourselves and others at risk . PEAK Marketing Systems http://peakmarketingsystemscom.au
  3. 3. This British ad campaign promotes safety on the internet…. https://www.youtube.com/watch?v=KdeqbHEbQDc PEAK Marketing Systems http://peakmarketingsystemscom.au
  4. 4. Charlotte Dawson was a victim of Cyber Bullying https://www.youtube.com/watch?v=N8eAkCRi8xQ PEAK Marketing Systems http://peakmarketingsystemscom.au
  5. 5. Why is it important? ● ● ● ● ● ● ● ● The internet has no boundaries. Paedophiles and child sex offenders can target children all over the world; A child can be targeted and groomed by an offender residing in another country; Offenders can target and access children all over the world from the comfort of their own homes. Children can be provided with inappropriate content and material. Offenders can locate the whereabouts of children from information posted and shared on social media. Children and young people can become the victim of cyber-bullying You can be the victim of identity theft or fraud. Any child in any community can be targeted. l PEAK Marketing Systems http://peakmarketingsystemscom.au
  6. 6. Operation Gatekeeper Taskforce ARGOS seized more than 307,000 child pornography images from around the world after shutting down an illegal website run by a man in Helensvale, Queensland. led to charges against 21 Queenslanders, including a 15 year old boy. More than 21,000 internet addresses from over 100 countries were linked to the site. The operation saved 29 child victims, including children from Queensland. PEAK Marketing Systems http://peakmarketingsystemscom.au
  7. 7. How children are targeted Online grooming - occurs when an adult makes online contact with someone under the age of 16 with the intention of establishing a sexual relationship. Social Networking - Over 80% of children in upper primary school report having a social networking page. Instant Messaging - Instant messaging is a program that can instantly send messages from one computer to another anywhere in the world. PEAK Marketing Systems http://peakmarketingsystemscom.au
  8. 8. How children are targeted cont. Investigators from the Queensland Police Service’s Taskforce Argos have identified children who have over 700 contacts in their buddy list, and in one investigation arrested five child sex offenders from one child’s list. Online Chat Rooms - these programs allow users to select a “room” based on a particular interest or topic of conversation and allows them to chat instantly with others. Mobile phones – most allow for internet access Online gaming – allows users to adopt virtual identities PEAK Marketing Systems http://peakmarketingsystemscom.au
  9. 9. Why children are at risk Offenders are able to remain anonymous Offenders can adopt a different persona, most often pretending to be another child Offenders engage with other offenders online to share materials, increase their skills and knowledge in grooming behaviours Offenders have substantial knowledge in teenage pop culture, gaming, social media, child related forums They target children who appear to be trusting, craving attention, and/or vulnerable. PEAK Marketing Systems http://peakmarketingsystemscom.au
  10. 10. Why children are at risk cont…. account details and location information can be used inappropriately by others to find young people or access their online accounts Children and young people share too much information Children and young people may treat online friends like real friends Photos can identify membership of a club, or a school or taken in front of an easily identifiable landmark Smart phones now feature satellite navigation systems, web access, video and camera apps, GPS system. PEAK Marketing Systems http://peakmarketingsystemscom.au
  11. 11. Signs to look for A child's age and development must be considered when interpreting possible behavioural indicators of sexual abuse. Some behaviours include: ● ● ● ● ● ● ● ● Displaying greater sexual knowledge or language expected for the child's age/development; Sexualised behaviours Sexual imitation with children, toys, dolls Excessive masturbation; Persistent bed wetting, soiling, urinating in clothes; Regressive behaviours, thumb sucking, baby talk; Sexually suggestive behaviour with adults / older children Withdrawn, anxious, depressed. ● Persistent health complaints; ● ● ● ● ● ● ● ● ● Poor social boundaries; Starting fires, fascination with fire; Running away; Hurting or mutilating animals; Promiscuity; Refusing to undress for activities; Creating stories, poems or artwork about abuse; Self-harming or suicidal ideation; Poor concentration; (Bravehearts, 2012) PEAK Marketing Systems http://peakmarketingsystemscom.au
  12. 12. Sexting Sexting is the sending of provocative or sexual photos, messages, or videos, generally using a mobile phone. It can also include posting this type of material online (Australian Communication Media Authority). PEAK Marketing Systems http://peakmarketingsystemscom.au
  13. 13. Sexting Includes….. Sending naked pictures to another person Sending pictures of their own or another person's genitals to another person Posting naked or inappropriate images of themselves/others on social media Sending or posting inappropriate sexual comments to another person, or online. Forwarding inappropriate images, materials to others. PEAK Marketing Systems http://peakmarketingsystemscom.au
  14. 14. What are the risks…. ● ● ● ● ● ● Students are unable to control who will see the content Students are unable to control where the image or comment ends up legal implications – it is a criminal offence to send an inappropriate image or post content online may constitute child pornography even if the other parties are willing participants may attract unwanted attention or result in stalking You could face up to 15 years imprisonment PEAK Marketing Systems http://peakmarketingsystemscom.au
  15. 15. Cyber-bullying Cyber-bullying involves the use of digital technologies to facilitate repeated behaviour which is intended to cause harm to others. (Australian Communication and Media Authority) PEAK Marketing Systems http://peakmarketingsystemscom.au
  16. 16. How does it occur? Posting defamatory messages on social networking sites Spreading rumours online Excluding a young person from an online group Sending unwanted messages, either by text, instant messaging or email Posting inappropriate images of child/young person. PEAK Marketing Systems http://peakmarketingsystemscom.au
  17. 17. The risks of cyber-bullying Impacts a child or young person's self-esteem and confidence leads to health issues leads to educational issues can lead to self-harming behaviours or suicidal ideation difficulty in escaping the bullying, as it still occurs via social media whilst they are in their own home. PEAK Marketing Systems http://peakmarketingsystemscom.au
  18. 18. How to manage a disclosure If a child tells you they are being abused: ● ● ● ● ● ● ● Remain calm – if you panic, the child may not disclose; Find a private place to talk; Be supportive and recognise the child's bravery for talking to you; Be a listener not an investigator – only ask just enough questions to act proactively, “tell me more about that”; Do not conduct any form of interview with the child; Do not ask any leading questions I.e “did daddy touch you there”? Be aware of your tone of voice, body language; PEAK Marketing Systems http://peakmarketingsystemscom.au
  19. 19. How to manage a disclosure cont... ● ● ● ● ● ● ● ● Reassure the child that they have done the right thing by telling you, and that they are not in trouble; Do not make promises you can't keep such as promising you won't tell anyone; Do not contact the person responsible for the abuse; Keep all information confidential; Record what the child has told you word for word; Only report directly to the person you are required to report to – do not discuss with anyone else; Be honest with the child – explain that you need to report the information to keep them safe; Ensure that the child will be safe. PEAK Marketing Systems http://peakmarketingsystemscom.au
  20. 20. How to encourage Cyber-safety 1. 2. 3. 4. 5. 6. 7. How do I make decisions about my behaviour when online? What message am I giving the world with my photos online? How am I portraying myself to others and why What is the impact on me? My family and friends? Will this keep me safe? I have a right to feel safe and protected I'm responsible for my actions PEAK Marketing Systems http://peakmarketingsystemscom.au
  21. 21. Questions can be directed to the parent discussion page… Lets move on... PEAK Marketing Systems http://peakmarketingsystemscom.au

×