SlideShare a Scribd company logo
BE NET SAFE .ORG SM
 
BeNetSafe.Org Founded in September 2002 10/2007 becomes a Non-Profit organization Reached out to 10000+ Students Spoke to thousands of  Parents / Police / Educators Reached out to the state using the GSDLN What we know: ,[object Object],[object Object],[object Object],[object Object]
BeNetSafe.Org ,[object Object],[object Object],[object Object],[object Object],[object Object]
Online “Predators” and Their Victims Myths, Realities, and Implications for Prevention and Treatment February–March 2008  American Psychologist Janis Wolak, David Finkelhor, and Kimberly J. Mitchell, Crimes against Children Research Center and Family Research Laboratory, University of New Hampshire;  Michele L. Ybarra, Internet Solutions for Kids, Inc., Santa Ana, California. The article outlined 9 risky on-line behaviors ●  Posting personal information online, 56% of youth Internet users ●  Interacting online with unknown people, 43% ●  Having unknown people on a buddy list, 35% ●  Using the Internet to make rude and nasty comments to others, 28% ●  Sending personal information to unknown people met online, 26% ●  Downloading images from file-sharing programs, 15% ●  Visiting X-rated sites on purpose, 13%  ●  Using the Internet to embarrass or harass people youths are mad at, 9% ●  Talking online to unknown people about sex, 5%
[object Object],[object Object],[object Object],[object Object],[object Object]
Social Network Required Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],--------   subtract 3 days
OPTIONAL INFORMATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Information Favorite Color:  Screen Name:  Favorite Band:  Favorite Movie:  Favorite Show:  Your Car:  Your Hometown:  Your Present Town:  Your Crushes First Name:  Your Grade:  Your Style:  What is Your Name?  How old are you?  Eye color?  Shoe Size?  Hair color?  Height?  Weight?  Favorite:  Food?  Drink?  Movie?  Music Band?  Animal?  Sport?  What is the link to your website, blog, or myspace?  Place to live?  Subject?  Stuff......  Best thing that happened to you in the last few years?  Do you want to get married?  Kids?  Best place to go on a date?  What is your dream?  What do you want to do when you grow up?  Play an instrument?  List 5 things (inc. brand) you are wearing right now  Friends....  Friend you have known the longest?  Best friend(s)?  Friend that makes you laugh the most?  Friend who you can talk to anything about?  Friend with the best personality?  Last friend to call you?  Last friend to talk to you?  Last friend you hung out with?  Last friend you went to a movie with?  Last friend to make you laugh?  Most memorable experience with a friend?  Anything you plan to do with friends when you get older?  Any trips planned with friends?  Ever traveled anywhere?  What places do you want to visit?  Where do you want to live when you're older?  How happy are you with where you are in life? Why?  What's your most embarrassing moment?  Do you have any art or pictures on your walls? Describe it.
Social Networking Sites But I made my site PRIVATE!!!
Social Networking Sites Facebook signs up 100,000 new users every day. Including one 'Freddi Staur' (an anagram of 'ID Fraudster’) The big test of 2007! a world leader in IT security and control
Social Networking Sites Research shows that 41 percent of users, more than two in five, will divulge personal information - such as email address, date of birth and phone number - to a complete stranger, or at least to Freddi Staur.
Social Networking Sites 43 percent of users contacted responded to Freddi. 41 percent of those approached leaked personal information.
Social Networking Sites 87 percent of respondents provided details about  their education or workplace. 84 percent of respondents listed their full date of birth. 78 percent of respondents listed their current address or location. 72 percent of respondents divulged one or more email address. 26 percent of respondents provided their instant messaging screen name.  23 percent of respondents listed their current phone number.
Social Networking Sites In the majority of cases, Freddi was able to gain access to respondents’ photos of family and friends, information about likes and dislikes, hobbies, employer details and other personal facts. Many users also disclosed the names of their spouses/partners, several included their complete résumés, while one user even  divulged his mother's maiden name.
Social Networking Sites ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Networking Sites UPDATE 2009 Sophos created two female Australian Facebook users,  Daisy Feletin (21, single) and Dinette Stonily (56, married).  Each sent a friend request to 100 randomly-selected contacts  in their age group, and waited two weeks to see who would respond.
Social Networking Sites UPDATE 2009 Daisy Dinette Freddie Friends accepting 46%   41% 43% Full/Partial d.o.b 98%   92%   84% Email address 100%   88% 72% College or workplace 74%   22% 87% Phone number 7%   23% 23% IM screen name 13%   18% 26%
Social Networking Sites ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber Predators ,[object Object],[object Object],[object Object]
Stage One Predator Appears Familiar ,[object Object],[object Object],[object Object],[object Object]
Stage Two Develops Trust ,[object Object],[object Object],[object Object],[object Object]
Stage Three Establishes Secrecy ,[object Object],[object Object],[object Object],[object Object]
The Last Stage The Face to Face Meeting ,[object Object],[object Object],[object Object],[object Object]
Anthony R. Stancl Circuit Court Commissioner Laura Florian Lau  “most horrific allegations she has reviewed in all her years on the bench.”  Posing as a female on Facebook makes contact asking for explicit photos Blackmailed some of the boys under the threat that the pictures would be released to the rest of the high school. Threatens harm to family members  According to criminal complaints filed:
Anthony R. Stancl According to reports 300 naked photos and movie clips of New Berlin boys and another 600 professionally made pornographic movies of children were found on the computer. "The defendant is facing 293 years if convicted on these 12 counts. . . . This crime allegedly involved many, many, many victims.”  Laura Florian Lau
The Last Stage The Face to Face Meeting
 
Mobile Devices The Internet no longer stops at your front door!
Mobile Devices ,[object Object],[object Object]
Mobile Devices ,[object Object],[object Object]
Mobile Devices                                                               Samsung debuted the  Galaxy Tab on Thursday , a portable
Mobile Devices Saved about 10 messages and the last 10 phone calls  Saves almost all received text messages, calls (in, out, and missed) “Google” searches, web browsing and even voice mails. Some phones even attach latitude and longitude to photos taken.
Mobile Devices Sexting Bullying A girl in Ohio was charged for sending nude photos of herself to classmates.  If convicted she could have to register as a sex offender for 20 years. Another concern now with cell phones. Some teens are bullying through repeated and hostile text messages.
Mobile Devices
Mobile Devices ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile Devices
Mobile Devices A 2009 Harris online poll shows that one in five teens admits to having sent naked pictures of themselves or others over a cell phone. But even that number may be low.  Hope Witsell took her life because she was being  bullied  and called a slut after she sexted her boyfriend with a topless picture of herself. Sexting Cyber Bullying
She sent nude pictures of herself to a boyfriend. When they broke up, he sent them to other high school girls. The girls were harassing her, calling her a slut and a whore. She was miserable and depressed, afraid even to go to school. Mobile Devices February 15, 1990 – July 3, 2008 Jessie Logan
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object],[object Object],Kids One has nothing to do with the other Mobile computer Lying is not a big deal They are not monitored (parents just think we are) Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object],[object Object],Source: The Massachusetts Aggression Reduction Center
Cyber Bullying So what should we tell kids who are victims of bullying? •     It’s not your fault, and you haven’t done anything wrong.   •     Let’s separate.   (Mediation is the wrong approach, bullies are not  motivated to help change happen.) •     Talk to us!  Find a safe adult to talk to about what’s  happening . Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object],Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],[object Object],Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object],Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],[object Object]
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object],Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object],19% of male students say they have bullied online and 54% of female students say they have bullied online Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],[object Object],Source: The Massachusetts Aggression Reduction Center
Cyber Bullying ,[object Object],[object Object],Source: The Massachusetts Aggression Reduction Center
Teen charged with using MySpace to intimidate ACGC teacher, students (Gretchen Schlosser) West Central Tribune Published Saturday, November 17, 2007 OLIVIA — Charges have been filed against a 17-year-old Olivia teen who allegedly hacked into another teenager’s MySpace. com account and used it to threaten students and a teacher at Atwater-Cosmos-Grove City High School. Meeker County Sheriff’s deputies were called to the high school on Oct. 10 to investigate the threats.
When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. "It is absolutely vile,“ her mother said.   ABC News
When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. "It is absolutely vile,“ her mother said.   ABC News
Resources for Parents
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
On-/Offline Activities  Safety Pledges  Internet Safety News www.NetSmartzKids.org Amy's   Choice  Julie's Journey  Tracking Teresa  Teens PSA: "Promises"
WebWiseKids ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
 
 
 
 
 
 
 
Protect yourself with Free Stuff!!
 
 
 
Operating Systems Windows 7
Windows Live
 
The Future In New Hampshire ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Student Mentor Program  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Future In New Hampshire ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Help Fund BeNetSafe.Org Help Fund BeNetSafe.Org
Get us a penny!
Since February 2000 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How do you contact us? Currently the best way is by e-mail.  Send any and all questions and requests to Info@BeNetSafe.Org Events are listed at www.BeNetSafe.org.  BeNetSafe.Org SM
BE NET SAFE .ORG SM

More Related Content

What's hot

Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
jcullishpum
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
Michael Heron
 
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´MooreCyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Senter for IKT i utdanningen, redaksjon
 
Grade 9 Informative Writing, Journalistic Writing and Literary Writing
Grade 9 Informative Writing, Journalistic Writing and Literary WritingGrade 9 Informative Writing, Journalistic Writing and Literary Writing
Grade 9 Informative Writing, Journalistic Writing and Literary WritingTalugtug National High School
 
Unfriending on Facebook
Unfriending on FacebookUnfriending on Facebook
Unfriending on Facebook
Jenn Mathews Marketing Consulting
 
What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?
CyberSafeFamily
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Marian Merritt
 
Social Media and Cyberbullying
Social Media and CyberbullyingSocial Media and Cyberbullying
Social Media and CyberbullyingIsobar Australia
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital Leaders
SWEET SPOT ACADEMY
 
Willow pk 2011
Willow pk 2011Willow pk 2011
Willow pk 2011Bitbuzz
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Resultsa2columnd12
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
evieasmedia
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
sus22
 
Be a well aware mom !
Be a well aware mom !Be a well aware mom !
Be a well aware mom !
Dr. Mayeser Peerzada
 
Facebook- Women- Smoking
Facebook- Women- SmokingFacebook- Women- Smoking
Facebook- Women- Smoking
Afroditi Kravari
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
Neville Maluleke
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 

What's hot (20)

Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
 
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´MooreCyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
 
Grade 9 Informative Writing, Journalistic Writing and Literary Writing
Grade 9 Informative Writing, Journalistic Writing and Literary WritingGrade 9 Informative Writing, Journalistic Writing and Literary Writing
Grade 9 Informative Writing, Journalistic Writing and Literary Writing
 
Unfriending on Facebook
Unfriending on FacebookUnfriending on Facebook
Unfriending on Facebook
 
Web pp
Web ppWeb pp
Web pp
 
What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Social Media and Cyberbullying
Social Media and CyberbullyingSocial Media and Cyberbullying
Social Media and Cyberbullying
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital Leaders
 
Web pp
Web ppWeb pp
Web pp
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Willow pk 2011
Willow pk 2011Willow pk 2011
Willow pk 2011
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Results
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Be a well aware mom !
Be a well aware mom !Be a well aware mom !
Be a well aware mom !
 
Facebook- Women- Smoking
Facebook- Women- SmokingFacebook- Women- Smoking
Facebook- Women- Smoking
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 

Viewers also liked

A New Partnership with Parents
A New Partnership with ParentsA New Partnership with Parents
A New Partnership with Parents
Public Health England
 
Educate A Child, Transform the World
Educate A Child, Transform the WorldEducate A Child, Transform the World
Educate A Child, Transform the World
Jeffrey Lawrence
 
Cp intro en
Cp intro enCp intro en
Cp intro en
fapac
 
Each one teach one
Each one teach oneEach one teach one
Each one teach one
mirackle9
 
Raising Children - Ephesians 6:1-4
Raising Children - Ephesians 6:1-4Raising Children - Ephesians 6:1-4
Raising Children - Ephesians 6:1-4
David Turner
 
TEDx - How Will I Educate My Children?
TEDx - How Will I Educate My Children?TEDx - How Will I Educate My Children?
TEDx - How Will I Educate My Children?
Josh Steimle
 
7 Tips for Parents - #LeanInTogether
7 Tips for Parents - #LeanInTogether7 Tips for Parents - #LeanInTogether
7 Tips for Parents - #LeanInTogether
Lean In
 
Young Cannes Lions_1_2017_Client presentation
Young Cannes Lions_1_2017_Client presentationYoung Cannes Lions_1_2017_Client presentation
Young Cannes Lions_1_2017_Client presentation
Anna Shutova
 
Brand vs. Campaign or Brand + Campaign ?
Brand vs. Campaign or Brand + Campaign ?Brand vs. Campaign or Brand + Campaign ?
Brand vs. Campaign or Brand + Campaign ?
Ologie
 
Educate the Girl Child
Educate the Girl ChildEducate the Girl Child
Educate the Girl Child
Kshitiz Anand
 
women's education
women's educationwomen's education
women's educationtittuajay
 
Multimedia project
Multimedia projectMultimedia project
Multimedia project
Savanna Lass
 
Young Cannes Lions_2_2017
Young Cannes Lions_2_2017Young Cannes Lions_2_2017
Young Cannes Lions_2_2017
Anna Shutova
 
Young Cannes Lions_3_2017_Client presentation
Young Cannes Lions_3_2017_Client presentationYoung Cannes Lions_3_2017_Client presentation
Young Cannes Lions_3_2017_Client presentation
Anna Shutova
 
Young Cannes Lions_4_PR_2017
Young Cannes Lions_4_PR_2017Young Cannes Lions_4_PR_2017
Young Cannes Lions_4_PR_2017
Anna Shutova
 
ILLITERACY
ILLITERACY ILLITERACY
ILLITERACY
Ranjani Witted
 
The Top 10 Most Remarkable Marketing Campaigns EVER
The Top 10 Most Remarkable Marketing Campaigns EVERThe Top 10 Most Remarkable Marketing Campaigns EVER
The Top 10 Most Remarkable Marketing Campaigns EVERHubSpot
 

Viewers also liked (18)

Viral Ads
Viral AdsViral Ads
Viral Ads
 
A New Partnership with Parents
A New Partnership with ParentsA New Partnership with Parents
A New Partnership with Parents
 
Educate A Child, Transform the World
Educate A Child, Transform the WorldEducate A Child, Transform the World
Educate A Child, Transform the World
 
Cp intro en
Cp intro enCp intro en
Cp intro en
 
Each one teach one
Each one teach oneEach one teach one
Each one teach one
 
Raising Children - Ephesians 6:1-4
Raising Children - Ephesians 6:1-4Raising Children - Ephesians 6:1-4
Raising Children - Ephesians 6:1-4
 
TEDx - How Will I Educate My Children?
TEDx - How Will I Educate My Children?TEDx - How Will I Educate My Children?
TEDx - How Will I Educate My Children?
 
7 Tips for Parents - #LeanInTogether
7 Tips for Parents - #LeanInTogether7 Tips for Parents - #LeanInTogether
7 Tips for Parents - #LeanInTogether
 
Young Cannes Lions_1_2017_Client presentation
Young Cannes Lions_1_2017_Client presentationYoung Cannes Lions_1_2017_Client presentation
Young Cannes Lions_1_2017_Client presentation
 
Brand vs. Campaign or Brand + Campaign ?
Brand vs. Campaign or Brand + Campaign ?Brand vs. Campaign or Brand + Campaign ?
Brand vs. Campaign or Brand + Campaign ?
 
Educate the Girl Child
Educate the Girl ChildEducate the Girl Child
Educate the Girl Child
 
women's education
women's educationwomen's education
women's education
 
Multimedia project
Multimedia projectMultimedia project
Multimedia project
 
Young Cannes Lions_2_2017
Young Cannes Lions_2_2017Young Cannes Lions_2_2017
Young Cannes Lions_2_2017
 
Young Cannes Lions_3_2017_Client presentation
Young Cannes Lions_3_2017_Client presentationYoung Cannes Lions_3_2017_Client presentation
Young Cannes Lions_3_2017_Client presentation
 
Young Cannes Lions_4_PR_2017
Young Cannes Lions_4_PR_2017Young Cannes Lions_4_PR_2017
Young Cannes Lions_4_PR_2017
 
ILLITERACY
ILLITERACY ILLITERACY
ILLITERACY
 
The Top 10 Most Remarkable Marketing Campaigns EVER
The Top 10 Most Remarkable Marketing Campaigns EVERThe Top 10 Most Remarkable Marketing Campaigns EVER
The Top 10 Most Remarkable Marketing Campaigns EVER
 

Similar to 102010a

Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
Eric Cedo
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
KanelandSvihlik
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
KanelandSvihlik
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
University of Wisconsin - Superior
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
sharon7111
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
Mark Deming
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
kguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
kguerrazzi
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
Barry Caplin
 
Disadvantages of Social Networking
Disadvantages of Social NetworkingDisadvantages of Social Networking
Disadvantages of Social Networking
Ashwin Agarwal
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Karl Poulin
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
NiravD3
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposium
kschermerhorn
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
Al Rowell
 
Internet Safety MU version
Internet Safety MU versionInternet Safety MU version
Internet Safety MU versionSteven Knight
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
NaeemAbbas286098
 

Similar to 102010a (20)

Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Disadvantages of Social Networking
Disadvantages of Social NetworkingDisadvantages of Social Networking
Disadvantages of Social Networking
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposium
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Internet Safety MU version
Internet Safety MU versionInternet Safety MU version
Internet Safety MU version
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

102010a

  • 1. BE NET SAFE .ORG SM
  • 2.  
  • 3.
  • 4.
  • 5. Online “Predators” and Their Victims Myths, Realities, and Implications for Prevention and Treatment February–March 2008 American Psychologist Janis Wolak, David Finkelhor, and Kimberly J. Mitchell, Crimes against Children Research Center and Family Research Laboratory, University of New Hampshire; Michele L. Ybarra, Internet Solutions for Kids, Inc., Santa Ana, California. The article outlined 9 risky on-line behaviors ● Posting personal information online, 56% of youth Internet users ● Interacting online with unknown people, 43% ● Having unknown people on a buddy list, 35% ● Using the Internet to make rude and nasty comments to others, 28% ● Sending personal information to unknown people met online, 26% ● Downloading images from file-sharing programs, 15% ● Visiting X-rated sites on purpose, 13% ● Using the Internet to embarrass or harass people youths are mad at, 9% ● Talking online to unknown people about sex, 5%
  • 6.
  • 7.
  • 8.
  • 9. Other Information Favorite Color: Screen Name: Favorite Band: Favorite Movie: Favorite Show: Your Car: Your Hometown: Your Present Town: Your Crushes First Name: Your Grade: Your Style: What is Your Name? How old are you? Eye color? Shoe Size? Hair color? Height? Weight? Favorite: Food? Drink? Movie? Music Band? Animal? Sport? What is the link to your website, blog, or myspace? Place to live? Subject? Stuff...... Best thing that happened to you in the last few years? Do you want to get married? Kids? Best place to go on a date? What is your dream? What do you want to do when you grow up? Play an instrument? List 5 things (inc. brand) you are wearing right now Friends.... Friend you have known the longest? Best friend(s)? Friend that makes you laugh the most? Friend who you can talk to anything about? Friend with the best personality? Last friend to call you? Last friend to talk to you? Last friend you hung out with? Last friend you went to a movie with? Last friend to make you laugh? Most memorable experience with a friend? Anything you plan to do with friends when you get older? Any trips planned with friends? Ever traveled anywhere? What places do you want to visit? Where do you want to live when you're older? How happy are you with where you are in life? Why? What's your most embarrassing moment? Do you have any art or pictures on your walls? Describe it.
  • 10. Social Networking Sites But I made my site PRIVATE!!!
  • 11. Social Networking Sites Facebook signs up 100,000 new users every day. Including one 'Freddi Staur' (an anagram of 'ID Fraudster’) The big test of 2007! a world leader in IT security and control
  • 12. Social Networking Sites Research shows that 41 percent of users, more than two in five, will divulge personal information - such as email address, date of birth and phone number - to a complete stranger, or at least to Freddi Staur.
  • 13. Social Networking Sites 43 percent of users contacted responded to Freddi. 41 percent of those approached leaked personal information.
  • 14. Social Networking Sites 87 percent of respondents provided details about their education or workplace. 84 percent of respondents listed their full date of birth. 78 percent of respondents listed their current address or location. 72 percent of respondents divulged one or more email address. 26 percent of respondents provided their instant messaging screen name. 23 percent of respondents listed their current phone number.
  • 15. Social Networking Sites In the majority of cases, Freddi was able to gain access to respondents’ photos of family and friends, information about likes and dislikes, hobbies, employer details and other personal facts. Many users also disclosed the names of their spouses/partners, several included their complete résumés, while one user even divulged his mother's maiden name.
  • 16.
  • 17. Social Networking Sites UPDATE 2009 Sophos created two female Australian Facebook users, Daisy Feletin (21, single) and Dinette Stonily (56, married). Each sent a friend request to 100 randomly-selected contacts in their age group, and waited two weeks to see who would respond.
  • 18. Social Networking Sites UPDATE 2009 Daisy Dinette Freddie Friends accepting 46% 41% 43% Full/Partial d.o.b 98% 92% 84% Email address 100% 88% 72% College or workplace 74% 22% 87% Phone number 7% 23% 23% IM screen name 13% 18% 26%
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Anthony R. Stancl Circuit Court Commissioner Laura Florian Lau “most horrific allegations she has reviewed in all her years on the bench.” Posing as a female on Facebook makes contact asking for explicit photos Blackmailed some of the boys under the threat that the pictures would be released to the rest of the high school. Threatens harm to family members According to criminal complaints filed:
  • 26. Anthony R. Stancl According to reports 300 naked photos and movie clips of New Berlin boys and another 600 professionally made pornographic movies of children were found on the computer. "The defendant is facing 293 years if convicted on these 12 counts. . . . This crime allegedly involved many, many, many victims.” Laura Florian Lau
  • 27. The Last Stage The Face to Face Meeting
  • 28.  
  • 29. Mobile Devices The Internet no longer stops at your front door!
  • 30.
  • 31.
  • 32. Mobile Devices                                                               Samsung debuted the Galaxy Tab on Thursday , a portable
  • 33. Mobile Devices Saved about 10 messages and the last 10 phone calls Saves almost all received text messages, calls (in, out, and missed) “Google” searches, web browsing and even voice mails. Some phones even attach latitude and longitude to photos taken.
  • 34. Mobile Devices Sexting Bullying A girl in Ohio was charged for sending nude photos of herself to classmates. If convicted she could have to register as a sex offender for 20 years. Another concern now with cell phones. Some teens are bullying through repeated and hostile text messages.
  • 36.
  • 38. Mobile Devices A 2009 Harris online poll shows that one in five teens admits to having sent naked pictures of themselves or others over a cell phone. But even that number may be low. Hope Witsell took her life because she was being bullied and called a slut after she sexted her boyfriend with a topless picture of herself. Sexting Cyber Bullying
  • 39. She sent nude pictures of herself to a boyfriend. When they broke up, he sent them to other high school girls. The girls were harassing her, calling her a slut and a whore. She was miserable and depressed, afraid even to go to school. Mobile Devices February 15, 1990 – July 3, 2008 Jessie Logan
  • 40.
  • 41.
  • 42.
  • 43. Cyber Bullying So what should we tell kids who are victims of bullying? •     It’s not your fault, and you haven’t done anything wrong.  •     Let’s separate.  (Mediation is the wrong approach, bullies are not motivated to help change happen.) •    Talk to us!  Find a safe adult to talk to about what’s happening . Source: The Massachusetts Aggression Reduction Center
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52. Teen charged with using MySpace to intimidate ACGC teacher, students (Gretchen Schlosser) West Central Tribune Published Saturday, November 17, 2007 OLIVIA — Charges have been filed against a 17-year-old Olivia teen who allegedly hacked into another teenager’s MySpace. com account and used it to threaten students and a teacher at Atwater-Cosmos-Grove City High School. Meeker County Sheriff’s deputies were called to the high school on Oct. 10 to investigate the threats.
  • 53. When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. "It is absolutely vile,“ her mother said. ABC News
  • 54. When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. "It is absolutely vile,“ her mother said. ABC News
  • 56.
  • 57. On-/Offline Activities Safety Pledges Internet Safety News www.NetSmartzKids.org Amy's Choice Julie's Journey Tracking Teresa Teens PSA: "Promises"
  • 58.
  • 59.  
  • 60.  
  • 61.  
  • 62.  
  • 63.  
  • 64.  
  • 65.  
  • 66.  
  • 67.  
  • 68.  
  • 69. Protect yourself with Free Stuff!!
  • 70.  
  • 71.  
  • 72.  
  • 75.  
  • 76.
  • 77.
  • 78.
  • 79. Get us a penny!
  • 80.
  • 81. How do you contact us? Currently the best way is by e-mail. Send any and all questions and requests to Info@BeNetSafe.Org Events are listed at www.BeNetSafe.org. BeNetSafe.Org SM
  • 82. BE NET SAFE .ORG SM