SlideShare a Scribd company logo
Martina López González
Lucía Rendón Toro
Cybergrooming
Table of Contents
How does it work? Safety tips
What is it? Types of groomer
04
02
03
01
What is it?
- Gain trust from the child.
- Obtain intimate and personal data.
- To threaten and blackmail.
Process of ‘befriending’ a young person online to facilitate
online sexual contact and/or a physical meeting with them
with the goal of committing sexual abuse.
Main goals:
Types of
groomer
Distorted Attachment: Romantic and consenting
relationship. This offender reveals his identity.
He becomes friendly before meeting.
At least three distinct types of groomer exist: Distorted
Attachment, Adaptable Offender and Hyper-Sexual.
Types:
Adaptable Offender: Uses many identities and
adapts his style. This offender may
use indecent images. His objective is not
always meeting.
At least three distinct types of groomer exist: Distorted
Attachment, Adaptable Offender and Hyper-Sexual.
Types:
Hyper-Sexual Offender: Shares images. He is
part of an online network, but has no interest
to meet. Uses various identities at a sexual
profile.
At least three distinct types of groomer exist: Distorted
Attachment, Adaptable Offender and Hyper-Sexual.
Types:
Haga clic para agregar texto
Haga clic para agregar texto
How does it
work?
- Use various social networks.
- With knowledge they establish closeness.
- Friendship is cultivated and build up an
intimate relationship
- The more intense the dialogue becomes, the
more the perpetrators gain the trust of the victim.
Process of cybergrooming:
Steps:
Safety tips
- Help with the registration.
- Make devices safe.
- Establish some rules.
"Educate your child that a photo can be misused."
Tips:
Haga clic para agregar texto
Haga clic para agregar texto
- Talk about photos and videos.
- Ask about online experiences.
- Act on suspicion.
"Educate your child that a photo can be misused."
Tips:
Haga clic para agregar texto
Haga clic para agregar texto
References:
What Is Cyber Grooming and How to Protect Children? – TechAcute
Cyber Grooming — ChildSafeNet
Cybergrooming | iBarry
CREDITS: This presentation template was created by
Slidesgo, including icons by Flaticon, and infographics &
images by Freepik.
Thanks!
Do you have any questions?
CREDITS: This presentation template was created by
Slidesgo, including icons by Flaticon, and infographics &
images by Freepik.

More Related Content

What's hot

Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
carlgiardina
 
Cyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingCyber bullying vs traditional bullying
Cyber bullying vs traditional bullying
Aliasgher Ahmedabadwala
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
HDCH
 
Software piracy
Software piracySoftware piracy
Software piracy
Akhil Tiwari
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Digital law
Digital lawDigital law
Digital law
zrh48
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
Talwant Singh
 
Communication Ethics - Media violence
Communication Ethics - Media violenceCommunication Ethics - Media violence
Communication Ethics - Media violence
Giovanni Eugenio Tomassetti
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Niti Arora
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
Samantha Culshaw-Robinson
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
MarketingatBahrain
 
Child Abuse
Child AbuseChild Abuse
Child Abuse
Razia Pukhraj
 
Child abuse by puneet sharma
Child abuse  by puneet sharmaChild abuse  by puneet sharma
Child abuse by puneet sharma
Puneet Sharma
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
Sanjay Kumar
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
CRIMINAL PROFILING
CRIMINAL PROFILINGCRIMINAL PROFILING
CRIMINAL PROFILING
SHAHANAJAMAL3
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mohan Robert
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
Online
 

What's hot (20)

Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Cyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingCyber bullying vs traditional bullying
Cyber bullying vs traditional bullying
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Digital law
Digital lawDigital law
Digital law
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Communication Ethics - Media violence
Communication Ethics - Media violenceCommunication Ethics - Media violence
Communication Ethics - Media violence
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Child Abuse
Child AbuseChild Abuse
Child Abuse
 
Child abuse by puneet sharma
Child abuse  by puneet sharmaChild abuse  by puneet sharma
Child abuse by puneet sharma
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
CRIMINAL PROFILING
CRIMINAL PROFILINGCRIMINAL PROFILING
CRIMINAL PROFILING
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 

Similar to Cybergrooming - Spain.pptx

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
SuphaphonP
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonp
JingboWang9
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoY
YipKwanHo
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
KanelandSvihlik
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
Apostolos Syropoulos
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
Kaylon McGee
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
mkinzie
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
Manjula Sridhar
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
Kate Gukeisen
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital Leaders
SWEET SPOT ACADEMY
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
KanelandSvihlik
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
Arunmozhi Ramesh
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
Desiree Caskey
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
jaggernaoma
 
Cyberlove
CyberloveCyberlove
Cyberlove
Rik Viana
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
Kwazi Communications
 
April27 dyc
April27 dycApril27 dyc
April27 dyc
Alex Wills
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
Rahuljain40418
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
Larry Magid
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
nhokanson
 

Similar to Cybergrooming - Spain.pptx (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Week7 assgn2suphaphonp
Week7 assgn2suphaphonpWeek7 assgn2suphaphonp
Week7 assgn2suphaphonp
 
Week7assgn2KwanHoY
Week7assgn2KwanHoYWeek7assgn2KwanHoY
Week7assgn2KwanHoY
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital Leaders
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
 
Cyberlove
CyberloveCyberlove
Cyberlove
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
April27 dyc
April27 dycApril27 dyc
April27 dyc
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

More from PavelVtek3

War Traumas - Erasmus+ Mind Your Mind Project.pptx
War Traumas - Erasmus+ Mind Your Mind Project.pptxWar Traumas - Erasmus+ Mind Your Mind Project.pptx
War Traumas - Erasmus+ Mind Your Mind Project.pptx
PavelVtek3
 
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdfThe Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
PavelVtek3
 
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
PavelVtek3
 
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
PavelVtek3
 
Mind Your Mind Erasmus+ - Art as a cure for depression.pdf
Mind Your Mind Erasmus+ - Art as a cure for depression.pdfMind Your Mind Erasmus+ - Art as a cure for depression.pdf
Mind Your Mind Erasmus+ - Art as a cure for depression.pdf
PavelVtek3
 
Fake News - Czech Workshop.pptx
Fake News - Czech Workshop.pptxFake News - Czech Workshop.pptx
Fake News - Czech Workshop.pptx
PavelVtek3
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
PavelVtek3
 
Cyberbullying - Romania.pdf
Cyberbullying - Romania.pdfCyberbullying - Romania.pdf
Cyberbullying - Romania.pdf
PavelVtek3
 
Artificial intelligence - Portugal.pptx
Artificial intelligence - Portugal.pptxArtificial intelligence - Portugal.pptx
Artificial intelligence - Portugal.pptx
PavelVtek3
 

More from PavelVtek3 (9)

War Traumas - Erasmus+ Mind Your Mind Project.pptx
War Traumas - Erasmus+ Mind Your Mind Project.pptxWar Traumas - Erasmus+ Mind Your Mind Project.pptx
War Traumas - Erasmus+ Mind Your Mind Project.pptx
 
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdfThe Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
 
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
 
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
 
Mind Your Mind Erasmus+ - Art as a cure for depression.pdf
Mind Your Mind Erasmus+ - Art as a cure for depression.pdfMind Your Mind Erasmus+ - Art as a cure for depression.pdf
Mind Your Mind Erasmus+ - Art as a cure for depression.pdf
 
Fake News - Czech Workshop.pptx
Fake News - Czech Workshop.pptxFake News - Czech Workshop.pptx
Fake News - Czech Workshop.pptx
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Cyberbullying - Romania.pdf
Cyberbullying - Romania.pdfCyberbullying - Romania.pdf
Cyberbullying - Romania.pdf
 
Artificial intelligence - Portugal.pptx
Artificial intelligence - Portugal.pptxArtificial intelligence - Portugal.pptx
Artificial intelligence - Portugal.pptx
 

Recently uploaded

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 

Cybergrooming - Spain.pptx

  • 1. Martina López González Lucía Rendón Toro Cybergrooming
  • 2. Table of Contents How does it work? Safety tips What is it? Types of groomer 04 02 03 01
  • 4. - Gain trust from the child. - Obtain intimate and personal data. - To threaten and blackmail. Process of ‘befriending’ a young person online to facilitate online sexual contact and/or a physical meeting with them with the goal of committing sexual abuse. Main goals:
  • 6. Distorted Attachment: Romantic and consenting relationship. This offender reveals his identity. He becomes friendly before meeting. At least three distinct types of groomer exist: Distorted Attachment, Adaptable Offender and Hyper-Sexual. Types:
  • 7. Adaptable Offender: Uses many identities and adapts his style. This offender may use indecent images. His objective is not always meeting. At least three distinct types of groomer exist: Distorted Attachment, Adaptable Offender and Hyper-Sexual. Types:
  • 8. Hyper-Sexual Offender: Shares images. He is part of an online network, but has no interest to meet. Uses various identities at a sexual profile. At least three distinct types of groomer exist: Distorted Attachment, Adaptable Offender and Hyper-Sexual. Types: Haga clic para agregar texto Haga clic para agregar texto
  • 10. - Use various social networks. - With knowledge they establish closeness. - Friendship is cultivated and build up an intimate relationship - The more intense the dialogue becomes, the more the perpetrators gain the trust of the victim. Process of cybergrooming: Steps:
  • 12. - Help with the registration. - Make devices safe. - Establish some rules. "Educate your child that a photo can be misused." Tips: Haga clic para agregar texto Haga clic para agregar texto
  • 13. - Talk about photos and videos. - Ask about online experiences. - Act on suspicion. "Educate your child that a photo can be misused." Tips: Haga clic para agregar texto Haga clic para agregar texto
  • 14. References: What Is Cyber Grooming and How to Protect Children? – TechAcute Cyber Grooming — ChildSafeNet Cybergrooming | iBarry
  • 15. CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon, and infographics & images by Freepik. Thanks! Do you have any questions?
  • 16. CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon, and infographics & images by Freepik.