SlideShare a Scribd company logo
1 of 5
Integrants:
Anita Benitez
Catherine Valdes
Marilyn Melo
 Is a series of behaviors and actions
deliberately undertaken by an adult,
through the Internet, with the aim of
earning the friendship of a minor
 In order to earn the friendship of a minor,
creating an emotional connection with it to
finally be able to sexually abuse him
 It generates child prostitution or the
production of pornographic material!
 Rejects sexual or pornographic messages. You
should Not post photos of yourself or your
friends in public places.
 Uses Private profiles on social networks.
 When You upload a photo on your social
network make sure it doesn't have a sexual
component
 Tell the teachers to talk about this problems to the children.
 Tell the parents about the consequenses.
 Keep your profiles private.
 Make sure that the links are safe.
 Dont send nude pics.
 Dont share personal information
 don”t open stranger messengers
 Check the sites URL (web adress)
 Always try to logout of the online accounts after use
 Do not share your password with any one
 Ford children and aadolescentes: it”s not a your fault
 Save the evidence
 Seek help

More Related Content

What's hot

Digital Dating Abuse
Digital Dating AbuseDigital Dating Abuse
Digital Dating Abuse
ShayMO10
 
Cyberbullying 2.4
Cyberbullying 2.4Cyberbullying 2.4
Cyberbullying 2.4
boslek
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
Kwazi Communications
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
br03wood
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
bolan1jt
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
sam31
 

What's hot (20)

Cyberbully
CyberbullyCyberbully
Cyberbully
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Digital Dating Abuse
Digital Dating AbuseDigital Dating Abuse
Digital Dating Abuse
 
Cyberbullying 2.4
Cyberbullying 2.4Cyberbullying 2.4
Cyberbullying 2.4
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Digital valentinesteensonlinedating
Digital valentinesteensonlinedatingDigital valentinesteensonlinedating
Digital valentinesteensonlinedating
 
Abuses in relationships
Abuses in relationshipsAbuses in relationships
Abuses in relationships
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 

Similar to Grooming

Similar to Grooming (20)

What is sexting
What is sexting What is sexting
What is sexting
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Sexting
SextingSexting
Sexting
 
What is sexting
What is sexting What is sexting
What is sexting
 
What is sexting
What is sextingWhat is sexting
What is sexting
 
What is sexting
What is sextingWhat is sexting
What is sexting
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Selfie Safety Tip Sheet
Selfie Safety Tip SheetSelfie Safety Tip Sheet
Selfie Safety Tip Sheet
 
FAQ's About Cyberbulling
FAQ's About CyberbullingFAQ's About Cyberbulling
FAQ's About Cyberbulling
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Etech monterey panganiban
Etech monterey panganibanEtech monterey panganiban
Etech monterey panganiban
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Coping with the many faces of facebook
Coping with the many faces of facebookCoping with the many faces of facebook
Coping with the many faces of facebook
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 

Grooming

  • 2.  Is a series of behaviors and actions deliberately undertaken by an adult, through the Internet, with the aim of earning the friendship of a minor
  • 3.  In order to earn the friendship of a minor, creating an emotional connection with it to finally be able to sexually abuse him  It generates child prostitution or the production of pornographic material!
  • 4.  Rejects sexual or pornographic messages. You should Not post photos of yourself or your friends in public places.  Uses Private profiles on social networks.  When You upload a photo on your social network make sure it doesn't have a sexual component
  • 5.  Tell the teachers to talk about this problems to the children.  Tell the parents about the consequenses.  Keep your profiles private.  Make sure that the links are safe.  Dont send nude pics.  Dont share personal information  don”t open stranger messengers  Check the sites URL (web adress)  Always try to logout of the online accounts after use  Do not share your password with any one  Ford children and aadolescentes: it”s not a your fault  Save the evidence  Seek help