SlideShare a Scribd company logo
Integrants:
Anita Benitez
Catherine Valdes
Marilyn Melo
 Is a series of behaviors and actions
deliberately undertaken by an adult,
through the Internet, with the aim of
earning the friendship of a minor
 In order to earn the friendship of a minor,
creating an emotional connection with it to
finally be able to sexually abuse him
 It generates child prostitution or the
production of pornographic material!
 Rejects sexual or pornographic messages. You
should Not post photos of yourself or your
friends in public places.
 Uses Private profiles on social networks.
 When You upload a photo on your social
network make sure it doesn't have a sexual
component
 Tell the teachers to talk about this problems to the children.
 Tell the parents about the consequenses.
 Keep your profiles private.
 Make sure that the links are safe.
 Dont send nude pics.
 Dont share personal information
 don”t open stranger messengers
 Check the sites URL (web adress)
 Always try to logout of the online accounts after use
 Do not share your password with any one
 Ford children and aadolescentes: it”s not a your fault
 Save the evidence
 Seek help

More Related Content

What's hot

Cyberbully
CyberbullyCyberbully
Cyberbully
Debra Murphy
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
QueenFarahReyes
 
Digital Dating Abuse
Digital Dating AbuseDigital Dating Abuse
Digital Dating Abuse
ShayMO10
 
Cyberbullying 2.4
Cyberbullying 2.4Cyberbullying 2.4
Cyberbullying 2.4
boslek
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Veronica Alejandro
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Kim Wesson
 
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Kim Wesson
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
Kwazi Communications
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
br03wood
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Luísa Lima
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
DonikaLici
 
Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber Bullying
Kevin
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
bl03cook
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
bolan1jt
 
Digital valentinesteensonlinedating
Digital valentinesteensonlinedatingDigital valentinesteensonlinedating
Digital valentinesteensonlinedating
TeenSafe
 
Abuses in relationships
Abuses in relationshipsAbuses in relationships
Abuses in relationships
kumar mahi
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Niti Arora
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
Matt Britland
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
sam31
 

What's hot (20)

Cyberbully
CyberbullyCyberbully
Cyberbully
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Digital Dating Abuse
Digital Dating AbuseDigital Dating Abuse
Digital Dating Abuse
 
Cyberbullying 2.4
Cyberbullying 2.4Cyberbullying 2.4
Cyberbullying 2.4
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Digital valentinesteensonlinedating
Digital valentinesteensonlinedatingDigital valentinesteensonlinedating
Digital valentinesteensonlinedating
 
Abuses in relationships
Abuses in relationshipsAbuses in relationships
Abuses in relationships
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 

Similar to Grooming

What is sexting
What is sexting What is sexting
What is sexting
ValentinaRojas70
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
NiravD3
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
NaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
purush203
 
Sexting
SextingSexting
What is sexting
What is sexting What is sexting
What is sexting
sofiabelenseoanelago
 
What is sexting
What is sextingWhat is sexting
What is sexting
sofiabelenseoanelago
 
What is sexting
What is sextingWhat is sexting
What is sexting
SofiaArancibia3
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
KanelandSvihlik
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
CharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
R Smith
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
Selfie Safety Tip Sheet
Selfie Safety Tip SheetSelfie Safety Tip Sheet
Selfie Safety Tip Sheet
uKnow.com
 
FAQ's About Cyberbulling
FAQ's About CyberbullingFAQ's About Cyberbulling
FAQ's About Cyberbulling
alsebastino
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Tsenn13
 
Etech monterey panganiban
Etech monterey panganibanEtech monterey panganiban
Etech monterey panganiban
SherylPanganiban2
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
Debra Boardman
 
Coping with the many faces of facebook
Coping with the many faces of facebookCoping with the many faces of facebook
Coping with the many faces of facebook
ktcole
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
SMA BRUDERAN PURWOREJO
 

Similar to Grooming (20)

What is sexting
What is sexting What is sexting
What is sexting
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Sexting
SextingSexting
Sexting
 
What is sexting
What is sexting What is sexting
What is sexting
 
What is sexting
What is sextingWhat is sexting
What is sexting
 
What is sexting
What is sextingWhat is sexting
What is sexting
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Selfie Safety Tip Sheet
Selfie Safety Tip SheetSelfie Safety Tip Sheet
Selfie Safety Tip Sheet
 
FAQ's About Cyberbulling
FAQ's About CyberbullingFAQ's About Cyberbulling
FAQ's About Cyberbulling
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Etech monterey panganiban
Etech monterey panganibanEtech monterey panganiban
Etech monterey panganiban
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Coping with the many faces of facebook
Coping with the many faces of facebookCoping with the many faces of facebook
Coping with the many faces of facebook
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 

Recently uploaded

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 

Recently uploaded (20)

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 

Grooming

  • 2.  Is a series of behaviors and actions deliberately undertaken by an adult, through the Internet, with the aim of earning the friendship of a minor
  • 3.  In order to earn the friendship of a minor, creating an emotional connection with it to finally be able to sexually abuse him  It generates child prostitution or the production of pornographic material!
  • 4.  Rejects sexual or pornographic messages. You should Not post photos of yourself or your friends in public places.  Uses Private profiles on social networks.  When You upload a photo on your social network make sure it doesn't have a sexual component
  • 5.  Tell the teachers to talk about this problems to the children.  Tell the parents about the consequenses.  Keep your profiles private.  Make sure that the links are safe.  Dont send nude pics.  Dont share personal information  don”t open stranger messengers  Check the sites URL (web adress)  Always try to logout of the online accounts after use  Do not share your password with any one  Ford children and aadolescentes: it”s not a your fault  Save the evidence  Seek help