This document discusses the risks to children of using the internet and social media. It describes how sexual predators can groom and contact children online through chat rooms and social networking sites. It provides statistics on unwanted contact experienced by children. The document recommends steps for parents to protect children, such as using content filtering and monitoring software, and limiting the technology children have access to. It warns of dangers of oversharing personal information on social networking profiles.
Social Media is Okay - Jeopardizing Security Isn'tjordanwollman
In a world of hackers, phishers, scammers, and Nigerian Princes, how do you keep yourself and your clients safe, while investing time and energy (and not to forget, money) into Social Media.
An objective look at social media risks and benefits.
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel
I presented this at the 2013 New York State CyberSecurity conference.
An earlier version was presented at the NCSC.NL 2013 conference at The Hague.
Updated versions will be presented at GBATA 2013 in Helsinki, ASIS 59 in Chicago and elsewhere.
Social Media is Okay - Jeopardizing Security Isn'tjordanwollman
In a world of hackers, phishers, scammers, and Nigerian Princes, how do you keep yourself and your clients safe, while investing time and energy (and not to forget, money) into Social Media.
An objective look at social media risks and benefits.
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel
I presented this at the 2013 New York State CyberSecurity conference.
An earlier version was presented at the NCSC.NL 2013 conference at The Hague.
Updated versions will be presented at GBATA 2013 in Helsinki, ASIS 59 in Chicago and elsewhere.
The power point presentation given to a class at the University of Utah in September, 2008.
The topic is fact checking and accuracy and I shared my code of ethics for blogging.
A very informative presentation by the FBI about Internet crimes against children. This presentation is intended for teachers and administrators who wish to know more about cybersafety. The presentation should be reviewed before sharing with K-12 students.
The author, Kate O'Neil (a keynote speaker and author who writes extensively about the human experience, particularly where it intersects with data and technology) notes in this article "10 years ago I probably would have played along with the profile picture aging meme going around on Facebook and Instagram. Now? I ponder how all this data could be mined to train facial recognition algorithms on age progression and age recognition". It's a powerful article, taking us down a path where this data flows downstream and becomes enmeshed with our location tracking, response and purchase behavior, and other signals, where "it could bring about some genuinely creepy interactions".
How to Catch Someone Who Is Cheating OnlinePaul Bossky
If you want to catch someone you suspect is cheating online, start by observing their behavior. Ask yourself if they seem distant or angry with you for no reason. If they do, ask them what is going on in a concerned, but not accusatory, way. For example, you could say "You've seemed really distant lately. Is everything okay?" Your partner may confess to cheating or explain why they have been upset. If this doesn't reveal anything, check their browsing history and texts to see if there is anything suspicious. To learn how to talk to approach your partner once you have confirmed they have cheated, keep reading.
The power point presentation given to a class at the University of Utah in September, 2008.
The topic is fact checking and accuracy and I shared my code of ethics for blogging.
A very informative presentation by the FBI about Internet crimes against children. This presentation is intended for teachers and administrators who wish to know more about cybersafety. The presentation should be reviewed before sharing with K-12 students.
The author, Kate O'Neil (a keynote speaker and author who writes extensively about the human experience, particularly where it intersects with data and technology) notes in this article "10 years ago I probably would have played along with the profile picture aging meme going around on Facebook and Instagram. Now? I ponder how all this data could be mined to train facial recognition algorithms on age progression and age recognition". It's a powerful article, taking us down a path where this data flows downstream and becomes enmeshed with our location tracking, response and purchase behavior, and other signals, where "it could bring about some genuinely creepy interactions".
How to Catch Someone Who Is Cheating OnlinePaul Bossky
If you want to catch someone you suspect is cheating online, start by observing their behavior. Ask yourself if they seem distant or angry with you for no reason. If they do, ask them what is going on in a concerned, but not accusatory, way. For example, you could say "You've seemed really distant lately. Is everything okay?" Your partner may confess to cheating or explain why they have been upset. If this doesn't reveal anything, check their browsing history and texts to see if there is anything suspicious. To learn how to talk to approach your partner once you have confirmed they have cheated, keep reading.
Joe says, "Figuring out ways to ship more product is a passion of mine. The problem spans technology, product, design, and people, which is what makes it so interesting. I'm excited to talk more about the colliding worlds of iterative development and product management with the community on Global Product Management Talk."
Joe Stump, CEO And Cofounder Of Sprint.ly, Discusses The Iterative Product Development Process, Automating Product Releases And Metrics
The software iterative development process enables every product iteration to result in at least one software release. Because of its collaborative, problem-solving character, iterative software development is similar to a multidisciplinary project or parallel development, which places a high demand on communication between the project team and project stakeholders, and among team members themselves. Also referred to as non-blocking development, this process aligns the entire business, from sales to software development, to ship more product more quickly.
Joe Stump, CEO And Cofounder Of Sprint.ly, will discuss the Iterative Product Development Process, Automating Product Releases And Metrics on Monday, January 7, 2013 at the simultaneous times of 10:00 AM Pacific Time, 11:00 AM MST Denver, 12 Noon CST Chicago, and 1:00 PM EST Boston. Participants are welcome to listen live at http://www.blogtalkradio.com/prodmgmttalk, call in to talk on the show (323) 927-2957 and to participate on Twitter by following @ProdMgmtTalk and tweeting using the hashtag #ProdMgmtTalk.
----------------------------------------------------------------------------------------------
NOTE: DAY & TIME!
Monday, January 7, 2013 at the simultaneous times of 10:00 AM Pacific Time, 11:00 AM MST Denver, 12 Noon CST Chicago, and 1:00 PM EST Boston.
----------------------------------------------------------------------------------------------
---->WIN!
Joe is a featured speaker at the Startup Product Summit in San Francisco on February 7, 2013. Tickets available at startupproduct.ticketbud.com/summit
Participants during the live broadcast get $50 off registration using code: sfproducttalks and 6 months of unlimited free trial of Sprint.ly. (Based on average team size this is about a $1000 give away.)
------------------------------------
Background resources: http://bit.ly/132MJal
Listen! http://bit.ly/VhwJgm
Mark your calendar with the correct time: http://bit.ly/Rs5Nfu
Follow for reminders: http://bit.ly/nbw9Yr
-------------------------------------
Brought to you this week by:
Startup Product Summit
Discover how to work together to develop amazing products.
February 7, 2013, San Francisco
startupproduct.com
Register now!
startupproduct.ticketbud.com/summit
Become a Product Leader!
2 Day Intensive: Product Innovation Leadership
February 5 & 6, San Francisco
http://www.aipmm.com/html/certification/strategic-innovation.php
Product Marketing Management bottom line perspective on business integrity re: software products. Case study examples are stories of companies not using their own products, not responding to customer's needs, and not being aligned internally
Transcript of Tweets from Global Product Management Talk on Building Innovative Products w/Jason Hardy-Smith of BrightIdea. Associated Links: http://pack.li/49
Most companies strive to be better and more efficient; few understand that Product
Management is a critical function to make this happen. In my experience, companies often confuse and misuse Product Management. These companies risk building the wrong product, adopt the wrong strategy or implement ineffective marketing approaches. A recent study of experienced product managers and marketing managers from different companies and industries identified common challenges impacting their effectiveness and productivity. This session will identify ways to deal with these challenges and will explain why a collaborative environment is essential for the success of product management teams.
This session will help you build and effectively manage a product management team. It will identify ways to empower your product management team to lead cross-functional product teams effectively. Join Hector Del Castillo as he shares his insights on why growing high performing product management teams is critical for product-driven organizations.
Hector Del Castillo brings over 15 years of experience directing product strategy for product-driven companies to create new revenue streams by implementing a product life cycle management process, realigning the business model, and growing high-performance product teams. He has launched several profitable technology-based products and solutions.
--------------------------------------------
AIPMM Membership benefits include the national Product Management Educational Conference, regional conferences, the Career Center, peer Forums, tools, templates, publications and eligibility to enroll in the Certification Programs. The Agile Certified Product Manager® (ACPM), Certified Product Manager® (CPM), Certified Product Marketing Manager® (CPMM), Certified Brand Manager® (CBM), and Certified Innovation Leader (CIL) programs allow individual members to demonstrate their level of expertise and provide corporate members an assurance that their product professionals are operating at peak performance.
http://www.AIPMM.com
Subscribe: http://www.aipmm.com/subscribe
LinkedIn: http://www.linkedin.com/company/aipmm
Membership: http://www.aipmm.com/join.php
Certification: http://aipmm.com/html/certification
Webinar Series: http://aipmm.com/aipmm_webinars/
Articles: http://www.aipmm.com/html/newsletter/article.php
Moderated by Cindy F. Solomon, CPM, CPMM
Founder, Global Product Management Talk @ProdMgmtTalk
Global Product Management Talk: http://www.prodmgmttalk.com
http://bit.ly/nbw9Yr
Rob says, "I love Social Media and how I connect to customers there - but I call my team Social Support, because that is more accurate. We support customers using Social Media - we don't pitch. Glad to address the Global Product Management Talk, a great application of social tools in support of the professional product management community!"
Internet Safety for Families and ChildrenBarry Caplin
The Internet is a useful and important part of our daily lives. Many can't
remember how we handled even the most mundane tasks without online
assistance. How did we even survive when we were kids? :-) However, along
with the good, there is bad. Children and teens (but not their parents!) are
very well versed in using the Internet, including web pages, blogs,
uploading and downloading information, music and photos, etc. They are also
trusting. This presentation will give an overview of the Internet and the
inherent dangers. Learn the realities and dangers of ``virtual communities''
websites your kids frequent like Xanga.com, MySpace.com and FaceBook.com.
Learn about the persistence of information on the net and Google hacking.
Learn the differences between a wiki, blog, Instant Messaging, text
messaging, and chat. Learn the Internet slang, key warning signs, and tips
for Parents and Kids. This talk is for anyone who has a child, who knows a
child, or who ever was a child!
You Can Run, But You Can't Hide! - How far should the government regulate the Internet? -Has data mining gone too far? (Great secondary research project.) Digital footprint makeover handouts available at: digitalmakeover.wikispaces.com Find ideas for classroom instruction, also, on this wikispace.
This presentation was a breakout session at WLMA14 and has been updated to reflect recent revelations on medical information mining. We did not even get to discuss the EDUCATIONAL DATA MINING that is occurring on our students and children! Caveat!
Crj 101 as we enter the last week of the course/tutorialoutletLockley
FOR MORE CLASSES VISIT
tutorialoutletdotcom
As we enter the last week of the course and we look back upon the many different forms of
white collar crime, we know that many types of white collar crime are committed through the
use of pen, paper, computers, etc. instead of guns and knives. Many white collar crimes
involve financial gain, but is the use of a computer to engage in cybersex with children a white
Overview Am I In Porn? | Fighting Image-Based Sexual Abuse including “revenge...Am I In Porn?
Imagine you have to search the web for your, your partner‘s or your daughter‘s intimate pictures and videos. Well, that is an extremely unlikely situation to be in. Is it?
Millions of people are affected and numbers are rising. Image-based sexual abuse has different reasons. Anyone can be affected as pictures and videos are often taken secretly or faked and most victims just find out by coincidence. Once the pictures have been uploaded they spread widely and uncontrollably on the internet. Victims experience severe psychological and physical distress and society as a whole suffers. While victims suffer, porn platforms profit from the clicks. And searching the web for intimate pictures requires time and expertise and often leads to re-traumatization.
Am I in Porn? enables victims to easily and securely find and take down their images and subsequently receive the help they need. Since the software went live in 2020 we have analyzed >10 million videos and had >150.000 users while getting warm and loving feedback. Our goal is to stop the distribution of illegally shared images and videos on major porn platforms, torrents, messenger services etc.
Hope you enjoy the presentation and insights around image-based sexual abuse. Reach out to us if this got you interested!
Best wishes from the Am I In Porn? community ♡
🌐 Digital Dignity e.V. : https://digitaldignity.io
🌐 Am I In Porn? : https://amiinporn.org
These PowerPoint presentations are intended for use by crime prevention practitioners who bring their experience and expertise to each topic. The presentations are not intended for public use or by individuals with no training or expertise in crime prevention. Each presentation is intended to educate, increase awareness, and teach prevention strategies. Presenters must discern whether their audiences require a more basic or advanced level of information.
NCPC welcomes your input and would like your assistance in tracking the use of these topical presentations. Please email NCPC at trainings@ncpc.org with information about when and how the presentations were used. If you like, we will also place you in a database to receive updates of the PowerPoint presentations and additional training information. We encourage you to visit www.ncpc.org to find additional information on these topics. We also invite you to send in your own trainer notes, handouts, pictures, and anecdotes to share with others on www.ncpc.org.
This was a presentation to 9th graders to help them explore how to take control of their online persona. Examples reach back in time and project into the future when things like augmented reality amplify the information we put online.
1. Keeping your ChildrenKeeping your Children
Safe OnlineSafe Online
A Presentation by Matt Smith.
President of Litchfield County
Computer, L.L.C.
2. Presentation AgendaPresentation Agenda
• What are the risks faced by our kids online?What are the risks faced by our kids online?
Is the Internet “Real?”Is the Internet “Real?”
Sexual PredatorsSexual Predators
Social Networking SitesSocial Networking Sites
Online CrimeOnline Crime
Some Warning SignsSome Warning Signs
If You See Warning SignsIf You See Warning Signs
3. Presentation AgendaPresentation Agenda
• How can you protect your kidsHow can you protect your kids
Some Simple StepsSome Simple Steps
Content Filtering SoftwareContent Filtering Software
Computer Monitoring SoftwareComputer Monitoring Software
Limit The Technology They Have Access ToLimit The Technology They Have Access To
4. Is the Internet “Real?”Is the Internet “Real?”
• I feel that there is a misconception among someI feel that there is a misconception among some
people that the Internet is not considered part ofpeople that the Internet is not considered part of
the real world.the real world.
• The Internet is as real as the world that we liveThe Internet is as real as the world that we live
in today. It’s a community of billions of people.in today. It’s a community of billions of people.
Like any community it has good neighborhoodsLike any community it has good neighborhoods
and bad neighborhoods. These badand bad neighborhoods. These bad
neighborhoods can contain many dangers.neighborhoods can contain many dangers.
5. Sexual PredatorsSexual Predators
• Sexual predators or pedophiles are one of theSexual predators or pedophiles are one of the
biggest dangers to young people on the Internetbiggest dangers to young people on the Internet
today.today.
• Some Statistics from the FBI:Some Statistics from the FBI:
One in four has encountered unwanted pornography.One in four has encountered unwanted pornography.
One in five has been sexually solicited.One in five has been sexually solicited.
One in 17 was threatened or harassed in the past year.One in 17 was threatened or harassed in the past year.
One in 33 received an aggressive sexual solicitation.One in 33 received an aggressive sexual solicitation.
Nearly 60 percent have received an e-mail or instantNearly 60 percent have received an e-mail or instant
message from a stranger, and half responded to themessage from a stranger, and half responded to the
stranger’s message.stranger’s message.
6. Sexual PredatorsSexual Predators
• The predator will make first contact with yourThe predator will make first contact with your
child though a chat room or social networkingchild though a chat room or social networking
site (such as MySpace or Facebook)site (such as MySpace or Facebook)
• Once contact is established the predator willOnce contact is established the predator will
attempt to “groom” your child, luring them (andattempt to “groom” your child, luring them (and
sometimes you) into a trusting relationship insometimes you) into a trusting relationship in
preparation for sexual activities to take place.preparation for sexual activities to take place.
This begins in a harmless fashion and progressesThis begins in a harmless fashion and progresses
into discussions of a sexual nature. Theinto discussions of a sexual nature. The
grooming process is deliberate and slow,grooming process is deliberate and slow,
sometimes taking months.sometimes taking months.
7. Sexual PredatorsSexual Predators
• Once the grooming process is complete the faceOnce the grooming process is complete the face
to face meeting will take place, where the victimto face meeting will take place, where the victim
will be sexually abused.will be sexually abused.
8. Social Networking SitesSocial Networking Sites
• These sites (such as MySpace or Facebook) areThese sites (such as MySpace or Facebook) are
quickly becoming the popular method forquickly becoming the popular method for
children to communicate with their friendschildren to communicate with their friends
online.online.
• You can have a personal page (called a profile)You can have a personal page (called a profile)
where you can talk about yourself, post pictureswhere you can talk about yourself, post pictures
and video etc.and video etc.
• You can find the profiles of your friends onYou can find the profiles of your friends on
these sites and have your profile link to theirs.these sites and have your profile link to theirs.
This allows your “friends” to see theThis allows your “friends” to see the
information on your profile.information on your profile.
9. Social Networking SitesSocial Networking Sites
• Social Networking Sites are a huge breedingSocial Networking Sites are a huge breeding
ground for sexual predators as the powerfulground for sexual predators as the powerful
search features of such sites make it easy forsearch features of such sites make it easy for
them to find and contact potential victims.them to find and contact potential victims.
• Although these sites have age limits for settingAlthough these sites have age limits for setting
up a profile there are no means of actuallyup a profile there are no means of actually
verifying the age of a specific user when theyverifying the age of a specific user when they
sign up.sign up.
• Many teenagers put far too much personalMany teenagers put far too much personal
information into their profiles.information into their profiles.
13. Social Networking SitesSocial Networking Sites
• After a string of criminal investigations inAfter a string of criminal investigations in
Connecticut involving social networking sitesConnecticut involving social networking sites
and sexual predators Attorney Generaland sexual predators Attorney General
Blumenthal asked in March of 2007 that a bill beBlumenthal asked in March of 2007 that a bill be
considered to require social networking sites toconsidered to require social networking sites to
get parental permission before posting theget parental permission before posting the
profile of a minor and requiring socialprofile of a minor and requiring social
networking sites to verify a person’s age usingnetworking sites to verify a person’s age using
independent information. Other states haveindependent information. Other states have
asked for similar measures. The bill did not passasked for similar measures. The bill did not pass
the State Legislature.the State Legislature.
14. Social Networking SitesSocial Networking Sites
• Facebook and MySpace are also a potentialFacebook and MySpace are also a potential
source of malware. Both sites allow you tosource of malware. Both sites allow you to
install programs, called applications, that areinstall programs, called applications, that are
made by other people to your profile. In mostmade by other people to your profile. In most
cases this third party software is not properlycases this third party software is not properly
tested and may contain malware. There havetested and may contain malware. There have
been cases where this malware has compromisedbeen cases where this malware has compromised
peoples privacy or required extensive cleanup topeoples privacy or required extensive cleanup to
correct.correct.
15. Social Networking SitesSocial Networking Sites
• To make matters even worse a new securityTo make matters even worse a new security
issue began to be reported last November, thatissue began to be reported last November, that
of “profile identity theft.” A Facebook orof “profile identity theft.” A Facebook or
MySpace profile is broken into and informationMySpace profile is broken into and information
is changed to indicate that the person needsis changed to indicate that the person needs
money. This will often cause the thief to receivemoney. This will often cause the thief to receive
money in a fraudulent manner. This type ofmoney in a fraudulent manner. This type of
theft is extremely difficult (if not impossible) totheft is extremely difficult (if not impossible) to
undo once it is done.undo once it is done.
16. Social Networking SitesSocial Networking Sites
• The information that you post in your profileThe information that you post in your profile
can come back to haunt you years later. Socialcan come back to haunt you years later. Social
networking sites are indexed by search enginesnetworking sites are indexed by search engines
and your profile can get on a search engine.and your profile can get on a search engine.
Employers often check search engines and socialEmployers often check search engines and social
networking sites as part of post 9/11networking sites as part of post 9/11
background checking procedures. If they don’tbackground checking procedures. If they don’t
like what they see you may just find that joblike what they see you may just find that job
offer you were hoping for declined. Once youoffer you were hoping for declined. Once you
put information on the Internet it’s thereput information on the Internet it’s there
FOREVER!FOREVER!
17. Social Networking SitesSocial Networking Sites
• MySpace recently reported that it had found andMySpace recently reported that it had found and
removed from their site 90,000 profiles thatremoved from their site 90,000 profiles that
belonged to registered sex offenders. Thisbelonged to registered sex offenders. This
number is double MySpace’s previous estimate.number is double MySpace’s previous estimate.
• Some of these profiles were from offenders thatSome of these profiles were from offenders that
were barred from using the Internet.were barred from using the Internet.
• These profiles were discovered through a newThese profiles were discovered through a new
technology known as Sentinel SAFE, a databasetechnology known as Sentinel SAFE, a database
that allows MySpace to tie their profile data withthat allows MySpace to tie their profile data with
the sex offender registries.the sex offender registries.
18. Social Networking SitesSocial Networking Sites
• Facebook is currently not using Sentinel SAFE,Facebook is currently not using Sentinel SAFE,
and it’s believed that at least some of the sexand it’s believed that at least some of the sex
offenders that were removed from MySpace areoffenders that were removed from MySpace are
now on Facebook.now on Facebook.
• Sentinel SAFE is also not a foolproofSentinel SAFE is also not a foolproof
technology. It’s possible to create a profiletechnology. It’s possible to create a profile
using false information to fool the Sentinelusing false information to fool the Sentinel
SAFE scanner.SAFE scanner.
19. Social Networking SitesSocial Networking Sites
• Facebook has recently changed their Terms ofFacebook has recently changed their Terms of
Service. They now state that they can doService. They now state that they can do
whatever they want with any information onwhatever they want with any information on
your profile, forever. This includes selling it toyour profile, forever. This includes selling it to
commercial third parties and it still in effect evencommercial third parties and it still in effect even
if you delete your Facebook profile.if you delete your Facebook profile.
20. Online CrimeOnline Crime
• Increasingly, teenagers are actually gettingIncreasingly, teenagers are actually getting
involved in online crime themselves.involved in online crime themselves.
• People commit online crimes for three generalPeople commit online crimes for three general
reasons: for the money involved, out of anger,reasons: for the money involved, out of anger,
or for fun.or for fun.
• These crimes are very serious, especially in aThese crimes are very serious, especially in a
post 9/11 world. Depending on the exactpost 9/11 world. Depending on the exact
nature of the crime you can either be sent tonature of the crime you can either be sent to
juvenile detention or tried as an adult and bejuvenile detention or tried as an adult and be
sentenced to prison.sentenced to prison.
21. Online CrimeOnline Crime
• Many of these crimes are Federal offencesMany of these crimes are Federal offences
• Parents of minors convicted of a crime can beParents of minors convicted of a crime can be
(and often are) held liable for the actions of their(and often are) held liable for the actions of their
minor children.minor children.
• It should be noted that most of the kids thatIt should be noted that most of the kids that
become involved in online crime are not kidsbecome involved in online crime are not kids
that are troublemakers, but very smart students.that are troublemakers, but very smart students.
23. Online CrimeOnline Crime
• Identity Theft is one of the newest crime wavesIdentity Theft is one of the newest crime waves
sweeping the country right now.sweeping the country right now.
• Teenagers often become involved in identityTeenagers often become involved in identity
theft rings because of the money involved.theft rings because of the money involved.
• The money involved in identity theft (and otherThe money involved in identity theft (and other
online crime) can be staggering. Credit cardonline crime) can be staggering. Credit card
numbers and other personal information getnumbers and other personal information get
sold online for $5 each. If you have 10,000sold online for $5 each. If you have 10,000
credit card numbers that’s $50,000. Some of thecredit card numbers that’s $50,000. Some of the
people involved in the TJX case were 17-19.people involved in the TJX case were 17-19.
24. Online CrimeOnline Crime
• There's an ongoing case in Wisconsin of an 18There's an ongoing case in Wisconsin of an 18
year old that assumed the identity of a girl onyear old that assumed the identity of a girl on
Facebook for purposes of blackmailing fellowFacebook for purposes of blackmailing fellow
students into performing sex acts on him. Hestudents into performing sex acts on him. He
has numerous charges against him. If he’shas numerous charges against him. If he’s
convicted on all counts he could get as much asconvicted on all counts he could get as much as
300 years in prison. He recently plea bargained300 years in prison. He recently plea bargained
and could be subject to a 50 year prisonand could be subject to a 50 year prison
sentence.sentence.
25. Online CrimeOnline Crime
• Malicious computer hacking is another commonMalicious computer hacking is another common
crime.crime.
• A case just closed in Massachusetts where a 17A case just closed in Massachusetts where a 17
year old known online as Dshocker was chargedyear old known online as Dshocker was charged
and pleaded guilty to several counts of computerand pleaded guilty to several counts of computer
attacks, including credit card fraud. The mostattacks, including credit card fraud. The most
serious of these involved what is known asserious of these involved what is known as
“swatting.” If he had been tried as an adult, he“swatting.” If he had been tried as an adult, he
could have faced 10 years in prison.could have faced 10 years in prison.
26. Online CrimeOnline Crime
• There have been several cases of teenagersThere have been several cases of teenagers
committing fraud by setting up EBay accountscommitting fraud by setting up EBay accounts
and auctioning fake items online.and auctioning fake items online.
• Cyberbulling is bullying people online. TheCyberbulling is bullying people online. The
consequences of cyberbullying can be veryconsequences of cyberbullying can be very
serious.serious.
• The Megan Meier Cyberbulling case has closedThe Megan Meier Cyberbulling case has closed
with 2 people being convicted of 3 misdemeanorwith 2 people being convicted of 3 misdemeanor
charges. However, the verdict is being appealed.charges. However, the verdict is being appealed.
27. Some Warning SignsSome Warning Signs
• Your child may be in contact with a sexual predator orYour child may be in contact with a sexual predator or
engaging in online crime if you see any of the followingengaging in online crime if you see any of the following
warning signs:warning signs:
Downloads photos of strangersDownloads photos of strangers
Downloads pornographic imagesDownloads pornographic images
Quickly turns off the computer or changes softwareQuickly turns off the computer or changes software
applications when someone enters the roomapplications when someone enters the room
Spends unsupervised time in chat roomsSpends unsupervised time in chat rooms
Waits until other family members are asleep or out ofWaits until other family members are asleep or out of
the home before going onlinethe home before going online
Receives unusual phone calls or gifts or letters in theReceives unusual phone calls or gifts or letters in the
mailmail
28. Some Warning SignsSome Warning Signs
• Your child may be in contact with a sexual predator orYour child may be in contact with a sexual predator or
engaging in online crime if you see any of the followingengaging in online crime if you see any of the following
warning signs:warning signs:
Is very secretive about online activities and the peopleIs very secretive about online activities and the people
he or she talks tohe or she talks to
Visits Web sites dealing with death, destruction, orVisits Web sites dealing with death, destruction, or
other morbid topicsother morbid topics
Uses online accounts that you do not recognize or usesUses online accounts that you do not recognize or uses
multiple e-mail addressesmultiple e-mail addresses
Spends countless hours on the computer and his orSpends countless hours on the computer and his or
her school grades have droppedher school grades have dropped
You find illegally obtained software on your computerYou find illegally obtained software on your computer
29. If You See Warning SignsIf You See Warning Signs
• Talk with your child and try to find out what isTalk with your child and try to find out what is
going on.going on.
• Contact your local police for assistance.Contact your local police for assistance.
• Above all, DON’T touch the computer. InAbove all, DON’T touch the computer. In
doing so you may inadvertently destroy evidencedoing so you may inadvertently destroy evidence
needed to prosecute an offender.needed to prosecute an offender.
30. Some Simple StepsSome Simple Steps
• Keep the computer in a public place in yourKeep the computer in a public place in your
home.home.
• Talk about the dangers of the Internet, and setTalk about the dangers of the Internet, and set
some rules that your child needs to follow.some rules that your child needs to follow.
• Examine your Internet browser history.Examine your Internet browser history.
• Consider using Content filtering and ComputerConsider using Content filtering and Computer
monitoring software.monitoring software.
• Limit the amount of time spent on theLimit the amount of time spent on the
computer.computer.
31. Some Simple StepsSome Simple Steps
• Make sure your kids know to never divulgeMake sure your kids know to never divulge
personal information over the Internetpersonal information over the Internet
• You should have your kids e-mail username andYou should have your kids e-mail username and
password. Don’t let them have more than onepassword. Don’t let them have more than one
email account.email account.
• Make sure that your kinds know to let you knowMake sure that your kinds know to let you know
right away if they run into a problem online.right away if they run into a problem online.
• Spend time online with your kids.Spend time online with your kids.
33. Internet Browser History – TheInternet Browser History – The
INDEX.DAT FilesINDEX.DAT Files
• Windows also keeps hidden history files calledWindows also keeps hidden history files called
index.dat.index.dat.
• Most computers have several index.dat filesMost computers have several index.dat files
• These files are not human readable and require aThese files are not human readable and require a
special viewer.special viewer.
34. Content Filtering SoftwareContent Filtering Software
• Content filtering software allows you to filterContent filtering software allows you to filter
that content that your child can access on thethat content that your child can access on the
Internet.Internet.
• Some examples of this software are NetnannySome examples of this software are Netnanny
and CYBERPatrol.and CYBERPatrol.
• Websites, Emails and Instant messages can beWebsites, Emails and Instant messages can be
filtered with this type of software.filtered with this type of software.
35. Computer Monitoring SoftwareComputer Monitoring Software
• Another option that is available to parents isAnother option that is available to parents is
computer monitoring software, such as Spectorcomputer monitoring software, such as Spector
Pro (Pro (http://www.spector.comhttp://www.spector.com))
• Monitoring software records everything that isMonitoring software records everything that is
done on the computer and presents it to you.done on the computer and presents it to you.
• Although some parents may have ethicalAlthough some parents may have ethical
concerns with using this type of software. I feelconcerns with using this type of software. I feel
that it is a necessary step in today’s world.that it is a necessary step in today’s world.
36. Limit The Technology They HaveLimit The Technology They Have
Access ToAccess To
• What this means is if your child does notWhat this means is if your child does not
actually have a need to use something (such as aactually have a need to use something (such as a
cell phone with a camera in it) don’t let themcell phone with a camera in it) don’t let them
have one.have one.
• There’s an ongoing case of a 15 year old girl outThere’s an ongoing case of a 15 year old girl out
in Ohio that has been arrested for sending nudein Ohio that has been arrested for sending nude
pictures of herself that she took with the camerapictures of herself that she took with the camera
in her cell phone to other students.in her cell phone to other students.
37. Limit The Technology They HaveLimit The Technology They Have
Access ToAccess To
• ““Sexting” is the act of using a cell phone cameraSexting” is the act of using a cell phone camera
to take pornographic pictures of yourself andto take pornographic pictures of yourself and
spread them around to your friends.spread them around to your friends.
• This is a very dangerous practice and isThis is a very dangerous practice and is
considered manufacturing and distribution ofconsidered manufacturing and distribution of
child pornography.child pornography.
• Penalties for this offence are extreme.Penalties for this offence are extreme.
38. Limit The Technology They HaveLimit The Technology They Have
Access ToAccess To
• Charges are also being considered against someCharges are also being considered against some
of the students that received the photos.of the students that received the photos.
• If the girl is convicted, she faces the possibilityIf the girl is convicted, she faces the possibility
of having to register as a sex offender for 20of having to register as a sex offender for 20
years.years.
• The Ohio case is the result of “sexting”The Ohio case is the result of “sexting”
• Webcams can also be a very dangerous piece ofWebcams can also be a very dangerous piece of
technology.technology.
39. Limit The Technology They HaveLimit The Technology They Have
Access ToAccess To
• A then 13 year old California boy named JustinA then 13 year old California boy named Justin
Barry began posing on his webcam for peopleBarry began posing on his webcam for people
that turned out to be sexual predators.that turned out to be sexual predators.
• He progressed into operating a porn site with hisHe progressed into operating a porn site with his
own photos that made him several hundredown photos that made him several hundred
thousand dollars.thousand dollars.
• He was sexually abused several times.He was sexually abused several times.
• Later he became a witness for the FBI and wasLater he became a witness for the FBI and was
given immunity.given immunity.
40. Limit The Technology They HaveLimit The Technology They Have
Access ToAccess To
• With the information that he turned over to theWith the information that he turned over to the
FBI he was not only able to bring down manyFBI he was not only able to bring down many
sexual predators but also web hosting companiessexual predators but also web hosting companies
and credit card processors. He saved the lives ofand credit card processors. He saved the lives of
hundreds, perhaps thousands of children thoughhundreds, perhaps thousands of children though
his actions.his actions.
41. Limit The Technology They HaveLimit The Technology They Have
Access ToAccess To
• If you get certain types of malware on yourIf you get certain types of malware on your
computer your webcam can be used to spy oncomputer your webcam can be used to spy on
you without your knowledge.you without your knowledge.