SlideShare a Scribd company logo
The effects  of New Technology
Video Cameras Video – cassette recorders Making and Storing images and sounds Computers Different sorts of communication devices Scanners Digital cameras
 Morphing  and  Pseudo Pornography
The Impact of Internet
World Wide Web Japan73% USA 14% U.K. 3%
Country			Percentages United States		62.7 Russian Federation	10.3 Cyrus			3.9 Canada			3.6 Korea (South)		2.6 United Kingdom	2.5 Belgium			1.6 Taiwan			1.5 Others			11.3 Newsgroups and Communities
Chat Room Titles Baby sex Preteen sex Chat Room Toddler Spanking Chicken hawking A term coined by sex abuses for  their search for children in chat room
Law Enforcement Operations 1. No uniform system for recording offenses The three key Federal Agencies involved are the: FBI US Customs US Postal Inspection Service
Law Enforcement Operations 2.FBI’s Innocent Images Campaign Began in 1995 3.US Postal Inspection Service started since 1977 3,300 child molesters and pornographers  were arrested
Law Enforcement Operations 4.Conclusions from US data 5.Operation Cathedral and the     Wonder Land Club 6.Conclusions from Wonder Land 7.Special Police Units
Other Responses  to  Child Pornography
Other Responses to Child Pornography “Hotlines” or “Tiplines” are Mechanisms which allow people who have found what they think is illegal material on the internet to report it. Community Responses –Hotline INHOPE Internet Hotlines for EuropeAssociation of the Hotlines and Tip Lines across the world
Other Responses to Child Pornography Other Community Responses ASACP Adult Sites Against Child Pornography
Other Responses to Child Pornography Internet Industry Responses Governmental andInter-Governmental  approaches Recommendation
Other Responses to Child Pornography Internet Hotline Provides in Europe Association Members Internet Hotline Provides  in  Europe Association Members
Other Responses to Child Pornography Netsmart Rules to Help Parents  teach  their Children ,[object Object]
Never send anyone your picture, credit card or bank details, or anything else, without first checking with your parent or carer.
Never give your password to anyone, even a best friend.
Never arrange to meet anyone in person without first agreeing it with your parent or carer, and get them to come along to the first meeting, which should always be in a public place and you should always tell someone else where you are going and why.,[object Object]
Never respond to nasty, suggestive or rude emails or postings in Usenet Groups
Never open attachments to emails that come from people or sources you do not already know and trust
Delete the attachments immediately. They could contain viruses or other programmes which could completely destroy all the information and software on your computer.,[object Object]
Always be yourself and do not pretend to be anyone or anything you are not.
Always remember that if a site is described as being for adults only, or as being only for people of a certain age, you should respect that and stay out if you do not meet their criteria.
Always remember, if someone makes you an offer that seems too good to be true, it probably is.

More Related Content

What's hot

For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1
Vinay Kumar
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Leslie Witten
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
Department of Defense
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
sam31
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
Matt Britland
 
Internet safty
Internet saftyInternet safty
Internet safty
guestce38b330
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
st josephs
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
Kigose
 
Electronic safety grade 4 5
Electronic safety grade 4 5Electronic safety grade 4 5
Electronic safety grade 4 5
Melissa Halcott
 
Internet Safty
Internet SaftyInternet Safty
Internet Safty
guestd3478bf
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting Infographic
uKnow.com
 
10things
10things10things
10things
samthedragon
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
mcgeet
 
Online Safety
Online SafetyOnline Safety
Online Safety
Glenn Wiebe
 

What's hot (15)

For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Electronic safety grade 4 5
Electronic safety grade 4 5Electronic safety grade 4 5
Electronic safety grade 4 5
 
Internet Safty
Internet SaftyInternet Safty
Internet Safty
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting Infographic
 
10things
10things10things
10things
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online Safety
Online SafetyOnline Safety
Online Safety
 

Viewers also liked

Pauline De Guzman
Pauline De GuzmanPauline De Guzman
Pauline De Guzmaneyescloud
 
Jezell
JezellJezell
Jezell
guestd29b33
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
eyescloud
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
eyescloud
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
eyescloud
 
Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 
Content for Small Business
Content for Small BusinessContent for Small Business
Content for Small Business
Betsy Decillis
 
Creating Content for Meetings
Creating Content for MeetingsCreating Content for Meetings
Creating Content for Meetings
Betsy Decillis
 

Viewers also liked (8)

Pauline De Guzman
Pauline De GuzmanPauline De Guzman
Pauline De Guzman
 
Jezell
JezellJezell
Jezell
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Content for Small Business
Content for Small BusinessContent for Small Business
Content for Small Business
 
Creating Content for Meetings
Creating Content for MeetingsCreating Content for Meetings
Creating Content for Meetings
 

Similar to Second Speaker

Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
National Crime Prevention Council
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
UNC-Greensboro
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
timryan7
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
egregory
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
Dan Bowen
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
Eanes isd
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
NiravD3
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
Victor Font
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kids
peterhitch
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
Mark Deming
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
Jason Rushing
 
Internet safety
Internet safetyInternet safety
Internet safety
mbend360
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
E Robertson
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
alyssacarricato
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
Rahuljain40418
 
102009
102009102009
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
E Robertson
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
t2839ms18
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
Matthew Irvine
 

Similar to Second Speaker (20)

Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kids
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
102009
102009102009
102009
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 

Recently uploaded

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 

Second Speaker

  • 1.
  • 2. The effects of New Technology
  • 3. Video Cameras Video – cassette recorders Making and Storing images and sounds Computers Different sorts of communication devices Scanners Digital cameras
  • 4. Morphing and Pseudo Pornography
  • 5. The Impact of Internet
  • 6. World Wide Web Japan73% USA 14% U.K. 3%
  • 7. Country Percentages United States 62.7 Russian Federation 10.3 Cyrus 3.9 Canada 3.6 Korea (South) 2.6 United Kingdom 2.5 Belgium 1.6 Taiwan 1.5 Others 11.3 Newsgroups and Communities
  • 8. Chat Room Titles Baby sex Preteen sex Chat Room Toddler Spanking Chicken hawking A term coined by sex abuses for their search for children in chat room
  • 9. Law Enforcement Operations 1. No uniform system for recording offenses The three key Federal Agencies involved are the: FBI US Customs US Postal Inspection Service
  • 10. Law Enforcement Operations 2.FBI’s Innocent Images Campaign Began in 1995 3.US Postal Inspection Service started since 1977 3,300 child molesters and pornographers were arrested
  • 11. Law Enforcement Operations 4.Conclusions from US data 5.Operation Cathedral and the Wonder Land Club 6.Conclusions from Wonder Land 7.Special Police Units
  • 12. Other Responses to Child Pornography
  • 13. Other Responses to Child Pornography “Hotlines” or “Tiplines” are Mechanisms which allow people who have found what they think is illegal material on the internet to report it. Community Responses –Hotline INHOPE Internet Hotlines for EuropeAssociation of the Hotlines and Tip Lines across the world
  • 14. Other Responses to Child Pornography Other Community Responses ASACP Adult Sites Against Child Pornography
  • 15. Other Responses to Child Pornography Internet Industry Responses Governmental andInter-Governmental approaches Recommendation
  • 16. Other Responses to Child Pornography Internet Hotline Provides in Europe Association Members Internet Hotline Provides in Europe Association Members
  • 17.
  • 18. Never send anyone your picture, credit card or bank details, or anything else, without first checking with your parent or carer.
  • 19. Never give your password to anyone, even a best friend.
  • 20.
  • 21. Never respond to nasty, suggestive or rude emails or postings in Usenet Groups
  • 22. Never open attachments to emails that come from people or sources you do not already know and trust
  • 23.
  • 24. Always be yourself and do not pretend to be anyone or anything you are not.
  • 25. Always remember that if a site is described as being for adults only, or as being only for people of a certain age, you should respect that and stay out if you do not meet their criteria.
  • 26. Always remember, if someone makes you an offer that seems too good to be true, it probably is.
  • 27.
  • 28. Some Very Useful Websites Educational http://www.freecampus.co.uk http://safety.ngfl.gov.uk http://www.bbc.co.uk/education/home http://www.yahooligans.com http://www.becta.org.uk http://www.24hourmuseum.org.uk http://www.worldwildlife.org/fun Kids. sites http://www.kidsdomain.co.uk http://www.bbc.co.uk/cbbc http://www.beritsbest.com http://www.ala.org
  • 29. Some Very Useful Websites Internet safety generally http://www.nch.org.uk http://www.getnetwise.org http://www.bbc.co.uk/webwise/basics http://www.disney.co.uk/DisneyOnline/Safesurfing/index.html Information for Parents http://www.nch.org.uk http://www.pin.org.uk http://www.netparents.org Consumer advice and information http://www.net-consumers.org http://www.tradingstandards.gov.uk http://www.which.net http://www.oft.gov.uk
  • 30. Some Very Useful Websites Search engines http://www.searchenginewatch.com/links/Major_Search_Engines Search engines especially for children http://www.searchenginewatch.com/links/Kids_Search_Engines http://www.yahooligans.com http://sunsite.berkeley.edu/kidsclick Chat http://www.chatdanger.com Reporting bad stuff http://www.iwf.org.uk Filtering and blocking and parental control software http://www.getnetwise.org
  • 31. The 49 countries with identified members of the Wonderland Club
  • 32. The 49 countries with identified members of the Wonderland Club
  • 33. Countries identified as having members of Wonderland but who were not involved inOperation Cathedral: