SlideShare a Scribd company logo
The effects  of New Technology
Video Cameras Video – cassette recorders Making and Storing images and sounds Computers Different sorts of communication devices Scanners Digital cameras
 Morphing  and  Pseudo Pornography
The Impact of Internet
World Wide Web Japan73% USA 14% U.K. 3%
Country			Percentages United States		62.7 Russian Federation	10.3 Cyrus			3.9 Canada			3.6 Korea (South)		2.6 United Kingdom	2.5 Belgium			1.6 Taiwan			1.5 Others			11.3 Newsgroups and Communities
Chat Room Titles Baby sex Preteen sex Chat Room Toddler Spanking Chicken hawking A term coined by sex abuses for  their search for children in chat room
Law Enforcement Operations 1. No uniform system for recording offenses The three key Federal Agencies involved are the: FBI US Customs US Postal Inspection Service
Law Enforcement Operations 2.FBI’s Innocent Images Campaign Began in 1995 3.US Postal Inspection Service started since 1977 3,300 child molesters and pornographers  were arrested
Law Enforcement Operations 4.Conclusions from US data 5.Operation Cathedral and the     Wonder Land Club 6.Conclusions from Wonder Land 7.Special Police Units
Other Responses  to  Child Pornography
Other Responses to Child Pornography “Hotlines” or “Tiplines” are Mechanisms which allow people who have found what they think is illegal material on the internet to report it. Community Responses –Hotline INHOPE Internet Hotlines for EuropeAssociation of the Hotlines and Tip Lines across the world
Other Responses to Child Pornography Other Community Responses ASACP Adult Sites Against Child Pornography
Other Responses to Child Pornography Internet Industry Responses Governmental andInter-Governmental  approaches Recommendation
Other Responses to Child Pornography Internet Hotline Provides in Europe Association Members Internet Hotline Provides  in  Europe Association Members
Other Responses to Child Pornography Netsmart Rules to Help Parents  teach  their Children ,[object Object]
Never send anyone your picture, credit card or bank details, or anything else, without first checking with your parent or carer.
Never give your password to anyone, even a best friend.
Never arrange to meet anyone in person without first agreeing it with your parent or carer, and get them to come along to the first meeting, which should always be in a public place and you should always tell someone else where you are going and why.,[object Object]
Never respond to nasty, suggestive or rude emails or postings in Usenet Groups
Never open attachments to emails that come from people or sources you do not already know and trust
Delete the attachments immediately. They could contain viruses or other programmes which could completely destroy all the information and software on your computer.,[object Object]
Always be yourself and do not pretend to be anyone or anything you are not.
Always remember that if a site is described as being for adults only, or as being only for people of a certain age, you should respect that and stay out if you do not meet their criteria.
Always remember, if someone makes you an offer that seems too good to be true, it probably is.

More Related Content

What's hot

For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1
Vinay Kumar
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Leslie Witten
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
Department of Defense
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
sam31
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
Matt Britland
 
Internet safty
Internet saftyInternet safty
Internet safty
guestce38b330
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
st josephs
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
Kigose
 
Electronic safety grade 4 5
Electronic safety grade 4 5Electronic safety grade 4 5
Electronic safety grade 4 5
Melissa Halcott
 
Internet Safty
Internet SaftyInternet Safty
Internet Safty
guestd3478bf
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting Infographic
uKnow.com
 
10things
10things10things
10things
samthedragon
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
mcgeet
 
Online Safety
Online SafetyOnline Safety
Online Safety
Glenn Wiebe
 

What's hot (15)

For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Electronic safety grade 4 5
Electronic safety grade 4 5Electronic safety grade 4 5
Electronic safety grade 4 5
 
Internet Safty
Internet SaftyInternet Safty
Internet Safty
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting Infographic
 
10things
10things10things
10things
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online Safety
Online SafetyOnline Safety
Online Safety
 

Viewers also liked

Linkedin ZEST Richard Donovan
Linkedin ZEST Richard DonovanLinkedin ZEST Richard Donovan
Linkedin ZEST Richard Donovan
Richard Donovan
 
The new enterprise integration days - Gothenburg 2014
The new enterprise   integration days - Gothenburg 2014The new enterprise   integration days - Gothenburg 2014
The new enterprise integration days - Gothenburg 2014
Richard Donovan
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
In a Rocket
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
Post Planner
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
Kirsty Hulse
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
ux singapore
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Stanford GSB Corporate Governance Research Initiative
 

Viewers also liked (7)

Linkedin ZEST Richard Donovan
Linkedin ZEST Richard DonovanLinkedin ZEST Richard Donovan
Linkedin ZEST Richard Donovan
 
The new enterprise integration days - Gothenburg 2014
The new enterprise   integration days - Gothenburg 2014The new enterprise   integration days - Gothenburg 2014
The new enterprise integration days - Gothenburg 2014
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Second Speaker

Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
National Crime Prevention Council
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
UNC-Greensboro
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
timryan7
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
egregory
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
Dan Bowen
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
Eanes isd
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
NiravD3
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
Victor Font
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kids
peterhitch
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
Mark Deming
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
Jason Rushing
 
Internet safety
Internet safetyInternet safety
Internet safety
mbend360
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
E Robertson
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
alyssacarricato
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
Rahuljain40418
 
102009
102009102009
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
E Robertson
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
t2839ms18
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
Matthew Irvine
 

Similar to Second Speaker (20)

Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kids
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
102009
102009102009
102009
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 

Recently uploaded

dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 

Recently uploaded (20)

dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 

Second Speaker

  • 1.
  • 2. The effects of New Technology
  • 3. Video Cameras Video – cassette recorders Making and Storing images and sounds Computers Different sorts of communication devices Scanners Digital cameras
  • 4. Morphing and Pseudo Pornography
  • 5. The Impact of Internet
  • 6. World Wide Web Japan73% USA 14% U.K. 3%
  • 7. Country Percentages United States 62.7 Russian Federation 10.3 Cyrus 3.9 Canada 3.6 Korea (South) 2.6 United Kingdom 2.5 Belgium 1.6 Taiwan 1.5 Others 11.3 Newsgroups and Communities
  • 8. Chat Room Titles Baby sex Preteen sex Chat Room Toddler Spanking Chicken hawking A term coined by sex abuses for their search for children in chat room
  • 9. Law Enforcement Operations 1. No uniform system for recording offenses The three key Federal Agencies involved are the: FBI US Customs US Postal Inspection Service
  • 10. Law Enforcement Operations 2.FBI’s Innocent Images Campaign Began in 1995 3.US Postal Inspection Service started since 1977 3,300 child molesters and pornographers were arrested
  • 11. Law Enforcement Operations 4.Conclusions from US data 5.Operation Cathedral and the Wonder Land Club 6.Conclusions from Wonder Land 7.Special Police Units
  • 12. Other Responses to Child Pornography
  • 13. Other Responses to Child Pornography “Hotlines” or “Tiplines” are Mechanisms which allow people who have found what they think is illegal material on the internet to report it. Community Responses –Hotline INHOPE Internet Hotlines for EuropeAssociation of the Hotlines and Tip Lines across the world
  • 14. Other Responses to Child Pornography Other Community Responses ASACP Adult Sites Against Child Pornography
  • 15. Other Responses to Child Pornography Internet Industry Responses Governmental andInter-Governmental approaches Recommendation
  • 16. Other Responses to Child Pornography Internet Hotline Provides in Europe Association Members Internet Hotline Provides in Europe Association Members
  • 17.
  • 18. Never send anyone your picture, credit card or bank details, or anything else, without first checking with your parent or carer.
  • 19. Never give your password to anyone, even a best friend.
  • 20.
  • 21. Never respond to nasty, suggestive or rude emails or postings in Usenet Groups
  • 22. Never open attachments to emails that come from people or sources you do not already know and trust
  • 23.
  • 24. Always be yourself and do not pretend to be anyone or anything you are not.
  • 25. Always remember that if a site is described as being for adults only, or as being only for people of a certain age, you should respect that and stay out if you do not meet their criteria.
  • 26. Always remember, if someone makes you an offer that seems too good to be true, it probably is.
  • 27.
  • 28. Some Very Useful Websites Educational http://www.freecampus.co.uk http://safety.ngfl.gov.uk http://www.bbc.co.uk/education/home http://www.yahooligans.com http://www.becta.org.uk http://www.24hourmuseum.org.uk http://www.worldwildlife.org/fun Kids. sites http://www.kidsdomain.co.uk http://www.bbc.co.uk/cbbc http://www.beritsbest.com http://www.ala.org
  • 29. Some Very Useful Websites Internet safety generally http://www.nch.org.uk http://www.getnetwise.org http://www.bbc.co.uk/webwise/basics http://www.disney.co.uk/DisneyOnline/Safesurfing/index.html Information for Parents http://www.nch.org.uk http://www.pin.org.uk http://www.netparents.org Consumer advice and information http://www.net-consumers.org http://www.tradingstandards.gov.uk http://www.which.net http://www.oft.gov.uk
  • 30. Some Very Useful Websites Search engines http://www.searchenginewatch.com/links/Major_Search_Engines Search engines especially for children http://www.searchenginewatch.com/links/Kids_Search_Engines http://www.yahooligans.com http://sunsite.berkeley.edu/kidsclick Chat http://www.chatdanger.com Reporting bad stuff http://www.iwf.org.uk Filtering and blocking and parental control software http://www.getnetwise.org
  • 31. The 49 countries with identified members of the Wonderland Club
  • 32. The 49 countries with identified members of the Wonderland Club
  • 33. Countries identified as having members of Wonderland but who were not involved inOperation Cathedral: