© 2008 i-safe inc. an i-safe presentation. examining online predators have you ever heard the term...

20
© 2008 i-SAFE Inc. an i-SAFE presentation

Upload: alvin-hall

Post on 13-Jan-2016

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

© 2008 i-SAFE Inc.an i-SAFE presentation

Page 2: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

Examining Online Predators

Have you ever heard the term “cyber” or “online predator” used? If so, where did you hear it, on television, at school, or did you hear your parents say it at home?

© 2008 i-SAFE Inc.

Page 3: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

What Do YOU Think It Means?

Brainstorm – what is a “cyber” or “online” predator?

© 2008 i-SAFE Inc.

Page 4: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

Online Predator or Not?

A 48-year-old man goes online and pretends to be a 16-year-old skateboarder. He becomes friends with a 14-year-old girl. They talk for a while and exchange personal information. One night when the girl’s parents are out, the man shows up at her house.

© 2008 i-SAFE Inc.

Page 5: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

A 38-year-old man goes online and pretends to be a 16-year-old skateboarder. He becomes friends with a 16-year-old boy. They talk for a while and exchange personal information. One night when the boy’s parents are out, the older man shows up at his house.

© 2008 i-SAFE Inc.

Online Predator or Not?

Page 6: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

A 24-year-old guy goes online. While online, he meets and talks to a 15-year-old girl. They both like the same music and strike up a friendship. Over time they discover they have lots in common. The 24-year-old asks the girl to meet up with him for a real date.

© 2008 i-SAFE Inc.

Online Predator or Not?

Page 7: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

Online Relationships: Positive and Negative

However…there are many types of POSITIVE online relationships. As a matter of fact, these types of relationships are helping to shape our Web 2.0 environment, as people actively share using technology.

The trick is to know the positives and avoid the negatives.

© 2008 i-SAFE Inc.

Page 8: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

Brainstorm examples of online relationships that are appropriate (OK and positive).Include ages.Have someone write down your list.

Online Relationships

© 2008 i-SAFE Inc.

Page 9: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

Review your list.Have you included examples that include relationships between adults and minors?

When is it acceptable and safe to form an online relationship with an adult?

© 2008 i-SAFE Inc.

Online Relationships

Page 10: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

Think About It:Just because you may “know” a person you are forming an online relationship with, does not guarantee that the relationship is OK or appropriate.

Online Relationships

© 2008 i-SAFE Inc.

Page 11: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

Today’s Cyber Predator

There are many different versions of today’s cyber predator. What they all have in common is that the predator attempts to strike up an online relationship that crosses the line at some point to become an offline sexual relationship with a minor.

© 2008 i-SAFE Inc.

Page 12: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

Grooming Process

The grooming process is one way a predator develops trust in an online “friend.”

In simple terms, it is a process that a predator uses to build a friend-ship, leading to a sexual encounter with the intended victim.

© 2008 i-SAFE Inc.

Page 13: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

Avoid Victimization

Internet predators take advantage of youth online by manipulating them into CRIMINAL sexual relationships. They appeal to the desire to be appreciated and understood. They understand that teens are often willing to take risks and have a natural curiosity about sex.

© 2008 i-SAFE Inc.

Page 14: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

1. Don’t be willing to talk about or discuss sex online or with someone you meet online.

2. Don’t be influenced by friends who encourage you to engage in these types of activities.

© 2008 i-SAFE Inc.

What You Need To Do

Page 15: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

3. Keep parents and friends informed of any online friendships that form.

There’s no need to give a lot of detail – just let them know how and where you socialize online – keep lines of communication open!

© 2008 i-SAFE Inc.

What You Need To Do

Page 16: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

4. Be cautious when revealing personal information online.

5. Be suspicious of any ADULT who wants to be your friend online.

© 2008 i-SAFE Inc.

What You Need To Do

Page 17: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

6. Use your best judgment when entering chats, creating personal webpages and engaging in social networks. Think about what image you are portraying, not just to your friends, but to the world.

© 2008 i-SAFE Inc.

What You Need To Do

Page 18: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

7. Help your friends use their best judgment when entering chats, creating personal webpages and engaging in social networks. Help them understand the image they are portraying to the world.

© 2008 i-SAFE Inc.

What You Need To Do

Page 19: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

Review

It’s easy to avoid online predators if you approach online activities with knowledge of how people can be victimized.Use what you have learned to think about your current Internet activities and maintain safety every time you are online.

© 2008 i-SAFE Inc.

Page 20: © 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did

Thank you for participating in this i-SAFE presentation.

Duplication and/or selling of the information contained within this document, or any other form of unauthorized use of this copyrighted material, is against the law and a punishable crime.

© 2008 i-SAFE Inc.