1 / 45

Protecting Children Online

Protecting Children Online. Presented by BCSO ICAC Task Force. KEEPING OUR CHILDREN SAFE Abduction FACTS. 90% of missing children have simply misunderstood directions or miscommunicated their plans, are lost, or have run away

wayne
Download Presentation

Protecting Children Online

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protecting Children Online Presented by BCSO ICAC Task Force

  2. KEEPING OUR CHILDREN SAFEAbduction FACTS • 90% of missing children have simply misunderstood directions or miscommunicated their plans, are lost, or have run away • Of the remainder, 78% are kidnapped by a family member in a custody dispute • Of the remaining 22% who are abducted, more than 60% of the time it’s by someone the child knows • ONLY ABOUT 100 American children are kidnapped each year in the stereotypical stranger abductions you hear about in the media DATA: National Incidence Studies of Missing, Abducted, Runaway and Throwaway Children, 2002, U.S. Department of Justice

  3. Who is most at risk online? Teenagers. • They have a high level of autonomy & independence • Are technologically savvy (far beyond their parents and teachers) but have little wisdom about good boundaries

  4. Do You Know These Terms? • CU46 • See you for Sex • GNOC • Go Naked on Cam • www.noslang.com

  5. Social Networking Sites

  6. Here’s Dannys profile…he likes poetry, plants, flowers and watching movies by the fire.

  7. Danny loves his country and is here for dating, serious relationships, friends and networking. So far he has 14 friends listed

  8. Danny has posted some pics of his tatoo’s. Says here that he is looking for a girlfriend!

  9. Now let’s look at another website • Arizonasexoffender.com

  10. Hey! There’s Danny. Surprise! His myspace page never mentioned that he is a level 3, high-risk sex offender.

  11. Skype and OoVoo

  12. Peer to peer • Limewire, Kazaa, Bearshare, etc • File sharing software with multi-users

  13. Peer to Peer Ultra-peer Peer or user computers Suspect

  14. Peer to Peer

  15. CyberbullyingA New Twist to an Age-Old Problem What Students Need to Know

  16. What is Cyberbullying? • Using e-mail, chat rooms, websites and other forms of electric communication to: • send mean-spirited messages • make cruel and harmful remarks about individuals • post unflattering or derogatory photos • make direct threats or encourage acts of violence • sexually harass

  17. How Extensive is Cyberbullying? In a new survey of 5,500 teens by MindOh!, an educational company that studies youth trends, nearly 80 percent said they have read or spread gossip online; more than half said they had seen Web sites that made fun of their peers.

  18. Why should we worry? • Bullying is broadly associated with: • School violence • Delinquency • Suicidal ideation • Bullied teens (and often bullies themselves) have higher levels of: • Depression and other psychological problems • Substance abuse • Delinquency / School avoidance • Weapon-carrying • Poor parent/caregiver relationships • Offline victimization/sexual abuse/physical abuse

  19. Why Don’t Victims Ask for Help? Kids view the Internet as a lifeline to their peer group. Kids don’t want adults to know they have a problem with cyberbullying because they fear that adults will take their computer away.

  20. How to Stop a CyberbullyTips from WiredSafety.org Be private - keep passwords, pictures and secrets to yourself. Take five - don’t reply in anger. Stop, block and tell - don’t reply, block the sender, tell someone. Save the evidence - on your computer or print out. Google yourself.

  21. Online Resources about Cyberbullying WiredSafety.org: This website helps victims of all types of cyber crimes including cyberbullying. http://www.wiredsafety.org/youth.html Internet Super heros Website: Delivering smart, safe and responsible surfing messages to children, teens, schools and parents, online and offline.http://www.internetsuperheroes.org/ Cyberbullying Website, created by Bill Belsey as a partner site to http://bullying.org / http://cyberbullying.org/ Educator’s Guide to Cyberbullying, Center for Safe and Responsible Internet Use: explains cyberbullying and ways to stop it. http://cyberbully.org/docs/cbcteducator.pdf News reports about Cyberbullying http://cyberbully.org/newsreports.html

  22. SEXTING

  23. WHAT IS SEXTING? • The newly minted word for sending or posting nude or semi-nude photos or videos

  24. WHY ARE KIDS SEXTING? • 82.2% said to get attention • 66.3% said to be “cool” • 59.4% said to be like the popular girls • 54.8% said to find a boyfriend

  25. WHY ARE KIDS SEXTING? • Peer pressure ( 52%-Boys) (23%-Friend) • Revenge after a breakup • Blackmail • Flirting • Impulsive behavior • Special present • Joke • Think it will remain private

  26. STATISTICS • 22% of teenage girls had sent pictures • 18% of teenage boys had sent pictures • 37% of teenage girls and 40% of teenage boys have seen or posted sexually suggestive messages

  27. THE LAW • Teen found in possession of this type of image on his/her cell phone can be charged with possession of child pornography and the sender with distribution. • If convicted, you have to register as a sex offender

  28. Tragic Texting

  29. WHAT CAN TEENS DO? • If they receive a racy photo do not forward it. Speak to the person who sent it, if possible • If they have sent a racy photo-STOP! • May have to speak to a trusted adult about how to handle the situation

  30. Develop a deeper understanding of your children’s use of the Internet - Obtain AWARENESS! • Their online activities • The Internet environments they use and visit • Use of the Net to explore roles and identity • Learn about the Internet by asking your childrento teach you all that they know – “take notes” • Use the Internet environments and technological its tools • Don’t fear it – use it!

  31. Protecting children - Do rules work? • If you have a rule about meeting an Internet friend in person: • Reduces the likelihood of this happening by one-half • If you have a rule aboutvisiting inappropriate sites: • Without a rule, 43% of Grade 6 and 7 kids visited these sites • With a rule, only 14% visited these sites • Kids in Grades 8 and 9 have approximately one-third fewer rules than younger kids do. • Canadian Study

  32. Protecting children - Filtering Technological tools can be helpful when children are young. Inform your children when you use filters and/or monitoring tools. • Save instant messaging chat logs so you have access to them if a serious situation occurs. • Never be afraid to “invade your child’s privacy” – they have none!

  33. M.M.O.R.P.G.

  34. WOW (World of Warcraft) Second Life

  35. Social Networking vs Virtual World

  36. THANK YOU – Any questions? Questions

  37. Contact Information • Brevard County Sheriff’s Office • Sexual Offender Registration Tracking Unit (SORT) 321-633-8407 • E-mail: sort@bcso.us

More Related