SlideShare una empresa de Scribd logo
1 de 70
BE NET SAFE .ORG SM
 
BeNetSafe.Org Founded in September 2002 9/2002 - 9/2007 The Un-Funded Organization Reached out to 7000+ Students Spoke to 600+ Parents / Police / Educators Reached out to the state using the GSDLN 10/2007 becomes a Non-Profit organization Continue to talk to students and adults Further develop partnerships  Support State-Wide Student mentor Programs
BeNetSafe.Org ,[object Object],[object Object],[object Object],[object Object]
BeNetSafe.Org ,[object Object],[object Object],[object Object],[object Object],[object Object]
Online “Predators” and Their Victims Myths, Realities, and Implications for Prevention and Treatment February–March 2008  American Psychologist Janis Wolak, David Finkelhor, and Kimberly J. Mitchell, Crimes against Children Research Center and Family Research Laboratory, University of New Hampshire;  Michele L. Ybarra, Internet Solutions for Kids, Inc., Santa Ana, California. The article outlined 9 risky on-line behaviors ●  Posting personal information online, 56% of youth Internet users ●  Interacting online with unknown people, 43% ●  Having unknown people on a buddy list, 35% ●  Using the Internet to make rude and nasty comments to others, 28% ●  Sending personal information to unknown people met online, 26% ●  Downloading images from file-sharing programs, 15% ●  Visiting X-rated sites on purpose, 13%  ●  Using the Internet to embarrass or harass people youths are mad at, 9% ●  Talking online to unknown people about sex, 5%
[object Object],[object Object],[object Object],[object Object],[object Object]
Social Network Required Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],--------   subtract 3 days
OPTIONAL INFORMATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Information Favorite Color:  Screen Name:  Favorite Band:  Favorite Movie:  Favorite Show:  Your Car:  Your Hometown:  Your Present Town:  Your Crushes First Name:  Your Grade:  Your Style:  What is Your Name?  How old are you?  Eye color?  Shoe Size?  Hair color?  Height?  Weight?  Favorite:  Food?  Drink?  Movie?  Music Band?  Animal?  Sport?  What is the link to your website, blog, or myspace?  Place to live?  Subject?  Stuff......  Best thing that happened to you in the last few years?  Do you want to get married?  Kids?  Best place to go on a date?  What is your dream?  What do you want to do when you grow up?  Play an instrument?  List 5 things (inc. brand) you are wearing right now  Friends....  Friend you have known the longest?  Best friend(s)?  Friend that makes you laugh the most?  Friend who you can talk to anything about?  Friend with the best personality?  Last friend to call you?  Last friend to talk to you?  Last friend you hung out with?  Last friend you went to a movie with?  Last friend to make you laugh?  Most memorable experience with a friend?  Anything you plan to do with friends when you get older?  Any trips planned with friends?  Ever traveled anywhere?  What places do you want to visit?  Where do you want to live when you're older?  How happy are you with where you are in life? Why?  What's your most embarrassing moment?  Do you have any art or pictures on your walls? Describe it.
Social Networking Sites But I made my site PRIVATE!!!
Social Networking Sites Facebook signs up 100,000 new users every day. Including one 'Freddi Staur' (an anagram of 'ID Fraudster’) a world leader in IT security and control
Social Networking Sites Research shows that 41 percent of users, more than two in five, will divulge personal information - such as email address, date of birth and phone number - to a complete stranger, or at least to Freddi Staur.
Social Networking Sites 43 percent of users contacted responded to Freddi. 41 percent of those approached leaked personal information.
Social Networking Sites 87 percent of respondents provided details about  their education or workplace. 84 percent of respondents listed their full date of birth. 78 percent of respondents listed their current address or location. 72 percent of respondents divulged one or more email address. 26 percent of respondents provided their instant messaging screen name.  23 percent of respondents listed their current phone number.
Social Networking Sites In the majority of cases, Freddi was able to gain access to respondents’ photos of family and friends, information about likes and dislikes, hobbies, employer details and other personal facts. Many users also disclosed the names of their spouses/partners, several included their complete résumés, while one user even  divulged his mother's maiden name.
Social Networking Sites ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Networking Sites Posting in cyberspace is forever. What ever you post today can come back to haunt you years from now. An ‘Live Search’ search for "Freddi Staur” returned more than 5000 results.
Social Networking Sites ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber Predators ,[object Object],[object Object],[object Object]
Stage One Predator Appears Familiar ,[object Object],[object Object],[object Object],[object Object]
Stage Two Develops Trust ,[object Object],[object Object],[object Object],[object Object]
Stage Three Establishes Secrecy ,[object Object],[object Object],[object Object],[object Object]
The Last Stage The Face to Face Meeting ,[object Object],[object Object],[object Object],[object Object]
Anthony R. Stancl Circuit Court Commissioner Laura Florian Lau  “most horrific allegations she has reviewed in all her years on the bench.”  Posing as a female on Facebook makes contact asking for explicit photos Blackmailed some of the boys under the threat that the pictures would be released to the rest of the high school. Threatens harm to family members  According to criminal complaints filed:
Anthony R. Stancl According to reports 300 naked photos and movie clips of New Berlin boys and another 600 professionally made pornographic movies of children were found on the computer. "The defendant is facing 293 years if convicted on these 12 counts. . . . This crime allegedly involved many, many, many victims.”  Laura Florian Lau
The Last Stage The Face to Face Meeting
35 percent of kids have been threatened online 42 percent of kids have been bullied online. 53 percent of kids admit to bullying others online. 58 percent have not told their parents or an adult. Cyber Bullies The Internet is the new bathroom wall
Teen charged with using MySpace to intimidate ACGC teacher, students (Gretchen Schlosser) West Central Tribune Published Saturday, November 17, 2007 OLIVIA — Charges have been filed against a 17-year-old Olivia teen who allegedly hacked into another teenager’s MySpace. com account and used it to threaten students and a teacher at Atwater-Cosmos-Grove City High School. Meeker County Sheriff’s deputies were called to the high school on Oct. 10 to investigate the threats.
Mobile Phones
Mobile Phones The Internet no longer stops at your front door!
Mobile Devices Sexting Bullying A girl in Ohio was charged for sending nude photos of herself to classmates.  If convicted she could have to register as a sex offender for 20 years. Another concern now with cell phones. Some teens are bullying through repeated and hostile text messages.
Mobile Phones ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile Phones
Mobile Phones
Mobile Phones
Mobile Phones ,[object Object],[object Object]
Mobile Phones ,[object Object],[object Object]
Mobile Phones Web Browsing Camera Messaging (IM)
Mobile Phones Saved about 10 messages and the last 10 phone calls  Saves almost all received text messages, calls (in, out, and missed) “Google” searches, web browsing and even voice mails. Some phones even attach latitude and longitude to photos taken.
 
When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. "It is absolutely vile,“ her mother said.   ABC News
When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. "It is absolutely vile,“ her mother said.   ABC News
Resources for Parents
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
On-/Offline Activities  Safety Pledges  Internet Safety News www.NetSmartzKids.org Amy's   Choice  Julie's Journey  Tracking Teresa  Teens PSA: "Promises"
WebWiseKids ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
 
 
 
 
 
 
Protect yourself with Free Stuff!!
 
 
 
New Operating Systems Vista
New Operating Systems
New Operating Systems
 
The Future In New Hampshire ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Student Mentor Program  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Future In New Hampshire ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Help Fund BeNetSafe.Org Help Fund BeNetSafe.Org
Since February 2000 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How do you contact us? Currently the best way is by e-mail.  Send any and all questions and requests to Info@BeNetSafe.Org Events are listed at www.BeNetSafe.org.  BeNetSafe.Org SM
BE NET SAFE .ORG SM

Más contenido relacionado

La actualidad más candente

Willow pk 2011
Willow pk 2011Willow pk 2011
Willow pk 2011Bitbuzz
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersSWEET SPOT ACADEMY
 
Community Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingCommunity Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingShotzy Paugh
 
Grade 9 Informative Writing, Journalistic Writing and Literary Writing
Grade 9 Informative Writing, Journalistic Writing and Literary WritingGrade 9 Informative Writing, Journalistic Writing and Literary Writing
Grade 9 Informative Writing, Journalistic Writing and Literary WritingTalugtug National High School
 
Cyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group AnonymousCyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group Anonymousccastronovo
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying CarlosE15
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingsus22
 
Cyberbullying powerpoint shawn lemus
Cyberbullying powerpoint shawn lemusCyberbullying powerpoint shawn lemus
Cyberbullying powerpoint shawn lemusshawnlemus
 
What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?CyberSafeFamily
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationpamelazuley
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Resultsa2columnd12
 
E safety training for lewisham arts and education network (advance) by steph...
E  safety training for lewisham arts and education network (advance) by steph...E  safety training for lewisham arts and education network (advance) by steph...
E safety training for lewisham arts and education network (advance) by steph...Stephen Carrick-Davies
 

La actualidad más candente (20)

Willow pk 2011
Willow pk 2011Willow pk 2011
Willow pk 2011
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital Leaders
 
Community Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingCommunity Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social Networking
 
Grade 9 Informative Writing, Journalistic Writing and Literary Writing
Grade 9 Informative Writing, Journalistic Writing and Literary WritingGrade 9 Informative Writing, Journalistic Writing and Literary Writing
Grade 9 Informative Writing, Journalistic Writing and Literary Writing
 
Myspace
MyspaceMyspace
Myspace
 
Cyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group AnonymousCyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group Anonymous
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Web pp
Web ppWeb pp
Web pp
 
Cyberbullying powerpoint shawn lemus
Cyberbullying powerpoint shawn lemusCyberbullying powerpoint shawn lemus
Cyberbullying powerpoint shawn lemus
 
Web pp
Web ppWeb pp
Web pp
 
What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?What Does Your Online Reputation Reveal?
What Does Your Online Reputation Reveal?
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Results
 
Be a well aware mom !
Be a well aware mom !Be a well aware mom !
Be a well aware mom !
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´MooreCyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
 
E safety training for lewisham arts and education network (advance) by steph...
E  safety training for lewisham arts and education network (advance) by steph...E  safety training for lewisham arts and education network (advance) by steph...
E safety training for lewisham arts and education network (advance) by steph...
 

Similar a 102009

Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpumajcullishpum
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposiumkschermerhorn
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?migueltachna
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Gloria flores
Gloria floresGloria flores
Gloria floresyaya700
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetysharon7111
 

Similar a 102009 (20)

Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposium
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Gloria flores
Gloria floresGloria flores
Gloria flores
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Último

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Último (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

102009

  • 1. BE NET SAFE .ORG SM
  • 2.  
  • 3. BeNetSafe.Org Founded in September 2002 9/2002 - 9/2007 The Un-Funded Organization Reached out to 7000+ Students Spoke to 600+ Parents / Police / Educators Reached out to the state using the GSDLN 10/2007 becomes a Non-Profit organization Continue to talk to students and adults Further develop partnerships Support State-Wide Student mentor Programs
  • 4.
  • 5.
  • 6. Online “Predators” and Their Victims Myths, Realities, and Implications for Prevention and Treatment February–March 2008 American Psychologist Janis Wolak, David Finkelhor, and Kimberly J. Mitchell, Crimes against Children Research Center and Family Research Laboratory, University of New Hampshire; Michele L. Ybarra, Internet Solutions for Kids, Inc., Santa Ana, California. The article outlined 9 risky on-line behaviors ● Posting personal information online, 56% of youth Internet users ● Interacting online with unknown people, 43% ● Having unknown people on a buddy list, 35% ● Using the Internet to make rude and nasty comments to others, 28% ● Sending personal information to unknown people met online, 26% ● Downloading images from file-sharing programs, 15% ● Visiting X-rated sites on purpose, 13% ● Using the Internet to embarrass or harass people youths are mad at, 9% ● Talking online to unknown people about sex, 5%
  • 7.
  • 8.
  • 9.
  • 10. Other Information Favorite Color: Screen Name: Favorite Band: Favorite Movie: Favorite Show: Your Car: Your Hometown: Your Present Town: Your Crushes First Name: Your Grade: Your Style: What is Your Name? How old are you? Eye color? Shoe Size? Hair color? Height? Weight? Favorite: Food? Drink? Movie? Music Band? Animal? Sport? What is the link to your website, blog, or myspace? Place to live? Subject? Stuff...... Best thing that happened to you in the last few years? Do you want to get married? Kids? Best place to go on a date? What is your dream? What do you want to do when you grow up? Play an instrument? List 5 things (inc. brand) you are wearing right now Friends.... Friend you have known the longest? Best friend(s)? Friend that makes you laugh the most? Friend who you can talk to anything about? Friend with the best personality? Last friend to call you? Last friend to talk to you? Last friend you hung out with? Last friend you went to a movie with? Last friend to make you laugh? Most memorable experience with a friend? Anything you plan to do with friends when you get older? Any trips planned with friends? Ever traveled anywhere? What places do you want to visit? Where do you want to live when you're older? How happy are you with where you are in life? Why? What's your most embarrassing moment? Do you have any art or pictures on your walls? Describe it.
  • 11. Social Networking Sites But I made my site PRIVATE!!!
  • 12. Social Networking Sites Facebook signs up 100,000 new users every day. Including one 'Freddi Staur' (an anagram of 'ID Fraudster’) a world leader in IT security and control
  • 13. Social Networking Sites Research shows that 41 percent of users, more than two in five, will divulge personal information - such as email address, date of birth and phone number - to a complete stranger, or at least to Freddi Staur.
  • 14. Social Networking Sites 43 percent of users contacted responded to Freddi. 41 percent of those approached leaked personal information.
  • 15. Social Networking Sites 87 percent of respondents provided details about their education or workplace. 84 percent of respondents listed their full date of birth. 78 percent of respondents listed their current address or location. 72 percent of respondents divulged one or more email address. 26 percent of respondents provided their instant messaging screen name. 23 percent of respondents listed their current phone number.
  • 16. Social Networking Sites In the majority of cases, Freddi was able to gain access to respondents’ photos of family and friends, information about likes and dislikes, hobbies, employer details and other personal facts. Many users also disclosed the names of their spouses/partners, several included their complete résumés, while one user even divulged his mother's maiden name.
  • 17.
  • 18. Social Networking Sites Posting in cyberspace is forever. What ever you post today can come back to haunt you years from now. An ‘Live Search’ search for "Freddi Staur” returned more than 5000 results.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Anthony R. Stancl Circuit Court Commissioner Laura Florian Lau “most horrific allegations she has reviewed in all her years on the bench.” Posing as a female on Facebook makes contact asking for explicit photos Blackmailed some of the boys under the threat that the pictures would be released to the rest of the high school. Threatens harm to family members According to criminal complaints filed:
  • 26. Anthony R. Stancl According to reports 300 naked photos and movie clips of New Berlin boys and another 600 professionally made pornographic movies of children were found on the computer. "The defendant is facing 293 years if convicted on these 12 counts. . . . This crime allegedly involved many, many, many victims.” Laura Florian Lau
  • 27. The Last Stage The Face to Face Meeting
  • 28. 35 percent of kids have been threatened online 42 percent of kids have been bullied online. 53 percent of kids admit to bullying others online. 58 percent have not told their parents or an adult. Cyber Bullies The Internet is the new bathroom wall
  • 29. Teen charged with using MySpace to intimidate ACGC teacher, students (Gretchen Schlosser) West Central Tribune Published Saturday, November 17, 2007 OLIVIA — Charges have been filed against a 17-year-old Olivia teen who allegedly hacked into another teenager’s MySpace. com account and used it to threaten students and a teacher at Atwater-Cosmos-Grove City High School. Meeker County Sheriff’s deputies were called to the high school on Oct. 10 to investigate the threats.
  • 31. Mobile Phones The Internet no longer stops at your front door!
  • 32. Mobile Devices Sexting Bullying A girl in Ohio was charged for sending nude photos of herself to classmates. If convicted she could have to register as a sex offender for 20 years. Another concern now with cell phones. Some teens are bullying through repeated and hostile text messages.
  • 33.
  • 37.
  • 38.
  • 39. Mobile Phones Web Browsing Camera Messaging (IM)
  • 40. Mobile Phones Saved about 10 messages and the last 10 phone calls Saves almost all received text messages, calls (in, out, and missed) “Google” searches, web browsing and even voice mails. Some phones even attach latitude and longitude to photos taken.
  • 41.  
  • 42. When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. "It is absolutely vile,“ her mother said. ABC News
  • 43. When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. "It is absolutely vile,“ her mother said. ABC News
  • 45.
  • 46. On-/Offline Activities Safety Pledges Internet Safety News www.NetSmartzKids.org Amy's Choice Julie's Journey Tracking Teresa Teens PSA: "Promises"
  • 47.
  • 48.  
  • 49.  
  • 50.  
  • 51.  
  • 52.  
  • 53.  
  • 54.  
  • 55.  
  • 56.  
  • 57. Protect yourself with Free Stuff!!
  • 58.  
  • 59.  
  • 60.  
  • 64.  
  • 65.
  • 66.
  • 67.
  • 68.
  • 69. How do you contact us? Currently the best way is by e-mail. Send any and all questions and requests to Info@BeNetSafe.Org Events are listed at www.BeNetSafe.org. BeNetSafe.Org SM
  • 70. BE NET SAFE .ORG SM