2. What is Cyber-Safety?
Being cyber-safe is about learning to use the internet safely
without placing ourselves and others at risk
.
PEAK Marketing Systems http://peakmarketingsystemscom.au
3. This British ad campaign promotes safety on the internet….
https://www.youtube.com/watch?v=KdeqbHEbQDc
PEAK Marketing Systems http://peakmarketingsystemscom.au
4. Charlotte Dawson was a victim of Cyber Bullying
https://www.youtube.com/watch?v=N8eAkCRi8xQ
PEAK Marketing Systems http://peakmarketingsystemscom.au
5. Why is it important?
●
●
●
●
●
●
●
●
The internet has no boundaries. Paedophiles and child sex offenders can target children all over the
world;
A child can be targeted and groomed by an offender residing in another country;
Offenders can target and access children all over the world from the comfort of their own homes.
Children can be provided with inappropriate content and material.
Offenders can locate the whereabouts of children from information posted and shared on social media.
Children and young people can become the victim of cyber-bullying
You can be the victim of identity theft or fraud.
Any child in any community can be targeted.
l
PEAK Marketing Systems http://peakmarketingsystemscom.au
6. Operation Gatekeeper
Taskforce ARGOS seized more than 307,000 child pornography images from around
the world after shutting down an illegal website run by a man in Helensvale,
Queensland.
led to charges against 21 Queenslanders, including a 15 year old boy.
More than 21,000 internet addresses from over 100 countries were linked to the site.
The operation saved 29 child victims, including children from Queensland.
PEAK Marketing Systems http://peakmarketingsystemscom.au
7. How children are targeted
Online grooming - occurs when an adult makes online contact with someone
under the age of 16 with the intention of establishing a sexual relationship.
Social Networking - Over 80% of children in upper primary school report having a
social networking page.
Instant Messaging - Instant messaging is a program that can instantly send
messages from one computer to another anywhere in the world.
PEAK Marketing Systems http://peakmarketingsystemscom.au
8. How children are targeted cont.
Investigators from the Queensland Police Service’s Taskforce Argos have identified
children who have over 700 contacts in their buddy list, and in one investigation
arrested five child sex offenders from one child’s list.
Online Chat Rooms - these programs allow users to select a “room” based on a
particular interest or topic of conversation and allows them to chat instantly with
others.
Mobile phones – most allow for internet access
Online gaming – allows users to adopt virtual identities
PEAK Marketing Systems http://peakmarketingsystemscom.au
9. Why children are at risk
Offenders are able to remain anonymous
Offenders can adopt a different persona, most often pretending to be another child
Offenders engage with other offenders online to share materials, increase their
skills and knowledge in grooming behaviours
Offenders have substantial knowledge in teenage pop culture, gaming, social
media, child related forums
They target children who appear to be trusting, craving attention, and/or vulnerable.
PEAK Marketing Systems http://peakmarketingsystemscom.au
10. Why children are at risk cont….
account details and location information can be used inappropriately by others to
find young people or access their online accounts
Children and young people share too much information
Children and young people may treat online friends like real friends
Photos can identify membership of a club, or a school or taken in front of an easily
identifiable landmark
Smart phones now feature satellite navigation systems, web access, video and
camera apps, GPS system.
PEAK Marketing Systems http://peakmarketingsystemscom.au
11. Signs to look for
A child's age and development must be considered when interpreting possible behavioural indicators of
sexual abuse.
Some behaviours include:
●
●
●
●
●
●
●
●
Displaying greater sexual knowledge or language
expected for the child's age/development;
Sexualised behaviours
Sexual imitation with children, toys, dolls
Excessive masturbation;
Persistent bed wetting, soiling, urinating in clothes;
Regressive behaviours, thumb sucking, baby talk;
Sexually suggestive behaviour with adults / older
children
Withdrawn, anxious, depressed.
●
Persistent health complaints;
●
●
●
●
●
●
●
●
●
Poor social boundaries;
Starting fires, fascination with fire;
Running away;
Hurting or mutilating animals;
Promiscuity;
Refusing to undress for activities;
Creating stories, poems or artwork about abuse;
Self-harming or suicidal ideation;
Poor concentration;
(Bravehearts, 2012)
PEAK Marketing Systems http://peakmarketingsystemscom.au
12. Sexting
Sexting is the sending of provocative or sexual photos, messages, or videos, generally using a mobile
phone. It can also include posting this type of material online (Australian Communication Media
Authority).
PEAK Marketing Systems http://peakmarketingsystemscom.au
13. Sexting Includes…..
Sending naked pictures to another person
Sending pictures of their own or another person's genitals to another person
Posting naked or inappropriate images of themselves/others on social media
Sending or posting inappropriate sexual comments to another person, or online.
Forwarding inappropriate images, materials to others.
PEAK Marketing Systems http://peakmarketingsystemscom.au
14. What are the risks….
●
●
●
●
●
●
Students are unable to control who will see the content
Students are unable to control where the image or comment ends up
legal implications – it is a criminal offence to send an inappropriate image or post content online
may constitute child pornography even if the other parties are willing participants
may attract unwanted attention or result in stalking
You could face up to 15 years imprisonment
PEAK Marketing Systems http://peakmarketingsystemscom.au
15. Cyber-bullying
Cyber-bullying involves the use of digital technologies to facilitate repeated behaviour which is intended to
cause harm to others.
(Australian Communication and Media Authority)
PEAK Marketing Systems http://peakmarketingsystemscom.au
16. How does it occur?
Posting defamatory messages on social networking sites
Spreading rumours online
Excluding a young person from an online group
Sending unwanted messages, either by text, instant messaging or email
Posting inappropriate images of child/young person.
PEAK Marketing Systems http://peakmarketingsystemscom.au
17. The risks of cyber-bullying
Impacts a child or young person's self-esteem and confidence
leads to health issues
leads to educational issues
can lead to self-harming behaviours or suicidal ideation
difficulty in escaping the bullying, as it still occurs via social media whilst they are in
their own home.
PEAK Marketing Systems http://peakmarketingsystemscom.au
18. How to manage a disclosure
If a child tells you they are being abused:
●
●
●
●
●
●
●
Remain calm – if you panic, the child may not disclose;
Find a private place to talk;
Be supportive and recognise the child's bravery for talking to you;
Be a listener not an investigator – only ask just enough questions to act proactively, “tell me more
about that”;
Do not conduct any form of interview with the child;
Do not ask any leading questions I.e “did daddy touch you there”?
Be aware of your tone of voice, body language;
PEAK Marketing Systems http://peakmarketingsystemscom.au
19. How to manage a disclosure cont...
●
●
●
●
●
●
●
●
Reassure the child that they have done the right thing by telling you, and that they are not in trouble;
Do not make promises you can't keep such as promising you won't tell anyone;
Do not contact the person responsible for the abuse;
Keep all information confidential;
Record what the child has told you word for word;
Only report directly to the person you are required to report to – do not discuss with anyone else;
Be honest with the child – explain that you need to report the information to keep them safe;
Ensure that the child will be safe.
PEAK Marketing Systems http://peakmarketingsystemscom.au
20. How to encourage Cyber-safety
1.
2.
3.
4.
5.
6.
7.
How do I make decisions about my behaviour when online?
What message am I giving the world with my photos online?
How am I portraying myself to others and why
What is the impact on me? My family and friends?
Will this keep me safe?
I have a right to feel safe and protected
I'm responsible for my actions
PEAK Marketing Systems http://peakmarketingsystemscom.au
21. Questions can be directed to the parent discussion page…
Lets move on...
PEAK Marketing Systems http://peakmarketingsystemscom.au