SlideShare a Scribd company logo
1 of 21
Download to read offline
Cyber Safey
Presenter: Vanessa Taylor

PEAK Marketing Systems http://peakmarketingsystemscom.au
What is Cyber-Safety?

Being cyber-safe is about learning to use the internet safely
without placing ourselves and others at risk

.
PEAK Marketing Systems http://peakmarketingsystemscom.au
This British ad campaign promotes safety on the internet….

https://www.youtube.com/watch?v=KdeqbHEbQDc

PEAK Marketing Systems http://peakmarketingsystemscom.au
Charlotte Dawson was a victim of Cyber Bullying

https://www.youtube.com/watch?v=N8eAkCRi8xQ

PEAK Marketing Systems http://peakmarketingsystemscom.au
Why is it important?
●
●
●
●
●
●
●
●

The internet has no boundaries. Paedophiles and child sex offenders can target children all over the
world;
A child can be targeted and groomed by an offender residing in another country;
Offenders can target and access children all over the world from the comfort of their own homes.
Children can be provided with inappropriate content and material.
Offenders can locate the whereabouts of children from information posted and shared on social media.
Children and young people can become the victim of cyber-bullying
You can be the victim of identity theft or fraud.
Any child in any community can be targeted.

l

PEAK Marketing Systems http://peakmarketingsystemscom.au
Operation Gatekeeper

Taskforce ARGOS seized more than 307,000 child pornography images from around
the world after shutting down an illegal website run by a man in Helensvale,
Queensland.
led to charges against 21 Queenslanders, including a 15 year old boy.
More than 21,000 internet addresses from over 100 countries were linked to the site.
The operation saved 29 child victims, including children from Queensland.

PEAK Marketing Systems http://peakmarketingsystemscom.au
How children are targeted

Online grooming - occurs when an adult makes online contact with someone
under the age of 16 with the intention of establishing a sexual relationship.
Social Networking - Over 80% of children in upper primary school report having a
social networking page.
Instant Messaging - Instant messaging is a program that can instantly send
messages from one computer to another anywhere in the world.

PEAK Marketing Systems http://peakmarketingsystemscom.au
How children are targeted cont.
Investigators from the Queensland Police Service’s Taskforce Argos have identified
children who have over 700 contacts in their buddy list, and in one investigation
arrested five child sex offenders from one child’s list.
Online Chat Rooms - these programs allow users to select a “room” based on a
particular interest or topic of conversation and allows them to chat instantly with
others.
Mobile phones – most allow for internet access
Online gaming – allows users to adopt virtual identities

PEAK Marketing Systems http://peakmarketingsystemscom.au
Why children are at risk
Offenders are able to remain anonymous
Offenders can adopt a different persona, most often pretending to be another child
Offenders engage with other offenders online to share materials, increase their
skills and knowledge in grooming behaviours
Offenders have substantial knowledge in teenage pop culture, gaming, social
media, child related forums
They target children who appear to be trusting, craving attention, and/or vulnerable.

PEAK Marketing Systems http://peakmarketingsystemscom.au
Why children are at risk cont….
account details and location information can be used inappropriately by others to
find young people or access their online accounts
Children and young people share too much information
Children and young people may treat online friends like real friends
Photos can identify membership of a club, or a school or taken in front of an easily
identifiable landmark
Smart phones now feature satellite navigation systems, web access, video and
camera apps, GPS system.

PEAK Marketing Systems http://peakmarketingsystemscom.au
Signs to look for
A child's age and development must be considered when interpreting possible behavioural indicators of
sexual abuse.
Some behaviours include:
●
●
●
●
●
●
●
●

Displaying greater sexual knowledge or language
expected for the child's age/development;
Sexualised behaviours
Sexual imitation with children, toys, dolls
Excessive masturbation;
Persistent bed wetting, soiling, urinating in clothes;
Regressive behaviours, thumb sucking, baby talk;
Sexually suggestive behaviour with adults / older
children
Withdrawn, anxious, depressed.

●

Persistent health complaints;

●
●
●
●
●
●
●
●
●

Poor social boundaries;
Starting fires, fascination with fire;
Running away;
Hurting or mutilating animals;
Promiscuity;
Refusing to undress for activities;
Creating stories, poems or artwork about abuse;
Self-harming or suicidal ideation;
Poor concentration;

(Bravehearts, 2012)

PEAK Marketing Systems http://peakmarketingsystemscom.au
Sexting

Sexting is the sending of provocative or sexual photos, messages, or videos, generally using a mobile
phone. It can also include posting this type of material online (Australian Communication Media
Authority).

PEAK Marketing Systems http://peakmarketingsystemscom.au
Sexting Includes…..

Sending naked pictures to another person
Sending pictures of their own or another person's genitals to another person
Posting naked or inappropriate images of themselves/others on social media
Sending or posting inappropriate sexual comments to another person, or online.
Forwarding inappropriate images, materials to others.

PEAK Marketing Systems http://peakmarketingsystemscom.au
What are the risks….

●
●
●
●
●
●

Students are unable to control who will see the content
Students are unable to control where the image or comment ends up
legal implications – it is a criminal offence to send an inappropriate image or post content online
may constitute child pornography even if the other parties are willing participants
may attract unwanted attention or result in stalking
You could face up to 15 years imprisonment

PEAK Marketing Systems http://peakmarketingsystemscom.au
Cyber-bullying

Cyber-bullying involves the use of digital technologies to facilitate repeated behaviour which is intended to
cause harm to others.
(Australian Communication and Media Authority)

PEAK Marketing Systems http://peakmarketingsystemscom.au
How does it occur?

Posting defamatory messages on social networking sites
Spreading rumours online
Excluding a young person from an online group
Sending unwanted messages, either by text, instant messaging or email
Posting inappropriate images of child/young person.

PEAK Marketing Systems http://peakmarketingsystemscom.au
The risks of cyber-bullying

Impacts a child or young person's self-esteem and confidence
leads to health issues
leads to educational issues
can lead to self-harming behaviours or suicidal ideation
difficulty in escaping the bullying, as it still occurs via social media whilst they are in
their own home.

PEAK Marketing Systems http://peakmarketingsystemscom.au
How to manage a disclosure
If a child tells you they are being abused:
●
●
●
●
●
●
●

Remain calm – if you panic, the child may not disclose;
Find a private place to talk;
Be supportive and recognise the child's bravery for talking to you;
Be a listener not an investigator – only ask just enough questions to act proactively, “tell me more
about that”;
Do not conduct any form of interview with the child;
Do not ask any leading questions I.e “did daddy touch you there”?
Be aware of your tone of voice, body language;

PEAK Marketing Systems http://peakmarketingsystemscom.au
How to manage a disclosure cont...
●
●
●
●
●
●
●
●

Reassure the child that they have done the right thing by telling you, and that they are not in trouble;
Do not make promises you can't keep such as promising you won't tell anyone;
Do not contact the person responsible for the abuse;
Keep all information confidential;
Record what the child has told you word for word;
Only report directly to the person you are required to report to – do not discuss with anyone else;
Be honest with the child – explain that you need to report the information to keep them safe;
Ensure that the child will be safe.

PEAK Marketing Systems http://peakmarketingsystemscom.au
How to encourage Cyber-safety
1.
2.
3.
4.
5.
6.
7.

How do I make decisions about my behaviour when online?
What message am I giving the world with my photos online?
How am I portraying myself to others and why
What is the impact on me? My family and friends?
Will this keep me safe?
I have a right to feel safe and protected
I'm responsible for my actions

PEAK Marketing Systems http://peakmarketingsystemscom.au
Questions can be directed to the parent discussion page…
Lets move on...

PEAK Marketing Systems http://peakmarketingsystemscom.au

More Related Content

What's hot

Media & Technology; The Christian Parents’s View
Media & Technology; The Christian Parents’s ViewMedia & Technology; The Christian Parents’s View
Media & Technology; The Christian Parents’s ViewHans Rasmussen
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundStephanie Barnhart
 
Teens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeenSafe
 
Protecting Your Children's Online Experience
Protecting Your Children's Online Experience  Protecting Your Children's Online Experience
Protecting Your Children's Online Experience Lisa McKenzie ★
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshareTeenSafe
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationspringvillegi
 
Converstation
ConverstationConverstation
Converstationatames
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
The internet---its not that innocent
The internet---its not that innocentThe internet---its not that innocent
The internet---its not that innocentEmily Thompson
 
Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?Timothy Corey
 
Internet Safety For Children
Internet Safety For ChildrenInternet Safety For Children
Internet Safety For ChildrenAlysna Kim
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetyt2839ms18
 
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online HabitsE Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habitssharoncindrich
 

What's hot (20)

Media & Technology; The Christian Parents’s View
Media & Technology; The Christian Parents’s ViewMedia & Technology; The Christian Parents’s View
Media & Technology; The Christian Parents’s View
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber Playground
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Ciejkalab4b
Ciejkalab4bCiejkalab4b
Ciejkalab4b
 
Teens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From Cyberbullying
 
Protecting Your Children's Online Experience
Protecting Your Children's Online Experience  Protecting Your Children's Online Experience
Protecting Your Children's Online Experience
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshare
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Converstation
ConverstationConverstation
Converstation
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
The internet---its not that innocent
The internet---its not that innocentThe internet---its not that innocent
The internet---its not that innocent
 
Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?
 
Internet Safety For Children
Internet Safety For ChildrenInternet Safety For Children
Internet Safety For Children
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online HabitsE Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
 
Privacy and safety
Privacy and safetyPrivacy and safety
Privacy and safety
 

Viewers also liked

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Children and the internet
Children and the internetChildren and the internet
Children and the internetMeghan
 
The Reasons why people who said [Video Games are bad] are either ignorance or...
The Reasons why people who said[Video Games are bad]are either ignorance or...The Reasons why people who said[Video Games are bad]are either ignorance or...
The Reasons why people who said [Video Games are bad] are either ignorance or...Matumit Sombunjaroen
 
Children of the internet
Children of the internetChildren of the internet
Children of the internetTeam Pramkaew
 
Are Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetAre Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetMd Jahirul Islam Sojib
 
Parental Control, Internet Safety, Safe Internet for Children
Parental Control, Internet Safety, Safe Internet for ChildrenParental Control, Internet Safety, Safe Internet for Children
Parental Control, Internet Safety, Safe Internet for ChildrenNugroho Gito
 
Are Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetAre Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetMd Jahirul Islam Sojib
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Dnc Times - March - 2015
Dnc Times - March - 2015Dnc Times - March - 2015
Dnc Times - March - 2015Dnc Times
 
Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety Mark Woolley
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionOfsted
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Kontes Unjuk Karya Klip Kreatif
Kontes Unjuk Karya Klip KreatifKontes Unjuk Karya Klip Kreatif
Kontes Unjuk Karya Klip KreatifIndonesia Kreatif
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 

Viewers also liked (20)

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Children and the internet
Children and the internetChildren and the internet
Children and the internet
 
The Reasons why people who said [Video Games are bad] are either ignorance or...
The Reasons why people who said[Video Games are bad]are either ignorance or...The Reasons why people who said[Video Games are bad]are either ignorance or...
The Reasons why people who said [Video Games are bad] are either ignorance or...
 
Children of the internet
Children of the internetChildren of the internet
Children of the internet
 
Are Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetAre Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internet
 
Parental Control, Internet Safety, Safe Internet for Children
Parental Control, Internet Safety, Safe Internet for ChildrenParental Control, Internet Safety, Safe Internet for Children
Parental Control, Internet Safety, Safe Internet for Children
 
Children and future internet
Children and future internetChildren and future internet
Children and future internet
 
Are Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internetAre Children Smarter Today Because of the internet
Are Children Smarter Today Because of the internet
 
About Yogyakarta
About YogyakartaAbout Yogyakarta
About Yogyakarta
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Dnc Times - March - 2015
Dnc Times - March - 2015Dnc Times - March - 2015
Dnc Times - March - 2015
 
Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspection
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Kontes Unjuk Karya Klip Kreatif
Kontes Unjuk Karya Klip KreatifKontes Unjuk Karya Klip Kreatif
Kontes Unjuk Karya Klip Kreatif
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Corruption
CorruptionCorruption
Corruption
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Awareness of Children Internet Addiction
Awareness of Children Internet Addiction Awareness of Children Internet Addiction
Awareness of Children Internet Addiction
 
Corruption ppt
Corruption pptCorruption ppt
Corruption ppt
 

Similar to Family Internet Safety - Cyber Bullying

Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014- Mark - Fullbright
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sbSafeChildUAE1
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for childrenKumar Manish
 
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxSafeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxajav252888
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazardsdgieseler1
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol: Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol: Selva Orejón
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptlival1
 
Dangers of Social Media What we know about teens
Dangers of Social Media What we know about teensDangers of Social Media What we know about teens
Dangers of Social Media What we know about teenscontactcareergyani
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptYadetaHailu
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptchellakaruppasamy
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 

Similar to Family Internet Safety - Cyber Bullying (20)

Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxSafeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazards
 
Online safety
Online safetyOnline safety
Online safety
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol: Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol:
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Dangers of Social Media What we know about teens
Dangers of Social Media What we know about teensDangers of Social Media What we know about teens
Dangers of Social Media What we know about teens
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 

More from Damon Taylor

SMS School Newsletters
SMS School NewslettersSMS School Newsletters
SMS School NewslettersDamon Taylor
 
Tutorial manage email addresses
Tutorial manage email addressesTutorial manage email addresses
Tutorial manage email addressesDamon Taylor
 
Newsletter Research
Newsletter ResearchNewsletter Research
Newsletter ResearchDamon Taylor
 
Safe newsletters school surveys
Safe newsletters school surveysSafe newsletters school surveys
Safe newsletters school surveysDamon Taylor
 
Safe newsletters forms
Safe newsletters formsSafe newsletters forms
Safe newsletters formsDamon Taylor
 
Presentation St Bernards SS P and C
Presentation St Bernards SS P and CPresentation St Bernards SS P and C
Presentation St Bernards SS P and CDamon Taylor
 

More from Damon Taylor (8)

SMS School Newsletters
SMS School NewslettersSMS School Newsletters
SMS School Newsletters
 
Tutorial manage email addresses
Tutorial manage email addressesTutorial manage email addresses
Tutorial manage email addresses
 
Send a Newsletter
Send a NewsletterSend a Newsletter
Send a Newsletter
 
Newsletter Research
Newsletter ResearchNewsletter Research
Newsletter Research
 
Email for schools
Email for schoolsEmail for schools
Email for schools
 
Safe newsletters school surveys
Safe newsletters school surveysSafe newsletters school surveys
Safe newsletters school surveys
 
Safe newsletters forms
Safe newsletters formsSafe newsletters forms
Safe newsletters forms
 
Presentation St Bernards SS P and C
Presentation St Bernards SS P and CPresentation St Bernards SS P and C
Presentation St Bernards SS P and C
 

Recently uploaded

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 

Recently uploaded (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Family Internet Safety - Cyber Bullying

  • 1. Cyber Safey Presenter: Vanessa Taylor PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 2. What is Cyber-Safety? Being cyber-safe is about learning to use the internet safely without placing ourselves and others at risk . PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 3. This British ad campaign promotes safety on the internet…. https://www.youtube.com/watch?v=KdeqbHEbQDc PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 4. Charlotte Dawson was a victim of Cyber Bullying https://www.youtube.com/watch?v=N8eAkCRi8xQ PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 5. Why is it important? ● ● ● ● ● ● ● ● The internet has no boundaries. Paedophiles and child sex offenders can target children all over the world; A child can be targeted and groomed by an offender residing in another country; Offenders can target and access children all over the world from the comfort of their own homes. Children can be provided with inappropriate content and material. Offenders can locate the whereabouts of children from information posted and shared on social media. Children and young people can become the victim of cyber-bullying You can be the victim of identity theft or fraud. Any child in any community can be targeted. l PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 6. Operation Gatekeeper Taskforce ARGOS seized more than 307,000 child pornography images from around the world after shutting down an illegal website run by a man in Helensvale, Queensland. led to charges against 21 Queenslanders, including a 15 year old boy. More than 21,000 internet addresses from over 100 countries were linked to the site. The operation saved 29 child victims, including children from Queensland. PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 7. How children are targeted Online grooming - occurs when an adult makes online contact with someone under the age of 16 with the intention of establishing a sexual relationship. Social Networking - Over 80% of children in upper primary school report having a social networking page. Instant Messaging - Instant messaging is a program that can instantly send messages from one computer to another anywhere in the world. PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 8. How children are targeted cont. Investigators from the Queensland Police Service’s Taskforce Argos have identified children who have over 700 contacts in their buddy list, and in one investigation arrested five child sex offenders from one child’s list. Online Chat Rooms - these programs allow users to select a “room” based on a particular interest or topic of conversation and allows them to chat instantly with others. Mobile phones – most allow for internet access Online gaming – allows users to adopt virtual identities PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 9. Why children are at risk Offenders are able to remain anonymous Offenders can adopt a different persona, most often pretending to be another child Offenders engage with other offenders online to share materials, increase their skills and knowledge in grooming behaviours Offenders have substantial knowledge in teenage pop culture, gaming, social media, child related forums They target children who appear to be trusting, craving attention, and/or vulnerable. PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 10. Why children are at risk cont…. account details and location information can be used inappropriately by others to find young people or access their online accounts Children and young people share too much information Children and young people may treat online friends like real friends Photos can identify membership of a club, or a school or taken in front of an easily identifiable landmark Smart phones now feature satellite navigation systems, web access, video and camera apps, GPS system. PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 11. Signs to look for A child's age and development must be considered when interpreting possible behavioural indicators of sexual abuse. Some behaviours include: ● ● ● ● ● ● ● ● Displaying greater sexual knowledge or language expected for the child's age/development; Sexualised behaviours Sexual imitation with children, toys, dolls Excessive masturbation; Persistent bed wetting, soiling, urinating in clothes; Regressive behaviours, thumb sucking, baby talk; Sexually suggestive behaviour with adults / older children Withdrawn, anxious, depressed. ● Persistent health complaints; ● ● ● ● ● ● ● ● ● Poor social boundaries; Starting fires, fascination with fire; Running away; Hurting or mutilating animals; Promiscuity; Refusing to undress for activities; Creating stories, poems or artwork about abuse; Self-harming or suicidal ideation; Poor concentration; (Bravehearts, 2012) PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 12. Sexting Sexting is the sending of provocative or sexual photos, messages, or videos, generally using a mobile phone. It can also include posting this type of material online (Australian Communication Media Authority). PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 13. Sexting Includes….. Sending naked pictures to another person Sending pictures of their own or another person's genitals to another person Posting naked or inappropriate images of themselves/others on social media Sending or posting inappropriate sexual comments to another person, or online. Forwarding inappropriate images, materials to others. PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 14. What are the risks…. ● ● ● ● ● ● Students are unable to control who will see the content Students are unable to control where the image or comment ends up legal implications – it is a criminal offence to send an inappropriate image or post content online may constitute child pornography even if the other parties are willing participants may attract unwanted attention or result in stalking You could face up to 15 years imprisonment PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 15. Cyber-bullying Cyber-bullying involves the use of digital technologies to facilitate repeated behaviour which is intended to cause harm to others. (Australian Communication and Media Authority) PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 16. How does it occur? Posting defamatory messages on social networking sites Spreading rumours online Excluding a young person from an online group Sending unwanted messages, either by text, instant messaging or email Posting inappropriate images of child/young person. PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 17. The risks of cyber-bullying Impacts a child or young person's self-esteem and confidence leads to health issues leads to educational issues can lead to self-harming behaviours or suicidal ideation difficulty in escaping the bullying, as it still occurs via social media whilst they are in their own home. PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 18. How to manage a disclosure If a child tells you they are being abused: ● ● ● ● ● ● ● Remain calm – if you panic, the child may not disclose; Find a private place to talk; Be supportive and recognise the child's bravery for talking to you; Be a listener not an investigator – only ask just enough questions to act proactively, “tell me more about that”; Do not conduct any form of interview with the child; Do not ask any leading questions I.e “did daddy touch you there”? Be aware of your tone of voice, body language; PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 19. How to manage a disclosure cont... ● ● ● ● ● ● ● ● Reassure the child that they have done the right thing by telling you, and that they are not in trouble; Do not make promises you can't keep such as promising you won't tell anyone; Do not contact the person responsible for the abuse; Keep all information confidential; Record what the child has told you word for word; Only report directly to the person you are required to report to – do not discuss with anyone else; Be honest with the child – explain that you need to report the information to keep them safe; Ensure that the child will be safe. PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 20. How to encourage Cyber-safety 1. 2. 3. 4. 5. 6. 7. How do I make decisions about my behaviour when online? What message am I giving the world with my photos online? How am I portraying myself to others and why What is the impact on me? My family and friends? Will this keep me safe? I have a right to feel safe and protected I'm responsible for my actions PEAK Marketing Systems http://peakmarketingsystemscom.au
  • 21. Questions can be directed to the parent discussion page… Lets move on... PEAK Marketing Systems http://peakmarketingsystemscom.au