SlideShare una empresa de Scribd logo
1 de 26
The effects  of New Technology
Video Cameras Video – cassette recorders Making and Storing images and sounds Computers Different sorts of communication devices Scanners Digital cameras
 Morphing  and  Pseudo Pornography
The Impact of Internet
World Wide Web Japan73% USA 14% U.K. 3%
Country			Percentages United States		62.7 Russian Federation	10.3 Cyrus			3.9 Canada			3.6 Korea (South)		2.6 United Kingdom	2.5 Belgium			1.6 Taiwan			1.5 Others			11.3 Newsgroups and Communities
Chat Room Titles Baby sex Preteen sex Chat Room Toddler Spanking Chicken hawking A term coined by sex abuses for  their search for children in chat room
Law Enforcement Operations 1. No uniform system for recording offenses The three key Federal Agencies involved are the: FBI US Customs US Postal Inspection Service
Law Enforcement Operations 2.FBI’s Innocent Images Campaign Began in 1995 3.US Postal Inspection Service started since 1977 3,300 child molesters and pornographers  were arrested
Law Enforcement Operations 4.Conclusions from US data 5.Operation Cathedral and the     Wonder Land Club 6.Conclusions from Wonder Land 7.Special Police Units
Other Responses  to  Child Pornography
Other Responses to Child Pornography “Hotlines” or “Tiplines” are Mechanisms which allow people who have found what they think is illegal material on the internet to report it. Community Responses –Hotline INHOPE Internet Hotlines for EuropeAssociation of the Hotlines and Tip Lines across the world
Other Responses to Child Pornography Other Community Responses ASACP Adult Sites Against Child Pornography
Other Responses to Child Pornography Internet Industry Responses Governmental andInter-Governmental  approaches Recommendation
Other Responses to Child Pornography Internet Hotline Provides in Europe Association Members Internet Hotline Provides  in  Europe Association Members
Other Responses to Child Pornography Netsmart Rules to Help Parents  teach  their Children ,[object Object]
Never send anyone your picture, credit card or bank details, or anything else, without first checking with your parent or carer.
Never give your password to anyone, even a best friend.
Never arrange to meet anyone in person without first agreeing it with your parent or carer, and get them to come along to the first meeting, which should always be in a public place and you should always tell someone else where you are going and why.,[object Object]
Never respond to nasty, suggestive or rude emails or postings in Usenet Groups
Never open attachments to emails that come from people or sources you do not already know and trust
Delete the attachments immediately. They could contain viruses or other programmes which could completely destroy all the information and software on your computer.,[object Object]
Always be yourself and do not pretend to be anyone or anything you are not.
Always remember that if a site is described as being for adults only, or as being only for people of a certain age, you should respect that and stay out if you do not meet their criteria.
Always remember, if someone makes you an offer that seems too good to be true, it probably is.

Más contenido relacionado

La actualidad más candente

For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1Vinay Kumar
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingMatt Britland
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingst josephs
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Electronic safety grade 4 5
Electronic safety grade 4 5Electronic safety grade 4 5
Electronic safety grade 4 5Melissa Halcott
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting InfographicuKnow.com
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 

La actualidad más candente (15)

For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Electronic safety grade 4 5
Electronic safety grade 4 5Electronic safety grade 4 5
Electronic safety grade 4 5
 
Internet Safty
Internet SaftyInternet Safty
Internet Safty
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting Infographic
 
10things
10things10things
10things
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online Safety
Online SafetyOnline Safety
Online Safety
 

Destacado

Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 
Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 
Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 
Pauline De Guzman
Pauline De GuzmanPauline De Guzman
Pauline De Guzmaneyescloud
 
Content for Small Business
Content for Small BusinessContent for Small Business
Content for Small BusinessBetsy Decillis
 
Creating Content for Meetings
Creating Content for MeetingsCreating Content for Meetings
Creating Content for MeetingsBetsy Decillis
 
Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 

Destacado (8)

Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Pauline De Guzman
Pauline De GuzmanPauline De Guzman
Pauline De Guzman
 
Content for Small Business
Content for Small BusinessContent for Small Business
Content for Small Business
 
Creating Content for Meetings
Creating Content for MeetingsCreating Content for Meetings
Creating Content for Meetings
 
Jezell
JezellJezell
Jezell
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 

Similar a Second Speaker

Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safelytimryan7
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital worldDan Bowen
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internetVictor Font
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kidspeterhitch
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital CitizensJason Rushing
 
Internet safety
Internet safetyInternet safety
Internet safetymbend360
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetyt2839ms18
 

Similar a Second Speaker (20)

Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kids
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
102009
102009102009
102009
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 

Último

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Second Speaker

  • 1.
  • 2. The effects of New Technology
  • 3. Video Cameras Video – cassette recorders Making and Storing images and sounds Computers Different sorts of communication devices Scanners Digital cameras
  • 4. Morphing and Pseudo Pornography
  • 5. The Impact of Internet
  • 6. World Wide Web Japan73% USA 14% U.K. 3%
  • 7. Country Percentages United States 62.7 Russian Federation 10.3 Cyrus 3.9 Canada 3.6 Korea (South) 2.6 United Kingdom 2.5 Belgium 1.6 Taiwan 1.5 Others 11.3 Newsgroups and Communities
  • 8. Chat Room Titles Baby sex Preteen sex Chat Room Toddler Spanking Chicken hawking A term coined by sex abuses for their search for children in chat room
  • 9. Law Enforcement Operations 1. No uniform system for recording offenses The three key Federal Agencies involved are the: FBI US Customs US Postal Inspection Service
  • 10. Law Enforcement Operations 2.FBI’s Innocent Images Campaign Began in 1995 3.US Postal Inspection Service started since 1977 3,300 child molesters and pornographers were arrested
  • 11. Law Enforcement Operations 4.Conclusions from US data 5.Operation Cathedral and the Wonder Land Club 6.Conclusions from Wonder Land 7.Special Police Units
  • 12. Other Responses to Child Pornography
  • 13. Other Responses to Child Pornography “Hotlines” or “Tiplines” are Mechanisms which allow people who have found what they think is illegal material on the internet to report it. Community Responses –Hotline INHOPE Internet Hotlines for EuropeAssociation of the Hotlines and Tip Lines across the world
  • 14. Other Responses to Child Pornography Other Community Responses ASACP Adult Sites Against Child Pornography
  • 15. Other Responses to Child Pornography Internet Industry Responses Governmental andInter-Governmental approaches Recommendation
  • 16. Other Responses to Child Pornography Internet Hotline Provides in Europe Association Members Internet Hotline Provides in Europe Association Members
  • 17.
  • 18. Never send anyone your picture, credit card or bank details, or anything else, without first checking with your parent or carer.
  • 19. Never give your password to anyone, even a best friend.
  • 20.
  • 21. Never respond to nasty, suggestive or rude emails or postings in Usenet Groups
  • 22. Never open attachments to emails that come from people or sources you do not already know and trust
  • 23.
  • 24. Always be yourself and do not pretend to be anyone or anything you are not.
  • 25. Always remember that if a site is described as being for adults only, or as being only for people of a certain age, you should respect that and stay out if you do not meet their criteria.
  • 26. Always remember, if someone makes you an offer that seems too good to be true, it probably is.
  • 27.
  • 28. Some Very Useful Websites Educational http://www.freecampus.co.uk http://safety.ngfl.gov.uk http://www.bbc.co.uk/education/home http://www.yahooligans.com http://www.becta.org.uk http://www.24hourmuseum.org.uk http://www.worldwildlife.org/fun Kids. sites http://www.kidsdomain.co.uk http://www.bbc.co.uk/cbbc http://www.beritsbest.com http://www.ala.org
  • 29. Some Very Useful Websites Internet safety generally http://www.nch.org.uk http://www.getnetwise.org http://www.bbc.co.uk/webwise/basics http://www.disney.co.uk/DisneyOnline/Safesurfing/index.html Information for Parents http://www.nch.org.uk http://www.pin.org.uk http://www.netparents.org Consumer advice and information http://www.net-consumers.org http://www.tradingstandards.gov.uk http://www.which.net http://www.oft.gov.uk
  • 30. Some Very Useful Websites Search engines http://www.searchenginewatch.com/links/Major_Search_Engines Search engines especially for children http://www.searchenginewatch.com/links/Kids_Search_Engines http://www.yahooligans.com http://sunsite.berkeley.edu/kidsclick Chat http://www.chatdanger.com Reporting bad stuff http://www.iwf.org.uk Filtering and blocking and parental control software http://www.getnetwise.org
  • 31. The 49 countries with identified members of the Wonderland Club
  • 32. The 49 countries with identified members of the Wonderland Club
  • 33. Countries identified as having members of Wonderland but who were not involved inOperation Cathedral: