Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Online Predators

No description
by

on 10 April 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Online Predators

Child Pornography
"Technology has revolutionized our connectivity to one another and made the world accessible in unprecedented ways. At the same time, it has had a profound impact on children in terms of sexual abuse and exploitation"
(Canadian Center for Child Protection, n.a., para. 1)
"The sexual exploitation of children and youth is a disturbing issue that crosses all social and economic boundaries. All children are at risk. Child and youth sexual exploitation includes the luring of a young person via the Internet for sexual purposes, the prostitution of someone under the age of 18, and distributing, selling or making child pornography"
(Government of Alberta, 2014, para.1).
Sexting is the act of sending sexually explicit messages and/or photographs eith their cell phone. Many teens exchange provocative and nude, sexual images of themselves and send them to their boyfriends/girlfriends. (Alert, 2014, para. 1)



"A video gaming console is an interactive computer or electronic device that uses a television monitor to display the video game, like an X-box or Playstation. It can connect to the Internet so several players can interact online in real-time, but perpetrators can also use these systems to contact children"

(Alert, 2014, para. 9)

Gaming Systems
"These websites allow users to create personalized profiles and incorporate aspects of chat rooms, instant messaging and file sharing programs. These sites are particularly attractive to perpetrators because they potentially open up the electronic door to a large number of children"
(Alert, 2014, para. 8)
Social Networking Websites and
Mobile Social Networks
Why we chose this issue?
Sexting

Child Sexual Abuse & Exploitation on the Internet
What is Child Sexual Exploitation?


Child Sexual Exploitation
through Technology
By; Alyssa Sawa & Chanel Tellier
"Child pornography is a permanent record of the sexual abuse of a child. It can be an image, an audio recording, a video, a drawing or a story about the sexual assault of a child. It is created deliberately and can be shared easily through the Internet, online platforms and portable technology devices"
(Alert, 2014, para. 5).
Current issue in society
Will continue to be more prevalent in society as technology advances
To protect our youth from predators
To create awareness of the various levels of exploitation over the internet and through social media
What Fuels Internet Predators?
Risky Online Behaviors

"Easy and anonymous access to children
•Risky online behavior of youth
•Virtual validation
•Law enforcement challenges
•East access to “a la carte” child pornography"
(Enough is Enough, 2013, para. 3).

Grooming
"Develop trust and secrecy: manipulate child by listening to and sympathizing with child’s problems and insecurities
Affirm feelings and choices of child
Exploit natural sexual curiosities of child
Ease inhibitions by gradually introducing sex into conversations or exposing them to pornography
Flatter and compliment the child excessively, sends gifts, and invests time, money, and energy to groom child
Develop an online relationship that is romantic, controlling, and upon which the child becomes dependent
Drive a wedge between the child and his or her parents and friends
Make promises of an exciting, stress-free life, tailored to the youth’s desire
Make threats, and often will use child pornography featuring their victims to blackmail them into silence"
(Enough is Enough,2013, para.7).
"The more risky behaviors kids engage in online, the more likely they will receive an online sexual solicitation. These risky behaviors include:

Posting personal information (50%)
Interacting with online strangers (45%)
Placing strangers on buddy lists (35%)
Sending personal information to strangers (26%)
Visiting X-rated sites (13%)
Talking about sex with strangers (5%)"
(Enough is Enough, 2013, para. 3)

Effects of Online Solicitation
Effects of Online Solicitation
Physical effects
Alcholohism
addiction to drugs
Violence and aggression towards others
Self harm, cutting, overdosing and eating disorders
If online abuse turns to meeting perpretartor risk of sexual diseases, pregnancy,
Bruies, cuts, broken teeth
CYC Perspective
Change Plan

References
Canadian Center for Child Protection. (n.a.).
Child sexual abuse
. Retrieved from https://www.cybertip.ca/app/en/child_sexual_abuse

Government of Alberta. (2014).
Child sexual exploitation
. Retrieved from
http://humanservices.alberta.ca/abuse-bullying/14840.html


Alert. (2014).
Child exploitation
. Retrieved from http://www.alert-ab.ca/childexploitation

Barnardo’s (2012) Cutting them free: how is the UK progressing in protecting its children from sexual exploitation (PDF). London: Barnardo’s.

Child Exploitation and Online Protection Centre (CEOP) (2011) Out of mind, out of sight: breaking down the barriers to child sexual exploitation: executive summary (PDF). London: CEOP.

Department for Education (DfE) (2011) Tackling child sexual exploitation: action plan (PDF). London: Department for Education (DfE).

Clare Thought She Knew...
SCARY STATISTICS SHOW THAT SEX OFFENDERS ARE TAKING OVER SOCIAL MEDIA
Psychological/Emotional effects

Severe depression
Sucidal tendancies
Nightmares, flashbacks
Anxiety, Embarressment or shame
Dependancy on perpretartor
Denial
Sense of powerless and isolation
Fear of personal and family safety
Feel of being blamed or not believed
No perception of abuse/manipulated to believe He/She(Perpretartor) loves me
Social Health
Criminal activity encouraged by perprtrator
Loss of trust with agencies or familes
Failing grades in school
Loss of childhood friends

Preventative work, focus on raising awareness amongst young people and their carers about sexual exploitation and how to keep safe.
Education child/ youth and their workers in various environments such as schools, within their homes, health services to incorporate teaching practices on the effects and risks of sexual exploitation through media and other technologies
Build positive, open, trusting relationships with the youth in youth. Work with the youth on the understanding of healthy boundaries and let it be known you are available to talk if they have questions or need support.
Educate child/youth on the dangers of posting pictures or providing personal information through technology
Help to promote child/youth esteem and confidence in themselves and the value of respecting ones self image
If a child or youth seems disconnected or in trouble, reach out to him or her. Try to engage the young person in an open and non-judgmental discussion. (CEOP, 2011, para. 7)

I. RESEARCH

II. PUBLIC AWARENESS

III. EDUCATION

V. COLLABORATION



i
Full transcript