Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.

Slides:



Advertisements
Similar presentations
A NEW LOOK AT FACEBOOK!. What you can do with facebook: What you can do with facebook: o o You can see where old friends have gone o o Students can make.
Advertisements

Instant Messages: I am bored. Social Networks: Facebook, Myspace.
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Cyber Stalking By Matthew Hall. What is cyber stalking? According to techarget.com, it is defined as a crime in which the attacker harasses a victim using.
Developed by Technology Services 1:1 Laptop Initiative
Thank you for your cooperation. We will begin shortly.
Don’t be bullied, or be a bully.
R U CYBERSAFE? – BEAT THE CYBERBULLY It’s not smart It’s not funny It’s not even amusing It’s darn right ignorant and the actions of a coward!!
Forms of Cyberbullying
Cyber bullying and internet safety Parents meeting: staying safe online.
Wiredsafety.org  The world’s largest online safety and help group, including: –WiredPatrol.org –WiredKids.org –Cyberlawenforcement.org  Provides education,
This week is anti-bullying week.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Cyber and Internet Safety El Rodeo School September 11, 2013.
The Internet is Forever
e-safety and cyber bullying
What do I need to know?.   Instant Messages  Social Networking.
STRATEGIES. Non-Technical Measures to Protect Kids Online.
Where does bullying occur? OFSTED Report % at school 55% at school 24% at home 24% at home 18% around where children live 18% around where children.
 Grades 5-8 – 56 out of 66 – 85%  Grades 9-12 – 79 out of 85 – 93%  Grades 5-12 – 135 out of 151 – 89%  100% of the Juniors and Seniors use a social.
Being Good Digital Citizens with Today’s Technologies.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Cyber Stalking By Samantha Brooks What Is Cyber Stalking? The simple definition: “the repeated use of electronic communications to harass or frighten.
(c) the7sisters.co.uk A Revision of staying safe on the Internet Internet Safety.
Social effect: Facebook is a site available to anyone. Many people use it in order to contact friends and relatives from all around the world, and to meet.
Safety In CyberSpace. ‘Report Abuse’ in action Look for this link on websites Microsoft have made a real commitment Approx £30,000 per month revenue.
E-safety and safeguarding Staying safe online. Introduction Being eSafe relies on selecting appropriate privacy levels knowing how to behave online understanding.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Social Media Safety Manchester Township Middle School Guidance Department
Controlling Your Social Networking Privacy Settings Stay safe online!
 Facebook  Twitter  MySpace  Windows LiveSpace.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Protecting Yourself on Social Media – Friend Requests And Messages.
INTERNET SAFETY Sergeant Karl Youngblood Barbara Burchard Information adapted from the
Online Safety Parent Workshop Windsor Community Primary School December 10 th 2015.
Online Safety and Privacy Understanding online privacy and how your information is shared.
 Form of bullying online  Hatred in texts  Can causes self-harm or suicidal thoughts  Repeated offence  Threats, harassment, humiliation, embarrassment.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Cyberbullying and Cyberstalking BY MS. BARBARA WOOLLEY.
By, Nadine Tereposky. Cyberbullying is a type of bullying that is done online, often done because of a photo someone uploaded or a rumor that was spread.
Internet Safety 101! Instant Messaging Social Networking Sites (i.e. Facebook) Sending personal Information Sending pictures online Talking to strangers.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
70% were female; 30% were male 86% of offenders were people youth first “met” online 37% of incidents happened in chatrooms 40% in instant messages.
 Cyber-bullying is "the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group,
Ashdell Safer Internet Evening 2014 Prepared and presented by Dawn Pooley.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
1 BTW…..R U SAFE? Socializing Online Smiths Station Jr. High School Presented by: Bernice Howard.
Cyber and Internet Safety (Parents’ Night)
Cyberbullying BY LORD MUSHANGO.
What Is Bullying? Bullying is defined as the repetitive, intentional hurting of one person or group by another person or group where the relationship.
Pics, Flicks, and Sexting
Appropriate Use of Technology
CYBER- BULLYING.
Presentation transcript:

Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM

What is cyber stalking?  Cyber stalking is the use of the internet to perpetrate threatening or malicious actions on a victim.  It is similar to physical stalking in that it is a pattern of repeated behaviors, intended to scare, intimidate or injure another person.  Important to note: The actions must be repeated behaviors that would place a reasonable person in fear, to be considered stalking.

Stats and Facts  According to a study done in 2012 by WHOA (Working to Halt Online Abuse), 80% of cyber stalking victims are female.  Results also show that victims are most commonly single, Caucasian and between the ages of  In a vast majority of cases (63%) the cyber stalker was known to the victim.  The most common prior relationship is an ex-partner.  There was not a large difference in number of cases with male (40%) stalkers and female stalkers (31%). 20% of victims were uncertain of the gender of their cyber stalker.

Examples of cyber stalking behaviors  Sending repeated unwanted s or instant messages.  Using victims address to subscribe them to lists.  Sending viruses.  Sending the victim’s online photos to sexually oriented websites.  Stalkers can also use information found on the internet to physically stalk their victim.

People Search Engines  For a small fee, a cyber stalker can find out, pretty much everything they want to know.  This particular one will show address, phone number, e- mail address, family members, a picture of the home and even….

 EVERY social networking, online shopping, and photo sharing site you hold an account on.  For $3.95 per month, this is pretty much a cyber- stalker’s dream.

The Real Property Database  Houses tax roll information for home owners by county.  This is public knowledge. All a stalker would need to know about you, to make use of this resource is your name, and the general area in which you live.  There is no way to remove yourself from this database. If you own a home, you are on it. So be aware of who you’re giving your full name to, both online and in person.

Real Property Database Search Results

Voila!

How to avoid becoming a victim  Make your social networking accounts private, and recheck privacy settings continuously, as policies change.  Once the account is private, only accept friend requests from people you know, and delete ex- partners and ex-friends.  Do you really need to post your phone number, address, DOB, and address on Facebook? If someone needs that information badly enough, they will ask for it.  Use profile pictures that do not ID you or your location.  Use screen names that are gender neutral, and do not use your real name.  Consider using a different account for registering to social networking sites and chat rooms, than the one you use for regular correspondence.  Be aware of what you are saying. Only say to someone on-line, what you would also say to their face  Google your own name, to make sure no unauthorized info has been posted.

If you are a victim of cyber stalking  Clearly state that the stalker’s contact with you is not welcome, and that law enforcement will be called if it continues.  End all further communication with the stalker, use the block feature available on most social networking sites, and instant messenger programs. Filter or block their s from your inbox.  Let family members, friends and employers know you are being cyber stalked.  Save all communications or instances of cyber-stalking behavior. You will need this to build your case, if law enforcement becomes involved.