1 / 10

Predators

Predators. What’s lurking below the surface. Lesson Objectives. Become aware of characteristics and grooming processes of online predators. Identify " risky behavior " that attract predators. Recognize warning signs. Learn how to respond to possible predators.

Download Presentation

Predators

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Predators What’s lurking below the surface

  2. Lesson Objectives • Become aware of characteristics and grooming processes of online predators. • Identify "risky behavior" that attract predators. • Recognize warning signs. • Learn how to respond to possible predators.

  3. Click image to link to video (3min:50sec)

  4. Top 5 RiskyBehaviorsthatAttractPredators • Making contact with people in a variety of online venues • Talking specifically about sex with strangers • Allowing strangers to be part of their personal buddy list • Making rude comments online • Intentionally visiting x-rated sites

  5. Who are youreallytalking to? • Do not believe everything you see and read. • Do not share too much. • Know your gaming partner. • Never meet in person.

  6. Warning Signs • If someone tries to isolate you from your family or friends. • Turn you against your parents. • Make you keep secrets. • Send inappropriate materials or talk about explicit subjects. • Threaten you.

  7. Click image to link to video (4min:59sec)

  8. Remember the 4 R’s • Recognize techniques used by online predators. • Refuse requests for personal information. • Respondexit the program, log off or turn off the computer… • Report anything that makes you uncomfortable.

  9. What We Learned • Characteristics and grooming processes of online predators. • “Risky behavior" that attract predators. • Warning signs. • How to respond to possible predators.

  10. Resources "Underwater Scene Background." TemplatesWise.com. Web. 28 Apr 2011. <http://www.templateswise.com/detail/link-75.html>. "10 Things to teach your teen about car maintenance." SheKnows. Web. 28 Apr 2011. <http://www.sheknows.com/parenting/articles/821823/10-things-to-teach-your-teen-about-car-maintenance>. "Real Life Stories: Tracking Teresa." Netsmartz. Web. 28 Apr 2011. <http://www.netsmartz.org/RealLifeStories/TrackingTeresa>. "Real Life Stories: Amy's Choice." Netsmartz. Web. 28 Apr 2011. <http://www.netsmartz.org/RealLifeStories/AmysChoice>. Flores, Jessica. "Internet Safety." Flipchart 10-Nov-2010. 11. Promethean Planet. Web. 27 Apr 2011. <http://www.prometheanplanet.com/en-us/Resources/Item/67056/internet-safety>.

More Related