Recognizing Online Predators
By Lee Duval
Online Predator
• What is an Online Predator?
– (Online predator) Internet-initiated sex crimes
against minors are sex crimes against minors that
begin on the internet. A substantial portion the
illegal targeting of minors who are under the age
of consent in order to solicit sex or to initiate a
non-forcible sexual relationship
(http://en.wikipedia.org/wiki/Online_predator).
Identifying Online Predator’s
• Step 1: Is the person awkwardly nice?
– Is the person asking my age, gender, location, etc.
– If so red flags should come up and should stop
talking to this person immediately and tell a
trusted adult.
• Step 2: Predators agree to everything.
– Predators do this to gain your trust
Identifying, Cont.
• Step 3: If a random person says hi out of the
blue a red flag should pop up.
• Step 4: If a child gets “into a relationship” very
young, check into it immediately.
– A lot of times it will be a predator
Identifying, Cont.
• Step 5: After chatting ask them questions.
– Ask them if there is name you can call them by
– Nothing else should be asked after that
– Keep it to business
Identifying Cont.
• Step 6: Avoid common screen names
– Hotmamma
– Sexy69
– Predators will pretend to be the opposite sex
– Don’t meet in person, but if you do bring a parents or
guardian with you
• Step 7: Public figure will almost have a common
email.
• Example: John@johndoe.com instead of
myname555@gmail.com
Suspecting it’s a Predator
• If you are suspecting is may be a predator, tell
someone that your trust or the authorities
immediately.
– Get help trying to determine if it is a predator
– Don’t wait or just give them the benefit of the
doubt.
Personal Information
• Do not put your personal information on
websites.
– Name
– Age
– Address
– You never know how people can use this
information to find out more about you.
Personal Info Cont.
• Try to avoid putting personal information on
websites.
– Predators will search information about you before
they contact you.
– Always ask yourself “why do they need to know that?”
• In general you should never give you personal
information out to people who randomly ask for
it. It can have the potential to put yourself in
danger.
Review
• Overfriendly- Tell someone
• If they are agreeing with you on everything,
should equal red flags
• If you are asked to meet in person
• Ask for their name
• Avoid common screen names and emails
• Don’t give out personal information
• When in doubt tell someone you trust
Resources
• How to Recognize a Predator
– http://www.wikihow.com/Recognize-an-Online-
Predator

More Related Content

PPTX
Internet safety
PPTX
Suspecting infidelity – dealing with suspected infidelity in
PPT
Internet Safety
PPT
Internet Safety
PDF
Digital Citizenship
PPT
George Tawnpp Quiz
PDF
Cyber Safety: Social Media, Cyberbullying and Sexting
PPTX
Cyber Safety
Internet safety
Suspecting infidelity – dealing with suspected infidelity in
Internet Safety
Internet Safety
Digital Citizenship
George Tawnpp Quiz
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety

What's hot (20)

PPTX
Cyberbullying
PPT
Online Safety
PPTX
Cyber Bullying Questionnaire Results
PPTX
Cyberbullying Final Project by Group Anonymous
PDF
Child sexual abuse:A Comprehensive View
PPTX
Don’t cyber bully!
POTX
Cyber bullying presentation
PPTX
Cyber bullying
PDF
Protecting our children from sexual abuse
PPTX
How to Stand against Cyberbullying on Facebook
PDF
savethechildrensweden_netsmart (1)
PDF
NetSmart [English]
PPTX
Cyberbullying in Social Media_FINAL without video clip_09.14.15
PPT
Cyberbullying year7
POTX
Cyberbullying assignment
PPTX
Dating and relationships
PPSX
*Cyber bullying presentation*
PPTX
Cyberbullying presentation de jose_amigable
PPTX
Cyberbully power point
PPTX
How to stand against cyberbullying
Cyberbullying
Online Safety
Cyber Bullying Questionnaire Results
Cyberbullying Final Project by Group Anonymous
Child sexual abuse:A Comprehensive View
Don’t cyber bully!
Cyber bullying presentation
Cyber bullying
Protecting our children from sexual abuse
How to Stand against Cyberbullying on Facebook
savethechildrensweden_netsmart (1)
NetSmart [English]
Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying year7
Cyberbullying assignment
Dating and relationships
*Cyber bullying presentation*
Cyberbullying presentation de jose_amigable
Cyberbully power point
How to stand against cyberbullying
Ad

Similar to Mini assignment #4 (20)

PPTX
empowerment technology Pongyan*Agravante
PPTX
Internet Safety Presentation
PPTX
Online defamation
PPTX
Perils of social media
PPTX
Your Internet Safety
PPTX
CH e-safety presentation
PDF
Digital Leaders e-safety presentation 2015
PPTX
Safely Traveling the Web 2015
PPTX
Etech monterey panganiban
PPTX
Internet-Safety-Powerpoint.pptx
PPTX
Gripo labrague Emp_Tech
DOCX
Jonathan cullishpuma
PPT
Social media details.ppt
PPTX
Understanding Relationships
PPTX
Online Safety Lesson 5th grade
PPT
FBI Cybercrime Presentation
PDF
Social Media & Children's Safety 101
PPTX
Don't Bullying
PPT
Staying Safe on the Internet
DOCX
Gloria flores
empowerment technology Pongyan*Agravante
Internet Safety Presentation
Online defamation
Perils of social media
Your Internet Safety
CH e-safety presentation
Digital Leaders e-safety presentation 2015
Safely Traveling the Web 2015
Etech monterey panganiban
Internet-Safety-Powerpoint.pptx
Gripo labrague Emp_Tech
Jonathan cullishpuma
Social media details.ppt
Understanding Relationships
Online Safety Lesson 5th grade
FBI Cybercrime Presentation
Social Media & Children's Safety 101
Don't Bullying
Staying Safe on the Internet
Gloria flores
Ad

Recently uploaded (20)

PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
My India Quiz Book_20210205121199924.pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
HVAC Specification 2024 according to central public works department
PPTX
Virtual and Augmented Reality in Current Scenario
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
Hazard Identification & Risk Assessment .pdf
PDF
advance database management system book.pdf
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
English Textual Question & Ans (12th Class).pdf
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
Empowerment Technology for Senior High School Guide
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
What if we spent less time fighting change, and more time building what’s rig...
Computer Architecture Input Output Memory.pptx
Introduction to pro and eukaryotes and differences.pptx
My India Quiz Book_20210205121199924.pdf
Unit 4 Computer Architecture Multicore Processor.pptx
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
HVAC Specification 2024 according to central public works department
Virtual and Augmented Reality in Current Scenario
Share_Module_2_Power_conflict_and_negotiation.pptx
Hazard Identification & Risk Assessment .pdf
advance database management system book.pdf
What’s under the hood: Parsing standardized learning content for AI
English Textual Question & Ans (12th Class).pdf
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Core Concepts of Personalized Learning and Virtual Learning Environments
Empowerment Technology for Senior High School Guide
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf

Mini assignment #4

  • 2. Online Predator • What is an Online Predator? – (Online predator) Internet-initiated sex crimes against minors are sex crimes against minors that begin on the internet. A substantial portion the illegal targeting of minors who are under the age of consent in order to solicit sex or to initiate a non-forcible sexual relationship (http://en.wikipedia.org/wiki/Online_predator).
  • 3. Identifying Online Predator’s • Step 1: Is the person awkwardly nice? – Is the person asking my age, gender, location, etc. – If so red flags should come up and should stop talking to this person immediately and tell a trusted adult. • Step 2: Predators agree to everything. – Predators do this to gain your trust
  • 4. Identifying, Cont. • Step 3: If a random person says hi out of the blue a red flag should pop up. • Step 4: If a child gets “into a relationship” very young, check into it immediately. – A lot of times it will be a predator
  • 5. Identifying, Cont. • Step 5: After chatting ask them questions. – Ask them if there is name you can call them by – Nothing else should be asked after that – Keep it to business
  • 6. Identifying Cont. • Step 6: Avoid common screen names – Hotmamma – Sexy69 – Predators will pretend to be the opposite sex – Don’t meet in person, but if you do bring a parents or guardian with you • Step 7: Public figure will almost have a common email. • Example: John@johndoe.com instead of myname555@gmail.com
  • 7. Suspecting it’s a Predator • If you are suspecting is may be a predator, tell someone that your trust or the authorities immediately. – Get help trying to determine if it is a predator – Don’t wait or just give them the benefit of the doubt.
  • 8. Personal Information • Do not put your personal information on websites. – Name – Age – Address – You never know how people can use this information to find out more about you.
  • 9. Personal Info Cont. • Try to avoid putting personal information on websites. – Predators will search information about you before they contact you. – Always ask yourself “why do they need to know that?” • In general you should never give you personal information out to people who randomly ask for it. It can have the potential to put yourself in danger.
  • 10. Review • Overfriendly- Tell someone • If they are agreeing with you on everything, should equal red flags • If you are asked to meet in person • Ask for their name • Avoid common screen names and emails • Don’t give out personal information • When in doubt tell someone you trust
  • 11. Resources • How to Recognize a Predator – http://www.wikihow.com/Recognize-an-Online- Predator