ONLINE PREDATORS & PREDATORS

Size: px
Start display at page:

Download "ONLINE PREDATORS & PREDATORS"

Transcription

1 the myths and realities of ONLINE PREDATORS & PREDATORS Center For Child Advocacy Sixth Annual National Conference Crimes Against Children: The Multiple Faces of Child Victimization Joseph Hanley B.A. Candidate Montclair State 1 University

2 presentation largely based on article ONLINE PREDATORS AND THEIR VICTIMS: Myths, Realties, and Implications for Prevention and Treatment (Wolak et al., 2008) 2

3 Why am I here? Prevalent myths Realities Important contributing factors Offenders The Internet Adolescent development Possible solutions Prevention and treatment 3

4 surveys used 2 waves of the National Juvenile Online Victimization Survey (N-JOV) July 1, 2000 to June 30, 2001 Calendar year 2006 First national survey of its kind Youth Internet Safety Surveys 1 and 2 (2000, 2005) Phone surveys (Crimes Against Children Research Center) 4

5 statistics from n-jov survey Of the estimated 500 Internet-initiated sex crimes in the survey 95% were non-forcible 99% of the victims were year olds 75% of the victims are female Among the 25% of male victims, most had met offenders in gay-oriented chat rooms 99% of offenders were male (Wolak et al., 2008) 5

6 WHY PREDATORS?? INACCURATE REPRESENTATIONS IN THE MEDIA 6

7 The Internet 7

8 widespread youth Internet use 93% of Americans between the ages of 12 to 17 use the Internet Exciting alternate world, but consequences Exposure to explicit sexual content Porn sites Chat rooms 8 Intimate communications with strangers

9 Problematic elements Dr. Fred Berlin, Johns Hopkins University School of Psychiatry I think there are three things that are problematic about the Internet, or at least three things. One is the easy accessibility Secondly, there's this illusion of anonymity And thirdly, there is a distortion of reality and fantasy (Dr. Fred Berlin, Johns Hopkins University School of Psychiatry Sexual Disorders Clinic) 9

10 Patterns of vulnerability Risky online behaviors Posting personal information online Interacting online with unknown people Having unknown people on a buddy list Using the Internet to make rude and nasty comments to other Sending personal information to unknown people met online Downloading images from file-sharing programs Visiting x-rated sites on purpose Using the Internet to embarrass or harass people youth are mad at Talking online to unknown people about sex (Ybarra et al., 2007) 10

11 LAw enforcement statistics do not show Unreported crimes Sexual encounters between youths and adults Sexually oriented communications Exposure to explicit online sexual content Developmental concerns Potential problems for youths developing healthy relationships with peers 11

12 DATELINE NBC TO CATCH A PREDATOR 12

13 predator and victim profiles? What are some stereotypes of online predators? 13

14 Myths Violent child molesters use trickery and lie about age Naive Adolescents are coerced Online/Internet predators are pedophiles (Wolak et al., 2008) 14

15 SOME REALITIES Only 5% of offenders lied about their age Violence and abduction were rare Online predators are generally not pedophiles In 73% of the cases, victims who had face to face sexual encounters with offenders, did so more than once 15

16 implications of stats? 99% of the victims were year olds Important aspect contributing to youth online risks? 16

17 Some Key Adolescent DEVELOPMENTAL CHALLENGES Physical and emotional challenges Burgeoning sexuality Identity formation 17

18 Adolescent sexuality Part of normal/healthy human development...however Often not addressed Difficult for adults to accept, or deal with proactively Much easier to target offenders 18

19 Important realities A realistic approach to contributing factors may help reduce risky online behaviors Adolescent emerging/developing sexuality Use of technology by has inherent risks Risky online behaviors may be influenced by the material that they can access, SO Why does the Internet appear to engender problems for offenders and victims?? 19

20 facilitates autonomy Adolescents can adopt different identities and interact away from adult supervision 20

21 IDENTITY FORMATION AND SEXUAL EXPRESSION Experiment with identity Explore developing sexuality Anonymous venue Online, intimate disclosure happens quicker 21

22 NEUROLOGICAL ASPECTS THE BRAIN THAT CHANGES ITSELF (Norman Doidge, M.D., 2007) Exposure to Sexually explicit images can rewire brain Over sexualization Exposure to deviant sexuality Aversion to healthy face to face relationships with peers Increased risks for adolescents Brain plasticity Less impulse control Lack of emotional maturity 22

23 what has been done? Monitoring of online activity Internet activity monitoring software Place computers where usage can be visually monitored Statutory/legal approach Online sting operations Law enforcement developing cyber crime and child exploitation task forces 23

24 How has the problem been primarily addressed? Criminal justice component Targets offenders Doesn t address other contributing factors Develop Preventative approaches also For potential victims For potential perpetrators Understanding of the nature of the problem is critical for prevention and treatment 24

25 Dr. Fred Berlin Johns Hopkins University School of Psychiatry Sexual Disorders Clinic. Dr. Fred Berlin 25

26 preventive measures TARGETing ADOLESCENTS Emphasize illegality Sexual relationships with adults Adults sharing explicit sexual content Point out inequality of power and maturity Risk of unhealthy sexual development Importance of healthy offline relationships with peers 26

27 In addition to legal approaches going forward Educate youths about risks Focus on adolescent autonomy, romance, and sex Public health component Address Internet-related sex crimes and disorders 27 More specialized research

28 Summary Myths about online predators are inaccurate The Internet has inherent risks for adolescents Adolescent Sexuality Identity Formation Risky Online Behaviors Appropriately tailored, targeted approaches Criminal justice + Public Health Component 28

29 Video targeting teens VIDEO PRODUCED BY NETSMART.ORG 29

30 USEFUL LINKS Crimes Against Children Research Center: Internet Solutions For Kids: National center For Missing and Exploited Children: rvlet?languagecountry=en_us& Internet Crimes Against Children Training: Microsoft Safety and Security Center: Pew Research Center 30

31 misunderstood Statistics about Online Sexual Solicitations 1 in 7 youth are threatened by online predators? These statistics have been misunderstood 31

32 CLARIFCAtion of stats These solicitations did not necessarily come from online predators These solicitations were not necessarily devious or intended to lure Most recipients did not view the solicitations as serious or threatening Almost all youth handled unwanted solicitations easily and effectively Extremely few youth (only 2) were actually sexually victimized by someone they met online (Ybarra, 2007) 32

33 UPDATES between the 2 waves of n-jov 21% increase in arrests of offenders who solicited youth online for sex. During the same time, there was a 381% increase in arrests of offenders who solicited undercover investigators posing as youth. In 2006, of those arrested for soliciting online, 87% solicited undercover investigators and 13% solicited youth. the growth of law enforcement activity against online crimes. The nature of crimes in which online predators used the Internet to meet and victimize youth changed little between 2000 and 2006, despite the advent of social networking sites. Victims were adolescents, not younger children. During the same period that online predator arrests were increasing, overall sex offenses against children and adolescents were declining, as were overall arrests for such crimes. Arrests of online predators in 2006 constituted about 1% of all arrests for sex crimes committed against children and youth. During the interval between the two studies ( ), the percentage of U.S. youth Internet users ages increased from 73% to 93%. Although arrests of online predators are increasing, especially arrests for soliciting undercover law enforcement, the facts do not suggest that the Internet is facilitating an epidemic of sex crimes against youth. Rather, increasing arrests for online predation probably reflect increasing rates of youth Internet use, a migration of crime from offline to online venues, and Most offenders were open about their sexual motives in their online communications with youth. Few crimes (5%) involved violence. 33 There was no evidence that online predators were stalking or abducting unsuspecting victims based on information they posted at social networking sites. There was a significant increase in arrests of young adult offenders, ages 18 to 25. Few of those arrested for online predation were registered sex offenders (4%).

Techno-Panic & 21st Century Education:

Techno-Panic & 21st Century Education: Techno-Panic & 21st Century Education: Make Sure Internet Safety Messaging Does Not Undermine Education for the Future Nancy Willard, M.S., J.D. Center for Safe and Responsible Internet Use Trying to prepare

More information

TRENDS IN ARRESTS OF ONLINE PREDATORS

TRENDS IN ARRESTS OF ONLINE PREDATORS TRENDS IN ARRESTS OF ONLINE PREDATORS How the National Juvenile Online Victimization (N JOV) Study was conducted The N JOV Study collected information from a national sample of law enforcement agencies

More information

What do you. you know about. Online Predators?

What do you. you know about. Online Predators? What do you you know about Online Predators? Some people may think of a stereotype when they think about an online predator Some people think of a ster e o type n. stereotype 1. A conventional, formulaic,

More information

Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3)

Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3) April 2012 Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3) Abstract Arrests for the possession of child pornography (CP) increased between

More information

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

Empowering young people to be safe on the Internet. Information for parents, teachers and community members Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information

More information

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences

More information

Counselors Guidelines for the Healthy Development of Youth in the Digital Age

Counselors Guidelines for the Healthy Development of Youth in the Digital Age Suggested APA style reference information can be found at http://www.counseling.org/library/ Article 40 Counselors Guidelines for the Healthy Development of Youth in the Digital Age Lakitta D. Johnson

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report:

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Author: Internet Crimes Against Children: An Annotated Bibliography

More information

Current Internet Facts

Current Internet Facts Current Internet Facts Facts about Online Predators and Strangers online: Twenty-eight percent of tweens (ages 8 to 12) have been contacted over the Internet by someone they don t know (COX Tween Internet

More information

Clustering of Internet Risk Behaviors in a Middle School Student Population

Clustering of Internet Risk Behaviors in a Middle School Student Population R ESEARCHA RTICLE Clustering of Internet Risk Behaviors in a Middle School Student Population ELIZABETH B. DOWELL,PhD,RN a ANN W. BURGESS, DNSc, RN b DEBORAH J. CAVANAUGH,MA,MHC c ABSTRACT BACKGROUND:

More information

Online grooming: What changes with the new legislation?

Online grooming: What changes with the new legislation? Online grooming: What changes with the new legislation? The use of new technologies has considerably increased in recent years, particularly among young people. In Belgium, 96% of children between 12 to

More information

TEEN ONLINE EXPOSURE: A SNAPSHOT OF DATA

TEEN ONLINE EXPOSURE: A SNAPSHOT OF DATA TEEN ONLINE EXPOSURE: A SNAPSHOT OF DATA October, 2008 www.theantidrug.com TEEN VIEWING OF DRUG AND ALCOHOL-RELATED VIDEOS ONLINE Recent data from a special study conducted by Nielsen Online, on behalf

More information

Online Predators and their Victims: Myths, Realities and Implications for. Prevention and Treatment 1. Janis Wolak*

Online Predators and their Victims: Myths, Realities and Implications for. Prevention and Treatment 1. Janis Wolak* Online Predators and their Victims: Myths, Realities and Implications for Prevention and Treatment 1 Janis Wolak* Crimes against Children Research Center & Family Research Laboratory University of New

More information

A U.S. Postal Inspector s Guide to Internet Safety for Children

A U.S. Postal Inspector s Guide to Internet Safety for Children A U.S. Postal Inspector s Guide to Internet Safety for Children A U.S. Postal Inspector s Guide to INTERNET SAFETY FOR CHILDREN The Internet is a global community that allows people to share information

More information

Police Posing as Juveniles Online to Catch Sex Offenders: Is It Working?

Police Posing as Juveniles Online to Catch Sex Offenders: Is It Working? Sexual Abuse: A Journal of Research and Treatment, Vol. 17, No. 3, July 2005 ( C 2005) DOI: 10.1007/s11194-005-5055-2 Police Posing as Juveniles Online to Catch Sex Offenders: Is It Working? Kimberly J.

More information

Adolescent Sexual Offenders

Adolescent Sexual Offenders Adolescent Sexual Offenders Information from... The National Clearinghouse on Family Violence Who Are Adolescent Sexual Offenders? The adolescent sexual offender is defined as a youth, from 12 to 17 years

More information

Results. Contact sexual crimes based on PSI and self-report after SOTP participation

Results. Contact sexual crimes based on PSI and self-report after SOTP participation Self-Reported Contact Sexual Offenses by Participants in the Federal Bureau of Prisons Sex Offender Treatment Program: Implications for Internet Sex Offenders Andres E. Hernandez, Psy.D. Director, Sex

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

What Practices Can Protect School-Aged Minors from Online Sexual Predators in the United States?

What Practices Can Protect School-Aged Minors from Online Sexual Predators in the United States? Southern Adventist Univeristy KnowledgeExchange@Southern Undergraduate Research Projects Social Work and Family Studies 12-10-2015 What Practices Can Protect School-Aged Minors from Online Sexual Predators

More information

How Can Parents Keep Teens Safe from Online Sexual Exploitation?

How Can Parents Keep Teens Safe from Online Sexual Exploitation? protectchildren.ca How Can Parents Keep Teens Safe from Online Sexual Exploitation? The Internet and new technologies have become central to teens lives. While these technologies offer a variety of benefits

More information

C enter For S ex O ffender M anagement. Myths and Facts About Sex Offenders. August 2000

C enter For S ex O ffender M anagement. Myths and Facts About Sex Offenders. August 2000 C enter For S ex O ffender M anagement Myths and Facts About Sex Offenders August 2000 There are many misconceptions about sexual offenses, sexual offense victims, and sex offenders in our society. Much

More information

Outsmarting On-line Predators. Christina Kilbourne

Outsmarting On-line Predators. Christina Kilbourne Outsmarting On-line Predators Christina Kilbourne Some Surprising Stats 26% believe their parents would be concerned if they knew what they were doing on-line over half have given out personal information

More information

Meeting Online Strangers among European Children

Meeting Online Strangers among European Children Cite as: Smahel, D. Helsper, E. J., Barbovschi, M. & Dedkova, L. (2012) Meeting Online Strangers among European Children. Proceedings of the 15th European Conference on Developmental Psychology. Bologna,

More information

INTIMATE PARTNER VIOLENCE

INTIMATE PARTNER VIOLENCE INTIMATE PARTNER VIOLENCE 28 Injury Prevention Plan of Alabama INTIMATE PARTNER VIOLENCE THE PROBLEM: In a national survey, 25% of female participants reported being raped or physically assaulted by an

More information

Chapter 3. Online Bullying

Chapter 3. Online Bullying Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.

More information

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual

More information

MEA-MFT Teachers Conference

MEA-MFT Teachers Conference MEA-MFT Teachers Conference Online Safety: Cyber Predators - Presented by Desireé Caskey You can be anyone you want to be on the Internet Topics for Today What our students are saying - Internet Landscape

More information

Online Harassment and Victimization of College Students

Online Harassment and Victimization of College Students Online Harassment and Victimization of College Students M. Alexis Kennedy and Melanie A. Taylor* Volume 7 No. 1 Spring 2010 *M. Alexis Kennedy is an Assistant Professor in the Department of Criminal Justice

More information

Child Abuse & Neglect

Child Abuse & Neglect Child Abuse & Neglect 33 (2009) 857 869 Contents lists available at ScienceDirect Child Abuse & Neglect Associations between blocking, monitoring, and filtering software on the home computer and youth-reported

More information

CHILDHOOD SEXUAL ABUSE FACT SHEET

CHILDHOOD SEXUAL ABUSE FACT SHEET CHILDHOOD SEXUAL ABUSE FACT SHEET Emily M. Douglas and David Finkelhor PART 1: HOW MANY CHILDREN ARE THE VICTIMS OF CHILD SEXUAL ABUSE? There are many estimates of the number of children who are the victims

More information

Online Predators and Their Victims

Online Predators and Their Victims Online Predators and Their Victims Myths, Realities, and Implications for Prevention and Treatment Janis Wolak, David Finkelhor, and Kimberly J. Mitchell Michele L. Ybarra University of New Hampshire Internet

More information

SECOND NATIONAL JUVENILE ONLINE VICTIMIZATION INCIDENCE STUDY (NJOV-2)

SECOND NATIONAL JUVENILE ONLINE VICTIMIZATION INCIDENCE STUDY (NJOV-2) SECOND NATIONAL JUVENILE ONLINE VICTIMIZATION INCIDENCE STUDY (NJOV-2) NDACAN Dataset Number 162 USER'S GUIDE National Data Archive on Child Abuse and Neglect Bronfenbrenner Center for Translational Research

More information

The Internet: A Breeding Ground for Online Pedophiles. An In Depth Analysis of Crimes Against Children Via the Internet. By: Robert B.

The Internet: A Breeding Ground for Online Pedophiles. An In Depth Analysis of Crimes Against Children Via the Internet. By: Robert B. The Internet: A Breeding Ground for Online Pedophiles An In Depth Analysis of Crimes Against Children Via the Internet By: Robert B. Fried, BS, MS Have you ever had the opportunity to watch a youngster

More information

Risky Behaviors and Online Safety: A 2010 Literature Review (DRAFT)

Risky Behaviors and Online Safety: A 2010 Literature Review (DRAFT) Risky Behaviors and Online Safety: A 2010 Literature Review (DRAFT) Samantha Biegler and danah boyd Harvard University, Berkman Center for Internet & Society As social media continues to play a central

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Online Victimization of Youth: Five Years Later

Online Victimization of Youth: Five Years Later Online Victimization of Youth: Five Years Later Online Victimization of Youth: Five Years Later 2006 JANIS WOLAK, KIMBERLY MITCHELL, AND DAVID FINKELHOR OF THE CRIMES AGAINST CHILDREN RESEARCH CENTER

More information

www.xxxchurch.com Online Predators & Strangers

www.xxxchurch.com Online Predators & Strangers www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

New computer technology presents

New computer technology presents U.S. Department of Justice Office of Justice Programs Office for Victims of Crime D ECEMBER 2001 Internet Crimes Against Children New computer technology presents complex challenges for law enforcement

More information

Forum on Public Policy

Forum on Public Policy Disconnecting Child Pornography on the Internet: Barriers and Policy Considerations Rebecca Ayers Loftus, Faculty Associate, Arizona State University at the Polytechnic Abstract Access to child pornography

More information

Risky Online Relationships

Risky Online Relationships LESSON PLAN Risky Online Relationships UNIT 2 Essential Question How can you tell when an online relationship is risky? Lesson Overview Students first talk about common impressions of stranger danger.

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Stalking 101: Understanding the lethality of stalking in today s world

Stalking 101: Understanding the lethality of stalking in today s world Stalking 101: Understanding the lethality of stalking in today s world Objectives Participants will be able to recognize the dynamics of stalking and the its impact on victims Participants will understand

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Crimes Against Children Unit SECTIONS CPU ICAC DFU WVMCC WV3C Crimes Against Children Unit WVSP Organizational Change December 1, 2009

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

How to Utilize Forensic Psychological Evaluations Within Internet Online Solicitation and Pornography Sex Crime Cases

How to Utilize Forensic Psychological Evaluations Within Internet Online Solicitation and Pornography Sex Crime Cases How to Utilize Forensic Psychological Evaluations Within Internet Online Solicitation and Pornography Sex Crime Cases John Matthew Fabian, PSY.D., J.D. The purpose of this article is to present how forensic

More information

Domestic Assaults by Juvenile Offenders

Domestic Assaults by Juvenile Offenders U.S. Department of Justice Office of Justice Programs Office of Juvenile Justice and Delinquency Prevention J. Robert Flores, Administrator November 2008 Office of Justice Programs Innovation Partnerships

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

This report provides the executive summary for Indicators of School Crime and Safety: 2014.

This report provides the executive summary for Indicators of School Crime and Safety: 2014. 1 Liability Report Number: LB-10-66 Release Date: August 6, 2015 Section Title: General Information Abstract School violence not only has a direct impact on students, but also on educators, parents, and

More information

Comprehensive Sexual Health Lesson Plan

Comprehensive Sexual Health Lesson Plan This sequence of 24 lessons from the HealthSmart high school program provides a comprehensive sexual health education unit aligned with both the HECAT Knowledge and Skills Expectations and the National

More information

Cyberbullying. How common is cyberbullying?

Cyberbullying. How common is cyberbullying? Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:

More information

Back Cover. Copyright 2006, 2009, and 2011 National Center for Missing & Exploited Children. All rights reserved.

Back Cover. Copyright 2006, 2009, and 2011 National Center for Missing & Exploited Children. All rights reserved. 1 2 3 5 6 7 8 9 10 12 Back Cover Where Do Kids Connect? Browsing the Internet Social Networking Using E-Mail Instant Messaging Cell Phones/ Wireless Devices and Texting Posting Videos and Photos Online

More information

Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW

Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW I know all my online friends. What I post online is private. I can delete what I post. Freedom

More information

SEX WORK ENFORCEMENT GUIDELINES ADOPTED JANUARY 2013

SEX WORK ENFORCEMENT GUIDELINES ADOPTED JANUARY 2013 VANCOUVER POLICE DEPARTMENT SEX WORK ENFORCEMENT GUIDELINES ADOPTED JANUARY 2013 PREPARED BY: Kristie McCann Planning and Policy Advisor Sergeant Richard Akin Counter Exploitation Unit Inspector Cita Airth

More information

Toronto District School Board

Toronto District School Board Toronto District School Board Title: GENDER-BASED VIOLENCE Policy P071 Adopted: April 14, 2010 Revised: Review: 1.0 OBJECTIVE To establish the Board s commitment to eliminating gender-based violence in

More information

BULLY PREVENTION: ARE YOU PROMOTING HEALTHY RELATIONSHIPS IN YOUR CLASSROOMS AND SCHOOLS?

BULLY PREVENTION: ARE YOU PROMOTING HEALTHY RELATIONSHIPS IN YOUR CLASSROOMS AND SCHOOLS? BULLY PREVENTION: ARE YOU PROMOTING HEALTHY RELATIONSHIPS IN YOUR CLASSROOMS AND SCHOOLS? Dorothy L. Espelage, Ph.D. Professor, Child Development Division; Educational Psychology espelage@illinois.edu

More information

Undercover Online: An Extension of Traditional Policing in the United States

Undercover Online: An Extension of Traditional Policing in the United States International Journal of Cyber Criminology Vol 5 Issue 2 July - December 2011 Copyright 2011 International Journal of Cyber Criminology (IJCC) ISSN: 0974 2891 July December 2011, Vol 5 (2): 813 824 This

More information

9. Children, Technology and Gambling

9. Children, Technology and Gambling 9. Children, Technology and Gambling This document is part of a series of Building a Stronger South Australia policy initiatives from the Government of South Australia. 1. Future Fund 2. Jobs and Skills

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

GEORGIA SEX-OFFENDER REGISTRATION AND NOTIFICATION

GEORGIA SEX-OFFENDER REGISTRATION AND NOTIFICATION GEORGIA SEX-OFFENDER REGISTRATION AND NOTIFICATION CONTACT INFORMATION Georgia Bureau of Investigation Georgia Crime Information Center 3121 Panthersville Road PO Box 370808 Decatur, GA 30037-0808 Telephone:

More information

Are Social Networking Sites a Source of Online Harassment for Teens? Evidence from Survey Data

Are Social Networking Sites a Source of Online Harassment for Teens? Evidence from Survey Data Are Social Networking Sites a Source of Online Harassment for Teens? Evidence from Survey Data Anirban Sengupta 1 Anoshua Chaudhuri 2 Abstract Media reports on incidences of abuse on the internet, particularly

More information

Indiana Report. 2011 Action Plan Domestic Violence and Sexual Assault Services

Indiana Report. 2011 Action Plan Domestic Violence and Sexual Assault Services Indiana Report 2011 Action Plan Domestic Violence and Sexual Assault Services Introduction Every five years a committee of domestic and sexual violence victim service providers, coalitions, and vested

More information

Juvenile Sexual Offenders: An. Analytical View of Effective. Programming

Juvenile Sexual Offenders: An. Analytical View of Effective. Programming Juvenile Sexual Offenders: An Analytical View of Effective Programming Lee Hyman Volume 4 No. 2 Fall 2007 Abstract The following paper reviews the little discussed topic of juvenile sexual offenders as

More information

Lessons for Teens: Risky Internet and Social Networking

Lessons for Teens: Risky Internet and Social Networking Lesson Plan # 4 Online/Electronic Lure Presenter Overview: Most teens regularly and safely interact online with people they don t know via social networking, media and gaming sites. Although news organizations

More information

The rate of hospitalizations due to assaultive injuries by spouse or partner (E976.3) per 100,000 females (13 and over)

The rate of hospitalizations due to assaultive injuries by spouse or partner (E976.3) per 100,000 females (13 and over) Domestic Violence DOMESTIC VIOLENCE TEMPLATE INDICATOR: Hospitalizations of Females Ages 13 and Over Due to Assaultive Injuries by Spouse or Partner DEFINITION: The rate of hospitalizations due to assaultive

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Issue Brief. Teen Pregnancy, Parenting, And Dating Violence. Links Between Teen Dating Violence and Teen Pregnancy

Issue Brief. Teen Pregnancy, Parenting, And Dating Violence. Links Between Teen Dating Violence and Teen Pregnancy Issue Brief N O. 8 J U L Y 2 0 0 9 Teen Pregnancy, Parenting, And Dating Violence D ating violence and teen pregnancy are intricately linked. Research indicates that teen girls who are in abusive relationships

More information

Preventing Sexual Exploitation via Internet and Technology

Preventing Sexual Exploitation via Internet and Technology Sponsored by Child Protective Services Unit Virginia Department of Social Services Editor Joann Grayson, Ph.D. Editorial Director Ann Childress, MSW Editorial Assistant Wanda Baker Computer Consultant

More information

Wisconsin Anti-Bullying Center

Wisconsin Anti-Bullying Center Patrick Evans, M.S. CESA 7 - Project Management Consultant Green Bay, Wisconsin Certified Trainer Wisconsin Emergency Management Multi-Hazard Emergency Planning for Schools Writer, Editor, Contributor,

More information

Gender Based Violence

Gender Based Violence Gender Based Violence Background and problem statement Background Gender-based violence (GBV) is violence that is directed against a person on the basis of gender (European Institute for Gender Equality,

More information

Child Protection. UNICEF/Julie Pudlowski. for children unite for children

Child Protection. UNICEF/Julie Pudlowski. for children unite for children Child Protection UNICEF/Julie Pudlowski for children unite for children UNICEF/Hiroki Gomi UNICEF/Hiroki Gomi Fast facts Sexual violence experienced in childhood 28% girls 13% boys Physical violence experienced

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

Facts for Teens: Youth Violence

Facts for Teens: Youth Violence P.O. Box 6003 Rockville, MD 20849-6003 nyvprc@safeyouth.org www.safeyouth.org Facts for Teens: Youth Violence Introduction Many teenagers are concerned about youth violence, and with good reason. Each

More information

Adam Walsh Child Protection and Safety Act. Or SORNA Sex Offender Registration and Notification Act By Chris Phillis Maricopa Public Defender

Adam Walsh Child Protection and Safety Act. Or SORNA Sex Offender Registration and Notification Act By Chris Phillis Maricopa Public Defender Adam Walsh Child Protection and Safety Act Or SORNA Sex Offender Registration and Notification Act By Chris Phillis Maricopa Public Defender Signed into law by George W. Bush on July 27, 2006 Creates a

More information

San Francisco s Successful Strategies: Prevention Services for Girls and the First Offender Prostitution Program Norma Hotaling

San Francisco s Successful Strategies: Prevention Services for Girls and the First Offender Prostitution Program Norma Hotaling Norma Hotaling is the founder and Executive Director of SAGE (Standing Against Global Exploitation), Inc., a nonprofit organization in San Francisco that helps former prostitutes live healthy lives. Before

More information

Parental Regulation and Online Activities: Examining factors that influence a Youth s potential to become a Victim of Online Harassment

Parental Regulation and Online Activities: Examining factors that influence a Youth s potential to become a Victim of Online Harassment International Journal of Cyber Criminology Vol 4 Issue 1&2 January - July 2010 / July - December 2010 Copyright 2010 International Journal of Cyber Criminology (IJCC) ISSN: 0974 2891 Jan July 2010, July

More information

CAMPUS SECURITY INFORMATION ANNUAL CAMPUS SECURITY REPORT-TULSA

CAMPUS SECURITY INFORMATION ANNUAL CAMPUS SECURITY REPORT-TULSA CAMPUS SECURITY INFORMATION ANNUAL CAMPUS SECURITY REPORT-TULSA The following statistics are provided as part of the requirement under the Student Right- To Know and Campus Security Act, Public Law 101-542,

More information

Cyberbullying, Sexting & Predators Oh My!

Cyberbullying, Sexting & Predators Oh My! Cyberbullying, Sexting & Predators Oh My! Addressing Youth Risk in the Digital Age in a Positive and Restorative Manner Nancy Willard Center for Safe and Responsible Internet Use Cyber Savvy Cyber Savvy

More information

South Carolina Internet Crimes Against Children Task Force. Deborah R.J. Shupe Assistant Attorney General Task Force Commander

South Carolina Internet Crimes Against Children Task Force. Deborah R.J. Shupe Assistant Attorney General Task Force Commander South Carolina Internet Crimes Against Children Task Force Deborah R.J. Shupe Assistant Attorney General Task Force Commander The S.C. ICAC Task Force South Carolina was one of 10 original task forces

More information

Social, Security, and Privacy Implications of Computing

Social, Security, and Privacy Implications of Computing Social, Security, and Privacy Implications of Computing February 17, 2006 Damira Pon University at Albany, SUNY 1 Cyber Ethics 2 Relativity applies to physics, not ethics - Albert Einstein 3 Cyber Ethics

More information

CHILD SEXUAL EXPLOITATION LISA RUTTER DEVON YOUTH SERVICE (CHAIR MACSE)

CHILD SEXUAL EXPLOITATION LISA RUTTER DEVON YOUTH SERVICE (CHAIR MACSE) CHILD SEXUAL EXPLOITATION LISA RUTTER DEVON YOUTH SERVICE (CHAIR MACSE) PUBLIC : MEDIA : SOCIAL NORMS CSE is child abuse and is a crime The victims are children however they present themselves Definition

More information

Digital Harassment and Abuse of Adult Australians:

Digital Harassment and Abuse of Adult Australians: Digital Harassment and Abuse of Adult Australians: Anastasia Powell and Nicola Henry Digital Harassment and Abuse of Adult Australians: 1 Anastasia Powell and Nicola Henry¹ Key Survey Findings Overall,

More information

Juvenile Justice. CJ 3650 Professor James J. Drylie Chapter 3

Juvenile Justice. CJ 3650 Professor James J. Drylie Chapter 3 Juvenile Justice CJ 3650 Professor James J. Drylie Chapter 3 Measuring Juvenile Crime Fears related to juvenile crime reached new heights in the past two decades Fear remains high despite falling juvenile

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

Teacher Guide TEEN SAFETY

Teacher Guide TEEN SAFETY The Vulnerable Teacher Guide TEEN SAFETY This companion to the online course provides questions and topics for classroom discussion and activities. 2012 ShieldTheVulnerable.org 1277 Treat Blvd #530 Walnut

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Girls & Cyber- bullying

Girls & Cyber- bullying MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts

More information

Enhancing Child Safety & Online Technologies:

Enhancing Child Safety & Online Technologies: Enhancing Child Safety & Online Technologies: F I N A L R E P O R T O F T H E I N T E R N E T S A F E T Y T E C H N I C A L T A S K F O R C E To the Multi-State Working Group on Social Networking of State

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

Child Pornography Offender Characteristics and Risk to Reoffend. Michael C. Seto, Ph.D., C.Psych. Royal Ottawa Health Care Group

Child Pornography Offender Characteristics and Risk to Reoffend. Michael C. Seto, Ph.D., C.Psych. Royal Ottawa Health Care Group Seto 1 Child Pornography Offender Characteristics and Risk to Reoffend Michael C. Seto, Ph.D., C.Psych. Royal Ottawa Health Care Group Prepared for the United States Sentencing Commission Draft dated February

More information

USING INTERNET ARTIFACTS TO PROFILE A CHILD PORNOGRAPHY SUSPECT

USING INTERNET ARTIFACTS TO PROFILE A CHILD PORNOGRAPHY SUSPECT This work is licensed under a Creative Commons Attribution 4.0 International License. USING INTERNET ARTIFACTS TO PROFILE A CHILD PORNOGRAPHY SUSPECT Marcus K. Rogers, PhD Department of Computer Information

More information

Behavioral Health (Addiction and Mental Health) Care in Schools: Where do you fit in?

Behavioral Health (Addiction and Mental Health) Care in Schools: Where do you fit in? Behavioral Health (Addiction and Mental Health) Care in Schools: Where do you fit in? 13 th School Health Interdisciplinary Program (SHIP) Youth and Problem Gambling August, 2013 Presenter Carl E. Robertson,

More information

Sexual Assault & Domestic Violence: Common Goals, Distinct Differences (Winter 2006) Last Updated Wednesday, August 26, 2009 at 04:01 pm

Sexual Assault & Domestic Violence: Common Goals, Distinct Differences (Winter 2006) Last Updated Wednesday, August 26, 2009 at 04:01 pm The work of the anti-sexual assault and domestic violence movements is clearly interconnected. The pervasive problems of sexual assault and domestic violence are firmly embedded in our society, allowing

More information

Background Check Toolkit

Background Check Toolkit Background Check Toolkit We require that criminal history record checks be conducted for all applicants whose positions require direct contact with individuals considered vulnerable by United Charitable.

More information

Online Safety How to Protect Yourself and Your Family

Online Safety How to Protect Yourself and Your Family Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing

More information