Internet+Predator

//**http://istc301c3fall2010.wikispaces.com/Internet+Predator+Group**//
Here is my contribution to the page. (Peter Greer) Here are the sources I used- [|www.ikeepsafe.org], [|www.wapt.com]

[|Predators: Tactics vs Neutralizors]

Definition of internet predation - Tommy characteristics of predators -> DIBS! Roy characteristics of victims -> DIBS! Roy tactics of predators > Peter Protection from (old neutralizer) > Peter Neutralization tactics of predators (meaning justification by predators) - Tommy

youtube webspiration pictures/slideshow text/bullets webpages for prevention where predators "hangout"



I was thinking we could use some of this information, but I'm not sure if it would be considered a reliable resource since it came from a blog. at the very least we could use the ideas, they need to be altered a but in order to fit the mold of predators anyways. []

Here are some statistics on predation. Should make for some nifty bullet points. []

yeah, big document i know. focus on pages 7 - 10 they give some great information on cyber-predators. I think the section on "virtual vs classic" would make a great inspiration creation. I can create one if you guys would like. []

__Hey Roy and Peter, here is the paper on internet predation I wrote back in junior year of undergrad, hopefully it will help us out.__ __- Tommy__

__Roy Rackley: rrackl1@students.towson.edu. Hit me up on the book as well!__ __Tommy Wright: twrigh8@students.towson.edu. Hit me up on the book, I suppose lol__ __Peter Greer: pgreer1@students.towson.edu. And facebook works for me too!__

__Create wiki page description of you topic__ __look for template__ __Due 10/11__

__Provide feedback to 3 topics__

__Submit quiz questions__

__revise your page__

(Who added this?)

__Here are some protection tips from this USA today article.__ __[]__

Software can be an important tool in protecting kids from online predators. (For starters, check out your Internet provider; AOL and MSN, especially with their latest software releases, deserve kudos for enhanced parental controls.) But Net child safety mostly takes common sense and plenty of parent-child communication. It's a good idea to periodically revisit the following tips, culled from conversations over the years with online child-safety experts:
 * PROTECTION TIPS || [[image:http://images.usatoday.com/_common/_images/clear.gif width="1" height="10"]] || [[image:http://images.usatoday.com/_common/_images/clear.gif width="10" height="1"]] ||
 * || [[image:http://images.usatoday.com/_common/_images/clear.gif width="180" height="10"]] ||
 * || **Communication is key**


 * Know what your kids are doing**

Screen the sites your children visit. Often the kids know more about computing than you do, so have them show you around. Place the computer in the family room, kitchen or other highly visible place, rather than letting kids go off by themselves in a bedroom. You may want to forbid use of a Web cam. Get to know their buddy lists and, if necessary, restrict correspondence to those pals.


 * Tell kids to keep personal information private**

This goes beyond such obvious stuff as name, password, phone number and address. Never have them give out where you work, where siblings go to school, what they want to buy, etc. Make sure the children's screen names aren't too risqué and don't reveal personal details. Pedophiles can track down kids with even a few innocuous snippets of information.


 * Warn kids that people aren't always what they seem**

If someone starts asking personal questions or makes children feel unsafe or funny, have them log off immediately and notify you, a librarian or a teacher, depending on where they are. Report any unsettling activity to your Internet provider, law enforcement or the NCMEC CyberTipline (www.cybertipline.com). Don't let the kids agree to meet someone in person without your approval.

Hey guys, here are some stuff on my categories.

Characteristics of an Internet Predator:

https://docs.google.com/document/edit?id=1rycfRK1SLc4Zk61bsWAtoOrRSLByP_WmSNJi567q6zA&hl=en

Characteristics of an Internet Victim:

https://docs.google.com/document/edit?id=1wkbHsEh3pKB4qbxth4HBMEVohRGiSYyF6tbmCjyUkRY&hl=en ||  ||
 * [[image:http://images.usatoday.com/_common/_images/clear.gif width="1" height="10"]] ||  ||^   ||
 * [[image:http://images.usatoday.com/_common/_images/clear.gif width="10" height="1"]] ||^  ||^   ||