Excluded from online activity, exclusion in social media text, do not have
the latest technology?
Exclusion
Abusive and threatening messages send thru the child or to a group
which can severely affect the child’s well being?
Harassment
Act of public humiliating of a child or a group thru online posting or
embarrassing information without consent. Even reading your child’s messages on their
CP or read aloud can be form of outing?
Outing
Attackers harass victims thru online communication like email, or
social media. Could be also be adult who contact and meet people for abusive purposes?
Cyberstalking
Attackers harass victims thru online communication like email, or
social media. Could be also be adult who contact and meet people for abusive purposes?
Cyberstalking
When someone logs into your child social media account and impersonates
them posting inappropriate content in their name?
Fraping
Created by someone to hide their real identity with the intention of
cyberbullying your child. The cyberbully may use someone else’s email or phone to
harass them?
Fakeprofiles
Sending of posting cruel information about your child online to damage their reputation and their friendships. Includes posting of damaging photos, or screen shots, or videos online
Dissing
Gaining your child’s trust so that secrets can be shared publicly online. A
cyberbully can be friend your child leading them to a false sense of security and sending
private information to others
Trickery
Means deliberately provoking a response through the use of insults in an
online form or social media site. A troll can personally attack your child aiming to make
them angry and provoke a response.
Trolling
Stealing online identities and creating social networking profiles for
deceptive purposes. Catfishers look at your child’s profile and take information to create
a fake persona. This could involve using personal information to potentially damaging
your child’s online reputation
Catfishing
HACKING- Unauthorized access or interference with COMPUTER SYSTEM, servers, or other and
communication system without the computer systems’ knowledge and consent. Infection of
systems with malware
is when cybercriminals impersonate a fake identity to trick victims into
sharing their sensitive information by creating a false sense of security and urgency?
Phishing
is the use of electronic messaging systems like e-mails and other
digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately.
Spamming
17 years old and below. Form of child exploitation.
Child Pornography
Unauthorized use of other intellectual property rights without approval of such
use.?
Plagiarism
Excessive use of the internet. Creation of “Virtual self.”
Computer Addiction
An attempt to get
username, password, and credit card details for malicious reasons.
Identity Theft
Illegal downloading, obtaining files that you do not have the right to use
from the internet. Digital piracy.
Electronic Theft
Willful engagement, maintenance, control or operation, directly/indirectly of any
lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for
favor or consideration
Cybersex
The use of electronic communication to bully a person, typically by sending
messages of an intimidating or threatening nature
Cyberbullying
Is an underprivileged false statement of fact which tends to harm the
reputation of a person or company?
Cyber defamation
is a cyberattack intended to redirect a website's traffic to another, fake
site by installing a malicious program on the computer.