GIT 2

Cards (23)

  • Excluded from online activity, exclusion in social media text, do not have
    the latest technology?
    Exclusion
  • Abusive and threatening messages send thru the child or to a group
    which can severely affect the child’s well being?
    Harassment
  • Act of public humiliating of a child or a group thru online posting or
    embarrassing information without consent. Even reading your child’s messages on their
    CP or read aloud can be form of outing?
    Outing
  • Attackers harass victims thru online communication like email, or
    social media. Could be also be adult who contact and meet people for abusive purposes?
    Cyberstalking
  • Attackers harass victims thru online communication like email, or
    social media. Could be also be adult who contact and meet people for abusive purposes?
    Cyberstalking
  • When someone logs into your child social media account and impersonates
    them posting inappropriate content in their name?
    Fraping
  • Created by someone to hide their real identity with the intention of
    cyberbullying your child. The cyberbully may use someone else’s email or phone to
    harass them?
    Fake profiles
  • Sending of posting cruel information about your child online to damage their reputation and their friendships. Includes posting of damaging photos, or screen shots, or videos online
    Dissing
  • Gaining your child’s trust so that secrets can be shared publicly online. A
    cyberbully can be friend your child leading them to a false sense of security and sending
    private information to others
    Trickery
  • Means deliberately provoking a response through the use of insults in an
    online form or social media site. A troll can personally attack your child aiming to make
    them angry and provoke a response.
    Trolling
  • Stealing online identities and creating social networking profiles for
    deceptive purposes. Catfishers look at your child’s profile and take information to create
    a fake persona. This could involve using personal information to potentially damaging
    your child’s online reputation
    Catfishing
  • HACKING- Unauthorized access or interference with COMPUTER SYSTEM, servers, or other and
    communication system without the computer systems’ knowledge and consent. Infection of
    systems with malware
  • is when cybercriminals impersonate a fake identity to trick victims into
    sharing their sensitive information by creating a false sense of security and urgency?
    Phishing
  • is the use of electronic messaging systems like e-mails and other
    digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately.
    Spamming
  • 17 years old and below. Form of child exploitation.
    Child Pornography
  • Unauthorized use of other intellectual property rights without approval of such
    use.?
    Plagiarism
  • Excessive use of the internet. Creation of “Virtual self.”
    Computer Addiction
  • An attempt to get
    username, password, and credit card details for malicious reasons.
    Identity Theft
  • Illegal downloading, obtaining files that you do not have the right to use
    from the internet. Digital piracy.
    Electronic Theft
  • Willful engagement, maintenance, control or operation, directly/indirectly of any
    lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for
    favor or consideration
    Cybersex
  • The use of electronic communication to bully a person, typically by sending
    messages of an intimidating or threatening nature
    Cyberbullying
  • Is an underprivileged false statement of fact which tends to harm the
    reputation of a person or company?
    Cyber defamation
  • is a cyberattack intended to redirect a website's traffic to another, fake
    site by installing a malicious program on the computer.
    Pharming