Muutke küpsiste eelistusi

Cyberpredators [Kõva köide]

  • Formaat: Hardback, 135 pages, kõrgus x laius x paksus: 236x167x12 mm, kaal: 444 g
  • Ilmumisaeg: 30-Jul-2011
  • Kirjastus: Chelsea House Publishers
  • ISBN-10: 1604136987
  • ISBN-13: 9781604136982
Teised raamatud teemal:
  • Formaat: Hardback, 135 pages, kõrgus x laius x paksus: 236x167x12 mm, kaal: 444 g
  • Ilmumisaeg: 30-Jul-2011
  • Kirjastus: Chelsea House Publishers
  • ISBN-10: 1604136987
  • ISBN-13: 9781604136982
Teised raamatud teemal:

The Internet's easy, anonymous contact has allowed murderers and pedophiles unprecedented access to connect with their victims and lure them away from the safety of their homes. These cyberpredators use information technology to attack and victimize others in a more violent, malevolent, and dangerous way than cyberbullies or cyberstalkers.

Cyberpredators educates teens about the dangers of interacting with strangers online and how they can protect themselves in the digital world. Although most people never experience a deadly, physical threat as a result of their online activity, a handful of terrifying cases in recent years have made it clear that the risk is real. The case of 13-year-old Kacie Woody, who was abducted and killed by a 47-year-old man who had pretended to be a teenager online, and the capture of the first Internet serial killer, John Robinson, illustrate that predators are as much of a danger in the virtual world as they are in the real world.

Chapters and topics include:

  • Characteristics of a cyberpredator
  • How cyberpredators use technology
  • Types of cyberpredators
  • Cyberpredators and the law
  • Advice for young people.
Foreword 7(4)
Introduction 11(7)
1 What Is a Cyberpredator?
18(10)
2 Young People and Technology
28(9)
3 The Vulnerability of Being Online
37(15)
4 Using Technology to Ensnare Their Prey
52(14)
5 Characteristics, Types, and Tactics
66(17)
6 Laws, Investigations, and Legal Issues
83(19)
7 Using Knowledge for Protection: Online Self-Defense
102(12)
Chronology 114(4)
Endnotes 118(6)
Bibliography 124(5)
Further Resources 129(1)
Index 130(4)
About the Author 134(1)
About the Consulting Editor 135