Online Predators, an Internet Insurgency
portes grátis
Online Predators, an Internet Insurgency
A Field Manual for Teaching and Parenting in the Digital Arena
Lee, Jeffrey A.
Rowman & Littlefield
10/2022
132
Mole
Inglês
9781475856606
15 a 20 dias
Descrição não disponível.
Table of Contents
Foreword by Eric Devlin
Preface
Introduction: Technology and the Role of the Stakeholder in a Child's Life
Chapter 1. Information as a Weaponized Commodity
Chapter 2. Freedoms of the Internet
Chapter 3. The Home is Not a Democracy, and School Safety Searches
Chapter 4. Truth and Efficiency on the Internet
Chapter 5. Nothing is Better Than the Truth
Chapter 6. Hamsters are Rats, and Devices Are Hamsters but Still Rats
Chapter 7. Methodology of the Child Predator
Chapter 8. Pictures Are Priceless
Chapter 9. Basic Types of Child Abuse Images and Other Usages of Sexual Images
Chapter 10. Instant Photography
Chapter 11. Is There a Plan?
Chapter 12. Which Device Should I Buy?
Chapter 13. What to Expect From Law Enforcement
Chapter 14. The Backspace/Delete Key and Self Editing
Chapter 15. Educate the Child
Chapter 16. Human Trafficking and Social Media: A Case Study
Chapter 17. A Month in the Life of an Exploitation Investigator
Chapter 18. It's Not All Bad
About the Author
Foreword by Eric Devlin
Preface
Introduction: Technology and the Role of the Stakeholder in a Child's Life
Chapter 1. Information as a Weaponized Commodity
Chapter 2. Freedoms of the Internet
Chapter 3. The Home is Not a Democracy, and School Safety Searches
Chapter 4. Truth and Efficiency on the Internet
Chapter 5. Nothing is Better Than the Truth
Chapter 6. Hamsters are Rats, and Devices Are Hamsters but Still Rats
Chapter 7. Methodology of the Child Predator
Chapter 8. Pictures Are Priceless
Chapter 9. Basic Types of Child Abuse Images and Other Usages of Sexual Images
Chapter 10. Instant Photography
Chapter 11. Is There a Plan?
Chapter 12. Which Device Should I Buy?
Chapter 13. What to Expect From Law Enforcement
Chapter 14. The Backspace/Delete Key and Self Editing
Chapter 15. Educate the Child
Chapter 16. Human Trafficking and Social Media: A Case Study
Chapter 17. A Month in the Life of an Exploitation Investigator
Chapter 18. It's Not All Bad
About the Author
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
child abuse prevention;child device inspection;child exploitation;child sexual abuse;child sexual exploitation;crimes against children;detecting child predation;detecting online predation;electronic device safety;fighting online predation;internet crimes;internet safety;keeping kids safe;law enforcement;minor sexual abuse;missing children;online child exploitation;online child predation;online exploitation;online predation;online safety;predatory behavior;preventing child abuse; preventing missing children;protecting children;protecting children online;social media safety;stakeholder involvement
Table of Contents
Foreword by Eric Devlin
Preface
Introduction: Technology and the Role of the Stakeholder in a Child's Life
Chapter 1. Information as a Weaponized Commodity
Chapter 2. Freedoms of the Internet
Chapter 3. The Home is Not a Democracy, and School Safety Searches
Chapter 4. Truth and Efficiency on the Internet
Chapter 5. Nothing is Better Than the Truth
Chapter 6. Hamsters are Rats, and Devices Are Hamsters but Still Rats
Chapter 7. Methodology of the Child Predator
Chapter 8. Pictures Are Priceless
Chapter 9. Basic Types of Child Abuse Images and Other Usages of Sexual Images
Chapter 10. Instant Photography
Chapter 11. Is There a Plan?
Chapter 12. Which Device Should I Buy?
Chapter 13. What to Expect From Law Enforcement
Chapter 14. The Backspace/Delete Key and Self Editing
Chapter 15. Educate the Child
Chapter 16. Human Trafficking and Social Media: A Case Study
Chapter 17. A Month in the Life of an Exploitation Investigator
Chapter 18. It's Not All Bad
About the Author
Foreword by Eric Devlin
Preface
Introduction: Technology and the Role of the Stakeholder in a Child's Life
Chapter 1. Information as a Weaponized Commodity
Chapter 2. Freedoms of the Internet
Chapter 3. The Home is Not a Democracy, and School Safety Searches
Chapter 4. Truth and Efficiency on the Internet
Chapter 5. Nothing is Better Than the Truth
Chapter 6. Hamsters are Rats, and Devices Are Hamsters but Still Rats
Chapter 7. Methodology of the Child Predator
Chapter 8. Pictures Are Priceless
Chapter 9. Basic Types of Child Abuse Images and Other Usages of Sexual Images
Chapter 10. Instant Photography
Chapter 11. Is There a Plan?
Chapter 12. Which Device Should I Buy?
Chapter 13. What to Expect From Law Enforcement
Chapter 14. The Backspace/Delete Key and Self Editing
Chapter 15. Educate the Child
Chapter 16. Human Trafficking and Social Media: A Case Study
Chapter 17. A Month in the Life of an Exploitation Investigator
Chapter 18. It's Not All Bad
About the Author
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
child abuse prevention;child device inspection;child exploitation;child sexual abuse;child sexual exploitation;crimes against children;detecting child predation;detecting online predation;electronic device safety;fighting online predation;internet crimes;internet safety;keeping kids safe;law enforcement;minor sexual abuse;missing children;online child exploitation;online child predation;online exploitation;online predation;online safety;predatory behavior;preventing child abuse; preventing missing children;protecting children;protecting children online;social media safety;stakeholder involvement