What is online child exploitation?
Using a child for sexual gratification or profit via the internet.
What is sexting?
Sending sexual images or videos via devices.
What is grooming?
Manipulating a child to prepare for abuse.
What is cyberbullying?
Targeted abuse using technology.
What is a key prevention method?
Open communication.
What risky behavior increases exploitation risk?
Sharing personal info and chatting with strangers.
Why is sexting considered exploitation?
It involves minors and can be shared without consent.
What is online luring?
Using messages to entice a child into sexual activity.
Is Posting embarrassing photos cyberbulying?
yes
What should parents teach?
Online safety and consent.
What is sextortion?
Using threats to extort sexual images from youth.
What tactic do extorters use?
Threats and flattery to manipulate youth.
What tactic do groomers use?
Flattery, gifts, and emotional manipulation.
What is a tactic used by bullies?
Pretending to be someone else.
What is CSAM?
Child Sexual Abuse Material.
What is non-consensual distribution?
Sharing intimate images without permission.
What is the danger of emotional attachment?
It increases harm and compliance.
What is the impact of cyberbullying?
Emotional harm and isolation.
What should youth know?
Risks of sharing images.
What is a deepfake?
AI-generated fake media that may depict abuse.
What is a common platform for sextortion?
Snapchat or Instagram.
What is a red flag in grooming?
Promises of gifts or secrecy.
What can educators do?
Teach empathy and online safety.
What can educators do?
Build empathy and awareness.