venn diagram of internet,kids,criminals, adults

When technology is combined with people having no rules, training, or experience, then crime and victimization can run rampant. We will discuss this in more detail later, but you need to be aware from the start of this course that there is a robust framework of laws addressing bullying, sexting, revenge porn, and sextortion that were created to protect you and to explain that dangerous online behavior is often clearly illegal.

You may have noticed, not everyone views the internet and social media the same way. For purposes of this online course, we will refer to three groups of people:

  • Young people (ages 12 through 18)
  • Adults
  • Predators (consisting of both young people and adults)

This first module examines three types of cyber predators, how adults and young people view internet issues differently, and how understanding natural human biases can be used by others against you or how that understanding can help you protect yourself and others from cyber predators.

Objectives

(translation: potential test questions)

At the end of this module, students should be able to:

  • Recognize the common characteristics of cyber predators.
  • Contrast how adults and young people view the internet differently.
  • Identify what cognitive biases are.
  • Explain some of the cognitive biases that humans share.

Topics

This module will review the following topics:

  • Types of cyber predators
  • Human trafficking
  • Adults and young people
  • Social engineering
  • Common cognitive biases