Stranger Danger Online – Educating kids to assist in protecting themselves online.

Stranger Danger Online Training Notes

 Available on Android

Available on IOS

This educational app assists in understanding the steps predators use online to trap and lure people into participating in things they wouldn’t normally get involved in.

Predators are sophisticated manipulators and utilise whatever means at their disposal to gain the trust of vulnerable children and young people and lure them into various harms. When a predator is targeting someone their success relies on gaining the trust of their target, without  getting caught. To do this they look for any vulnerability in the young person, they will then focus on this vulnerability to manipulate the person to get what they want.
This app illustrates the various steps predators may take to gain trust.  It also highlights how relationships online are not the same as offline.
As you move through the data center you encounter various people mining data and discussing the training information. You will also encounter ways in which you can protect yourself online.
There are 10 training videos to find and complete.
This includes:
Predatory Behaviours:
How predators trap and manipulate people online.
6 x videos of the steps predators use to trap people.
2 x examples of predators targeting and trapping people.
Also included are notes on the steps predators use and discussion questions to assist parents and educators.
If you don’t want to play the game try the Life Online app where you click on icons to get the training only.

This app uses streaming videos.

  Life Online

Life Online Training Notes

This app includes:
Predatory Behaviors: How predators trap and manipulate people online.
6 Videos of the steps predators use to trap people.
2 examples of predators targeting and trapping people.
Notes on the steps predators use including discussion questions to assist parents and educators.

Data Retention:
What data is captured by ISP’s.
How is data mined and some examples of how it may be used.
2 videos on how that data may be used by authorities.

Protecting Kids Online:
Understanding computer security.
Tips in what to teach children and ways to protect them online.
The internet landscape.
What are the online threats young people are facing.
The signs your child is being bullied or being a bully.
Definitions of commonly used words.
Parent control software explained.
Information to support parents and educators.

 Available on Apple iTunes  

Available on Android

DateQuiz

How to check Email Headers

 Available on Android

  Available on IOS