Wednesday 22 June 2016

PPD - Section 4

Cyberbullying:

Child Sexual Exploitation:

Child sexual exploitation is a form of child abuse to gain money, power and/or status. This crime usually comes about through the internet in which the person tricks the child into thinking that they're in a loving and normal relationship. It then develops into meeting where the child will be encouraged into take drugs and alcohol. In more larger cases, the children are trafficked into or within the UK. This also happens within gangs.

Child exploitation is a 'hidden' crime. This is because some of the young people trust their abusers and are unaware that they're being abused however, some are either dependant on their abuser or are too scared to reach out for help. Some attacks include violent, humiliating and degrading sexual assaults, including oral and anal rape of the victim. these acts are usually performed with a 'reward' of money, drugs, gifts affection or status. However, physical contact does not determine child sexual exploitation as it also happens online.

Source: https://www.nspcc.org.uk/preventing-abuse/child-abuse-and-neglect/child-sexual-exploitation/what-is-child-sexual-exploitation/


Phishing:

Phishing can happen in a variety of different ways such as phone calls, mail or through email. The act of phishing contains falsely claiming that you're part of a legitimate company to scam the buyer into giving them personal information that can contribute towards identity theft.

Email phishing will have a link attached the email where it will direct the user to a website where they're asked to update personal information, such as a password, card details, social security or back account numbers. However, the website is just a copycat of the real website and saves everything you type in. 


Securing your wifi connections is an important step of securing your personal data. A wifi network that uses 'WPA2' provides security; in which you can control who is connect to your wifi, and privacy for communications as they travel across your network.

http://www.wi-fi.org/discover-wi-fi/security

Online dating:

As technology becomes more and more advanced, the limits we have becomes fewer and fewer. Online dating is a great way to meet new people and create new bonds however, it can also be very dangerous. 

Online dating had become the breeding ground for groomers. This is because it's easier to lie over the computer/phone and after all, do you really know the person you're talking too? The can filter out parts of their lives they don't want you to know and just show you the positives. 


Planning/Notes:

the subject I want to focus on is child exploitation. However, I want to focus on the internet side of child exploitation. I feel like not enough awareness has been spread about online child exploitation as I didn't even know it was a thing until getting briefed for this unit.

1st idea:
Model sat with laptop reading messages.

2nd idea:
Portrait images of model upset with bushy hair and smudged mascara.

3rd idea:
close up of text messages asking for images in exchange for gifts.


Contact Images:







Final Image:


No comments:

Post a Comment