Jeffrey Lee teaches parents and stakeholders to use the tech against itself to protect children.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Dedication Foreword by Eric Devlin, expert in digital forensics and child exploitation Preface Introduction: Technology and the Role of the Stakeholder In a Child's Life, To Share or Not to Share Isn't the Question Chapter 1: Information as a Weaponized Commodity Chapter 2: Freedoms of the Internet Chapter 3: The Home is Not a Democracy, and School Safety Searches Chapter 4: Truth and Efficiency on the Internet Chapter 5: Nothing is Better Than the Truth Chapter 6: Hamsters are Rats, and Devices Are Hamsters But Still Rats Chapter 7: Pickup that Device Chapter 8: Methodology of the Child Predator Chapter 9: Gifts as a Means to an End Chapter 10: Pictures are Priceless Chapter 11: Basic Types of Child Abuse Images and Other Usages of Sexual Images Chapter 12: Romance and Hookup Scams Chapter 13: Instant Photography Chapter 14: Is There a Plan? Chapter 15: Which Device Should I Buy? Chapter 16: What to Expect From Law Enforcement Chapter 17: Post Victimization Recovery Chapter 18: The Backspace/Delete Key and Self Editing Chapter 19: Educate the Child Chapter 20: Human Trafficking and Social Media: A Case Study Chapter 21: A Month in the Life of a Child Exploitation Investigator Chapter 22: Do Not Suffer Alone Chapter 23: It's Not All Bad About the Author
Dedication Foreword by Eric Devlin, expert in digital forensics and child exploitation Preface Introduction: Technology and the Role of the Stakeholder In a Child's Life, To Share or Not to Share Isn't the Question Chapter 1: Information as a Weaponized Commodity Chapter 2: Freedoms of the Internet Chapter 3: The Home is Not a Democracy, and School Safety Searches Chapter 4: Truth and Efficiency on the Internet Chapter 5: Nothing is Better Than the Truth Chapter 6: Hamsters are Rats, and Devices Are Hamsters But Still Rats Chapter 7: Pickup that Device Chapter 8: Methodology of the Child Predator Chapter 9: Gifts as a Means to an End Chapter 10: Pictures are Priceless Chapter 11: Basic Types of Child Abuse Images and Other Usages of Sexual Images Chapter 12: Romance and Hookup Scams Chapter 13: Instant Photography Chapter 14: Is There a Plan? Chapter 15: Which Device Should I Buy? Chapter 16: What to Expect From Law Enforcement Chapter 17: Post Victimization Recovery Chapter 18: The Backspace/Delete Key and Self Editing Chapter 19: Educate the Child Chapter 20: Human Trafficking and Social Media: A Case Study Chapter 21: A Month in the Life of a Child Exploitation Investigator Chapter 22: Do Not Suffer Alone Chapter 23: It's Not All Bad About the Author
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826