Cyber-Bullying and online Grooming: helping to protect against the risks A scenario on data mining / profiling of data available on the Internet
- Document number
- 2869
- Date
- 2011
- Title
- Cyber-Bullying and online Grooming: helping to protect against the risks A scenario on data mining / profiling of data available on the Internet
- Author/publisher
- European Network and Information Security Agency
- Availability
- View/save PDF version of this document
- Document type(s)
- Research/Study/Analysis,
- Keywords
- Identification (of Victims), Protection, Victims of trafficking, Trafficked persons, Sex tourism, Pornography, Sexual exploitation, Palermo protocol; Child trafficking; Best Interests Principle, Child Victims of Trafficking, Separated Migrant Children, Unaccompanied minors, Family reunification, Guardian, Family Tracing, Age Assessment, Freedom from Detention, Interim Care, Health, Education, Training, Integration, Adoption, Return, Remaining in a Host Country/Country of Asylum, Child protection systems, Convention on the Rights of the Child (CRC), Reflection period, Residency permit, Identification, Social assistance, Victim protection, Advocacy, Civil society, NGO, Human Rights approach,
- Summary
- Although the issue of children's exposure to internet risks has been addressed in great depth by many organisations (also during the generation of this report), we have performed this risk assessment in order to point out emerging risks and issue non-technical recommendations for their mitigation. Thus, we believe that the findings of this assessment will help in triggering further activities at various levels of society, while contributing to the necessary awareness of the online protection of minors. To this extent, this document should not be considered as overlapping with existing national and international initiatives in the area of child online protection. Rather, it complements them by pointing out additional elements that might be interesting to look at in the future. On the other hand, although non-technical, the assessed risks are based on very detailed analysis down to technological elements. Security experts might find this analysis interesting and even worth reusing in their own work/considerations.
- Related documents