No More Victims: Protecting Those with Autism from Cyber Bullying, Internet Predators & ...
()
About this ebook
Related to No More Victims
Related ebooks
The Up To No Good Club: Defining Your Life With Strength and Swagger Rating: 0 out of 5 stars0 ratingsThe Science of Superstition: How the Developing Brain Creates Supernatural Beliefs Rating: 0 out of 5 stars0 ratingsSalty Flames: Tales of Modern Dating Fails Rating: 0 out of 5 stars0 ratingsCyberbullying: Online Safety Rating: 0 out of 5 stars0 ratingsCyberbullying: What Every Parent Should Know About Electronic Bullying Rating: 4 out of 5 stars4/5R.I.P. Cyberbullying Rating: 0 out of 5 stars0 ratingsSurviving Social Media: Shut Down the Haters Rating: 0 out of 5 stars0 ratingsDigital Safety Smarts: Preventing Cyberbullying Rating: 0 out of 5 stars0 ratingsHow To Protect Children From Online Predators And Cyber Bullies Rating: 0 out of 5 stars0 ratingsCyberbullying Across Generations. Rating: 0 out of 5 stars0 ratingsEmbrassing Cybersecurity Together: Strengthening Family Bonds Against Phishing Threats Rating: 0 out of 5 stars0 ratingsHow to Protect Yourself from 'Pretend' Friend Requests & Email Scams Rating: 0 out of 5 stars0 ratingsSummary of American Girls: by Nancy Jo Sales | Includes Analysis Rating: 0 out of 5 stars0 ratingsSafe Text: Protecting Your Teen From the Dangers of Texting Rating: 5 out of 5 stars5/5Stop Bullying Now Rating: 0 out of 5 stars0 ratingsInternet and Technology Dangers Rating: 0 out of 5 stars0 ratingsDigital Trust, The Invisible Battle: Protecting Our Families from Social Engineering Dangers Rating: 0 out of 5 stars0 ratingsI am a Strong, Smart and Safe Youngster Over the Internet Rating: 0 out of 5 stars0 ratingsThe Bully Blueprint: A No Nonsense Guide to Understanding and Dealing with Bullies. Rating: 0 out of 5 stars0 ratingsInvisible Wounds: The complete guide to preventing and dealing with bullying and cyberbullying Rating: 0 out of 5 stars0 ratingsWhy Women Should Not Use Online Dating Sites Rating: 0 out of 5 stars0 ratingsHow to Eradicate Bullying Rating: 0 out of 5 stars0 ratingsBully 2.0: A Studied Contrast between Traditional and Cyberbullying Rating: 0 out of 5 stars0 ratingsStop Bullies Now: How to Protect Your Child Against School Bullies and Cyber Bullies Rating: 0 out of 5 stars0 ratingsMastering Cyberbullying: A Comprehensive Guide for Dealing with Online Harassment Rating: 0 out of 5 stars0 ratingsThe Tree Jumper: Profiling A Child Molester Rating: 0 out of 5 stars0 ratingsCyberbullying Rating: 0 out of 5 stars0 ratingsSocial Media and Depression: How to be Healthy and Happy in the Digital Age Rating: 0 out of 5 stars0 ratingsDefeating School Violence Rating: 0 out of 5 stars0 ratingsCyberbullying: Bullying in the Digital Age Rating: 0 out of 5 stars0 ratings
Psychology For You
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life Rating: 4 out of 5 stars4/5101 Fun Personality Quizzes: Who Are You . . . Really?! Rating: 3 out of 5 stars3/5The Source: The Secrets of the Universe, the Science of the Brain Rating: 4 out of 5 stars4/5Your Brain's Not Broken: Strategies for Navigating Your Emotions and Life with ADHD Rating: 5 out of 5 stars5/5Maybe You Should Talk to Someone: A Therapist, HER Therapist, and Our Lives Revealed Rating: 4 out of 5 stars4/5How to Not Die Alone: The Surprising Science That Will Help You Find Love Rating: 4 out of 5 stars4/5How to Win Friends and Influence People: Updated For the Next Generation of Leaders Rating: 4 out of 5 stars4/5The Art of Witty Banter: Be Clever, Quick, & Magnetic Rating: 4 out of 5 stars4/5The Art of Letting Go: Stop Overthinking, Stop Negative Spirals, and Find Emotional Freedom Rating: 4 out of 5 stars4/5How to Talk to Anyone: 92 Little Tricks for Big Success in Relationships Rating: 4 out of 5 stars4/5How to Keep House While Drowning: A Gentle Approach to Cleaning and Organizing Rating: 5 out of 5 stars5/5What Happened to You?: Conversations on Trauma, Resilience, and Healing Rating: 4 out of 5 stars4/5Self-Care for People with ADHD: 100+ Ways to Recharge, De-Stress, and Prioritize You! Rating: 5 out of 5 stars5/5No Bad Parts: Healing Trauma and Restoring Wholeness with the Internal Family Systems Model Rating: 5 out of 5 stars5/5Becoming Bulletproof: Protect Yourself, Read People, Influence Situations, and Live Fearlessly Rating: 4 out of 5 stars4/5Why We Sleep: Unlocking the Power of Sleep and Dreams Rating: 4 out of 5 stars4/5It's OK That You're Not OK: Meeting Grief and Loss in a Culture That Doesn't Understand Rating: 4 out of 5 stars4/5F*ck Feelings: One Shrink's Practical Advice for Managing All Life's Impossible Problems Rating: 4 out of 5 stars4/5What Every BODY is Saying: An Ex-FBI Agent's Guide to Speed-Reading People Rating: 4 out of 5 stars4/5Maybe You Should Talk to Someone: the heartfelt, funny memoir by a New York Times bestselling therapist Rating: 4 out of 5 stars4/5Flow: The Psychology of Optimal Experience Rating: 4 out of 5 stars4/5Nonviolent Communication: A Language of Life: Life-Changing Tools for Healthy Relationships Rating: 5 out of 5 stars5/5The Covert Passive Aggressive Narcissist: The Narcissism Series, #1 Rating: 5 out of 5 stars5/5It Starts with Self-Compassion: A Practical Road Map Rating: 4 out of 5 stars4/5Verbal Judo, Second Edition: The Gentle Art of Persuasion Rating: 4 out of 5 stars4/5
Related categories
Reviews for No More Victims
0 ratings0 reviews
Book preview
No More Victims - Dr. Jed Baker
Author
The digital world of cell phones and other Internet devices offers a wonderful way to communicate and socialize with others. Yet, it is also rife with dangers of being victimized emotionally, physically, and financially. In this book, I address three main areas of concern that pertain especially to individuals with autism spectrum disorders: cyber bullying, online sexual predators, and Internet scams.
Individuals on the autism spectrum may be particularly susceptible to these types of scams because of challenges with being able to gauge and understand others’ intentions, isolation, increased time online, and difficulty with developing assertive communication skills. It can be hard for them to determine when an online perpetrator may be bullying or trying to exploit someone, if they have difficulty with perspective taking and understanding other people’s motives and intent. The social isolation individuals on the spectrum experience makes them more likely to spend time online and more apt to respond to online scammers and predators who offer friendship, romance, or other rewards. Finally, difficulty with communication skills may make it especially challenging to seek help or end communications with online perpetrators.
I have based the advice in this book on current research about cyber bullying, online predators, and scams. However, there is no substitute for hearing the perspective of someone on the spectrum who negotiates the dangers of the digital world on a daily basis. Thus, Chapter 5 features Jennifer McIlwee Myers, an insightful author with Asperger’s syndrome. She provides an insider’s view of how she stays safe on the Internet. She also explains what parents and others can do to help their loved ones use the Internet safely.
Cyber Bullying is a term typically used to describe emotional victimization and abuse among school- and college-aged individuals. It occurs via the Internet or through digital means. Students may use the Internet to harass, intimidate, or bully others. Cyber bullying may include:
I
Posting insulting and embarrassing information or pictures of others on a Web site
Example: In several high schools across the country, students have been suspended or expelled after creating Web sites on which they could rate the attractiveness
of their peers. Students who were rated as attractive, as well as those who were rated poorly, were potentially embarrassed or humiliated in a public forum.
II
Fooling victims into disclosing personal or sensitive information, which the predator(s) will later use against them
Example: While on Facebook, one of my male students with autism spectrum disorder (ASD) received a message from a girl he knew well, saying that she really liked him and wanted to date him. She asked that he e-mail her a nude photo of himself. He sent the photo, only to find out later that he had sent the photo to someone who had posed as the girl he knew. The actual person who had requested the photo had hacked into the girl’s account, posed as her to get this photo, and intended to send the picture out to students all over the school. Fortunately, the boy’s parents and the police were informed. They were able to trace the source of the hacking, and they retrieved the photo before it was distributed.
III
Sending threatening or insulting messages directly to victims
Example: A middle-school boy with Asperger’s syndrome posted some YouTube videos of songs he wrote. Some peers from his school commented online. They demeaned the boy and his songs, calling him retarded
and