No More Victims: Protecting Those with Autism from Cyber Bullying, Internet Predators & ...
()
About this ebook
Related to No More Victims
Related ebooks
Discovering You (Indigo Series #1) Rating: 3 out of 5 stars3/5How to Write a Bestselling Rockstar Romance: From the Garage to Stardom: How to Write a Bestseller Romance Series, #7 Rating: 0 out of 5 stars0 ratingsUltimate Communication Secrets: Create Automatic Success Rating: 0 out of 5 stars0 ratingsWild Rose (The Late Bloomers Series Book 1) Rating: 0 out of 5 stars0 ratingsMore Than Everything Rating: 0 out of 5 stars0 ratingsSelf-Promote & Succeed: The No Boring Books Way to Build Your Brand, Attract Your Audience, and Market Your Non-Fiction Book Rating: 0 out of 5 stars0 ratingsHidden Tales : Lesbians in Nordic Folklore Rating: 4 out of 5 stars4/5Positive Aging: Every Woman's Quest for Wisdom and Beauty Rating: 2 out of 5 stars2/5The Science of Superstition: How the Developing Brain Creates Supernatural Beliefs Rating: 0 out of 5 stars0 ratingsImpasse: Antithesis Series Book Two Rating: 0 out of 5 stars0 ratingsIn Our Thirties: Insights and Expert Advice for This Decade and Beyond Rating: 0 out of 5 stars0 ratingsThe Two Faces of Christianity: A Psychological Analysis Rating: 0 out of 5 stars0 ratingsWhat Would Alice Do?: Advice for the Modern Woman Rating: 0 out of 5 stars0 ratingsMake Your Mess Your Message: More Life Lessons From And For My Girlfriends Rating: 0 out of 5 stars0 ratingsNo Longer at Ease (SparkNotes Literature Guide) Rating: 0 out of 5 stars0 ratingsCyberbullying: Online Safety Rating: 0 out of 5 stars0 ratingsCyberbullying: What Every Parent Should Know About Electronic Bullying Rating: 4 out of 5 stars4/5R.I.P. Cyberbullying Rating: 0 out of 5 stars0 ratingsSurviving Social Media: Shut Down the Haters Rating: 0 out of 5 stars0 ratingsDigital Safety Smarts: Preventing Cyberbullying Rating: 0 out of 5 stars0 ratingsHow To Protect Children From Online Predators And Cyber Bullies Rating: 0 out of 5 stars0 ratingsEmbrassing Cybersecurity Together: Strengthening Family Bonds Against Phishing Threats Rating: 0 out of 5 stars0 ratingsHow to Protect Yourself from 'Pretend' Friend Requests & Email Scams Rating: 0 out of 5 stars0 ratingsSummary of American Girls: by Nancy Jo Sales | Includes Analysis Rating: 0 out of 5 stars0 ratingsSafe Text: Protecting Your Teen From the Dangers of Texting Rating: 5 out of 5 stars5/5Stop Bullying Now Rating: 0 out of 5 stars0 ratingsInternet and Technology Dangers Rating: 0 out of 5 stars0 ratingsThe Devil's Playground: Guarding our Kids Against The Inexplicable Rating: 0 out of 5 stars0 ratingsDigital Trust, The Invisible Battle: Protecting Our Families from Social Engineering Dangers Rating: 0 out of 5 stars0 ratingsI am a Strong, Smart and Safe Youngster Over the Internet Rating: 0 out of 5 stars0 ratings
Psychology For You
101 Fun Personality Quizzes: Who Are You . . . Really?! Rating: 3 out of 5 stars3/5How to Talk to Anyone: 92 Little Tricks for Big Success in Relationships Rating: 4 out of 5 stars4/5All About Love: New Visions Rating: 4 out of 5 stars4/5A People's History of the United States Rating: 4 out of 5 stars4/5The Art of Letting Go: Stop Overthinking, Stop Negative Spirals, and Find Emotional Freedom Rating: 4 out of 5 stars4/5Running on Empty: Overcome Your Childhood Emotional Neglect Rating: 4 out of 5 stars4/5Feeling Good: The New Mood Therapy Rating: 4 out of 5 stars4/5How to Keep House While Drowning: A Gentle Approach to Cleaning and Organizing Rating: 5 out of 5 stars5/5How to Win Friends and Influence People: Updated For the Next Generation of Leaders Rating: 4 out of 5 stars4/5The Art of Witty Banter: Be Clever, Quick, & Magnetic Rating: 4 out of 5 stars4/5Changes That Heal: Four Practical Steps to a Happier, Healthier You Rating: 4 out of 5 stars4/5Verbal Judo, Second Edition: The Gentle Art of Persuasion Rating: 4 out of 5 stars4/5What Happened to You?: Conversations on Trauma, Resilience, and Healing Rating: 4 out of 5 stars4/5Maybe You Should Talk to Someone: A Therapist, HER Therapist, and Our Lives Revealed Rating: 4 out of 5 stars4/5Self-Care for People with ADHD: 100+ Ways to Recharge, De-Stress, and Prioritize You! Rating: 5 out of 5 stars5/5The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life Rating: 4 out of 5 stars4/5Why We Sleep: Unlocking the Power of Sleep and Dreams Rating: 4 out of 5 stars4/5Unfu*k Yourself: Get Out of Your Head and into Your Life Rating: 4 out of 5 stars4/5Collaborating with the Enemy: How to Work with People You Don't Agree with or Like or Trust Rating: 4 out of 5 stars4/5Laziness Does Not Exist Rating: 4 out of 5 stars4/5The Source: The Secrets of the Universe, the Science of the Brain Rating: 4 out of 5 stars4/5Nonviolent Communication: A Language of Life: Life-Changing Tools for Healthy Relationships Rating: 5 out of 5 stars5/5Shadow Work: Face Hidden Fears, Heal Trauma, Awaken Your Dream Life Rating: 4 out of 5 stars4/5Personality Types: Using the Enneagram for Self-Discovery Rating: 4 out of 5 stars4/5Lost Connections: Uncovering the Real Causes of Depression – and the Unexpected Solutions Rating: 4 out of 5 stars4/5The Introverted Leader: Building on Your Quiet Strength Rating: 0 out of 5 stars0 ratings
Related categories
Reviews for No More Victims
0 ratings0 reviews
Book preview
No More Victims - Dr. Jed Baker
Author
The digital world of cell phones and other Internet devices offers a wonderful way to communicate and socialize with others. Yet, it is also rife with dangers of being victimized emotionally, physically, and financially. In this book, I address three main areas of concern that pertain especially to individuals with autism spectrum disorders: cyber bullying, online sexual predators, and Internet scams.
Individuals on the autism spectrum may be particularly susceptible to these types of scams because of challenges with being able to gauge and understand others’ intentions, isolation, increased time online, and difficulty with developing assertive communication skills. It can be hard for them to determine when an online perpetrator may be bullying or trying to exploit someone, if they have difficulty with perspective taking and understanding other people’s motives and intent. The social isolation individuals on the spectrum experience makes them more likely to spend time online and more apt to respond to online scammers and predators who offer friendship, romance, or other rewards. Finally, difficulty with communication skills may make it especially challenging to seek help or end communications with online perpetrators.
I have based the advice in this book on current research about cyber bullying, online predators, and scams. However, there is no substitute for hearing the perspective of someone on the spectrum who negotiates the dangers of the digital world on a daily basis. Thus, Chapter 5 features Jennifer McIlwee Myers, an insightful author with Asperger’s syndrome. She provides an insider’s view of how she stays safe on the Internet. She also explains what parents and others can do to help their loved ones use the Internet safely.
Cyber Bullying is a term typically used to describe emotional victimization and abuse among school- and college-aged individuals. It occurs via the Internet or through digital means. Students may use the Internet to harass, intimidate, or bully others. Cyber bullying may include:
I
Posting insulting and embarrassing information or pictures of others on a Web site
Example: In several high schools across the country, students have been suspended or expelled after creating Web sites on which they could rate the attractiveness
of their peers. Students who were rated as attractive, as well as those who were rated poorly, were potentially embarrassed or humiliated in a public forum.
II
Fooling victims into disclosing personal or sensitive information, which the predator(s) will later use against them
Example: While on Facebook, one of my male students with autism spectrum disorder (ASD) received a message from a girl he knew well, saying that she really liked him and wanted to date him. She asked that he e-mail her a nude photo of himself. He sent the photo, only to find out later that he had sent the photo to someone who had posed as the girl he knew. The actual person who had requested the photo had hacked into the girl’s account, posed as her to get this photo, and intended to send the picture out to students all over the school. Fortunately, the boy’s parents and the police were informed. They were able to trace the source of the hacking, and they retrieved the photo before it was distributed.
III
Sending threatening or insulting messages directly to victims
Example: A middle-school boy with Asperger’s syndrome posted some YouTube videos of songs he wrote. Some peers from his school commented online. They demeaned the boy and his songs, calling him retarded
and