You are on page 1of 11

Volume1, Issue23, July2023 International Journal of Modern Science and Research Technology

Online Predators: Protecting Teenagers


from Internet Sexual
Exploitation
Ogochuhwu Agatha Okpokwasili
Philosophy Department Nnamdi Azikiwe University, Awka.

Abstract internet sexual exploitation. Online


The rise of the internet has brought about predators are individuals who exploit the
numerous benefits for teenagers, but it has vulnerabilities of teenagers, using the
also given rise to a disturbing anonymity and accessibility of the internet
phenomenon: online predators. This article to groom, manipulate, and ultimately
explores the issue of internet sexual sexually exploit their victims. They prey
exploitation and its impact on teenagers. It on the trust, curiosity, and desire for
highlights the dangers posed by online validation that are natural parts of
predators who exploit vulnerabilities, trust, adolescence.
and naivety of young individuals. The Internet sexual exploitation has emerged as
article emphasizes the importance of a pressing issue, with online predators
educating teenagers about the risks and preying on the vulnerabilities, trust, and
providing them with effective strategies to naivety of teenagers. These predators
protect themselves online. It also discusses utilize various platforms, social media
the role of parents, educators, and law networks, and chat rooms to establish
enforcement agencies in safeguarding contact with their targets, often
teenagers from online predators. By raising masquerading as peers or sympathetic
awareness and promoting proactive individuals. Once a connection is
measures, we can create a safer online established, they gradually manipulate and
environment for teenagers and prevent the coerce teenagers into engaging in
devastating consequences of internet inappropriate and harmful activities. The
sexual exploitation consequences of online sexual exploitation
are devastating, ranging from emotional
Keywords: Online Predators, trauma and psychological distress to long-
Fraudulent Acts, Teenagers, Sexual lasting damage to a teenager's self-esteem
Exploitation and overall well-being. Therefore, it is of
paramount importance to address this issue
Introduction
head-on and equip teenagers with the
The internet has revolutionized the way we
necessary knowledge and tools to protect
communicate, learn, and connect with
themselves in the online realm.
others. For teenagers, it offers a world of
Online predators typically create fake
endless possibilities and opportunities for
identities or use deceptive tactics to
growth. However, alongside these benefits,
establish trust and manipulate their
there exists a darker side that poses a
victims. They may pretend to be someone
significant threat to their safety and well-
they are not, such as a peer, a romantic
being: online predators engaging in
interest, or a trustworthy individual, in

IJMSRT23JUL053 www.ijmsrt.com 324


Volume1, Issue23, July2023 International Journal of Modern Science and Research Technology

order to gain the confidence of their proactive steps we can take to protect
targets. They exploit this trust to exploit or teenagers from falling victim to their
harm the individuals emotionally, insidious traps. By working together, we
financially, or sexually. Their motivations can provide the guidance and support
can vary, but some online predators seek needed to empower teenagers and keep
power, control, or sexual gratification them safe in the vast expanse of the
through their actions. They take advantage internet.
of the anonymity and vast reach of the
internet to prey on unsuspecting Online Predators
individuals and exploit their Online predating seem to be the regular
vulnerabilities. It is important to educate normal in our society today. The internet is
one self and others about online safety, another world on its own where so many
privacy, and the risks associated with evil’s take place. 90% of our children and
interacting with strangers online. even adults get’s glued on the internet on a
Maintaining open communication with daily basis. People with evil and intentions,
children, setting clear boundaries, and surf the net too looking for naïve victims
monitoring their online activities can help that will fall easily to them. Online
protect them from online predators. predators are individuals who use the
Additionally, reporting any suspicious internet and digital platforms to target and
behavior or incidents to the appropriate exploit others, particularly vulnerable
authorities is crucial in combating online individuals, for their own gain or pleasure..
predation and ensuring the safety of A lot of teenagers has met their end from
individuals online. people they met on the internet who lured
This article aims to shed light on the topic them to secluded places and killed them
of online predators and provide valuable after extorting them. An encounter with an
insights into the strategies and measures online predator has gotten many people
that can be taken to safeguard teenagers robbed, raped, beaten, maimed and defiled
from internet sexual exploitation. By (in the case of an innocent child). Wale
raising awareness about the risks and Odunsi (2021) reported the activities of a
vulnerabilities associated with online gay online. The caption reads “EFCC
interactions, we can empower teenagers to arraigns alledged online gay predator for
navigate the digital landscape safely and $8 420 scam in Kaduna State” The report
confidently. Furthermore, we will explore is written below:
the roles of parents, educators, and law The Economic and Financial Crimes
enforcement agencies in ensuring the Commission (EFCC) on Monday
online safety of teenagers. By establishing arraigned Abdulrahim Dangana before
open lines of communication, fostering Justice Darius Khobo of the Kaduna State
digital literacy, and enforcing effective High Court.The defendant faces a one-
protective measures, we can create a count charge that borders on obtaining by
collective effort to combat online predators false pretence.The anti-graft commission
and create a secure online environment for told the court that the alleged internet
our youth. Together, let us delve into the fraudster targeted homosexuals online.An
complexities of internet sexual investigation revealed that Dangana
exploitation, uncover the dangers posed by registered a Gay/Bisexual hook-up App
online predators, and discover the called Grindr and A4A website, using the
pseudonyms: Ryan, Dave, Frank and

IJMSRT23JUL053 www.ijmsrt.com 325


Volume1, Issue23, July2023 International Journal of Modern Science and Research Technology

Eric.He allegedly used fake profiles to victims of the sharp practices of online
contrive romantic relationships with gay fraudsters”. He continued by noting the
individuals and lured them into sending need to educate the people on the financial
nude pictures.Dangana then used the fraud going on in the telecoms space, he
photos to blackmail and extort them also said that “the activities of the loan
through gift cards and bitcoins he sharks had caused a lot of people pain with
converted into naira using his bank many traders vulnerable to online
accounts and e-wallets. In the charge, fraudulent practices”. The internet is filled
Dangana, between January and with tales of tnese scammers who lure feed
September, collected the sum of $8,420 on the naivety of there victims to defraud,
from victims after falsely presenting kill or commit other more heinous crime
himself as a white homosexual man on on the unsuspecting victim. What could be
Grindr App.The defendant blackmailed the cause? Is our society going morally
them and threatened to “expose them to downward?
their families and loved ones”.The Morality in the strictest sense of it has to
offence violates Section 1(1)(a) of the do with rightness or wrongness of any
Advance Fee Fraud and Other Fraud human action. As man is a moral agent he
Related Offences Act 2006 and is has the inherent abilities to choose between
punishable under Section 1(3) of the right and wrong. NIETZSCHE (2023) in
same Act. Dangana pleaded “not guilty” his writings titled “THE MORAL
to the charge when it was read to DECADENCE IN PHILOSOPHICAL
him.Nasiru Salelen, the prosecution WRITINGS” gave us an insight on actions
counsel, asked the court to fix a date for that could be termed morally wrong when
trial, while the defence counsel, Solomon he said:
Otuwaga, urged the court to release his There are certain actions which all of us
client on bail.Justice Khobo granted would condemn as morally wrong and
Dangana bail in the sum of N1 million ought not to be done by anybody. For
and one surety who must be resident in example, armed robbery embezzlement
Kaduna with valid means of of public funds, bribery and corruption,
identification. Khobo adjourned the case neglect of one’s duties dishonesty, and so
until December 2, 2021. on. In the other way, there are also certain
Kemi Olaitan in Ibadan (2023) also noted actions, which are fidelity to one’s duties,
that: “Nigerian Communications respect for human life, hospitality,
Commission (NCC) yesterday disclosed kindness, helping those in need, honesty
that no fewer than 20,000 Nigerians had and so on. Though according to
fallen victims of online financial frauds Frederich Nietzsche, it is not good to
while reiterating its commitment to work refer some of the above listed virtues as
assiduously to protect telecommunications right or good rather they are evil and
subscribers against what it described as could be seen among the inferior people.
loan sharks”. The question is , why our He said so in his explanation of master
people easily fall victims. NCC Head of morality and slave morality. Equally,
Consumers Affairs Bureau, Mr. Ayanbanji there are other kinds of actions above
Ojo (2023) in the same report noted that: which opinions differ. Some say it wrong
“the commission has received over 20,00 while others consider it as right. For
complaints of those who have fallen instance, such actions like abortion,

IJMSRT23JUL053 www.ijmsrt.com 326


Volume1, Issue23, July2023 International Journal of Modern Science and Research Technology

contraception, euthanasia, masturbation cyberbullying, sextortion, or child


and so on exploitation.
the question still remains unanswered and
instead several other questions comes up as 2. Internet Predator: A person who preys
posited by Nietzsche and they are: How do on others using online platforms, typically
we decide which actions are right and seeking to deceive, manipulate, or harm
which actions are wrong? What is the their victims for personal gain or
criterion or standard for making such gratification.
judgements? What do we even mean when
3. Digital Predator: An individual who
we say that a certain action is morally
employs digital technology, such as
wrong? Is it for the individual to decide for
computers, smartphones, or social media,
himself which actions he is to consider as
to engage in predatory behavior, often
wrong or right? Is it true that “there is
targeting unsuspecting victims for
nothing good or bad but thinking makes it
malicious or exploitative purposes.
so, or is certain things good or bad
irrespective of our thinking? What are the 4. Cyber Predator:A person who utilizes
fundamental principles of morality and cyberspace and online environments to
how do we come to know them? There stalk, harass, intimidate, or exploit others,
must be some elements that makes these often employing anonymity, deception, or
actions inherently evil in themselves. manipulation to carry out their harmful
Okpokwasili (2021:158) has this to say: activities.
Morality is seen as an individual’s
personal stand of what he considers right 5. Online Sexual Predator: Specifically
and wrong. An individual’s moral refers to individuals who use the internet to
concept is constructed alongside the target and exploit others, particularly
society the individual finds himself or children or minors, for sexual purposes.
herself in. Man as a social animal cannot They may engage in grooming,
be separated from his society. He is solicitation, or distribution of explicit
greatly influenced by his society and as material involving minors.
such what he considers to be moral is They engage in various harmful activities
derived and developed within societal which is harmful physically and mentally
context and approval. for their victims Such activities include but
Man being a social animal cannot separate not limited to:
himself from the society he belongs to. a. Grooming: Online predators build
Every human society is also guided by relationships, trust, and emotional
law(s). Man must abide by such laws or connections with their targets, often
gets punished when he does not. An online pretending to be someone they are not.
Predator can come in the guise of many Their ultimate goal is to manipulate and
forms Example of such disguise is listed exploit the individuals, usually for sexual
below: purposes or financial gain.
b. Cyberbullying: Predators may use
1. Online Predator: An individual who online platforms to harass, intimidate, or
utilizes the internet and digital platforms to threaten their victims. This can include
target and exploit others, particularly sending abusive messages, spreading
vulnerable individuals, through various rumors, or engaging in other forms of
harmful activities such as grooming,

IJMSRT23JUL053 www.ijmsrt.com 327


Volume1, Issue23, July2023 International Journal of Modern Science and Research Technology

harmful behavior that cause emotional Aristotle, in his work "Nicomachean


distress. Ethics," discusses the concept of youth. He
c. Sextortion: Predators manipulate their distinguishes between childhood and
victims, typically by obtaining explicit adulthood but does not explicitly mention
images or videos, and then use those the teenage years. According to Aristotle,
materials to blackmail and extort them. youth is a period of growth and
They may threaten to share the content development, during which individuals
publicly unless the victim complies with gradually acquire the virtues and qualities
their demands necessary for a flourishing life. Jean-
d. Child exploitation: Online predators Jacques Rousseau: Rousseau, in his book
target minors for sexual exploitation, "Emile, or On Education," discusses the
trafficking, or grooming. They may engage stages of human development. He
in the production, distribution, or emphasizes the importance of a natural and
consumption of child pornography, or lure progressive education that allows children
children into engaging in inappropriate to develop at their own pace. Although he
activities. does not specifically mention teenagers,
e. Identity theft and fraud: Some online his ideas on education and personal growth
predators use deceptive tactics to gain are relevant to this period of life. Søren
access to personal information, such as Kierkegaard: Kierkegaard, a 19th-century
financial details, social security numbers, existentialist philosopher, explored the
or login credentials. They can then use this concept of individuality and the challenges
information for identity theft, financial of personal identity. While he did not
fraud, or other illegal activities. address teenagers directly, his ideas on
It is essential to be vigilant and cautious subjective experience and the quest for
while interacting online, particularly when authenticity can provide insights into the
sharing personal information or engaging struggles faced during this transitional
with strangers. Education about online phase.
safety, privacy settings, and responsible Teenage age is usually between the age of
internet usage is crucial for protecting 13-19 years of age. At this age, the
oneself and others from online predators. individual is on the road of self discovery
Reporting any suspicious activities or and assuming of different identities that
incidents to the appropriate authorities is sooths the person or the image of one’s
also important in combating online idol. Crosnoe R &Johnson MK (2011)
predation and ensuring the safety of explained it further when they said that
individuals in the digital world. teenage age means:
lives as a tapestry of three threads—
Teenagers developmental trajectories (physical and
The concept of a "teenager" as we psychological growth), social pathways
understand it today is a relatively modern (sequences of institutional roles and
construct, and it may not have been activities), and social convoys (continuity
explicitly discussed by classical and change in interpersonal relations)—
philosophers. However, philosophers have situated in settings of daily life, larger
offered insights into the transition from structures of society, and the broader
childhood to adulthood and the challenges sweep of history.
faced during that stage of life.

IJMSRT23JUL053 www.ijmsrt.com 328


Volume1, Issue23, July2023 International Journal of Modern Science and Research Technology

At this age of discovery, the individual Internet sexual exploitation, which is also
feels the need to explore and try out new known as online sexual exploitation, refers
just the same way adults around them are to various forms of sexual abuse or
doing. This is what usually lands them in exploitation that occur through the use of
trouble and also makes them easy prey’s to the internet. It involves the manipulation,
online predators. It is also worthy to note coercion, or exploitation of individuals,
that teenage years is also regarded as particularly children and vulnerable adults,
adolescent age. for the purpose of sexual gratification or
financial gain. Some common ways and
Sexual Exploitation contexts in which internet sexual
Immanuel Kant - In his “Groundwork of exploitation occurs can be seen below:
the Metaphysics of Morals" and a. Child Sexual Abuse Material (CSAM):
"Metaphysics of Morals" gave relevant The production, distribution, or possession
insights emphasizes the importance of of explicit material depicting children
treating others as ends in themselves rather engaged in sexual activities is a severe
than as mere means. He argues that using form of internet sexual exploitation. This
another person's body for sexual includes images, videos, or live-streamed
gratification without their consent is a content involving minors.
violation of their dignity and autonomy. He b. Online Grooming: Predators may use
was quoted by sanders (2020) that : “The various online platforms, such as social
desire which a man has for a woman is not media, chat rooms, or gaming platforms, to
directed toward her because she is a human establish trust and develop relationships
being, but because she is a woman; that she with minors. They often pretend to be
is a human being is of no concern to the someone they are not and gradually
man; only her sex is the object of his manipulate victims into engaging in sexual
desires”. Sanders (2020129-139:) went conversations or activities.
further to say that: c. Sextortion: This occurs when someone
Kant’s views on sexual morality are coerces an individual, often using explicit
traditional and con ser va tive. He images or videos obtained through
opposes every conceivable sexual deception or hacking, into providing more
practice except sexual intercourse explicit material or engaging in sexual acts.
between husband and wife. Whether all The perpetrator threatens to distribute the
of Kant’s views on sex actually follow material publicly if the victim does not
from his moral philosophy is less comply.
important than the underlying idea they d. Live-streamed Abuse: Perpetrators may
re" ect—that we do not own ourselves force victims, often children, to engage in
and are not at our own disposal. He sexual acts while live-streaming the abuse
objects to casual sex (by which he means to viewers who pay to watch. This happens
sex outside of marriage), however in hidden or private online spaces.
consensual, on the grounds that it is
degrading and objectifying to both e. Webcam Exploitation: Individuals,
partners. Casual sex is objectionable, he including children, may be coerced or
thinks, because it is all about the manipulated into performing sexual acts on
satisfaction of sexual desire, not about webcams, which are then recorded and
respect for the humanity of one’s partner distributed without their consent.

IJMSRT23JUL053 www.ijmsrt.com 329


Volume1, Issue23, July2023 International Journal of Modern Science and Research Technology

f. Sex Trafficking: The internet has vulnerabilities, or fears. The sentence


become a tool for traffickers to recruit, emphasizes that emotional blackmail
advertise, and sell individuals for sexual centers around a basic threat, which can be
exploitation. They may use online explicit or implied. The threat implies that
classifieds, social media, or escort websites if the target doesn't comply with the
to facilitate these activities. manipulator's demands, negative
g. Revenge Porn: Intimate images or consequences will occur. The rate
videos shared willingly between partners individuals are being blackmailed in the
can be maliciously distributed online society especially teenagers call for
without the consent of the person depicted, immediate attention. Many has been lured
often as an act of revenge or to humiliate into several indecent acts as a result of
them. media threats. Many have also fallen
To combat internet sexual exploitation, victim and lost their lives in the process.
various organizations, law enforcement Online predating poses a danger to our
agencies, and governments work together society and requires urgent attention so as
to raise awareness, develop preventive to put an end to it.
measures, and enforce legal consequences Manipulation causes one to exhibit
for perpetrators. It is crucial to educate behaviors that lack any sense of rationality
individuals about online safety, encourage because the victim is somehow coerced
reporting, and promote responsible internet into performing the said act. The victim is
usage to protect potential victims from treated as a means to an end instead of an
harm. end in itself. Mills (1995: 100–101) noting
this said that: “a manipulator is interested
Emotional blackmailing in reasons not as logical justifiers but as
Karnani SR, Et al (2019) was of the causal levers. For the manipulator, reasons
opinion that: emotional blackmail is a are tools, and bad reasons can work as well
subtle form of manipulation that may as, or better than, a good one”. His victims
shape some of our closest relationships”. are mere objects that he can twist and turn
ABBASPOUR Z Et Al (2019) agreeing to his whims and capricices. Individuals
with him said that: “Just like any should seen as who they are and treated as
blackmail, emotional blackmail centers such. Anything less than that is inhuman.
around a basic threat; if you don’t do this Hill (1980: 96) noting this, said that: The
for me, bad things will happen”. This idea that one should try to reason with
means that the concept of emotional others rather than to manipulate them by
blackmail, which is a subtle form of non rational techniques is manifest in
manipulation that can impact our closest Kant’s discussion of the duty to respect
relationships. It draws a parallel between others. Few examples of online emotional
emotional blackmail and traditional blackmailing tactics is outlined below:
blackmail by highlighting a common a. Guilt-tripping: The person may use guilt
element: the presence of a threat. as a means to make someone feel
Emotional blackmail involves using responsible for their negative emotions or
emotional pressure, manipulation, or outcomes. They might say things like, "If
coercion to get someone to do something you don't do this for me, I'll be so
or behave in a certain way. The disappointed and it will be all your fault."
manipulator typically employs tactics that
exploit the target's emotions,

IJMSRT23JUL053 www.ijmsrt.com 330


Volume1, Issue23, July2023 International Journal of Modern Science and Research Technology

b. Threats: This involves using threats of (commonly known as "419 scams") and
negative consequences to pressure online scams. These scams often involve
someone into complying with their email or online communications that
demands. For instance, they might threaten attempt to deceive individuals into
to expose personal information or spread providing money or personal information
damaging rumors if their target doesn't under false pretenses. The term ‘internet
comply. fraud’ (2021) refers to any type of fraud
c. Victim-playing: The individual may scheme that uses email, web sites, chat
portray themselves as the victim, rooms or message boards to present
exaggerating their suffering or distress to fraudulent solicitations to prospective
make the other person feel guilty and victims, to conduct fraudulent transactions
provide what they want. They might say or to transmit the proceeds of fraud to
things like, "I'm so miserable, and it's all financial institutions or to others connected
because of you. You're the only one who with the scheme”. According to Black's
can help me." Law Dictionary (2014) : "Fraud is an
d. Emotional manipulation: This includes intentional perversion of truth for the
tactics like gaslighting, where the person purpose of inducing another person or
distorts reality, undermines the other entity in reliance upon it to part with
person's perception, and makes them doubt something of value or to surrender a legal
their own feelings or thoughts. They might right”. In the definition provided by
say things like, "You're just overreacting. Black's Law Dictionary, it states that fraud
It's not a big deal. You always make is an intentional perversion of truth. This
everything about yourself." means that the person committing fraud
It's important to remember that emotional deliberately misrepresents or distorts the
blackmail is an abusive and unhealthy truth, either through statements, actions, or
behavior. If you find yourself on the other means. The purpose of this
receiving end of such tactics, it's crucial to intentional misrepresentation is to induce
set boundaries, communicate assertively, another person or entity to rely on that
and, if necessary, seek support from trusted false information. The reliance can be in
friends, family, or professionals. the form of believing the misrepresentation
to be true or acting based on that false
Fraudlent Acts information. As a result of this reliance, the
A fraudulent act refers to any deliberate deceived party may part with something of
and deceptive action or behavior intended value, such as money, goods, or services,
to deceive, manipulate, or defraud others or surrender a legal right. In simpler terms,
for personal gain or to cause harm. It this definition describes fraud as an act
involves misrepresenting facts, providing where someone intentionally lies or
false information, or engaging in dishonest distorts the truth to deceive others, causing
practices with the intent to deceive them to give up something valuable or
someone or gain an unfair advantage. forfeit a legal entitlement.
Fraudulent acts can occur in various It's important to note that this definition
contexts, such as business transactions, emphasizes the intentional nature of fraud,
financial dealings, online scams, or as it requires a deliberate act to deceive and
impersonation. induce reliance for personal gain or to
Nigeria has been associated with certain cause harm to others. The Association of
types of fraud, such as advance fee fraud

IJMSRT23JUL053 www.ijmsrt.com 331


Volume1, Issue23, July2023 International Journal of Modern Science and Research Technology

Certified Fraud Examiners (ACFE) (2020) suspicious activities or believe you have
defined fraud as any: intentional or been a victim of fraud, it's recommended to
deliberate act to deprive another of report the incident to the relevant
property or money by guile, deception, or authorities and seek legal advice.
other unfair means.
Here are a few examples of fraudulent that How to stop teenagers from being
teenagers engage themselves in Nigeria: victims of online predators
a. Identity Theft: When someone steals Protecting teenagers from online predators
another person's personal information, such is crucial for their safety and well-being.
as their name, Social Security number, or Here are some steps and tips to help
financial details, with the intent to commit prevent teenagers from becoming victims
fraud or engage in illegal activities using of online predators:
the stolen identity a. Communication and Education:
b. Ponzi Schemes: This is an investment Maintain open and ongoing
fraud where individuals are promised high communication with teenagers about
returns on their investments, but the returns online safety. Educate them about the
are actually generated from funds risks, potential dangers, and tactics used by
contributed by new investors rather than online predators. Encourage them to ask
legitimate profits. It relies on a continuous questions, share their concerns, and report
influx of new investors to sustain the any suspicious or uncomfortable online
scheme. interactions.
c. Credit Card Fraud: When someone uses b. Privacy Settings and Security: Teach
another person's credit card information teenagers about the importance of privacy
without their consent to make unauthorized settings on social media platforms and
purchases or transactions. other online accounts. Help them
d. Internet Scams: Various online scams understand how to protect their personal
exist, such as phishing emails, where information, including their full name,
individuals receive fraudulent emails address, phone number, and school details.
pretending to be from reputable Encourage them to use strong and unique
organizations to trick them into revealing passwords for their accounts.
sensitive information like passwords or c. Online Friendships and Social Media:
financial details. Advise teenagers to be cautious when
e. Insurance Fraud: When someone accepting friend requests or connections
intentionally provides false information or from unknown individuals online. Teach
exaggerates claims to an insurance them not to share personal information or
company to obtain benefits or engage in private conversations with
compensation to which they are not strangers. Encourage them to review and
entitled. adjust their social media privacy settings to
f. Forgery: This involves creating or limit who can see their posts and personal
altering documents, signatures, or financial information.
instruments with the intent to deceive d. Critical Thinking and Skepticism: Teach
others, such as forging signatures on teenagers to think critically and question
checks or legal documents. It's important to the intentions of individuals they meet
be vigilant and cautious to protect yourself online. Encourage them to be skeptical
from fraudulent acts. If you encounter about requests for personal information,
financial assistance, or meetings with

IJMSRT23JUL053 www.ijmsrt.com 332


Volume1, Issue23, July2023 International Journal of Modern Science and Research Technology

online acquaintances. Remind them that knowledge about online safety, fostering
not everything they see or hear online may open dialogue, and teaching them to
be true. recognize potential risks and red flags will
e. Reporting and Blocking: Instruct go a long way in safeguarding their well-
teenagers on how to report and block being. Together, we can work towards
individuals who make them uncomfortable preventing and combating internet sexual
or engage in inappropriate behavior online. exploitation, ensuring that teenagers can
Help them understand the reporting navigate the online world with confidence
mechanisms available on social media and security.
platforms, chat apps, or gaming platforms.
f. Monitoring and Supervision: Maintain a References:
level of supervision over teenagers' online 1.https://dailypost.ng/2021/10/26/efcc-
activities without invading their privacy. arraigns-alleged-online-gay-predator-for-
Keep an eye on their online interactions, 8420-scam-in-kaduna accessed July /2023
monitor their social media accounts, and
know the websites they visit. Ensure they 2.https://www.thisdaylive.com/index.php/2
understand that your supervision is for 023/05/21/20000-fall-victims-of-online-
their protection and not an invasion of their financial-frauds-ncc-discloses accessed
privacy. July 08/2023
g. Online Safety Resources: Familiarize 3.https://iproject.com.ng/philosophy/the-
yourself and teenagers with online safety moral-decadence-in-nietzsches-
resources and organizations that provide philosophical-writings/index.html accessed
guidelines and support, such as the July/09/2023
National Center for Missing and Exploited 4. Okpokwasili, O.A (2021) “NUDITY,
Children (www.missingkids.org) or the WOMEN AND MORALITY IN A
Federal Trade Commission's website CONTEMPORARY NIGERIAN
(www.consumer.ftc.gov). SOCIETY: A PHILOSOPICAL
Remember, establishing trust and DISCOURSE”, Nnadiebube Journal of
maintaining open lines of communication Philosophy, Vol. 5(1), P:152
with teenagers is crucial. Encourage them 5.https://www.ncbi.nlm.nih.gov/pmc/articl
to come to you if they encounter any es/PMC5695926/accessed July 11 2923
suspicious or uncomfortable online 6. Michael J. Sandel (2020) , Justice:
situations. By combining education, What's the Right Thing to Do?, pp. 129-
awareness, and vigilance, you can help 139,
protect teenagers from online predators. 7. Karnani SR, Zelman DC. (2019)
Measurement of emotional blackmail in
Evaluation and Conclusion couple relationships in Hong Kong. Couple
Protecting teenagers from internet sexual and Family Psychology: Research and
exploitation and online predators is of Practice.;8(3):165.
utmost importance in today's digital age. It doi:10.1037/cfp0000126
requires a collaborative effort from parents, 8. ABBASPOUR Z, AMANELAHI A,
guardians, educators, and society as a Choubdari A. (2019) Evaluation of
whole. By prioritizing education, psychometric properties of the Emotional
communication, and proactive measures, Blackmail Scale (EB)..
we can create a safer online environment https://www.sid.ir/en/Journal/ViewPaper.a
for teenagers. Empowering teenagers with spx?ID=748210

IJMSRT23JUL053 www.ijmsrt.com 333


Volume1, Issue23, July2023 International Journal of Modern Science and Research Technology

9. Mills, Claudia, 1995, “Politics and 12. Garner, B. A. (Ed.). (2014). Black's
Manipulation”, Social Theory and Practice, Law Dictionary (10th ed.). Thomson
21(1): 97–112. Reuters.
doi:10.5840/soctheorpract199521120 13. Association of Certified Fraud
10. Hill, Thomas E. Jr.,( 1980), “Humanity Examiners. (2021). Report to the Nations:
as an End in Itself”, Ethics, 91(1): 84–99. 2020 Global Study on Occupational Fraud
doi:10.1086/292205 and Abuse. Retrieved from
11.https://www.police.act.gov.au/sites/defa https://www.acfe.com/report-to-the-
ult/files/PDF/bizsafe-internet-fraud- nations/2020/s
factsheet.pdf

IJMSRT23JUL053 www.ijmsrt.com 334

You might also like