
{"id":3811,"date":"2017-05-15T09:30:47","date_gmt":"2017-05-15T12:30:47","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=3811"},"modified":"2017-05-05T11:48:38","modified_gmt":"2017-05-05T14:48:38","slug":"grooming-acoso-sexual-internet","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/","title":{"rendered":"Grooming: Acoso sexual en Internet"},"content":{"rendered":"<p style=\"text-align: justify;\"><em><strong><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-3812 alignleft\" src=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/04\/groomin-400x279.jpg\" alt=\"\" width=\"400\" height=\"279\" srcset=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/04\/groomin-400x279.jpg 400w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/04\/groomin-300x209.jpg 300w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/04\/groomin-260x181.jpg 260w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/04\/groomin.jpg 600w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/strong><\/em><strong>\u00bfSab\u00edas que el acoso de car\u00e1cter sexual\u00a0 tambi\u00e9n existe en las redes sociales? <\/strong><br \/>\nEn este momento los menores est\u00e1n expuestos a acosos de car\u00e1cter sexual por parte de algunos adultos, quienes aprovechan los espacios virtuales donde los menores se sienten m\u00e1s seguros y desinhibidos, para as\u00ed acercarse a ellos m\u00e1s f\u00e1cilmente.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3>\u00bfQue es el Grooming?<\/h3>\n<blockquote>\n<p style=\"text-align: justify;\"><em>El<strong> grooming de menores en Internet<\/strong> es un fen\u00f3meno que podr\u00edamos traducir como <strong>engatusamiento<\/strong> y que se utiliza para describir las pr\u00e1cticas online de ciertos adultos para ganarse la confianza de un (o una) menor fingiendo empat\u00eda, cari\u00f1o, etc. con fines de satisfacci\u00f3n sexual (como m\u00ednimo, y casi siempre, obtener im\u00e1genes del\/a menor desnudo\/a o realizando actos sexuales). Por tanto est\u00e1 muy relacionado con la <strong>pederastia<\/strong> y la <strong>pornograf\u00eda infantil en Internet<\/strong>. <strong>De hecho el grooming es en muchas ocasiones la antesala de un abuso sexual.<\/strong>\u00a0 <\/em><em>Fuente: <\/em><a href=\"https:\/\/internet-grooming.net\"><em>https:\/\/internet-grooming.net<\/em><\/a><strong><em><br \/>\n<\/em><\/strong><\/p>\n<\/blockquote>\n<h3><strong><em>Recomendaciones<\/em><\/strong><em><strong><br \/>\n<\/strong><\/em><\/h3>\n<p>La mejor forma es empezando a <strong>hablar sobre el tema en el entorno familiar<\/strong>:<\/p>\n<ul>\n<li>Situar la computadora o dispositivo en la que no est\u00e9 apartado del grupo familiar.<\/li>\n<li>Conversar sobre el uso inadecuado de la c\u00e1mara web.<\/li>\n<li>Concientizar sobre las fotos publicadas en Internet y las consecuencias de una exposici\u00f3n inadecuada.<\/li>\n<li>Crear una confianza con el menor, para que ante una situaci\u00f3n de grooming puedan confiar y hablar del problema.<\/li>\n<li>Estar alertas sobre el comportamiento del menor en su vida real y la virtual, para detectar alg\u00fan cambio que delate el abuso de un tercero.<\/li>\n<\/ul>\n<h3>Recursos de inter\u00e9s<\/h3>\n<ul>\n<li><a href=\"http:\/\/groomingargentina.org\/\">http:\/\/groomingargentina.org\/<\/a><\/li>\n<li><a href=\"https:\/\/internet-grooming.net\/\">https:\/\/internet-grooming.net\/<\/a><\/li>\n<\/ul>\n<p><strong class=\"markup--strong markup--p-strong\">Si quieres saber m\u00e1s sobre como proteger Tu negocio frente ataques inform\u00e1ticos, vis\u00edtanos en nuestro sitio de <\/strong><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/www.talsoft.com.ar\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-href=\"https:\/\/lateralview.co\/\"><strong class=\"markup--strong markup--p-strong\">Talsoft TS <\/strong><\/a><strong class=\"markup--strong markup--p-strong\">o subscr\u00edbete a nuestro <\/strong><a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/eepurl.com\/cq0c_j\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-href=\"http:\/\/lateralview.us1.list-manage2.com\/subscribe?u=1bb89edb08b35c2b3aae6f015&amp;id=31ad94f616\"><strong class=\"markup--strong markup--p-strong\">Newsletter<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00bfSab\u00edas que el acoso de car\u00e1cter sexual\u00a0 tambi\u00e9n existe en las redes sociales? En este momento los menores est\u00e1n expuestos a acosos de car\u00e1cter sexual por parte de algunos adultos, quienes aprovechan los espacios virtuales donde los menores se sienten m\u00e1s seguros y desinhibidos, para as\u00ed acercarse a ellos m\u00e1s f\u00e1cilmente. &nbsp; &nbsp; &nbsp; \u00bfQue [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-3811","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Grooming: Acoso sexual en Internet<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Grooming: Acoso sexual en Internet\",\"datePublished\":\"2017-05-15T12:30:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/\"},\"wordCount\":310,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/04\/groomin-400x279.jpg\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Grooming: Acoso sexual en Internet\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/04\/groomin-400x279.jpg\",\"datePublished\":\"2017-05-15T12:30:47+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/#primaryimage\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/04\/groomin.jpg\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/04\/groomin.jpg\",\"width\":600,\"height\":418},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Grooming: Acoso sexual en Internet","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Grooming: Acoso sexual en Internet","datePublished":"2017-05-15T12:30:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/"},"wordCount":310,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/04\/groomin-400x279.jpg","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/","url":"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Grooming: Acoso sexual en Internet","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/04\/groomin-400x279.jpg","datePublished":"2017-05-15T12:30:47+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/grooming-acoso-sexual-internet\/#primaryimage","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/04\/groomin.jpg","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/04\/groomin.jpg","width":600,"height":418},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/3811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=3811"}],"version-history":[{"count":6,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/3811\/revisions"}],"predecessor-version":[{"id":3838,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/3811\/revisions\/3838"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=3811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=3811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=3811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}