Lesson Plan: The Mystery of the Cyber Friend
Subject: English Literature
Class: 8th Grade
Duration: 45 minutes
Topic: Supplementary Reader - "The Mystery of the Cyber Friend" by Zac O'Yeah (Unit 7, Term III)
1. Learning Objectives
By the end of this lesson, the teacher aims to help students:
- Understand the dangers of online interaction with strangers
- Recognize warning signs of online predators and fake profiles
- Develop critical thinking skills about internet safety and privacy
- Learn the importance of confiding in trusted adults when facing problems
- Build vocabulary related to technology, social media, and safety
- Appreciate the modern relevance of cyber safety in their daily digital lives
- Understand how to verify online information and identify deception
- Learn about cyber crime and law enforcement resources available to children
2. Learning Outcomes
Students will be able to:
- Protect their personal information online (name, address, phone number, school)
- Identify suspicious behavior from online strangers and fake profiles
- Tell trusted adults immediately when someone online makes them uncomfortable
- Verify information before trusting people they meet on the internet
- Recognize red flags such as requests for photos, personal meetings, or keeping secrets
- Use helplines (Child Helpline 1098 in India) when they need help
- Make safe choices about online friendships and social media use
- Question inconsistencies in online profiles and stories
3. Introduction (5 minutes)
Engaging Questions:
- "How many of you use social media, play online games, or chat with people on the internet?"
- "Do you think everyone online tells the truth about who they are? Why or why not?"
- "If a stranger online asked for your phone number or address, what would you do?"
- "Have you ever heard of cyber crime or people pretending to be someone else online?"
- "Who are the trusted adults in your life that you could tell if something online made you uncomfortable?"
4. Reading and Understanding (8 minutes)
New Vocabulary with Meanings:
| Word/Phrase | Meaning | Example Usage |
|---|---|---|
| Cyber friend | A friend made through the internet or social media | Chaitra claimed to be Shree's cyber friend |
| Social media | Websites and apps for sharing content and connecting with others | Friends Net is a social media site |
| Profile picture | The photo representing someone on social media | Chaitra's profile picture looked like a film star |
| Selfie | A photograph that one takes of oneself | Chaitra asked Shree to send a selfie |
| Fake profile | A false online identity created to deceive others | Chaitra was using a fake profile with a stolen photo |
| Online predator | An adult who uses the internet to harm or exploit children | The man was an online predator |
| Confide | To tell something private to someone you trust | Shree confided in Akka about the lies |
| Cyber Crime Cell | Police department that investigates internet crimes | An expert from the Cyber Crime Cell examined the computer |
| Nab | To catch or arrest someone | They nabbed the man at his office |
| Privacy | The state of keeping personal information secret | Protect your privacy by not sharing personal details |
| Child Helpline | Emergency phone service for children in danger (1098 in India) | Call 1098 if you need help |
| Stranger | Someone you don't know | Don't give personal information to strangers online |
5. Mind Map
THE MYSTERY OF THE CYBER FRIEND
by Zac O'Yeah
|
┌───────────────┼───────────────┐
| | |
SECTION I SECTION II SAFETY LESSONS
THE TRAP THE RESCUE LEARNED
| | |
┌───┴───┐ ┌────┴────┐ ┌────┴────┐
| | | | | |
SHREE CHAITRA AKKA'S THE ONLINE RESOURCES
| (FAKE) PLAN MEETING SAFETY |
| | | | RULES Child
13 years Fake Secret Man | Helpline
old profile plan appears | 1098
| | | | Don't |
Uses Profile Akka Not share Cyber
computer picture speaks young personal Crime
| stolen to girl info Cell
Friends from station | | |
Net actress manager About Never Police
| Madhoo | father's meet help
| | | age strangers |
Teased Claims Shree | alone Expert
online to be waits "Uncle" | traced
| 13 years | who likes Tell man
| | | young trusted |
New Claims Train girls adults Nabbed
friend to go arrives | | at his
request school | Smiles Use office
| nearby Man at internet |
| | appears Shree wisely Found
Accepts | | | | trying
Chaitra | Shree Shree | to befriend
| Never shrieks screams | many
| seen | | | children
Chaitra that | Akka |
seems school Akka appears |
nice | & station | |
| Asks manager Hits |
| for arrive man with|
Chats selfie | handbag |
with | Confront | |
her Asks the man Man |
| for | escapes |
Strange phone | in crowd |
requests number | | |
| | | Station |
Wants Offers Help manager |
camera old from tries |
phone camera adults catch |
| phone | | |
Meet | Works! Report |
at Meet | to |
railway at | police |
station railway | | |
| station | Police |
| | | woman |
Chaitra Must | praises |
says come | Shree |
come alone | | |
alone | | Shree |
| Secret | decides |
| meeting | only |
Akka | | school |
sees | | friends |
profile | | online |
| RED | | |
Recognizes FLAGS | | |
actress | | | |
Madhoo Wrong | | |
| age | | |
Warns Lies | | |
Shree about | | |
| location | | |
Shree Wants | | |
confused meet | | |
| in | | |
Lies person | | |
proven Alone | | |
Secret | | |
6. Consolidation and Presentation (8 minutes)
Summary of the Lesson:
"The Mystery of the Cyber Friend" by Zac O'Yeah is a crucial contemporary story that teaches children about internet safety through the near-miss experience of a girl named Shree. The story demonstrates how online predators operate, the warning signs to watch for, and the importance of adult supervision and intervention in protecting children online.
Section I - The Trap:
Thirteen-year-old Shree lives in Katpadi Junction with her hardworking parents—her mother works in a jewelry shop and her father is a taxi driver. Her parents are pleased that she uses the computer regularly, assuming it's for productive purposes. Shree does use it legitimately: finding information for school projects, sending emails, and chatting on a social media site called "Friends Net," which she joined on her thirteenth birthday.
The story begins with Shree facing normal childhood social issues—being teased by school friends online. During this vulnerable moment, she receives a friend request from someone named "Chaitra." This timing is significant: predators often target children when they're feeling lonely, rejected, or upset.
Chaitra's profile appears perfect: a very pretty picture "like a film star," claims to go to a school near Shree's, and immediately declares they'll be "best friends forever." This instant intimacy and flattery are classic grooming tactics—making the target feel special and understood.
However, Shree's instincts tell her something is wrong. She finds it "strange that she has never seen Chaitra's school nearby." This is the first warning sign: inconsistency in the story. When Chaitra asks for a selfie and Shree's phone number, the requests escalate from casual friendship to personal information gathering.
When Shree explains she doesn't have a camera phone, Chaitra offers to give her an old camera phone—seemingly generous but actually a manipulation tactic creating obligation and debt. The offer comes with a condition: they must meet at the railway station on Sunday when the Bengaluru train arrives. This introduces several more red flags:
- Meeting in person - moving from online to physical contact
- Specific location - the railway station (public but crowded and transient)
- Specific time - when a particular train arrives (suggests Chaitra isn't local)
- Creating urgency - implying this is time-sensitive
The crucial turning point comes when Shree's aunt, called Akka, sees Chaitra's profile picture and laughs. Akka recognizes the photo as famous film actress Madhoo, taken when the actress was still in school. She explains that Madhoo "would be much older now." This exposes the profile as completely fake—using a stolen photograph from decades ago.
Despite being caught in this obvious lie, "Chaitra" doesn't back off. Instead, the person insists "I am thirteen" and adds another dangerous element: instructing Shree to come to their "secret meeting" alone. The insistence on secrecy and isolation is one of the most dangerous warning signs of predatory behavior.
Section II - The Rescue:
Confused by the contradictions and lies, Shree makes the single most important decision of the story: she confides in Akka about her friend's lies. This act of trusting an adult saves her from potential harm.
The next day, Shree and Akka go to Katpadi Junction with a secret plan. Akka speaks with the station manager to arrange help, while Shree waits for the train. They've essentially set up a sting operation to catch the deceptive "friend" and protect Shree.
When the Bengaluru train arrives, instead of a thirteen-year-old girl, "a man who is about the age of Shree's father walks toward her." He smiles and says, "Hello Shree!"—proving he is the person behind the fake profile.
When Shree realizes this is not Chaitra, the man drops all pretense. He identifies himself as an "uncle" who "wants to be her friend" and reveals his true predatory nature: he "likes to make friends with young girls." This chilling statement confirms he is a serial predator targeting multiple children.
Shree's natural reaction is to shriek—an appropriate response that alerts others. Immediately, Akka appears with the station manager. Akka physically confronts the predator, hitting him with her handbag. Though the station manager tries to apprehend him, the man escapes into the crowded train.
The family reports the incident to police. A policewoman praises Shree for being "clever enough to confide in a trusted adult"—affirming that Shree did exactly the right thing. This positive reinforcement from authority figures is important for young readers to understand that telling adults about uncomfortable situations is smart, not tattling.
An expert from the Cyber Crime Cell—a specialized police unit that investigates internet crimes—examines Shree's computer. Within hours, they successfully trace and "nab the man at his office in Bengaluru." This demonstrates that:
- Cyber crimes leave digital traces
- Law enforcement has tools to catch online predators
- Quick action by victims and families leads to arrests
The investigation reveals the man "had been trying to befriend many young children on social media"—he wasn't targeting just Shree but was a serial predator using the internet to access victims.
The Resolution and Lesson:
Shree makes a wise decision: "to only have friends from her own school in the future." This doesn't mean avoiding all online interaction, but being selective and cautious about online friendships, limiting them to people she actually knows in real life.
Online Safety Tips:
The story concludes with essential safety guidelines:
- Use the Internet wisely - The internet is a tool; use it purposefully and carefully
- Privacy - Never give out name, address, school name, telephone number, or email ID to strangers online
- Helpline - Child Helpline telephone number in India is 1098 (24-hour emergency service for children)
- Adult Supervision - Always tell a trusted adult if facing problems or if online friends make you uncomfortable
Key Themes:
- Digital literacy - Understanding how to navigate online spaces safely
- Trust your instincts - Shree felt something was "strange"—those feelings are valid
- Verification - Check if stories make sense; question inconsistencies
- Adult wisdom - Akka recognized the stolen photo because of her experience
- Community protection - Station manager, police, Cyber Crime Cell all helped
- Consequences - The predator faced arrest and legal consequences
- Empowerment - Children can protect themselves through awareness and communication
The story powerfully demonstrates that while the internet offers wonderful opportunities, it also requires vigilance, and that asking for help from trusted adults is a sign of intelligence, not weakness.
7. Reinforcement (5 minutes)
Additional Information:
- Catfishing: The term for creating fake online identities to deceive others; Chaitra was a catfish profile
- Grooming: Process predators use to build trust with children before attempting exploitation; includes flattery, gifts, creating obligation, and isolation
- Digital Footprint: Everything done online leaves traces that cyber crime experts can follow
- Red Flags Checklist:
- Profile picture looks too perfect/professional
- Person asks for personal information early
- Wants to meet in person quickly
- Asks you to keep secrets from parents/guardians
- Offers gifts or money
- Makes you feel special/different from others
- Gets angry when you don't respond immediately
- Cyber Crime Statistics: India's National Crime Records Bureau reports thousands of cyber crimes against children annually
- Social Media Age Limits: Most social media platforms require users to be 13+ (like Shree), though enforcement varies
- Reverse Image Search: Tools like Google Images can help identify if profile pictures are stolen
- Parental Controls: Technology exists to help parents monitor and protect children's online activity
- Modern Reality: This story reflects real dangers—online predators do exist and target children through social media, games, and chat apps
8. Evaluation
a) Lower Order Thinking Question (Knowledge/Comprehension)
Question: "What were the warning signs that 'Chaitra' was not who she claimed to be? List at least five red flags that Shree and Akka noticed."
Expected Answer: Warning signs that Chaitra was fake:
- Stolen profile picture - Akka recognized it as actress Madhoo from many years ago
- Non-existent school - Shree had never seen Chaitra's claimed nearby school
- Age inconsistency - Claimed to be 13 but used a photo of someone much older
- Immediate intimacy - Declared "best friends forever" right away
- Requested personal information - Asked for selfie and phone number
- Offered expensive gift - Old camera phone (creating obligation)
- Wanted in-person meeting - At railway station (specific train arrival)
- Demanded secrecy - Insisted Shree come alone
- Came from Bengaluru - Not local despite claiming to be nearby
- Persisted despite being caught in lies - Didn't back off when photo was exposed
Who actually appeared: A man about her father's age who admitted he "likes to make friends with young girls"—a predator.
b) Middle Order Thinking Question (Application/Analysis)
Question: "Analyze why Shree's decision to confide in Akka was the turning point that saved her from danger. What might have happened if she had gone alone? How can students apply this lesson to their own online interactions?"
Expected Answer:
Why confiding in Akka was crucial:
What happened because she told Akka:
- Akka recognized the stolen profile picture (adult knowledge)
- They created a safety plan with the station manager
- Shree wasn't alone when the predator appeared
- Immediate intervention prevented any harm
- Police were called and predator was arrested
- Other potential victims were protected
What might have happened if she went alone:
- No one would know where she was
- The predator could have forced her into a vehicle
- He might have kidnapped, harmed, or exploited her
- Police wouldn't have been alerted
- Her parents wouldn't know what happened to her
- The predator would continue targeting other children
- This story would have a tragic ending instead of a safe one
Why children hesitate to tell adults:
- Fear of getting in trouble for using social media
- Embarrassment about being deceived
- Predator's manipulation ("keep it secret," "your parents won't understand")
- Worry about losing internet privileges
- Don't want to seem "babyish" or unable to handle things
Why telling adults is actually smart:
- Adults have experience recognizing deception
- They can protect you without judgment
- They have resources (police, cyber experts)
- They want to keep you safe, not punish you
- Better to be embarrassed than endangered
Application to students' online lives:
When to tell trusted adults:
- Someone online asks for personal information
- Requests photos, especially inappropriate ones
- Wants to meet in person
- Asks you to keep conversations secret
- Makes you feel uncomfortable, scared, or confused
- Sends inappropriate messages or images
- Pressures you to do things you don't want to do
- Story doesn't add up or has inconsistencies
How to tell:
- Choose a trusted adult (parent, teacher, counselor, older sibling)
- Say: "Something online is making me uncomfortable and I need help"
- Show them the messages/profile
- Don't delete evidence—police might need it
- Remember: You did nothing wrong by receiving inappropriate contact
Prevention strategies:
- Only accept friend requests from people you know in real life
- Don't share personal information publicly
- Use privacy settings on all social media
- Think before posting photos or information
- Question profiles that seem too good to be true
- Trust your instincts when something feels wrong
Key lesson: Shree was brave and smart—not weak or foolish—for asking for help. Predators rely on children keeping secrets. Breaking that silence breaks their power.
c) Higher Order Thinking Question (Synthesis/Evaluation)
Question: "Evaluate how technology companies, parents, schools, and law enforcement can work together to protect children online. Create a comprehensive 'Cyber Safety Action Plan' with responsibilities for each group. How can students themselves be part of the solution?"
Expected Answer:
COMPREHENSIVE CYBER SAFETY ACTION PLAN:
1. TECHNOLOGY COMPANIES' RESPONSIBILITIES:
Platform Design:
- Age verification systems that actually work
- Default privacy settings for young users
- AI systems to detect predatory behavior patterns
- Report abuse buttons that are easy to find and use
- Quick response teams for child safety reports
Proactive Measures:
- Scan for stolen profile photos (reverse image search)
- Flag accounts requesting personal info from minors
- Monitor for grooming language patterns
- Cooperate immediately with law enforcement
- Ban convicted predators permanently
Transparency:
- Clear, simple privacy policies kids can understand
- Regular safety education in-app
- Notify parents of suspicious activity
2. PARENTS' RESPONSIBILITIES:
Before Giving Access:
- Teach online safety rules before allowing social media
- Set age-appropriate boundaries (maybe not at age 13 if child isn't ready)
- Create family media agreements together
During Use:
- Keep computers in common areas, not isolated rooms
- Use parental controls appropriately
- Follow or friend your children on social media
- Regularly discuss online experiences without judgment
- Watch for behavioral changes (secretive, anxious, withdrawn)
Creating Trust:
- Make clear: telling about uncomfortable situations won't result in punishment
- Focus on the person who behaved badly, not the child
- Praise children for coming forward with concerns
- Share your own experiences with online scams/deception
3. SCHOOLS' RESPONSIBILITIES:
Education:
- Mandatory cyber safety curriculum (like Shree's story)
- Guest speakers from Cyber Crime Cell
- Real case studies (age-appropriate)
- Critical thinking about online information
- Digital citizenship classes
Support Systems:
- Counselors trained in cyber safety issues
- Clear reporting procedures for online incidents
- Connection with parents about online behaviors
- Safe space for students to discuss concerns
Detection:
- Watch for cyberbullying or concerning online behavior
- Address issues before they escalate
- Connect troubled students with resources
4. LAW ENFORCEMENT RESPONSIBILITIES:
Investigation:
- Dedicated Cyber Crime Cells (like in the story)
- Fast response to reports involving children
- Sophisticated tracking technology
- Collaboration with international agencies (crimes cross borders)
Prevention:
- School presentations about cyber safety
- Public awareness campaigns
- Visible consequences for predators (deterrence)
Victim Support:
- Trained officers who work with children sensitively
- Praise victims for reporting (like the policewoman did)
- Counseling services for affected families
5. STUDENTS' RESPONSIBILITIES:
Personal Protection:
- Follow the rules (don't share personal information)
- Use strong, unique passwords
- Enable privacy settings
- Think before posting anything
Critical Thinking:
- Question inconsistencies in profiles
- Research suspicious claims
- Don't believe everything you see online
- Verify through multiple sources
Community Protection:
- Report suspicious accounts (even if not targeting you)
- Support friends who face online problems
- Don't forward inappropriate content
- Speak up in classes about online safety
Bystander Intervention:
- If you see a friend being targeted, tell an adult
- Don't keep others' dangerous secrets
- Help younger siblings learn safe practices
CREATING CULTURE OF SAFETY:
What Made Shree's Rescue Successful:
- She recognized warning signs (student role)
- She told a trusted adult (family support)
- Adult took immediate action (parent responsibility)
- Station manager helped (community involvement)
- Police responded quickly (law enforcement)
- Cyber experts traced predator (technology/law enforcement)
- Man was arrested (consequences/justice)
This multi-level approach worked because everyone played their part.
PRACTICAL ACTION PLAN FOR OUR SCHOOL:
Immediate Actions:
- Create "Trusted Adult" list (who students can tell)
- Post Child Helpline number (1098) in every classroom
- Form student cyber safety ambassadors
- Monthly parent workshops on internet safety
Ongoing:
- Annual cyber safety week
- Update curriculum with current threats
- Partner with local Cyber Crime Cell
- Student-created safety awareness campaigns
- Anonymous reporting system for online concerns
Emergency Protocol:
- Student tells trusted adult immediately
- Adult notifies school counselor/principal
- Evidence preserved (screenshots, messages)
- Parents/guardians contacted
- Police involved if criminal activity suspected
- Follow-up support for student
Remember: Shree's story had a happy ending because everyone worked together. The predator was caught. Other children were protected. We can replicate this success by being vigilant, educated, and supportive of one another.
Final message: The internet is a wonderful tool for learning, creativity, and connection—but like any tool, it must be used wisely. Safety doesn't mean fear; it means awareness and smart choices. Every student reading this story can be both safe online themselves and help keep others safe too.
9. Remedial Teaching
Strategy for Slow Learners:
-
Simple Rule List (Print and Display):
NEVER SHARE ONLINE: ☐ Your full name ☐ Your address ☐ Your phone number ☐ Your school name ☐ Photos of yourself ☐ Where you are right now -
Red Light/Green Light Activity:
- GREEN (Safe): Chatting with school friends you know in real life
- YELLOW (Be Careful): Someone online asks your age or where you live
- RED (DANGER - Tell adult NOW): Someone wants to meet you, asks for photos, wants you to keep secrets
-
Simple Story Sequence:
- Step 1: Shree made online friend
- Step 2: Friend asked strange things
- Step 3: Akka saw profile was fake
- Step 4: Shree told Akka
- Step 5: They made plan
- Step 6: Man appeared (not girl!)
- Step 7: Akka and police helped
- Step 8: Man arrested
- Step 9: Shree safe!
-
Trusted Adults Circle: Draw circles with student in center, then rings of trusted adults:
- Inner circle: Parents/guardians
- Next: Teachers, school counselor
- Next: Police, Child Helpline 1098
-
Role-Play Scenarios (Simplified):
- Scenario 1: Teacher: "Someone online asks where you live. What do you do?" Student: "Say NO and tell my parent/teacher"
- Scenario 2: Teacher: "Online friend wants to meet you. What do you do?" Student: "Tell a trusted adult immediately"
-
Memory Aid Acronym - STOP:
- Stay calm
- Tell a trusted adult
- Only share with people you know in real life
- Protect your information
-
Picture Matching: Match pictures to correct response:
- Strange profile pic → Report/tell adult
- Friend request from classmate → Ask them at school if it's really them
- Request for phone number → Say NO
-
Child Helpline Practice: Have students memorize and say: "If I need help, I call 1098"
-
True or False Quick Quiz:
- It's okay to meet online friends alone (FALSE)
- I should tell adults if someone online scares me (TRUE)
- Giving my address to online friends is fine (FALSE)
- The Child Helpline number is 1098 (TRUE)
-
Real vs. Fake Profile: Show two profiles, identify which seems suspicious and why
10. Writing Activity (8 minutes)
Writing Task: "Imagine you are Shree writing in your diary the night after the incident at the railway station. Write a diary entry (150-180 words) including:
- How you felt when you first met 'Chaitra' online
- What made you suspicious
- Why you decided to tell Akka
- Your feelings when the man appeared instead of a girl
- Your gratitude for Akka's help
- What you learned about online safety
- Your promise to yourself about future online friendships"
Guidelines:
- Write in diary format (Date, Dear Diary, body, Goodnight)
- Write in first person as Shree ("I was so scared when...")
- Show the progression of emotions from confusion to fear to relief to determination
- Include at least 3 vocabulary words from the lesson
- End with a positive lesson learned
Example Opening: "Dear Diary, Today was the scariest day of my life, but also the day I learned the most important lesson about internet safety. When I first got a friend request from Chaitra, I was excited because..."
11. Follow-up Activities
Homework Assignment:
- Family Cyber Safety Discussion: Have a conversation with your parents/guardians about online safety rules for your family. Write a paragraph (100-120 words) summarizing what you discussed and what rules you agreed on together.
Additional Activities:
-
Safety Poster Creation: Design a colorful poster with the heading "Stay Safe Online" that includes the key safety rules (don't share personal info, tell trusted adults, Child Helpline 1098) with illustrations.
-
Fake Profile Detection: Find 3 celebrity photos online and write 5 sentences explaining how someone could misuse these photos to create fake profiles, and how to spot them.
-
Role-Play Scenarios: Work in pairs to practice what to say if someone online asks inappropriate questions. Perform for class.
Extended Learning:
-
Research Project: Research the Cyber Crime Cell in your state. Write a report (150 words) about what they do and how they help protect children online.
-
Interview Activity: Interview an adult about their experiences with online safety or scams. Write 5-6 sentences about what you learned.
-
Alternative Ending: Rewrite the story imagining what might have happened if Shree had NOT told Akka and gone alone. Write this as a cautionary tale (150 words).
-
Public Service Announcement: Create a script for a 30-second video/audio PSA about online safety targeting students your age.
-
Parent Guide: Write a simple guide (200 words) for parents titled "How to Keep Your Children Safe Online" with practical tips.
-
Cyber Safety Quiz: Create a 10-question quiz about online safety to test your classmates' knowledge of what they learned from this lesson.
Assessment Criteria:
- Understanding of online safety principles (25%)
- Recognition of warning signs and red flags (20%)
- Vocabulary comprehension and usage (20%)
- Critical thinking about cyber dangers (20%)
- Practical application to real-life situations (15%)
Resources Needed:
- Computer/tablet for demonstrations
- Sample social media profiles (fake examples for teaching)
- Contact information for local Cyber Crime Cell
- Child Helpline posters with 1098 number
- Chart paper for safety posters
- Sample scenarios for role-play
- Parent handouts on internet safety
Cross-Curricular Connections:
- Computer Science/IT: Digital literacy, privacy settings, online ethics
- Social Studies: Laws against cyber crime, child protection policies
- Life Skills: Critical thinking, decision-making, seeking help
- Psychology: Understanding manipulation, grooming tactics, stranger danger
- Civics: Rights of children, legal protections, law enforcement roles
- Health: Mental health impacts of online harassment or exploitation
- Media Literacy: Identifying fake news, verifying sources, image verification
Extension for Advanced Learners:
- Research international cyber crime cases and how different countries protect children
- Analyze social media companies' terms of service regarding minors
- Create a comprehensive digital citizenship curriculum for younger students
- Study the technology behind tracking cyber criminals
- Investigate career opportunities in cyber security and digital forensics
- Write a research paper on the psychological tactics used by online predators and how to counter them
No comments:
Post a Comment
Post a comment