Look both ways : help protect your family on the Internet /
Learn 14 ways in which you can help make the Internet a safer place for you and your family. This guide, written by a leading child safety expert, offers families practical advice for avoiding risks on the Internet. Learn the 14 ways in which you can help make the Internet a safer place for you and...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Redmond, Wash. :
Microsoft Press,
©2006.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover; Copyright Page; Praise for Look Both Ways . . .; Acknowledgments; Table of Contents; Introduction; Is This Book for You?; Start with a Technology Base; How This Book Is Organized; Special Elements; How to Get the Most from This Book; Quick Safety Checklist; Part One: Understanding the Risks; Chapter 1: The Landscape of Risk; What's Going On Out There?; Who Are These Cybercriminals?; Who's Vulnerable?; How Big Is the Problem?; How Are You Putting Yourself at Risk?; What Can You Do?; Making the Internet Safer for Your Family; Taking the First Step; You Are Not Alone; What's Next?
- Chapter 2: Misperceptions About Online AnonymityLeaving a Trail of Clues; The Lure of Anonymity; How Predators Use Anonymity; What Can You Do?; Chapter 3: Thinking Like the Enemy: Predatory Behavior; Knowing the Enemy; Recognizing Sexual Predators, Offline and On; How Predators Choose Their Victims; The Victim Grooming Process; Who Is Not at Fault; A Special Note About Sensitivity to Victims of Sexual Abuse; Part Two: 13 Steps to Internet Security; Chapter 4: Step 1: Be Careful What You Show People; What Just Happened?; Assessing the Risks; What Forms of Visual Information Put You at Risk?
- Protecting YourselfChapter 5: Step 2: Don't Tell People More Than You Should; What Just Happened?; What Is Social Networking?; Assessing the Risks; Protecting Yourself; Chapter 6: Step 3: Be Alert to How Predators Prey on Emotions; What Just Happened?; Assessing the Risks; Protecting Yourself; Watch Your Own Behavior; Looking for Telltale Signs; Getting the Message Across to Your Kids; Chapter 7: Step 4: Don't Let Them Know Where You Live; What Just Happened?; Assessing the Risks; Why Do They Care Where You Live?; Location Application Dangers; Technology Makes Finding You Easier
- Protecting YourselfChapter 8: Step 5: Don't Expose Yourself Through Instant Messaging; What Just Happened?; What Is Instant Messaging?; Assessing the Risks; Protecting Yourself; Chapter 9: Step 6: Reduce Your Vulnerability When Blogging; What Just Happened?; What Is a Blog?; Assessing the Risks; The Blogging Phenomenon; Criminals and Blogs; The Information Connection; What You Expose About Yourself and Others; Who's Most at Risk?; When Spam Meets Blog: Spam + Blog = Splog; Protecting Yourself; Don't Overreact; Knowing How Information Adds Up; Taking Steps for Safety
- Be Aware of What Your Friends Are Saying About YouChapter 10: Step 7: Understand Risks of Fraudulent Communications and Protect Yourself; What Just Happened?; What Is Spooling?; What Is Spam?; Assessing the Risks; Telltale Signs of Spam Scams; Facing the Fraud; Communicating Safely; Protecting Yourself; Taking the First Steps; Avoiding Incoming Threats; Chapter 11: Step 8: Date Safely Online; What Just Happened?; Assessing the Risks; Protecting Yourself; Chapter 12: Step 9: Don't Browse Indiscriminately; What Just Happened?; What Are Parental Controls?; Assessing the Risks