Cargando…

Look both ways : help protect your family on the Internet /

Learn 14 ways in which you can help make the Internet a safer place for you and your family. This guide, written by a leading child safety expert, offers families practical advice for avoiding risks on the Internet. Learn the 14 ways in which you can help make the Internet a safer place for you and...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Criddle, Linda, Muir, Nancy, 1954- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Redmond, Wash. : Microsoft Press, ©2006.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover; Copyright Page; Praise for Look Both Ways . . .; Acknowledgments; Table of Contents; Introduction; Is This Book for You?; Start with a Technology Base; How This Book Is Organized; Special Elements; How to Get the Most from This Book; Quick Safety Checklist; Part One: Understanding the Risks; Chapter 1: The Landscape of Risk; What's Going On Out There?; Who Are These Cybercriminals?; Who's Vulnerable?; How Big Is the Problem?; How Are You Putting Yourself at Risk?; What Can You Do?; Making the Internet Safer for Your Family; Taking the First Step; You Are Not Alone; What's Next?
  • Chapter 2: Misperceptions About Online AnonymityLeaving a Trail of Clues; The Lure of Anonymity; How Predators Use Anonymity; What Can You Do?; Chapter 3: Thinking Like the Enemy: Predatory Behavior; Knowing the Enemy; Recognizing Sexual Predators, Offline and On; How Predators Choose Their Victims; The Victim Grooming Process; Who Is Not at Fault; A Special Note About Sensitivity to Victims of Sexual Abuse; Part Two: 13 Steps to Internet Security; Chapter 4: Step 1: Be Careful What You Show People; What Just Happened?; Assessing the Risks; What Forms of Visual Information Put You at Risk?
  • Protecting YourselfChapter 5: Step 2: Don't Tell People More Than You Should; What Just Happened?; What Is Social Networking?; Assessing the Risks; Protecting Yourself; Chapter 6: Step 3: Be Alert to How Predators Prey on Emotions; What Just Happened?; Assessing the Risks; Protecting Yourself; Watch Your Own Behavior; Looking for Telltale Signs; Getting the Message Across to Your Kids; Chapter 7: Step 4: Don't Let Them Know Where You Live; What Just Happened?; Assessing the Risks; Why Do They Care Where You Live?; Location Application Dangers; Technology Makes Finding You Easier
  • Protecting YourselfChapter 8: Step 5: Don't Expose Yourself Through Instant Messaging; What Just Happened?; What Is Instant Messaging?; Assessing the Risks; Protecting Yourself; Chapter 9: Step 6: Reduce Your Vulnerability When Blogging; What Just Happened?; What Is a Blog?; Assessing the Risks; The Blogging Phenomenon; Criminals and Blogs; The Information Connection; What You Expose About Yourself and Others; Who's Most at Risk?; When Spam Meets Blog: Spam + Blog = Splog; Protecting Yourself; Don't Overreact; Knowing How Information Adds Up; Taking Steps for Safety
  • Be Aware of What Your Friends Are Saying About YouChapter 10: Step 7: Understand Risks of Fraudulent Communications and Protect Yourself; What Just Happened?; What Is Spooling?; What Is Spam?; Assessing the Risks; Telltale Signs of Spam Scams; Facing the Fraud; Communicating Safely; Protecting Yourself; Taking the First Steps; Avoiding Incoming Threats; Chapter 11: Step 8: Date Safely Online; What Just Happened?; Assessing the Risks; Protecting Yourself; Chapter 12: Step 9: Don't Browse Indiscriminately; What Just Happened?; What Are Parental Controls?; Assessing the Risks