Free Essay

How to Protect Kids from Online Predators

In: Social Issues

Submitted By emailusstuff
Words 586
Pages 3
How to Protect Kids from Online Predators
Child Sexual Exploitation occurs in any group of people whether it’s economic, religious, social or ethnic groups. The internet is the main source of communication in today’s society, so you need to make sure you have taken the appropriate steps to protect your children. There are three major steps that you should take to protect your children against online predators.
The first thing to do is make sure your computer or laptop is in the main part of your house. Do not allow teenagers or children to have access to computers in their bedrooms. Also, make sure they do not have access to a webcam on the computer. A webcam now comes installed on most laptops and computers. It is a camera that is used to take pictures or videos of yourself while you sit in front of the computer. Today’s teenagers take a lot of pictures, and you do not want them to be on the internet. Make sure you have your children’s passwords for the social network sites such as and This way you can monitor who they are talking to. Tell your children to never reveal personal information such as home address or phone number. Check the information that your child has written about themselves on their biographies on their social sites to make sure it is true and will not exploit them and draw predators towards them. Make sure their accounts are set to private. Do this by going to the settings section, and change it to only allow people they approve to view their information and to see their pictures. Make sure you approve who sees their information. Discuss with your children what chat rooms are, and tell them they are not allowed to use chat rooms. Chat rooms are a group of people that get together and talk about inappropriate things. This is where most sexual predators make contact with children. They set up profiles pretending to be teenagers or friends with your children in order to get their attention. Never allow children to use chat rooms.
The next step would be to set up your own account so you can monitor it from someone else’s point of view, and make sure you are “friends” with your children. Monitor who writes to them and what is said, and monitor what they write. Never allow them to be friends with adults or kids that you do not know. Go through their “friends” lists and make sure they are legitimately who they say they are. If you see something that doesn’t look right to you or doesn’t sound right to you, investigate it and if need be, report it to the appropriate authorities.
Finally, make sure you put Parental restrictions on the computers, phones, IPods and IPads. Go to the settings area and change the restrictions to their age group. Make sure you filter sexually explicit information so that your children do not see it and are unable to download any of that. Also, go through your teenager’s phones to make sure their text messages are appropriate and that they are not talking to adults. Go through the phone logs to look up any phone number you are unfamiliar with.
Communication is the most important step in protecting your children from online predators. Make sure you have taken the appropriate steps by limiting their access to technology, monitoring who they talk to online and restricting their access to inappropriate websites.…...

Similar Documents

Free Essay

The Difference Between Cracking a Wep and a Wpa Network Passkey and How to Protect Yourself from It

...N. Justin Bernard Management 6740 Executive Summary “Wireless Networking and How to Keep Yourself Protected” Technology is consistently evolving and changing and wireless networking is no exception. There are constant updates as well as vulnerabilities in wireless networking, and my goal is to inform you of those vulnerabilities to help you stay protected from them. Wired Equivalent Protocol (WEP) was the original wireless security protocol. WEP was flawed in numerous ways and hackers were able to get information in minutes. WPAv1 was then introduced as an interim replacement because WEP was that flawed. WPAv1 was made to improve on the secure wireless networks and also used a newer and more improved algorithm. When WPAv2 was finally released, many devices began to be created to be compatible with the AES algorithm WPAv2 uses. There still have not been any major hacks or attacks on a WPAv2-AES network that would cause the Wi-Fi alliance look into using another algorithm a replacement. WPAv1 is too easy to hack so it is not recommended and WPAv1 is now susceptible to multiple types of attacks. There are several different ways you can help to protect yourself and your information. Verify your spam in your e-mail to make sure a file accidentally was not forwarded to spam. There are also others to improve your security. The length of your passkey is very important in security, as well as keeping an up-to-date anti-virus and staying up-to-date on all the latest hacks, cracks,......

Words: 3607 - Pages: 15

Free Essay

Cyber Crime- Online Predators

...Running Head: Cyber Crime- Online Predators 1 Cyber Crime A Study of Online Predators Amber Ellis Ivy Tech Community College CRIM 101 David De La Cruz December 4, 2012 Running Head: Cyber Crime- Online Predators 2 I have chosen to my term paper on Cyber Crime. I chose this topic because I myself have been a victim of this malicious crime in the past. With knowledge I can warn others. Cybercrime can only be described as illegal activity committed on the Internet. I thought it would be good for me to make myself aware of all the research behind this topic so that I will not be a victim again. Cybercrime is a very serious offense and a lot of people do not even realize they have been a victim of it. Cybercrime is no laughing matter. Criminal activities in cyberspace are on the rise. (National Research Council, (NRC), 1991) Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Cybercrimes can basically be divided into three categories: Cybercrimes against persons, cybercrimes......

Words: 2467 - Pages: 10

Free Essay

How to Keep Your Kids Away from Drugs

...IOP (intestive out-patient) I have learned a lot about addiction and finally admit I have a problem. Now that I know about addiction and how it can destroy your life. I want to be able to educate my children in the right way and give them a better life than I had. That way they dont have to go through the same troubles as me. There is a website called It has good tips to help parents with educated their children and keeping them drug free. I read that kids who learn about the risks of drugs from their parents are 50% less likely to use than those that don't. So that gives me hope in helping my children to stay away from drugs and alcohol. You need to be involved in your children's everyday life. Talking to them and listening to what they have to say on a regular basis. Research also shows that when parents are more open about drugs and alcohol, their children have a better self-control and develop more negative perceptions of these risky behaviors. My parents were not involved in my personal life. They never taught me and my siblings about the dangers of drugs and alcohol. Now I have a chance at keeping my children from using. First I am sober and they will not be raised in a house with drugs and alcohol. Second I will be involved in their lives and educate them to the best of my ability. That way they know how to live a productive sober life by watching me. Last but not least, I can warn them of what happens when people get dependent on......

Words: 568 - Pages: 3

Free Essay

Learn from Kids

...trying to shape our children into successful people. We guide them in how to act, what to say, how to dress, how to communicate with others – the list is never-ending. However I’m sure that everyone can relate to having those situations where your kids have opened their mouths or performed some kind of action that has made you step back and think, “WOW… I could really learn a lot from that!” Here are five examples of different lessons we can learn from watching our kids: 1. Don’t hang onto the negative, just forgive and forget Little kids can get mad; in fact they can get REALLY mad. But they rarely hold onto that anger. They may throw the world’s biggest temper tantrum and within minutes be smiling and happy all over again. As we get older we gravitate more towards holding grudges, and hanging onto that negativity only adds unnecessary stress to our lives. Sometimes it’s best to get mad and then get over it. 2. When you’re full you should stop eating This seems so basic but one quick look at the alarming rate of overweight and obese adults can show otherwise. Society has conditioned us to think that we need to finish everything on our plates and leave no morsel behind. You can’t force kids to eat past their limit though – when they’re done, they’re done – something we could certainly learn a thing or two from. 3. You can only continue to grow by continuing to experience Little kids are filled with wonder and curiosity every day. They have no......

Words: 531 - Pages: 3

Free Essay

Social Media and Online Predators

...and Online Predators Although there are many benefits of using social media, there are also many dangers. One of those dangers is the vast number of sexual predators that lurk in the midst of the cyber-world. The internet is not such a friendly environment when it comes to online sexual predators. As more and more individuals gain access to social media networking sites, the easier it becomes for online predators to victimize them. According to Richard M. Guo, “an online sexual predator is someone who uses the internet to sexually exploit vulnerable individuals, typically under-aged youths” (“Stranger Danger and the Online Social Network”). Online predators use many ways to lurk in young individuals. One of those ways are by impersonating someone. For example, the predator would pose as a younger teenager to appeal to other young teenagers. Then they would follow up by striking up conversations with those young teenagers in hopes of building up a certain trust level which would lead to easy access for the predator to attack the young teen. Having access to victimize the individual can lead to many outcomes. Those outcomes includes date rape, kidnapping, and sex trafficking. The way the predator would go about committing one of those outcomes is by asking the teen to meet up somewhere as a friendly invite. In the end their intention would be to harm the teen. The predator can also the threaten or blackmail the teen into doing what they say to do. Predators......

Words: 478 - Pages: 2

Free Essay

How Could You Protect Your Eis from Unethical Users?

...Journal of Abnormal Psychology 2003, Vol. 112, No. 4, 558 –577 Copyright 2003 by the American Psychological Association, Inc. 0021-843X/03/$12.00 DOI: 10.1037/0021-843X.112.4.558 Testing Mediational Models With Longitudinal Data: Questions and Tips in the Use of Structural Equation Modeling David A. Cole Vanderbilt University Scott E. Maxwell University of Notre Dame R. M. Baron and D. A. Kenny (1986) provided clarion conceptual and methodological guidelines for testing mediational models with cross-sectional data. Graduating from cross-sectional to longitudinal designs enables researchers to make more rigorous inferences about the causal relations implied by such models. In this transition, misconceptions and erroneous assumptions are the norm. First, we describe some of the questions that arise (and misconceptions that sometimes emerge) in longitudinal tests of mediational models. We also provide a collection of tips for structural equation modeling (SEM) of mediational processes. Finally, we suggest a series of 5 steps when using SEM to test mediational processes in longitudinal designs: testing the measurement model, testing for added components, testing for omitted paths, testing the stationarity assumption, and estimating the mediational effects. Tests of mediational models have been an integral component of research in the behavioral sciences for decades. Perhaps the prototypical example of mediation was Woodsworth’s (1928) S-O-R model, which......

Words: 15598 - Pages: 63

Free Essay

How to Protect Wireless Networks

... How to Protect Home Wireless Network The following are methods used in ensuring home wireless networks are safe and secure from unauthorized access. Check the SSID (Service Set Identifier) if it is the default one, and change to something unique. Manufacturers give their wireless routers a preset SSID. Changing the SSID to something unique is a good practice. The default SSID will show to a hacker that a novice set the network and that the other settings such as passwords are default. Enable encryption of the wireless router. The routers often come with the encryption disabled. Use 128-bit encryption or higher to increase security. The recommended encryption scheme is WPA2 encryption. Also use longer passwords that use a combination of numbers, letters, and symbols. Enable the MAC Address Filter so that the wireless router screens MAC addresses of devices that connect to the wireless network. The wireless network can be configured in such way that it accepts a connection from wireless devices with allowed MAC addresses. Change the default access password that comes with the wireless router. The default password is for administering the router’s settings. Use a random sequence of the maximum possible character length. Firewalls protect networks from hardware-based and software-based harmful intrusion. The recommended setting is that you enable the built-in firewall of the wireless router. Turn off the setting that allows administering the router through a wireless connection...

Words: 287 - Pages: 2

Free Essay

How to Be a Successful Online Student

...Introduction Signing up for college is new and exciting for anyone who is planning to attend. There is a lot of decisions to make regarding what college to attend, what degree to strive for and in the technical world of today, a student needs to decide if the online structure will work for them. Proverbs 1:5 says “Let the wise listen and add to their learning and let the discerning get guidance” (NIV). Knowledge is power and I believe God wants us to pray and search for information about the college we are supposed to attend and most importantly if we are able to attend online. Ecclesiastes 10:10 states, “If the ax is dull and its edge unsharpened, more strength is needed, but skill will bring success”(NIV). When choosing to go to college online, the student must have strong personal and learning characteristics along with certain factors that will help make the online student successful. Summary The article that I chose to read was ‘Student Preparation For Distance Education’, by Mark Taormino. It was very enlightening and it talked about some great points to achieve successfulness with online learning. One of the points that the article talked about was having a strong personal characteristic such as integrity and to be motivated. The definition for integrity is to be honest and fair and to be complete or whole. Integrity is one of the major keys while on this journey. It’s not just making sure you avoid plagiarism or cheating, but keeping your nose the......

Words: 1086 - Pages: 5

Free Essay

How to Protect Your Network from Cybersecurity

...How to Protect Your Network From Cyber Attacks There are three measures network administrators can take to avoid the types of network attacks that plagued U.S. and South Korean websites including, NASDAQ, NYSE, Yahoo!'s financial page and the Washington Post. The three areas to focus on are network based mitigation, host based mitigation and proactive measures. Network based mitigation * Install IDS/IPS with the ability to track floods (such as SYN, ICMP, etc.) * Install a firewall that has the ability to drop packets rather than have them reach the internal server. The nature of a web server is such that you will allow HTTP to the server from the Internet. You will need to monitor your server to know where to block traffic. * Have contact numbers for your ISP's emergency management team (or response team, or the team that is able to respond to such an event). You will need to contact them in order to prevent the attack from reaching your network's perimeter in the first place. Host based mitigation * Ensure that HTTP open sessions time out at a reasonable time. When under attack, you will want to reduce this number. * Ensure that TCP also time out at a reasonable time. * Install a host-based firewall to prevent HTTP threads from spawning for attack packets Proactive measures For those with the know-how, it would be possible to "fight back" with programs that can neutralize the threat. This method is used mostly by......

Words: 2314 - Pages: 10

Premium Essay

How Protect Yourself from Hpv

... How to protect yourself from HPV (Human Papillomavirus) Speech 1A Lisseth GomezFranco Mt. SAC Outline Title: How to protect yourself from HPV (Human Papillomavirus) General Purpose: To inform Specific Purpose: To inform the audience on how to prevent themselves from acquiring HPV (Human Papillomavirus) Time: 5-7 minutes I. Introduction A. How many people in this class know what HPV is? Or have at least heard of it? B. Those of you who raised your hand to either of those questions know that Human Papillomavirus does not have a cure; but the good news is that the infection often clears on its own, if does not; the treatment is need it, there are many HPV treatment options. C. Of persons infected with mucosal HPV, 5% to 30% are infected with multiple types of the virus. D. Although we know Human Papillomavirus is one of the most common sexually-transmitted infection in the US, and one of the ones that does not have a cure, however; HPV often clears on its own, in case it does not, and there are treatments options. E. Things you need to know about HPV. What they are and their symptoms? What causes them? How to protect yourself from acquiring HPV? And what are the consequences if you don’t protect yourself? Transition***The first among of these points is what Human Papillomavirus is and what the symptoms are. II. Body A. We all know that around 80% of sexually active man and women will contract the HPV virus at some point......

Words: 1210 - Pages: 5

Premium Essay

How to Protect Our Kids from Viewing Inappropriate Materials

...especially too someone who spends a lot of time using the Internet. The Internet is a very useful tool that is used for everything such as advertisement, communication, shopping, researching and also for educational purpose. On the Internet, there’re some websites that needs to be censored in order to protect our children from viewing inappropriate websites that promote drug usage, violence and pornography. Parents and school officials are the first ones who need to begin the process of censoring out those inappropriate websites. The Internet is an easy way to access all sorts of information. Because the Internet has become so popular in such a short period of time, the opportunity to censor it has passed by almost as quickly as the public discovered its usefulness to our everyday lives. The Internet has some bad source of information that’s not helpful to our kids. Parents and schools officials are the ones who should start the process of censoring those websites that our kids view each and every day of their lives. Because they are ones who know what sorts of information on the Internet that is best for our kids. So that’s why, Internet censorship should be enacted to prevent teenagers from viewing inappropriate websites that promote drug usages, violence and pornography. The first reason as to why Internet censorship should be enacted is that our teenagers use websites that promote the use of drugs. Using drugs at a young stage in your life is very dangerous to......

Words: 1338 - Pages: 6

Premium Essay

How to Protect Our Kids from Viewing Inappropriate Materials

...Nickolas Galaviz Ms. Medina INRW 0376 M09 8 November 2015 Why Donald Trump Should Be President? Donald Trump should be president because of his political experience. Trump is a tough dealmaker and unafraid to have an honest debate even though some may not agree. Trump becoming president will be the best solution for America’s future. Donald is first and foremost an experienced businessman that established a multi-billion dollar real estate empire all by himself. He’s known as an American hustler who built all of his fortunes from the ground up. His business experience has helped him be involved with negotiations behind scenes with political candidates. Therefore, giving him key insights in different parts of the world, pursue trade agreements, and is aware of financial global competitors. Undeniably being a great negotiator, he has had experience with a variety of industries, businesses, and investors. All his life he has been dedicated to business industry, so he will manage the budget fairly well. With this being said, as president, there is a large portion of negotiating in favor of the U.S. and by applying his skills would be very helpful to this country. Trump has the confidence and personality that will work perfectly in politics, and make it less likely to let his personal power be manipulated by outsiders. Donald has experience creating jobs, which make him more aware of the problems that occur in the workforce. His views on immigration are what America......

Words: 566 - Pages: 3

Free Essay

Online Game for Kids, there have been alarming cases about security issues via the use of online social networks among the youngsters today, in Malaysia and globally. As a Muslim, we need to remind each other especially the young ones not to engage in online activities that can jeopardize our safety and security. In this Group Project, you are required to come up with a community service program while playing our roles to educate and inculcate awareness among the schoolchildren aged 10-12 years old in dealing with the risks of the cyber world particularly social media. You are assigned to a group of 4-5. The running of the project is based on problem-based learning (PBL). The best groups will be chosen and will represent IIUM in this community service program with the schoolchildren aged 10-12 years old of Bukit Rahman Putra Primary School (a school in excellent cluster) at Sg Buloh, Selangor on 6th May 2016 from 9am – 1.00pm. Project Guidelines (but not limited to the following): 1. Introduction (about the current phenomenon) 2. Contents * the benefits of online activities to children * the downside of online activities to children (i.e. popular attacks on children & teenagers) * how children should engage in online activities safely and securely * how Islamic principles can help 3. Demonstrate your plan on how to effectively educate and inculcate awareness among the children to practice online activities in safe and secure manners. Use your creativity to......

Words: 457 - Pages: 2

Free Essay

How to Protect Our Environment

...w`Pk;> (732640800V). fK/my;-kjPdh tpj;jpahyak;> epe;jT+h;. A.N. e];Y}d;> (885392318V). fK/murpdh; K];ypk; fytd; ghlrhiy> rha;e;jkUJ. tyaf; fy;tpg; gzpg;ghsh;> tyaf; fy;tp mYtyfk;> fy;Kid. 2016.04.26. Iah> Xj;J ,lk; khwy; Nkw;gb ngah;fisAilath;fshfpa;Jy; w`Pk;> Mrpupah; jw;NghJ fK/my;-kjPdh tpj;jpahyak;> epe;jT+upYk;> A.N.e];Y}d; Mrpupia> fK/murpdh; K];ypk; fytd; ghlrhiy> rha;e;jkUjpYk; flikahw;wpf; nfhz;bUf;fpNwhk;. ehq;fs; ,UtUk; xj;J ,lk; khw;wj;jpd; mbg;gilapy;>;Jy; w`Pk; Mfpa ehd; fK/murpdh; K];ypk; fytd; ghlrhiy> rha;e;jkUjpYk;> A.N.e];Y}d; Mrpupiaahfpa ehd; fK/my;-kjPdh tpj;jpahyak;> epe;jT+upYk; flikahw;Wtjw;F vq;fsJ G+uz rk;kjj;jpidj; njuptpj;Jf; nfhs;fpd;Nwhk;. ehq;fs; ,UtUk; gl;ljhup Mrpupah;fshf ,Uf;fpd;w fhuzj;jpdhYk; Fwpg;gpl;l ghlrhiyfspy; vq;fsJ ghlj;ijf; fw;gpg;gjw;F G+uz rk;kjj;ijj; njuptpj;J ,e;j ,lkhw;wj;ijr; nra;J jUk;gb kpfTk; jho;ikAld; jq;fisf; Nfl;Lf;nfhs;fpd;Nwhk;. ,t;tz;zk;;Jy; w`Pk; A.N.e];Y}d;> A.G. mg;Jy; w`Pk;> (732640800V). fK/my;-kjPdh tpj;jpahyak;> epe;jT+h;. 25.04.2016 khfhzf; fy;tpg; gzpg;ghsh;> khfhzf; fy;tpj; jpizf;fsk;> fpof;F khfhzk;> jpUNfhzkiy. tyaf; fy;tpg; gzpg;ghsh;> tyaf; fy;tp mYtyfk;> fy;Kid. Clhf Mjpgh;> fK/my;-kjPdh tpj;jpahyak;> epe;jT+h;. Iah> flikiag; nghWg;Ngw;wy; Nkw;gb ngaiuAila A.G. mg;Jy; w`Pk; Mfpa ehd; jq;fspd; ~~tUlhe;j Mrpupah; ,lkhw;wk; - 2016|| vDk;......

Words: 432 - Pages: 2

Free Essay

Monitoring Kids Online

...Monitoring Kids Online Essay #1 Internet is one of the greatest things invented by human. However, debates from the specialists in the internet field around the world about the benefits of internet access especially to those children who are using it every day. Some said that there are more negative effects of it on children than positive. The negative effects of internet access are usually caused by the parents who are not supervising their children in using the internet. In a recent article in the Wall Street Journal this week about parents and the issue of monitoring their kids online. The authour have made some clear observations and an eye-opener piece about the nightmare of parenting in the digital age. This problem was the potential for start-ups and established companies to launch new tools to track where and what children do online and who do they meet. Because children are always ‘online’ using their smartphones, the technology can allow parents to track their physical location and what they are doing. As the article states “The average American family uses five Internet-enabled devices at home, including smartphones” a recent survey by Cox Communications and the National Center for Missing and Exploited Children found, while only one in five parents uses parental controls on those devices. The scattering of mobile devices and tablets between kids......

Words: 741 - Pages: 3

Thám Tử Lừng Danh Conan chap 966 | 10 oz Sunshine Silver Bar (New, MintMark SI) | Кадыр Жарматов Оштун жигиттери Казак КВНине барып кубокко ээ болуп келишти Бул чоң жетишкендик Mp3