Free Essay

How to Protect Kids from Online Predators

In:

Submitted By emailusstuff
Words 586
Pages 3
How to Protect Kids from Online Predators
Child Sexual Exploitation occurs in any group of people whether it’s economic, religious, social or ethnic groups. The internet is the main source of communication in today’s society, so you need to make sure you have taken the appropriate steps to protect your children. There are three major steps that you should take to protect your children against online predators.
The first thing to do is make sure your computer or laptop is in the main part of your house. Do not allow teenagers or children to have access to computers in their bedrooms. Also, make sure they do not have access to a webcam on the computer. A webcam now comes installed on most laptops and computers. It is a camera that is used to take pictures or videos of yourself while you sit in front of the computer. Today’s teenagers take a lot of pictures, and you do not want them to be on the internet. Make sure you have your children’s passwords for the social network sites such as Facebook.com and Twitter.com. This way you can monitor who they are talking to. Tell your children to never reveal personal information such as home address or phone number. Check the information that your child has written about themselves on their biographies on their social sites to make sure it is true and will not exploit them and draw predators towards them. Make sure their accounts are set to private. Do this by going to the settings section, and change it to only allow people they approve to view their information and to see their pictures. Make sure you approve who sees their information. Discuss with your children what chat rooms are, and tell them they are not allowed to use chat rooms. Chat rooms are a group of people that get together and talk about inappropriate things. This is where most sexual predators make contact with children. They set up profiles pretending to be teenagers or friends with your children in order to get their attention. Never allow children to use chat rooms.
The next step would be to set up your own account so you can monitor it from someone else’s point of view, and make sure you are “friends” with your children. Monitor who writes to them and what is said, and monitor what they write. Never allow them to be friends with adults or kids that you do not know. Go through their “friends” lists and make sure they are legitimately who they say they are. If you see something that doesn’t look right to you or doesn’t sound right to you, investigate it and if need be, report it to the appropriate authorities.
Finally, make sure you put Parental restrictions on the computers, phones, IPods and IPads. Go to the settings area and change the restrictions to their age group. Make sure you filter sexually explicit information so that your children do not see it and are unable to download any of that. Also, go through your teenager’s phones to make sure their text messages are appropriate and that they are not talking to adults. Go through the phone logs to look up any phone number you are unfamiliar with.
Communication is the most important step in protecting your children from online predators. Make sure you have taken the appropriate steps by limiting their access to technology, monitoring who they talk to online and restricting their access to inappropriate websites.

Similar Documents

Premium Essay

Cyber Pred

...Cyber Predators Sexual predators have more access to children today than in the past. Through the internet Sexual offenders can connect with children more discreetly. Today, children are just as likely to socialize online as they are to meet in the mall or by going to other public places like the movies. Predators use the anonymity of the internet to their advantage since it allows them to become whoever they want. They target both girls and boys of all ages. "Child predators are migrating from traditional methods to alternate media," says Detective Lt. Thomas Kish of the Michigan State Police. "They are going to places where children are.” (Wendy, K) Many children are not aware of these dangers. Online predators are good manipulators, they look for children that are emotionally vulnerable. They use issues the child may have to befriend and empathize with them while building a false friendship and trust. Since many naïve children list personal information online , it is easy for predators to find information about their victims. Some examples of information that should be kept private are schools attended, phone numbers, home addresses, first and last names. Children need to be guarded from online predators. Both parents and children have to be made more aware of online predators and how to avoid them. Parents can set limitations to how and when a child plays on online “the Xbox has password-protected "family settings" that allow parents to turn off Internet access or track...

Words: 1403 - Pages: 6

Premium Essay

Importance Of Protecting Children

...enforced because there are too many kids being abused, whether it’s physically mentally or emotionally. Also, kids are vulnerable and can’t protect themselves predators are also getting off easy. Laws protecting children should be enforced because there are too many kids being abused, whether it’s physically...

Words: 1307 - Pages: 6

Free Essay

Protecting Children Online

...PROCTECTING CHILDREN ONLINE Protecting Children Online Abstract Protecting children online is becoming an all hands effort. Online predators are the new way for individuals to plan, fantasize, and full fill their needs. Just telling your child to not talk to strangers will not cut it in today’s internet world. Protecting children online takes planning, coaching and internet rules setup to hopefully provide that barrier. Anybody can be anybody behind a computer. Providing this vital information to children could be the one thing that saves that child’s life. What is a sexual predator online? A sexual predator is better known as pedophile. We have all checked those websites to find out and to see if we have a sex offender living near our homes. How many people have actually checked out the websites children are visiting? The children today are more technological then their parents and the parents need to be aware of the dangers that lurk behind every computer. The most common means by which sexual predators contact children over the Internet is through chat rooms, instant messages and email. In fact, 89% of sexual solicitations were made in either chat rooms or instant messages and 1 in 5 youth (ages 10-17 years) has been sexually solicited online (JAMA, 2001). Considering that 25% of kids online participate in real time chat and 13 million use instant messaging, the risks of such children, either knowingly or unknowingly, interacting with a predator is alarming....

Words: 1216 - Pages: 5

Premium Essay

Hum/176 Week 4

...the world over the past few tears. From social media sites like twitter, facebook, and youtube many different companies, and people have all benefited from the use of social media. Since the internet is filled with computer hackers, scams, and sexual predators the disadvantages of social media can outweigh the advantages of social media at times. However the disadvantages of social media have not stopped social media networks from taking over the internet. Having the ability to do anything you can imagine from a social network for your business use or personal life has come to life. Using social media to find lost, old friends or family members was the main idea of social media networks when it first hit the internet scene. Then the genius behind the scenes explored different options to open up the door for more benefits of social media, like advertising a business, internet dating, job searching, night life, or even to receive news before it airs live on television networks. The internet has always been a dangerous thing to use even in the early 90’s some websites posted messages to use their website with caution, but with the evolution of social media it makes it hard for any website to protect their users. From computer hackers, sexual predators, and con artist make hard to trust anything on the internet or social media. Computer hackers love social media users who like to pay bills online, or benefit from using any type of online banking because they hack into their...

Words: 630 - Pages: 3

Free Essay

To Snoop or Not to Snoop

...Terrilyn Denne Professor M.Fazio Engl 151 3 February 2014 To Snoop or Not to Snoop A lot of the things parents do to protect their children might be considered spying by some, but they are in fact “measures parents take to keep their children safe from others” (empowering parents). I believe it is acceptable for parents to use whatever source they feel necessary to protect their children, including but not limited to Spyware to monitor computer use. To further support my views of protecting children on the internet, we will consider family values, current laws and age appropriate monitoring. In my opinion, judgments and views from outside sources should not penetrate the “Family Values” that are usually dictated by the Head of Household. In most cases Family Values are there to deter any risky behavior by minor children. While the Internet allow kids the freedom to make friends, play games and research homework with the click of a button, it can pose a potential danger as online predators, cyber bullies and scam artists share the same freedoms. While there is no easy solution, preventative measures can greatly reduce a child’s chances of becoming a victim. Given the potential dangers of children’s internet usage, see the following suggestions for addressing internet safety in the home. 1. Explain to your children the potential hazards of online sexual solicitation and the risks associated with internet communication with strangers. 2. Teach your child to avoid...

Words: 972 - Pages: 4

Free Essay

Cyber Crime- Online Predators

...Running Head: Cyber Crime- Online Predators 1 Cyber Crime A Study of Online Predators Amber Ellis Ivy Tech Community College CRIM 101 David De La Cruz December 4, 2012 Running Head: Cyber Crime- Online Predators 2 I have chosen to my term paper on Cyber Crime. I chose this topic because I myself have been a victim of this malicious crime in the past. With knowledge I can warn others. Cybercrime can only be described as illegal activity committed on the Internet. I thought it would be good for me to make myself aware of all the research behind this topic so that I will not be a victim again. Cybercrime is a very serious offense and a lot of people do not even realize they have been a victim of it. Cybercrime is no laughing matter. Criminal activities in cyberspace are on the rise. (National Research Council, (NRC), 1991) Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Cybercrimes can basically be divided into three categories: Cybercrimes against persons, cybercrimes against...

Words: 2467 - Pages: 10

Premium Essay

Are You Aware of What Your Child Is Doing Online?

...child is doing online? Parents should stay well informed on what their teenagers are posting online. In this day and time social networking is a way of life with teenagers. With websites like facebook, twitter, linked in, and myspace we can update everything we do day to day in a matter of seconds. We can also post pictures, tell who are with us, and inform people of our location. These are all excellent things if they are used in the positive light of social networking, but how often are they not? Teenagers are now using these sites to harass and bully peers online. They also leave doors open for adult predators and identity theft. There has been research on the effects of social networking in teens that closely link them to low grades, psychological and social problems, and not being as active which leads them to being overweight. Statistics show that about 75% of teenagers have cell phones, which raises the question “Are we aware of what our teens are posting online”? There are many pros to our children using social media but we as parents have a duty to protect them. We must be good role models and be aware of privacy issues and concerns. There are advancement’s in today’s technology that make it easy for our children to network and stay in touch with their peers. Children who are not likely to socialize the traditional way because of shyness and social anxiety can use their PC’s to communicate with others. Children that have disabilities that prevent them from going out are...

Words: 1532 - Pages: 7

Free Essay

On-Line Privacy: Intrusion Between Children and Parents

...Twitter and Facebook cites. It is hardly imaginable to allow children on the computer without filters, monitors, and supervision. But when does it become a privacy issue between children and their parents? Teens are often exposed to potential privacy risks online due to marketing platforms like some of the names mentioned above. Another issue to deal with is on-line sexual predators and pedophiles that are on the loose, targeting children on the computer had and still is an issue in today’s modern society. When does it stop? Will it ever? Where are the moral values? Will parents take a stand for what is right for the children even if a teenager believes that they are being protected because they used false information in their profile? When we define the word intrusion it means: an illegal act of entering, seizing, or taking possession of another's property. I’m sorry, but as a parent I believe my children don’t own anything they don’t have the right to say I can take you to court mom for taking my computer, regardless if you earned it with allowance given by your parents. Some children seem to believe that their privacy is invaded when parents block certain websites from them or if their computer gets taken away from them even if they are on punishment. According to an on-line survey on business weeks website says: Three of four parents don't believe social networks are doing a good enough job of...

Words: 1564 - Pages: 7

Free Essay

Child Predators: Does Technology Increase Exposure and Risk?

...Child Predators: Does Technology Increase Exposure and Risk? Child Predators: Does Technology Increase Exposure and Risk? Introduction Child predators, or a person who preys upon minors for self-gratification often in a sexual manner, has been a known social issue before computers were invented. With the increased availability of computer based technology, including social networking, people have begun to demand more laws and regulations in regards to sex offenders ability access online technology and communication tools (Wynton, 2011). The availability of computer based communication has allowed for the world to interact with others in a way that is not like that of telegraph or telephone. Does the increase of technology create more predators or does it just give a medium for predators to expand and reach their potential victims? As with many things that are linked to technology, the exposure and the knowledge that is needed to prevent the increase of child predators online is reliant on multiple factors. These factors include access to online environments, increased preventative technology, knowledge of children and their risks online, and the need for social responsibility for web developers, parents, and children. The expansion of technology does not guarantee more predators will emerge but it does give new mediums and victims that may not have been available previously, creating a need for changes in both the virtual and real worlds that people reside in. Background ...

Words: 2804 - Pages: 12

Free Essay

A Guide for the Internet?

...Josh to monitor Megan online. The mother became friends with Megan, but Megan only thought it was just a boy that she knew from school. After a while, everything went from sweet talk to verbal abuse. Terms such as" Megan is a slut. Megan is Fat" were being posted all over the social network by the mother. Devastated by all this bullying, Megan was found hung in her bedroom closet a few days before her fourteenth birthday. After the death of Megan, they found out it was the mother of her former friend who was behind this cyber bullying. Megan's Father, Ron Meir stated, "That's the biggest tragedy of this whole thing. An adult did this." Living in the 19th century, everything we do is revolved around the Internet. Nowadays more than 50% of people can’t go a few hours without going on the internet since they have developed smartphones that bring it right into the palm of our hands which makes it harder for parents to monitor their kid’s internet behaviors. Basically whatever you do is connected to the Internet, from talking on the phone, video chatting and texting. But most people do not realize that there are consequences, which relates to all of the above if not taken certain measures and precautions that would lessen the risk of such threats that might arise while using Internet. Don’t get me wrong, the Internet is a wonderful tool that benefits everyone but others who are the rotten apples in the bunch use it to take advantage of the innocent users online. In this paper, I will...

Words: 1520 - Pages: 7

Free Essay

Technology Acts Paper

...Technology Acts Paper Sandy Delarosa BIS/220 July 8, 2013 Professor Tim Technology Acts Paper I am a father of two beautiful boys, who I am devoted to keeping safe from anything that could possibly harm them. Internet usage is part of everyday life for them. therefore, for my paper on technology acts I chose; The Children's Internet Protection Act 2000 (CIPA) and The Children's Online Privacy Protection Act of 1998 (COPPA). On December 21, 2000 the children internet protection act was signed into law, three years later on June 23, 2003 the United States Supreme Court found this act to be constitutional. The act requires libraries and schools grades from kindergarten to 12th to put measures in place that will protect children from any harmful internet content they may come across while online. The children’s online privacy protection act details the rules and regulations that a website operator must follow, things that have to be included in their privacy policy and instructions on when and how to confirm age and consent from adult or guardian of the child. The advances in technology which have resulted in new ethical issues that prompted the creation of these acts are the growing number of ways predators can pray upon our children online. The internet has open many proverbial doors which allow people of all ages to anything without leaving the comfort of home. One can use the internet do a research paper, order pizza, buy clothing or to communicate with other...

Words: 421 - Pages: 2

Premium Essay

Social Network

...identity theft and bring other issues such as personal insecurities. Social networking sites have increase identity theft, the safety of the children as well as cyber bullying, and health issues. Psychological disorders in children are often caused by the overused of social networking (American Psychological Association, 2011). Children who spend too much time online can rule out important activities such as homework, physical activities, and even deprive themselves of sleep. Rosen (2011) says “studies found that middle school; high school and college students who checked Facebook at least once during a 15 minute study period achieved lower grades”. In social networks such has Facebook; people can choose who to be friends with and who is not. It is a very competitive environment, and it can reflect on their self-esteem which can lead to anxiety or depression. Children do not always have a sense of time management therefore, they spend more time chatting a way with friends than exercising and doing homework. Social networking has an impact on social skills of the children. The older generation learned how to communicate and interact with each other...

Words: 1376 - Pages: 6

Premium Essay

Coppa and Cipa

...COPPA and CIPA There have been information technology acts put in place to protect certain potentialrisks. Acts such as the Children’s Internet Protection Act, 2000 and the Children’s Online Privacy Protection Act, 1998 are only two of the many. The "Children’s Online Privacy Act" (n.d) website. The two acts were created for many reasons for adolescent to prevent potential threats and advances for children. The possibility of young children accessing harmful websites are controlled by both acts and the impact has been worldwide. The Internet will continue to expand and without government control, these acts were established to aid in the control of information that is accessible to children. The Children’s Internet Protection Act was created for schools and libraries with Internetaccessible to children. The circumstances that led to this act were to protect Internet safety. President Clinton signed this act to aid in the ability to control what children had access to. As the Internet expanded and predators grew in numbers, the information technology world was impacted and children were being attacked. Internet use has become the norm in Institutions. Children can access the web from their homes, schools, and libraries. As helpful as the Internet can be, there are potential dangers that children can easily access. As a result, the Children’s Internet Protection Act of 2000 became constitutional, requiring schools and libraries to implement filtering of web content and blocking...

Words: 2332 - Pages: 10

Premium Essay

Protecting Your Children in the Cyber World

...Children today learn how to use a computer as soon as they are able to get their little fingers on one. It’s a different world than it was 20 years ago. Kids are given I-pads in school instead of notebooks. Almost everyone has access to the Internet at all times on his or her telephones. Technology is at our fingertips at almost every minute of our day. There is really no way for a parent to keep their child from technology unless they literally keep them in a cave. Seeing as how that may not be realistic, software developers have created a way for parents to keep their children safe while using technology. They have created parental control programs. Parents control programs allow parents to have an invisible hand in what their children can and cannot look up online. They are able to block certain websites and follow their children’s searches to make sure they are staying out of trouble. One website that seems to cause everyone trouble is Facebook. Facebook is a social media website where you can meet friends and network online. With today’s current problem with bullying and predators online, many parents want to have access to their children’s social media websites. One program that is helping parents achieve this and allows them to have access is Zonealarm social guard. This program which retails for $24.99, reports potential face book dangers to parents without compromising the child’s privacy. It detects cyber bullying, bad links, account hacking, contact by strangers...

Words: 604 - Pages: 3

Premium Essay

Com 150

...make the right decisions in knowing how to keep them safe. It is the hope that the information provided in this paper, will inform the reader of the pros and cons of what it is to have a teen using a social network. As parents, it is a never-ending duty to ensure the safety of the lives that have been given to them as parents. One must ask themselves is this environment a safe place to be in and who will their teen be interacting with. Frequently children in 4th-6th grade levels engage in social networking activities. In the process they post personal, potentially exploitable, information about themselves online. (Social Networking Statistics, 2012) Social networking sites provide many opportunities for adults, but leave adolescents vulnerable to predators, addiction, and lack of social interaction. The beginning of social networking started with a site call BBS (Bulletin Board System). This was a site that allowed user to use text only exchange. This was a popular thing in the 1980s and late 1990s. (Nickson, 2009) The Internet was still new at this stage and did not catch on until AOL (America Online) ventured around in the mid-1990s. Soon sites such as Yahoo and Amazon came alone catching the eyes of the young generation. In August 2003 the popular network MySpace started a frenzy allowing young people to interact more closely. This was in part because the site made it very easy to post videos. This was the start of the downfall for how teens interacted with society. One...

Words: 1762 - Pages: 8