Premium Essay

Protection of Predators

In: Computers and Technology

Submitted By PureHappinezz
Words 420
Pages 2
Current Threats of the Internet
By: Keonia Burns
December 15, 2010
Final Exam The Internet has so many threats that are identified to many people. Identity theft, on-line predators, and on-line bullying are most important issue to me in which I will discuss. The first issue that will be discussed is Identity Theft. Identity Theft is rapidly growing, especially online. There are about 14 million Americans victims between January 2001 and mid-May 2003 whom ended up with $3.8 billion out of pocket. Identity theft is everywhere; many people are shoulder surfing (where thief looks over your shoulder to see your pin) and stealing of credit card number from dumpsters, handbags, and on-line. Now how can identity theft are mitigated? One way to mitigate the threat is to make sure your personal computer is password protected. If you’re using a company’s computer, make sure that there’s no wanders in your office has access to your network. Password protects and grants access on a “need-to-know” basis to help cut down identity theft. Here are five tips to avoid having your identity stolen; 1. Never give out your social security number on-line or otherwise.
- Once criminals have your social security number along with your birthday and address, they have virtually everything they need to start wreaking havoc in your life. 2. Use good anti-virus program.
- One way criminals get your credit card numbers, passwords, and other sensitive information is through “Trojan horse” viruses that log your keystrokes and transmit information to the evil doors.
3. Always is a “secure” server when transmitting credit card information over the web and know something about the company before handing over your information
4. A popular new way to pay for goods and service online is to “use your checking account just like a credit card.”
5. Never give out information such as your

Similar Documents

Free Essay

Protecting Children Online

...an all hands effort. Online predators are the new way for individuals to plan, fantasize, and full fill their needs. Just telling your child to not talk to strangers will not cut it in today’s internet world. Protecting children online takes planning, coaching and internet rules setup to hopefully provide that barrier. Anybody can be anybody behind a computer. Providing this vital information to children could be the one thing that saves that child’s life. What is a sexual predator online? A sexual predator is better known as pedophile. We have all checked those websites to find out and to see if we have a sex offender living near our homes. How many people have actually checked out the websites children are visiting? The children today are more technological then their parents and the parents need to be aware of the dangers that lurk behind every computer. The most common means by which sexual predators contact children over the Internet is through chat rooms, instant messages and email. In fact, 89% of sexual solicitations were made in either chat rooms or instant messages and 1 in 5 youth (ages 10-17 years) has been sexually solicited online (JAMA, 2001). Considering that 25% of kids online participate in real time chat and 13 million use instant messaging, the risks of such children, either knowingly or unknowingly, interacting with a predator is alarming. (Sexual Predators Online) The internet is a playground for sexual predators and the children are the toys...

Words: 1216 - Pages: 5

Premium Essay

Importance Of Protecting Children

...vulnerable and can’t protect themselves predators are also getting off easy. Laws protecting children should be enforced because there are too many kids being abused, whether it’s physically...

Words: 1307 - Pages: 6

Premium Essay

Technology Information Act

...to access limitless amounts of information, services, and entertainment”(Kelly Rainer Jr. & Cegielski, 2011). “This platform operates without regard to geography, time, distance, or even language barriers” (Kelly Rainer Jr. & Cegielski, 2011).We use these devices in our homes, in our businesses, in our schools, on our cell phones, and in the public libraries. Now that our children in most cases have unlimited access to the Internet, there is a great possibility that children are exposed to inappropriate material and on predators. In this paper there will be discussion on what were the advances in information technology that resulted in new ethical issues necessitating the creation of Children Internet Protection Act, 2000 and Children’s Online Privacy Protection Act, 1998. Children Internet Protection Act, 2000 In December 2000, President Clinton signed into law The Children’s Internet Protection Act. Through the use of technology protection on measures, schools and public libraries are required to protect minors from the dangers of the Internet (Menuey, B. P. 2009). “The major concern with the implementation of the law is the inability to prevent over filtering for bona fide research” (Menuey, B. P. 2009). It is the school and libraries responsibility to place content filters on their systems in order to keep children from searching inappropriate sites that may be harmful for children (Kessler 2001). “With the miniaturization and spread of surveillance technologies...

Words: 710 - Pages: 3

Premium Essay

California Clapper Rail Research Paper

...Though sometimes obscure, the struggle of the California Clapper Rail is decidedly real. Many people don’t know that the California Clapper Rail, or Ridgway’s Rail, is a prime example of the victims of habitat destruction in the bay. Though driven to the brink of extinction by the miners of the Gold Rush, the Rails have been coming back lately and their numbers are recovering. However their progress to normalcy as a species is disrupted by the various factors, including non-native predators, a plant called Spartina, and destroyed habitats. The Rails’ disappearance is impacting the food chain and other native animals’ lives. Background California clapper rails have been endangered for quite a while. Their current state is mostly caused by...

Words: 1355 - Pages: 6

Free Essay

Child Internet Protection

...Children Protection Acts Claudette Irizarry BIS/220 December 3, 2012 Paula Billups Children Protection Acts Children in the twenty-first century are on the internet more than they are watching television. Information technology has had to advance itself to adjust with the new ethical issues that came along with child internet surfers. Privacy and protection acts protect children that use the internet. Two of these acts are the Children’s Internet Protection Act and the Children’s Online Privacy Protection Act. According to "Informationshield.com" (1998), The Children’s Online Privacy Protection Act (COPPA) “prohibits unfair or deceptive acts or practices in connection with the collection, use, or disclosure of personally identifiable information from and about children on the Internet.”(para. 1) COPPA is in place to ensure children are being protected because children are learning more and more about technology and using it on a day-to-day basis. They are using it in the classroom at school, at home, and on their cellular devices. There are predators that collect information from websites geared towards children thirteen and under and these individuals try to gain a child’s trust and friendship in order to harm them. These types of ethical issues made the Children’s Online Privacy Protection Act necessary. COPPA requires a parent to give consent for a child’s personal information to be collected or put to use for any reason. The companies that have websites...

Words: 513 - Pages: 3

Free Essay

Child Molestation: Causes, Effects, and Prevention

...Child Molestation: Causes, Effects, and Prevention Table of Contents I. Introduction • Statement of the Problem • Purpose of the Study • Significance of the Study • Historical Background II. Causes: An Examination of the Aggressor • Depression • Drug/Alcohol Abuse • Sexual Deficiencies II. Effects of Child Molestation • Posttraumatic Stress Disorder • Changes in Social Interaction • Promiscuity III. Solutions/Prevention • Education • Monitoring • Medical/Psychological Treatment for Aggressor IV. Discussions and Conclusion V. References Introduction After viewing the recently released, “Precious”, a movie based upon the novel “Push” by Sapphire, it has become overwhelmingly apparent that child molestation is a widespread plague that has affected many young women across the United States of America. Child molestation is an act in which an adult or older adolescent abuses a child for sexual gratification and stimulation. This selfish and perverted act has proven to cause devastating short term affects on adolescents. This study will examine the possible causes of this type of behavior; primarily examining the aggressor. It will also detail some of the short term affects that arise among the victims, such as the psychological and social ramifications. It is also of necessity to note the possible solutions to prevent such actions from taking place. This is a problem that is worthy of much consideration and recognition because statistics show that...

Words: 1879 - Pages: 8

Premium Essay

Technology an Our Kids

...However, in most homes the kids are monitored. At age four they enter the public school system. Because children are online a great deal of their day and technology has advanced so much both social and ethical issues have arisen the Children’ s Online Privacy Protection Act (COPPA), 1998 and The Children’s Internet Protection Act, 2000. We legislated to protect our kids from unsavory elements they could come across in a Public school setting. The law protects our kids while they search the internet in Federal funded Schools and Libraries. The schools and libraries must adhere to the safety policies that help protect our kids from online predators an any inappropriate materials. This legislation The Children’s Online Privacy Act (COPPA), was put in place because a child does not understand , the potential dangers of divulging personal information online . If a website is knowingly collecting information from a child 13 or younger they must report to The Federal Trade Commission. The internet is used daily and for this reason we need these laws to keep our kids safe. We cannot expect our kids to know what is dangerous or who is a predator . Although Federal law does help it is up to the parent to monitor the child and teach them what is appropriate and what is in appropriate on the internet . There are ways to block certain sites so that the child does not stumble upon a pornographic...

Words: 383 - Pages: 2

Premium Essay

Coppa and Cipa

...There have been information technology acts put in place to protect certain potentialrisks. Acts such as the Children’s Internet Protection Act, 2000 and the Children’s Online Privacy Protection Act, 1998 are only two of the many. The "Children’s Online Privacy Act" (n.d) website. The two acts were created for many reasons for adolescent to prevent potential threats and advances for children. The possibility of young children accessing harmful websites are controlled by both acts and the impact has been worldwide. The Internet will continue to expand and without government control, these acts were established to aid in the control of information that is accessible to children. The Children’s Internet Protection Act was created for schools and libraries with Internetaccessible to children. The circumstances that led to this act were to protect Internet safety. President Clinton signed this act to aid in the ability to control what children had access to. As the Internet expanded and predators grew in numbers, the information technology world was impacted and children were being attacked. Internet use has become the norm in Institutions. Children can access the web from their homes, schools, and libraries. As helpful as the Internet can be, there are potential dangers that children can easily access. As a result, the Children’s Internet Protection Act of 2000 became constitutional, requiring schools and libraries to implement filtering of web content and blocking of inappropriate...

Words: 2332 - Pages: 10

Premium Essay

Plant-Animal Co-Evolution: What Is Coevolution?

...This interaction can be found in Central America. The ant protects the Acacia plant against it being eaten and the plant provides the ant with essential proteins, carbohydrates and a place to live. Some Acacia species have chemicals in their leaves to protect them however some lack this chemical and rely on the ants for protection. The plant possesses thorn from which the ants carve their nest which provides them with shelter. The petioles of the leaf have nectars which the ants feed on and also the leaflets produce protein that the ants consume. In return the ants attack herbivores and they chew through the plants that surround the plant thus preventing those plants from shading the Acacia and also inhibiting its growth. These ants are known for removing caterpillars that maybe on the plant and also chewing down plants and vines that maybe at the base of the plant. The other species of Acacia plant that is not coevolved with the ants have no food materials in the leaflets and have hallow thorns. It is clear to see that the plants have coevolved with the ants to as a protection mechanism against other plants and also herbivores. (Bronstein,...

Words: 990 - Pages: 4

Premium Essay

Information Technology Act

...Children are encouraged to use internet to do research and find information for their projects. While they have free access to online information it is also important to monitor the use of internet by young children. When children access the internet it can put them in contact with information that are not suitable for them. While some children might come across inappropriate material inadvertently their are also children who might seek out inappropriate material voluntarily. There are sites that promote violence, pornography and indecent materials. To Protect our children from inadvertently viewing these material congress passed the Children’s Internet Protection Act (CIPA) in 2000. Children’s Internet Protection Act requires schools and libraries that receive federal funds for their internet connection to employ technology protection to block or filter pictures and material that are deemed...

Words: 665 - Pages: 3

Free Essay

Technology Acts Paper

...BIS/220 July 8, 2013 Professor Tim Technology Acts Paper I am a father of two beautiful boys, who I am devoted to keeping safe from anything that could possibly harm them. Internet usage is part of everyday life for them. therefore, for my paper on technology acts I chose; The Children's Internet Protection Act 2000 (CIPA) and The Children's Online Privacy Protection Act of 1998 (COPPA). On December 21, 2000 the children internet protection act was signed into law, three years later on June 23, 2003 the United States Supreme Court found this act to be constitutional. The act requires libraries and schools grades from kindergarten to 12th to put measures in place that will protect children from any harmful internet content they may come across while online. The children’s online privacy protection act details the rules and regulations that a website operator must follow, things that have to be included in their privacy policy and instructions on when and how to confirm age and consent from adult or guardian of the child. The advances in technology which have resulted in new ethical issues that prompted the creation of these acts are the growing number of ways predators can pray upon our children online. The internet has open many proverbial doors which allow people of all ages to anything without leaving the comfort of home. One can use the internet do a research paper, order pizza, buy clothing or to communicate with other individuals regardless of where you are around...

Words: 421 - Pages: 2

Premium Essay

Summary Of Jane Goodall's 'Saved At The Eleventh Hour'

...In “Saved at the Eleventh Hour,” Jane Goodall shares how the Vancouver Island Marmot was rescued from the brink of extinction. Goodall discusses the Vancouver Island Marmot’s original habitat in the sub-alpine meadows, which are hard to create and maintain on Vancouver Island. Goodall’s description shows the readers that the marmot is a rare species because of their unique habitat. Nevertheless, logging activity has pushed the Vancouver Island Marmots to decline at a faster rate by replacing their habitat with clear-cut areas and makes them easier prey for the bigger predators. With the discussion of Andrew Bryant, a marmot lover, we learn that logging activities have become reduces as the logging company makes it decision to support the conservation of Vancouver Island...

Words: 1049 - Pages: 5

Free Essay

Snowy Owls of the Arctic

...Snowy Owls of the Arctic By BadWolf2 Zoology 101 Description of Snowy Owls Scientific name Recently changed genus General size and markings Differences between males and females Diet Primary diet and quantity Hunting Diurnal, not nocturnal Area of hunting ground Decline of food source Breeding Mates for life Protection of nesting area Normal clutch size Food availability effects on clutch size Migration How far do they travel for food? A population decline or local extinction The snowy owl is a larger raptor type carnivorous bird whose body height is between 20 and 28 inches high. The wingspan of this owl reaches 4.2 to 4.8 feet across and its weight is between 3.5 to 6.5 pounds (“Snowy Owls”, 2012). The genus of this bird has recently been changed from Nyetea Scandiata to Bubo Scandiacus from analyzing their DNA they have found that they are more closely related to the Great Horned Owl which makes them a Bubo ("Snowy Owl," n.d.). The snowy owl is also known by other names such as the Arctic owl or the Great White owl. Most people know the snowy owl from the Harry Potter movies and the character Hedwig. Many snowy owls look this way. The younger owls are white with darker markings and as they age they lose the dark markings and become almost completely white. Females, on the other hand, do not lose all their dark markings. They may become whiter as they age, but still retain some darker or grayish marks on their plumage (“Snowy Owls”, 2012)....

Words: 1316 - Pages: 6

Free Essay

Bis 220 Week 1 Information Technology

...from any harm and as a result government passed acts to prevent child abuse on the internet. The two acts being discussed in this paper are the Children’s Internet Protection Act of 2000 and the Children’s Online Protection Act (COPPA) of 1998. Children’s Internet Protection Act, 2000 The Children’s Internet Protection Act (CIPA) is a federal law which was passed by Congress to prevent children from viewing the offensive or harmful content over the Internet ("FCC", 2013). CIPA regulates the schools and all public libraries. It makes it mandatory to filter all its computers to stop children from accessing sites that are not appropriate. ("FCC", 2013). The (CIPA) was passed in December 2000 and its main priority is to protect children’s innocent eyes from child pornography and other dangers of the internet. CIPA does not require a certain kind of filter system, but rather to make sure schools and libraries have some sort of filters to prevent such activities. There are online predators, inappropriate chat rooms, and sexual content that children are at risk for if this law was not passed. Ultimately, all households, schools, libraries, workplaces, and restaurant have access to the internet and this is a law that needed to be passed. Children’s Online Protection Act (COPPA), 1998 The Children’s Online Privacy Protection Act (COPPA) was passed in 1998. It specifically addresses children under the age of 13 that navigate thru any sort of internet...

Words: 606 - Pages: 3

Free Essay

Information Technology Acts

...Computers at one time were only used by the government, and in businesses. Today, technology is everywhere, and it is at everyone's disposal. Children's Internet Protection Act Computers, and technology can be found at work, at home, at school, church, and most public places. These devices are being used to search the internet, store information, and they are also used to calculate information. With computers being so easy to access children have become exposed to all types of predators, and unethical issues that have come from unmonitored use of the internet. Due to rising issues there had to be some Information Technology Acts put in place. The internet technology act is one of the acts that will help protect children from some dangers they are exposed to online. The Children’s Internet Protection Act (CIPA) was enacted by Congress in 2000 to address concerns about children’s access to, or harmful content over the Internet. CIPA imposes certain requirements on schools, or libraries that receive discounts for Internet access, or internal connections through the E-rate program; a program that makes certain communications services and products more affordable for eligible schools, and libraries. In early 2001, the FCC issued rules implementing CIPA, and provided updates to those rules in 2011 (Children's Internet Protection Act, 2014). Schools, and libraries subject to CIPA are required to adopt, and implement an Internet safety policy addressing: (a) access by minors to inappropriate...

Words: 499 - Pages: 2