Free Essay

To Snoop or Not to Snoop

In: Social Issues

Submitted By trdenne
Words 972
Pages 4
Terrilyn Denne
Professor M.Fazio
Engl 151
3 February 2014
To Snoop or Not to Snoop A lot of the things parents do to protect their children might be considered spying by some, but they are in fact “measures parents take to keep their children safe from others” (empowering parents). I believe it is acceptable for parents to use whatever source they feel necessary to protect their children, including but not limited to Spyware to monitor computer use. To further support my views of protecting children on the internet, we will consider family values, current laws and age appropriate monitoring. In my opinion, judgments and views from outside sources should not penetrate the “Family Values” that are usually dictated by the Head of Household. In most cases Family Values are there to deter any risky behavior by minor children. While the Internet allow kids the freedom to make friends, play games and research homework with the click of a button, it can pose a potential danger as online predators, cyber bullies and scam artists share the same freedoms. While there is no easy solution, preventative measures can greatly reduce a child’s chances of becoming a victim. Given the potential dangers of children’s internet usage, see the following suggestions for addressing internet safety in the home. 1. Explain to your children the potential hazards of online sexual solicitation and the risks associated with internet communication with strangers. 2. Teach your child to avoid sending personally identifying information via the internet. Such as a real name, address, school, telephone number, photos or names of family members. 3. Install a firewall, privacy filtration software and an antivirus program. 4. Discourage children from downloading games and other media which could contain Trojan and worm programs that enable remote access to computers by unauthorized users. 5. Supervise/monitor internet friends similar to how neighborhood and school friends are monitored. (nasponline) Parents need to take precautions against these predators. The use of parental controls will help filter and limit access to potentially harmful online content. COPPA - Children’s Online Privacy Protection Act is a law created to protect the privacy of children under 13. The ACT was passed by Congress to address the rapid growth of online marketing. Various Web sites were collecting personal data from children without parental knowledge or consent. Research published by the “Center for Media Education showed that children did not understand the potential negative outcomes of revealing personal information online” (COPPA). With the stir of media reports demonstrating the ease of gathering private data from children, the public pressured Congress to Legislate. COPPA should not be confused with COPA, the Child Online Protection Act, which was relevant to the exposure of children to online pornography. COPA was ruled to be unconstitutional and was placed under injunction. (Techtarget) With the injunction of COPA in mind, who will protect the children? The parents are the first and last line of defense when it comes to safety from online predators. COPPA strictly focuses on minors 13 and under. The rules drastically change when kids reach ages 14 thru 18. Parenting styles change with teen privileges; curfew, supervision and privacy take center stage. This is where parenting and paranoia meets. The Love and Logic method rarely works. But keeping your teen safe is still a priority. Teens should have almost limitless access to content, websites, or activities. They are savvy about the internet but they still need parents to remind them of appropriately safe Family Values and guidelines. Parents should be available to help their teens understand inappropriate messages and avoid unsafe situations. It’s a good idea for parents to remind teens what personal information should not be given over the internet. (Age-Based).
Safety tips to consider for teens online: 1. Continue to keep communication open and positive. Encourage teens to tell you if something or someone online makes them feel uncomfortable. 2. Enforce Family Values and guidelines. 3. Teach teen responsible, ethical online behavior. 4. Make sure teens check with you before making financial transactions online, including ordering, buying or selling items. 5. Discuss online gambling and its potential risks. There is no substitute for having a good relationship with your children at any age. You are not their peers and the need to set clear examples of expectations and boundaries can be helpful. Parental monitoring (not spying) should start at an early age and continue throughout the teen years, evolving as children grow and mature. Monitoring can be as simple as asking Where will they be? Who are they going with? And when will they be home?
As children develop into teenagers, adults might view them as more independent and less in need of monitoring. Being consistent, effective and starting early will prepare them for the clear expectations and disapproval of risky behavior. Talking with your child about the dangers that are ever present on the internet may not be the only way to protect them, but as a first line of defense, it will keep them mindful and aware. Dangers that have grown since the growth of social networks and online gaming, it is the single most important thing a parent can do to protect their children.

Works Cited
Age-based Guidelines for Kids' Internet Use." Child Safety. N.p., n.d. Web. 01 Feb. 2014.

Barnet, Sylvan. "Critical Thinking." Current Issues and Enduring Questions: A Guide to Critical Thinking and Argument, with Readings. S.l.: Bedford Bks St Martin'S, 2013. 3-33. Print

"COPPA - Children's Online Privacy Protection." COPPA - Children's Online Privacy Protection. N.p., n.d. Web. 20 Jan. 2014. <http://www.coppa.org/>.

Lehman, James. "Privacy-should I Spy on My Child." Empowering Parents. N.p., n.d. Web. 18 Jan. 2014. <http://www.empoweringparents.com/Teens-and-Privacy-Should-I-Spy-on- My-Child.php>.

Similar Documents

Premium Essay

Snoop Dogg

...What Josh should have done? The expenses, such as insurance should have been paid over the year, in monthly segments, instead of in full at the start of the year. Josh also could have waited for the business to become steady before spending a whole £500 at the start of the year. Josh could also have connected both his sales and wages. He could have also took a percentage out every £500 he made, which could have gone towards his wages. Over the year, Josh did not make a profit. Josh should have changed the way he worked, to help him make a profit. This cash flow is really poor, as he was becoming more and more in debt. Josh should also pay his road tax in monthly sections next year. Josh should have also reconsidered the time he brought his van, and when he got it decorated. He should have let his business build up a bit more before buying something that big and spending that much money. His business is a bike business, so if he needed to travel to get deliveries, he could have biked there. Then when he earned a bit more money, he could have considered buying a van. Josh should have also gone to fewer competitions, as the money he spent on petrol to get there, and the money he actually spent there could have been used for something else, such as he could have put it towards the money he took out for wages, meaning he would have more money left in his account after taking out the £700. What will happen if Josh continues? If Josh carries on with this type of financial planning...

Words: 431 - Pages: 2

Free Essay

Concert Report 1

...Hip­Hip genre that I was very interested in attending.  We chose to make the hour and a  half drive from Grand Junction to Aspen in order to experience Snoop Dogg's concert.  Since Snoop Dogg had musically influenced all three of us throughout our lives, the  anticipation to experience his presence in an outdoor complex was overwhelming.    Speed walking to the entrance of the concert because we were late, we could  hear the enormous base of the speakers trying to compete with the screaming roar of  the crowd.  Hundreds of young individuals who were all bundled in snowboarding attire  to protect their skin from the frigid weather.   They were jumping, vibing, and dancing to  the fluent beat of two M.C.s lyrics.  The energy of the concert was seen through the  faces of the fans who we're enjoying every minute of the music.  The lighting effects  coming from the stage were insane.  They were synchronized with all of the music and  DJ's instruments while also changing from multiple colors shooting through the crowd.  The bass from the speakers blared through the crowd, creating an loud atmosphere.  The treble was loud enough for us listeners to understand the lyrics and allow the two  performers to be heard from a ways away.      My mind was in awe once we finally made it to only five rows back of the front.  With a clear view of the idolized superstar Snoop Dogg, it was evident why is stature is  respected among the music entertainment business.  He was spot on with his rap lyrics,  ...

Words: 767 - Pages: 4

Premium Essay

Nt1330 Unit 3 Assignment 1

...e. Enter your SSO domain using the following format: *.domain_name_service. Click Add and then click Close. f. Click OK to close the Local intranet window. g. Enable Integrated Windows Authentication. In the Internet Options window, select the Advanced tab. In the Security section, ensure that Enable Integrated Windows Authentication is selected. h. Restart Internet Explorer for your changes to take effect. 3. From your web browser, connect to the snoop servlet by using the fully qualified host name of the WebSphere Application Server instance where you plan to deploy IBM Content Navigator. When SSO is correctly configured, the snoop servlet issues an authentication challenge to your web browser, which initiates the SPNEGO/Kerberos exchange. o On a single server system, enter the host name with the following format: http://fully_qualified_hostname:port/snoop For example, enter: http://appserver1.addomain.home.com:9080/snoop If the snoop servlet runs successfully, you can configure and deploy IBM Content Navigator. If the snoop servlet does not run successfully, troubleshoot your SSO configuration before you continue. Configure and deploy Content Navigator with Kerberos/SPNEGO Undeploy Content Navigator from Websphere Log into Websphere, navigate to Applications, Enterprise Applications Select navigator and click on uninstall. Click OK Click Save. Log out of Websphere, this will then bring you back to the log in screen.   Stop Websphere service from Windows Services...

Words: 715 - Pages: 3

Premium Essay

All Eyez On Me Analysis

...collection makes it clear that, instead of lessening his aesthetic capacities, the battles just hoisted his aptitudes. The majority of the tracks on "All Eyez on Me" are unashamed festivals of carrying on with the hooligan way of life ("California Love") keeping in mind there is the incidental memory about over a wide span of time companions ("Heartz of Men"), it moves far from the social and political cognizance of "2Pacalypse Now". The collection offered six singles, the majority of any 2Pac collection up to that point and at 132 minutes, genuinely is an epic situated of music. While each track has something to offer, "I Ain't Mad At Cha", "How Do U Want It", "Picture Me Rollin" and "2 of Amerikaz Most Wanted" (which peculiarities Snoop Dogg), emerge over all the rest. While "California Love" was discharged as the "rebound" single for 2Pac, it likewise embodies the west drift way of life, and is effortlessly one of the best hip-jump tracks ever. The melody was assigned for two Grammy Awards and peculiarities Dr. Dre and Roger Troutman. 2Pac is savage on the track, demonstrating that he was roused and prepared to be back on the rap scene: "Out on safeguard new outta prison, California dreamin/Soon as I ventured on the scene, I'm hearin hoochies screamin/Fiendin for cash and liquor/the life of a west side playa where fainthearts pass on and its all ball/Only in Cali where we revolt not rally to live and bite the dust." Dr. Dre has one of the cleverest and most perceived...

Words: 1085 - Pages: 5

Premium Essay

English

...home where the only character that is known is Mr Priddy himself. There are other characters in the story who are mentioned such as Joe’s wife Mary and Hank, Marys brother. These are flat characters as they are mentioned but do not actually take part in the story. The flat character David Michaelson from the surveillance company is also a prime character in the story although the reader is not given any information about him or the company. The story is told through letters from a surveillance company, this is told in a third person narrative and tells the story of Joe, a rounded character and the company ‘Snoop’ which is projected as a flat character. All in all the setting seems secretive and full of deceit. We are then introduced to the main character of the story Mr Priddy. A letter is sent to him from a surveillance company called snoop as a course to discover the protagonist misconducts and the consequence that he must pay off. Joe is clearly irritated with this subscription letter and is not aware at this stage what is going on around him. “ Who do they think they were fooling? Pridy”. The letter states “ We are sure that in your own town of Sidewheel, NY, you have seen the consequences for yourself”. The omniscient narrator is implying that Joe should know what this is all about. Joe replies to the letter and refuses to resubscribe only to be informed that in fact it is in his best interest to subscribe and pay a sum of four hundred and...

Words: 772 - Pages: 4

Premium Essay

Personal Narrative On Halloween

...Intro: It was late October and Tyrone, Snoop Dog, and Ice Cube decide to explore a haunted and abandoned daycare on Halloween, when they entered the daycare the whole place was torn apart. Suddenly they heard the door behind them screech, then shut and lock. Snoop dog got out his phone and tried to call his mom, “Dang, my call failed.” Snoop dog said while sweat was dripping down his dark skin and his braided hair. “Are you kidding me?” The other two said. But what they didn’t know it that they would never forget what they experienced that night. It was early in the morning, I was wide awake, ”Yes! Today’s Halloween,” I shouted. I hopped out of bed and ran downstairs and got some cereal .I got milk and some cinnamon toast crunch. I ate and then went to watch TV for a little bit. After about 3 hours later I, heard my doorbell ring....

Words: 750 - Pages: 3

Free Essay

Computer Ethics

...1. Thou shall not use a computer to harm other people. Example: A person should do something which could cause any type of harm to others like cyber bullying, publishing false information about a person, harassment, etc. 2. Thou shall not interfere with other people's computer work. Example: I believe this could mean two things - the first one being that one should not develop programs or systems which could cause damage to a persons computer and disable it from fully functioning, such as malicious viruses and spreading them. Secondly, this commandment could mean that a person should not modify a persons work and shouldn't snoop around in it. 3. Thou shall not snoop around in other people's computer files. Example: If a person is logged into a website and you happen to be using the computer, it would be polite to log out. Also, one should never browse through a persons email, data and/or files (pictures, documents, etc.) without exclusive permission from the other person whom it belongs to. 4. Thou shall not use a computer to steal. Example: Although unethical, it is also unlawful to steal in any way shape, form or fashion. This would include, computer-hacking with the intent of secretly collecting personal information or running scams in order to benefit while conning the victim. Piracy is also a form of stealing which should be avoid. 5. Thou shall not use a computer to bear false witness. Example: To “bear false witness” is to lie, so a person should...

Words: 654 - Pages: 3

Free Essay

Com 202 Final Paper

...COM 202 Final paper WEEK 7- FINAL PAPER, MUSIC AND INFLUENCE In this essay we will explore the relationship, effects and influence of music on high profile events or movements for each decade since 1960-2010. We shall look at them in three segments First of all, the sixties a new dawn was on its way around the world most African Nations were calling for independence from colonial powers whiles in America, the civil rights movements was at its peak, Civil rights activist like Dr Martin Luther King, Malcom X. the nation of Islam and others where calling for an end to segregation and other oppressive conditions they were experiencing. “ Joan Baez’s we shall overcome (1963) originally focused on the civil rights movements, was a powerful way to bring people of different classes, background ,religions –but one shared value – together, and now has become the song any group trying to stand against old and needing change, practices uses. So I think it both changed, and continues to change the world today. It is still song today by everyone Cooke’s A change is going to come were also influential during the civil rights movements .Although there were define changes but People like Dr Martin Luther King and Malcolm X were brutally murdered. http://www.bbc.com/news/magazine-21143345 The Seventies now was slight better there were some changes and freedom in the air, when the Jackson Five dropped this ABC album. I was young then every young boy wanted to be Michael Jackson...

Words: 1351 - Pages: 6

Premium Essay

Jesus Rules

...JESUS RULES Hey yo doctor, here's another proper track And it's fat, watch the sniper Time to pay the piper And let that real shit provoke So you's a wannabe loc, And you'll get smoked And I jope your fans understand When you talk about playin me The same records that ya makin is payin me Motherfuck Dre Motherfuck Snoop Motherfuck Death Row Yo and here comes my left blow 'cuz i'm the E-A-Z-Y-E, and this is the season to let the Real motherfuckin G's in, ya like a kid ya found a pup and now yer dapper, but tell me where the fuck ya found ya found an anorexic rapper talkin 'bout who ya go squabble with and who ya shoot you're only 60 pounds when yer wet and wearin boots damn E, they tried to fade you on Dre Day But Dre Day only made Eazy's pay day all of a sudden Dr Dre is a G thang, but on his old album cover he was a she thang so Nigga please, Nigga please don't step to these motherfuckin' Real G's Yo Dre, what's up? *bang* Boy you should have known by now Yo Dre, what's up? *bang* Boy you should have known by now Every day it's a new rapper, claimin to be dapper then the Dresta, smoother then a bitch but portrayed the role of gangster, ain't broke a law with yer life, yet every time you rap you yap about the guns and knifes, just take a good look at the Nigga, and you'll capture the fact, that the bastard is simply just an actor, who mastered the bang and the slang and the Mental, of Niggaz in Compton, wattz, and South Central never...

Words: 831 - Pages: 4

Premium Essay

Social Engineering

...Introduction Over the past decade alone, technology has become so integrated into our everyday lives that it is almost an impossible to imagine a world without computers. We have computers in our offices, our homes, our cars, our phones and laptops that we can carry from place to place. Without this technology, I wouldn’t be able to attend college courses online and therefore wouldn’t be able to one day earn a degree. However, one of the major issues that we face when doing all these things online is not being able to fully protect our information and our privacy. Computers around the world are connected via the internet and while this connection allows for easy access to information and communication, it also opens the user up to a new form of crime, social engineering. In my ????? class, Professor ???? talked about one particular example of social engineering dating back to ancient times, the Trojan Horse. It is considered one the most well-known examples of social engineering in history; a hollow statue built by the Greeks to allow them access to the city of Troy. This seemingly harmless wood statue was not apparent to be a threat by the Trojans and unfortunately resulted in the fall of the city of Troy to the Greeks. Social engineering works in somewhat the same way. In modern times it is a way for criminals to access your computer, office or confidential information for illegal purposes. In this paper, I will discuss 3 of the most common types of social engineering attacks;...

Words: 1031 - Pages: 5

Premium Essay

Nas Snooping the Damage Is Done

...N.S.A snooping the damage is done The article that I read is about the N.S.A snooping. The N.S.A is an organization that was created to protect the United States of America. the N.S.A (National security agency) has abused the power that was granted to them by the the us government. In may of 2013, Edward Snowden reviled to the world, what the N.S.A was doing. He informed the world that the N.S.A was collecting everyones information. President Obama had to apologize to several world leaders, because the N.S.A was tracking their phone calls. In a period of 30 days the N.S.A collected 70 million phone calls and messages. The N.S.A should not have the power to snoop on anyone they want. If they keep doing it, the U.S allies will not be happy. We live in a world that is run by the use of the internet. The internet allows people to share information with one another. People pay their bill using the internet. If they N.S.A continues to violate people’s privacy online, it could make some people scared to use online services. Many internet companies could be affected by this. The N.S.A is a agency that has helped the U.S government in the past. Technological advances has given them the ability to collect large amounts of informations. The united States government has granted them the freedom to use those technological advances. The problem is that the N.S.A is not using their power responsibly. They are creating problems with the U.S allies. They are hurting the online businesses...

Words: 297 - Pages: 2

Premium Essay

How to Piss Off Men

...Sally and Steve have been dating for about a month or so, and things seem to be going smoothly, besides the fact that Steve says that Sally is constantly pissing him off. She is always texting him and never giving him space, she overreacts about every little thing he does wrong, she expects him to read her mind constantly, when he compliments her she denies the compliment, and worst of all, she never stops talking. Like Sally, most women are always pointing the finger at men for causing problems in their relationship; they claim that men do not communicate or meet their every need, but in reality women are the problem. Men do not know how to handle women most of the time because women piss them off so much. In order to prevent this from happening, women need to know how they piss men off so that they can prevent themselves from doing these things. 1. Constantly text them and never give them space. Men need space just as much as women do, and when women are constantly nagging them, they do not get the space they need. Women tend to constantly text their boyfriend, “What are you doing? Where are you? Who are you with? Why aren’t you responding?” This is not going to make their boyfriend reply any faster than he would have before. This step tends to piss off men because sometimes they just need time alone from their girlfriends to gather themselves before confronting her about where he has been for the past three hours. Ladies, starting “World War III” because they do not reply...

Words: 1155 - Pages: 5

Free Essay

"Who Framed Roger Rabbit" Review

...Who Framed Roger Rabbit is a 1988 American animated and live action fantasy comedy film directed by Robert Zemeckis. It is based on Gary K. Wolf's 1981 novel "Who Censored Roger Rabbit?", which depicts a world in which cartoon characters interact directly with people and animals. Toon star Roger Rabbit worries that his wife Jessica plays pattycake with someone else, so the studio hires detective Eddie Valiant to snoop on her. However, the stakes are quickly raised when Marvin Acme (the practical joke-loving owner of the studio) is found dead and Roger is the prime suspect. A toon hating detective is a cartoon rabbit's only hope to prove his innocence when he is accused of murder. During the search for the true killer, the detective wonders how Roger can have an exuberant spirit in the face of possible death. Roger tells him that "a laugh can be a very powerful thing, why sometimes in life it's the only weapon we have". At this moment the detective sees Roger in a different way. So Eddie Valiant manages to solve a crime in a town where "logic goes out the window". He kisses Roger, proving that he has regained his sense of humor, and the toons celebrate their victory. This film mixes the live and animated characters, and lots of references to classic animation, it brought many famous cartoon characters from different studios together on screen including Mickey Mouse (Disney), Bugs Bunny (Warner Bros.), Droopy Dog (MGM) and etc. "Who Framed Roger Rabbit" is a lots of fun, ironic...

Words: 287 - Pages: 2

Premium Essay

English

...Hi everyone HipHopLover04 writing As a lot of you requested, here are my answers to the most frequently asked questions, hope you like it Don’t forget to like and leave comments History of HIP-HOP Hip Hop was born in the United States, more precisely in the Bronx, New York City in the early 70's. Clive Campbell, aka. DJ Kool Herc, THE INVENTOR OF HIP-HOP, started to play some hip-hop music at block parties and that's how it all began. The music itself comes from Disco Rap, which is a lighter and funnier version of the hip-hop we know today. In the beginning the DJ's would only take the instrumental parts of songs and mix them while keeping a constant beat. After, the lyrics came in and TADAAA here is hip-hop you now know. But what were they singing about? Well before, people were trying to express their opinions their main theme was an ideal of equality and also as always, how bad their government was corrupted while today to be honest is only about women and how big their breast or their "derrière" are even though we can still find some really good music.  WHAT ARE THEY FIGHTING FOR? Originally, hip-hop was about bringing a whole community together. That's why it started the poor Black and Latino communities, they had to face poverty and their exile from the rest of society: it was one of the only ways to stay united. Today, with the popularization of Hip-Hop and its massive investments in massive culture, Hip Hop music has lost more and more of its original aim...

Words: 1142 - Pages: 5

Free Essay

The Difference Between Tragic and Epic Heroes

...The difference between tragic and epic heroes Tragic heroes and Epic heroes; to the average person, they may think there is no difference. The main characteristic of a tragic hero is that he or she must have a tragic flaw, which leads to their downfall. A tragic hero, unlike an epic hero, usually does not have a successful conclusion and does not have to be neither good nor evil. While with an epic hero, he may have to deal with supernatural beings and is said to often perform unheard of, sometimes super human quest. The differences between the two can be hard to find but when you really look into the text, you can snoop out the differences. “Epic heroes somehow always get off easier than tragic heroes do.” “Epic heroes get win and at the end of the day are still thought of as noble birth and great to all humanity. In the play Beowulf, Beowulf, the main character is the exact image of an epic hero As for tragic heroes, it is the complete opposite; they come out on the bottom, with a tragic downfall that they will probably not ever get out of. Epic hero is the central figure of an epic poem whereas a tragic hero is the central figure in a tragic play.” The Circumstances of the Hero’s birth are unusual. At birth, he is said to be the son of a god. At the birth of the Hero, there is often an attempt to kill him. He may be kidnapped or sent away for his protection, foster parents often save him. Though the tragic hero is undoubtedly great, he is not perfect. Combined with his...

Words: 430 - Pages: 2