SlideShare uma empresa Scribd logo
1 de 11
1
Instant Messaging Chat Options
A Parents Awareness Guide 2014
Abbreviated IM, a type of communications service that
enables you to create a kind of private chat room with
another individual in order to communicate in real time
over the Internet
Typically, the instant messaging system alerts you
whenever somebody on your private list is online.
You can then initiate a chat session with that
person.
Most IM systems currently do not support such
security staples as authentication and encryption.
Some IM’s actually send chats in plaintext, so
anyone on the same Wi-Fi network can easily pull
your entire conversation - including pictures and
videos - straight out of the air.
Instant Messaging
DefinitionDefinition
FeatureFeature
SecuritySecurity
ThreatsThreats
How Many ‘Chat’ Messenging Services
Exist On THE Information SUPER
Highway?
Hundreds If Not Thousands of Messaging Options
All Available On Your Childs Smartphones
Well Known Voice Call Apps Include A Chat Option
A Small Sample Of 52 Chat Options
Source: Wikipedia 2014
Have Open Discussions
With Your Child
Get To Know What Chat
Apps They Have Installed
Advise All Family
Members Of Threats
Subscribe To Cyber
Guardians Online Blog
Share CGOL Updates With
Your Children
Monitor Activity
Be Aware Of Changes In
Behaviour
Have Blackout Bans After
9pm Or An Agreed Time
Out Each Day
The Three Do’s
Communication Education Monitor
Chat Alert Update ‘Firechat’
• Firechat is a hyperlocal tool
• Allows Smartphone's to connect to each other directly
• Two devices or a bunch of devices must be within a small
space to connect via Bluetooth
• Imagine a large football stadium, all it would possibly take
is 100 or so to be spread around the stadium and all persons
could engage in an offline chat.
• Small towns can have predators searching the streets for
active chats
• Operates without Wifi
Questions?
More Information?
Cyber Guardians Online
bradleydeacon@me.com
@bradleywdeacon
bradleywdeacon
Cyber Guardians Online

Mais conteúdo relacionado

Mais procurados

Communicatio Skills
Communicatio  Skills Communicatio  Skills
Communicatio Skills SanaRiaz789
 
Privacy and social media
Privacy and social mediaPrivacy and social media
Privacy and social mediaAbirAhmed48
 
Computer Infections
Computer InfectionsComputer Infections
Computer Infectionserowell
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
Web Yourself Sew 2009
Web Yourself Sew 2009Web Yourself Sew 2009
Web Yourself Sew 2009Maegan.Slaten
 
Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyankoSergiy Sydoriv
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Basics Of Internet
Basics Of InternetBasics Of Internet
Basics Of InternetGurus Online
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics WebinarTechSoup
 

Mais procurados (19)

Communicatio Skills
Communicatio  Skills Communicatio  Skills
Communicatio Skills
 
Privacy and social media
Privacy and social mediaPrivacy and social media
Privacy and social media
 
Computer Infections
Computer InfectionsComputer Infections
Computer Infections
 
Mobile security
Mobile securityMobile security
Mobile security
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Web Yourself Sew 2009
Web Yourself Sew 2009Web Yourself Sew 2009
Web Yourself Sew 2009
 
Riza 9 a
Riza   9 aRiza   9 a
Riza 9 a
 
Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyanko
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Basics Of Internet
Basics Of InternetBasics Of Internet
Basics Of Internet
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 

Destaque

Grow Your Business With A Hash #
Grow Your Business  With A Hash #Grow Your Business  With A Hash #
Grow Your Business With A Hash #Bradley W. Deacon
 
The Rise of Instant Messaging
The Rise of Instant MessagingThe Rise of Instant Messaging
The Rise of Instant MessagingFlorian Nt
 
Instant messaging-final
Instant messaging-finalInstant messaging-final
Instant messaging-finalroutbisu
 
Instant Messaging apps market analysis
Instant Messaging apps market analysisInstant Messaging apps market analysis
Instant Messaging apps market analysisCorentin Metgy
 
Holographic data storage presentation
Holographic data storage presentationHolographic data storage presentation
Holographic data storage presentationPrashant Kumar
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet ProtocolsAnil Neupane
 
History of Computers
History of ComputersHistory of Computers
History of Computersmshihab
 
Instant messaging tech scet
Instant messaging tech scetInstant messaging tech scet
Instant messaging tech scetpankaj gamit
 

Destaque (11)

Grow Your Business With A Hash #
Grow Your Business  With A Hash #Grow Your Business  With A Hash #
Grow Your Business With A Hash #
 
The Rise of Instant Messaging
The Rise of Instant MessagingThe Rise of Instant Messaging
The Rise of Instant Messaging
 
Instant messaging-final
Instant messaging-finalInstant messaging-final
Instant messaging-final
 
Instant Messaging Trends & Practice
Instant Messaging Trends & PracticeInstant Messaging Trends & Practice
Instant Messaging Trends & Practice
 
Instant Messaging apps market analysis
Instant Messaging apps market analysisInstant Messaging apps market analysis
Instant Messaging apps market analysis
 
Instant Messaging
Instant MessagingInstant Messaging
Instant Messaging
 
Holographic data storage presentation
Holographic data storage presentationHolographic data storage presentation
Holographic data storage presentation
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Instant messaging
Instant messaging Instant messaging
Instant messaging
 
History of Computers
History of ComputersHistory of Computers
History of Computers
 
Instant messaging tech scet
Instant messaging tech scetInstant messaging tech scet
Instant messaging tech scet
 

Semelhante a A Parents Guide To Instant Messaging and Chat Options 2014

Emily s chapter_three_presentation
Emily s chapter_three_presentationEmily s chapter_three_presentation
Emily s chapter_three_presentationEmilyFoley257
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineTodd Stanfield
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet SafelyJoanne Hewitt
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf toolsMarc Vael
 
Kytnawwa 091117173759-phpapp01
Kytnawwa 091117173759-phpapp01Kytnawwa 091117173759-phpapp01
Kytnawwa 091117173759-phpapp01Tsahai Thomas
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 
Social media powerpoint presentation
Social media powerpoint presentationSocial media powerpoint presentation
Social media powerpoint presentationSlideegg
 
Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...AIRCC Publishing Corporation
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
socialmediapowerpointpresentation-190930121315 (1).pptx
socialmediapowerpointpresentation-190930121315 (1).pptxsocialmediapowerpointpresentation-190930121315 (1).pptx
socialmediapowerpointpresentation-190930121315 (1).pptxDipeshYadav59
 
Andrew Perlman's presentation at eComm 2008
Andrew Perlman's presentation at eComm 2008Andrew Perlman's presentation at eComm 2008
Andrew Perlman's presentation at eComm 2008eComm2008
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 

Semelhante a A Parents Guide To Instant Messaging and Chat Options 2014 (20)

Emily s chapter_three_presentation
Emily s chapter_three_presentationEmily s chapter_three_presentation
Emily s chapter_three_presentation
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe Online
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet Safely
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
Kytnawwa 091117173759-phpapp01
Kytnawwa 091117173759-phpapp01Kytnawwa 091117173759-phpapp01
Kytnawwa 091117173759-phpapp01
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Social media powerpoint presentation
Social media powerpoint presentationSocial media powerpoint presentation
Social media powerpoint presentation
 
Worldnoor ppt
Worldnoor pptWorldnoor ppt
Worldnoor ppt
 
Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...
 
User wareness
User warenessUser wareness
User wareness
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
socialmediapowerpointpresentation-190930121315 (1).pptx
socialmediapowerpointpresentation-190930121315 (1).pptxsocialmediapowerpointpresentation-190930121315 (1).pptx
socialmediapowerpointpresentation-190930121315 (1).pptx
 
Andrew Perlman's presentation at eComm 2008
Andrew Perlman's presentation at eComm 2008Andrew Perlman's presentation at eComm 2008
Andrew Perlman's presentation at eComm 2008
 
INTERNET SERVICES.pptx
INTERNET SERVICES.pptxINTERNET SERVICES.pptx
INTERNET SERVICES.pptx
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 

Mais de Bradley W. Deacon

Social media and defamation law (watermarked)
Social media and defamation law (watermarked) Social media and defamation law (watermarked)
Social media and defamation law (watermarked) Bradley W. Deacon
 
Grow Your Business With Pinterest
Grow Your Business With PinterestGrow Your Business With Pinterest
Grow Your Business With PinterestBradley W. Deacon
 
Social Media Training Pinterest (7/2014)
Social Media Training Pinterest (7/2014)Social Media Training Pinterest (7/2014)
Social Media Training Pinterest (7/2014)Bradley W. Deacon
 
Communication Skills Learning Styles In A Justice Environment
Communication Skills Learning Styles In A Justice Environment Communication Skills Learning Styles In A Justice Environment
Communication Skills Learning Styles In A Justice Environment Bradley W. Deacon
 
One Bad Tweet & Or Post & %$#@
One Bad Tweet & Or Post & %$#@One Bad Tweet & Or Post & %$#@
One Bad Tweet & Or Post & %$#@Bradley W. Deacon
 
Parents Guide To Social Media Sites Dangers & How Children & Adults Interact
Parents Guide To Social Media Sites Dangers & How Children & Adults InteractParents Guide To Social Media Sites Dangers & How Children & Adults Interact
Parents Guide To Social Media Sites Dangers & How Children & Adults InteractBradley W. Deacon
 

Mais de Bradley W. Deacon (15)

Darknet (ec)
Darknet (ec) Darknet (ec)
Darknet (ec)
 
Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
 
Social media and defamation law (watermarked)
Social media and defamation law (watermarked) Social media and defamation law (watermarked)
Social media and defamation law (watermarked)
 
Online Contracting
Online ContractingOnline Contracting
Online Contracting
 
Twitter For Everyone
Twitter For EveryoneTwitter For Everyone
Twitter For Everyone
 
Pinterest for everyone
Pinterest for everyonePinterest for everyone
Pinterest for everyone
 
#SeizeTheDay
#SeizeTheDay #SeizeTheDay
#SeizeTheDay
 
Instagram For Everyone
Instagram For EveryoneInstagram For Everyone
Instagram For Everyone
 
Tweet Beam Explained
Tweet Beam Explained Tweet Beam Explained
Tweet Beam Explained
 
Grow Your Business With Pinterest
Grow Your Business With PinterestGrow Your Business With Pinterest
Grow Your Business With Pinterest
 
Social Media Training Pinterest (7/2014)
Social Media Training Pinterest (7/2014)Social Media Training Pinterest (7/2014)
Social Media Training Pinterest (7/2014)
 
Communication Skills Learning Styles In A Justice Environment
Communication Skills Learning Styles In A Justice Environment Communication Skills Learning Styles In A Justice Environment
Communication Skills Learning Styles In A Justice Environment
 
One Bad Tweet & Or Post & %$#@
One Bad Tweet & Or Post & %$#@One Bad Tweet & Or Post & %$#@
One Bad Tweet & Or Post & %$#@
 
Bitcoin A General Overview
Bitcoin A General Overview Bitcoin A General Overview
Bitcoin A General Overview
 
Parents Guide To Social Media Sites Dangers & How Children & Adults Interact
Parents Guide To Social Media Sites Dangers & How Children & Adults InteractParents Guide To Social Media Sites Dangers & How Children & Adults Interact
Parents Guide To Social Media Sites Dangers & How Children & Adults Interact
 

Último

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 

Último (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

A Parents Guide To Instant Messaging and Chat Options 2014

  • 1. 1 Instant Messaging Chat Options A Parents Awareness Guide 2014
  • 2. Abbreviated IM, a type of communications service that enables you to create a kind of private chat room with another individual in order to communicate in real time over the Internet Typically, the instant messaging system alerts you whenever somebody on your private list is online. You can then initiate a chat session with that person. Most IM systems currently do not support such security staples as authentication and encryption. Some IM’s actually send chats in plaintext, so anyone on the same Wi-Fi network can easily pull your entire conversation - including pictures and videos - straight out of the air. Instant Messaging DefinitionDefinition FeatureFeature SecuritySecurity ThreatsThreats
  • 3. How Many ‘Chat’ Messenging Services
  • 4. Exist On THE Information SUPER Highway?
  • 5. Hundreds If Not Thousands of Messaging Options
  • 6. All Available On Your Childs Smartphones
  • 7. Well Known Voice Call Apps Include A Chat Option
  • 8. A Small Sample Of 52 Chat Options Source: Wikipedia 2014
  • 9. Have Open Discussions With Your Child Get To Know What Chat Apps They Have Installed Advise All Family Members Of Threats Subscribe To Cyber Guardians Online Blog Share CGOL Updates With Your Children Monitor Activity Be Aware Of Changes In Behaviour Have Blackout Bans After 9pm Or An Agreed Time Out Each Day The Three Do’s Communication Education Monitor
  • 10. Chat Alert Update ‘Firechat’ • Firechat is a hyperlocal tool • Allows Smartphone's to connect to each other directly • Two devices or a bunch of devices must be within a small space to connect via Bluetooth • Imagine a large football stadium, all it would possibly take is 100 or so to be spread around the stadium and all persons could engage in an offline chat. • Small towns can have predators searching the streets for active chats • Operates without Wifi
  • 11. Questions? More Information? Cyber Guardians Online bradleydeacon@me.com @bradleywdeacon bradleywdeacon Cyber Guardians Online