SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
Safe Internet
SUMAIYA ISMAIL
ID-
COURSE CODE: ART-203
PROGRAM: BCSE
1
Abstract
The Internet is by now embedded in daily life. In our personal
lives and in our society. It is an irreversible technology. But in
relatively short existence it has created many issues concerning
security and safety. These include issues towards personal
information and theft and misuse thereof, and specific risks
towards children like online bullying and grooming. To raise
public awareness into safe Internet use, campaigns have
emerged. However, research shows that the effects of these
campaigns prove to be hard to realize.
2
Introduction
 Without the virtues and possibilities of internet life cannot
be imagined.
 The fast rise of internet also created many debates
regarding safety and security issues.
 The effectiveness of campaigns is being questioned.
 Internet is being used by teenagers and children, so
internet safety should be maintained.
3
Literature Review
 The Internet presents a world of opportunities for children and
adolescents, but it also threatens communities with inappropriate
content, cyberbullying among peers, and online predators –
whether that is via connection to the Internet at home, in a
cybercafé, or by Smartphone.
 Various websites have been created for the purpose of making
users aware of Internet safety. Many governments throughout
Europe, large banks and ICT companies, and other organisations
have created websites that provide information and guidance on
Internet safety. For example the EU website Safer Internet
Programme, the safety section on the Dutch banks ING website,
and MicroSoft's Safety & Security Centre.
4
Internet Safety Tips
When we use a social networking site, we should look at the site
together or search for it ourselves online.
We should not to post a full name, address, phone number, school
name and other personal information that could help a stranger to
find them.
We should learn about privacy settings that allow kids to choose
who can view their profiles.
When it comes to Internet safety, there's no substitute for parental
supervision. Put your computer in a common area of your home,
not a child's bedroom, so you can keep an eye on online
activities.
5
Result
It is important to identify which preventive strategies and programs are most effective in discouraging
cyberbullying and Internet aggression by youth. Further, there is not yet a clear understanding of the
demographic factors (gender, age, socioeconomic status, and race, etc.) associated with likelihood of
becoming a cyberbully or cyber victim. Research in this realm could help communities design more
individualized and effective prevention programs. These could include home-, school-, or community-based
strategies. The measures taken by adults (parents, educators, and government employees) to safeguard youth
from online risks often include:
 monitoring youth (through online technologies and software, or in-person supervision)
 educating youth about potential risks
 attempting to teach appropriate online behaviors.
It should be concluded that future education models and guiding principles must: “be developed in
partnership with young people, and acknowledge their expertise; be experiential as opposed to didactic;
combine online and face-to-face delivery; have scope to meet the specific technical skills needs of adults, as
well as providing capacity for high level conversations about the socio-cultural dimensions of young
people’s technology use; and be flexible and iterative so that they can keep pace with the emergence of new
online and networked media technologies and practices
6
7Discussion
Based on the evaluation of this literature revierized as at-risk when online. Although there
are many benefits to children and adolescents using the Internet for learning or improving
skills, there is obviously a need for regulation or restrictions on the sites they are
accessing and the amount of personal information they are providing to ‘friends’ or
‘relationships’ forged online. Without cautionary guidelines for children who go online,
there is an increased probability that they will experience exposure to some sort of
exploitation during their usage. With children and adolescents accessing the Internet
unsupervised for lengthy periods of time every day (118), further research needs to be
conducted on how many children are actually aware of the dangers of sexual predators
online or are aware of the consequences of sending sexually explicit photographs of
themselves via the World Wide Web (119). At the least, Member States should consider
fostering awareness of the risks of sending personal information and photos online
through school curricula and/or meetings between parents and teachers.
Conclusion
Adults are increasingly spending their discretionary time on the Internet, and
children and adolescents ” spend more time with media than they do in any
other activity except for sleeping” . However, because of the easy and often
private access to children that the Internet offers, it has provided a new
medium through which child exploitation, child maltreatment, and sexual
and emotional abuse can propagate. Broadly speaking, the Internet gives
child predators instant access to a large group of potential victims, as well as
the opportunity to create their own ‘communities’ to exchange ideas and
reinforce their prurient desires.
So we should have awareness of safe Internet.
8

Mais conteúdo relacionado

Mais procurados

BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
emilyensign
 
Communication Technology For Lifespan Communication
Communication Technology For Lifespan CommunicationCommunication Technology For Lifespan Communication
Communication Technology For Lifespan Communication
D.J.Mann
 
Digital life
Digital lifeDigital life
Digital life
bobirv
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
Grant Ward
 

Mais procurados (20)

Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
Protection of Students Online
Protection of Students Online Protection of Students Online
Protection of Students Online
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
Communication Technology For Lifespan Communication
Communication Technology For Lifespan CommunicationCommunication Technology For Lifespan Communication
Communication Technology For Lifespan Communication
 
Digital life
Digital lifeDigital life
Digital life
 
Social Media Policy for our School District
Social Media Policy for our School DistrictSocial Media Policy for our School District
Social Media Policy for our School District
 
Introduction to Cybersafety
Introduction to CybersafetyIntroduction to Cybersafety
Introduction to Cybersafety
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
 
The 6 Pillars of Digital Citizenship Success
The 6 Pillars of Digital Citizenship SuccessThe 6 Pillars of Digital Citizenship Success
The 6 Pillars of Digital Citizenship Success
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhat
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 

Semelhante a Safe Internet (Art 203)

Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
ITIIIndustries
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
ronak56
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
Thomas Müller
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
Heather Dionne
 
Parent meeting
Parent meetingParent meeting
Parent meeting
lightb
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
Does the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docxDoes the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docx
jacksnathalie
 
Unit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxUnit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docx
marilucorr
 

Semelhante a Safe Internet (Art 203) (20)

Cybersafey
Cybersafey Cybersafey
Cybersafey
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...
CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...
CREATING COMPUTER CONFIDENCE : AN INVESTIGATION INTO CURRENT PRIVACY AND SECU...
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
Guia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefGuia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / Unicef
 
Being safe online guidelines
Being safe online guidelinesBeing safe online guidelines
Being safe online guidelines
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
SEG AT2.pptx
SEG AT2.pptxSEG AT2.pptx
SEG AT2.pptx
 
Ict and communication
Ict and communicationIct and communication
Ict and communication
 
A 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseA 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible Use
 
Does the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docxDoes the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docx
 
Unit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxUnit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docx
 
CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...
 
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxSafeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
 

Mais de Sumaiya Ismail

Mais de Sumaiya Ismail (17)

Portfolio sumaiya ismail
Portfolio sumaiya ismailPortfolio sumaiya ismail
Portfolio sumaiya ismail
 
Role of chemistry in cse
Role of chemistry in cseRole of chemistry in cse
Role of chemistry in cse
 
Online resort reservation system report (practicum)
Online resort reservation system report (practicum)Online resort reservation system report (practicum)
Online resort reservation system report (practicum)
 
Comparative study of microprocessor perspective of historical preference
Comparative study of microprocessor perspective of historical preferenceComparative study of microprocessor perspective of historical preference
Comparative study of microprocessor perspective of historical preference
 
Job description Format
Job description FormatJob description Format
Job description Format
 
Stuxnet, a malicious computer worm
Stuxnet, a malicious computer wormStuxnet, a malicious computer worm
Stuxnet, a malicious computer worm
 
Cover letter
Cover letterCover letter
Cover letter
 
Products with chemical elements (chm 117)
Products with chemical elements (chm 117)Products with chemical elements (chm 117)
Products with chemical elements (chm 117)
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Comparison and contrast on studying at north south university campus and stud...
Comparison and contrast on studying at north south university campus and stud...Comparison and contrast on studying at north south university campus and stud...
Comparison and contrast on studying at north south university campus and stud...
 
Food ordering system for red bangladesh course system ananlysis
Food ordering system for red bangladesh course system ananlysisFood ordering system for red bangladesh course system ananlysis
Food ordering system for red bangladesh course system ananlysis
 
Landslide monitoring using wireless sensor network
Landslide monitoring using wireless sensor networkLandslide monitoring using wireless sensor network
Landslide monitoring using wireless sensor network
 
Food ordering system for red bd csc 397
Food ordering system for red bd csc 397Food ordering system for red bd csc 397
Food ordering system for red bd csc 397
 
CSC 347 – Computer Hardware and Maintenance
CSC 347 – Computer Hardware and MaintenanceCSC 347 – Computer Hardware and Maintenance
CSC 347 – Computer Hardware and Maintenance
 
Internet
InternetInternet
Internet
 
Strategies of improving Communication between University & Students
Strategies of improving Communication between  University & Students Strategies of improving Communication between  University & Students
Strategies of improving Communication between University & Students
 
Spelling Bee Competition Slide for school
Spelling Bee Competition Slide for schoolSpelling Bee Competition Slide for school
Spelling Bee Competition Slide for school
 

Último

Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 

Último (20)

Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 

Safe Internet (Art 203)

  • 1. Safe Internet SUMAIYA ISMAIL ID- COURSE CODE: ART-203 PROGRAM: BCSE 1
  • 2. Abstract The Internet is by now embedded in daily life. In our personal lives and in our society. It is an irreversible technology. But in relatively short existence it has created many issues concerning security and safety. These include issues towards personal information and theft and misuse thereof, and specific risks towards children like online bullying and grooming. To raise public awareness into safe Internet use, campaigns have emerged. However, research shows that the effects of these campaigns prove to be hard to realize. 2
  • 3. Introduction  Without the virtues and possibilities of internet life cannot be imagined.  The fast rise of internet also created many debates regarding safety and security issues.  The effectiveness of campaigns is being questioned.  Internet is being used by teenagers and children, so internet safety should be maintained. 3
  • 4. Literature Review  The Internet presents a world of opportunities for children and adolescents, but it also threatens communities with inappropriate content, cyberbullying among peers, and online predators – whether that is via connection to the Internet at home, in a cybercafé, or by Smartphone.  Various websites have been created for the purpose of making users aware of Internet safety. Many governments throughout Europe, large banks and ICT companies, and other organisations have created websites that provide information and guidance on Internet safety. For example the EU website Safer Internet Programme, the safety section on the Dutch banks ING website, and MicroSoft's Safety & Security Centre. 4
  • 5. Internet Safety Tips When we use a social networking site, we should look at the site together or search for it ourselves online. We should not to post a full name, address, phone number, school name and other personal information that could help a stranger to find them. We should learn about privacy settings that allow kids to choose who can view their profiles. When it comes to Internet safety, there's no substitute for parental supervision. Put your computer in a common area of your home, not a child's bedroom, so you can keep an eye on online activities. 5
  • 6. Result It is important to identify which preventive strategies and programs are most effective in discouraging cyberbullying and Internet aggression by youth. Further, there is not yet a clear understanding of the demographic factors (gender, age, socioeconomic status, and race, etc.) associated with likelihood of becoming a cyberbully or cyber victim. Research in this realm could help communities design more individualized and effective prevention programs. These could include home-, school-, or community-based strategies. The measures taken by adults (parents, educators, and government employees) to safeguard youth from online risks often include:  monitoring youth (through online technologies and software, or in-person supervision)  educating youth about potential risks  attempting to teach appropriate online behaviors. It should be concluded that future education models and guiding principles must: “be developed in partnership with young people, and acknowledge their expertise; be experiential as opposed to didactic; combine online and face-to-face delivery; have scope to meet the specific technical skills needs of adults, as well as providing capacity for high level conversations about the socio-cultural dimensions of young people’s technology use; and be flexible and iterative so that they can keep pace with the emergence of new online and networked media technologies and practices 6
  • 7. 7Discussion Based on the evaluation of this literature revierized as at-risk when online. Although there are many benefits to children and adolescents using the Internet for learning or improving skills, there is obviously a need for regulation or restrictions on the sites they are accessing and the amount of personal information they are providing to ‘friends’ or ‘relationships’ forged online. Without cautionary guidelines for children who go online, there is an increased probability that they will experience exposure to some sort of exploitation during their usage. With children and adolescents accessing the Internet unsupervised for lengthy periods of time every day (118), further research needs to be conducted on how many children are actually aware of the dangers of sexual predators online or are aware of the consequences of sending sexually explicit photographs of themselves via the World Wide Web (119). At the least, Member States should consider fostering awareness of the risks of sending personal information and photos online through school curricula and/or meetings between parents and teachers.
  • 8. Conclusion Adults are increasingly spending their discretionary time on the Internet, and children and adolescents ” spend more time with media than they do in any other activity except for sleeping” . However, because of the easy and often private access to children that the Internet offers, it has provided a new medium through which child exploitation, child maltreatment, and sexual and emotional abuse can propagate. Broadly speaking, the Internet gives child predators instant access to a large group of potential victims, as well as the opportunity to create their own ‘communities’ to exchange ideas and reinforce their prurient desires. So we should have awareness of safe Internet. 8