SlideShare uma empresa Scribd logo
1 de 2
Parents' Concerns on Children's Online Safety

Kids would rather advance to the net at home especially in summer vacation when they
are tired of doing sports or taking trips outside. At the same time, most parents do take
thought for the network security. And many of them begin to use a kind of Parental
monitoring program to prevent their children from Internet addiction. With the Internet,
kids are able to learn abundant knowledge with ease without taking curriculum at school,
which can rouse their motivation and interests for learning.

Whereas, the Internet is such a massive domain, child can be exposed to improper
contents, such as pornography, prejudice and force, this is really the cause of parents
anxiety, and periodically kids may unintentionally attacked by malicious software,
spyware, trojan, phishing websites causing computer shut-down, bank account cheating,
privacy divulge and even poison to your kids' mind. That's why parents use the Parental
control software to filter kids' online behavior and ensure network security for their kids.

A study has warned that eight out of ten children between the ages of ten and fifteen
advance to the net, posting personal profile in social networking sites like Google+,
Facebook, Twitter, MySpace and StumbleUpon, gossiping online via IM application like
MSN, Yahoo Messenger, ICQ, Gtalk and so on. One day, you fortuitously find loads of
non-acquaintance on your children's friend lists, these unknown persons are not
playmates, friends or family members, but people from all over the country. How do
those strangers find your child? As parents, you would firmly worry a lot. Are those
person pedophiles? Pedophiles are hiding out somewhere and kids are already targeted,
and they cannot realize the menace until parents indicate and tell them the risk of over
exposure of personal profile and the significance of self-protection.




Kids and teenagers also enjoy sharing files such as videos, audio, games, photos on the
Internet via Peer to Peer client, safety problems also exist because the IP address can be
found by the Internet hacker if you were not that lucky enough, and then their PC would
be remotely controlled by the hacker, the hacker can have free access to any documents
and any action of the computer once it is connected to the Internet.
As parents, what could you do?

1. Block you kids' access to the Internet
2. In windows OS, create a admin Account
3. Use parental control monitoring application to observe, and control kids' online actions

At present, there are lots of Parental monitoring programs that can be useful to guarantee
network security for kids. Most of these programs have the following features in
common:

1. Take screen snapshots in real-time.
2. Monitor and track sent & received Emails
3. View and shield instant message
4. Monitor and block website visiting

Ensuring online safety for your kids is parents' responsibility, every coin has two sides
while the Internet is a double-edged sword, Internet can bring your children lots of
benefits with affirmative and healthful contents and, as well, do damage to your kids.
Therefore, Parental Control can be helpful, and taking appropriate plans to protect kids
from network harms become more and more concernful in our life now.

Mais conteúdo relacionado

Destaque

031808 obama speech (romanian)
031808   obama speech (romanian)031808   obama speech (romanian)
031808 obama speech (romanian)VogelDenise
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetseSAT Publishing House
 
Savvy Management: Managing your social media presence
Savvy Management: Managing your social media presenceSavvy Management: Managing your social media presence
Savvy Management: Managing your social media presenceCourtney McDonald
 
Práctica 2 Portafolio de trabajo
Práctica 2 Portafolio de trabajoPráctica 2 Portafolio de trabajo
Práctica 2 Portafolio de trabajocanek13
 
Been there, done that septembre 2013
Been there, done that   septembre 2013Been there, done that   septembre 2013
Been there, done that septembre 2013Canan Taş
 
A comparative analysis of classification techniques on medical data sets
A comparative analysis of classification techniques on medical data setsA comparative analysis of classification techniques on medical data sets
A comparative analysis of classification techniques on medical data setseSAT Publishing House
 
Fife Conference Report - SDS Consortium Project Work
Fife Conference Report - SDS Consortium Project WorkFife Conference Report - SDS Consortium Project Work
Fife Conference Report - SDS Consortium Project Workarcscotland
 
Marketing In A Down Market
Marketing In A Down MarketMarketing In A Down Market
Marketing In A Down MarketJonathan_Fisher
 
Predarea Stafetei 5 C 1 A
Predarea Stafetei 5 C   1 APredarea Stafetei 5 C   1 A
Predarea Stafetei 5 C 1 Aguest8d4ebc
 
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...Gianfranco Conti
 

Destaque (14)

Höstaktiviteter av Ingemar Pongratz
Höstaktiviteter av Ingemar PongratzHöstaktiviteter av Ingemar Pongratz
Höstaktiviteter av Ingemar Pongratz
 
Diskaun 10% PTPTN
Diskaun 10% PTPTNDiskaun 10% PTPTN
Diskaun 10% PTPTN
 
031808 obama speech (romanian)
031808   obama speech (romanian)031808   obama speech (romanian)
031808 obama speech (romanian)
 
Functional testing
Functional testingFunctional testing
Functional testing
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manets
 
Savvy Management: Managing your social media presence
Savvy Management: Managing your social media presenceSavvy Management: Managing your social media presence
Savvy Management: Managing your social media presence
 
Práctica 2 Portafolio de trabajo
Práctica 2 Portafolio de trabajoPráctica 2 Portafolio de trabajo
Práctica 2 Portafolio de trabajo
 
Been there, done that septembre 2013
Been there, done that   septembre 2013Been there, done that   septembre 2013
Been there, done that septembre 2013
 
A comparative analysis of classification techniques on medical data sets
A comparative analysis of classification techniques on medical data setsA comparative analysis of classification techniques on medical data sets
A comparative analysis of classification techniques on medical data sets
 
Ana Nagherneac: Ghidul Bibliografului
Ana Nagherneac: Ghidul Bibliografului Ana Nagherneac: Ghidul Bibliografului
Ana Nagherneac: Ghidul Bibliografului
 
Fife Conference Report - SDS Consortium Project Work
Fife Conference Report - SDS Consortium Project WorkFife Conference Report - SDS Consortium Project Work
Fife Conference Report - SDS Consortium Project Work
 
Marketing In A Down Market
Marketing In A Down MarketMarketing In A Down Market
Marketing In A Down Market
 
Predarea Stafetei 5 C 1 A
Predarea Stafetei 5 C   1 APredarea Stafetei 5 C   1 A
Predarea Stafetei 5 C 1 A
 
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...
 

Último

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Parents' concerns on children's online safety

  • 1. Parents' Concerns on Children's Online Safety Kids would rather advance to the net at home especially in summer vacation when they are tired of doing sports or taking trips outside. At the same time, most parents do take thought for the network security. And many of them begin to use a kind of Parental monitoring program to prevent their children from Internet addiction. With the Internet, kids are able to learn abundant knowledge with ease without taking curriculum at school, which can rouse their motivation and interests for learning. Whereas, the Internet is such a massive domain, child can be exposed to improper contents, such as pornography, prejudice and force, this is really the cause of parents anxiety, and periodically kids may unintentionally attacked by malicious software, spyware, trojan, phishing websites causing computer shut-down, bank account cheating, privacy divulge and even poison to your kids' mind. That's why parents use the Parental control software to filter kids' online behavior and ensure network security for their kids. A study has warned that eight out of ten children between the ages of ten and fifteen advance to the net, posting personal profile in social networking sites like Google+, Facebook, Twitter, MySpace and StumbleUpon, gossiping online via IM application like MSN, Yahoo Messenger, ICQ, Gtalk and so on. One day, you fortuitously find loads of non-acquaintance on your children's friend lists, these unknown persons are not playmates, friends or family members, but people from all over the country. How do those strangers find your child? As parents, you would firmly worry a lot. Are those person pedophiles? Pedophiles are hiding out somewhere and kids are already targeted, and they cannot realize the menace until parents indicate and tell them the risk of over exposure of personal profile and the significance of self-protection. Kids and teenagers also enjoy sharing files such as videos, audio, games, photos on the Internet via Peer to Peer client, safety problems also exist because the IP address can be found by the Internet hacker if you were not that lucky enough, and then their PC would be remotely controlled by the hacker, the hacker can have free access to any documents and any action of the computer once it is connected to the Internet.
  • 2. As parents, what could you do? 1. Block you kids' access to the Internet 2. In windows OS, create a admin Account 3. Use parental control monitoring application to observe, and control kids' online actions At present, there are lots of Parental monitoring programs that can be useful to guarantee network security for kids. Most of these programs have the following features in common: 1. Take screen snapshots in real-time. 2. Monitor and track sent & received Emails 3. View and shield instant message 4. Monitor and block website visiting Ensuring online safety for your kids is parents' responsibility, every coin has two sides while the Internet is a double-edged sword, Internet can bring your children lots of benefits with affirmative and healthful contents and, as well, do damage to your kids. Therefore, Parental Control can be helpful, and taking appropriate plans to protect kids from network harms become more and more concernful in our life now.