Look Both Ways Help Protect Your Family on the Internet
Your parents taught you to look both ways before crossing the street. Now, learn the rules of the road-and help protect yourself online with Internet child-safety authority Linda Criddle. Using real-life examples, Linda teaches the simple steps you and your family can take to help identify and avoi...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Sebastopol :
Microsoft Press
2006.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627111206719 |
Tabla de Contenidos:
- Cover; Copyright Page; Praise for Look Both Ways . . .; Acknowledgments; Table of Contents; Introduction; Is This Book for You?; Start with a Technology Base; How This Book Is Organized; Special Elements; How to Get the Most from This Book; Quick Safety Checklist; Part One: Understanding the Risks; Chapter 1: The Landscape of Risk; What's Going On Out There?; Who Are These Cybercriminals?; Who's Vulnerable?; How Big Is the Problem?; How Are You Putting Yourself at Risk?; What Can You Do?; Making the Internet Safer for Your Family; Taking the First Step; You Are Not Alone; What's Next?
- Chapter 2: Misperceptions About Online AnonymityLeaving a Trail of Clues; The Lure of Anonymity; How Predators Use Anonymity; What Can You Do?; Chapter 3: Thinking Like the Enemy: Predatory Behavior; Knowing the Enemy; Recognizing Sexual Predators, Offline and On; How Predators Choose Their Victims; The Victim Grooming Process; Who Is Not at Fault; A Special Note About Sensitivity to Victims of Sexual Abuse; Part Two: 13 Steps to Internet Security; Chapter 4: Step 1: Be Careful What You Show People; What Just Happened?; Assessing the Risks; What Forms of Visual Information Put You at Risk?
- Protecting YourselfChapter 5: Step 2: Don't Tell People More Than You Should; What Just Happened?; What Is Social Networking?; Assessing the Risks; Protecting Yourself; Chapter 6: Step 3: Be Alert to How Predators Prey on Emotions; What Just Happened?; Assessing the Risks; Protecting Yourself; Watch Your Own Behavior; Looking for Telltale Signs; Getting the Message Across to Your Kids; Chapter 7: Step 4: Don't Let Them Know Where You Live; What Just Happened?; Assessing the Risks; Why Do They Care Where You Live?; Location Application Dangers; Technology Makes Finding You Easier
- Protecting YourselfChapter 8: Step 5: Don't Expose Yourself Through Instant Messaging; What Just Happened?; What Is Instant Messaging?; Assessing the Risks; Protecting Yourself; Chapter 9: Step 6: Reduce Your Vulnerability When Blogging; What Just Happened?; What Is a Blog?; Assessing the Risks; The Blogging Phenomenon; Criminals and Blogs; The Information Connection; What You Expose About Yourself and Others; Who's Most at Risk?; When Spam Meets Blog: Spam + Blog = Splog; Protecting Yourself; Don't Overreact; Knowing How Information Adds Up; Taking Steps for Safety
- Be Aware of What Your Friends Are Saying About YouChapter 10: Step 7: Understand Risks of Fraudulent Communications and Protect Yourself; What Just Happened?; What Is Spooling?; What Is Spam?; Assessing the Risks; Telltale Signs of Spam Scams; Facing the Fraud; Communicating Safely; Protecting Yourself; Taking the First Steps; Avoiding Incoming Threats; Chapter 11: Step 8: Date Safely Online; What Just Happened?; Assessing the Risks; Protecting Yourself; Chapter 12: Step 9: Don't Browse Indiscriminately; What Just Happened?; What Are Parental Controls?; Assessing the Risks
- Taking a Closer Look at the World of Online Pornography