Flylib.com
Look Both Ways: Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
ISBN: 0735623473
EAN: 2147483647
Year: 2004
Pages: 157
Authors:
Linda Criddle
BUY ON AMAZON
Look Both Ways: Help Protect Your Family on the Internet
Table of Contents
Copyright
Praise for Look Both Ways ...
Acknowledgments
Introduction
Quick Safety Checklist
Part One: Understanding the Risks
Chapter One. The Landscape of Risk
What s Going On Out There?
How Are You Putting Yourself at Risk?
What Can You Do?
What s Next?
Chapter Two. Misperceptions About Online Anonymity
Leaving a Trail of Clues
The Lure of Anonymity
How Predators Use Anonymity
What Can You Do?
Chapter Three. Thinking Like the Enemy: Predatory Behavior
Knowing the Enemy
Recognizing Sexual Predators, Offline and On
How Predators Choose Their Victims
The Victim Grooming Process
Who Is Not at Fault
Part Two: 13 Steps to Internet Security
Chapter Four. Step 1: Be Careful What You Show People
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Five. Step 2: Don t Tell People More Than You Should
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Six. Step 3: Be Alert to How Predators Prey on Emotions
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Seven. Step 4: Don t Let Them Know Where You Live
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Eight. Step 5: Don t Expose Yourself Through Instant Messaging
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Nine. Step 6: Reduce Your Vulnerability When Blogging
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Ten. Step 7: Understand Risks of Fraudulent Communications and Protect Yourself
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Eleven. Step 8: Date Safely Online
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Twelve. Step 9: Don t Browse Indiscriminately
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Thirteen. Step 10: Use Common Sense When Gaming with Others
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Fourteen. Step 11: Get Savvy About Financial Scams and Fraud
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Fifteen. Step 12: Don t Let Your Defenses Down When Using Mobile Devices
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Sixteen. Step 13: Act to Avoid Harassment and Bullying
What Just Happened?
Assessing the Risks
Protecting Yourself
Part Three: Get Going to Protect Yourself Today
Chapter Seventeen. Talking About Safety
Understanding the Safety Pacts You Make
Negotiating Safety
What You Should Know Before You Start the Discussion
Build the Framework for a Safer Environment
The Special Case for Social Networks
Chapter Eighteen. It Takes Everyone to Make a Safe Internet
What to Do If a Sexual Predator Is Victimizing Your Child
Report Abuse
What Your Online Service Can Do
How You Can Affect Laws Dealing with Online Abuse
Begin a New Internet Journey
Part Four: Resources
Helpful Terms
Technology Toolkit
Understanding the Types of Technology Available
Top Tips on Using Technology to Protect Yourself
Useful Web Sites for Finding Tools
Helpful Web Resources for Internet Safety
Safety Advice and Information
Recognizing Sexual Predators
Government Sites
Sites for Reporting Abuse
Kid-Oriented Sites
Common Messaging Shortcuts
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
W
XYZ
Selected References
About the Authors
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Z
Page #156 (Index)
Look Both Ways: Help Protect Your Family on the Internet
ISBN: 0735623473
EAN: 2147483647
Year: 2004
Pages: 157
Authors:
Linda Criddle
BUY ON AMAZON
VBScript Programmers Reference
Control of Flow
Error Handling and Debugging
Appendix A VBScript Functions and Keywords
Appendix C Coding Convention
Appendix D Visual Basic Constants Supported in VBScript
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Softkey Templates
Digital Signatures
Review Questions
Bulk Trace Analysis
Report Scheduling
MySQL Cookbook
Using mysql in Shell Scripts
Finding Dates for Days of the Current Week
Comparing a Table to Itself
Introduction
Appendix A. Obtaining MySQL Software
Information Dashboard Design: The Effective Visual Communication of Data
All That Glitters Is Not Gold
Even Dashboards Have a History
Arranging the Data Poorly
Highlighting Important Data Ineffectively or Not at All
Maintain Consistency for Quick and Accurate Interpretation
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Gaining Drawing Strategies: Part 1
Grouping Objects into Blocks
Dimensioning a Drawing
Using Layouts to Set Up a Print
Printing an AutoCAD Drawing
Comparing, Designing, and Deploying VPNs
Review Questions
Deploying IPsec Remote Access VPNs Using Preshared Key and Digital Signature Authentication
Review Questions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies