Flylib.com
Look Both Ways: Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
ISBN: 0735623473
EAN: 2147483647
Year: 2004
Pages: 157
Authors:
Linda Criddle
BUY ON AMAZON
Look Both Ways: Help Protect Your Family on the Internet
Table of Contents
Copyright
Praise for Look Both Ways ...
Acknowledgments
Introduction
Quick Safety Checklist
Part One: Understanding the Risks
Chapter One. The Landscape of Risk
What s Going On Out There?
How Are You Putting Yourself at Risk?
What Can You Do?
What s Next?
Chapter Two. Misperceptions About Online Anonymity
Leaving a Trail of Clues
The Lure of Anonymity
How Predators Use Anonymity
What Can You Do?
Chapter Three. Thinking Like the Enemy: Predatory Behavior
Knowing the Enemy
Recognizing Sexual Predators, Offline and On
How Predators Choose Their Victims
The Victim Grooming Process
Who Is Not at Fault
Part Two: 13 Steps to Internet Security
Chapter Four. Step 1: Be Careful What You Show People
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Five. Step 2: Don t Tell People More Than You Should
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Six. Step 3: Be Alert to How Predators Prey on Emotions
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Seven. Step 4: Don t Let Them Know Where You Live
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Eight. Step 5: Don t Expose Yourself Through Instant Messaging
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Nine. Step 6: Reduce Your Vulnerability When Blogging
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Ten. Step 7: Understand Risks of Fraudulent Communications and Protect Yourself
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Eleven. Step 8: Date Safely Online
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Twelve. Step 9: Don t Browse Indiscriminately
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Thirteen. Step 10: Use Common Sense When Gaming with Others
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Fourteen. Step 11: Get Savvy About Financial Scams and Fraud
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Fifteen. Step 12: Don t Let Your Defenses Down When Using Mobile Devices
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Sixteen. Step 13: Act to Avoid Harassment and Bullying
What Just Happened?
Assessing the Risks
Protecting Yourself
Part Three: Get Going to Protect Yourself Today
Chapter Seventeen. Talking About Safety
Understanding the Safety Pacts You Make
Negotiating Safety
What You Should Know Before You Start the Discussion
Build the Framework for a Safer Environment
The Special Case for Social Networks
Chapter Eighteen. It Takes Everyone to Make a Safe Internet
What to Do If a Sexual Predator Is Victimizing Your Child
Report Abuse
What Your Online Service Can Do
How You Can Affect Laws Dealing with Online Abuse
Begin a New Internet Journey
Part Four: Resources
Helpful Terms
Technology Toolkit
Understanding the Types of Technology Available
Top Tips on Using Technology to Protect Yourself
Useful Web Sites for Finding Tools
Helpful Web Resources for Internet Safety
Safety Advice and Information
Recognizing Sexual Predators
Government Sites
Sites for Reporting Abuse
Kid-Oriented Sites
Common Messaging Shortcuts
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
W
XYZ
Selected References
About the Authors
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Z
Page #156 (Index)
Look Both Ways: Help Protect Your Family on the Internet
ISBN: 0735623473
EAN: 2147483647
Year: 2004
Pages: 157
Authors:
Linda Criddle
BUY ON AMAZON
Qshell for iSeries
The EDTF Text Editor
Input and Output
Application Development Tools
C and C++ Development Tools
Appendix A Summary of Changes by Release
Java How to Program (6th Edition) (How to Program (Deitel))
(Optional) GUI and Graphics Case Study: Creating Simple Drawings
Example: Handling ArithmeticExceptions and InputMismatchExceptions
Properties Class
Synchronized Collections
Using Menus with Frames
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The Microsoft Client Library for AJAX
The Pulsing Heart of ASP.NET AJAX
The AJAX Control Toolkit
Built-in Application Services
Building AJAX Applications with ASP.NET
GO! with Microsoft Office 2003 Brief (2nd Edition)
Word 2003
Concepts Assessments
Summary
GO! with Help
Objective 5. Copy Excel Data into a Word Document
Microsoft VBScript Professional Projects
Errors, Constants, and Variables
Mapping Network Printers and Disks
Scheduling Script Execution
Developing a Setup Script
Report Distribution and Remote Archive Management
File System Forensic Analysis
Summary
Bibliography
What is a File System?
Everything is a File
Bibliography
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies