Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] padlock icons Paint application Pan European Game Information (PEGI) parental controls 2nd 3rd 4th parents credit history developing Internet guidelines for children developing safe behavior infrastructure discussing blog safety guidelines discussing bullying discussing safety guidelines with children enforcing safety guidelines experiencing online world with children handling fault, guilt, and blame issues 2nd 3rd limiting Internet access times for family 2nd providing safety education providing support after incidents reporting abuse or sexual predators reviewing blog comments with children taking action against sexual predators understanding alienation mechanisms partners, levels of safety and passwords cell phones requests for 2nd revealing in instant messages storing automatically theft of patches for software payment methods PayPal PDAs (personal digital assistants) 2nd 3rd peer-to-peer sharing 2nd PEGI (Pan European Game Information) PEGI/BBFC (British Board of Film Classification) permissions on blogs personal checks personal digital assistants (PDAs) 2nd 3rd personal meetings [See face-to-face meetings] personal photos [See photos] personally identifiable information anonymity and asking for, in spam bullying or harassment and commodity value of guidelines for sharing levels of sharing and 2nd revealing in blogs 2nd 3rd 4th revealing in instant messages revealing in interactive games revealing in online dating sites revealing online 2nd 3rd stolen cell phones or mobile devices theft of trails of clues in personas Pew Internet & American Life Project 2nd 3rd phishing charity fraud defined 2nd handling phishing e-mail incidence of fraud and phony online banking scams phony Web sites 2nd redirecting URLs reporting spotting 2nd phone calls [See telephone calls] phone numbers [See telephone numbers] phony Web sites avoiding charity fraud membership information misspelled URLs phony online banking scams redirecting URLs spotting photos cell phones and 2nd choosing for dating profiles digitally manipulated 2nd 3rd image-editing programs 2nd immortality of levels of sharing and 2nd location clues in negative images permission for posting posting online 2nd 3rd reporting inappropriate postings revealing information in captions risks of posting 2nd satellite images 2nd sending in instant messages sent by predators sharing stolen and modified visual clues in Photoshop physical appearance 2nd 3rd physical contact [See also face-to-face meetings] PII [See personally identifiable information] PIN numbers police 2nd 3rd pop-up blockers 2nd pornography business profits children's exposure to 2nd finding on computers incidents of children viewing number of Web sites 2nd search engine requests sent to cell phones portable devices [See mobile computing and devices] portable game consoles [See also game consoles] Portugal's game ratings posting information clues in information defined friends' postings 2nd immortality of information permission for uploading photos 2nd 3rd 4th 5th profiles regrettable postings removing posted information reporting inappropriate postings revealing information in blogs videos predators anonymity 2nd blogs and cell phones and characteristics and behavior 2nd 3rd cybercriminals defined e-mail addresses and face-to-face meetings financial fraud finding victims 2nd gifts and 2nd 3rd 4th grooming victims 2nd guilt and shame-inducing actions 2nd harassment incidence of interactive gaming and knowledge and closeness of victims legislation against "middlemen" 2nd numbers of arrests online contact with online dating online dating and personally identifiable information and reporting 2nd scope of criminal activity 2nd signs of contact with statistics 2nd taking action against targeting victims' emotional states types of 2nd videocams and prepaid phone plans private blogs prizes processing fees profiles availability of blocking access to blog information choosing photos for game console information instant messaging information location information in online dating and posting revealing information in 2nd safety guidelines property, targeting protective technology public computers publicly-accessible information blog postings 2nd 3rd 4th 5th easy access to levels of sharing and 2nd pyramid schemes |