- adware
A form of malicious code that displays unsolicited advertising on your computer.
- antivirus software
Computer software that attempts to block malicious programs/code/software (called viruses or malware) from harming your computer.
- blog
A diary or personal journal kept on a Web site, usually updated frequently, that might be private or might be intended for public viewing.
- bots
Computer programs that automatically perform a repetitive task, such as searching through Web sites or indexing information.
- buddies (buddy list)
A list of friends you interact with online through various media such as instant messaging.
- buddy search
When two (or more) Internet users search the Web together, both users see the search results simultaneously.
- chat room
An online site used for social interaction, usually based on a topic or theme, where people with shared interests can meet others.
- content filtering
Allows you to block certain types of content from being displayed. There are certain Web sites that you know you don't want your children to see. Many software programs allow you to block information that you find inappropriate or offensive. Some of the things you can screen for include coarse language, nudity, sex, and violence. In addition, many Internet browsers have parental controls to help protect your child from stumbling onto inappropriate sites. You can often choose separate levels of security for each child based on their ages and maturity levels.
- cybercriminals
Those who commit criminal activity that targets computers or information or that leverages computers and online information to find real-world victims.
- cybersex
Also called "computer sex," "Net sex," and "hot chat." Refers to virtual sex encounters in which two or more persons pretend to be having actual sex through describing their actions and responding to their partner's descriptions. This is mostly done through text, images, voice, and video.
- discussion boards
Also called Internet forums, message boards, and bulletin boards. These are online sites that allow users to post comments on a particular topic.
- download
Transferring material from a server or remote computer to your computer, mobile device, or game console.
- e-mail signature
A block of text added at the end of an e-mail message, usually automatically. It can contain your full name, your job description, location, or phone number, and even an inspirational thought.
- emoticons
Small graphics (like smiley faces) used to indicate emotional state, opinion, or response when no body language is providing those cues.
- file sharing
The ability to store files either in a central place that can be shared with as few as one other person or publicly. Files can be stored on the Internet or on any computer that provides access to others. File sharing allows others who have permission to access the shared file to modify or download it.
- firewall
A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer through a network such as the Internet. Installing or activating a firewall feature on your home computer is one of the most important actions you can take to help to protect your computer.
- for-pay items (winks, avatars)
Low-cost add-on products that allow users to customize their experiences on cell phones or in instant messaging devices. These can be cartoon-like images (called avatars) or animated cartoons (called winks) that you can send to others.
- game console
A machine that is specifically designed for playing video games (although it might also play movies), often hooked up to a TV or computer monitor for viewing. Not all game consoles are capable of Internet connections or are connected to the Internet, but if they are connected they allow users to play games with others remotely.
- gamer tag
The nickname a user has chosen to be identified by when playing Internet games.
- gaming
The act of playing or participating in online games.
- grooming
The systematic way that sexual predators manipulate their victims into trusting them, depending on them, and ultimately meeting them. This usually involves sympathy, subtle ways to alienate the victim from others, and flattery. It might also involve money, gifts, or promises of workespecially "modeling jobs." Predators are very skilled at tuning into whatever tactics will work with a particular child given their specific vulnerabilities, and adapt their strategies accordingly. This might occur over only a few days, or might happen over an extended period of time, often between one and six months of slow "seduction." Often older children are so mentally manipulated that they actually come to believe it is a "love" relationship and might willingly participate in their own abuse. It might take years for them to realize the exploitive nature of the abuse.
- GSM (Global System for Mobile communication)
A digital cellular telephone technology. This system is used mainly in Europe, Australia, and the Middle East, although it is becoming more popular in the United States.
- handle
(as in "blog handle") A nickname an Internet user chooses to display to others online.
- identity theft
Stealing someone's identity in order to impersonate them, usually for financial gain.
- instant messaging
A real-time, text-based communication used on desktop computers, cell phones, and other devices to send short messages between individuals.
- interactive gaming
The ability to play games online, interacting with other players. Covers a broad spectrum of activities from children's games to online gambling.
- keystroke logging
A legitimate way for software developers to understand what is happening as they write code. It can also be used to track a user's activities online to either monitor or spy on (depending on your point of view) what they type and what sites they visit. A keystroke-logging program might be downloaded by parents to watch their children, by children to watch their parents, or by one adult to watch another adult. It might also be downloaded onto your computer in stealth by malicious cybercriminals who then have information about your online activities sent to them so that they learn your passwords and banking information, for example.
- location application
A program that enables you to locate the whereabouts of anybody logged on to the Internet from a variety of devices.
- malware
Stands for malicious software; an umbrella term that includes any type of harmful codeTrojans, worms, spyware, adware, and so onthat infiltrates a computer without the consent of the computer user and is designed to damage the computer, collect information, or allow the computer to be subverted and used remotely to send spam.
- Multimedia Messaging Service (MMS)
A method for sending messages from mobile phones that includes audio, video, or images.
- mobile computing
Use of a portable device that provides computer functions and can usually connect to the Internet, even when changing locations.
- parental controls
Products or services that offer options to parents to help restrict their child's experiences with media or filter media content. These restrictions are currently applied to television services, computer and video games, and Internet access.
- peer-to-peer
A method of sharing files directly over the Internet from one Internet-enabled device to another (computer, mobile phone, and so on). This is often done with music files, for example, which might violate copyright laws if the people involved make copies of the material without permission to do so.
- persona
The person an Internet user chooses to appear to be, rather than the person they are. For example, a 56-year-old man might assume the persona of a 12-year-old girl who wants to meet other 12-year-old girls.
- personal digital assistant (PDA)
A small handheld computing device typically used to track appointments, contacts, and e-mail.
- phishing
The practice of scamming someone into divulging confidential information they normally would not provide to a stranger. The lure is typically via e-mail that brings the user to a scam Web site. The purpose of phishing is to gather the information needed to steal a victim's money or identity.
- posting information
To upload information to the Web.
- predator
Anyone who preys on others.
- remote access
The ability to allow access to your computer by another user at another location. Remote access is often used in technical support as a way to fix problems, as it provides full access to the information stored on the computer through a data link.
- scam
To con, cheat, trick, swindle, sting, or rip off others.
- search engine
An Internet service that helps you search for information on the Web.
- smartphone
A handheld device that incorporates features of a mobile phone, with PDA functions such as a calendar or contact database. Smartphones allow you to install additional features on them.
- SMS
Stands for Short Message Service, a form of text messaging on cell phones, sometimes used between computers and cell phones.
- social networking
A category of Internet applications to help connect friends, business partners, or other individuals together using a variety of tools.
- spam
Unsolicited e-mail attempting to sell you something. Also known as junk mail.
- spim
Spam sent via an instant message, typically unsolicited and attempting to sell you something.
- splog
Spam sent via blogs, typically unsolicited and attempting to sell you something.
- spyware
Software that collects information about you without your knowledge or consent and sends it back to whomever wrote the spyware program. Spyware might look for your banking information, personal information, and so on. It is illegal and pervasive.
- Subscriber Identity Module (SIM)
A small card that holds your identity, authentication, address book, and so on, in some cellular phones.
- surfing
Similar to channel surfing on a television, Internet surfing involves users browsing around various Web sites following whatever interests them.
- text messaging
A method of sending short messages (also called SMSes, txts, or texting) between mobile phones, other computing devices, and even some landline phones.
- URL
Uniform Resource Locator, a unique Internet address of a file or destination. To find a particular site or document, type the URL into the browser window and the browser will bring up that particular Web site.
- user name
The name a user selects to be identified by, for example on a computer on a network or in an online gaming forum (also called nickname or gamer tag).
- videocams
Also called webcams. Video cameras that are often (though not always) attached to a computer so that a video image can be sent to another when communicating online.
- virus
A self-replicating software program that spreads to other computers by sending copies of itself to other devices hidden in code or attached to documents. Viruses are often deliberately destructive to any device that becomes "infected," often destroying data or disabling the device's operating system.
- Voice over Internet Protocol (VoIP)
Use of an Internet protocol to transmit voice communications. VoIP allows you to hold voice conversations over the Internet.
- web hosting
A service that provides individuals, organizations, and businesses with online storage space to store and share information, images, blogs, video, or any other content accessible through the Web.
|