Flylib.com
Look Both Ways: Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
ISBN: 0735623473
EAN: 2147483647
Year: 2004
Pages: 157
Authors:
Linda Criddle
BUY ON AMAZON
Look Both Ways: Help Protect Your Family on the Internet
Table of Contents
Copyright
Praise for Look Both Ways ...
Acknowledgments
Introduction
Quick Safety Checklist
Part One: Understanding the Risks
Chapter One. The Landscape of Risk
What s Going On Out There?
How Are You Putting Yourself at Risk?
What Can You Do?
What s Next?
Chapter Two. Misperceptions About Online Anonymity
Leaving a Trail of Clues
The Lure of Anonymity
How Predators Use Anonymity
What Can You Do?
Chapter Three. Thinking Like the Enemy: Predatory Behavior
Knowing the Enemy
Recognizing Sexual Predators, Offline and On
How Predators Choose Their Victims
The Victim Grooming Process
Who Is Not at Fault
Part Two: 13 Steps to Internet Security
Chapter Four. Step 1: Be Careful What You Show People
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Five. Step 2: Don t Tell People More Than You Should
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Six. Step 3: Be Alert to How Predators Prey on Emotions
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Seven. Step 4: Don t Let Them Know Where You Live
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Eight. Step 5: Don t Expose Yourself Through Instant Messaging
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Nine. Step 6: Reduce Your Vulnerability When Blogging
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Ten. Step 7: Understand Risks of Fraudulent Communications and Protect Yourself
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Eleven. Step 8: Date Safely Online
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Twelve. Step 9: Don t Browse Indiscriminately
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Thirteen. Step 10: Use Common Sense When Gaming with Others
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Fourteen. Step 11: Get Savvy About Financial Scams and Fraud
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Fifteen. Step 12: Don t Let Your Defenses Down When Using Mobile Devices
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Sixteen. Step 13: Act to Avoid Harassment and Bullying
What Just Happened?
Assessing the Risks
Protecting Yourself
Part Three: Get Going to Protect Yourself Today
Chapter Seventeen. Talking About Safety
Understanding the Safety Pacts You Make
Negotiating Safety
What You Should Know Before You Start the Discussion
Build the Framework for a Safer Environment
The Special Case for Social Networks
Chapter Eighteen. It Takes Everyone to Make a Safe Internet
What to Do If a Sexual Predator Is Victimizing Your Child
Report Abuse
What Your Online Service Can Do
How You Can Affect Laws Dealing with Online Abuse
Begin a New Internet Journey
Part Four: Resources
Helpful Terms
Technology Toolkit
Understanding the Types of Technology Available
Top Tips on Using Technology to Protect Yourself
Useful Web Sites for Finding Tools
Helpful Web Resources for Internet Safety
Safety Advice and Information
Recognizing Sexual Predators
Government Sites
Sites for Reporting Abuse
Kid-Oriented Sites
Common Messaging Shortcuts
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
W
XYZ
Selected References
About the Authors
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Z
Page #156 (Index)
Look Both Ways: Help Protect Your Family on the Internet
ISBN: 0735623473
EAN: 2147483647
Year: 2004
Pages: 157
Authors:
Linda Criddle
BUY ON AMAZON
Similar book on Amazon
Systematic Software Testing (Artech House Computer Library)
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 4.4 How to Generate a Key Using PuTTY
Step 4.5 How to use OpenSSH Passphrase Agents
Step 5.1 General Troubleshooting
Step 5.2 Troubleshooting Common OpenSSH Errors/Problems
Oracle Developer Forms Techniques
Tips for Standard GUI Practices and Forms Development
Summary
Deficiencies in Forms Error-Message Handling
Additional Interesting Techniques
Record Groups and LOVs Based on Objects
SQL Hacks
Hack 43. Add Navigation Features to Web Applications
Hack 58. Store Parameters in the Database
Reporting
Users and Administration
Sharing Data Across the Internet
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Microwave
Satellite
Internet Addressing and Address Resolution
The Broadband Infrastructure
Wireless Signal Modulation
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Key Points
Working with 1-D and 2-D Shapes
Creating Timelines to View Projects at a Glance
Adding Door, Window, and Furniture Shapes to Office Layouts
Connecting Shapes in Network Diagrams
User Interfaces in C#: Windows Forms and Custom Controls
Designing with Classes and Tiers
Custom Controls
Design-Time Support for Custom Controls
GDI+ Basics
GDI+ Controls
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies