Flylib.com
Look Both Ways: Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
ISBN: 0735623473
EAN: 2147483647
Year: 2004
Pages: 157
Authors:
Linda Criddle
BUY ON AMAZON
Look Both Ways: Help Protect Your Family on the Internet
Table of Contents
Copyright
Praise for Look Both Ways ...
Acknowledgments
Introduction
Quick Safety Checklist
Part One: Understanding the Risks
Chapter One. The Landscape of Risk
What s Going On Out There?
How Are You Putting Yourself at Risk?
What Can You Do?
What s Next?
Chapter Two. Misperceptions About Online Anonymity
Leaving a Trail of Clues
The Lure of Anonymity
How Predators Use Anonymity
What Can You Do?
Chapter Three. Thinking Like the Enemy: Predatory Behavior
Knowing the Enemy
Recognizing Sexual Predators, Offline and On
How Predators Choose Their Victims
The Victim Grooming Process
Who Is Not at Fault
Part Two: 13 Steps to Internet Security
Chapter Four. Step 1: Be Careful What You Show People
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Five. Step 2: Don t Tell People More Than You Should
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Six. Step 3: Be Alert to How Predators Prey on Emotions
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Seven. Step 4: Don t Let Them Know Where You Live
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Eight. Step 5: Don t Expose Yourself Through Instant Messaging
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Nine. Step 6: Reduce Your Vulnerability When Blogging
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Ten. Step 7: Understand Risks of Fraudulent Communications and Protect Yourself
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Eleven. Step 8: Date Safely Online
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Twelve. Step 9: Don t Browse Indiscriminately
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Thirteen. Step 10: Use Common Sense When Gaming with Others
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Fourteen. Step 11: Get Savvy About Financial Scams and Fraud
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Fifteen. Step 12: Don t Let Your Defenses Down When Using Mobile Devices
What Just Happened?
Assessing the Risks
Protecting Yourself
Chapter Sixteen. Step 13: Act to Avoid Harassment and Bullying
What Just Happened?
Assessing the Risks
Protecting Yourself
Part Three: Get Going to Protect Yourself Today
Chapter Seventeen. Talking About Safety
Understanding the Safety Pacts You Make
Negotiating Safety
What You Should Know Before You Start the Discussion
Build the Framework for a Safer Environment
The Special Case for Social Networks
Chapter Eighteen. It Takes Everyone to Make a Safe Internet
What to Do If a Sexual Predator Is Victimizing Your Child
Report Abuse
What Your Online Service Can Do
How You Can Affect Laws Dealing with Online Abuse
Begin a New Internet Journey
Part Four: Resources
Helpful Terms
Technology Toolkit
Understanding the Types of Technology Available
Top Tips on Using Technology to Protect Yourself
Useful Web Sites for Finding Tools
Helpful Web Resources for Internet Safety
Safety Advice and Information
Recognizing Sexual Predators
Government Sites
Sites for Reporting Abuse
Kid-Oriented Sites
Common Messaging Shortcuts
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
W
XYZ
Selected References
About the Authors
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Z
Page #156 (Index)
Look Both Ways: Help Protect Your Family on the Internet
ISBN: 0735623473
EAN: 2147483647
Year: 2004
Pages: 157
Authors:
Linda Criddle
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Identifying Project Scope Risk
Identifying Project Resource Risk
Managing Project Risk
Monitoring and Controlling Risky Projects
SQL Tips & Techniques (Miscellaneous)
Understanding SQL Basics and Creating Database Files
Retrieving and Manipulating Data Through Cursors
Understanding Triggers
Repairing and Maintaining MS-SQL Server Database Files
Writing Advanced Queries and Subqueries
Developing Tablet PC Applications (Charles River Media Programming)
Working with VB .NET
Object-Oriented Programming with VB .NET
Creating an MP3 Player
Getting Started with Microsoft Agent
WMI and Hardware
SQL Hacks
Hack 4. UPDATE the Database
Hack 27. Identify Overlapping Ranges
Hack 37. Reconcile Invoices and Remittances
Hack 61. Set Security Based on Rows
Hack 99. Dont Run Out of Disk Space
Competency-Based Human Resource Management
Why a Focus on Jobs Is Not Enough
A Need for Implementing Competency-Based HR Management
Competency-Based HR Management The Next Steps
Appendix A Frequently Asked Questions About Competency-Based HR Management
Appendix B Further Suggestions on Employee Development
Microsoft VBScript Professional Projects
VBScript Objects
Customizing the Desktop
Using Configuration Files to Control Script Execution
Building the Web Sites Main Page
Appendix A Windows XP Command Reference
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies