SlideShare a Scribd company logo
1 of 5
Good News about Kids' Online Behavior
Study shows that cyberbullying and internet harassment have declined.

Study and Report about Kids' Online Behavior




McAfee, a computer security company headquartered in Santa Clara, California, has
made a study about kids online behavior. The study, conducted by Harris Interactive,
included interviews with almost 1,400 10- to 17-year-olds.

The survey reported that "almost half of youth (46 percent) admit to having given out
their personal information to someone they didn't know over the Internet," but when they
break it down, the survey reveals that "when they do reveal personal information online,
youth are most likely to share their first name (36 percent), age (28 percent), and/or e-
mail address (19 percent). Only around 1 in 10 have given out slightly more personal
information like a photo of themselves, their school name, last name, cell phone number,
or a description of what they look like. And it's also reassuring to read in the study report
that "youth draw the line at giving out personally identifiable information such as their
parents' names, home address, or school address, and virtually no teens report having
given out their Social Security number."

When it comes to cyberbullying, the report also paints a more optimistic picture than
we've seen from some other studies. Only 11 percent admit to ever engaging in some
form of cyberbullying behavior. Even though the press release about the report says
"Cyberbullying on the rise," the report itself shows that the percentage of teens reporting
that they have "ever been bullied or harassed online decreased substantially from 15
percent in 2008 to 8 percent in 2010. Far from an increase, that's an impressive 47
percent decline in two years.

The press release on the report also says that "Nearly 50 Percent of Teens Don't Know
What to Do if Cyberbullied," yet the report itself says that "1 in 4 teens say they wouldn't
know what to do if they were bullied or harassed online" and that a "a significantly higher
proportion disagree with this statement in 2010 than in 2008, suggesting that teens may
now be better equipped to handle cyberbullying."

It further points out that "many youth who have been bullied or harassed online say they
have made some adjustments to their online behavior as a result (72 percent)."




What should parents do to keep children's internet
security?
Even though we are glad to see the good news that the cyberbullying, online predator,
internet harassment is on decline, we still can never relax our vigilance about the kids'
internet security. Children often lack the maturity and social judgment necessary to act
responsibly in the unsupervised, anonymous free for the entire internet. They are always
at the risk of encountering the online dangers. Help them protect themselves.

Internet Security Tips for Kids Online Behavior:
1 Encourage kids to keep passwords secret

• Don't reveal passwords to others

• Protect recorded passwords

• Never provide your password over email or in response to an email request

• Do not type passwords on computers that you do not control

2 Help your kids use social networking safely

• Communicate with kids about their experiences

• Establish Internet rules
• Teach your children never meet anyone in person that they've communicated with
online only

• Encourage your children to communicate with people they already know.

• Teach your children about cyberbullying

3 If your kids blog, make sure they don't reveal too much

• Screen what your kids plan to post before they post it

• Evaluate the blogging service and find out if it offers private, password-protected blogs

• Save the web address of your child's blog and review it on a regular basis

• Check out other blogs to find positive examples for your kids to emulate

4 Beware of online fraud

• Never share personal information

• Log off in public

• Create secure passwords and keep them secret

• Use only secure sites




Parental Control Software Solution to Ensure Kids'
Internet Security:
SurveilStar Parental Control Software is specially designed for parents to monitor and
control kids' computer activity and online behavior and keep them far away from any
online dangers.
Besides the internet security tips for kids you should know, a computer controlling tool is
also essential to assist you to construct a healthy and safe internet environment for kids.
SurveilStar Any Parental Control is a strongly recommended.

Main Features of SurveilStar Any Parental Control
Software:
• Screen Snapshots Taking

Take the real-time screen snapshot of your kids' computer. It makes you keep a close eye
on all your kids online behaviors anywhere anytime.

• Email Recording

Record the email sent & received. Filter out the unwanted Emails and stop the spams that
possibly spread internet threats like the advertisement of porn or gambling sites.

• IM/Chat Controlling

Record all the instant message of your children in chat rooms. Keep you know what they
are talking, who they are talking to. Thus you can stop the action and take immediate
measures if your kids meet the online predators or other internet threats in the chat room.

• Website Visit Monitoring

Have a history record of the visited websites. Block some specific websites which may
contain contents or images of sex, violence or strong language or hate speech. You can
create lists of unacceptable websites and allow access to all others.


buynow       Download
Download Any Parental Control software to monitor your kids online activities, and
have a better idea of their online behavior.

More Related Content

Viewers also liked

Optimizacion
OptimizacionOptimizacion
Optimizacion
cmarquina
 
6 a alteracao_e_consolidacao_caladi
6 a alteracao_e_consolidacao_caladi6 a alteracao_e_consolidacao_caladi
6 a alteracao_e_consolidacao_caladi
Rade Jovanovic
 
mundial sudafrica_2010
mundial sudafrica_2010mundial sudafrica_2010
mundial sudafrica_2010
carloscrespo1
 

Viewers also liked (14)

Marketing Strategy for the New Social Web
Marketing Strategy for the New Social WebMarketing Strategy for the New Social Web
Marketing Strategy for the New Social Web
 
Optimizacion
OptimizacionOptimizacion
Optimizacion
 
Magnificent photos
Magnificent photosMagnificent photos
Magnificent photos
 
Sbs ica pre conf 2010-flew
Sbs ica pre conf 2010-flewSbs ica pre conf 2010-flew
Sbs ica pre conf 2010-flew
 
6 a alteracao_e_consolidacao_caladi
6 a alteracao_e_consolidacao_caladi6 a alteracao_e_consolidacao_caladi
6 a alteracao_e_consolidacao_caladi
 
Candy land
Candy landCandy land
Candy land
 
Rendición de cuentas presidente comisión
Rendición de cuentas presidente comisiónRendición de cuentas presidente comisión
Rendición de cuentas presidente comisión
 
Paperwork2011
Paperwork2011Paperwork2011
Paperwork2011
 
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
 
Pearl 28
Pearl 28Pearl 28
Pearl 28
 
mundial sudafrica_2010
mundial sudafrica_2010mundial sudafrica_2010
mundial sudafrica_2010
 
Boletín: Noticias del INPPARES - Julio 2013
Boletín: Noticias del INPPARES - Julio 2013Boletín: Noticias del INPPARES - Julio 2013
Boletín: Noticias del INPPARES - Julio 2013
 
Utilizing Traditional and Social Media
Utilizing Traditional and Social MediaUtilizing Traditional and Social Media
Utilizing Traditional and Social Media
 
Red seacrossing
Red seacrossingRed seacrossing
Red seacrossing
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 

Good news about kids' online behavior

  • 1. Good News about Kids' Online Behavior Study shows that cyberbullying and internet harassment have declined. Study and Report about Kids' Online Behavior McAfee, a computer security company headquartered in Santa Clara, California, has made a study about kids online behavior. The study, conducted by Harris Interactive, included interviews with almost 1,400 10- to 17-year-olds. The survey reported that "almost half of youth (46 percent) admit to having given out their personal information to someone they didn't know over the Internet," but when they break it down, the survey reveals that "when they do reveal personal information online, youth are most likely to share their first name (36 percent), age (28 percent), and/or e- mail address (19 percent). Only around 1 in 10 have given out slightly more personal information like a photo of themselves, their school name, last name, cell phone number, or a description of what they look like. And it's also reassuring to read in the study report that "youth draw the line at giving out personally identifiable information such as their parents' names, home address, or school address, and virtually no teens report having given out their Social Security number." When it comes to cyberbullying, the report also paints a more optimistic picture than we've seen from some other studies. Only 11 percent admit to ever engaging in some form of cyberbullying behavior. Even though the press release about the report says "Cyberbullying on the rise," the report itself shows that the percentage of teens reporting that they have "ever been bullied or harassed online decreased substantially from 15 percent in 2008 to 8 percent in 2010. Far from an increase, that's an impressive 47 percent decline in two years. The press release on the report also says that "Nearly 50 Percent of Teens Don't Know What to Do if Cyberbullied," yet the report itself says that "1 in 4 teens say they wouldn't know what to do if they were bullied or harassed online" and that a "a significantly higher
  • 2. proportion disagree with this statement in 2010 than in 2008, suggesting that teens may now be better equipped to handle cyberbullying." It further points out that "many youth who have been bullied or harassed online say they have made some adjustments to their online behavior as a result (72 percent)." What should parents do to keep children's internet security? Even though we are glad to see the good news that the cyberbullying, online predator, internet harassment is on decline, we still can never relax our vigilance about the kids' internet security. Children often lack the maturity and social judgment necessary to act responsibly in the unsupervised, anonymous free for the entire internet. They are always at the risk of encountering the online dangers. Help them protect themselves. Internet Security Tips for Kids Online Behavior: 1 Encourage kids to keep passwords secret • Don't reveal passwords to others • Protect recorded passwords • Never provide your password over email or in response to an email request • Do not type passwords on computers that you do not control 2 Help your kids use social networking safely • Communicate with kids about their experiences • Establish Internet rules
  • 3. • Teach your children never meet anyone in person that they've communicated with online only • Encourage your children to communicate with people they already know. • Teach your children about cyberbullying 3 If your kids blog, make sure they don't reveal too much • Screen what your kids plan to post before they post it • Evaluate the blogging service and find out if it offers private, password-protected blogs • Save the web address of your child's blog and review it on a regular basis • Check out other blogs to find positive examples for your kids to emulate 4 Beware of online fraud • Never share personal information • Log off in public • Create secure passwords and keep them secret • Use only secure sites Parental Control Software Solution to Ensure Kids' Internet Security: SurveilStar Parental Control Software is specially designed for parents to monitor and control kids' computer activity and online behavior and keep them far away from any online dangers.
  • 4. Besides the internet security tips for kids you should know, a computer controlling tool is also essential to assist you to construct a healthy and safe internet environment for kids. SurveilStar Any Parental Control is a strongly recommended. Main Features of SurveilStar Any Parental Control Software: • Screen Snapshots Taking Take the real-time screen snapshot of your kids' computer. It makes you keep a close eye on all your kids online behaviors anywhere anytime. • Email Recording Record the email sent & received. Filter out the unwanted Emails and stop the spams that possibly spread internet threats like the advertisement of porn or gambling sites. • IM/Chat Controlling Record all the instant message of your children in chat rooms. Keep you know what they are talking, who they are talking to. Thus you can stop the action and take immediate measures if your kids meet the online predators or other internet threats in the chat room. • Website Visit Monitoring Have a history record of the visited websites. Block some specific websites which may contain contents or images of sex, violence or strong language or hate speech. You can create lists of unacceptable websites and allow access to all others. buynow Download
  • 5. Download Any Parental Control software to monitor your kids online activities, and have a better idea of their online behavior.