SlideShare une entreprise Scribd logo
1  sur  2
Parents' Concerns on Children's Online Safety

Kids would rather advance to the net at home especially in summer vacation when they
are tired of doing sports or taking trips outside. At the same time, most parents do take
thought for the network security. And many of them begin to use a kind of Parental
monitoring program to prevent their children from Internet addiction. With the Internet,
kids are able to learn abundant knowledge with ease without taking curriculum at school,
which can rouse their motivation and interests for learning.

Whereas, the Internet is such a massive domain, child can be exposed to improper
contents, such as pornography, prejudice and force, this is really the cause of parents
anxiety, and periodically kids may unintentionally attacked by malicious software,
spyware, trojan, phishing websites causing computer shut-down, bank account cheating,
privacy divulge and even poison to your kids' mind. That's why parents use the Parental
control software to filter kids' online behavior and ensure network security for their kids.

A study has warned that eight out of ten children between the ages of ten and fifteen
advance to the net, posting personal profile in social networking sites like Google+,
Facebook, Twitter, MySpace and StumbleUpon, gossiping online via IM application like
MSN, Yahoo Messenger, ICQ, Gtalk and so on. One day, you fortuitously find loads of
non-acquaintance on your children's friend lists, these unknown persons are not
playmates, friends or family members, but people from all over the country. How do
those strangers find your child? As parents, you would firmly worry a lot. Are those
person pedophiles? Pedophiles are hiding out somewhere and kids are already targeted,
and they cannot realize the menace until parents indicate and tell them the risk of over
exposure of personal profile and the significance of self-protection.




Kids and teenagers also enjoy sharing files such as videos, audio, games, photos on the
Internet via Peer to Peer client, safety problems also exist because the IP address can be
found by the Internet hacker if you were not that lucky enough, and then their PC would
be remotely controlled by the hacker, the hacker can have free access to any documents
and any action of the computer once it is connected to the Internet.
As parents, what could you do?

1. Block you kids' access to the Internet
2. In windows OS, create a admin Account
3. Use parental control monitoring application to observe, and control kids' online actions

At present, there are lots of Parental monitoring programs that can be useful to guarantee
network security for kids. Most of these programs have the following features in
common:

1. Take screen snapshots in real-time.
2. Monitor and track sent & received Emails
3. View and shield instant message
4. Monitor and block website visiting

Ensuring online safety for your kids is parents' responsibility, every coin has two sides
while the Internet is a double-edged sword, Internet can bring your children lots of
benefits with affirmative and healthful contents and, as well, do damage to your kids.
Therefore, Parental Control can be helpful, and taking appropriate plans to protect kids
from network harms become more and more concernful in our life now.

Contenu connexe

En vedette

031808 obama speech (romanian)
031808   obama speech (romanian)031808   obama speech (romanian)
031808 obama speech (romanian)VogelDenise
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetseSAT Publishing House
 
Savvy Management: Managing your social media presence
Savvy Management: Managing your social media presenceSavvy Management: Managing your social media presence
Savvy Management: Managing your social media presenceCourtney McDonald
 
Práctica 2 Portafolio de trabajo
Práctica 2 Portafolio de trabajoPráctica 2 Portafolio de trabajo
Práctica 2 Portafolio de trabajocanek13
 
Been there, done that septembre 2013
Been there, done that   septembre 2013Been there, done that   septembre 2013
Been there, done that septembre 2013Canan Taş
 
A comparative analysis of classification techniques on medical data sets
A comparative analysis of classification techniques on medical data setsA comparative analysis of classification techniques on medical data sets
A comparative analysis of classification techniques on medical data setseSAT Publishing House
 
Fife Conference Report - SDS Consortium Project Work
Fife Conference Report - SDS Consortium Project WorkFife Conference Report - SDS Consortium Project Work
Fife Conference Report - SDS Consortium Project Workarcscotland
 
Marketing In A Down Market
Marketing In A Down MarketMarketing In A Down Market
Marketing In A Down MarketJonathan_Fisher
 
Predarea Stafetei 5 C 1 A
Predarea Stafetei 5 C   1 APredarea Stafetei 5 C   1 A
Predarea Stafetei 5 C 1 Aguest8d4ebc
 
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...Gianfranco Conti
 

En vedette (14)

Höstaktiviteter av Ingemar Pongratz
Höstaktiviteter av Ingemar PongratzHöstaktiviteter av Ingemar Pongratz
Höstaktiviteter av Ingemar Pongratz
 
Diskaun 10% PTPTN
Diskaun 10% PTPTNDiskaun 10% PTPTN
Diskaun 10% PTPTN
 
031808 obama speech (romanian)
031808   obama speech (romanian)031808   obama speech (romanian)
031808 obama speech (romanian)
 
Functional testing
Functional testingFunctional testing
Functional testing
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manets
 
Savvy Management: Managing your social media presence
Savvy Management: Managing your social media presenceSavvy Management: Managing your social media presence
Savvy Management: Managing your social media presence
 
Práctica 2 Portafolio de trabajo
Práctica 2 Portafolio de trabajoPráctica 2 Portafolio de trabajo
Práctica 2 Portafolio de trabajo
 
Been there, done that septembre 2013
Been there, done that   septembre 2013Been there, done that   septembre 2013
Been there, done that septembre 2013
 
A comparative analysis of classification techniques on medical data sets
A comparative analysis of classification techniques on medical data setsA comparative analysis of classification techniques on medical data sets
A comparative analysis of classification techniques on medical data sets
 
Ana Nagherneac: Ghidul Bibliografului
Ana Nagherneac: Ghidul Bibliografului Ana Nagherneac: Ghidul Bibliografului
Ana Nagherneac: Ghidul Bibliografului
 
Fife Conference Report - SDS Consortium Project Work
Fife Conference Report - SDS Consortium Project WorkFife Conference Report - SDS Consortium Project Work
Fife Conference Report - SDS Consortium Project Work
 
Marketing In A Down Market
Marketing In A Down MarketMarketing In A Down Market
Marketing In A Down Market
 
Predarea Stafetei 5 C 1 A
Predarea Stafetei 5 C   1 APredarea Stafetei 5 C   1 A
Predarea Stafetei 5 C 1 A
 
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...
The Information Assurance Mission at NSA - Hardening Tips for Mac OS X 10.6 "...
 

Dernier

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Parents' concerns on children's online safety

  • 1. Parents' Concerns on Children's Online Safety Kids would rather advance to the net at home especially in summer vacation when they are tired of doing sports or taking trips outside. At the same time, most parents do take thought for the network security. And many of them begin to use a kind of Parental monitoring program to prevent their children from Internet addiction. With the Internet, kids are able to learn abundant knowledge with ease without taking curriculum at school, which can rouse their motivation and interests for learning. Whereas, the Internet is such a massive domain, child can be exposed to improper contents, such as pornography, prejudice and force, this is really the cause of parents anxiety, and periodically kids may unintentionally attacked by malicious software, spyware, trojan, phishing websites causing computer shut-down, bank account cheating, privacy divulge and even poison to your kids' mind. That's why parents use the Parental control software to filter kids' online behavior and ensure network security for their kids. A study has warned that eight out of ten children between the ages of ten and fifteen advance to the net, posting personal profile in social networking sites like Google+, Facebook, Twitter, MySpace and StumbleUpon, gossiping online via IM application like MSN, Yahoo Messenger, ICQ, Gtalk and so on. One day, you fortuitously find loads of non-acquaintance on your children's friend lists, these unknown persons are not playmates, friends or family members, but people from all over the country. How do those strangers find your child? As parents, you would firmly worry a lot. Are those person pedophiles? Pedophiles are hiding out somewhere and kids are already targeted, and they cannot realize the menace until parents indicate and tell them the risk of over exposure of personal profile and the significance of self-protection. Kids and teenagers also enjoy sharing files such as videos, audio, games, photos on the Internet via Peer to Peer client, safety problems also exist because the IP address can be found by the Internet hacker if you were not that lucky enough, and then their PC would be remotely controlled by the hacker, the hacker can have free access to any documents and any action of the computer once it is connected to the Internet.
  • 2. As parents, what could you do? 1. Block you kids' access to the Internet 2. In windows OS, create a admin Account 3. Use parental control monitoring application to observe, and control kids' online actions At present, there are lots of Parental monitoring programs that can be useful to guarantee network security for kids. Most of these programs have the following features in common: 1. Take screen snapshots in real-time. 2. Monitor and track sent & received Emails 3. View and shield instant message 4. Monitor and block website visiting Ensuring online safety for your kids is parents' responsibility, every coin has two sides while the Internet is a double-edged sword, Internet can bring your children lots of benefits with affirmative and healthful contents and, as well, do damage to your kids. Therefore, Parental Control can be helpful, and taking appropriate plans to protect kids from network harms become more and more concernful in our life now.