A computer software program or hardware device that enables an unauthorized person (such as an abuser) to secretly monitor and gather information about your computer use. Spyware programs are sometimes marketed as ways to monitor your children.
Fears aggravated by occasional high-profile abductions The dangers lurking in cyberspace When using electronics it takes time away from doing their school work which may cause school work to be harder and may put stress upon the kids
The National Center for Missing and Exploited Children funded a study by the Crimes Against Children Resource Center of youth Internet users over a five year period. They found: An increase in encountering unwanted exposures to sexual material (from 25% to 34%). An increase in cases of online harassment (from 6% to 9%). A decrease in those receiving unwanted sexual solicitations (from 19% to 13%). 40% of all youth Internet users said online solicitors asked them for nude or sexually explicit photographs of themselves. Only a minority of youth who had unwanted sexual solicitations, unwanted exposures to sexual material, or harassment said they were distressed by the incidents. One-third of the solicitations (31%) were aggressive, meaning the solicitors made, or attempted, offline contact with youth.
Online predators can often be hard to identify Seem to be completely normal people. Studies have shown that the average online predator is white, male, and middle-aged, online predators can be of any race, age or gender. Listed below are a few common characteristics or traits that may be helpful in identifying an online predator. › Appears trusting at first › May pretend to share common interests with targeted victims › Will more than likely engage in as many activities with children as possible › Will often look for children who are emotionally vulnerable › May pretend to be someone he or she is not in order to take advantage of children › Will be very good at internet lingo to help coerce young victims › Will become more provocative as he or she feels the victim is beginning to trust
Records and monitors instant messaging, chats, s, web site URLs and much more. Not only do you see what your child types online but what is said back as well. They monitor both incoming and outgoing activity.
Talk to your kids Start Early Keep the computer in a visible location Set rules for time online Use security software Use secure passwords Know what websites your kids are using Remind them that what they post is permanent Stress that personal information needs to stay private Establish policies and "contracts“ For more explanation on these tips visit: safety safety
Have a heart-to-heart talk with the child. Tell your children you'll check on them from time to time. Just that knowledge can be effective. Educate your child on the potential dangers of the Internet. The more they know the safer they will be. Visit the website below to get a better understanding of why parents see the need to use spyware on their children's’ devices. bout/ bout/
“ Child monitoring Software for Parents”. ParentalSoftware.org. Web Web 11 April software.htmlhttp:// software.html Crary, David. “Should Parents spy on their kids?”. Newsobserver.com. Web 06 Sept Web 12 April kids.html kids.html “Internet Safety For Parents”. KSBYTV. Youtube.com. 13 December Lacey. “Kids Using Electronics too Much?”. Edublogs. Web 14 Jan Web10 April electronics-to-much/ electronics-to-much/ “Online Safety”. Hopkins Public School. Web Web 10 April “Who's Spying on Your Computer: Spyware, Surveillance and Safety for Survivors.” National Network to end Domestic Violence (NNEDV). Web 11 April df df “Online Predator/Internet Predators”. Minor Monitors. Web 14 March Web 13 April predators/ predators/ National Center for Missing Kids and Exploited Children. Web Web 13 April try=en_US&PageId=218 try=en_US&PageId=218