Presentation is loading. Please wait.

Presentation is loading. Please wait.

 A computer software program or hardware device that enables an unauthorized person (such as an abuser) to secretly monitor and gather information about.

Similar presentations


Presentation on theme: " A computer software program or hardware device that enables an unauthorized person (such as an abuser) to secretly monitor and gather information about."— Presentation transcript:

1

2  A computer software program or hardware device that enables an unauthorized person (such as an abuser) to secretly monitor and gather information about your computer use.  Spyware programs are sometimes marketed as ways to monitor your children.

3  Fears aggravated by occasional high-profile abductions  The dangers lurking in cyberspace  When using electronics it takes time away from doing their school work which may cause school work to be harder and may put stress upon the kids

4

5

6 The National Center for Missing and Exploited Children funded a study by the Crimes Against Children Resource Center of youth Internet users over a five year period. They found:  An increase in encountering unwanted exposures to sexual material (from 25% to 34%).  An increase in cases of online harassment (from 6% to 9%).  A decrease in those receiving unwanted sexual solicitations (from 19% to 13%).  40% of all youth Internet users said online solicitors asked them for nude or sexually explicit photographs of themselves.  Only a minority of youth who had unwanted sexual solicitations, unwanted exposures to sexual material, or harassment said they were distressed by the incidents.  One-third of the solicitations (31%) were aggressive, meaning the solicitors made, or attempted, offline contact with youth.

7  Online predators can often be hard to identify  Seem to be completely normal people.  Studies have shown that the average online predator is white, male, and middle-aged, online predators can be of any race, age or gender.  Listed below are a few common characteristics or traits that may be helpful in identifying an online predator. › Appears trusting at first › May pretend to share common interests with targeted victims › Will more than likely engage in as many activities with children as possible › Will often look for children who are emotionally vulnerable › May pretend to be someone he or she is not in order to take advantage of children › Will be very good at internet lingo to help coerce young victims › Will become more provocative as he or she feels the victim is beginning to trust

8 Records and monitors instant messaging, chats, emails, web site URLs and much more. Not only do you see what your child types online but what is said back as well. They monitor both incoming and outgoing activity.

9  Talk to your kids  Start Early  Keep the computer in a visible location  Set rules for time online  Use security software  Use secure passwords  Know what websites your kids are using  Remind them that what they post is permanent  Stress that personal information needs to stay private  Establish policies and "contracts“ For more explanation on these tips visit: http://www.hopkinsschools.org/parentsstudents/online- safety http://www.hopkinsschools.org/parentsstudents/online- safety

10 Have a heart-to-heart talk with the child. Tell your children you'll check on them from time to time. Just that knowledge can be effective. Educate your child on the potential dangers of the Internet. The more they know the safer they will be. Visit the website below to get a better understanding of why parents see the need to use spyware on their children's’ devices. http://www.guardchild.com/a bout/ http://www.guardchild.com/a bout/

11

12  “ Child monitoring Software for Parents”. ParentalSoftware.org. Web 2007- 2012. Web 11 April 2012. http://www.parentalsoftware.org/child-monitoring- software.htmlhttp://www.parentalsoftware.org/child-monitoring- software.html  Crary, David. “Should Parents spy on their kids?”. Newsobserver.com. Web 06 Sept 2011. Web 12 April 2012. http://www.newsobserver.com/2011/09/06/1456490/should-parents-spy-on-their- kids.html http://www.newsobserver.com/2011/09/06/1456490/should-parents-spy-on-their- kids.html  “Internet Safety For Parents”. KSBYTV. Youtube.com. 13 December 2009. http://www.youtube.com/watch?v=76WRBYVCVUw http://www.youtube.com/watch?v=76WRBYVCVUw  Lacey. “Kids Using Electronics too Much?”. Edublogs. Web 14 Jan 2011. Web10 April 2012. http://lacey4.edublogs.org/2011/01/14/kids-using- electronics-to-much/http://lacey4.edublogs.org/2011/01/14/kids-using- electronics-to-much/  “Online Safety”. Hopkins Public School. Web 2012. Web 10 April 2012. http://www.hopkinsschools.org/parentsstudents/online-safety http://www.hopkinsschools.org/parentsstudents/online-safety  “Who's Spying on Your Computer: Spyware, Surveillance and Safety for Survivors.” National Network to end Domestic Violence (NNEDV). Web 11 April 2012. http://www.nnedv.org/docs/SafetyNet/NNEDV_SpyWareAndSafety_English.p df http://www.nnedv.org/docs/SafetyNet/NNEDV_SpyWareAndSafety_English.p df  “Online Predator/Internet Predators”. Minor Monitors. Web 14 March 2012. Web 13 April 2012. http://www.minormonitor.com/resource/online- predators/http://www.minormonitor.com/resource/online- predators/  National Center for Missing Kids and Exploited Children. Web 2012. Web 13 April 2012. http://www.missingkids.com/missingkids/servlet/PageServlet?LanguageCoun try=en_US&PageId=218 http://www.missingkids.com/missingkids/servlet/PageServlet?LanguageCoun try=en_US&PageId=218


Download ppt " A computer software program or hardware device that enables an unauthorized person (such as an abuser) to secretly monitor and gather information about."

Similar presentations


Ads by Google