What a Parent Must Do to Stop Online Predators

Teens can freely access the Internet from computers at school, at their friends' homes and in public places such as libraries and even from cell phones and video game consoles. Internet is everywhere, that is why kids and teenagers (and their parents, too) should be well aware of its dangers to avoid them.

Here are some figures from the telephone survey made by the Pew Internet and American Life Project:

65% of all parents and 64% of all teens say that teens do things online that they wouldn't want their parents to know about.

These "things" usually means visiting sites parents find "questionable" or "inappropriate", for example, so-called adult content. And, of course, chatting online with strangers.

What kids say in chat rooms, whom they communicate with and what they post on web logs and other public Internet places can get them into much more serious trouble than just viewing porn.

81% of parents of online teens say that teens aren't careful enough when giving out information about themselves online and 79% of online teens agree with this.

Sometimes, teenager post online their first and last names, postal addresses, phone numbers, pictures and give lots of personal information about themselves. It enables a predator easily identify and find this teen.

Unfortunately, sex predators teem in cyberspace. Sometimes they immediately start sexually explicit conversations with children. If a kid or a teen is forewarned and taught to end such a conversation immediately, he or she is relatively safe, except for moral damage from such a talk.

But there are others. They gradually allure their future victims by attention, affection, kindness, and even gifts. These individuals usually devote much time, money, and energy to this process. They listen to children and pretend to empathize with their problems. They are aware of the latest music, hobbies, and interests of children. Some time later this person may succeed in arranging a face-to-face meeting with the kid -- you can guess what for.

Such crimes are on the rise, so there are now even special units where law enforcement officers pose as children in chat rooms to lure predators into a trap.

The problem is so serious that Federal Bureau of Investigation had to launch Crimes Against Children (CAC) Program in 1997; and,unfortunately, the officers from Crime Against Children Unit (CACU)have plenty of work. So every parent should read and memorize tips from "a parent's guide to internet safety"

There are very simple rules any teen should learn by heart. Remind your children again and again: "don't believe everything you are told on-line; never reveal your name, age, birthday, graduation year, nickname or any other personal information while chatting; don't agree to meet face-to-face anybody you chatted online with."

Parents ought to talk to their children about online dangers. Moms and Dads must encourage their sons and daughters tell them about their online acquaintances, without fear of being scolded of punished.

But should all parents use monitoring software? It's a difficult question. Software for parental control is a useful tool, only if applied right.

My opinion is that monitoring software is "strong medicine". Like any medicine, it has its own side effects that can be worse than the disease. Any medicine, if overused, can do harm. Computer monitoring is the last resort, when all the other means are exhausted. Don't do it just because you think you should.

Using monitoring software will be appropriate if you feel you are losing control of the situation, or have lost it already.

For example, your teenage son or daughter seems to be completely withdrawn from family. You don't know his/her friends well enough--maybe you even haven't seen them and doubt whether they exist at all. You have no idea whom he/she is chatting with. Your teenager receives phone calls from people you don't know or is making long-distance calls to numbers you don't recognize. Your son or daughter gets letters, gifts or packages from people you haven't heard about.

Every day he/she spends hours on the computer, especially at night. When you enter the room he/she changes the screen. Maybe you found pornography on your child's computer. If your child uses an online account that belongs to someone else, you also should be alarmed.

Don't keep the computer in your child's bedroom. In fact, nearly three-quarters of home computers are located in a place like living room., according to the survey. A wise thing to do. If your child uses the Internet in a living room, it is easier to watch what he or she is doing online.

And, of course, there is a great variety of monitoring software products. Their purposes may vary from simply recording the time the computer is on/off to logging every keystroke your kid makes. Use one of them if you are sure it is absolutely necessary. But remember that your kid might be more technically savvy than you. Lots of them can erase their traces.

At any case, you must let your growing son or daughter know that you do care for his or her safety -- both offline and online.

Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent monitoring and anti-monitoring software developing company. It provides various solutions for information security, including efficient software for parental control.

Learn more -- visit the company's website "a parent's guide to internet safety"

shuttle from Midway Glen Ellyn ..
In The News:

A new camera called NUCA uses artificial intelligence to create deepfake photos of subjects by stripping away clothing in close to real time.
The Kimberley Kube trail-ready camper has a compact but spacious design and combines luxury, functionality and ruggedness for a weekend getaway.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Emails instructing you to reset your password for an account may be legitimate, or they may be scams. Kurt "CyberGuy" Knutsson explains.
Northrop Grumman's Manta Ray uncrewed underwater vehicle aims to revolutionize undersea missions — it glides through the ocean without human assistance.
Learn how to work Google's calendar application to streamline and organize your daily tasks from technology expert Kim Komando.
If you do not want Facebook to have automatic access to your private photos, follow our tips to protect yourself. Kurt “CyberGuy" Knutsson shows you how.
Kurt “CyberGuy" Knutsson goes into detail about Apple’s recent iOS update that allows iPhone users to instantly translate spoken language simply by using the Action Button.
Safeguarding your digital life with a reliable physical backup isn't just a precaution, it's a necessity. Kurt “CyberGuy" Knutsson provides the essential backup checklist.
Kurt “CyberGuy" Knutsson reveals how a Redditor exposed false recycling claims at their apartment, highlighting a report that only 21% of U.S. recyclables are processed.
Kurt "CyberGuy" Knutsson offers a travel toolkit featuring five technology tools to help you with booking flights and hotels for your summer vacation.
The bubble behind the clock on your iPhone can appear in different colors. Kurt "CyberGuy" Knutsson explains what each of those colors mean.
Scammers are using the power of artificial intelligence to mimic voices of people and are using the fake voices to commit crimes, like kidnappings.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Tech guru Kurt "CyberGuy" Knutsson explains the science behind the Invisibility Shield, a 6-foot shield that makes people become invisible.
The International Olympic Committee on Friday announced plans to use AI in various Olympic aspects, including athlete identification, training and judging.
Tech guru Kurt "CyberGuy" Knutsson explains an easy trick to avoid squinting while working or surfing the web by zooming in on your personal computer.
Streaming giant Roku has recently been targeted by a pair of cyberattacks, and the company confirmed over a half million Roku accounts were compromised.
The Land Aircraft Carrier combines an all-terrain, six-wheeled vehicle with a two-seat aircraft, which features electric vertical takeoff and landing.
The European Union has sent TikTok a "request for information" on the video sharing platform's newest app, TikTok Lite, under the Digital Services Act, with the aim to clean up social media.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The FBI is warning the public about a recent phishing scam via text that claims its targets owe money in Pennsylvania for unpaid road toll charges.
Your Apple Music settings may be revealing to your contacts what you're listening to. Kurt "CyberGuy" Knutsson explains the process to change those settings.
Learn how to secure social media accounts, implement legacy contacts, and create a digital estate plan to protect your online assets from 'ghost hackers' after your death.
A ported phone number scam is leading to more people having their identities stolen by sophisticated scammers. Kurt “CyberGuy" Knutsson tells you what you need to know.

15 New Years and Holiday Resolutions For Parents

Have you made your usual New Year resolutions? You know... Read More

Public School Sex-Education Classes --- Bad News For Parents and Children

One of parents' most important duties is to protect their... Read More

The Personality of a Virgo Child

Your Virgo Baby..August 23 - September 22Virgo children are honest... Read More

Creating a Memorable Travel Journal Using A Stuffed Animal

You may remember The Red Couch Project, a book by... Read More

What the Matter Is

When my oldest boy was really young, he tickled my... Read More

Committed Parenting

When you think about it, probably the one thing that... Read More

Intro to Medications for ADD ADHD

The most common medications used in the treatment of Attention... Read More

Advocating for Your Child with LD

Advocate: you've probably heard the term before. But what does... Read More

Trip, Trip, Trip... Here Is Your Night Visitor Again!

Night Visits From Your ChildIn the middle of the night... Read More

10 Universal Laws for Parents of Teens

1 "Law of Belonging": The greatest need of teenagers (after... Read More

The Worlds Greatest Dad

You are in the final round of your favorite game... Read More

Hints on how to encourage children to read

Hints from Ruowen Wang? Keep a small basket filled with... Read More

After the Driving School

If you visit search engines you can find several resources... Read More

Your Job as a Role Model

A certain educator was once asked at what point should... Read More

Can Mineral Deficiencies Lead to Behavioral Problems in Children?

A while ago I received this story from David in... Read More

How To Entertain A Child While Working From A Home Office

There is no doubt that the benefits of being a... Read More

Some Good News About Blended Families

They Spur Members To Grow EmotionallyTatiana Tannenbaum grappled with a... Read More

Meet The Twixters!

There is a new stage of development for parents to... Read More

Top 5 Characteristics of Good Leadership to Instill in Our Home School Children

I am sure that this list can be jogged and... Read More

Break Free From Power Struggles

You want your daughter to wear a dress to the... Read More

How Being a Mom Makes You a Better Professional

"Becoming a parent can make you a better worker," New... Read More

Would You Hire This Teacher?

Imagine you were the principal of the school that your... Read More

7 Ways to Know Your Child

How well do you really know your child?There is so... Read More

Parenting Your Teenager: But everyone else gets to do it!

Q. We are getting to the stage with our kids... Read More

Where Is Your Homework, Lisa?

Is Homework Really That Important?Dear Friends,I no longer teach in... Read More

shuttle from O'Hare North Chicago ..