SlideShare una empresa de Scribd logo
1 de 5
Good News about Kids' Online Behavior
Study shows that cyberbullying and internet harassment have declined.

Study and Report about Kids' Online Behavior




McAfee, a computer security company headquartered in Santa Clara, California, has
made a study about kids online behavior. The study, conducted by Harris Interactive,
included interviews with almost 1,400 10- to 17-year-olds.

The survey reported that "almost half of youth (46 percent) admit to having given out
their personal information to someone they didn't know over the Internet," but when they
break it down, the survey reveals that "when they do reveal personal information online,
youth are most likely to share their first name (36 percent), age (28 percent), and/or e-
mail address (19 percent). Only around 1 in 10 have given out slightly more personal
information like a photo of themselves, their school name, last name, cell phone number,
or a description of what they look like. And it's also reassuring to read in the study report
that "youth draw the line at giving out personally identifiable information such as their
parents' names, home address, or school address, and virtually no teens report having
given out their Social Security number."

When it comes to cyberbullying, the report also paints a more optimistic picture than
we've seen from some other studies. Only 11 percent admit to ever engaging in some
form of cyberbullying behavior. Even though the press release about the report says
"Cyberbullying on the rise," the report itself shows that the percentage of teens reporting
that they have "ever been bullied or harassed online decreased substantially from 15
percent in 2008 to 8 percent in 2010. Far from an increase, that's an impressive 47
percent decline in two years.

The press release on the report also says that "Nearly 50 Percent of Teens Don't Know
What to Do if Cyberbullied," yet the report itself says that "1 in 4 teens say they wouldn't
know what to do if they were bullied or harassed online" and that a "a significantly higher
proportion disagree with this statement in 2010 than in 2008, suggesting that teens may
now be better equipped to handle cyberbullying."

It further points out that "many youth who have been bullied or harassed online say they
have made some adjustments to their online behavior as a result (72 percent)."




What should parents do to keep children's internet
security?
Even though we are glad to see the good news that the cyberbullying, online predator,
internet harassment is on decline, we still can never relax our vigilance about the kids'
internet security. Children often lack the maturity and social judgment necessary to act
responsibly in the unsupervised, anonymous free for the entire internet. They are always
at the risk of encountering the online dangers. Help them protect themselves.

Internet Security Tips for Kids Online Behavior:
1 Encourage kids to keep passwords secret

• Don't reveal passwords to others

• Protect recorded passwords

• Never provide your password over email or in response to an email request

• Do not type passwords on computers that you do not control

2 Help your kids use social networking safely

• Communicate with kids about their experiences

• Establish Internet rules
• Teach your children never meet anyone in person that they've communicated with
online only

• Encourage your children to communicate with people they already know.

• Teach your children about cyberbullying

3 If your kids blog, make sure they don't reveal too much

• Screen what your kids plan to post before they post it

• Evaluate the blogging service and find out if it offers private, password-protected blogs

• Save the web address of your child's blog and review it on a regular basis

• Check out other blogs to find positive examples for your kids to emulate

4 Beware of online fraud

• Never share personal information

• Log off in public

• Create secure passwords and keep them secret

• Use only secure sites




Parental Control Software Solution to Ensure Kids'
Internet Security:
SurveilStar Parental Control Software is specially designed for parents to monitor and
control kids' computer activity and online behavior and keep them far away from any
online dangers.
Besides the internet security tips for kids you should know, a computer controlling tool is
also essential to assist you to construct a healthy and safe internet environment for kids.
SurveilStar Any Parental Control is a strongly recommended.

Main Features of SurveilStar Any Parental Control
Software:
• Screen Snapshots Taking

Take the real-time screen snapshot of your kids' computer. It makes you keep a close eye
on all your kids online behaviors anywhere anytime.

• Email Recording

Record the email sent & received. Filter out the unwanted Emails and stop the spams that
possibly spread internet threats like the advertisement of porn or gambling sites.

• IM/Chat Controlling

Record all the instant message of your children in chat rooms. Keep you know what they
are talking, who they are talking to. Thus you can stop the action and take immediate
measures if your kids meet the online predators or other internet threats in the chat room.

• Website Visit Monitoring

Have a history record of the visited websites. Block some specific websites which may
contain contents or images of sex, violence or strong language or hate speech. You can
create lists of unacceptable websites and allow access to all others.


buynow       Download
Download Any Parental Control software to monitor your kids online activities, and
have a better idea of their online behavior.

Más contenido relacionado

Destacado

Marketing Strategy for the New Social Web
Marketing Strategy for the New Social WebMarketing Strategy for the New Social Web
Marketing Strategy for the New Social WebMark Kithcart
 
Optimizacion
OptimizacionOptimizacion
Optimizacioncmarquina
 
Sbs ica pre conf 2010-flew
Sbs ica pre conf 2010-flewSbs ica pre conf 2010-flew
Sbs ica pre conf 2010-flewTerry Flew
 
6 a alteracao_e_consolidacao_caladi
6 a alteracao_e_consolidacao_caladi6 a alteracao_e_consolidacao_caladi
6 a alteracao_e_consolidacao_caladiRade Jovanovic
 
Rendición de cuentas presidente comisión
Rendición de cuentas presidente comisiónRendición de cuentas presidente comisión
Rendición de cuentas presidente comisiónComision Salud
 
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...Robert Pinter
 
mundial sudafrica_2010
mundial sudafrica_2010mundial sudafrica_2010
mundial sudafrica_2010carloscrespo1
 
Boletín: Noticias del INPPARES - Julio 2013
Boletín: Noticias del INPPARES - Julio 2013Boletín: Noticias del INPPARES - Julio 2013
Boletín: Noticias del INPPARES - Julio 2013INPPARES / Perú
 
Utilizing Traditional and Social Media
Utilizing Traditional and Social MediaUtilizing Traditional and Social Media
Utilizing Traditional and Social MediaBrooke Hardison
 

Destacado (14)

Marketing Strategy for the New Social Web
Marketing Strategy for the New Social WebMarketing Strategy for the New Social Web
Marketing Strategy for the New Social Web
 
Optimizacion
OptimizacionOptimizacion
Optimizacion
 
Magnificent photos
Magnificent photosMagnificent photos
Magnificent photos
 
Sbs ica pre conf 2010-flew
Sbs ica pre conf 2010-flewSbs ica pre conf 2010-flew
Sbs ica pre conf 2010-flew
 
6 a alteracao_e_consolidacao_caladi
6 a alteracao_e_consolidacao_caladi6 a alteracao_e_consolidacao_caladi
6 a alteracao_e_consolidacao_caladi
 
Candy land
Candy landCandy land
Candy land
 
Rendición de cuentas presidente comisión
Rendición de cuentas presidente comisiónRendición de cuentas presidente comisión
Rendición de cuentas presidente comisión
 
Paperwork2011
Paperwork2011Paperwork2011
Paperwork2011
 
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
 
Pearl 28
Pearl 28Pearl 28
Pearl 28
 
mundial sudafrica_2010
mundial sudafrica_2010mundial sudafrica_2010
mundial sudafrica_2010
 
Boletín: Noticias del INPPARES - Julio 2013
Boletín: Noticias del INPPARES - Julio 2013Boletín: Noticias del INPPARES - Julio 2013
Boletín: Noticias del INPPARES - Julio 2013
 
Utilizing Traditional and Social Media
Utilizing Traditional and Social MediaUtilizing Traditional and Social Media
Utilizing Traditional and Social Media
 
Red seacrossing
Red seacrossingRed seacrossing
Red seacrossing
 

Último

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Último (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Good news about kids' online behavior

  • 1. Good News about Kids' Online Behavior Study shows that cyberbullying and internet harassment have declined. Study and Report about Kids' Online Behavior McAfee, a computer security company headquartered in Santa Clara, California, has made a study about kids online behavior. The study, conducted by Harris Interactive, included interviews with almost 1,400 10- to 17-year-olds. The survey reported that "almost half of youth (46 percent) admit to having given out their personal information to someone they didn't know over the Internet," but when they break it down, the survey reveals that "when they do reveal personal information online, youth are most likely to share their first name (36 percent), age (28 percent), and/or e- mail address (19 percent). Only around 1 in 10 have given out slightly more personal information like a photo of themselves, their school name, last name, cell phone number, or a description of what they look like. And it's also reassuring to read in the study report that "youth draw the line at giving out personally identifiable information such as their parents' names, home address, or school address, and virtually no teens report having given out their Social Security number." When it comes to cyberbullying, the report also paints a more optimistic picture than we've seen from some other studies. Only 11 percent admit to ever engaging in some form of cyberbullying behavior. Even though the press release about the report says "Cyberbullying on the rise," the report itself shows that the percentage of teens reporting that they have "ever been bullied or harassed online decreased substantially from 15 percent in 2008 to 8 percent in 2010. Far from an increase, that's an impressive 47 percent decline in two years. The press release on the report also says that "Nearly 50 Percent of Teens Don't Know What to Do if Cyberbullied," yet the report itself says that "1 in 4 teens say they wouldn't know what to do if they were bullied or harassed online" and that a "a significantly higher
  • 2. proportion disagree with this statement in 2010 than in 2008, suggesting that teens may now be better equipped to handle cyberbullying." It further points out that "many youth who have been bullied or harassed online say they have made some adjustments to their online behavior as a result (72 percent)." What should parents do to keep children's internet security? Even though we are glad to see the good news that the cyberbullying, online predator, internet harassment is on decline, we still can never relax our vigilance about the kids' internet security. Children often lack the maturity and social judgment necessary to act responsibly in the unsupervised, anonymous free for the entire internet. They are always at the risk of encountering the online dangers. Help them protect themselves. Internet Security Tips for Kids Online Behavior: 1 Encourage kids to keep passwords secret • Don't reveal passwords to others • Protect recorded passwords • Never provide your password over email or in response to an email request • Do not type passwords on computers that you do not control 2 Help your kids use social networking safely • Communicate with kids about their experiences • Establish Internet rules
  • 3. • Teach your children never meet anyone in person that they've communicated with online only • Encourage your children to communicate with people they already know. • Teach your children about cyberbullying 3 If your kids blog, make sure they don't reveal too much • Screen what your kids plan to post before they post it • Evaluate the blogging service and find out if it offers private, password-protected blogs • Save the web address of your child's blog and review it on a regular basis • Check out other blogs to find positive examples for your kids to emulate 4 Beware of online fraud • Never share personal information • Log off in public • Create secure passwords and keep them secret • Use only secure sites Parental Control Software Solution to Ensure Kids' Internet Security: SurveilStar Parental Control Software is specially designed for parents to monitor and control kids' computer activity and online behavior and keep them far away from any online dangers.
  • 4. Besides the internet security tips for kids you should know, a computer controlling tool is also essential to assist you to construct a healthy and safe internet environment for kids. SurveilStar Any Parental Control is a strongly recommended. Main Features of SurveilStar Any Parental Control Software: • Screen Snapshots Taking Take the real-time screen snapshot of your kids' computer. It makes you keep a close eye on all your kids online behaviors anywhere anytime. • Email Recording Record the email sent & received. Filter out the unwanted Emails and stop the spams that possibly spread internet threats like the advertisement of porn or gambling sites. • IM/Chat Controlling Record all the instant message of your children in chat rooms. Keep you know what they are talking, who they are talking to. Thus you can stop the action and take immediate measures if your kids meet the online predators or other internet threats in the chat room. • Website Visit Monitoring Have a history record of the visited websites. Block some specific websites which may contain contents or images of sex, violence or strong language or hate speech. You can create lists of unacceptable websites and allow access to all others. buynow Download
  • 5. Download Any Parental Control software to monitor your kids online activities, and have a better idea of their online behavior.