SlideShare una empresa de Scribd logo
1 de 5
Good News about Kids' Online Behavior
Study shows that cyberbullying and internet harassment have declined.

Study and Report about Kids' Online Behavior




McAfee, a computer security company headquartered in Santa Clara, California, has
made a study about kids online behavior. The study, conducted by Harris Interactive,
included interviews with almost 1,400 10- to 17-year-olds.

The survey reported that "almost half of youth (46 percent) admit to having given out
their personal information to someone they didn't know over the Internet," but when they
break it down, the survey reveals that "when they do reveal personal information online,
youth are most likely to share their first name (36 percent), age (28 percent), and/or e-
mail address (19 percent). Only around 1 in 10 have given out slightly more personal
information like a photo of themselves, their school name, last name, cell phone number,
or a description of what they look like. And it's also reassuring to read in the study report
that "youth draw the line at giving out personally identifiable information such as their
parents' names, home address, or school address, and virtually no teens report having
given out their Social Security number."

When it comes to cyberbullying, the report also paints a more optimistic picture than
we've seen from some other studies. Only 11 percent admit to ever engaging in some
form of cyberbullying behavior. Even though the press release about the report says
"Cyberbullying on the rise," the report itself shows that the percentage of teens reporting
that they have "ever been bullied or harassed online decreased substantially from 15
percent in 2008 to 8 percent in 2010. Far from an increase, that's an impressive 47
percent decline in two years.

The press release on the report also says that "Nearly 50 Percent of Teens Don't Know
What to Do if Cyberbullied," yet the report itself says that "1 in 4 teens say they wouldn't
know what to do if they were bullied or harassed online" and that a "a significantly higher
proportion disagree with this statement in 2010 than in 2008, suggesting that teens may
now be better equipped to handle cyberbullying."

It further points out that "many youth who have been bullied or harassed online say they
have made some adjustments to their online behavior as a result (72 percent)."




What should parents do to keep children's internet
security?
Even though we are glad to see the good news that the cyberbullying, online predator,
internet harassment is on decline, we still can never relax our vigilance about the kids'
internet security. Children often lack the maturity and social judgment necessary to act
responsibly in the unsupervised, anonymous free for the entire internet. They are always
at the risk of encountering the online dangers. Help them protect themselves.

Internet Security Tips for Kids Online Behavior:
1 Encourage kids to keep passwords secret

• Don't reveal passwords to others

• Protect recorded passwords

• Never provide your password over email or in response to an email request

• Do not type passwords on computers that you do not control

2 Help your kids use social networking safely

• Communicate with kids about their experiences

• Establish Internet rules
• Teach your children never meet anyone in person that they've communicated with
online only

• Encourage your children to communicate with people they already know.

• Teach your children about cyberbullying

3 If your kids blog, make sure they don't reveal too much

• Screen what your kids plan to post before they post it

• Evaluate the blogging service and find out if it offers private, password-protected blogs

• Save the web address of your child's blog and review it on a regular basis

• Check out other blogs to find positive examples for your kids to emulate

4 Beware of online fraud

• Never share personal information

• Log off in public

• Create secure passwords and keep them secret

• Use only secure sites




Parental Control Software Solution to Ensure Kids'
Internet Security:
SurveilStar Parental Control Software is specially designed for parents to monitor and
control kids' computer activity and online behavior and keep them far away from any
online dangers.
Besides the internet security tips for kids you should know, a computer controlling tool is
also essential to assist you to construct a healthy and safe internet environment for kids.
SurveilStar Any Parental Control is a strongly recommended.

Main Features of SurveilStar Any Parental Control
Software:
• Screen Snapshots Taking

Take the real-time screen snapshot of your kids' computer. It makes you keep a close eye
on all your kids online behaviors anywhere anytime.

• Email Recording

Record the email sent & received. Filter out the unwanted Emails and stop the spams that
possibly spread internet threats like the advertisement of porn or gambling sites.

• IM/Chat Controlling

Record all the instant message of your children in chat rooms. Keep you know what they
are talking, who they are talking to. Thus you can stop the action and take immediate
measures if your kids meet the online predators or other internet threats in the chat room.

• Website Visit Monitoring

Have a history record of the visited websites. Block some specific websites which may
contain contents or images of sex, violence or strong language or hate speech. You can
create lists of unacceptable websites and allow access to all others.


buynow       Download
Download Any Parental Control software to monitor your kids online activities, and
have a better idea of their online behavior.

Más contenido relacionado

Destacado

Marketing Strategy for the New Social Web
Marketing Strategy for the New Social WebMarketing Strategy for the New Social Web
Marketing Strategy for the New Social WebMark Kithcart
 
Optimizacion
OptimizacionOptimizacion
Optimizacioncmarquina
 
Sbs ica pre conf 2010-flew
Sbs ica pre conf 2010-flewSbs ica pre conf 2010-flew
Sbs ica pre conf 2010-flewTerry Flew
 
6 a alteracao_e_consolidacao_caladi
6 a alteracao_e_consolidacao_caladi6 a alteracao_e_consolidacao_caladi
6 a alteracao_e_consolidacao_caladiRade Jovanovic
 
Rendición de cuentas presidente comisión
Rendición de cuentas presidente comisiónRendición de cuentas presidente comisión
Rendición de cuentas presidente comisiónComision Salud
 
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...Robert Pinter
 
mundial sudafrica_2010
mundial sudafrica_2010mundial sudafrica_2010
mundial sudafrica_2010carloscrespo1
 
Boletín: Noticias del INPPARES - Julio 2013
Boletín: Noticias del INPPARES - Julio 2013Boletín: Noticias del INPPARES - Julio 2013
Boletín: Noticias del INPPARES - Julio 2013INPPARES / Perú
 
Utilizing Traditional and Social Media
Utilizing Traditional and Social MediaUtilizing Traditional and Social Media
Utilizing Traditional and Social MediaBrooke Hardison
 

Destacado (14)

Marketing Strategy for the New Social Web
Marketing Strategy for the New Social WebMarketing Strategy for the New Social Web
Marketing Strategy for the New Social Web
 
Optimizacion
OptimizacionOptimizacion
Optimizacion
 
Magnificent photos
Magnificent photosMagnificent photos
Magnificent photos
 
Sbs ica pre conf 2010-flew
Sbs ica pre conf 2010-flewSbs ica pre conf 2010-flew
Sbs ica pre conf 2010-flew
 
6 a alteracao_e_consolidacao_caladi
6 a alteracao_e_consolidacao_caladi6 a alteracao_e_consolidacao_caladi
6 a alteracao_e_consolidacao_caladi
 
Candy land
Candy landCandy land
Candy land
 
Rendición de cuentas presidente comisión
Rendición de cuentas presidente comisiónRendición de cuentas presidente comisión
Rendición de cuentas presidente comisión
 
Paperwork2011
Paperwork2011Paperwork2011
Paperwork2011
 
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
 
Pearl 28
Pearl 28Pearl 28
Pearl 28
 
mundial sudafrica_2010
mundial sudafrica_2010mundial sudafrica_2010
mundial sudafrica_2010
 
Boletín: Noticias del INPPARES - Julio 2013
Boletín: Noticias del INPPARES - Julio 2013Boletín: Noticias del INPPARES - Julio 2013
Boletín: Noticias del INPPARES - Julio 2013
 
Utilizing Traditional and Social Media
Utilizing Traditional and Social MediaUtilizing Traditional and Social Media
Utilizing Traditional and Social Media
 
Red seacrossing
Red seacrossingRed seacrossing
Red seacrossing
 

Último

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Good news about kids' online behavior

  • 1. Good News about Kids' Online Behavior Study shows that cyberbullying and internet harassment have declined. Study and Report about Kids' Online Behavior McAfee, a computer security company headquartered in Santa Clara, California, has made a study about kids online behavior. The study, conducted by Harris Interactive, included interviews with almost 1,400 10- to 17-year-olds. The survey reported that "almost half of youth (46 percent) admit to having given out their personal information to someone they didn't know over the Internet," but when they break it down, the survey reveals that "when they do reveal personal information online, youth are most likely to share their first name (36 percent), age (28 percent), and/or e- mail address (19 percent). Only around 1 in 10 have given out slightly more personal information like a photo of themselves, their school name, last name, cell phone number, or a description of what they look like. And it's also reassuring to read in the study report that "youth draw the line at giving out personally identifiable information such as their parents' names, home address, or school address, and virtually no teens report having given out their Social Security number." When it comes to cyberbullying, the report also paints a more optimistic picture than we've seen from some other studies. Only 11 percent admit to ever engaging in some form of cyberbullying behavior. Even though the press release about the report says "Cyberbullying on the rise," the report itself shows that the percentage of teens reporting that they have "ever been bullied or harassed online decreased substantially from 15 percent in 2008 to 8 percent in 2010. Far from an increase, that's an impressive 47 percent decline in two years. The press release on the report also says that "Nearly 50 Percent of Teens Don't Know What to Do if Cyberbullied," yet the report itself says that "1 in 4 teens say they wouldn't know what to do if they were bullied or harassed online" and that a "a significantly higher
  • 2. proportion disagree with this statement in 2010 than in 2008, suggesting that teens may now be better equipped to handle cyberbullying." It further points out that "many youth who have been bullied or harassed online say they have made some adjustments to their online behavior as a result (72 percent)." What should parents do to keep children's internet security? Even though we are glad to see the good news that the cyberbullying, online predator, internet harassment is on decline, we still can never relax our vigilance about the kids' internet security. Children often lack the maturity and social judgment necessary to act responsibly in the unsupervised, anonymous free for the entire internet. They are always at the risk of encountering the online dangers. Help them protect themselves. Internet Security Tips for Kids Online Behavior: 1 Encourage kids to keep passwords secret • Don't reveal passwords to others • Protect recorded passwords • Never provide your password over email or in response to an email request • Do not type passwords on computers that you do not control 2 Help your kids use social networking safely • Communicate with kids about their experiences • Establish Internet rules
  • 3. • Teach your children never meet anyone in person that they've communicated with online only • Encourage your children to communicate with people they already know. • Teach your children about cyberbullying 3 If your kids blog, make sure they don't reveal too much • Screen what your kids plan to post before they post it • Evaluate the blogging service and find out if it offers private, password-protected blogs • Save the web address of your child's blog and review it on a regular basis • Check out other blogs to find positive examples for your kids to emulate 4 Beware of online fraud • Never share personal information • Log off in public • Create secure passwords and keep them secret • Use only secure sites Parental Control Software Solution to Ensure Kids' Internet Security: SurveilStar Parental Control Software is specially designed for parents to monitor and control kids' computer activity and online behavior and keep them far away from any online dangers.
  • 4. Besides the internet security tips for kids you should know, a computer controlling tool is also essential to assist you to construct a healthy and safe internet environment for kids. SurveilStar Any Parental Control is a strongly recommended. Main Features of SurveilStar Any Parental Control Software: • Screen Snapshots Taking Take the real-time screen snapshot of your kids' computer. It makes you keep a close eye on all your kids online behaviors anywhere anytime. • Email Recording Record the email sent & received. Filter out the unwanted Emails and stop the spams that possibly spread internet threats like the advertisement of porn or gambling sites. • IM/Chat Controlling Record all the instant message of your children in chat rooms. Keep you know what they are talking, who they are talking to. Thus you can stop the action and take immediate measures if your kids meet the online predators or other internet threats in the chat room. • Website Visit Monitoring Have a history record of the visited websites. Block some specific websites which may contain contents or images of sex, violence or strong language or hate speech. You can create lists of unacceptable websites and allow access to all others. buynow Download
  • 5. Download Any Parental Control software to monitor your kids online activities, and have a better idea of their online behavior.