Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Record 14 of 17
Results Page:  Previous Next
Author Criddle, Linda.

Title Look both ways : help protect your family on the Internet / Linda Criddle with Nancy Muir. [O'Reilly electronic resource]

Imprint Redmond, Wash. : Microsoft Press, ©2006.
QR Code
Description 1 online resource (xxii, 216 pages) : illustrations, map
Bibliography Includes bibliographical references and index.
Summary Learn 14 ways in which you can help make the Internet a safer place for you and your family. This guide, written by a leading child safety expert, offers families practical advice for avoiding risks on the Internet. Learn the 14 ways in which you can help make the Internet a safer place for you and your family. You teach your children to look both ways before crossing the street. You tell them not to talk to strangers. But do you really know how to teach them to safely use the Internet? In this book, Linda Criddle, a leading child safety expert, offers a practical education about what is safe, what is not, and how taking a few precautions can help your children avoid putting themselves at risk. Discover what the risks are today and common ways in which people inadvertently expose themselves and accidentally reveal information. Learn how to be alert, avoid instant messaging and e-mail dangers, blog and play games safely, and avoid harassment and bullying.
Contents Cover; Copyright Page; Praise for Look Both Ways . . .; Acknowledgments; Table of Contents; Introduction; Is This Book for You?; Start with a Technology Base; How This Book Is Organized; Special Elements; How to Get the Most from This Book; Quick Safety Checklist; Part One: Understanding the Risks; Chapter 1: The Landscape of Risk; What's Going On Out There?; Who Are These Cybercriminals?; Who's Vulnerable?; How Big Is the Problem?; How Are You Putting Yourself at Risk?; What Can You Do?; Making the Internet Safer for Your Family; Taking the First Step; You Are Not Alone; What's Next?
Chapter 2: Misperceptions About Online AnonymityLeaving a Trail of Clues; The Lure of Anonymity; How Predators Use Anonymity; What Can You Do?; Chapter 3: Thinking Like the Enemy: Predatory Behavior; Knowing the Enemy; Recognizing Sexual Predators, Offline and On; How Predators Choose Their Victims; The Victim Grooming Process; Who Is Not at Fault; A Special Note About Sensitivity to Victims of Sexual Abuse; Part Two: 13 Steps to Internet Security; Chapter 4: Step 1: Be Careful What You Show People; What Just Happened?; Assessing the Risks; What Forms of Visual Information Put You at Risk?
Protecting YourselfChapter 5: Step 2: Don't Tell People More Than You Should; What Just Happened?; What Is Social Networking?; Assessing the Risks; Protecting Yourself; Chapter 6: Step 3: Be Alert to How Predators Prey on Emotions; What Just Happened?; Assessing the Risks; Protecting Yourself; Watch Your Own Behavior; Looking for Telltale Signs; Getting the Message Across to Your Kids; Chapter 7: Step 4: Don't Let Them Know Where You Live; What Just Happened?; Assessing the Risks; Why Do They Care Where You Live?; Location Application Dangers; Technology Makes Finding You Easier
Protecting YourselfChapter 8: Step 5: Don't Expose Yourself Through Instant Messaging; What Just Happened?; What Is Instant Messaging?; Assessing the Risks; Protecting Yourself; Chapter 9: Step 6: Reduce Your Vulnerability When Blogging; What Just Happened?; What Is a Blog?; Assessing the Risks; The Blogging Phenomenon; Criminals and Blogs; The Information Connection; What You Expose About Yourself and Others; Who's Most at Risk?; When Spam Meets Blog: Spam + Blog = Splog; Protecting Yourself; Don't Overreact; Knowing How Information Adds Up; Taking Steps for Safety
Be Aware of What Your Friends Are Saying About YouChapter 10: Step 7: Understand Risks of Fraudulent Communications and Protect Yourself; What Just Happened?; What Is Spooling?; What Is Spam?; Assessing the Risks; Telltale Signs of Spam Scams; Facing the Fraud; Communicating Safely; Protecting Yourself; Taking the First Steps; Avoiding Incoming Threats; Chapter 11: Step 8: Date Safely Online; What Just Happened?; Assessing the Risks; Protecting Yourself; Chapter 12: Step 9: Don't Browse Indiscriminately; What Just Happened?; What Are Parental Controls?; Assessing the Risks
Subject Internet and children.
Computers and families.
Internet -- Safety measures.
Internet -- Security measures.
Internet et enfants.
Ordinateurs et familles.
Internet -- Sécurité -- Mesures.
Internet and children.
Computers and family.
Internet -- Safety measures.
Computers and families
Internet and children
Internet -- Safety measures
Added Author Muir, Nancy, 1954- Author.
Other Form: Print version: Criddle, Linda. Look both ways. Redmond, Wash. : Microsoft Press, ©2006 9780735623477 (DLC) 2006927199 (OCoLC)72445975
ISBN 9780735690585 (electronic bk.)
0735690588 (electronic bk.)
9780735647039 (electronic bk.)
0735647038 (electronic bk.)
9780735646162 (electronic bk.)
0735646163 (electronic bk.)
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information