tjhis article will help parents propect their children on the web |
Whatever it’s called, the majority of people in developed nations are now going online to exchange electronic mail (E-mail) and instant messages; participate in chat groups; post and read messages in social networking sites and blogs, “surf” the world wide web; and many other online activities. Children are no exception in fact they are more likely to be online than adults. Personal computers are no longer the only method used for accessing the Internet. Children can go online from personal computers at home, a friend’s house, in school, a library, club, or cafe. Many game consoles can be connected to the Internet and used for chatting and other online interaction. It is also possible to access the Internet on mobile devices such as cellular telephones and other handheld devices. In other words children don’t have to be in the company of responsible adults to use the Internet. Even though companies that provide Internet access strive to provide their subscribers with an enjoyable, safe, and rewarding online experience, it’s not possible for these companies to monitor everyone who uses their service anymore than a local government can control the behavior of the people within its borders. Once you’re connected to the Internet you’re able to exchange information with people who use other providers unless you’re using a service that offers restricted access such as blocking mail from outside the service or from people who aren’t pre-approved by a child’s parent. There are no censors on the Internet. Anyone in the world — companies, governments, organizations, and individuals — can publish material on the Internet. A service provider links you to these sites, but it can’t control what is on them. It’s up to individuals to make sure that they behave in a way that’s safe and appropriate. Benefits of the Information Highway “As an educational…tool users can learn about virtually any topic…” There is a vast array of services available online. Reference information such as airline fares, encyclopedias, movie reviews, news, sports, stock quotes, and weather are readily available. Users can conduct transactions such as banking, making travel reservations, shopping, and trading stocks online. You can find information about your local schools, government, vital health matters, or read an out-of-town newspaper or watch TV and listen to radio from thousands of online “stations” around the globe. Hundreds of millions of people communicate through E-mail with family, friends, and colleagues around the world. Others use chat areas to make new friends who share common interests. You can even use the Internet to watch videos and listen to audio programs produced by major media companies, businesses, organizations, and individuals. In fact, there is a growing trend towards “user supplied” video that can vary in quality, content and suitability for a general audience. As an educational and entertainment tool users can learn about virtually any topic, visit a museum, take a college course, or play an endless number of computer games with other users or against the computer itself. Most people who go online have mainly positive experiences. But, like any endeavor — attending school, cooking, riding a bicycle, or traveling, — there are some risks and annoyances. The online world, like the rest of society, is made up of a wide array of people. Most are decent and respectful, but some may be rude, obnoxious, insulting, or even mean and exploitative. Children get a lot of benefit from being online, but they can also be targets of crime, exploitation, and harassment in this as in any other environment. Trusting, curious, and anxious to explore this new world and the relationships it brings, children need parental supervision and common-sense advice on how to be sure that their experiences in “cyberspace” are happy, healthy, and productive. Putting the Issue in Perspective There have been some highly publicized cases of exploitation involving the Internet, but that doesn’t mean that every child will experience major problems. The vast majority of people who use the Internet do not get into serious trouble. Many people, including children, have been confronted with material that is disturbing or inappropriate. There are steps parents can take to try to shield their children from such material, but it’s almost impossible to completely avoid all inappropriate material. Sadly there are some cases where children have been victimized by serious crime as a result of going online. Parents can greatly minimize the chances that their children will be victimized by teaching their children to follow our basic safety rules. The fact that crimes are being committed online, however, is not a reason to avoid using the Internet. To tell children to stop using the Internet would be like telling them to forgo attending school because students are sometimes victimized or bullied there. A better strategy would be to instruct children about both the benefits and dangers of “cyberspace” and for them to learn how to be “street smart” in order to better safeguard themselves in any potentially dangerous situation. What Are the Risks? There are a few risks for children who use the Internet or other online services. Teenagers are particularly at risk because they often go online unsupervised and are more likely than younger children to participate in online discussions regarding companionship, relationships, or sexual activity. If you have a teen in your family or you are a teenager, check out Teen Safety on the Information Highway or order a free copy by calling 1-800-843-5678. Some risks are Exposure to Inappropriate Material A child may be exposed to inappropriate material that is sexual, hateful, or violent in nature, or encourages activities that are dangerous or illegal. Children could seek out such material but may also come across it on the web via chat areas, social networking sites, E-mail, or even instant messaging if they’re not looking for it. Physical Molestation A child might provide information or arrange an encounter that could risk his or her safety or the safety of other family members. In some cases child molesters have used chat areas, E-mail, and instant messages to gain a child’s confidence and then arrange a face-to-face meeting. Harassment and Bullying A child might encounter messages via chat, E-mail, on their social networking site or their cellular telephones that are belligerent, demeaning, or harassing. “Bullies,” typically other young people, often use the Internet to bother their victims. Viruses and Hackers A child could download a file containing a virus that could damage the computer or increase the risk of a “hacker” gaining remote access to the computer; jeopardizing the family’s privacy; and, perhaps, jeopardizing the family’s safety. Legal and Financial A child could do something that has negative legal or financial consequences such as giving out a parent’s credit-card number or doing something that could get them in trouble with the law or school officials. Legal issues aside, children should be taught good “netiquette” which means to avoid being inconsiderate, mean, or rude. How Parents Can Reduce the Risks While children need a certain amount of privacy, they also need parental involvement and supervision in their daily lives. The same general parenting skills that apply to the “real world” also apply while online. If you have cause for concern about your children’s online activities, talk to them. Also seek out the advice and counsel of teachers, librarians, and other parents. Having open communication with your children, using computer resources, and getting online yourself will help you obtain the full benefits of these systems and alert you to any potential problem that may occur with their use. If your child tells you about an upsetting message, person, or web site encountered while online, don’t blame your child but help him or her avoid problems in the future. Remember — how you respond will determine whether they confide in you the next time they encounter a problem and how they learn to deal with problems on their own. Beyond these basics, there are some specific things that you should know about the Internet. For instance did you know that there are chat areas, newsgroups, and web sites that have material that is hateful, is violent, or contains other types of material that parents might consider to be inappropriate for their children? It’s possible for children to stumble across this type of material when doing a search using one of the web sites that is specifically designed to help people find information on the Internet. Most of these sites, called “search engines,” do not, by default, filter out material that might be inappropriate for children, but some offer a child safe option and some are designed specifically for use by children. Also the Internet contains newsgroups, web sites, and other areas designed specifically for adults who wish to post, read, or view sexually explicit material including pictures, stories, and videos. Some of this material is posted on web sites where there is an attempt to verify the user’s age and/or a requirement for users to enter a credit-card number on the presumption that children do not have access to credit-card numbers. Other areas on the Internet make no such effort to control access. Nevertheless, consider monitoring your credit-card bills for such charges. In addition to “adult” pornography, there are also areas on the Internet that contain illegal child pornography. If you or your children come across this type of material, immediately report it to the National Center for Missing & Exploited Children’s (NCMEC) CyberTipline® at www.cybertipline.com. Some internet service providers allow parents to limit their children’s access to certain services and features such as adult-oriented “chatrooms,” bulletin boards, and web sites. There may be an area just for children where it is less likely for them to stumble onto inappropriate material or get into an unsupervised “chatroom.” At the very least, keep track of any files your children download to the computer, consider sharing an E-mail account with your children to oversee their mail, and consider joining them when they are in private chat areas. In addition there are ways to filter or control what your children can see and do online. One type of filter, called a “spam” filter limits unsolicited E-mail including mail promoting sexually explicit material. Some service providers include filters as part of their service but, if not, there is software you can purchase that will attempt to limit the type of mail that gets through. There are also ways to filter what a child can see on the world wide web. Check with your service provider to see if they offer age-appropriate parental controls. If not consider using a software program that blocks chat areas, newsgroups, and web sites that are known to be inappropriate for children. Most of these programs can be configured by the parent to filter out sites that contain nudity, sexual content, hateful or violent material or that advocate the use of alcohol, drugs, or tobacco. Some can also be configured to prevent children from revealing information about themselves such as their name, address, or telephone number. You can find a directory of these filtering programs at kids.getnetwise.org/tools/. Also, the latest versions of both Microsoft Windows (Vista) and Apple’s OS X have parental control tools that can limit what you child can do online. Another option is to use a rating system that relies on web-site operators to indicate the nature of their material. Internet browsers can be configured to only allow children to visit sites that are rated at the level that the parents specify. The advantage to this method is that only appropriately rated sites can be viewed. The disadvantage is that many appropriate web sites have not submitted themselves for a rating and will therefore be blocked. While technological-child-protection tools are worth exploring, they’re not a panacea. To begin with, no program is perfect. There is always the possibility that something inappropriate could “slip through” or something that is appropriate will be blocked. Finally, filtering programs do not necessarily protect children from all dangerous activities. And even though they might block children can see online, they might not block what they can say. For example, even with a filter it might be possible for a child to post inappropriate material or personal information on a social networking site or blog or disclose it in a chat room or instant message. Also some filters do not work with peer-to-peer networks that allow people to exchange files such as music, pictures, text, and videos. These peer to- peer networks are sometimes used to distribute pornography, including child pornography. Filters are not a substitute for parental involvement. Regardless of whether you choose to use a filtering program or an Internet rating system, the best way to assure that your children are having positive online experiences is to stay in touch with what they are doing. One way to do this is to spend time with your children while they’re online. Have them show you what they If a meeting is arranged, make the first one in a public place. And be sure to accompany your child. do, and ask them to teach you how to use the Internet or online service. You might be surprised by how much you can learn from your children. Guidelines for Parents Set reasonable rules and guidelines for computer use by your children By taking responsibility for your children’s online computer use, parents can greatly minimize any potential risks of being online. Make it a family rule to Never give out identifying information — home address, school name, or telephone number — in a public message such as chat or newsgroups, and be sure you’re dealing with someone both you and your children know and trust before giving out this information via E-mail. Think carefully before revealing any personal information such as age, financial information, or marital status. Do not post photographs of your children in newsgroups or on web sites that are available to the public. Consider using a pseudonym, avoid listing your child’s name and E-mail address in any public directories and profiles, and find out about your ISP’s privacy policies and exercise your options for how your personal information may be used. Get to know the Internet and any services your child uses. If you don’t know how to log on, get your child to show you. Have your child show you what he or she does online, and become familiar with all the activities that are available online. Find out if your child has a free web-based E-mail account, such as those offered by Hotmail and Yahoo!® , and learn their user names and passwords. Never allow a child to arrange a face-to-face meeting with someone they “meet” on the Internet without parental permission. If a meeting is arranged, make the first one in a public place, and be sure to accompany your child. Never respond to messages that are suggestive, obscene, belligerent, threatening, or make you feel uncomfortable. Encourage your children to tell you if they encounter such messages. If you or your child receives a message that is harassing, of a sexual nature, or threatening, forward a copy of the message to your ISP, and ask for their assistance. Instruct your child not to click on any links that are contained in E-mail from persons they don’t know. Such links could lead to sexually explicit or otherwise inappropriate web sites or could be a computer virus. If someone sends you or your children messages or images that are filthy, indecent, lewd, or obscene with the intent to abuse, annoy, harass, or threaten you, or if you become aware of the transmission, use, or viewing of child pornography while online immediately report this to the NCMEC’s CyberTipline at 1-800-843-5678 or www.cybertipline.com. Set reasonable rules and guidelines for computer use by your children. Remember that people online may not be who they seem. Because you can’t see or even hear the person it would be easy for someone to misrepresent him- or herself. Thus someone indicating that “she” is a “12-year-old girl” could in reality be a 40-year-old man. Remember that everything you read online may not be true. Any offer that’s “too good to be true” probably is. Be careful about any offers that involve you going to a meeting, having someone visit your house, or sending money or credit-card information. Set reasonable rules and guidelines for computer use by your children. (See “My Rules for Online Safety” on the back cover.) Discuss these rules and post them near the computer as a reminder. Remember to monitor your children’s compliance with these rules, especially when it comes to the amount of time your children spend on the computer. A child’s excessive use of online services or the Internet, especially late at night, may be a clue that there is a potential problem. Remember that personal computers and online services should not be used as electronic babysitters. Check out blocking, filtering, and ratings applications. Be sure to make this a family activity. Consider keeping the computer in a family room rather than the child’s bedroom. Get to know their “online friends” just as you get to know all of their other friends. If your child has a cellular telephone, talk with him or her about using it safely. The same rules that apply to computer use, also apply to cellular telephones. About this Document This document was written by Larry Magid, a syndicated columnist and technology commentator, who is coauthor of MySpace Unraveled (Peachpit Press) and host of www.safekids.com, a web site devoted to keeping children safer in “cyberspace.” He is also the author of Teen Safety on the Information Highway, a free brochure that is also published by the National Center for Missing & Exploited Children. The National Center for Missing & Exploited Children (NCMEC) is the national clearinghouse and resource center funded under Cooperative Agreement #98-MC-CX-K002 from the Office of Juvenile Justice and Delinquency Prevention, Office of Justice Programs, U.S. Department of Justice. Points of view or opinions in this work are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice or Bureau of Immigration and Customs Enforcement, U.S. Department of Homeland Security. |