Cybersafety, Cybersecurity and Cyberethics for children (maybe adults too)
I had mentioned in an earlier blog that kids of today seem to be wired at birth. The other day my 4 year old daughter had the laptop propped up and was intently watching a movie on YouTube and I asked my 10 year old son if he had set the movie up for her and he said “no, she did it herself”, so my husband went up to my daughter and asked her to show him how she had started watching the movie and to our shock and surprise she typed the spelling of the movie (blame me for teaching her to read so soon) on the Google search bar and tapped the enter button and when a bunch of listing came up she clicked on the listing with pictures of the movie on it (she recognized it since she had watched that film before on TV) and was engrossed in watching it till we intervened. Now if my 4 year old did that what about older children and teenagers…
Children nowadays spend a lot of time on the internet and engage in social networking with their friends and even strangers and most of the adults are not aware of the online activites that their kids are engaging in. Children post their entire profile with their contact information, name, photo’s etc exposing themselves as targets to be lured by online solicitors who could range from a business entity wanting your child to sign up for some online game, program asking them to sign in with all their information or someone targeting your child with sexual material, bullying or inappropriate pranks. A child may not feel comfortable talking to their parent or guardian about it because they might feel embarrased or feel that the adult will not understand, does not have the time, or an adult may truly not be internet savvy or computer literate.
The solution to such situations is to foster open communication between the child and adult, together have them attend educative information sessions on such issues, help the adult get internet savvy and also have the adult join social networking sites like MySpace, Facebook, Friendster etc where their child socially interacts to know what takes place there and understand the child of this era. This way the child feels that their parents are cool and OK and not living in the stone age.
The best thing an adult can do is spend time with the child, be interested in their activities and engage in them with the child.
-
Archives
- May 2009 (1)
- March 2009 (2)
- February 2009 (5)
- December 2008 (3)
- October 2008 (1)
- August 2008 (7)
- July 2008 (4)
- June 2008 (6)
- May 2008 (8)
- April 2008 (8)
- March 2008 (1)
- February 2008 (11)
-
Categories
- ABA Bar Journal
- Airport security
- America COMPETES Act
- Antipiracy technology
- Antitrust
- Apple
- AT&T
- Billionaires in India
- Blogs
- blogTV
- Botnets
- Business
- Canadian Copyright
- Children
- China
- clandestine movie taping
- Cloned food
- Communication Decency Act
- compulsory vaccinations
- Computer hacking
- Contract
- Cops inside the Internet
- Copyright
- Copyright and innovation
- Copyright Infringement
- Courage and Love
- Cyber safety
- cybercrime
- cyberethics
- cyberlaw
- Cybersafety
- cybersecurity
- Cybersquatting
- Cyberwar
- Defamation
- Digital technology
- DMCA
- domain info
- Domain name registration
- DoubleClick
- email in Hindi
- Emerging India
- EU
- Executive Privilege
- Faith
- FDA
- FISA
- Forbe's list
- Fraud
- Free Speech
- freedom
- FTC
- Global privacy
- Google and trademarks
- Google's Gphone
- Googleplex
- GPay
- Gphone
- HIPAA
- Identity theft
- Immigration
- India
- India Innovative Act
- Indian Business Women
- Indian IT sector
- Industries
- Intellectual property enforcement
- Internet
- Inventions
- IP infringement
- iPhone
- iPod Touch
- Labeling
- Lanham Act.
- liberty
- Licensing
- Live streaming video
- Marketing
- Medical records
- Microsoft
- Monks
- Monopoly
- Music Sharing
- Networking Sites
- New age
- On-line world
- online fraud
- p2p
- parents liability
- passwords
- patent law
- Patent Reform
- PBS Wired Science
- Perjury
- Personal information
- Phishing
- photographing a witness
- Piracy
- privacy
- Razr2
- Research
- RFID chips
- RIAA
- Security
- site linking
- Social networking
- spam
- Spam. Identity theft
- Splogs and Blawgs
- Statutory Rape
- Steve Jobs
- Surveillance
- surveillance technology
- Targeted advertising
- Technology
- Technology and law
- Technology industry
- Trademark
- Treo
- Uncategorized
- Unethical conduct
- Victim identification
- Virtual Friends
- VMWare
- Wiretapping
- Witness intimidation
- Yahoo
- YouTube
-
RSS
Entries RSS
Comments RSS