Assignment week 3:
How could we live without the Internet? That’s how most of us keep in touch with friends, find homework support, research a cool place to visit, or find out the latest news.
But besides the millions of sites to visit and things to do, the Internet offers lots of ways to waste time — and even get into trouble. And just as in the non-cyber world, some people you encounter online might try to take advantage of you — financially or physically.
You’ve probably heard stories about people who get into trouble in chat rooms. Because users can easily remain anonymous, chat rooms often attract people who are interested in more than just chatting. They’ll sometimes ask visitors for information about themselves, their families, or where they live — information that shouldn’t be given away.
Usually, the people who request personal information like home addresses, phone numbers, and email addresses use this information to fill mailboxes and answering machines with advertisements. In some cases, though, predators may use this information to begin illegal or indecent relationships or to harm a person’s or family’s well-being.
Of course, the Internet is home to millions of places you can and should visit. Like an infinite library, the Web can take you to the ends of the earth with the information it contains.
You can use it to do research for school, find out what movie is playing near you (and whether people like it), check out a college you’re thinking about, or find a job or volunteer opportunity. Almost anything you can think of has a website (or a thousand of them) about it. And it’s not just websites — blogs, videos, and downloadable games await to connect you with other user and players.
The key is to protect yourself while online.
First rule of smart surfing? Remain as anonymous as possible. That means keeping all private information private.
Examples of private information that you should never give out on the Internet:
- full name
- home address
- phone number
- Social Security number
- names of family members
- credit card numbers
Most credible people and companies will never ask for this type of information online. So if someone does, it’s a red flag that they may be up to no good.
- Think carefully before create an email address or screen name.
- Use a combination of letters and numbers in both.
- Do not identify your gender
- In chat rooms, use a nickname that’s different from your screen name. So you can exit without having to worry that someone knows your screen name and can track you down via email when you find yourself uncomfortable during conversation.
- Set up private chat rooms when you chat with your only invited friends.
- Keep online friendships in the virtual world.
- Meeting online friends face to face carries more risks than other types of friendships because it’s so easy for people to pretend to be something they’re not when you can’t see them or talk in person.
- If you ever get involved in a chat room conversation that makes you feel uncomfortable or in danger for any reason, exit and tell a parent or other adult right away so they can report the incident.
- You can also report it to the website of the National Center for Missing and Exploited Children — they have a form for reporting this type of incident called CyberTipline. They will then see that the info is forwarded to law enforcement officials for investigation.
- Cyberbullying refers to cruel or bullying messages sent to you online.
- These might be from former friends or other people you know.
- They can be irritating and, in some cases, even frightening.
- If you get these bullying messages online, it’s often better to ignore them rather than answer them.
- Cyberbullies, just like other bullies, may be angry or disturbed people — and may be looking for attention or a reaction.
- Fortunately, most people never experience cyberbullying.
- But if you’re getting cyberbullied and ignoring it doesn’t make it go away, getting help from a parent, school counselor, or another trusted adult may be a good idea. That’s especially true if the cyberbullying contains threats.
Although email is relatively private, hackers can still access it — or add you to their spam lists. Spam, like advertisements or harassing or offensive notes, is annoying. But spam blockers can keep your mailbox from getting clogged. Many service providers will help you block out or screen inappropriate emails if your parents agree to set up age-appropriate parental controls.
If you don’t recognize the sender of a document or file that needs to be downloaded, delete it without opening it to avoid getting a virus on your machine.
Virus protection software is a must for every computer. You can also buy software that helps rid your computer of unwanted spyware programs that report what your computer is doing. Some service providers make software available to protect you from these and other online annoyances, such as blockers for those in-your-face pop-up ads.
If you do invest in protective software, you’ll need to keep it updated to be sure it continues to do its job as new technologies evolve.
With all the problems you can face online, is it worth it? For most people, the answer is definitely yes. You just need to know where the pitfalls are, use some common sense and caution, and you’ll be in control.
Assignment week 4:
i) Author‟s name: David Finkelhor, Kimberly Mitchell, Janis Wolak
ii) Year of published: 2001
iii) Article‟s topic: Computer-related crime, Juvenile victims, Child sexual abuse, Pornography and prostitution.
iv) Title of the book: Highlights of the Youth Internet Safety Survey
v) Place of published: United States of America
vi) Publisher‟s name: University of New Hampshire
For assignment week 3, we’ve been given our second project. Looking for scholarly article taken from a journal article, proceedings or a chapter in a book available on the internet on related topics. I have spent about few days searching the article on “internet safety” topic using google search and google scholar. There are many related topics article i found. But it was quite difficult for me to find the article because most of them do not have the information about the author, publisher etc. After I found the right article, i read and understand it. Then, the above is the summary of the article. I have done it after faced some difficulties. =)