Look Both Ways

Book description

Learn 14 ways in which you can help make the Internet a safer place for you and your family. This guide, written by a leading child safety expert, offers families practical advice for avoiding risks on the Internet.

Table of contents

  1. Look Both Ways: Help Protect Your Family on the Internet
    1. SPECIAL OFFER: Upgrade this ebook with O’Reilly
    2. Praise for Look Both Ways ...
    3. Acknowledgments
    4. Introduction
      1. Is This Book for You?
      2. Start with a Technology Base
      3. How This Book Is Organized
        1. Special Elements
      4. How to Get the Most from This Book
    5. Quick Safety Checklist
    6. I. Understanding the Risks
      1. 1. The Landscape of Risk
        1. What’s Going On Out There?
          1. Who Are These Cybercriminals?
          2. Who’s Vulnerable?
          3. How Big Is the Problem?
        2. How Are You Putting Yourself at Risk?
        3. What Can You Do?
          1. Making the Internet Safer for Your Family
          2. Taking the First Step
          3. You Are Not Alone
        4. What’s Next?
      2. 2. Misperceptions About Online Anonymity
        1. Leaving a Trail of Clues
        2. The Lure of Anonymity
        3. How Predators Use Anonymity
        4. What Can You Do?
      3. 3. Thinking Like the Enemy: Predatory Behavior
        1. Knowing the Enemy
        2. Recognizing Sexual Predators, Offline and On
        3. How Predators Choose Their Victims
        4. The Victim Grooming Process
        5. Who Is Not at Fault
    7. II. 13 Steps to Internet Security
      1. 4. Step 1: Be Careful What You Show People
        1. What Just Happened?
        2. Assessing the Risks
          1. What Forms of Visual Information Put You at Risk?
        3. Protecting Yourself
      2. 5. Step 2: Don’t Tell People More Than You Should
        1. What Just Happened?
        2. Assessing the Risks
        3. Protecting Yourself
      3. 6. Step 3: Be Alert to How Predators Prey on Emotions
        1. What Just Happened?
        2. Assessing the Risks
        3. Protecting Yourself
          1. Watch Your Own Behavior
          2. Looking for Telltale Signs
          3. Getting the Message Across to Your Kids
      4. 7. Step 4: Don’t Let Them Know Where You Live
        1. What Just Happened?
        2. Assessing the Risks
          1. Why Do They Care Where You Live?
          2. Location Application Dangers
          3. Technology Makes Finding You Easier
        3. Protecting Yourself
      5. 8. Step 5: Don’t Expose Yourself Through Instant Messaging
        1. What Just Happened?
        2. Assessing the Risks
        3. Protecting Yourself
      6. 9. Step 6: Reduce Your Vulnerability When Blogging
        1. What Just Happened?
        2. Assessing the Risks
          1. The Blogging Phenomenon
          2. Criminals and Blogs
          3. The Information Connection
          4. What You Expose About Yourself and Others
          5. Who’s Most at Risk?
        3. Protecting Yourself
          1. Don’t Overreact
          2. Knowing How Information Adds Up
          3. Taking Steps for Safety
          4. Be Aware of What Your Friends Are Saying About You
      7. 10. Step 7: Understand Risks of Fraudulent Communications and Protect Yourself
        1. What Just Happened?
        2. Assessing the Risks
          1. Facing the Fraud
          2. Communicating Safely
        3. Protecting Yourself
          1. Taking the First Steps
          2. Avoiding Incoming Threats
      8. 11. Step 8: Date Safely Online
        1. What Just Happened?
        2. Assessing the Risks
        3. Protecting Yourself
      9. 12. Step 9: Don’t Browse Indiscriminately
        1. What Just Happened?
        2. Assessing the Risks
        3. Protecting Yourself
          1. Consider Your Safety Zone
          2. Avoid Phony or Dangerous Sites
          3. Take Advantage of Technology
          4. Be Alert as You Browse
          5. Taking Charge of Your Browsing Experience
      10. 13. Step 10: Use Common Sense When Gaming with Others
        1. What Just Happened?
        2. Assessing the Risks
        3. Protecting Yourself
          1. Steps to Safer Gaming
          2. Game Ratings You Should Know
      11. 14. Step 11: Get Savvy About Financial Scams and Fraud
        1. What Just Happened?
        2. Assessing the Risks
          1. Phishing for Your Money
          2. Asking for Your Money
          3. Stealing Your Identity
          4. Going Once, Going Twice ...
          5. Advertising Fraud
        3. Protecting Yourself
          1. Don’t Hand over Your Cash
          2. Auction Safely
          3. Using Classified Ads Wisely
          4. Final Words of Advice
      12. 15. Step 12: Don’t Let Your Defenses Down When Using Mobile Devices
        1. What Just Happened?
        2. Assessing the Risks
          1. The High Rate of Mobile Device Theft
          2. Human Nature and Mobility
          3. Mobile Phone–Specific Dangers
        3. Protecting Yourself
          1. Guidelines for Safe Mobile Computing
          2. Taking It Step by Step
      13. 16. Step 13: Act to Avoid Harassment and Bullying
        1. What Just Happened?
        2. Assessing the Risks
          1. Why People Bully Online
          2. A Growing Threat
          3. The Impact of Bullying and Harrassment
        3. Protecting Yourself
    8. III. Get Going to Protect Yourself Today
      1. 17. Talking About Safety
        1. Understanding the Safety Pacts You Make
        2. Negotiating Safety
          1. Negotiating with a Spouse or Partner
          2. Negotiating with Children and Teens
        3. What You Should Know Before You Start the Discussion
          1. Getting Informed
          2. Experience the Internet Together
        4. Build the Framework for a Safer Environment
          1. Educate
          2. Provide Infrastructure
          3. Enforce
        5. The Special Case for Social Networks
          1. Taking Social Networking Online
          2. Taking Control of Your Blog
      2. 18. It Takes Everyone to Make a Safe Internet
        1. What to Do If a Sexual Predator Is Victimizing Your Child
          1. React Appropriately
          2. Ask the Right Questions
        2. Report Abuse
          1. Why People Don’t Report Abuse
          2. Why You Should Report Abuses
          3. Where to Report Abuse
          4. Find Support After Your Report
        3. What Your Online Service Can Do
        4. How You Can Affect Laws Dealing with Online Abuse
        5. Begin a New Internet Journey
    9. IV. Resources
      1. Helpful Terms
      2. A. Technology Toolkit
        1. Understanding the Types of Technology Available
        2. Top Tips on Using Technology to Protect Yourself
        3. Useful Web Sites for Finding Tools
          1. Products
          2. General Information
      3. B. Helpful Web Resources for Internet Safety
        1. Safety Advice and Information
        2. Recognizing Sexual Predators
        3. Government Sites
        4. Sites for Reporting Abuse
        5. Kid-Oriented Sites
      4. C. Common Messaging Shortcuts
        1. A
        2. B
        3. C
        4. D
        5. E
        6. F
        7. G
        8. H
        9. I
        10. J
        11. K
        12. L
        13. M
        14. N
        15. O
        16. P
        17. Q
        18. R
        19. S
        20. T
        21. U
        22. W
        23. XYZ
      5. Selected References
      6. D. About the Authors
    10. Index
    11. About the Author
    12. SPECIAL OFFER: Upgrade this ebook with O’Reilly

Product information

  • Title: Look Both Ways
  • Author(s): Linda Criddle
  • Release date: September 2006
  • Publisher(s): Microsoft Press
  • ISBN: 9780735623477