Look Both Ways: Help Protect Your Family on the Internet

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

safety guidelines

     AAP content recommendations

     auctions

     blogs

     cell phones

     classified ads

     developing for children

     discussing consequences for breaking rules

     discussing with children 2nd 3rd 4th

     downloading files

     e-mail

     educating family about

     enforcing

     family contracts

     financial matters

     instant messaging

     interactive gaming 2nd

     legislation concerning

     levels of comfort and

     levels of safety and

     mobile computing and devices

     online dating

     oversight, providing

     personally identifiable information

     profiles

     providing support after incidents

     researching risks

     service provider actions

     sharing information

     social networking applications

     spam

     surfing the Web

     Technology Toolkit

     videocams

     Web content recommendations

satellite photos 2nd

scams 2nd [See also financial fraud]

scanning for spyware

schools

     Internet access provided by

     missing, due to bullying or harassment

     reporting harassment to

     researching browser settings at

     revealing school addresses 2nd 3rd 4th

screen names [See user names (screen names)]

search engines

     defined

     pornography requests

     search toolbars

secretiveness

secure sites 2nd

Securities and Exchange Commission (U.S.)

security patches for software

security settings, software 2nd 3rd

self-esteem 2nd

self-therapy 2nd 3rd 4th

selling items online 2nd 3rd

serial numbers for cell phones

service providers

     actions after reporting abuse

     parental controls 2nd

     reporting harassment

     researching policies 2nd

     Web hosting services

sexual abuse

     blame for

     frequency of

     legislation addressing

     predator demographics

     predators as nearby

     sensitivity and

     social networking applications and

     statistics 2nd

     victim demographics

     videocams and

sexual content

     in interactive games

     interactive games and

     statistics on exposure to

     Web sites

sexual predators

     blogs and

     characteristics 2nd 3rd

     e-mail addresses and

     face-to-face meetings

     incidence of

     Internet grooming practices 2nd

     knowledge and closeness of victims

     legislation against

     numbers of arrests

     reporting

     signs of contact with

     statistics

     taking action against

     targeting victims' emotional states

shame 2nd 3rd

sharing files

     defined

     peer-to-peer

sharing information [See personally identifiable information]

shopping online 2nd

Short Message Service (SMS) 2nd

shyness

signatures in e-mail 2nd 3rd

SIM cards 2nd

SiteAdvisor

smartphones [See also cell phones]

smiley faces (emoticons) 2nd 3rd 4th

SMS (Short Message Service) 2nd

SMSes [See text messaging]

snapshots of computer screens

social networking applications [See also blogs, chat rooms, discussion boards]

     dating features

     defined 2nd

     removing posted information

     sexual crimes and 2nd

     understanding risks of

     weakest links in

social security numbers 2nd

social status 2nd

software

     limitations of

     parental controls 2nd

     patches and upgrades

     protective packages

     safe browser settings

South American game ratings

spam

     defined 2nd

     filtering

     fraud tactics

     inbound risks and

     incidence of

     junk mail folders

     junk mail reports

     reporting

     responding to

     risks of

     safety guidelines

     spim (instant message spam) 2nd 3rd

     splog (blog spam) 2nd

     telltale signs of

spam filters

spim (instant message spam) 2nd 3rd

splog (blog spam) 2nd

spoofing e-mail

spouses, levels of safety and

spyware

     alerts

     anti-spyware programs 2nd

     defined 2nd

     detecting

     downloading 2nd

     fraud and

     inbound risks and

     number of infections

     pop-ups

     protection

     scanning for

stalking [See also predators]

     cyberstalking, defined

     impacts of

     protecting family against

     technology and

state attorney general Web sites

status symbols 2nd

stings [See financial fraud, scams]

storing passwords

stranger danger 2nd

strangers [See also predators, publicly accessible information]

     anonymity and

     cell phones and 2nd

     levels of sharing and 2nd

     revealing information to 2nd

     stalkers

     stranger danger 2nd

street addresses

     avoiding revealing

     ease of obtaining

     online dating sites and

     removing from images 2nd

     revealing in blogs 2nd

     revealing in photos

street signs

Subscriber Identity Module (SIM) cards 2nd

subscribing to premium content

supervising safety rules

support, providing for victims 2nd

surfing the Web

     advantages of

     browser security settings

     cell phone features

     content filtering

     defined

     parental controls

     phony or dangerous sites 2nd 3rd 4th 5th

     pornography and

     risks in 2nd

     safety guidelines

     security settings 2nd

     staying alert for risks

surveys 2nd 3rd 4th

swapping files

sweepstakes

swindles [See financial fraud, scams]

Symantec

Категории