EssaysForStudent.com - Free Essays, Term Papers & Book Notes
Search

Internet Safety and the Future Generation

By:   •  Essay  •  1,000 Words  •  January 5, 2010  •  951 Views

Page 1 of 4

Join now to read essay Internet Safety and the Future Generation

Internet Safety and the Future Generation

Developing computer skills is vital for today’s children. Computers have become an important means for communication, play an important role in nearly every job, and can enhance both education and general quality of life (Rupley, 2004). The difficulty with children using the computer is that some people online may use computers to gain access to children for inappropriate and even criminal reasons. Children, by their nature, will not have the skills on their own to avoid the dangers that can come with internet access, so it is up to parents and educators both to protect children and to teach them how to keep themselves safe online.

The risks to children are very real. The FBI reports that one in five children receive pornography or are solicited by sexual predators online at some point (McKinley, 2002). By the time they are teenagers; one in four has been contacted by strangers who want to meet them in real life (Rupley, 2004). Since the Internet is now used more than the telephone, and since most children are not supervised all the time they are online (McKinley, 2002), predators attempt to exploit their vulnerability. Very often the children and teens, underestimating the risk, unaware of the risk, or believing that they can avoid being victimized, get online while they are supposed to be asleep. They may talk with strangers as well as people they know (Rupley, 2004).

Whether the predators seek to sell pornography or to meet in person, they are all too often successful. In 2003, John Zuccarini pled guilty under the federal “Truth in Domain Names Act.” Using over 3,000 domain names that mimicked TV shows youth often watch, such as www.teltubbies.com, he misdirected children to sites containing hard-core pornography (Rupley, 2004). In a more disturbing case, in 2001 a 13-year old girl left to meet her online “boyfriend” at a local fast-food restaurant. He was actually a 25 year old man, and he killed her (McKinley, 2002).

When children cannot fully protect themselves, it is up to the adults around them to act, which is what AOL executive Teri Schroeder did. She realized that young people were contacting AOL about the problem of adults inappropriately approaching them online. They didn’t go to their parents because they were afraid that their parents wouldn’t let them use the computer any longer (McKinley, 2002). Schroeder investigated how predators lured these kids away from monitored discussions into unsupervised, private chat rooms, and founded “I-Safe,” a non-profit group designed to teach young people how to stay safe while online. Congress responded to her actions and provided funds for school outreach programs. I-SAFE teaches educators how to help protect the students in their charge. It also works with community leaders to promote safety online for children and teenagers (McKinley, 2002).

In addition to using the training available from I-SAFE, schools can take a number of actions that will help protect their students as they use the Internet, setting policies in place that can dramatically the risk of online predators at school. For instance, since most internet predators contact youth through chats and instant messages, many schools block those methods of communication (Aftab, 2004). Such specific rules should be part of the district’s “acceptable use” policy. Rules regarding the use of computers and access to the Internet should be spelled out in writing, read carefully, and signed by both parents and students. The policy should include the consequences for breaking the rules as well as exactly what a student should do to report any problem (Aftab, 2004). If the parent will not sign a permission slip stating that they and the child have reviewed the rules, the school

Download as (for upgraded members)  txt (6.2 Kb)   pdf (95.3 Kb)   docx (12.3 Kb)  
Continue for 3 more pages »