SlideShare a Scribd company logo
Good News about Kids' Online Behavior
Study shows that cyberbullying and internet harassment have declined.

Study and Report about Kids' Online Behavior




McAfee, a computer security company headquartered in Santa Clara, California, has
made a study about kids online behavior. The study, conducted by Harris Interactive,
included interviews with almost 1,400 10- to 17-year-olds.

The survey reported that "almost half of youth (46 percent) admit to having given out
their personal information to someone they didn't know over the Internet," but when they
break it down, the survey reveals that "when they do reveal personal information online,
youth are most likely to share their first name (36 percent), age (28 percent), and/or e-
mail address (19 percent). Only around 1 in 10 have given out slightly more personal
information like a photo of themselves, their school name, last name, cell phone number,
or a description of what they look like. And it's also reassuring to read in the study report
that "youth draw the line at giving out personally identifiable information such as their
parents' names, home address, or school address, and virtually no teens report having
given out their Social Security number."

When it comes to cyberbullying, the report also paints a more optimistic picture than
we've seen from some other studies. Only 11 percent admit to ever engaging in some
form of cyberbullying behavior. Even though the press release about the report says
"Cyberbullying on the rise," the report itself shows that the percentage of teens reporting
that they have "ever been bullied or harassed online decreased substantially from 15
percent in 2008 to 8 percent in 2010. Far from an increase, that's an impressive 47
percent decline in two years.

The press release on the report also says that "Nearly 50 Percent of Teens Don't Know
What to Do if Cyberbullied," yet the report itself says that "1 in 4 teens say they wouldn't
know what to do if they were bullied or harassed online" and that a "a significantly higher
proportion disagree with this statement in 2010 than in 2008, suggesting that teens may
now be better equipped to handle cyberbullying."

It further points out that "many youth who have been bullied or harassed online say they
have made some adjustments to their online behavior as a result (72 percent)."




What should parents do to keep children's internet
security?
Even though we are glad to see the good news that the cyberbullying, online predator,
internet harassment is on decline, we still can never relax our vigilance about the kids'
internet security. Children often lack the maturity and social judgment necessary to act
responsibly in the unsupervised, anonymous free for the entire internet. They are always
at the risk of encountering the online dangers. Help them protect themselves.

Internet Security Tips for Kids Online Behavior:
1 Encourage kids to keep passwords secret

• Don't reveal passwords to others

• Protect recorded passwords

• Never provide your password over email or in response to an email request

• Do not type passwords on computers that you do not control

2 Help your kids use social networking safely

• Communicate with kids about their experiences

• Establish Internet rules
• Teach your children never meet anyone in person that they've communicated with
online only

• Encourage your children to communicate with people they already know.

• Teach your children about cyberbullying

3 If your kids blog, make sure they don't reveal too much

• Screen what your kids plan to post before they post it

• Evaluate the blogging service and find out if it offers private, password-protected blogs

• Save the web address of your child's blog and review it on a regular basis

• Check out other blogs to find positive examples for your kids to emulate

4 Beware of online fraud

• Never share personal information

• Log off in public

• Create secure passwords and keep them secret

• Use only secure sites




Parental Control Software Solution to Ensure Kids'
Internet Security:
SurveilStar Parental Control Software is specially designed for parents to monitor and
control kids' computer activity and online behavior and keep them far away from any
online dangers.
Besides the internet security tips for kids you should know, a computer controlling tool is
also essential to assist you to construct a healthy and safe internet environment for kids.
SurveilStar Any Parental Control is a strongly recommended.

Main Features of SurveilStar Any Parental Control
Software:
• Screen Snapshots Taking

Take the real-time screen snapshot of your kids' computer. It makes you keep a close eye
on all your kids online behaviors anywhere anytime.

• Email Recording

Record the email sent & received. Filter out the unwanted Emails and stop the spams that
possibly spread internet threats like the advertisement of porn or gambling sites.

• IM/Chat Controlling

Record all the instant message of your children in chat rooms. Keep you know what they
are talking, who they are talking to. Thus you can stop the action and take immediate
measures if your kids meet the online predators or other internet threats in the chat room.

• Website Visit Monitoring

Have a history record of the visited websites. Block some specific websites which may
contain contents or images of sex, violence or strong language or hate speech. You can
create lists of unacceptable websites and allow access to all others.


buynow       Download
Download Any Parental Control software to monitor your kids online activities, and
have a better idea of their online behavior.

More Related Content

Viewers also liked

Marketing Strategy for the New Social Web
Marketing Strategy for the New Social WebMarketing Strategy for the New Social Web
Marketing Strategy for the New Social Web
Mark Kithcart
 
Optimizacion
OptimizacionOptimizacion
Optimizacion
cmarquina
 
Magnificent photos
Magnificent photosMagnificent photos
Magnificent photos
Usfull-garbage
 
Sbs ica pre conf 2010-flew
Sbs ica pre conf 2010-flewSbs ica pre conf 2010-flew
Sbs ica pre conf 2010-flew
Terry Flew
 
6 a alteracao_e_consolidacao_caladi
6 a alteracao_e_consolidacao_caladi6 a alteracao_e_consolidacao_caladi
6 a alteracao_e_consolidacao_caladi
Rade Jovanovic
 
Rendición de cuentas presidente comisión
Rendición de cuentas presidente comisiónRendición de cuentas presidente comisión
Rendición de cuentas presidente comisión
Comision Salud
 
Paperwork2011
Paperwork2011Paperwork2011
Paperwork2011
tartuhiiekool
 
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
Robert Pinter
 
Pearl 28
Pearl 28Pearl 28
mundial sudafrica_2010
mundial sudafrica_2010mundial sudafrica_2010
mundial sudafrica_2010
carloscrespo1
 
Boletín: Noticias del INPPARES - Julio 2013
Boletín: Noticias del INPPARES - Julio 2013Boletín: Noticias del INPPARES - Julio 2013
Boletín: Noticias del INPPARES - Julio 2013
INPPARES / Perú
 
Utilizing Traditional and Social Media
Utilizing Traditional and Social MediaUtilizing Traditional and Social Media
Utilizing Traditional and Social Media
Brooke Hardison
 
Red seacrossing
Red seacrossingRed seacrossing
Red seacrossing
Usfull-garbage
 

Viewers also liked (14)

Marketing Strategy for the New Social Web
Marketing Strategy for the New Social WebMarketing Strategy for the New Social Web
Marketing Strategy for the New Social Web
 
Optimizacion
OptimizacionOptimizacion
Optimizacion
 
Magnificent photos
Magnificent photosMagnificent photos
Magnificent photos
 
Sbs ica pre conf 2010-flew
Sbs ica pre conf 2010-flewSbs ica pre conf 2010-flew
Sbs ica pre conf 2010-flew
 
6 a alteracao_e_consolidacao_caladi
6 a alteracao_e_consolidacao_caladi6 a alteracao_e_consolidacao_caladi
6 a alteracao_e_consolidacao_caladi
 
Candy land
Candy landCandy land
Candy land
 
Rendición de cuentas presidente comisión
Rendición de cuentas presidente comisiónRendición de cuentas presidente comisión
Rendición de cuentas presidente comisión
 
Paperwork2011
Paperwork2011Paperwork2011
Paperwork2011
 
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
Is there a stat for that? Nemzetközi adatok a mobil alkalmazásfejlesztés vilá...
 
Pearl 28
Pearl 28Pearl 28
Pearl 28
 
mundial sudafrica_2010
mundial sudafrica_2010mundial sudafrica_2010
mundial sudafrica_2010
 
Boletín: Noticias del INPPARES - Julio 2013
Boletín: Noticias del INPPARES - Julio 2013Boletín: Noticias del INPPARES - Julio 2013
Boletín: Noticias del INPPARES - Julio 2013
 
Utilizing Traditional and Social Media
Utilizing Traditional and Social MediaUtilizing Traditional and Social Media
Utilizing Traditional and Social Media
 
Red seacrossing
Red seacrossingRed seacrossing
Red seacrossing
 

Recently uploaded

Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 

Recently uploaded (20)

Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 

Good news about kids' online behavior

  • 1. Good News about Kids' Online Behavior Study shows that cyberbullying and internet harassment have declined. Study and Report about Kids' Online Behavior McAfee, a computer security company headquartered in Santa Clara, California, has made a study about kids online behavior. The study, conducted by Harris Interactive, included interviews with almost 1,400 10- to 17-year-olds. The survey reported that "almost half of youth (46 percent) admit to having given out their personal information to someone they didn't know over the Internet," but when they break it down, the survey reveals that "when they do reveal personal information online, youth are most likely to share their first name (36 percent), age (28 percent), and/or e- mail address (19 percent). Only around 1 in 10 have given out slightly more personal information like a photo of themselves, their school name, last name, cell phone number, or a description of what they look like. And it's also reassuring to read in the study report that "youth draw the line at giving out personally identifiable information such as their parents' names, home address, or school address, and virtually no teens report having given out their Social Security number." When it comes to cyberbullying, the report also paints a more optimistic picture than we've seen from some other studies. Only 11 percent admit to ever engaging in some form of cyberbullying behavior. Even though the press release about the report says "Cyberbullying on the rise," the report itself shows that the percentage of teens reporting that they have "ever been bullied or harassed online decreased substantially from 15 percent in 2008 to 8 percent in 2010. Far from an increase, that's an impressive 47 percent decline in two years. The press release on the report also says that "Nearly 50 Percent of Teens Don't Know What to Do if Cyberbullied," yet the report itself says that "1 in 4 teens say they wouldn't know what to do if they were bullied or harassed online" and that a "a significantly higher
  • 2. proportion disagree with this statement in 2010 than in 2008, suggesting that teens may now be better equipped to handle cyberbullying." It further points out that "many youth who have been bullied or harassed online say they have made some adjustments to their online behavior as a result (72 percent)." What should parents do to keep children's internet security? Even though we are glad to see the good news that the cyberbullying, online predator, internet harassment is on decline, we still can never relax our vigilance about the kids' internet security. Children often lack the maturity and social judgment necessary to act responsibly in the unsupervised, anonymous free for the entire internet. They are always at the risk of encountering the online dangers. Help them protect themselves. Internet Security Tips for Kids Online Behavior: 1 Encourage kids to keep passwords secret • Don't reveal passwords to others • Protect recorded passwords • Never provide your password over email or in response to an email request • Do not type passwords on computers that you do not control 2 Help your kids use social networking safely • Communicate with kids about their experiences • Establish Internet rules
  • 3. • Teach your children never meet anyone in person that they've communicated with online only • Encourage your children to communicate with people they already know. • Teach your children about cyberbullying 3 If your kids blog, make sure they don't reveal too much • Screen what your kids plan to post before they post it • Evaluate the blogging service and find out if it offers private, password-protected blogs • Save the web address of your child's blog and review it on a regular basis • Check out other blogs to find positive examples for your kids to emulate 4 Beware of online fraud • Never share personal information • Log off in public • Create secure passwords and keep them secret • Use only secure sites Parental Control Software Solution to Ensure Kids' Internet Security: SurveilStar Parental Control Software is specially designed for parents to monitor and control kids' computer activity and online behavior and keep them far away from any online dangers.
  • 4. Besides the internet security tips for kids you should know, a computer controlling tool is also essential to assist you to construct a healthy and safe internet environment for kids. SurveilStar Any Parental Control is a strongly recommended. Main Features of SurveilStar Any Parental Control Software: • Screen Snapshots Taking Take the real-time screen snapshot of your kids' computer. It makes you keep a close eye on all your kids online behaviors anywhere anytime. • Email Recording Record the email sent & received. Filter out the unwanted Emails and stop the spams that possibly spread internet threats like the advertisement of porn or gambling sites. • IM/Chat Controlling Record all the instant message of your children in chat rooms. Keep you know what they are talking, who they are talking to. Thus you can stop the action and take immediate measures if your kids meet the online predators or other internet threats in the chat room. • Website Visit Monitoring Have a history record of the visited websites. Block some specific websites which may contain contents or images of sex, violence or strong language or hate speech. You can create lists of unacceptable websites and allow access to all others. buynow Download
  • 5. Download Any Parental Control software to monitor your kids online activities, and have a better idea of their online behavior.