The Five Greatest Internet
Dangers Teenagers Face

  •  
    Complete form for a free eBook
     
  • First Name
    Last Name
    Email
  •  
    Your email will not be shared
     

Archive for June, 2008

Looking for Trouble

Jun 25th, 2008 by David Kent Jones | 0

Studies have shown that most of the time when children have problems with sexual predators online, the child is actually looking for a inappropriate relationship.  This does not excuse the predator, since kids do not have the maturity to make decisions like an adult. Parents should be vigilant so they catch their kids looking for [...]

Read full post...

Internet Traditions

Jun 16th, 2008 by David Kent Jones | 0

What Internet traditions are we creating for our posterity? Yesterday morning my daughter made me breakfast for Father’s Day. This is a tradition that has been with our family for generations. Traditions are powerful. I have witnessed firsthand in the Middle East how traditions can fuel hatred between groups of people for thousands of years. [...]

Read full post...

Parental Influence Software

Jun 10th, 2008 by David Kent Jones | 0

I cringe a little when I hear the term, “Parental Control Software”.  It sounds like parents are somehow controlling their kids like little robots.  Laying down the law, forcing computer policies and punishing by shutting off Internet access.  Children are people, not robots. As parents we need to listen, to be aware, to be involved [...]

Read full post...

Facebook Privacy

Jun 6th, 2008 by David Kent Jones | 0

Facebook privacy is a huge issue since kids may be posting personal information on Facebook.  The following five steps will help protect your children. 1- Limit Access.  Facebook privacy settings can be customized so that certain information is made available to everyone; only to your network or friends; or to no one.  Since there is [...]

Read full post...

Pump and Dump

Jun 4th, 2008 by David Kent Jones | 0

What I call “pump and dump” is a common (and potentially deadly) cyberbullying technique.  The offender, acting as either a fictitious character or a real character, pretends to like the victim in a social networking setting.  The relationship usually goes on for several days until the victim has become quite attached to his or her [...]

Read full post...

The iPod Scam

Jun 2nd, 2008 by David Kent Jones | 0

The iPod Scam is a very effective tool for predators, spammers and con artists to gather personal information about your teenager.  What kid doesn’t what a free iPod?  Here is how it works: An ad appears on a pop-up window, a Facebook page or just about anywhere teenagers go online with a sales pitch like [...]

Read full post...