INTERNET SAFETY PARENTING TIPS
Internet Safety Tips – Parents Edition
Internet Safety Parenting Tips and iPredator Inc. presents 100 Internet safety tips for parents to use when educating your child on reducing their chances of being harmed online, engaging in high-risk online activities & allowing offline distress to impact their online behavior. The tips are phrased in the “You and your child” tense. To encourage your child to experience interest in what they are likely to initially view as a mundane task, phrasing the tips in this manner makes them a team approach and not a one-sided parent/child task.
The compiled internet safety tips were compiled and formatted from the extensive research invested in the design of Dr. Nuccitelli’s Information Age Forensics construct, iPredator. The definition is as follows:
iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.
iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The use of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.
Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition (IVI). An iPredator’s IVI is their aptitude to sense a target’s ODDOR (Offline Distress Dictates Online Response), online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.
“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli Psy.D. C.F.C., iPredator Inc. (2013)
Some of the items listed may not apply to your child based on their age, maturational development and access to all types of electronic devices. When completing the checklist, correct responses are affirmative and should be “Yes, Agree, True.” Of the items that do apply to you, your child and family, the goal is to correctly agree to 95% of the items. Achieving a 95% correct response score suggests you and your child are in the low probability for cyber attack range.
GOOD LUCK AND MAY 2014 BRING YOU MANY HOURS OF ONLINE & DIGITAL DEVICE ENJOYMENT!
1. You and your child discuss cyber bullying and/or cyber harassment issues.
2. You and your child know to ignore being harassed or teased online.
3. You and your child do not flame (a provoking message) others online.
4. You and your child will always be supportive if a friend is being cyber bullied or cyber harassed.
5. You and your child know who, when and how to report a cyberbully, cyberstalker or cyber harasser.
6. You and your child refrain from posting or sharing images or videos online that are even slightly embarrassing.
7. You and your child practice digital citizenship (online manners.)
8. You and your child know what to do if taunted online.
9. You and your child do not post or share offensive information or images online.
10. You and your child are cautious posting personal information online.
11. You and your child check your “digital footprint.”
12. You and your child do not share private information to ex-friends ex-partners online.
13. You and your child practice caution what is disclosed online.
14. You and your child protect your images from strangers viewing them online.
15. You and your child know how to sustain and monitor a positive digital reputation.
16. You and your child know images can remain in cyberspace for years.
17. You and your child know information shared online may be impossible to delete.
18. You and your child do not have a mobile device with information that is embarrassing.
19. You and your child know sexting can be criminal & shared with others.
20. You and your child know personal information posted or shared online can go viral.
21. You and your child know everyone has a digital footprint.
22. You and your child know images and videos can be reposted multiple times.
23. You and your child know what information can be harmful to digital reputation.
24. You and your child practice good behavior online and in chatrooms.
25. You and your child do not share personal information using Twitter.
26. You and your child check email and social media profiles for strange messages and posts.
27. You and your child do not have sexual conversations with unknown online strangers.
28. You and your child do not make phone calls to online strangers.
29. You and your child would not meet someone in person met online without telling loved ones.
30. You and your child do not respond to anyone not known in chat rooms.
31. You and your child do not open an attachments sent from an online stranger.
32. You and your child do not discuss financial information with online strangers.
33. You and your child know to log out if feeling uncomfortable or fearful.
34. You and your child do not engage in online activities not approved of by loved ones.
35. You and your child would not meet anyone met online without first telling a trusted adult.
36. You and your child know they are at a higher risk being contacted by online strangers at night.
37. You and your child do not discuss sexual topics with online strangers.
38. You and your child do not accept free software, ring tones or screen savers from online strangers.
39. You and your child do not have names on “buddy” or “friends” lists you do not know.
40. You and your child do not send personal information to others you do not know.
41. You and your child do not disclose passwords with others met online.
42. You and your child do not text message or chat about sex online.
43. You and your child know that internet predators target online users using kindness and understanding.
44. You and your child know internet predators use attention, affection and gifts to seduce online users.
45. You and your child know peer-to-peer networks can expose computers to internet predators.
46. You and your child know the best protection from internet predators are safe online communication and digital citizenship.
47. You and your child know how to block sites on computers from being accessed by internet predators.
48. You and your child know most internet predators will be encouraging, patient and reserved.
49. You and your child know file-sharing sites allow internet predators to access portions of a computer.
50. You and your child know internet predators encourage online users to share images online.