Introduction |
|
xi | |
How to Use this Book |
|
xxv | |
PART ONE THE ONLINE PREDATOR |
|
|
Understanding the Online Predator |
|
|
3 | (60) |
|
Types of Online Abuse of Children (and Adults) |
|
|
5 | (19) |
|
Online Predators: Who They Are and How They Work |
|
|
24 | (31) |
|
How Does It Begin? How Do We Stop Predators? |
|
|
55 | (8) |
PART TWO PROTECTING YOUR CHILDREN |
|
|
Talking to Your Kids About the Internet |
|
|
63 | (20) |
|
Prepping for the Discussion |
|
|
64 | (2) |
|
|
66 | (1) |
|
|
67 | (4) |
|
Relating Stories and Examples |
|
|
71 | (5) |
|
|
76 | (1) |
|
Making an Online Contract |
|
|
77 | (3) |
|
|
80 | (1) |
|
|
81 | (2) |
|
Child Protection Software |
|
|
83 | (62) |
|
Parental Controls Supplied by the Internet Service Provider |
|
|
84 | (7) |
|
Other Controls Supplied by Outside Companies |
|
|
91 | (13) |
|
Setting up Cyber Sentinel or Other Content Filtering Software |
|
|
104 | (7) |
|
Cyber Sentinel in the Stealth Mode |
|
|
111 | (1) |
|
Other Cyber Sentinel Features |
|
|
112 | (3) |
|
Especially for America Online Subscribers |
|
|
115 | (1) |
|
The Problem with Private Chat Rooms |
|
|
116 | (3) |
|
|
119 | (1) |
|
The Difference between an Instant Message and Instant Messenger |
|
|
119 | (3) |
|
Power Tools or Power Plus for AOL Instant Messenger |
|
|
122 | (4) |
|
How Software Helps Law Enforcement Catch the Online Predator |
|
|
126 | (2) |
|
About McAfee Visual Trace |
|
|
128 | (4) |
|
|
132 | (10) |
|
Why Our Best Defense Is Education |
|
|
142 | (3) |
|
|
145 | (38) |
|
The Story of Our Efforts in Naperville, Illinois, and How This Book Evolved |
|
|
146 | (4) |
|
Zoie and Tommy, and SafeKids by Microsoft |
|
|
150 | (5) |
|
Becoming an Active Parent |
|
|
155 | (24) |
|
Spotting and Dealing with Problems |
|
|
179 | (4) |
PART THREE UNDERSTANDING THE COMPUTER AND THE INTERNET |
|
|
|
183 | (32) |
|
|
185 | (7) |
|
Files, Folders, and Drives |
|
|
192 | (1) |
|
A Primer on Size, Storage, and How the Computer Thinks |
|
|
193 | (6) |
|
Additional Ways to Save Data |
|
|
199 | (4) |
|
|
203 | (6) |
|
|
209 | (1) |
|
Copying or Moving from the Disk to the Computer |
|
|
210 | (2) |
|
|
212 | (3) |
|
|
215 | (18) |
|
The Essential Peripherals |
|
|
216 | (2) |
|
|
218 | (15) |
|
|
233 | (32) |
|
|
234 | (3) |
|
Surfing the World Wide Web |
|
|
237 | (4) |
|
|
241 | (3) |
|
Streaming (Including Sound and Video) |
|
|
244 | (2) |
|
File Sharing (Including Text, Pictures, Video and Sound Clips, and Programs) |
|
|
246 | (3) |
|
|
249 | (2) |
|
|
251 | (3) |
|
Setting Your Browser and ISP Controls |
|
|
254 | (11) |
|
Software from the Internet |
|
|
265 | (12) |
|
|
265 | (1) |
|
|
266 | (11) |
PART FOUR FURTHER RESOURCES |
|
|
|
277 | (54) |
|
|
277 | (5) |
|
|
282 | (3) |
|
|
285 | (1) |
|
Anytime Anywhere Learning Laptop Program |
|
|
286 | (8) |
|
Illinois State Attorney General's Web Site |
|
|
294 | (3) |
|
Other Sites of Interest to Law Enforcement |
|
|
297 | (34) |
Index |
|
331 | |