logo
g Text Version
Beauty & Self
Books & Music
Career
Computers
Education
Family
Food & Wine
Health & Fitness
Hobbies & Crafts
Home & Garden
Money
News & Politics
Relationships
Religion & Spirituality
Sports
Travel & Culture
TV & Movies

dailyclick
Bored? Games!
Nutrition
Postcards
Take a Quiz
Rate My Photo

new
Action Movies
Bible Basics
Houseplants
Romance Movies
Creativity
Family Travel
Southwest USA


dailyclick
All times in EST

Autism Spectrum Disorders: 4:00 PM

Full Schedule
g
g Missing and Exploited Children Site

BellaOnline's Missing and Exploited Children Editor

g

Monitoring Children Online


Children are accessing the internet in homes, schools, friends’ homes, and libraries, at earlier and earlier ages. Unless the computer has parental software to prevent children from stumbling upon inappropriate information and pictures children may find information they do not need to know. Consider how a general search for information for a school report can take chilren to inappropriate places.

Think about what you might find if you Google beavers, hotdogs, breast cancer, pussy willows, just to name a few things. In addition to installing and maintaining parental software that allows parents to set age limits on what information children access, parents must also monitor where and what is happening when a child is surfing the World Wide Web. Children can go places now on the internet that children previously never had a clue about what is out there in the adult world.

In addition, to finding questionable pictures and information online from around the world, the internet never shuts down and that means information is available 24 hours a day. Hearing about all the bad things happening to others repeatedly can cause anxiety disorders. Children simply do not need to know some things that are happening in the world.

Parents like to believe they know what their children are doing and if their children were doing something inappropriate that, they would feel it. The reality is children do not have the life experiences to be surfing unsupervised. For safety sake, the family computer should be in a centrally located place. Children should never have a computer in their bedroom. What happens behind closed doors can lead to trouble.

When a child is surfing in the family kitchen or living room, he or she is more likely to tell an adult if something inappropriate happens. Most parents would not allow their 8-14 year old walk unattended in a local Wal-Mart, or allow him or her wander the neighborhood and surrounding area all hours of the day or night. However, parents fail to think twice before allowing a child to go online unsupervised.

People that prey on children no longer has to leave their home and walk or search the malls, schools, libraries, parks, or churches to find their next victim. Predators now can simply log on in the comfort of their own home and find an unsupervised child. There are hundreds or forums, chat rooms, and social networking sites invented on the web daily.

A predator is now invisible, only visible by what he or she chooses to show the world in their façade. Pictures of teenagers can copied from the web to make a fake identify and allow an adult to appear as a teen or even younger child. Children tend to believe what they see for their own eyes. Seeing a picture of a 13-year-old boy with a cute screen name whose profile mimics the things your child has listed on their profile causes children to let down their guard.

Webcams and cameras are becoming standard in most cell phones, computers, and even hand held games like Nintendo. Most of these devices now can access the internet. No problem right, your system is secure and you have not added your child to the network, so he or she cannot access the internet, right. Wrong. If anyone in the immediate vicinity has an unsecured internet network, your child can likely figure out how to join the unsecured network. Now little Johnny can access the web anytime day or night.

The internet continues to change the way people live. This includes how people interact with each other; meet new people, and how people receive a variety of information. Any information shared on the internet remains in cyberspace for a very long-time, and can come back to haunt the person years later when they try to get a job, apply for college, and when applying for credit. This is especially true for inappropriate language, context, and pictures. So think before you post.
Add Monitoring+Children+Online to Twitter Add Monitoring+Children+Online to Facebook Add Monitoring+Children+Online to MySpace Add Monitoring+Children+Online to Del.icio.us Digg Monitoring+Children+Online Add Monitoring+Children+Online to Yahoo My Web Add Monitoring+Children+Online to Google Bookmarks Add Monitoring+Children+Online to Stumbleupon Add Monitoring+Children+Online to Reddit




RSS | Related Articles | Editor's Picks Articles | Top Ten Articles | Previous Features | Site Map


For FREE email updates, subscribe to the Missing and Exploited Children Newsletter


Past Issues


print
Printer Friendly
bookmark
Bookmark
tell friend
Tell a Friend
forum
Forum
email
Email Editor


Content copyright © 2014 by Erika Lyn Smith. All rights reserved.
This content was written by Erika Lyn Smith. If you wish to use this content in any manner, you need written permission. Contact Erika Lyn Smith for details.

g


g features
He is a Child Molester

Multiple Child Abduction Attempts Missouri

Child Brides

Archives | Site Map

forum
Forum
email
Contact

Past Issues
memberscenter


vote
Poetry
Daily
Weekly
Monthly
Less than Monthly



BellaOnline on Facebook
g


| About BellaOnline | Privacy Policy | Advertising | Become an Editor |
Website copyright © 2014 Minerva WebWorks LLC. All rights reserved.


BellaOnline Editor