Posts tagged "Online Bullying"

Cyber-Bullying and Social Networking Identity Theft

image-3815
With the meteoric rise in cyber-bullying, parents are desperate to find a way to shield their children. Unfortunately, most parents are far behind their child’s proficiency with technology. Many don’t text, aren’t on Facebook, and are oblivious to the many ways in which kids can taunt each other with technological ease. Although children may be quick and nimble with technology, they lack the maturity to understand its consequences.

A recent article in the New York Times on Digital Bullying (read the MSN version here) addressed these very issues and gave true and heart-wrenching accounts of how parents were left helpless at the hands of their children’s online bullies. “I’m not seeing signs that parents are getting more savvy with technology,” said Russell A. Sabella, former president of the American School Counselor Association. “They’re not taking the time and effort to educate themselves, and as a result, they’ve made it another responsibility for schools.”

Posted in Cyber Data Security, Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , , , ,

Cyber Bullying: Protect Your Child

Recent events have raised the serious issue of cyber bullying among children and teens. CNN.com just published this article on protecting your children from online bullies and it is a must read for any parent, teen, or internet user. Here is a partial reprint of the article – you can read it on CNN in it’s original format (see link below).

(CNN) — As cyber bullying emerges as a nasty and easy supplement to traditional schoolyard taunts, a raft of online tools have come on the market to help parents prevent it or respond to it.

But experts say common sense parenting and simple awareness about the potential for trouble might be some of the most valuable tools to prevent damaging electronic harassment.

The most simple way to start? Get involved in your child’s online life. Then stay out of the way.

Posted in Cyber Data Security by Identity Theft Speaker .
Tags: , , ,