The Internet Predator Part II

The Grooming Process and Building Rapport   Many Internet predators, especially sexual predators, will engage in a grooming process.  The primary goal of the grooming process is to build rapport and make the potential target feel comfortable with him, in the hope that you will want to meet him face to face at some later

Read More…

The Internet Predator Part I

Who Are They ?   When we think “Internet Predator” most will imagine someone who is preying upon our youth, utilizing technology, for the purpose of sexual exploitation.  Most Internet experts agree however that there are in fact 4 categories of Internet Predators:   The Emotional/Psychological Predator: this is the internet dating predator who will

Read More…

Online Gaming

Today’s computer gaming has changed in recent years from a one-to-one experience, where it was you against the computer (Pac Man) or another friend connected via a joystick. Today’s on-line gaming is an interactive multiplayer experience known as:   Massive Multiplayer On-Line Role Playing Games (MMORPG) such as; Everquest, Tibia, Guild Wars. Here users will create

Read More…

Internet Pornography

Since 1993 when the porn industry first started to exploit the Internet for their financial gain, pornography on the Internet has grown exponentially and was estimated to be a 97 billion dollar worldwide web industry in 2010. Today, any child with unrestricted Internet access via computer or cell phone is just two clicks away from

Read More…

iPhone, iTouch and iPad Security Settings

Given that many of our kids now have an iPhone or iTouch, there are some security settings that parents can consider activating on their childs device:   Tap “Settings” App and select the menu called “General”. From the General menu, scroll down to the option called “Restrictions”. When you click this you’ll be asked for

Read More…

Mac Parental Controls

Here’s a great YouTube video that will guide you through how to set up parental control on your Mac:     First, find the System Preferences icon on your desktop and click on it. It looks like this: Now look for “Accounts” and click that.   You’ll be taken to a screen where you can

Read More…

XBox Security Settings

Just like the Wii, the XBox once connected to the Internet, allows a child to access Peer-to-peer networking.  To help minimize the threats associated with peer-to-peer networking while your child is using their XBox, here’s how to apply it’s security settings:   First – on the main dashboard, go to the tab called “My Xbox”

Read More…

YouTube Safety Mode

YouTube does a pretty good job at filtering out inappropriate content, but given its dominance in the Social Media world, you are pretty well guaranteed that there may be videos that are not appropriate for kids.  To help parents, Youtube offers a safety feature called “Safety Mode” that is designed to help parents filter out

Read More…

Social Network Habituation And Why We Need To Listen; It Could Save A Life

In an earlier post I spoke about becoming a digital “White Hatter”http://www.personalprotectionsystems.ca/the-digital-sheepdog/a-by-product-of-reality.html and how important it is for all of us who use Social Media to act as “gatekeepers” or “digital first responders” when we see a friend, students or even a stranger who is digitally reaching out for help.  Very recently a blog posting was

Read More…