Advice on protecting kids from online predators

Computerworld talks to Gregory Smith, CIO at the World Wildlife Fund and author of 'How to Protect Your Children on the Internet'

The numbers are downright frightening: One in five U.S. teenagers who regularly log onto the Internet say they have received unwanted sexual solicitations via the Web, according to the U.S. Crimes Against Children Research Center. And, the center says, 25 percent of children have been exposed to pornographic material online.

But a big part of the problem is that parents often don't take adequate measures to protect their children online, argues Gregory Smith, CIO at the World Wildlife Fund and author of the recently published book How to Protect Your Children on the Internet: A Road Map for Parents and Teachers (Praeger Publishers). Smith, who is also an adjunct professor at the School of Professional Studies in Business and Education Graduate Programs at The Johns Hopkins University, spoke with Computerworld about steps that parents and teachers can and should be taking to protect children online. He also discussed how IT professionals can play a more active role.

What inspired you to write this book?

I was home one night watching Dateline with my wife about two years ago, and there was a special on Internet chat rooms. They'd set up a sting operation, posing as teenage girls in chat rooms. What was amazing was just how fast these investigators were contacted by sexual predators. These predators, one after another, showed up at this sting house, planning to have sex with this teenage girl, and instead met with a sheriff. The variety of people, from high school coaches to businessmen, all had the same focus: to engage in some type of sexual activity with a minor.

It got me to thinking, "Is this really what's happening with sexual predators and kids on the Internet?" I did a little research on this and was surprised to find there were few books published on the topic. One book was about MySpace, one was from a legal perspective [and was] written by a detective -- but there was nothing written specifically to give parents a clear, straightforward road map. So I sat down for four hours that night and wrote an 11-page proposal. I was up until 2:30 a.m.; I was pretty passionate about this topic. I got an e-mail two or three months later on my birthday from a publisher, and they were interested in the proposal and wanted to take on the project.

How old are your own kids and have either of them had any online experiences that have been disconcerting to you as a parent?

My children are 11 and 13. One or two. The way I run my house, and what I describe in Chapter Three [of the book], is that privacy advocates can kiss my butt. I don't need anybody's permission to do what I think I need to to keep my kids safe on the Internet or elsewhere. A lot of the policies I have in the book are drawn from conversations I've had with my children as to why they're not going to have an e-mail account at an elementary school age and why they won't have instant messaging accounts at a middle school or high school age.

One of my kids showed me a soft-porn site showing naked teenage girls. They were searching for teenage-related sites on a search engine, and they came up with that.

What are the biggest mistakes that parents make in terms of protecting their kids online?

They think that putting the computer in a centralized location in the family room is a safe way to guard their kids on the Internet. If a parent is asleep or out of the room, it doesn't take but 30 seconds for kids to access inappropriate material on the Internet. Kids are also using keystroke clickers to quickly change from one screen to another. It takes one keystroke to go to an Excel spreadsheet to make it look like they're doing their homework, and [another to] quickly go to another screen when their parents aren't looking.

No. 2 is using Internet content filters. The free ones are ineffective. And some parents will download a content filter on Internet Explorer, and the kids will bypass them by downloading Netscape or Mozilla.

The other risk that's very common is that parents are bombarded with requests from their children to have technologies that their friends are using. Kids will say, "My friends are using IM. My friends are using social networks. Why can't I?" After multiple barrages of requests, they give in. Parents need to hold the line on what is an acceptable request.

Text messaging with mobile phones is extremely popular among adolescents and teens. What are some of the risks and safeguards that parents should be aware of? Some of the safeguards are that they need to be looking potentially at conversations that children are having via text. Children are able to go back and delete [text] files. Some cell phone providers won't provide an audit trail. The risks are clear: children could be having conversations with people they think they know but are strangers. Or having inappropriate conversations with people at school that are against school rules.

Some of the things parents can do is have a better handle on conversations kids are having. Ask to see their phones from time to time, and view text messages and who they're calling.

Join the PC World newsletter!

Error: Please check your email address.

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Thomas Hoffman

Computerworld
Show Comments

Essentials

Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop

Learn more >

Lexar® JumpDrive® S57 USB 3.0 flash drive

Learn more >

Mobile

Lexar® JumpDrive® S45 USB 3.0 flash drive 

Learn more >

Exec

Audio-Technica ATH-ANC70 Noise Cancelling Headphones

Learn more >

Lexar® JumpDrive® C20c USB Type-C flash drive 

Learn more >

HD Pan/Tilt Wi-Fi Camera with Night Vision NC450

Learn more >

Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards 

Learn more >

Budget

Back To Business Guide

Click for more ›

Most Popular Reviews

Latest News Articles

Resources

PCW Evaluation Team

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?