|Innovating The Next Big Thing||May 21, 2013|
• Analyst Insights
• Enterprise Insights
• Network & Information Security
• Enterprise Mobility
• Remembering 9/11
Next Innovator Group
Feedjit Live Web Stats
• Ghost City
McAfee Blogs: Where To Draw The Cyberline- How To Keep Kids Safe Online Without Alienating Them
Jul 13, 2012 – Anindita Mishra
The Ramayana was one book that influenced me a lot in my childhood. I liked the lovely, winding storyline that conjured up thrilling images in my mind. Like the part about Lakshman drawing a rekha (line) which Sita was not to cross for her own safety. It sent delicious tingling sensation down my spine whenever I came to it for I knew rules would get broken and dangers would follow. I would boss over my kid sister by drawing a Lakshman rekha around her that she was to cross at her own peril. She, timid thing, stayed within those limits fearing the unknown.
This childhood trick was brought to my mind when someone asked me if it were possible to fix limits for kids when they surfed. Limits that parents would be sure they would adhere to? I thought instantly of my Lakshman Rekha and the clear-cut limits and penalties it involved. And I said, “Why not? It’s our duty as parents to set limits for kids for their own safety, whether they resent it or not.”
See, kids will resent even the minisculest of restrictions imposed for they are free birds at heart. But that does not mean you have to give them a free reign, for they are also naive, guileless and trusting. And most important, they do not know how crooked and complicated the world can be. But you know that right? You are the best person to guide them- after all you have their best interest in your heart. And you know what? Kids know it and accept your authority, albeit grudgingly.
However, there is a process to it. What is out of bounds for a 10-year old is definitely not so for a 14-year old. Then again, some kids are more mature and responsible at a younger age compared to their peers and hence can be allowed more leeway. Parents who are out the whole day or leave kids with grandparents/care takers who are not technologically savvy have to be more careful than those who are around to monitor the kids on the net. So the gist is that there must be some general rules but parents must handle each kid differently according to age, behaviour and maturity levels.
Remember to clarify that every “allowed” is inevitably tied to “responsibility” and “penalty on breach of rule”. This must be made clear at the very beginning and strictly enforced. Like how schools send back kids who are habitually late to teach them a lesson in punctuality, you will also award punishments like ‘no Internet for a week’ if kids breach the ‘Lakshman Rekha’ you’ve drawn.
Some general rules include:
You can meanwhile install a security software like McAfee Family Protection that allows you to set timings and choose websites for every child in the house. Each user will individually log in and the software will monitor their activities and send you remote reports.
So parents, you are to be friends, confidants, guides, police and lawgiver all rolled into one…You do it all the time in real life, so why not in the virtual one too?
» Send this article to a friend...
» Comments? Tell us what you think...
» More Network & Information Security articles...
Commentsblog comments powered by Disqus
Support This Site
• 5/12 Frontline Sentinel: Two-Factor Authentication for Social Media Sites
• 5/10 McAfee Blogs: RealTime for ePO – Optimized Endpoint Security
• 5/10 Ovum: Ovum comments: GB smart meter delay better late than never
• 5/10 Gartner Says India Has The Potential To Lead The World In The Nexus Of Social, Mobile, Cloud And Information But May Waste The Opportunity
• 5/9 Frontline Sentinel: NSA's Manual on Hacking the Internet
• 5/9 Frontline Sentinel: 8 charged in $45 million cybertheft bank heist
• 5/9 Gartner Highlights Three Key Foundational Elements for Demand-Driven Retail Success
• 5/9 iSuppli: Korean and American Versions of Galaxy S4 as Different as Kimchee and Coleslaw, IHS Teardown Reveals
• 5/9 eMarketer: eMarketer: Emerging Markets Drive Facebook User Growth
• 5/9 Wireless Watch: Microsoft/Nokia alliance at crossroads as both ponder OS futures
• 5/9 Wireless Watch: Apple must rethink far more than the iOS user interface
• 5/9 Faultline: Quantenna gets closer to ST Micro, expect it to get “ascloseasthis”
• 5/9 Faultline: Microsoft volunteers to take Nook, as Barnes and Noble start to breakup
• 5/9 Canalys: Smart mobile device shipments exceed 300 million in Q1 2013 - Android powers 59% of smart phones, tablets and notebooks
• 5/8 McAfee Blogs: Cybercriminals Celebrate – It’s Mothers Day!!
• 5/8 Ovum: Government policy-makers need to create a level playing field for cloud services procurement
• 5/8 Gartner Says Smart Organizations Will Embrace Fast and Frequent Project Failure in Their Quest for Agility
• 5/7 McAfee Blogs: How Secure Are Your Social Accounts?
• 5/7 McAfee Blogs: The Password Problem. Is it Your Problem?
• 5/7 McAfee Blogs: Have you met McAfee’s SIEM?
• 5/7 McAfee Blogs: NCCDC 2013 – Red Team Recap
• 5/7 HP Security Lab Blog: HP TippingPoint announces Security Management System 3.6
• 5/7 McAfee Blogs: Yes, There are “Mother’s Day” Scams
• 5/7 Ovum: Analyst View: TPG looks to become Australia’s fourth MNO
• 5/7 Ovum: Analyst view: UK G-Cloud to champion public cloud
• 5/7 Gartner Says CIOs Will Need to Manage Both Technology and Business Innovation to Gain Competitive Advantage with Big Data
• 5/6 Gartner Says Indian Public Cloud Services Market To Reach $443 Million In 2013
• 5/6 iSuppli: IHS Discusses How PCs Can Survive the Tablet Invasion, at the SID Touch Gesture Motion Event
• 5/6 McAfee Blogs: Emerging ‘Stack Pivoting’ Exploits Bypass Common Security
• 5/5 McAfee Blogs: Intel, McAfee Investing in Network Security; Strength through Acquisition
• 5/5 McAfee Blogs: Change Your Password Day – Get Onboard!
• 5/5 Frontline Sentinel: iFrame drive-by attack demo [Anatomy of Attack online]
• 5/3 Frontline Sentinel: Basic Use of Maltego for Network Intelligence Gathering
• 5/3 iSuppli: Russian, Eastern European Video Surveillance Market to Double from 2012 to 2017
• 5/3 McAfee Blogs: AP, Burger King, LivingSocial….Who’ll be Hacked Next?
• 5/2 iSuppli: SSDs to Account for One-Third of Worldwide PC Storage Shipments by 2017
• 5/2 iSuppli: PV Inverter Supplier Base Fragments in 2012 – Minimal Impact From Recent M&A Activity in 2013
• 5/2 McAfee Blogs: Healthcare Cloud Enabled Analytics is Growing
• 5/2 Ovum: Analyst view: Facebook’s Q1 2013 results
• 5/2 Australian Organizations to Spend A$70 Million on Business Process Management Suites in 2013: Gartner
• 5/2 Worldwide Semiconductor Assembly and Test Services Market Grew 2.1 Percent in 2012, According to Final Results by Gartner
• 5/2 Wireles Watch: ZigBee Alliance completes Smart Energy Profile 2:
• 5/2 Wireless Watch: AMD, AT&T and Ericsson – wireless value chain shifts to IoT
• 5/2 Faultline: Netflix Hastings predicts OTT world – should stick to profit predictions
• 5/2 Faultline: Ziggo to add 1m homespots by August, work with Liberty Global
• 5/2 Canalys: Canalys launches ‘Appcessory Analysis’ service - First analyst firm to launch a dedicated continuous information service in this space
• 5/1 McAfee Blogs: BadNews for Good People
• 5/1 Frontline Sentinel: The PR Implications Of Cyber Security
• 5/1 HP Security Lab Blog: So, you want to build a Security Operations Center...
• 5/1 HP Security Lab Blog: The new era of security intelligence, part 1