The purpose of this research paper is to provide information that helps people understand different ways to protect themselves and their children while online. This research paper will inform readers with tips on how to avoid becoming a victim of identity theft. After reading this document, people will understand the different types of computer and computer crimes, steps on how to protect children online, and tips when using a different computer network more safely. There are many different types of computer and computer crime classifications. A cybercrime can best be described as criminal activity that deals with computer infrastructure. This includes unlawful unauthorized access to a computer, interception or interference of data systems, disruption of the functioning of computer systems by transmitting, deleting, damaging, altering or suppressing computer data as well as the misuse of device, forgery, identity theft and electronic fraud. Some examples of cyber crimes include sending or spreading viruses, hacking into a computer or network, fraud, online sexual predators using the Internet to meet children, harassment, and drug trafficking. According to the Federal Trade Commission "Children may be more vulnerable to scams and sophisticated online marketing and share more personal information on social networking sites. How do you protect you and your children online? The best way to protect your children online is to monitor their online activities. Parents need to talk to their children about Internet safety. Parents must always know what their children are doing online. MacAfee advises parents to “use age-appropriate children's software children. Install and use...... half of the paper...... types of computer and computer crimes, steps on how to protect children online and tips when using a different computer network more safely Dyke, J.V. (n.d.). 10 Ways to Protect Yourself Online |.Retrieved November 24, 2013, from http://www.rd.com/slideshows/10-ways-to-protect-yourself-online/Home smart online. (2010). Retrieved November 27, 2013, from http://www.staysmartonline.gov.au/How to Protect Yourself Online | FCC.gov. (n.d.). Retrieved November 24, 2013, from http://www.fcc.gov/guides/how-protect-yourself-onlineInternet Security, Antivirus, Antispam, Antispyware | Security Advisory Center | McAfee. (n.d.). Retrieved November 24, 2013, from http://home.mcafee.com/advicecenter/?id=ad_ost_tohtpyoKozakis, K. A. (2009). Lesson 9: Internet services and tools for businesses. In the fundamentals of Internet business. Tina Forte.
tags