Other
Commentary
5/2/2006
09:55 AM
Commentary
Commentary
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Kids Online: Where Are The Parents?

Listen to a podcast version of this newsletter


In This Issue:
1. Editor's Note: Kids Online: Where Are The Parents?
2. Today's Top Story
    - RIM Gets Sued—Again—As Mobile E-Mail Wars Rage On
    Related Stories:
    - Smarter Spam Could Mimic Friends' Mail
    - Wireless-N Could Stand For 'Not Interoperable'
    - High Education Tackles The Problem Of Wi-Fi Capacity
3. Breaking News
    - IE7 Search Box Fuels Google-Microsoft Rivalry
    - Researcher: Oracle Needs To Patch 44 More Bugs
    - AMD Reports Potential Heat Problem With Some Opteron Chips
    - 5 Reasons We're Not In A Tech Boom
    - Skype Introduces Speakerphone, PC-Less Wi-Fi Phone
    - Cheap Trick, Allman Brothers Suing Sony For Higher Digital Royalties
    - AirMagnet Rolls Out Voice-Over-Wi-Fi Analysis Tool
    - Wireless Vendors Tout Security, VoIP At Interop
    - How To Build A Data Vault With Hardware-Based Data Encryption
    - 11 Ways To Protect Your Network From Instant Messaging Risks
    - Cisco Overhauls Router Line To Improve VoIP, Security
    - Movie, Record Industries Target College LANs In Piracy Battle
4. Grab Bag: News You Need From Around The Web
    - The Web's Million-Dollar Typos (The Washington Post)
    - 'Hairy Guys' Join EU In Fighting Microsoft Appeal (International Herald Tribune)
    - Guidelines For Radio Tags Aim To Protect Buyer Privacy (The New York Times - reg. required)
5. In Depth: Kids Online
    - Beware Child Predators
    - Connected To Nowhere
    - Child Porn On Your Work PCs? It Can Happen
    - Online Safety For Kids A Thriving Business
    - Coalition Launched To Fight Child Pornography
6. Voice Of Authority
    - Is Wireless Affecting Our Health?
7. White Papers
    - Two-Factor Authentication
8. Get More Out Of InformationWeek
9. Manage Your Newsletter Subscription

Quote of the day:
"It goes without saying that you should never have more children than you have car windows." -- Erma Bombeck


1. Editor's Note: Kids Online: Where Are The Parents?

The resounding message I kept hearing while reporting on one of the features in this week's edition of InformationWeek is that we parents are, by and large, abdicating our duty to our kids. If parents took a more proactive role, many of the problems kids are running into would be mitigated or stopped before they even began.

Unfortunately, too many parents have no real idea what their kids are doing online. Many adults are afraid of or freaked out by the technology and stay removed from the entire subject. On the other side of the coin are those of us who spend our lives with or around computers and just assume our kids are savvy because they've grown up around the technology. We make our living off, or with, computers—what could be bad?

Both scenarios can do a grave disservice to the children involved.

The experts I talked to, including psychiatrists, psychologists, and educators, understand that parents can't be looking over their kids' shoulders around-the-clock. But often we leave too much to chance or force the kids to figure out too much on their own. Sometimes it's difficult for parents to remember that, as sophisticated as today's generation is with and around anything electronic, they're still children. They don't have the maturity or the skills to know everything they need to in order to keep themselves safe. They need adult help and guidance even when they don't want to hear it. But too often we don't talk to them until after they've run into problems.

Ideally, we would talk to our kids before they become victims of cyberbullying, or post an inappropriate page on MySpace (one with personally identifying information or explicit photos, that is), or spend five hours each day online to the exclusion of any other activity.

You may think, as many adults do, that children are just fundamentally "wired" to push the limits. That pushing is, in fact, their job, and they're quite good at it—and it has ever been so. Some kids will just always find a way to get into trouble, as did generations before them and, hey, (insert good-humored chuckle here) we all lived to tell the tale. It's just part of growing up, right?

That may be true. But the big difference nowadays is that unlike sneaking off to smoke a filched cigarette or look through an "adult" magazine with the guys, kids online can get into very deep trouble, and they can do so very quickly. It can then escalate to the point of having "real-world" ramifications—kids who are threatened by schoolmates online may not want to go to school. Or they may become depressed, school grades start to suffer, and so on. Self-cutting, drinking alcohol, taking drugs, attempting suicide—all have been "side effects" of problems that started online.

Just as we wouldn't allow our kids to go into a physical situation where we don't know the players, or what we do know isn't good, we need to follow that same advice and exercise a wallop of good old-fashioned common sense when it comes to online matters, too.

What do you think? Have you dealt with these issues in your life, and how have they worked out? To read more, or to comment, please see my blog post.

Johanna Ambrosio
Jambrosio@cmp.com
www.informationweek.com


2. Today's Top Story

RIM Gets Sued—Again—As Mobile E-Mail Wars Rage On
Visto won a patent infringement suit against Seven Networks Friday, then turned around and sued BlackBerry maker Research In Motion.

Related Stories:
Smarter Spam Could Mimic Friends' Mail
The next-generation of spam-sending zombies might scan E-mail in the user's inbox, mine it for information and writing patterns, then crank out realistic-looking replies to real messages, researchers warn.

Wireless-N Could Stand For 'Not Interoperable'
Hardware companies are racing to bring out wireless LAN equipment with far higher speeds and capacity. But consumers and businesses should be cautious: As the standard they're based on isn't yet official, early products may not be interoperable and could have performance problems.

High Education Tackles The Problem Of Wi-Fi Capacity
Colleges are finding ways to meet the wireless computing demands of large concentrations of students—and businesses could learn a thing or two from them.


3. Breaking News

IE7 Search Box Fuels Google-Microsoft Rivalry
Google says Microsoft is unfairly using the new Web browser to steer users to MSN; Microsoft says no way.

Researcher: Oracle Needs To Patch 44 More Bugs
The bugs range in age from 12 days to two-and-a-half years, says a German security researcher, adding that Oracle plans to fix them, but won't say when.

AMD Reports Potential Heat Problem With Some Opteron Chips
AMD says only a very small number of chips are affected. It will make available diagnostic tools for identifying susceptible chips, which it will replace at no charge.

5 Reasons We're Not In A Tech Boom
From smaller VC funding to your paycheck, there are good reasons not to get carried away with today's pockets of tech success.

Skype Introduces Speakerphone, PC-Less Wi-Fi Phone
The new products are part of an effort by the eBay unit to drive into the corporate market.

Cheap Trick, Allman Brothers Suing Sony For Higher Digital Royalties
If granted class-action status, the case could involve thousands of artists signed to Sony since 1962 and millions of dollars.

AirMagnet Rolls Out Voice-Over-Wi-Fi Analysis Tool
The network analysis tool helps network managers detect voice problems over wireless networks.

Wireless Vendors Tout Security, VoIP At Interop
Vendors are looking to expand enterprise WLAN rollouts and shine a spotlight on the VoIP and security features of their latest wares.

How To Build A Data Vault With Hardware-Based Data Encryption
Lock up data with a PC that packs big security features and high performance into a small, stylish package.

11 Ways To Protect Your Network From Instant Messaging Risks
You can beef up security by taking measures including using a hosted IM service, enabling content filtering and blocking, and logging and auditing IM conversations.

Cisco Overhauls Router Line To Improve VoIP, Security
New modules for the 7200 promise performance improvements for aggregation of services such as security and VoIP from branch offices, and the router line now scales up to OC-3/Gigabit Ethernet speeds.

Movie, Record Industries Target College LANs In Piracy Battle
Two industry groups said they sent letters to college presidents in 25 states, alerting them of the illegal activity on campus local-area networks.

All Our Latest News

Watch The News Show

In the current episode:

John Soat With 'News You Can Use'
Office pirates wank the plank; when you're hot, you're hot; and machine love.

Mike DeMaria With 'Application Virtual Machine'
Altiris releases virtualization solution software.

Sacha Lecca With 'The Robot Hall Of Fame'
Check in with Sacha to see if your favorite robot made this year's list.


----- The latest research, polls, and tools -----
Sound Off About Your Outsourcers
Is your organization outsourcing any IT functions? Here's your chance to sound off about the performance of your organization's key outsourcing vendors in InformationWeek Research's Analyzing the Outsourcers survey.

New From InformationWeek: Get Your News In A Flash—Literally
InformationWeek.com's latest service is automated E-mail news flashes. You pick the topic and the frequency (real time, daily, or weekly), and we'll do the rest. Sign up by following the link below and be one of the first to take advantage of this latest service.

Do You Access Our Content From A BlackBerry Or Treo?
Many of our readers do, and we want to ensure that you get the best experience in using our content. So we've created a PDA-friendly version of our news content, with similarly streamlined content pages, to make your PDA experience a good one. Check out our latest enhancement.
-----------------------------------------


4. Grab Bag: News You Need From Around The Web

The Web's Million-Dollar Typos (The Washington Post)
Google, which runs the largest ad network on the Internet, is making millions of dollars a year by filling otherwise unused Web sites with ads. In many instances, these ad-filled pages appear when users mistype an Internet address, such as "BistBuy.com." This new form of advertising has sparked a speculative frenzy of investment in domain names, pushing the value of some beyond the $1 million mark.

'Hairy Guys' Join EU In Fighting Microsoft Appeal (International Herald Tribune)
Meet some of the members of Free Software Foundation Europe, a campaign group that supports making software code more accessible to the public.

Guidelines For Radio Tags Aim To Protect Buyer Privacy (The New York Times - reg. required)
Some privacy proponents come together to draft best-practices guidelines for RFID that are to be released today at a trade show in Las Vegas.


5. In Depth: Kids Online

Beware Child Predators
Teens hang out on social Web sites—and so do sexual predators. They need our help staying safe.

Connected To Nowhere
Internet use can isolate kids instead of linking them to the world.

Child Porn On Your Work PCs? It Can Happen
The Center for Missing and Exploited Children estimates that billion annually is spent on online child porn. Here's what to do if you suspect child porn on workplace PCs.

Online Safety For Kids A Thriving Business
Companies are popping up or tweaking existing products to meet the growing demand for Internet safety. And at a major summit in June, nonprofit cyberwatch group WiredSafety will bring social Web sites like MySpace together with technology giants Google and Microsoft to develop ways to keep kids safe online.

Coalition Launched To Fight Child Pornography
The Financial Coalition Against Child Pornography includes credit card companies, banks, and Internet companies that will work with law enforcement and the National Center for Missing and Exploited Children.


6. Voice Of Authority

Is Wireless Affecting Our Health?
All this time, Elena Malykhina says, she's been thinking that the cause of her tiredness and quick temper is work-related stress, the side effects of living in New York City, and lack of sleep. But it's possible that the actual culprit could be her home Wi-Fi network.


7. White Papers

Two-Factor Authentication
Passwords are out. Two-factor authentication is in. If your organization has, or is getting, an application-layer SSL VPN for remote access, you need a strong and easily deployed two-factor authentication solution to secure your network from unauthorized access.


8. Get More Out Of InformationWeek

Try InformationWeek's RSS Feed

Discover all InformationWeek's sites and newsletters

Recommend This Newsletter To A Friend
Do you have friends or colleagues who might enjoy this newsletter? Please forward it to them and point out the subscription page.


9. Manage Your Newsletter Subscription

To unsubscribe from, subscribe to, or change your E-mail address for this newsletter, please visit the InformationWeek Subscription Center.

Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
InfoWeek@update.informationweek.com

If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.

We take your privacy very seriously. Please review our Privacy Policy.

InformationWeek Daily Newsletter
A free service of InformationWeek and the TechWeb Network.
Copyright (c) 2006 CMP Media LLC
600 Community Drive
Manhasset, N.Y. 11030

Comment  | 
Print  | 
More Insights
The Business of Going Digital
The Business of Going Digital
Digital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.