In the past, teens bullied each other in neighborhoods or on school grounds. Now, they can use the Internet to intimidate others, which is not as easily detected or investigated by parents or other adults. Cyberstalking, another form of harassment, occurs when people use the Internet and mobile devices to send or post messages of a threatening or sexual nature. Taken together, these forms of online abuse and crime comprise extremely challenging problems for society. Cyberstalking and Cyberbullying helps teens understand these issues, giving them information to protect themselves and avoid...
In the past, teens bullied each other in neighborhoods or on school grounds. Now, they can use the Internet to intimidate others, which is not as easi...
The Internet is available anytime, anywhere thanks to a host of wireless communications and mobile computing devices. This accessibility makes it difficult for people with online addictions or compulsions to avoid the object of their fixation. Any excessive online activity that leads to personal, family, or community problems can be considered an Internet addiction, and compulsive behaviors can take the form of online and electronic gaming, compulsive shopping, or frequenting chat rooms and social-networking sites. Internet Addiction and Online Gaming discusses the nature of these problems,...
The Internet is available anytime, anywhere thanks to a host of wireless communications and mobile computing devices. This accessibility makes it diff...
The Internet plays a vital role in the everyday lives of millions of people who regularly use computers and other types of electronic information technology devices in their homes, schools, and workplaces. The variety and affordability of these devices, along with compatible operating systems, software applications, and telecommunications technology, contribute to increasing use of the Internet. For teens who have grown up with this technology, it is an integral part of their lives, and it has a huge impact on how they live, learn, and socialize. Living with the Internet provides a broad look...
The Internet plays a vital role in the everyday lives of millions of people who regularly use computers and other types of electronic information tech...
Because teens post so much personal information online on blogs, social networking sites, and Web sites, they are at high risk for these crimes. Identity Theft explains the different types of identity theft crimes and how they are committed, providing valuable advice on how to protect personal information and stay safe online. Safeguards like Internet safety software and other technologies, such as biometrics, that can help protect an individual's identity are also discussed in this timely new book.
Chapters and topics include:
Identity theft defined
Protecting the identity of...
Because teens post so much personal information online on blogs, social networking sites, and Web sites, they are at high risk for these crimes. Ident...
From illegal music downloads to plagiarized school papers, digitial piracy is a complicated issue that can affect teens directyl. This title provides a guide to this often-vague world of copyright, intellectual property, and related legal issues.
From illegal music downloads to plagiarized school papers, digitial piracy is a complicated issue that can affect teens directyl. This title provides ...
Information Crisis discusses the scope and types of information available online and teaches readers how to critically assess it and analyze potentially dangerous information, especially when teachers, editors, or other information gatekeepers are not available to assess the information for them.
Chapters and topics include:
The Internet as an information tool
Critical analysis
Legal issues, traps, and tricks
Protecting personal safety and identity
Types of online information.
Information Crisis discusses the scope and types of information available online and teaches readers how to critically assess it and analyze potential...
Exploring different aspects of the internet and mobile communications and computing, the titles in this set examine the risks connected to various online activities while offering advice on how to avoid them, using real life cases to illustrate how serious the dangers can be.
Exploring different aspects of the internet and mobile communications and computing, the titles in this set examine the risks connected to various onl...