Kids

Information about Kids

Published on December 30, 2007

Author: luie

Source: authorstream.com

Content

Kids Watch:  Kids Watch Protecting Our Children Cyber Eyes For kids, Children Internet Safety The internet “A Dangerous Place”:  The internet “A Dangerous Place” More and more children are using it It is difficult to monitor Increase popularity of IM and blogs No education in how to use it safely Preferred method used by predators Problems facing parents::  Problems facing parents: The number of PC’s in the home is increasing Children are often more computer savvy than parents Most solutions are either cumbersome or at best block WebPages The Solution:  The Solution Use the power of CYFK’s computer technology to help parents with the monitoring of their children’s IM and web activities. How does it work?:  How does it work? The parent registers on our website and downloads a small application in the child's computer. The application monitors computer usage and transmits it securely to a central computer. The parent sets up his/her preference for alert triggers and notification methods. The central computer analyzes the logs using build in intelligence and creates customized reports or alerts for parents and law enforcement. How does it work?:  How does it work? Scenario 1. unsolicited IM from a predator Jane is doing her homework on the computer and receives an IM solicitation from what she believes to be a friend and she accepts. She chats with whom she believes to be a cute boy from school, but in reality it is a child predator. The conversation becomes inappropriate but Jane still thinks that it is a boy from school flirting with her. The conversation is recorded by the application and transmitted securely to a central computer without Jane or the predator knowing it. How does it work?:  How does it work? Scenario 1. unsolicited IM from a predator Jane’s recorded conversation is analyzed by our computer technology. The IM screen names are matched against our database of suspected predators and their relation to other screen names. The conversation is then scanned for keywords that are default to the system (entered in by parent configuration or specified by law enforcement). The whole conversation is then weighted and then routed to the appropriated processes. In this case the result is that Jane is possibly being stalked by a predator. The system will alert the parent and forward transcript to law enforcement for review. How does it work?:  How does it work? Scenario 1. unsolicited IM from a predator The parent receives an alert urging him/her to log on to the portal and review the transcript of the conversation. Law enforcement (I.e.. Internet Crimes Against Children Task Force) is alerted and receives a copy of the conversation transcript. Law enforcement can then either assume Jane’s online identity to discover more about the predator or use the transcript as additional evidence to prosecute the predator. How does it work? :  How does it work? Scenario 2. Drug involvement Little Joni has been hanging around with the wrong crowd. His so called new friends are trying to get him to take drugs and get involved in other criminal activities. Joni is resisting his new friends’ offers but the pressure is on. They keep on offering him drugs and wanting him to participate in their activities. The IM messages he gets often contain reference to drugs and other illegal activities. The conversation is recorded by the application and transmitted securely to a central computer without Joni or the friend knowing it. Slide10:  How does it work? Scenario 2. Drug involvement Joni’s recorded conversation is analyzed by our computer technology. The IM screen names are matched against our database of suspected predators and their relation to other screen names. The conversation is then scanned for keywords that are default to the system, entered in by parent configuration or specified by law enforcement. The whole conversation is then weighted and then routed to the appropriated processes. In this case the result is that Joni is possibly being involved in drugs. The system will alert the parent. How does it work?:  How does it work? Scenario 2. Drug involvement The parent receives an alert urging him/her to log on to the portal and review the transcript of the conversation. After review they decide the appropriate action and can choose to alert law enforcement from the portal. If the parent chooses to do so, Law enforcement is alerted and receives a copy of the conversation transcript. Law enforcement can then either assume Joni’s online identity to discover more about the friend’s activities or use the transcript as additional evidence to prosecute any crime commited. Other opportunities:  Other opportunities The system can also be adapted to support business customers. Many smaller companies do not have the IT staff or technology to monitor their employees internet and IM use. We can offer a version of the product that is oriented towards business, helping them protect trade secrets and other confidential material. Slide13:  END

Related presentations


Other presentations created by luie

Biomass part 2
07. 01. 2008
0 views

Biomass part 2

hladik iogen
16. 11. 2007
0 views

hladik iogen

Ethanol Tank Fire
09. 11. 2007
0 views

Ethanol Tank Fire

ADSL Introduction
30. 11. 2007
0 views

ADSL Introduction

Ted Bundy and John Wayne Gacy1
06. 11. 2007
0 views

Ted Bundy and John Wayne Gacy1

Britain Alone
13. 11. 2007
0 views

Britain Alone

dm2
19. 11. 2007
0 views

dm2

I 10 relocation
17. 12. 2007
0 views

I 10 relocation

alimentazione
21. 11. 2007
0 views

alimentazione

lian maze iptps06
19. 12. 2007
0 views

lian maze iptps06

LAMAQUINA
31. 12. 2007
0 views

LAMAQUINA

H114j
04. 01. 2008
0 views

H114j

3 LifeCycles
04. 01. 2008
0 views

3 LifeCycles

China 4
10. 10. 2007
0 views

China 4

Corepartnerpresentat ions070128
29. 12. 2007
0 views

Corepartnerpresentat ions070128

RJanda Keynote SCEA2002
29. 12. 2007
0 views

RJanda Keynote SCEA2002

standard minimill stiffness
28. 02. 2008
0 views

standard minimill stiffness

Lecture12 spring05 POST
06. 03. 2008
0 views

Lecture12 spring05 POST

PPF Apr11
10. 03. 2008
0 views

PPF Apr11

anderson e
12. 03. 2008
0 views

anderson e

2007 Travel in the UK and Europe
14. 03. 2008
0 views

2007 Travel in the UK and Europe

204 011 06 Lonc PPT
18. 03. 2008
0 views

204 011 06 Lonc PPT

swanoverview
21. 03. 2008
0 views

swanoverview

pandemicplanning
27. 03. 2008
0 views

pandemicplanning

introess
07. 04. 2008
0 views

introess

ComissionErasmusMund usECW
30. 03. 2008
0 views

ComissionErasmusMund usECW

AustEnergySummitv2
13. 04. 2008
0 views

AustEnergySummitv2

Probate
14. 11. 2007
0 views

Probate

bhatt ethics
07. 01. 2008
0 views

bhatt ethics

7 K Chang presentation final
04. 03. 2008
0 views

7 K Chang presentation final

Goerens
04. 01. 2008
0 views

Goerens

QuickTourOfHowNow
03. 10. 2007
0 views

QuickTourOfHowNow

DeaconDrive
02. 10. 2007
0 views

DeaconDrive

ACM CCSM3 Tutorial
28. 11. 2007
0 views

ACM CCSM3 Tutorial

Eisenberg David Langmuir Probe
03. 01. 2008
0 views

Eisenberg David Langmuir Probe