opinion

Protecting your Children in a Fear-based Digital Society

In these days of fear-based media, the popular press tells us that we are facing danger at every turn: If it’s not terrorism, germs, wars, natural disasters, or the environment, we are constantly being told how unsafe it is for our children to be online; with stories of child abuse, online predators, cyber bullies, Internet stalkers and sex tourism. These cybercrimes are second only to identity theft. The “experts” warn us almost daily of the rash of sexual exploitation facing children and that child protection resources are spread pretty thinly.

But what is actually happening? Has the sexual exploitation of children become the new epidemic of the 21st century? Is the Internet making it easier for children to be harmed and exploited?

Would you let your young child loose in a large city unsupervised? The Internet is no different, as many of the threats that exist in the physical world also exist in the digital one.

Well, the answer is both yes and no.

While the Internet has provided many benefits for mankind, it is also a reflection of our collective global societies, rendered digitally in cyberspace. It has allowed the sharing of information and ideas that is unprecedented in human history; including all aspects of the human condition: from the most brilliant works of art and science to the vilest of content — child pornography.

Child abuse of all kinds has always existed, but it is only during the past few years that because of the Internet and greater awareness of the issues affecting our most vulnerable members of society, those societies around the globe are now openly talking about these problems, and taking steps to better protect our children.

However, make no mistake, online safety is an absolute imperative for parents who wish to protect their children from Internet dangers, including child predators.

Would you let your young child loose in a large city unsupervised? The Internet is no different, as many of the threats that exist in the physical world also exist in the digital one. The Internet is not creating more dangers but it does give children more opportunities to access them and for those dangers to access our children and the internet gives predators a sense of anonymity which makes them bolder in their approaches to gain access to children.

Parents must take an active role in the protection of their children both on- and offline. This holistic approach to child protection takes the computer into consideration and allows parents to take full advantage of reliable parental control software systems. The technology available to protect our children digitally is not the end, however, but merely the beginning. Parents must also supervise what their child is doing online, who they are talking to, and what information they are posting about themselves. ASACP offers guidelines for parents who are committed to protecting a child’s safety: https://www.asacp.org/index.php?content=parental_guidelines.

Creators and distributors of age-restricted content are also doing their part with the near universal use of the RTA (Restricted To Adults) Website Label (www.rtalabel.org). The dedication of these entertainment professionals have allowed child protection software systems to function properly, by indentifying their content as being age-restricted, in a simple, effective and globally recognized way.

The sexual exploitation of children may not be a new phenomenon, but it is a danger that can now reach into our homes, schools and portable Internet-enabled devices. Parents, caregivers and educators must be prepared to deal with this new take on an old problem. There is plenty of good information available on the topic and many tools to help, but the bottom line is that parents need to be as involved in their children’s digital lives as they are in their physical lives.

Related:  

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

Best Practices for Payment Gateway Security

Securing digital payment transactions is critical for all businesses, but especially those in high-risk industries. Payment gateways are a core component of the digital payment ecosystem, and therefore must follow best practices to keep customer data safe.

Jonathan Corona ·
opinion

Ready for New Visa Acquirer Changes?

Next spring, Visa will roll out the U.S. version of its new Visa Acquirer Monitoring Program (VAMP), which goes into effect April 1, 2025. This follows Visa Europe, which rolled out VAMP back in June. VAMP charts a new path for acquirers to manage fraud and chargeback ratios.

Cathy Beardsley ·
opinion

How to Halt Hackers as Fraud Attacks Rise

For hackers, it’s often a game of trial and error. Bad actors will perform enumeration and account testing, repeating the same test on a system to look for vulnerabilities — and if you are not equipped with the proper tools, your merchant account could be the next target.

Cathy Beardsley ·
profile

VerifyMy Seeks to Provide Frictionless Online Safety, Compliance Solutions

Before founding VerifyMy, Ryan Shaw was simply looking for an age verification solution for his previous business. The ones he found, however, were too expensive, too difficult to integrate with, or failed to take into account the needs of either the businesses implementing them or the end users who would be required to interact with them.

Alejandro Freixes ·
opinion

How Adult Website Operators Can Cash in on the 'Interchange' Class Action

The Payment Card Interchange Fee Settlement resulted from a landmark antitrust lawsuit involving Visa, Mastercard and several major banks. The case centered around the interchange fees charged to merchants for processing credit and debit card transactions. These fees are set by card networks and are paid by merchants to the banks that issue the cards.

Jonathan Corona ·
opinion

It's Time to Rock the Vote and Make Your Voice Heard

When I worked to defeat California’s Proposition 60 in 2016, our opposition campaign was outspent nearly 10 to 1. Nevertheless, our community came together and garnered enough support and awareness to defeat that harmful, misguided piece of proposed legislation — by more than a million votes.

Siouxsie Q ·
opinion

Staying Compliant to Avoid the Takedown Shakedown

Dealing with complaints is an everyday part of doing business — and a crucial one, since not dealing with them properly can haunt your business in multiple ways. Card brand regulations require every merchant doing business online to have in place a complaint process for reporting content that may be illegal or that violates the card brand rules.

Cathy Beardsley ·
profile

WIA Profile: Patricia Ucros

Born in Bogota, Colombia, Ucros graduated from college with a degree in education. She spent three years teaching third grade, which she enjoyed a lot, before heeding her father’s advice and moving to South Florida.

Women In Adult ·
opinion

Creating Payment Redundancies to Maximize Payout Uptime

During the global CrowdStrike outage that took place toward the end of July, a flawed software update brought air travel and electronic commerce to a grinding halt worldwide. This dramatically underscores the importance of having a backup plan in place for critical infrastructure.

Jonathan Corona ·
opinion

The Need for Minimal Friction in Age Verification Technology

In the adult sector, robust age assurance, comprised of age verification and age estimation methods, is critical to ensuring legal compliance with ever-evolving regulations, safeguarding minors from inappropriate content and protecting the privacy of adults wishing to view adult content.

Gavin Worrall ·
Show More