Exit

Children and Access to the Internet

Children and the internet!

Σήμερα τα παιδιά έρχονται από μικρά σε επαφή με το διαδίκτυο, και η επίδρασή του είναι καταλυτική στη σχέση τους με τη μάθηση, την πληροφορία, την ψυχαγωγία και την επικοινωνία!

The internet is a “knowledge accelerator”
Children and adolescents are confronted by an infinite source of information and knowledge, with easy and simple access. They can have immediate and easy access to all the information that they need for school, their homework and interests.

The internet teaches the child to research, evaluate information and set a clear target:
Overwhelming information teaches the child to prioritise, evaluate and locate what is useful and interesting to learn.

The internet provides the child with the opportunity to act on their own:
The child can have their own presence and identity on their own terms. The child can create, construct, compare, collect, ask and learn on the internet.
The internet is a source of entertainment and a very popular means of communication:
The internet makes knowledge more entertaining, by providing the child with the capability to play and improve multiple skills, and to have live contact with people from all over the world.

The risks:

Personal data: children do not always correctly evaluate the information they obtain from the internet, and can give personal information away without any hesitation

Safety: children, just like adults, can be exposed to viruses and malicious software on the internet, i.e. programs that violate their computer's security and can also “steal” personal data

Inappropriate content: children can be exposed to material that is inappropriate for their age and can include advertisements, undesired correspondence (spam), pornographic material, and content of a bullying or hostile nature

Internet fraud: i.e. online fraud, where the criminals are not interested in the age of the person they are defrauding – they are just interested in deriving a benefit from them

Identity theft: in some cases another person can steal a child’s identity and proceed to commit illegal acts, online or offline.

Psychological impact

A child that has not yet adequately developed his or her social skills may find refuge in communicating on the internet.Excessive use of the internet can cause the child withdraw from live contact and neglect physical activities or even school work

Internet games can be addictive with easily recognised symptoms, e.g.: behavioural disturbances in sleeping, eating, social isolation and loss of other interests

Internet bullying in the past this only occurred in the school yard. This has now also been transferred to the internet: i.e. threats, maltreatment and bullying.

Advise your child about the internet
  • Create a safe environment for the children where you choose the internet sites that they can access
  • Explain to your children that they should never disclose their personal data and if necessary, help them create an alias
  • Use search engines specially designed for children or search engines with parental control functions. Parental supervision and monitoring is always necessary
  • Protect your children from annoying pop up windows by using software that blocks them
  • It is very important that children know that they shouldn’t download any applications they are unfamiliar with, especially from unfamiliar websites
What do the words mean?

Anti-Virus:These are programs that protect users and PCs from viruses or other forms of malignant software

Backup:The Backup is one of the most significant measures to protect a user's or a company's data from any intentional destruction by viruses or hackers as well as other causes, e.g. natural disasters or hardware failures

Cryptography: Encrypting sensitive data averts the risk of critical personal or corporate data falling into the hands of criminals

Exploit: Exploit is the means by which a hacker can take advantage of a certain gap in security, in order to gain access to a system

Hacker: Hackers are the super specialized users with special knowledge on all security matters who violate computer systems for a personal benefit

Identity Theft: Identity theft is the fraud committed by someone that has acquired access to the personal data of a certain user to gain access to resources or services that do not belong to them

Password: Passwords are used by all services that require confidentiality to verify user identity.

Spam: The mass delivery of electronic messages to millions of users (who have not requested them or do not wish to receive them) on a daily basis with information on various products.

Trojan Horse:
This is a form of malicious software through which skilled users can acquire remote control of the device on which it has been installed.

You are using Internet Explorer 8

For the optimum WIND experience, upgrade to Internet Explorer 10:

UPGRADE BROWSER
Continue to wind.gr