You are using Internet Explorer 8
For the optimum WIND experience, upgrade to Internet Explorer 10:UPGRADE BROWSER Continue to wind.gr
We support athleticism and culture!LEARN MORE
Children and the internet!
Σήμερα τα παιδιά έρχονται από μικρά σε επαφή με το διαδίκτυο, και η επίδρασή του είναι καταλυτική στη σχέση τους με τη μάθηση, την πληροφορία, την ψυχαγωγία και την επικοινωνία!
The internet is a “knowledge accelerator”
Children and adolescents are confronted by an infinite source of information and knowledge, with easy and simple access. They can have immediate and easy access to all the information that they need for school, their homework and interests.
The internet teaches the child to research, evaluate information and set a clear target:
Overwhelming information teaches the child to prioritise, evaluate and locate what is useful and interesting to learn.
The internet provides the child with the opportunity to act on their own:
The child can have their own presence and identity on their own terms. The child can create, construct, compare, collect, ask and learn on the internet.
The internet is a source of entertainment and a very popular means of communication:
The internet makes knowledge more entertaining, by providing the child with the capability to play and improve multiple skills, and to have live contact with people from all over the world.
Personal data: children do not always correctly evaluate the information they obtain from the internet, and can give personal information away without any hesitation
Safety: children, just like adults, can be exposed to viruses and malicious software on the internet, i.e. programs that violate their computer's security and can also “steal” personal data
Inappropriate content: children can be exposed to material that is inappropriate for their age and can include advertisements, undesired correspondence (spam), pornographic material, and content of a bullying or hostile nature
Internet fraud: i.e. online fraud, where the criminals are not interested in the age of the person they are defrauding – they are just interested in deriving a benefit from them
Identity theft: in some cases another person can steal a child’s identity and proceed to commit illegal acts, online or offline.
A child that has not yet adequately developed his or her social skills may find refuge in communicating on the internet.Excessive use of the internet can cause the child withdraw from live contact and neglect physical activities or even school work
Internet games can be addictive with easily recognised symptoms, e.g.: behavioural disturbances in sleeping, eating, social isolation and loss of other interests
Internet bullying in the past this only occurred in the school yard. This has now also been transferred to the internet: i.e. threats, maltreatment and bullying.
Anti-Virus:These are programs that protect users and PCs from viruses or other forms of malignant software
Backup:The Backup is one of the most significant measures to protect a user's or a company's data from any intentional destruction by viruses or hackers as well as other causes, e.g. natural disasters or hardware failures
Cryptography: Encrypting sensitive data averts the risk of critical personal or corporate data falling into the hands of criminals
Exploit: Exploit is the means by which a hacker can take advantage of a certain gap in security, in order to gain access to a system
Hacker: Hackers are the super specialized users with special knowledge on all security matters who violate computer systems for a personal benefit
Identity Theft: Identity theft is the fraud committed by someone that has acquired access to the personal data of a certain user to gain access to resources or services that do not belong to them
Password: Passwords are used by all services that require confidentiality to verify user identity.
Spam: The mass delivery of electronic messages to millions of users (who have not requested them or do not wish to receive them) on a daily basis with information on various products.
Trojan Horse: This is a form of malicious software through which skilled users can acquire remote control of the device on which it has been installed.
Η συμμετοχή σου στην κλήρωση για τo smartphone Lenovo K5 Note ολοκληρώθηκε επιτυχώς!