Page 126 - digitalliteracy
P. 126

6.2  Remaining Safe and Secure Online




                       Also, be especially cautious of financial loss or theft when purchasing game elements using
                       real cash. The cost of buying “extras” with online games can add up quickly and substantially.
                       Last, but certainly not least, be careful of developing an online gaming addiction. One of the
                       biggest dangers of these games is that you can waste many hours playing and actually become
                       addicted to them and avoid other important aspects of your life (Get Safe Online, 2015).


                       Pornographic Websites

                       Pornography  can  be  defined as visual  or printed materials that  contain  explicit  displays
                       or descriptions of sexual organs or activities intended to stimulate erotic feelings or sexual
                       excitement. Because the Internet is international, no one set of laws applies everywhere to
                       the publication, distribution, purchase, or possession of Internet pornography. In the United
                       States, the public, lawmakers, and the courts have battled for decades over clearly defining
                       what is pornographic and whether pornography is protected by the First Amendment to the
                       U.S. Constitution as free speech or is obscene and not protected.

                       Child pornography, however, is treated severely under both federal and state laws and is not
                       protected under First Amendment rights. Federal laws consider child pornography to be a
                                                                                                                                                                                                                     J.r. Bale/Hemera/Thinkstock
                       form of child sexual exploitation and define it as any visual depiction of sexually explicit con-
                                                                                                                                                                                        Installing security software isn’t enough to protect
                       duct involving a minor (someone younger than 18 years old). Federal law prohibits any per-
                                                                                                                                                                                        your computer. You have to take the time to update
                       son from producing, distributing, importing, receiving, or possessing any image of child por-
                                                                                                                                                                                        the software and scan it regularly.
                       nography. Violation of these laws is punishable by fines and a prison sentence that can range
                       from a minimum of 5 years to life imprisonment (U.S. Department of Justice, 2015).
                       To control access to pornographic material on your computer, you can purchase software
                       applications called antipornography filters. Examples include NetDogSoft’s Anti-Porn Filter,
                       which attempts to block sites of this nature from appearing on your computer. Some safety
                       and security software also allow you to set parental controls on your computers and phone
                       to control access to certain material, and computer operating systems have privacy settings
                       and parental control features that can help. However, it is important to realize that no filter is
                       100% effective in blocking pornography.



                       Computer Threats

                       As a public space, the web can be a very useful way to find information, shop, find enter-
                       tainment, and stay connected with family and friends. However, it can also be a minefield
                       with hidden dangers you must be aware of and protect yourself against. In addition to pri-
                       vacy issues and the dangers of identity theft, other safety and security threats are common
                       in today’s electronic world. In this section, we discuss other types of threats that exist when
                       you use digital devices and actions you can take to protect yourself and your data to minimize
                       your chances of becoming a victim.

                       Some of the hazards you encounter might simply result in inconvenience or temporarily crash
                       your computer or mobile device. Others, however, can permanently damage your computing
                       devices or seriously harm you,  your family,  your reputation,  or your finances. The best
                       defenses are knowledge and preventive action.






                                                                 110
                        © 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.



       sol82612_06_m06_097-120.indd   110                                                                            6/29/16   5:14 PM
   121   122   123   124   125   126   127   128   129   130   131