Technology Provides New Means for Teen Abuse
Today is February 14 – Valentines day, and most of you are busy preparing for your date or are excited to be with your love ones. My friends were asking me how will I celebrate Valentines this year. My reply is simple: Stay home with my three beautiful angels. I am not trying to be unromantic here but I really don’t celebrate Valentines Day. I firmly believe that although we get to celebrate Valentines Day once a year, LOVE should be a one year round thing.
Anyway, my lovelife is not the center of our topic today but rather the lovelife of our kids. Given the advancement of technology, courtship is now on a new and higher level. Unlike during my time, the only means of communication for me was writing letters and phone. Today, we have email, chat, SMS (text messaging), social networking sites, blogging, forum, instant messaging, and others. Teenagers nowadays gets to be more creative in their courtship with the help of technology.
But while romance or relationship has been taken to a new level, the danger that comes with it has also risen. A study conducted by Teenage Research Unlimited at the request of Liz Claiborne Inc. revealed that information technology and telecommunications are often used to abused teens. Such technology, popular among teenagers, includes cell phones, e-mail and Internet messaging. One in three teens reported being text messaged 10, 20 or 30 times an hour by a partner to find out where they are, who they are with and what they are doing. One in four teens reported being text messaged by a boyfriend or girlfriend at least hourly between 10 p.m. and 5 a.m., said the study.
– 24 percent of dating teens said they’re repeatedly called or text-messaged by their partner between midnight and 5 a.m.
– More than a third were contacted up to 30 times a day by partners asking where they are and who they’re with
– 71 percent said partner harassment on networking sites or cell phones is a big problem for teens
– Parents are often unaware, and kids may not know where to turn.
Victims may remain in abusive relationships for many reasons, including fear of the perpetrator, self-blame, loyalty, love for the perpetrator, social stigma, or lack of understanding.
According to Liz Claiborne Inc.’s study, conducted among 615 teenagers ages 13 to 18 and 414 parents with children that age, 63 percent of teenagers believe using common technological devices to threaten physical harm is a serious problem. One fifth of teens in a relationship have been asked over a cell phone or the Internet to engage in sexual activity when they didn’t want to. Ten percent claim they have been threatened physically via e-mail, Instant Messenger, text message, chat or other technological means.
The study’s margin of error is plus or minus 4 percentage points for the teenage sample and 5 percentage points for the adults. Victims of abusive behavior were also reluctant to tell their parents. Seventy-two percent said they didn’t tell them about receiving a harassing number of e-mails or text messages, and 82 percent had not told them about being pressed to engage in sexual activity.
Facts and tips:
– Don’t be fooled into thinking all child molesters are strangers, dirty old men, homosexuals, mentally disabled, or addicted to drugs or alcohol.
– 93 percent of victims know their abusers: 34 percent are abused by family members; 59 percent are abused by someone trusted by the family.
– Monitor your children’s Internet use. Abusers may use the Internet as a tool to interact privately with children, with the ultimate goal of luring children into physical contact.
– Abusers often try to earn the trust of potential victims and their families. This enables them to more easily gain time alone with the children.
– Always talk to your children about their daily activities. Show interest in their feelings. Encourage them to share their concerns and problems with you.
– Explain that no one has the right to touch them in a way that makes them uncomfortable, including adults whom they know and trust.
– Reassure your children that sexual abuse is never the fault of the children.
– Teach your children that it’s your job to protect them, and that you can protect them only if they tell you when something is wrong.
– Develop a healthy spiritual life with your family. Pray and read the Bible everyday.
As a general rule: Parents should know who their kids are dating and be alert for signs of trouble, such as a child who suddenly has no friends other than the boyfriend or girlfriend. Be more sensitive and observant about your child’s activities and behavioral changes if any. Don’t be too busy with your work, friends and/or other activities, always have enough time with your family. A healthy family with God at the center of it is the best protection you can have against abusers.
Tri-Isys Introduces eScan
I have been saying all along that the burden of securing ones PC or device should be a collaborative effort between the provider and the user. In telecommunication for example, the provider should do everything under its power to protect its users from threats coming from all sources. All data passing through their network should at least be scanned for threats before it reaches the users device.
For Internet providers, the same scenario should also be applied. Data coming in and out of their lines and servers should at least pass through certain security monitoring to minimize the threats awaiting their consumers.
A couple of weeks back, I got an email from Tri-Isys Internet Inc. announcing that they are making available eScan (developed by Microworld Technologies of India) to their consumers. eScan is a free value-added service Tri-Isys provided to their postpaid subscribers. But then they saw the need for an affordable yet equally efficient antivirus software and they thought of developing this into a stand-alone product and offer it to the general public.
eScan, is a proactive and real-time Antivirus and Content security software that offers a comprehensive solution that shield workstation and servers from various threats such as virus, spyware, hackers, spammers, privacy related issues and other objectionable content. It has real time virus and content scanning, filters pop-up ads and protects against intruders among others. It also provides real time / live updates and 24 / 7 free technical support. eScan is very affordable compared to other antivirus products and its reliability is proven by world-renowned software testing and certification bodies such as Checkmark, TUCOWS, Virus Bulletin, Red Hat Ready and Novell Ready.
Features of eScan:
* Real-Time Virus Scanning – Scans e-mails and websites in Real-Time, for viruses, Worms, Trojans, Spyware, Adware, Keyloggers and more, in SMTP, POP3, HTTP AND FTP traffic using MWL technology. Every time you access or copy a file on to your computer it’s scanned for viruses automatically.
* Real-Time Content Scanning- Checks the e-mail body confidential data (specific keywords, phrases, etc.), file size, prohibited content, offensive and obscene language.
* Heuristic Scanning – Sophisticated Heuristic Scanning to prevent newer viruses and hidden malice in a proactive and pre-emptive manner.
* Integrated Security Policy / Central Management Console – eScan Management Console enables administrator to enforce an integrated Security Policy across the enterprise. The administrator can distribute updates across the network, send Outbreak Alerts and security violation notifications, remote installation and uninstallation and much more.
* Asset Management Module – Empowers you to take control of the hardware and software on your networks, ensure software license compliance and more.
* Remote Web Administration – With eScanRAD you can access the Management Console via another computer through browser and perform management tasks. It also helps in remote technical support for the software.
* Websites Scanning / Parental Control – This key feature allows you to block offensive and suitable websites.
* Total Pop-up Blocker – Blocks all annoying Pop-ups and saves System bandwidth.
* NetBIOS Firewall – Ensure that remote users from external computer systems are stopped from creating or modifying specific system files.
* TCP Connections – Inbuilt Network Monitoring Tool that examines TCP/IP activity on systems.
* Spam Stopper – Advanced Spam Blocking Technology using words and phrases to block Spamming and Phishing.
* Logs and Extensive Reports – eScan registers its activities into logs and generates consolidated reports on demand for review and analysis.
* Hourly Signature Updates – To react swiftly to emerging threats, AntiVirus data base is updated every hour.
* Automatic updates – Automatic updates of new virus signatures and antidotes at the user computer.
* 24×7 Free Technical Support – Online, telephonic and e-mail technical support are available free of cost, round-the-clock for all MicroWorld products.
Some of the well-known companies who are now using eScan include the industry’s top bookstore, leading manufacturing companies, prominent commercial banks, prestigious schools and other big corporations. eScan is now available in selected PC retail outlets and will soon be promoted in Visayas and Mindanao.