As the writer has been the director of a Center that provides training and technical assistance to professionals, he has succeeded to pen such a genuine work that enhances the awareness of common people. For instance, according to Armagh (2), parents’ awareness and active involvement is the most effective protection against child victimization. He also reminds that “if parents are to protect their children against cyber predators, they must understand the rational and methodology in using the internet to approach potential victims” (Armagh, 2). Finally, the author puts forward an array of protective measures which parents can implement to ensure the safety of their children from the threat of sexual predators.
The article tends to discuss the concept of internet safety in educational environment assessing the risky situations that children often confront with on the internet. It also illustrates certain safety measures like “avoidance techniques, de-escalation skills, and protection strategies” (370) that would avert problematic situations. The writers insist on the necessity of developing appropriate use policies and procedures that ensure the safety of children. The writers’ perception on internet safety is based on building children’s defense which involves “gradual and periodic interaction and discussions of their web experiences” (369). Regardless of the relevance of the issue, the article flaws as it does not dig deeper into the subject to provide the readers with dependable advice on cyberspace pornography and violence.
The article explores the alarming societal issues associated with the use of internet as the technology has opened up new business opportunities for sexual predators and obsessional harassers. According to the writers McGrath and Casey, these two groups have chosen internet as the best vehicle for attaining their business objectives. The major focus of the article is to make the forensic