{"id":1510,"date":"2010-04-12T10:45:17","date_gmt":"2010-04-12T17:45:17","guid":{"rendered":"http:\/\/blog.intego.com\/?p=1510"},"modified":"2012-11-14T17:18:15","modified_gmt":"2012-11-15T00:18:15","slug":"keeping-children-safe-from-internet-porn","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/","title":{"rendered":"Keeping Children Safe from Internet Porn"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/independent.png\"><\/p>\n<p>There once was a time when pornography was only available by under-the-counter means, or only from newsstands, where people usually wouldn&#8217;t sell it to kids. But with the Internet providing porn with just a few clicks, are kids being endangered? Dr. Terri Apter examines this in length in <a href=\"http:\/\/www.independent.co.uk\/life-style\/gadgets-and-tech\/features\/teenage-kicks-is-internet-porn-creating-a-damaged-generation-1938238.html\">an article in the Independent<\/a>. Dr. Apter points out how easy it is to find porn online:<\/p>\n<blockquote><p>\nType into google any common female name, or the name of a sweet (such as a lollipop) or a flower (a blue orchid, say) and up will come links to websites that open on to a disturbing new world \u2013 a world of extreme pornography that includes images of child rape and other acts of sexual torture. But these are not sites restricted to private systems requiring credit-card payments or age verification; indeed, they are easily accessible by children.\n<\/p><\/blockquote>\n<p>While some people may search for porn intentionally, kids often stumble on it without looking.<\/p>\n<blockquote><p>\nIt is now estimated that 12 per cent of our five- to seven-year-olds and 16 per cent of eight- to 17-year-olds have unintentionally stumbled on to some of the estimated 250 million pages of pornography on the internet, while 38 per cent of older teens admit to seeking out such sites.\n<\/p><\/blockquote>\n<p>And what about chat rooms, where kids can be stalked by predators? <\/p>\n<blockquote><p>\nIn chat rooms, meanwhile, it takes only the input of minimal personal details for a person anywhere in the world to be alerted when a child goes online \u2013 and then to instigate a conversation to explore and exploit the child&#8217;s interests and insecurities. Research across several countries shows that 31 per cent of young people aged from nine to 19 who go online at least once a week have received uninvited sexual comments.\n<\/p><\/blockquote>\n<p>Parents are worried about Internet pornography, and psychologists question how it affects the development of children who are at vulnerable ages.<\/p>\n<blockquote><p>\nAccording to Ofcom, 66 per cent of parents say they are concerned about what a child might access on the internet, and at the top of their list of concerns is exposure to sexually explicit material. It is not just knowing that graphic, violent pornography is available on the internet; parents are also worrying about the impact such material may have on their children&#8217;s \u2013 and particularly their sons&#8217; \u2013 emotional and intellectual development.\n<\/p><\/blockquote>\n<p>Pornography is a serious risk for our kids, and children need to be protected. Intego ContentBarrier, <a href=\"https:\/\/www.intego.com\/internet-security-barrier\/\">part of the company&#8217;s Internet Security Barrier X6 suite<\/a>, is designed to block adult web sites and filter predatory chats. Used by school districts around the world, ContentBarrier is the most effective solution to keep children safe from the dangers of the Internet. With schedules, blacklists, whitelists and age-specific settings, ContentBarrier lets parents and educators keep children from seeing the dark side of the Internet.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There once was a time when pornography was only available by under-the-counter means, or only from newsstands, where people usually wouldn&#8217;t sell it to kids. But with the Internet providing porn with just a few clicks, are kids being endangered? Dr. Terri Apter examines this in length in an article in the Independent. Dr. Apter [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[37,67],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"There once was a time when pornography was only available by under-the-counter means, or only from newsstands, where people usually wouldn&#039;t sell it to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keeping Children Safe from Internet Porn - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"There once was a time when pornography was only available by under-the-counter means, or only from newsstands, where people usually wouldn&#039;t sell it to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-04-12T17:45:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-11-15T00:18:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/independent.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/independent.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/independent.png\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/\",\"name\":\"Keeping Children Safe from Internet Porn - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#primaryimage\"},\"datePublished\":\"2010-04-12T17:45:17+00:00\",\"dateModified\":\"2012-11-15T00:18:15+00:00\",\"description\":\"There once was a time when pornography was only available by under-the-counter means, or only from newsstands, where people usually wouldn't sell it to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Keeping Children Safe from Internet Porn\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Keeping Children Safe from Internet Porn\",\"datePublished\":\"2010-04-12T17:45:17+00:00\",\"dateModified\":\"2012-11-15T00:18:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#webpage\"},\"wordCount\":467,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/independent.png\",\"keywords\":[\"Children\",\"Internet\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"There once was a time when pornography was only available by under-the-counter means, or only from newsstands, where people usually wouldn't sell it to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/","og_locale":"en_US","og_type":"article","og_title":"Keeping Children Safe from Internet Porn - The Mac Security Blog","og_description":"There once was a time when pornography was only available by under-the-counter means, or only from newsstands, where people usually wouldn't sell it to","og_url":"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/","og_site_name":"The Mac Security Blog","article_published_time":"2010-04-12T17:45:17+00:00","article_modified_time":"2012-11-15T00:18:15+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/independent.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/independent.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/independent.png"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/","name":"Keeping Children Safe from Internet Porn - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#primaryimage"},"datePublished":"2010-04-12T17:45:17+00:00","dateModified":"2012-11-15T00:18:15+00:00","description":"There once was a time when pornography was only available by under-the-counter means, or only from newsstands, where people usually wouldn't sell it to","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Keeping Children Safe from Internet Porn"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Keeping Children Safe from Internet Porn","datePublished":"2010-04-12T17:45:17+00:00","dateModified":"2012-11-15T00:18:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#webpage"},"wordCount":467,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-children-safe-from-internet-porn\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/independent.png","keywords":["Children","Internet"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-om","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1510"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=1510"}],"version-history":[{"count":1,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1510\/revisions"}],"predecessor-version":[{"id":7215,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1510\/revisions\/7215"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=1510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=1510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=1510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}