this; it is exactly what online bullies want.
They are interested in learning that they
have reached you and that you are
concerned and upset;
By being able to get a response from you,
they want to feel important;
Do not post or share cruel or embarrassing
stories or pictures or spread rumours. What
could appear to be a harmless joke to one
person may cause great pain to another.
6 Conclusion and Future Work
Given the rise of technology, digital gadgets, and
the growth of social networks, children in today's
world grow up with these modern technologies and
use them from their earliest age. Although children
can benefit from using the internet and social
networks, there are also risks and dangers on these
sites, as well as potentially dangerous circumstances
where kids might find themselves. These threats and
risks may include, but are not limited to: sexting,
cyberbullying, online harassment, cyber grooming,
online predators, sexual solicitation, extortion, and
many other issues. To help children be cautious
about who they friend, communicate with, and share
information with online, it is important to educate
children about the possible risks of online social
networking sites. This paper provides a short review
of the threats that target children on OSNs, gives
brief descriptions of threats by including cases and
offers guidelines on how to safeguard children's
privacy and security in the context of
networking platforms. This topic will be
explored further in the future and include other
types of risks and threats children face on OSN
platforms, such as children’s exposure to
inappropriate content, dangerous risks that
derive from unsafe trends present on some OSN
platforms, and more.
References:
[1] Jain, A.K., Sahoo, S.R. & Kaubiyal, J.
“Online social networks security and privacy:
comprehensive review and analysis”.
Complex Intell. Syst. 7, 2021, pp. 2157–2177.
https://doi.org/10.1007/s40747-021-00409-7
[2] Tsirtsis A., Tsapatsoulis N., Stamatelatos M.,
Papadamou K., and Sirivianos M. "Cyber
security risks for minors: A taxonomy and a
software architecture," 11th International
Workshop on Semantic and Social Media
Adaptation and Personalization (SMAP),
2016, pp. 93-99, doi:
10.1109/SMAP.2016.7753391.
[3] Fire M., Goldschmidt R., and Elovici Y.
"Online Social Networks: Threats and
Solutions," in IEEE Communications Surveys
& Tutorials, vol. 16, no. 4, 2014, pp. 2019-
2036. doi: 10.1109/COMST.2014.2321628.
[4] Dyer, T. “The Effects of Social Media on
Children”, Dalhousie Journal of
Interdisciplinary Management. 14. 2018, pp.
1-16. doi: 10.5931/djim.v14i0.7855.
[5] Quayyum F., Cruzes D.S., Jaccheri L.
“Cybersecurity awareness for children: A
systematic literature review”, International
Journal of Child-Computer Interaction,
Volume 30, 2021, pp. 1-25, 100343, ISSN
2212-8689,
https://doi.org/10.1016/j.ijcci.2021.100343.
[6] OECD "Children in the digital
environment: Revised typology of risks",
OECD Digital Economy Papers, No. 302,
2021, pp. 1-28, OECD Publishing, Paris,
https://doi.org/10.1787/9b8f222e-en.
[7] Van Ouytsel, J., Walrave, M., Ponnet, K. and
Temple, J.R. “Sexting”. In The International
Encyclopedia of Media Literacy (eds R.
Hobbs and P. Mihailidis), 2018, pp.1-6.
https://doi.org/10.1002/9781118978238.ieml0
219
[8] Ringrose J., and Gill R., and Livingstone S.,
and Harvey L. “A qualitative study of
children, young people and 'sexting': a report
prepared for the NSPCC” (National Society
for the Prevention of Cruelty to Children,
London, UK.), 2012, pp. 1-75.
[9] “Children and Grooming / Online Predators.”
Child Crime Prevention & Safety Center, (no
date), [online] Available at:
childsafety.losangelescriminallawyer.pro/chil
dren-and-grooming-online-predators.html.
[accessed: 10.2.2023]
[10] NortonOnline. Kids and social media: Online
safety tips every parent should know. Norton.
(no date), [online] Available at:
https://us.norton.com/blog/kids-
safety/parents-best-practices-to-social-media-
security. [accessed: 10.2.2023]
[11] MyBangla24. 7 best tools to keep kids safe
online. MyBangla24, (no date), [online]
Available at: https://mybangla24.com/best-
kids-safe-online-tools. [accessed: 10.2.2023]
[12] Aziz Ahmed. “What Is Cyberstalking? -
Differences, Types, Examples, Laws.”
Intellipaat Blog, 2022, [online] Available at:
WSEAS TRANSACTIONS on ADVANCES in ENGINEERING EDUCATION
DOI: 10.37394/232010.2023.20.4
Aleksandar Karadimce, Marija Bukalevska