Menu

Skip to content
  • Welcome
  • The Author
  • Buy
  • Read
  • Internet Safety Project

Digital Mists of Darkness

by Charles D. Knutson

Welcome

Digital Mists of Darkness by Dr. Charles D. Knutson is a book for LDS parents and leaders, written to help you navigate the intersection of technology and moral life. The full text of this book is available on this site at no charge.

Read Digital Mists of Darkness online


or

Find out about the upcoming print edition.

Table of Contents

  • Preface
    • My Biases
  • 1. Technology: Bane or Blessing?
    • Fundamental Assumptions
    • Technical Wheat and Tares
    • The Iron Rod and the River of Filthiness
    • Now What?
  • 2. Why All the Fuss?
    • Internet Pornography
    • Online Predators
    • Social Networking
    • Cell Phones and Mobile Devices
    • Chatting and Messaging
    • Cyberbullying
    • Online Gaming
    • Malware
    • Email
    • Identity Theft
    • The End of the Tour
  • 3. “Ye Shall Keep These Secret Plans from This People”
    • The Jaredite Plates
  • 4. Internet Pornography
    • A Literal Drug Addiction
    • The Four A’s of Internet Pornography
    • Points of Access, Points of Protection
    • Web Browsing
    • Web Filtering
    • Web Searching
    • Social Networking
    • Online Role-Playing Games
    • Cell Phones and Handheld Devices
    • Chatting and Instant Messaging
    • iTunes, Video iPods, Podcasts, and Other Applications
    • Peer-to-Peer Applications
    • Newsgroups
    • CDs, DVDs, and Other Media
    • What to Do?
    • Be Engaged with Your Children Online
    • Look for Danger Signs
    • Take the Initiative
    • Teach True Doctrine
    • Be Direct
    • Don’t Freak Out
    • The Myth of Maturity
    • Take A Stand
    • Additional Resources
  • 5. Online Predators
    • How Does an Internet Predator Behave?
    • The Pornography Connection
    • In Search of a Stereotype
    • Patient, Social Engineers
    • How Do They Access Kids?
    • Chat Rooms
    • Social Networking Sites
    • Online Games
    • Adult Dating Services
    • Privacy and Sharing Online Information
    • Technology Versus Education
    • Resources
  • 6. Social Networking
    • What is a Social Network?
    • Personal and Professional Networking
    • Personal Information and User Profiles
    • Friends, Followers, and Connections
    • Blogging, Status Updates, and Microblogging
    • Discussion and Comments
    • Chat, Messages, and Email
    • Music Sharing
    • Photo Sharing
    • Video Sharing
    • Parental Guidelines
  • 7. Cell Phones and Mobile Devices
    • Cell Phone Ubiquity
    • Smartphones and Tablets
    • Sexting
    • Cell Phone Etiquette
    • Cell Phone Use While Driving
    • Malware
    • Parenting Tips
  • 8. Chatting and Messaging
    • Chat Rooms
    • Instant Messaging (Messaging)
    • Text Messaging (Texting)
    • Audio and Video Chat
    • Understanding Chat Language and Acronyms
    • Parting Thoughts
  • 9. Cyberbullying
    • Cyberbullying is Real
    • The Face of Cyberbullying
    • Cyberbullying Behaviors
    • Cyberbullying Tactics
    • Adult Cyberbullying
    • Parents as Part of the Solution
    • Cyberbullying and the Law
    • Parenting Guidelines
  • 10. Online Gaming
    • What Do We Mean by “Game”?
    • Standalone vs. Online
    • Single Player vs. Multiplayer
    • Real Player vs. Role Playing
    • Social Networking Games
    • MMORPGs – Massively Multiplayer Online Role Playing Games
    • Gaming Addiction
    • Signs of Gaming Addiction
    • Corrosive Material
    • Game Ratings
    • Time Wasting
    • Parental Guidelines
  • 11. Malware
    • Malware: Evil Software
    • Viruses
    • Worms
    • Trojan Horses
    • Spyware
    • Adware and Pop-up Ads
    • Scareware
    • Parenting and Personal Guidelines
  • 12. Email
    • Netiquette
    • Email at Work
    • Email Forwarding
    • Email Flaming
    • Spam
    • Inappropriate Content
    • Financial Scams
    • Phishing Attacks
    • Email Malware
    • Hoaxes
  • 13. Identity Theft
    • The Problem of Identity Theft
    • Categories of Identity Theft
    • Identity Theft Techniques
    • What Can I Do?

Buy the Book

Copyright © 2023 Charles D. Knutson — All Rights Reserved