Imposter profiles are one form of cyberbullying or online harassment certainly not restricted to youth. Tweens, teens, and adults create profiles that impersonate the people they want to harass, putting them in an embarrassing or defaming light. There are also simply fake profiles of imaginary people aimed at tricking the real people who "befriend" the imaginary people in the fake profiles, which is what happened in the Megan Meier case (see "Extreme cyberbullying: US case comes to light." In a well-reported article, ConsumerAffairs.com describes a few actual imposter-profile cases and how hard it is to make them go away. Part of the problem is that, online, it's much easier to set up a profile than it is to prove its harmful intent or impact. Some people who click the "Report Abuse" buttons in sites are actually being abusive – of the site as well as their peers. "MySpace includes a link at the bottom of every profile to report abuse, but many people misuse this to harass someone who has posted a legitimate profile," ConsumerAffairs reports. The article includes no solutions to this growing problem because there simply are no known ones besides better, more civil behavior on everybody's part and education aimed at that and at the fact that we're not as anonymous online as we all think we are. ConsumerAffairs also goes into the law and how little it can do in these cases.
NetFamilyNews – by Anne Collier
- A positive, insightful new book for schools on bullying
- Students called heroes in this 6th-grade class
- In the face of school violence, what do we default to?
- Popularity: The other kind of vulnerability
- FB & Oculus VR: The potential of a virtual-reality platform
- What’s (importantly) different about Snapchat
- We ‘like’ faces in social media: Study
- Yik Yak update: How the app came to geo-fence off US schools
Analysis & News – by Larry Magid
- Anonymous apps and services are not synonymous with ominous
- Facebook’s ‘Nearby Friends’ feature: What you need to know
- Identity theft a problem from cradle to grave — Kids most vulnerable
- How to protect your family from Heartbleed security flaw (slideshow)
- Beware of Heartbleed inspired phishing scams
- Are sites you use vulnerable to Heartbleed security flaw?
- Microsoft ends support of Windows XP: Machines highly vulnerable to security risks
- The evolution of online safety: Lessons learned over 20 years