Protecting Yourself


I recommended to Kathy that if she wanted to have a publicly viewable blog, she should remove her last name, her location information, any mention of her place of employment, and the name of her deceased husband. She should also avoid displaying her emotional vulnerability in her writing. The other option would be to share any information she wants to, but that she restrict access to the blog to her friends and family.

Think About It

Do you like to let others know about your newest purchase, fancy house, or upcoming expensive vacation? Talking about your possessions in a public forum is like waving a red flag in front of a predator: It draws attention to hot items they might steal, and provides information on how to flatter your taste or accomplishments.


Pay attention to whom you share information with. Sharing information with close friends and family poses little risk; sharing with online "friends" you have never met is riskier. As the circle of people you share with widens, so does your risk. An example of this type of danger is the older person who posts family tree information on a publicly accessible genealogy site. When that long-lost cousin calls, is it any surprise he wants to borrow money? Also, if the blogger has included her mother's maiden name on the genealogy site, she might be handing over everything a cybercriminal needs to steal her identity.

Be aware of whether you are posting information about others that could endanger them, or if they are posting information about you. For example, if you mention your friend's blog on your own site, a predator might go there and read an entry that mentions that you just broke up with your boyfriend and are depressed. That entry might provide your last name. Unwittingly, your friend has just provided the predator with a tool he can use to connect with you and gain your trust.

Think About It

The William W. Maddux Kellogg School of Management performed a study that showed people have a natural tendency to trust those they have any connection with. If a predator has your name and your friend's name, you've given him a way to use you to build a connection to your friend.


Remember, if you don't make information publicly available, you significantly reduce potential risks. If you go the public route, simply be thoughtful about what you say. This doesn't take a lot of time or effort. Read through what you've written before you post it and consider, just for a minute, if anything you've said identifies you or gives away information about you or others that would be useful to someone with bad intentions.

Just as it's become second nature for you to avoid providing certain personal information in a conversation with a stranger, it will quickly become second nature for you to protect yourself in online interactions.



Look Both Ways. Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
ISBN: 0735623473
EAN: 2147483647
Year: 2004
Pages: 157
Authors: Linda Criddle

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net