Predators are always looking to collect information about their child victims. This information may be used to identify, connect with, or manipulate children. For example, if a child blogs about being misunderstood, a predator might provide a sympathetic ear in order to create trust and form a relationship. Predators may also try to encourage children into a sexual relationship by talking about sex, so children should avoid talking about provocative subjects with people they do not know.Cyberbullies
Cyberbullies take their targets’ personal information and use it against them. They may copy and alter photos; share private e-mail or instant message conversations; and taunt their victims with emotional insecurities revealed in blogs.Scammers
Scammers want to use children’s personal information to manipulate them. Children who post e-mail addresses and phone numbers may be the targets of spam, telemarketers, and e-mail scams.
It is also becoming more common for coaches, college admissions officers, and employers to screen applicants by checking their online profiles and postings. An admissions officer’s decisions may be negatively influenced by a teen’s posts - for example, rude comments about teachers or inappropriate photos.