{"id":27,"date":"2006-10-09T03:16:00","date_gmt":"2006-10-09T08:16:00","guid":{"rendered":"https:\/\/www.tameri.com\/wordpress\/poetponders\/?p=27"},"modified":"2025-06-23T17:30:52","modified_gmt":"2025-06-23T22:30:52","slug":"no-small-towns-online","status":"publish","type":"post","link":"https:\/\/www.tameri.com\/csw\/2006\/10\/09\/no-small-towns-online\/","title":{"rendered":"Predators Using Virtual Communities: No Small Towns Online"},"content":{"rendered":"<p>Visalia Direct: Virtual Valley<br \/>\nNovember 2006 Issue<br \/>\nOctober 8, 2006<\/p>\n<p style=\"text-align: center\"><strong>No Small Towns Online<\/strong><\/p>\n<p>\u201cMy parents don\u2019t have a clue. They think I only have the AOL account.\u201d<\/p>\n<p>I was sitting in a College of the Sequoias classroom, where I was taking a Spanish class. During the afternoons, I was teaching English at Fresno State, but in the mornings I was just another student at COS.<\/p>\n<p>From my place in a hard plastic seat, I was learning a lot.<\/p>\n<p>This student with a laptop was updating his MySpace profile. Actually, he was creating a new profile after his parents had located his previous online profile. His parents had located his old profile because he had used his American Online e-mail address. After seeing a news broadcast, his parents decided to check on their son.<\/p>\n<p>\u201cNow, I use one of my Gmail accounts or Hotmail when I create a profile. We all know to use nicks, too.\u201d<\/p>\n<p>By obtaining numerous free e-mail accounts and using nicknames online, students of all ages are hiding from their parents.<\/p>\n<p>I\u2019m sure this young man\u2019s parents meant well when they searched for him online. You can certainly learn a lot when you search MySpace, Yahoo 360, or Facebook to see what young people are doing. News reports have also reminded us that a mix of pedophiles, predators, and general miscreants also skim these \u201csocial networks\u201d looking for victims of all ages.<\/p>\n<p>Because students know parents, teachers, and coaches are checking up on them, the students are racing ahead of us. As this young man reminded me, it is easy to setup a free e-mail account on Yahoo, Google, Microsoft\u2019s Hotmail, and several other popular Web sites. You can create as many identities and profiles as you want. Even some cell phone providers allow you to create multiple e-mail identities.<\/p>\n<p>These companies are aware of how students use e-mail and profiles, but there is little these services can do to check who signs up for a free mailbox. MySpace, Yahoo, and Microsoft ask users to \u201cverify\u201d their ages. \u201cI certify that I am 18 or have parent permission\u201d is not much of a safety check.<\/p>\n<p>No matter how many primetime news programs expose the risks, teens and preteens seem intent on attracting attention to themselves. Posting racy photos, writing innuendo-laced messages, and joining \u201cgroups\u201d or \u201cclubs\u201d with names that shouldn\u2019t appear in print, are all part of the online culture of this generation. What a teen might think is funny or harmlessly daring is an invitation to trouble.<\/p>\n<p>This semester, I\u2019m teaching a course on professional settings at a university. I\u2019ve tried to get 18 to 22-year-old students to consider what their online profiles tell the world. The young women admit to getting hundreds of unsolicited e-mails and chat requests. When I ask if being a member of \u201cCalifornia Cyber Sluts\u201d might be the problem, they can\u2019t always make the connection. (Believe it or not, I\u2019ve edited the group name to be somewhat less offensive.)<\/p>\n<p>\u201cWhy would anyone take that seriously?\u201d a student asked.<\/p>\n<p>Parents should definitely take the question seriously.<\/p>\n<p>I admit, predators exist in every community regardless of size or location. Even the people in professions we once trusted most are under suspicion. But the Internet has made it easy for predators to search through virtual communities of millions for victims.<\/p>\n<p>When we only had to deal with physical places, knowing where your child was sufficed. Even when online chatting and text messages first exploded onto the scene, you could set limits.<\/p>\n<p>What can you do when libraries and classrooms offer online access? How can you stop a teenager who wants to create a private Gmail or Yahoo mail account? There are no foolproof barriers, and using the ones that do exist might only make it a more interesting challenge for a teenager.<\/p>\n<p>You might think your child doesn\u2019t have an online profile you don\u2019t know about. In fact, some places are nearly impossible for parents to monitor but employers and universities have access. Facebook is extremely popular with students, gaining on MySpace with giveaways like free music from iTunes. The catch is that students can lock \u201cnetworks\u201d to include only people from their school or university.<\/p>\n<p>Unless you have an e-mail address issued by Fresno State, you cannot join the Facebook network dedicated to students of the university. What students forget is that some alumni also have Fresno State accounts, as do current graduate students of all ages. So, while you might not be able to see your child\u2019s college exploits, a local employer might see too much.<\/p>\n<p>I\u2019m not about to equate how a potential employer might react to a threat to a teen\u2019s security. But photos posted in high school and available online through college could seriously damage a potential career.<\/p>\n<p>What is more worrisome is that some miscreants are paying students with accounts on Facebook and MySpace to search for revealing pictures. This means that compromising pictures of young men and women might be hidden away from parents\u2026 but those same images aren\u2019t hidden from the worst among us. Worse, many of the pictures and posts being \u201creposted\u201d on the Internet include information about when and where pictures were taken.<\/p>\n<p>The only real protection we can offer our children is sound advice. Let\u2019s hope they listen.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Visalia Direct: Virtual Valley November 2006 Issue October 8, 2006 No Small Towns Online \u201cMy parents don\u2019t have a clue. They think I only have&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/www.tameri.com\/csw\/2006\/10\/09\/no-small-towns-online\/\">Continue reading<span class=\"screen-reader-text\">Predators Using Virtual Communities: No Small Towns Online<\/span><\/a><\/div>\n","protected":false},"author":2,"featured_media":1880,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"iawp_total_views":11,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5,2,4,8],"tags":[41,205,434,496,526,566],"class_list":["post-27","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-csw","category-columns","category-education","category-technology","tag-aol","tag-facebook","tag-privacy","tag-social-media","tag-teaching","tag-virtual-valley","entry"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.tameri.com\/csw\/wp-content\/uploads\/sites\/2\/2023\/12\/Virtual-Valley-Banner-v2-1.jpg?fit=1920%2C1279&ssl=1","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pfiw78-r","_links":{"self":[{"href":"https:\/\/www.tameri.com\/csw\/wp-json\/wp\/v2\/posts\/27","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tameri.com\/csw\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tameri.com\/csw\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tameri.com\/csw\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tameri.com\/csw\/wp-json\/wp\/v2\/comments?post=27"}],"version-history":[{"count":1,"href":"https:\/\/www.tameri.com\/csw\/wp-json\/wp\/v2\/posts\/27\/revisions"}],"predecessor-version":[{"id":1819,"href":"https:\/\/www.tameri.com\/csw\/wp-json\/wp\/v2\/posts\/27\/revisions\/1819"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tameri.com\/csw\/wp-json\/wp\/v2\/media\/1880"}],"wp:attachment":[{"href":"https:\/\/www.tameri.com\/csw\/wp-json\/wp\/v2\/media?parent=27"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tameri.com\/csw\/wp-json\/wp\/v2\/categories?post=27"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tameri.com\/csw\/wp-json\/wp\/v2\/tags?post=27"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}