ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Top 3 Dangers of the Internet for Teens

Updated on September 9, 2013

The Internet is not an inherently dangerous place. In fact, browsing the web can be a great way to make new friends, express your creativity, and learn new skills.

However, there are still corners of the Internet that can be dangerous to teenagers if they don't use them correctly. Certain websites, including social networking sites, forums, chat rooms, and blogs, can compromise your privacy and make you the target of cyber bullying. These sites tend to be dynamic, meaning they are rapidly evolving and rely on social interaction between visitors from all over the world.

The good news is that you can avoid dangerous situations with a little preparation. This article looks at three of the top dangers of the Internet and suggests ways they can be easily circumvented.


Invasion of privacy

A recent Pew Internet survey revealed that only 60% of teenagers who use Facebook configure their settings so that their profile remains private. Teens were also more likely to post their cell phone numbers in 2012 than they were in 2006.

Despite these statistics, it's easier than ever to tailor your privacy settings on social media sites. Most major sites have detailed instructions on how to configure your visibility.

If you choose to make your Facebook remains public, it's important to use caution when posting personal details, including your address and phone number. Yes, there are blank fields for these details on your Facebook profile, but filling them in is completely optional. However little or much you choose to reveal is up to you.

Of course, there will be times when you want to use Facebook to exchange personal details. Let's say a friend from school has asked you to post your phone number on your profile. A good alternative is to send that friend a private message, which you can easily do from the Facebook homepage. This way, your phone number is only viewable by you and your friend.

Another easy way to enhance your online privacy is to turn off location services on social media sites. Facebook has the ability to track your movements on a built-in map. You've probably seen your friends posting their locations when they're on vacation or visiting someplace cool. While it might seem commonplace to use Facebook in this way, posting your location is another way to compromise your privacy. Especially for younger users, it's probably best to turn location services off, just to be on the safe side.


Cyber bullying

The Oxford dictionary defines cyber bullying as "the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature."

Cyber bullying can take many different forms, and 68% of teens see it as a problem. Yet it continues to occur all over the web.

One of the hallmarks of cyber bullying is that it is fueled by anonymity. This is why it tends to occur on sites like forums, where you don't need to reveal your true identity.

If you've witnessed cyber bullying on a forum, the best course of action is to immediately contact the moderator. Each website is different, but there is usually a Support thread in most major forums that will link you to a moderator's profile. Keep in mind that you may need to create a username and password in order to access Support threads. Check the specific guidelines on the site you are using for more information on registering a complaint.

Of course, cyber bullying isn't limited to forums. It can also easily occur on social networking sites like Facebook and Twitter. Fortunately, both sites have built-in tools to report various forms of bullying, including name-calling and harassment. Facebook has a built-in Report tool which you can use to report cyber bullying. Look for the "Report" link, which usually appears next to images or links that another user has posted on a profile. Using this tool, you can send Facebook a detailed description of a bullying incident so that they can take disciplinary action.



Impersonation is a more extreme example of invasion of privacy. You might think that impersonation only happens on television or in the movies, but it's actually a very real concern for teens using the web.

Thanks to the vastness of the Internet, it's often difficult to determine whether someone is impersonating you. If you find a social media profile that looks similar to yours, the best case scenario is that they simply share your name. If the user provides an email address, you may choose to reach out to them and see whether they're legitimate.

If you suspect that someone is using your name in a malicious way-- for example, to begin trolling on websites-- then there's more reason for concern. It may be hard to convince someone to stop impersonating you on your own. That's why it's important to involve authorities, including site moderators and administrators, so that the issue can be dealt with as quickly as possible.

On most sites, you can find the contact information for the site administrator at the bottom of a webpage. Administrators are a good point of contact since they usually have the authority to suspend of even ban a user from the website.

If the impersonation is taking place on Facebook or Twitter, then the Report tool is your best option since both sites see impersonation as a type of harassment.

It's also a good idea to keep a detailed written record of the incident, including dates and times. And of course, younger users should also always report instances of impersonation immediately to their parents.


Cyber bullying, impersonation, and invasions of privacy are only three potential dangers on the Internet.

Fortunately, once you recognize the potential dangers of the web, it's much easier to avoid falling prey to them. No teenager should ever feel afraid to use the Internet. As long as they exercise caution and trust their instincts, they can continue to enjoy everything the web has to offer without fear.

Have you ever been cyber bullied online?

See results


    0 of 8192 characters used
    Post Comment
    • profile image


      2 years ago

      thankyou wheres the bibography

    • profile image

      Jlo 16 

      3 years ago

      thanks it helps a lot

    • Kathryn Lane profile image

      Kathryn Lane 

      4 years ago

      This was really informative, thanks!

    • FlourishAnyway profile image


      7 years ago from USA

      Good hub, especially for parents of teens. I am the type of mom who required that my teen friend me and share her passwords with me. Of course, I wonder what other types of accounts she has that I don't know about. Thank you for the well-researched information. Voted up and more.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)