Caveat Emptor! Social Networking Websites: Are They Safe Yet?Bruce L. Mann |
Table 1Comparison of selected privacy factors in the Privacy Policies of three SNWs. | |||
gURL | Bebo | Friendster | |
Policy updated – | December 2004. | November 2007 | October 2007 |
Child warning - | Yes. 'gURL may be unsuitable under 13'. | Yes. ‘Under 13 cannot register in Bebo’. Also they recommend 13-17 yrs not to make visible any personal info w/o their parents permission. | No statement in Friendster. |
Private data Opt-In / Opt-Out - | Must opt-out to get privacy in Profile. No data visible to non-members, visitors. | Neither, however there is a clear recommendation from Bebo not to share personal contact info. Opt-in to make invisible to non-members. | Two profiles – one ‘public’, one Friendster. Must opt-out to get privacy. Must opt-out to make invisible to non-members, visitors. Some data visible during discussions. |
3rd-Party ads Opt-In / Opt-Out - | Must opt-out of special offers, affiliate emails. But can opt-in for 3rd-Party Ads. | Default is to receive affiliate emails and 3rd-Party Ads. Widget creation will also redirect web browser to 3rd-Party sites. | Must opt-out of weekly emails. Default is to receive affiliate emails and 3rd-Party Ads. |
Internet awareness warning statement - | Yes | Yes | Yes. |
No-SPAM notice | No. | Yes | Yes. |
Bebo appears to be the safest to use. Children under 13 are not allowed to register, most options are opt-in, and the policy has been recently updated. Bebo and gURL recommend that members using their SNW can contact them in writing should they wish to refuse to receive direct marketing, in accordance with the Data Protection Act. [33] It is worth noting too, that Bebo representatives have been helping to draft a Good Practice Guide for Providers of Social Networking and User Interactive Services, at the Home Office in the UK. That said, some researchers have found that they had no difficulty setting-up profiles as 14 year olds in Bebo, and were subsequently exposed to pornographic material.[34] The Privacy Policies in Bebo may soon change toward a more commercialized service anyway, now that AOL has purchased Bebo.[35] This news coincides with that from Commission of European Committees on promoting data protection by Privacy Enhancing Technologies (PETS). [36] PET appears to be a technical protection measure that protects privacy, instead of preventing copyright infringement through downloading. Ostensibly privacy is protected through the reduction of personal data – a system of redacting private data. Some balance may be achievable.
The general wording in Article 8 ECHR describes the right to respect for private and family life, home and correspondence. However in the context of SNWs, section 2 in Article 8 cuts both ways. On the one hand public authorities cannot interfere unless there is a matter of national security, public safety, etc. On the other, non-interference leaves the innocent, albeit verbose user, at the mercy of those who would use the digital evidence against the user. Add to this, article 10 ECHR such that any curtailment of a user's right to say whatever is on their mind, including disclosure of their own private information, is to deny their right to freedom of expression.[37] Barbara Lacey’s (2007) dissertation research of Internet harassment, accounted for several potential consequences of unmanaged privacy: [38]
‘Denigration’ is "dissing" someone online. Sending or posting cruel gossip or rumors about a person to damage his or her reputation of friendships.
‘Cyber-stalking’ is repeatedly sending messages that include threats of harm or are highly intimidating or engaging in other online activities that make a person afraid for his or her safety.
‘Outing and Trickery’ is sharing someone's secrets or embarrassing information online or tricking someone into revealing secrets or embarrassing information, which is then shared online.
‘Flaming’ is online "fighting" sending electronic messages using angry and vulgar language.
‘Harassment’ is repeatedly sending offensive, rude, and insulting messages.
‘Impersonation’ is breaking into someone's account, posing as that person and sending messages to make the person look bad, get that person in trouble or danger, or damage that person's reputation or friendships.
‘Exclusion’ (Cyberostracism) is intentionally excluding someone from an online group, like a "buddy list" or a game.
Despite the rise of social networking sites such as MySpace, fewer young people are being sexually solicited online than five years ago.[39] In two US telephone surveys of a random sample of 1501 youth aged 10 through 17 years who were regular Internet users, Wolak and associates compared the results of interviews in 2000 with those 5 years later in 2005. Table 2 shows a comparison of online victimization of youth in the United States over five years.
Table 2Comparison of online victimization of US youth over five years. [40] | ||
2005 | 2000 | |
Unwanted exposures to sexual material and online harassment | more | less |
Receiving unwanted sexual solicitations. | less | more |
Saw sexual material online they did not want to see | 34% | 25% |
Exposure to unwanted sexual material occurred despite increased use of filtering, blocking, and monitoring software in households of youth Internet users. | 55% | 33% |
Online harassment | 9% | 6% |
Received unwanted sexual solicitations | 13% | 19% |
Aggressive solicitations | 4% | 3% |
Evidence of cyber-bullying in a SNW is a harassing or humiliating text message directed at one member of the SNW to another. The object of the attack is often a child, preteen or teenager, who is bullied, harassed, humiliated, threatened, embarrassed, or targeted in some way by another person (often another young person) through the use of Internet or cell phone.[41] An extended form of cyber-bullying is a video clip in a SNW showing a person undressing in front of their web cam. The cyber-bully has enticed or threatened a peer to strip-off their clothes in front of a web cam, which later appears as video footage in a social networking website.[42]
Happy slapping in a SNW is a video clip on a social networking website depicting one individual being swarmed by several others. The video depicts several youths ‘hitting a random person (on the bus, walking down the street) whilst recording the act with a video camera phone. It's a very unfortunate London phenomenon. Attackers are usually ‘yoots’ (youths) and ‘chavs’. Victims are usually boys around the same age as the attackers, but it's not unknown for victims to be older, or even women.’[43] In one clip a 27-year-old man can be seen shouting into the camera of his mobile phone, “this is YouTube material" as he urinates on a disabled 50-year-old woman who lay dying in the street. The woman later died in hospital. [44]
Children and young adults are big users of Second Life as well. ‘Second Life’ is an interactive virtual reality playground that also fits the definition of a social networking website. Reporter Jason Farrell recently investigated child pornography in Second Life (Linden Lab) virtual environment and discovered an area called ‘Wonderland’ that was used by child abusers where 'child-like’ avatars were offering sex.[45] Since Second Life is a user-created virtual environment, player interactions are not saved on the client computer. Home Secretary Jacquie Smith, in an interview with Farrell, said that she would be publishing a consultation paper to outlaw virtual imagery of child abuse used in virtual on-line worlds. Since then, Linden Lab has installed a verification system in place, and is experimenting with tracking players’ interactions.[46] Nevertheless British police are going undercover in Second Life to investigate depictions of adult-child sex to track down pedophiles.[47]
Several conclusions can be drawn from this critical evaluation of the relationship between privacy and the growing popularity of SNWs. First there must be someone assigned to interpret the risks of disclosing information about one’s most private thoughts, interests, opinions, work and health status on a SNW, particularly in times of psychological distress or personal tragedy. This ‘someone’ could be and should be, the SNI, a logical choice under the circumstances. Some SNWs serve a critical need, for those in psychological distress or medical tragedy. Consider the recently opened SNW in the UK that enables cancer sufferers to share their experiences and knowledge about dealing with cancer. [48] But even here, especially here, user-generated medical content is grist for anyone with an account and a buyer for these details. Worried advocates of SNWs emphasize the need for individual responsibility when using social networking sites. Developing responsible citizens occurs at the family level. Parents also need to be educated about how to teach their children to be responsible Internet citizens. The children in Lacey’s study were asked for their advice on how to prevent or stop cyberspace aggression, which could include the importance of a parental role and control, confronting the bully, security online, raising awareness and education and password protection. A couple of responses were:[49]
"I think that teasing online could be stopped by parents having more control over their children and watching what their children do on the computer. Also I think that there should be some kind of block on websites like myspace and chat rooms for households with children or even teenagers." (5th grade girl).
“Restrict cell phone and internet access to all unless agreement is signed to not tease. Punishment is banning from internet." (8th grade boy).
Second given the growing risk of identity theft and marketing CAN-SPAM to users of SNWs who appear to be oblivious to the risk of generating UGC, something must be done to alert the user the risks. Documented evidence of computer users ignoring privacy policies and terms of use, in a SNW is no excuse for acts of omission by the user. Scare tactics that work for habitual drunk drivers may be needed for habitual SNW users acting actus reus, such as television commercials showing users in jail and others who have lost their job as a result of the UGC they generated in a SNW.
Aspan, M. (March 2008). After stumbling Facebook finds a working eraser. NY: New York Times.
Bergstrom, I. (2008). Facebook can ruin your life. And so can MySpace, Bebo… The Independent, http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life
-and-so-can-myspace-bebo-780521.html
Bernstein , B. (November 1996) Beyond the Communications Decency Act: Constitutional Lessons of the Internet, Cato Policy Analysis No. 262, http://www.cato.org/pubs/pas/pa-262.html
Bierdorfer (January 2008). Staying private on Facebook, New York Times, http://www.nytimes.com/2008/01/17/technology/personaltech/17askk-001.html?ei=5070&en=9b745acf32897efb&ex=1201237200&adxnnl=1&emc=eta1&adxnnlx
=1206288143-1ldZ9eoG2siQ8rYFONN32Q&pagewanted=print
Boyd, D. (September 2006). Facebook's privacy trainwreck: Exposure, invasion, and drama, Apophenia Blog. http://www.danah.org/papers/FacebookAndPrivacy.html
Charter of Fundamental Rights of the European Union, Official Journal of the European Communities, 2000/C 364/01, Article 8.
Commission of European Committees. (March 2007). Communication from the Commission to the European Parliament and the Council on promoting data protection by Privacy Enhancing Technologies (PETS), 228. final.
comScore Inc. (September 2006). Leading user-generated content sites see exponential growth in UK Visitors During the Past Year, http://www.comscore.com/press/release.asp?press=993
comScore Inc. (August 2007). Bebo becomes the most visited social networking site in the UK, http://www.comscore.com/press/release.asp?press=1571
Data Protection Act section 11.
Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services.
Edwards, L. (2005). Articles 6-7 ECD; Privacy and Electronic Communications Directive 2002 – Canning the spam and cutting the cookies: Consumer privacy online and EU regulation, In Lilian Edwards (ed). The new legal framework for e-commerce in Europe. Chapter 2. UK: Hart Publishing.
Edwards, L. (2005). Articles 12-15 ECD: ISP liability – The problem of intermediary service provider liability, In Lilian Edwards (ed). The new legal framework for e-commerce in Europe. Hart Publishing, p.57.
Electronic Privacy Information Center and Privacy International (2003). Privacy and Human Rights: Overview, http://www.privacyinternational.org/survey/phr2003/overview.htm#ftnref1
European Court of Human Rights (2003). Convention for the Protection of Human Rights and Fundamental Freedoms, Articles 8 and 10.
Facebook Pulse, http://www.facebook.com/s.php?q=Pulse&init=q
Facebook Principles, retrieved 6 December 2007, http://www.facebook.com/policy.php
Facebook Terms of Use, retrieved 15 November 2007, http://www.facebook.com/terms.php
Farrell, J. (October 2007). Perverts use virtual world for fantasies, SkyNews, http://news.sky.com/skynews/article/0,,30100-1290719,00.html
Fung, P. (2008). The Facebook Blog, http://blog.facebook.com/blog.php?post=2963412130
George, C. & Scerri, J. (2008). Web 2.0 and User-Generated Content: legal challenges in the new frontier, Journal of Information, Law and Technology, http://go.warwick.ac.uk/jilt/2007_2/george_scerri
Huff, C., & Finholt, T. (1994). Social issues in computing: Putting computing in its place. NY: McGraw Hill. For unintended effects, see: Wah, B.W. (Ed.). (2008). Wiley Encyclopedia of Computer Science and Engineering. Hoboken, NJ: John Wiley & Sons, Inc.
Kornblum, J. (October 2006). Children less likely to encounter online predators, USA TODAY, http://www.usatoday.com/tech/news/internetprivacy/2006-08-08-kids-online-survey_x.htm
Lacey, B. (May 2007). Social aggression: A study of Internet harassment. A dissertation for the Ed.D. in Educational and Policy Leadership, Hofstra University. 242 pages. Listed at http://www.hofstra.edu/academics/Colleges/SOEAHS/FLPS/flps_dissertations.html
Ohmigod Limited (March 2008). OSOYOU privacy policy, http://www.osoyou.com/info/privacy-policy.publisha
OUT-LAW News. (March 2008). AOL buys Bebo in $850m cash deal. http://www.out-law.com/default.aspx?page=8936
OUT-LAW News (July 2006). Friendster patents social networking, http://www.out-law.com/default.aspx?page=7092
OUT-LAW News. (October 2006). Code of conduct proposed for social networking sites, http://www.out-law.com/default.aspx?page=7298
iliketotallyloveit (March 2008). Terms and conditions, http://www.iliketotallyloveit.com/about/en
MyFaveShop. (March 2008). http://www.myfaveshop.com/page/terms.html;jsessionid
=FC127E598AC98CE6963F40366AB7FEB7
ProfileHeaven. (March 2008). Privacy policy, http://www.profileheaven.com/index.php?do=privacy
Rambam, S. (2006). Privacy is dead - Get over it. The eighth ToorCon information security conference, Sept 30 - Aug 1, San Diego, Google video clip, http://video.google.ca/videoplay?docid=-383709537384528624&q=Steven+Rambam+Privacy+Is+Dead&total=1&start=0&num
=10&so=0&type=search&plindex=0
Reinking, D. (1987). (Ed.), Reading and computers: Issues for theory and practice. NY: Columbia University.
Reuters, E (October 2007). UK to investigate pedophilia in virtual worlds, Reuters/Second Life > Blog, http://secondlife.reuters.com/stories/2007/10/30/uk-to-investigate-pedophilia-in-virtual-worlds/
Sharma, D. (October 2007) Social networking God: 350+ social networking sites. Mashable: Social Networking News, http://mashable.com/2007/10/23/social-networking-god/
Staff (March 2008). Communications Decency Act, Center for Democracy and Technology, http://www.cdt.org/speech/cda/
Staff. (September 2007). Man admits urinating on ill woman, BBC News, http://news.bbc.co.uk/2/hi/uk_news/england/tees/7002627.stm
Staff (March 2008). Social networking site launches for cancer sufferers, Easier Media, http://www.easier.com/view/Lifestyle/Health_and_Fitness/Health/article-169879.html The ‘What Now’ SNW is located at http://www.whatnow.org.uk/ and was launched by Cancerbackup, an information and support charity in the UK.
Stromdale, C. (2007). Regulating online content: A global view. Computer and Telecommunications Law Review, 13(6), pg. 7
Tofalides, M. & Orakwusi, L. (December 2007). User generated content: privacy issues, Data Protection Law & Policy, (4), 12, http://www.e-comlaw.com
Urban Dictionary (April 2008). Happy Slapping, http://www.urbandictionary.com/define.php?t
erm=happy+slap
United States Patent & Trade Mark Office. June 16, 2003, Application No. 10/462,142, http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u
=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=AND&d=PTXT&s1=7,069,308.PN.&OS
=PN/7,069,308&RS=PN/7,069,308
Virtual World News (October 2007). Age Play Report Prompts UK Investigation of Second Life Pedophilia,, http://www.virtualworldsnews.com/2007/10/age-play-report.html
Waelde, C. & Edwards, L. (April 2005). Online intermediaries and liability for copyright infringement, A report to the WIPO Seminar on Copyright and Internet Intermediaries.
Wikipedia (March 2008). List of notable social networking websites, http://en.wikipedia.org/wiki/List_of_social_networking_websites
Wikipedia (April 2008). Cyber-bullying, http://en.wikipedia.org/wiki/Cyber-bullying
Wolak, J., Mitchell, K., & Finkelhor, D. (2006). Online victimization of youth: Five years later. National Center for Missing & Exploited Children. Alexandria, VA, http://www.unh.edu/ccrc/pdf/CV138.pdf
Bruce Mann, Ph.D. is a Professor at Memorial University in St John's, Canada,
Bruce L. Mann. Professor
Memorial University
Faculty of Education
St. John’s, Canada
Website: http://www.cdli.ca/~bmann/
Email: bmann@mun.ca
[1] Bergstrom, I. (2008). Facebook can ruin your life. And so can MySpace, Bebo… The Independent, http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html
[2] Tofalides, M. & Orakwusi, L. (December 2007). User generated content: privacy issues, Data Protection Law & Policy, (4), 12, http://www.e-comlaw.com
[3] OUT-LAW News (July 2006). Friendster patents social networking, http://www.out-law.com/default.aspx?page=7092
[4] United States Patent & Trade Mark Office. June 16, 2003, Application No. 10/462,142, http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=AND&d=PTXT&s1=7,069,308.PN.&OS=PN/7,069,308&RS=PN/7,069,308
[5] Wikipedia (March 2008). List of notable social networking websites, http://en.wikipedia.org/wiki/List_of_social_networking_websites
[6] Sharma, D. (October 2007) Social networking God: 350+ social networking sites. Mashable: Social Networking News, http://mashable.com/2007/10/23/social-networking-god/
[7] comScore Inc. (September 2006). Leading user-generated content sites see exponential growth in UK Visitors During the Past Year, http://www.comscore.com/press/release.asp?press=993
[8] comScore Inc. (August 2007). Bebo becomes the most visited social networking site in the UK, http://www.comscore.com/press/release.asp?press=1571
[9] ProfileHeaven. (March 2008). Privacy policy, http://www.profileheaven.com/index.php?do=privacy
[10] MyFaveShop. (March 2008). http://www.myfaveshop.com/page/terms.html;jsessionid=FC127E598AC98CE6963F40366AB7FEB7
[11] Ohmigod Limited (March 2008). OSOYOU privacy policy, http://www.osoyou.com/info/privacy-policy.publisha
[12] iliketotallyloveit (March 2008). Terms and conditions, http://www.iliketotallyloveit.com/about/en
[13] Edwards, L. (2005). Articles 6-7 ECD; Privacy and Electronic Communications Directive 2002 – Canning the spam and cutting the cookies: Consumer privacy online and EU regulation, In Lilian Edwards (ed). The new legal framework for e-commerce in Europe. Chapter 2. UK: Hart Publishing.
[14] Facebook Pulse, http://www.facebook.com/s.php?q=Pulse&init=q
[15] Fung, P. (2008). The Facebook Blog, http://blog.facebook.com/blog.php?post=2963412130
[16] Facebook Principles, retrieved 6 December 2007, http://www.facebook.com/policy.php
[17] Bierdorfer (January 2008). Staying private on Facebook, New York Times, http://www.nytimes.com/2008/01/17/technology/personaltech/17askk-001.html?ei=5070&en=9b745acf32897efb&ex=1201237200&adxnnl=1&emc=eta1&adxnnlx=
1206288143-1ldZ9eoG2siQ8rYFONN32Q&pagewanted=print
[18] Facebook Terms of Use, retrieved 15 November 2007, http://www.facebook.com/terms.php
[19] Boyd, D. (September 2006). Facebook's privacy trainwreck: Exposure, invasion, and drama, Apophenia Blog. http://www.danah.org/papers/FacebookAndPrivacy.html
[20] Aspan, M. (March 2008). After stumbling Facebook finds a working eraser. NY: New York Times.
[21] Bergstrom, I. (2008). Facebook can ruin your life. And so can MySpace, Bebo… The Independent.
[22] In a recent example, see: Edwards, L. (2005). Articles 12-15 ECD: ISP liability – The problem of intermediary service provider liability, In Lilian Edwards (ed). The new legal framework for e-commerce in Europe. Hart Publishing, p.57. From the 1980’s and 90’s, see: Reinking, D. (1987). (Ed.), Reading and computers: Issues for theory and practice. NY: Columbia University. See also: Huff, C., & Finholt, T. (1994). Social issues in computing: Putting computing in its place. NY: McGraw Hill. For unintended effects, see: Wah, B.W. (Ed.). (2008). Wiley Encyclopedia of Computer Science and Engineering. Hoboken, NJ: John Wiley & Sons, Inc.
[23] Rambam, S. (2006). Privacy is dead - Get over it. The eighth ToorCon information security conference, Sept 30 - Aug 1, San Diego, Google video clip, http://video.google.ca/videoplay?docid=-383709537384528624&q=Steven+Rambam+Privacy+Is+Dead&total=1&start=0&num=10&so
=0&type=search&plindex=0
[24] Boyd, D. (September 2006). Facebook's privacy trainwreck: Exposure, invasion, and drama, Apophenia Blog. http://www.danah.org/papers/FacebookAndPrivacy.html
[25] Charter of Fundamental Rights of the European Union, Official Journal of the European Communities, 2000/C 364/01, Article 8.
[26] Charter, Article 24.
[27] George, C. & Scerri, J. (2008). Web 2.0 and User-Generated Content: legal challenges in the new frontier, Journal of Information, Law and Technology, http://go.warwick.ac.uk/jilt/2007_2/george_scerri
[28] Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services.
[29] Edwards, L. (2005). Article 12-15 ECD: ISP liability - The problem of Intermediate Service Provider liability. In Lilian Edwards (eds.). The New Legal Framework for E-Commerce in Europe (pp. 93-136) UK: Hart Publishing. Also published in: Waelde, C. & Edwards, L. (April 2005). Online intermediaries and liability for copyright infringement, A report to the WIPO Seminar on Copyright and Internet Intermediaries.
[30] Staff (March 2008). Communications Decency Act, Center for Democracy and Technology,
[31] Bernstein , B. (November 1996) Beyond The Communications Decency Act: Constitutional Lessons Of The Internet, Cato Policy Analysis No. 262, http://www.cato.org/pubs/pas/pa-262.html
[32] Electronic Privacy Information Center and Privacy International (2003). Privacy and Human Rights: Overview, http://www.privacyinternational.org/survey/phr2003/overview.htm#ftnref1
[33] Data Protection Act section 11.
[34] OUT-LAW News. (October 2006). Code of conduct proposed for social networking sites, http://www.out-law.com/default.aspx?page=7298
[35] OUT-LAW News. (March 2008). AOL buys Bebo in $850m cash deal. http://www.out-law.com/default.aspx?page=8936
[36] Commission of European Committees. (March 2007). Communication from the Commission to the European Parliament and the Council on promoting data protection by Privacy Enhancing Technologies (PETS), 228. final.
[37] European Court of Human Rights (2003). Convention for the Protection of Human Rights and Fundamental Freedoms, Articles 8 and 10.
[38] Lacey, B. (May 2007). Social aggression: A study of Internet harassment. A dissertation for the Ed.D. in Educational and Policy Leadership, Hofstra University. 242 pages.
[39] Kornblum, J. (October 2006). Children less likely to encounter online predators, USA TODAY,
http://www.usatoday.com/tech/news/internetprivacy/2006-08-08-kids-online-survey_x.htm
[40] Wolak, J., Mitchell, K., & Finkelhor, D. (2006). Online victimization of youth: Five years later. National Center for Missing & Exploited Children. Alexandria, VA, http://www.unh.edu/ccrc/pdf/CV138.pdf
[41] Wikipedia (April 2008). Cyber-bullying, http://en.wikipedia.org/wiki/Cyber-bullying
[42] Stromdale, C. (2007). Regulating online content: A global view. Computer and Telecommunications Law Review, 13(6), pg. 7
[43] Urban Dictionary (April 2008). Happy Slapping, http://www.urbandictionary.com/define.php?term=happy+slap
[44] Staff. (September 2007). Man admits urinating on ill woman, BBC News,
[45] Farrell, J. (October 2007). Perverts use virtual world for fantasies, SkyNews, http://news.sky.com/skynews/article/0,,30100-1290719,00.html
[46] Virtual World News (October 2007). Age Play Report Prompts UK Investigation of Second Life Pedophilia,, http://www.virtualworldsnews.com/2007/10/age-play-report.html
[47] Reuters, E (October 2007). UK to investigate pedophilia in virtual worlds, Reuters/Second Life > Blog, http://secondlife.reuters.com/stories/2007/10/30/uk-to-investigate-pedophilia-in-virtual-worlds/
[48] Staff (March 2008). Social networking site launches for cancer sufferers, Easier Media, http://www.easier.com/view/Lifestyle/Health_and_Fitness/Health/article-169879.html The ‘What Now’ SNW is located at http://www.whatnow.org.uk/ and was launched by Cancerbackup, an information and support charity in the UK.
[49] Lacey, B. (May 2007). Social aggression: A study of Internet harassment. A dissertation for the Ed.D. in Educational and Policy Leadership, Hofstra University. 242 pages. Listed at http://www.hofstra.edu/academics/Colleges/SOEAHS/FLPS/flps_dissertations.html