{"id":94491,"date":"2013-09-05T00:00:30","date_gmt":"2013-09-05T05:00:30","guid":{"rendered":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/2013\/09\/05\/part-5-online-identity-theft-security-issues-and-reputational-damage\/"},"modified":"2024-04-14T04:17:30","modified_gmt":"2024-04-14T09:17:30","slug":"part-5-online-identity-theft-security-issues-and-reputational-damage","status":"publish","type":"post","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-5-online-identity-theft-security-issues-and-reputational-damage\/","title":{"rendered":"Part 5: Online Identity Theft, Security Issues, and Reputational Damage"},"content":{"rendered":"<p class=\"wp-block-paragraph\">An array of woes has struck some internet users when personal information of theirs was compromised or some of their online activities put them in conflict with others:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>21% of internet users have had an email or social networking account compromised or taken over without their permission.<\/li>\n<li>12% have been stalked or harassed online.<\/li>\n<li>11% have had important personal information stolen such as their Social Security Number, credit card, or bank account information.<\/li>\n<li>6% have had their reputation damaged because of something that happened online.<\/li>\n<li>6% have been the victim of an online scam and lost money.<\/li>\n<li>4% have had something happen online that led them into physical danger.<\/li>\n<\/ul>\n\n<p class=\"wp-block-paragraph\">In addition to those instances when personal information and personal identity have been at the center of a problem, 13% of internet users report they have experienced trouble in a relationship between them and a family member or a friend because of something they posted. And 1% say they have lost a job opportunity or educational opportunity because of something they posted online or someone posted about them online.<\/p>\n\n<p class=\"wp-block-paragraph\">Online younger adults\u2014those ages 18-29\u2014are the most likely to have experienced some of these troubles, including have an email or social media account taken over, being stalked or harassed online, suffering reputational damage, or being in physical danger based on online events.<\/p>\n\n<p class=\"wp-block-paragraph\">Overall, 55% of the internet users ages 18-29 have experienced at least one of this array of problems, compared with 42% of those ages 30-49, 30% of those ages 50-64 and 24% of those ages 65 and older.<\/p>\n\n<p class=\"wp-block-paragraph\" style=\"text-align: center\">\n<figure><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" alt=\"young adults are the most likely to have had several but not all majory problems with personal information and identity\" src=\"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/wp-content\/uploads\/sites\/9\/media\/4CADEF8182774E7CA3C1983584181078.jpg\" width=\"530\" height=\"433\"><\/figure>\n<\/p>\n\n<p class=\"wp-block-paragraph\"><strong>Low-income internet users are more likely to report negative experiences<\/strong><\/p>\n\n<p class=\"wp-block-paragraph\">In addition to the age differences when it comes to these problems, there are also times when poorer internet users are among the most likely to be victimized. For instance, the internet users who live in households earning less than $30,000 are particularly likely to have suffered a problem from their online activities:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Had an email or social media account compromised<\/li>\n<li>Experienced trouble in a relationship between themselves and others<\/li>\n<li>Been stalked or harassed online<\/li>\n<li>Had their reputation damaged by online activity<\/li>\n<li>Been put in physical danger after online activity<\/li>\n<\/ul>\n\n<p class=\"wp-block-paragraph\" style=\"text-align: center\">\n<figure><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" alt=\"poor internet users are more likely to report negative outcomes\" src=\"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/wp-content\/uploads\/sites\/9\/media\/F1B73C789CD74242BF41E8C3B2BB05F7.jpg\" width=\"530\" height=\"416\"><\/figure><\/p>","protected":false},"excerpt":{"rendered":"<p>An array of woes has struck some internet users when personal information of theirs was compromised or some of their online activities put them in conflict with others: 21% of internet users have had an email or social networking account compromised or taken over without their permission. 12% have been stalked or harassed online. 11% [&hellip;]<\/p>\n","protected":false},"author":139,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sub_headline":"","sub_title":"","_crdt_document":"","_prc_public_revisions":[],"_ppp_expiration_hours":0,"_ppp_enabled":false,"ai_generated_summary":"","relatedPosts":[],"reportMaterials":[],"multiSectionReport":[],"package_parts__enabled":false,"package_parts":[],"_prc_fork_parent":0,"_prc_fork_status":"","_prc_active_fork":0,"datacite_doi":"","datacite_doi_citation":"","_prc_seo_qr_attachment_id":0,"spoken_article_player_enabled":true,"bylines":[],"acknowledgements":[],"displayBylines":true,"footnotes":"","prc_watchers":[]},"categories":[],"tags":[],"bylines":[],"collection":[],"datasets":[],"level_of_effort":[],"primary_audience":[],"information_type":[],"_post_visibility":[],"formats":[458],"_fund_pool":[],"languages":[],"regions-countries":[],"research-teams":[526],"workflow-status":[],"class_list":["post-94491","post","type-post","status-publish","format-standard","hentry","formats-report","research-teams-internet"],"label":false,"post_parent":94519,"word_count":346,"canonical_url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-5-online-identity-theft-security-issues-and-reputational-damage\/","art_direction":false,"_embeds":[],"watchers":[],"table_of_contents":[{"id":94519,"title":"Anonymity, Privacy, and Security Online","slug":"anonymity-privacy-and-security-online","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/anonymity-privacy-and-security-online\/","is_active":false},{"id":94503,"title":"Part 1: The Quest for Anonymity Online","slug":"part-1-the-quest-for-anonymity-online","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-1-the-quest-for-anonymity-online\/","is_active":false},{"id":94510,"title":"Part 2: Concerns About Personal Information Online","slug":"part-2-concerns-about-personal-information-online","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-2-concerns-about-personal-information-online\/","is_active":false},{"id":94494,"title":"Part 3: Who Internet Users are Trying to Avoid; the Information They Want to Protect","slug":"part-3-who-internet-users-are-trying-to-avoid-the-information-they-want-to-protect","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-3-who-internet-users-are-trying-to-avoid-the-information-they-want-to-protect\/","is_active":false},{"id":94498,"title":"Part 4: How Users Feel About the Sensitivity of Certain Kinds of Data","slug":"part-4-how-users-feel-about-the-sensitivity-of-certain-kinds-of-data","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-4-how-users-feel-about-the-sensitivity-of-certain-kinds-of-data\/","is_active":false},{"id":94491,"title":"Part 5: Online Identity Theft, Security Issues, and Reputational Damage","slug":"part-5-online-identity-theft-security-issues-and-reputational-damage","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-5-online-identity-theft-security-issues-and-reputational-damage\/","is_active":true},{"id":94530,"title":"Methods","slug":"methods-10","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/methods-10\/","is_active":false}],"report_materials":"","report_pagination":{"current_post":{"id":94491,"title":"Part 5: Online Identity Theft, Security Issues, and Reputational Damage","slug":"part-5-online-identity-theft-security-issues-and-reputational-damage","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-5-online-identity-theft-security-issues-and-reputational-damage\/","is_active":true,"page_num":6},"next_post":{"id":94530,"title":"Methods","slug":"methods-10","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/methods-10\/","is_active":false,"page_num":7},"previous_post":{"id":94498,"title":"Part 4: How Users Feel About the Sensitivity of Certain Kinds of Data","slug":"part-4-how-users-feel-about-the-sensitivity-of-certain-kinds-of-data","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-4-how-users-feel-about-the-sensitivity-of-certain-kinds-of-data\/","is_active":false,"page_num":5},"pagination_items":[{"id":94519,"title":"Anonymity, Privacy, and Security Online","slug":"anonymity-privacy-and-security-online","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/anonymity-privacy-and-security-online\/","is_active":false,"page_num":1},{"id":94503,"title":"Part 1: The Quest for Anonymity Online","slug":"part-1-the-quest-for-anonymity-online","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-1-the-quest-for-anonymity-online\/","is_active":false,"page_num":2},{"id":94510,"title":"Part 2: Concerns About Personal Information Online","slug":"part-2-concerns-about-personal-information-online","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-2-concerns-about-personal-information-online\/","is_active":false,"page_num":3},{"id":94494,"title":"Part 3: Who Internet Users are Trying to Avoid; the Information They Want to Protect","slug":"part-3-who-internet-users-are-trying-to-avoid-the-information-they-want-to-protect","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-3-who-internet-users-are-trying-to-avoid-the-information-they-want-to-protect\/","is_active":false,"page_num":4},{"id":94498,"title":"Part 4: How Users Feel About the Sensitivity of Certain Kinds of Data","slug":"part-4-how-users-feel-about-the-sensitivity-of-certain-kinds-of-data","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-4-how-users-feel-about-the-sensitivity-of-certain-kinds-of-data\/","is_active":false,"page_num":5},{"id":94491,"title":"Part 5: Online Identity Theft, Security Issues, and Reputational Damage","slug":"part-5-online-identity-theft-security-issues-and-reputational-damage","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/part-5-online-identity-theft-security-issues-and-reputational-damage\/","is_active":true,"page_num":6},{"id":94530,"title":"Methods","slug":"methods-10","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2013\/09\/05\/methods-10\/","is_active":false,"page_num":7}]},"parent_info":{"parent_title":"Anonymity, Privacy, and Security Online","parent_id":94519},"materialsOrdered":[],"chaptersOrdered":[],"partsOrdered":[],"partsEnabled":false,"datacite_doi":"","prc_seo_data":{"title":"Part 5: Online Identity Theft, Security Issues, and Reputational Damage","description":"An array of woes has struck some internet users when personal information of theirs was compromised or some of their online activities put them in conflict with others: 21% of&hellip;","og_title":"Part 5: Online Identity Theft, Security Issues, and Reputational Damage","og_description":"","schema_type":"Article","noindex":false,"canonical_url":"","primary_terms":[],"custom_schema":[],"og_image":0,"indexnow_submitted_at":null,"gsc_index_status":null},"prepublish_checks":{"prc-image-alt-text":{"status":"complete","message":"No image blocks in content.","data":null},"prc-about-this-research":{"status":"incomplete","message":"Add an \"About this research\" details block.","data":null},"prc-paragraph-count":{"status":"complete","message":"Found 6 paragraphs.","data":{"count":6}},"prc-internal-link":{"status":"incomplete","message":"Add at least one internal link.","data":{"count":0}}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"relatedPostsOrdered":[],"bylinesOrdered":[],"acknowledgementsOrdered":[],"_links":{"self":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts\/94491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/users\/139"}],"replies":[{"embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/comments?post=94491"}],"version-history":[{"count":2,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts\/94491\/revisions"}],"predecessor-version":[{"id":136595,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts\/94491\/revisions\/136595"}],"wp:attachment":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/media?parent=94491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/categories?post=94491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/tags?post=94491"},{"taxonomy":"bylines","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/bylines?post=94491"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/collection?post=94491"},{"taxonomy":"datasets","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/datasets?post=94491"},{"taxonomy":"level_of_effort","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/level_of_effort?post=94491"},{"taxonomy":"primary_audience","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/primary_audience?post=94491"},{"taxonomy":"information_type","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/information_type?post=94491"},{"taxonomy":"_post_visibility","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/_post_visibility?post=94491"},{"taxonomy":"formats","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/formats?post=94491"},{"taxonomy":"_fund_pool","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/_fund_pool?post=94491"},{"taxonomy":"languages","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/languages?post=94491"},{"taxonomy":"regions-countries","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/regions-countries?post=94491"},{"taxonomy":"research-teams","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/research-teams?post=94491"},{"taxonomy":"workflow-status","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/workflow-status?post=94491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}