Printed Page 282
In some cases, predators have used access to Internet users to cause harm. For instance, child molesters have used social networking sites to pose as friendly people, with the goal of forming relationships with naïve underage youngsters. Once a relationship takes root online, the predator suggests a face-to-face meeting, with the intent of exploiting the youngster sexually. These incidents have provoked an outcry from parents and demands for better mechanisms for protecting Internet users’ safety.