How to Help Kids Deal with Betrayal Online

One of the most poignant tales I’ve heard from an internet user was that of a tearful 6-year-old girl expressing the betrayal of trust she felt when another child, whom she thought was a friend, used her password and stole items she had earned through game play.

While this little girl’s personal heartbreak will unquestionably fade as larger disappointments take its place, as parents we never want children to feel the disappointment of betrayal, or the loss of innocence.

Since we cannot always protect children from their own actions or the actions of others, youth need to learn resiliency and the skills needed to protect themselves, as well as when and how to set firm boundaries and how to get help when assistance is called for.

Building Resilience

One way to build resilience is to use negative incidents to create teachable moments. Ideally you will be able to help your child turn tiny tragedies into lifelong learning that can eventually protect them from far greater tragedies.   

Start young. One of the first places kids experience social interactions online is through gaming sites that are designed for kids, including sites like Club Penguin, Webkinz and Moshi Monsters. These sites go to great lengths to not only create a safe gaming experience but to actively moderate user behavior.

Unfortunately, and in spite of the advice posted on these websites, many children (and teens and adults) believe sharing passwords is recognition of friendship or devotion. It isn’t. It’s disrespecting their own, and their friend’s privacy. There is a reason websites require users to keep their passwords private; far too many issues arise when others can access another person’s account.  A teen girl once explained that when her boyfriend asked her for her password, she gave it to him and then immediately changed it. The better approach is to say no up front. Friends don’t ask friends for passwords.

There are many other forms of online betrayal: friends who have a falling out and then use private information to trash your child among their peers, cyberbullies who choose your child as the target, websites that exploit user information and so on. Each of these can be very painful, yet each can also be a teachable moment, providing a stepping stone to greater resilience and an opportunity to become stronger, smarter internet citizens.


Online Shopping & Banking
10 Tips to Safer Shopping
Avoiding Internet Crooks
Bank Online Safely
Benefits of E-books
Identity Theft Rights
Identity Theft Tax Scams
Online Auction Sites
Online Classifieds - Buying
Online Classifieds - Selling
Secure Social Engineering
Digital Family Life
Addictions and ADHD
Betrayal Online
Child Online Privacy
Children & Anorexia
Children & Inappropriate YouTube Videos
Children and Internet Advertising
Children's Photos Online
Cyberbullying Tips
Dating Online Safely
Digital Dating
Digital Literacy
Family Time
Healthy Digital Family Life
High Risk Behaviors
Impact On Children
Internet Gambling
Internet Pornography
Kids & Online Gaming
Kids Posting on YouTube
Kids’ Mobile Apps
Make Money Websites
Online Gaming & Children
Online Quizzes & Surveys
Oversharing Information Online
Protecting from Predators
Read the Fine Print
Respect Online
Risky Behavior
Safe Online Photo Sharing
Safety & Social Networks
Social Networking and Friction
Teaching Privacy
Teen Asking for Validation?
Too Much Time Online
Video Games
PC Security
Argument with a troll
Block Pornography
Bots, Botnets And Zombies
Coupon Safety
Safe Linking & Attachments
Safe URLs
Search & Collected Info
Search vs Research
Secure Websites
What is Antivirus?
What is Phishing?
Getting Started
Beginners Tips
Email Hacking
Identify Theft
Malicious Software
Organize Net News
Sending Email
Strong Passwords
Technology Overload
Cyberbullying & Online Predators
Cyberbullying Help
Cyberincident Response
Family Blogging
Harassed Online
Online Predators
Online Safety
Recognize a Cyberbully
Report Cyberbullying to Police
Report Cyberbullying to Schools
Safety: Pornography
Mobile Security
Cell Phone & Driving
Cell Phone Theft
Mobile Law Enforcement
Mobile Protection
Mobile Sexting
Parents & Cell Phones
Tweets Archived
Ethics & Legal
Cheating & Technology
Cite Sources and Avoid Plagiarism
Download Music & Videos
Facebook Passwords
Internet Addiction
Internet Content Copyrights
Kids & Impersonation
Online Impersonation
Societal Digital Piracy Costs
Managing your Online Reputation
Online Reputation
Protect Your Online Content
Protecting Privacy on Google
Teens & Reputation