{"id":118,"date":"2008-05-21T09:56:29","date_gmt":"2008-05-21T09:56:29","guid":{"rendered":"https:\/\/estrangements.com\/theblog\/2008\/05\/21\/support-groups-part-two-online-support-groups\/"},"modified":"2008-05-21T09:56:29","modified_gmt":"2008-05-21T09:56:29","slug":"support-groups-part-two-online-support-groups","status":"publish","type":"post","link":"https:\/\/estrangements.com\/theblog\/2008\/05\/21\/support-groups-part-two-online-support-groups\/","title":{"rendered":"Support Groups: Part II (Online Support Groups)"},"content":{"rendered":"<p>Some online discussion groups have been offered on sites set up by the authors of books on the subject. Some online groups are public and anyone can read and write on the site. Others require people to become members using an email address or user name and a password but letting almost anyone join. Occasionally such groups may block a person who violates the moderator&#39;s rules of conduct but it is easy for someone to make up another user name, get another email address, and join again.<\/p>\n<p><!--more--><br \/>\nSome people make up multiple identities to use in a group. Reasons for<br \/>\ndoing this can vary from someone wanting to have a ready made friend<br \/>\nwho will always be in agreement with them to someone trying to disguise<br \/>\ntheir identity for reasons of their own. Reasons for using multiple<br \/>\nidentities could be positive or negative. There are estranged relatives<br \/>\nwho do stalk the people from whom they are estranged. Both stalkers and<br \/>\nstalkees might create multiple identities. It&#8217;s a strange strange world<br \/>\nwide web we inhabit!<\/p>\n<p>A couple of years ago a site was set up specifically for parents who were<br \/>\nestranged by their children and that site is semi-private. They attempt<br \/>\nto prevent adult children who had estranged their parents from joining.<br \/>\nDiscussion groups there are only for parents who are mourning the loss<br \/>\nof their children. The group owner\u00a0 doesn&#8217;t want the group to be<br \/>\npublicized. I am not the group owner and I do not belong to it. I had<br \/>\noffered to publicize it when it was first set up and the owner told me<br \/>\nthat they did not want it publicized. I can understand why.<\/p>\n<p>Some public discussions of family estrangements take place on sites<br \/>\nthat have as a main subject something that has nothing to do with<br \/>\nrelationship issues but which offer forums that provide an opportunity<br \/>\nfor registered members to start discussions on topics of their own<br \/>\nchoosing. These are generally public discussions and are open to anyone<br \/>\nto read and write. However, participants usually can create their own<br \/>\nuser names and their email addresses are generally not shown with their<br \/>\nposts.<\/p>\n<p>Private online discussions can be set up in such a way, thanks to the<br \/>\nmany services offered online, that it is almost impossible for someone<br \/>\nto find and read the postings, assuming that all of the members&#8217;<br \/>\ncomputers are secure and not accessible to anyone else and that no<br \/>\nspyware has been installed on their computer. In one situation that I<br \/>\nknow of, a woman&#8217;s private email to a group moderator was read by her<br \/>\nson who had estranged her and who had not lived with her for some time.<br \/>\nHe used spyware installed on her computer to monitor her online. Both<br \/>\nher son and her ex-husband used spyware on her computer to do this at<br \/>\ndifferent times. She did not know whether her son had installed the<br \/>\nspyware that he used to read her email. Someone had put something on<br \/>\nher computer. <\/p>\n<p>The son never did get into the discussion group as far as we know as<br \/>\nthe mother didn&#8217;t receive postings as emails. He only saw the email. If<br \/>\nshe had set her group postings to be received as emails he would have<br \/>\nbeen able to see all of the group&#8217;s discussion, including the private<br \/>\nposts of people he didn&#8217;t know. If that had occurred and he had wanted<br \/>\nto, he might have been able to contact others who were related to these<br \/>\ngroup members and reveal their postings to them. That could be<br \/>\ndisastrous for those who had trusted that their postings would be<br \/>\nprivate within the circle of that group. There is probably spyware that<br \/>\nis more invasive than the spyware that he used and that would have<br \/>\ngiven away her password and user ids that she used to log into the<br \/>\ngroup. Then he would have had even more access to the group and could<br \/>\nhave posted under her user name if he had wanted to.<\/p>\n<p>If there has been an opportunity for someone to put spyware on a group<br \/>\nmember&#8217;s computer, then there is a risk, no matter how private the<br \/>\ngroup, that their password and user name and membership in the group<br \/>\nare known and that the specific person whom they most would not want to<br \/>\nread their posts can see everything. If that occurred, then there is<br \/>\nalso the chance that the identities of other members of the group would<br \/>\nbe known to that person and there could be further consequences and<br \/>\ncompromises to the privacy of other members with unfortunate results.<br \/>\nThis is something to be aware of when joining or creating an online<br \/>\ngroup. It may be rare that this happens but it is something to be aware<br \/>\nof as a risk. <\/p>\n<p>One daughter who had estranged her mother for ten years joined a<br \/>\npassword protected group on family estrangement when she had a conflict<br \/>\nwith her father and stepmother. Her mother had belonged to the group<br \/>\nfor a year and a half and had been invited to join the group by the<br \/>\nowner when it was first formed. At the time that the daughter began<br \/>\nposting on the group, the mother hadn&#8217;t posted anything for six months.<br \/>\nThe daughter searched the group archives for her mother&#8217;s posts and<br \/>\nthen became enraged. The daughter did not see her behavior as an<br \/>\ninvasion of her mother&#8217;s privacy but only as an example of her mother&#8217;s<br \/>\nfoolishness for posting in a group on the internet where her postings<br \/>\ncould be found by anyone. The mother was not able to establish any kind<br \/>\nof productive dialogue with the daughter in the group and subsequently<br \/>\nquit that group and created a private group which could be joined only<br \/>\nthrough invitation.<\/p>\n<p>The danger of a password protected group to which almost anyone can<br \/>\njoin is that it can become too large for anyone to know anything about<br \/>\nthe identities and backgrounds and agendas of the members. So if<br \/>\nprivacy is important, as it can be in many situations, then you must<br \/>\nknow the risks associated with joining a group with a large membership.<br \/>\nCreating another email address and a user name that is not associated<br \/>\nwith you personally and not ever using real names or other identifying<br \/>\ndetails in your posts are good strategies if you join a large<br \/>\ndiscussion group. As well as being certain that no one has ever put<br \/>\nspyware on your computer.<\/p>\n<p>In the next post I will talk about the opportunities that exist to create your own private online discussion group.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some online discussion groups have been offered on sites set up by the authors of books on the subject. Some online groups are public and anyone can read and write on the site. Others require people to become members using an email address or user name and a password but letting almost anyone join. Occasionally&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,6,69],"tags":[62,70,155,54,120,41,154,153,156,187],"class_list":["post-118","post","type-post","status-publish","format-standard","hentry","category-for-parents","category-therapeutic","category-weblogs","tag-alienation","tag-cutoff","tag-daughter","tag-estrangement","tag-estrangements","tag-family","tag-father","tag-mother","tag-son","tag-support"],"_links":{"self":[{"href":"https:\/\/estrangements.com\/theblog\/wp-json\/wp\/v2\/posts\/118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/estrangements.com\/theblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/estrangements.com\/theblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/estrangements.com\/theblog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/estrangements.com\/theblog\/wp-json\/wp\/v2\/comments?post=118"}],"version-history":[{"count":0,"href":"https:\/\/estrangements.com\/theblog\/wp-json\/wp\/v2\/posts\/118\/revisions"}],"wp:attachment":[{"href":"https:\/\/estrangements.com\/theblog\/wp-json\/wp\/v2\/media?parent=118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/estrangements.com\/theblog\/wp-json\/wp\/v2\/categories?post=118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/estrangements.com\/theblog\/wp-json\/wp\/v2\/tags?post=118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}