{"id":5049,"date":"2025-04-22T10:47:25","date_gmt":"2025-04-22T02:47:25","guid":{"rendered":"https:\/\/networkconference.netstudies.org\/2025\/?p=5049"},"modified":"2025-04-22T10:47:28","modified_gmt":"2025-04-22T02:47:28","slug":"internet-savvy-parents-rake-in-money-from-family-vlogging-accounts-while-their-children-remain-ignorant-to-the-value-of-their-own-digital-labour-and-the-dangers-they-are-being-exposed-to","status":"publish","type":"post","link":"https:\/\/networkconference.netstudies.org\/2025\/csm\/5049\/internet-savvy-parents-rake-in-money-from-family-vlogging-accounts-while-their-children-remain-ignorant-to-the-value-of-their-own-digital-labour-and-the-dangers-they-are-being-exposed-to\/","title":{"rendered":"Internet-savvy parents rake in money from family vlogging accounts while their children remain ignorant to the value of their own digital labour and the dangers they are being exposed to."},"content":{"rendered":"\nAbstract\n\n\n\nFamily vlogging content creators on social media apps like TikTok have the potential to make large sums of money but at what cost to the children featured in those accounts? Allowing children to be used in family vlogging accounts provides the opportunity for cyber creeps to stalk, target and communicate with children who lack the life experience to deal with such behaviour. Some cyber creeps have been proven to seek in-person meetings with children, after the formation of a one-sided <a href=\"https:\/\/networkconference.netstudies.org\/2025\/csm\/5049\/internet-savvy-parents-rake-in-money-from-family-vlogging-accounts-while-their-children-remain-ignorant-to-the-value-of-their-own-digital-labour-and-the-dangers-they-are-being-exposed-to\/\" class=\"more-link\">...<\/a>","protected":false},"excerpt":{"rendered":"<p>Abstract Family vlogging content creators on social media apps like TikTok have the potential to make large sums of money but at what cost to the children featured in those accounts? Allowing children to be used in family vlogging accounts provides the opportunity for cyber creeps to stalk, target and communicate with children who lack the life experience to deal with such behaviour. Some cyber creeps have been proven to seek in-person meetings with children, after the formation of a one-sided &#8230;<\/p>\n","protected":false},"author":503,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-5049","post","type-post","status-publish","format-standard","hentry","category-csm"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/networkconference.netstudies.org\/2025\/wp-json\/wp\/v2\/posts\/5049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/networkconference.netstudies.org\/2025\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/networkconference.netstudies.org\/2025\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/networkconference.netstudies.org\/2025\/wp-json\/wp\/v2\/users\/503"}],"replies":[{"embeddable":true,"href":"https:\/\/networkconference.netstudies.org\/2025\/wp-json\/wp\/v2\/comments?post=5049"}],"version-history":[{"count":4,"href":"https:\/\/networkconference.netstudies.org\/2025\/wp-json\/wp\/v2\/posts\/5049\/revisions"}],"predecessor-version":[{"id":5148,"href":"https:\/\/networkconference.netstudies.org\/2025\/wp-json\/wp\/v2\/posts\/5049\/revisions\/5148"}],"wp:attachment":[{"href":"https:\/\/networkconference.netstudies.org\/2025\/wp-json\/wp\/v2\/media?parent=5049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/networkconference.netstudies.org\/2025\/wp-json\/wp\/v2\/categories?post=5049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/networkconference.netstudies.org\/2025\/wp-json\/wp\/v2\/tags?post=5049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}