Report dishonest men on dating sites
Digital technology, especially smart devices, have transformed many aspects of our society, including how people meet each other and establish relationships – romantic or otherwise.
Attitudes towards dating apps and services have grown progressively more positive in recent years.
Are online daters giving away too much about themselves?
Are they, through online dating, exposing themselves and their devices to malicious people – or indeed malware – all too easily?
Testament to this fact, when Pew Research Centre first questioned Americans about online dating in 2005, just 44% said the activity is a good way to meet people, and the majority thought it was a poor replacement for striking up relationships in the ‘real’ world.
But the way we communicate, meet and express our love has changed dramatically since then, and when Pew Research Centre repeated the study ten years later, the number that considered online dating to be a good way of meeting people had grown to 59%.
Although such a large number of people are dating online, our study has found that if you decide to take part, you are most likely to be in the company of users that meet the following criteria.
People that date online are most likely to be: Many people that are on the online dating scene are young, as the 33.8 average age suggests, with 43% of 25-34 year olds using online dating services.
When it comes to personal information, men are ready to share information about themselves much faster than women are.Considering all of this, perhaps it’s no surprise our study found that as many as 32% of Internet users are dating online.So, if one-in-three people out there are doing it, who is the typical online dater?How we conduct our relationships is changing, and it’s clear that technology has a key part to play in this change.People are now not only turning to their devices to work, shop, and play, but to manage their personal lives and relationships too. But with concerns rife following incidents such as the infamous Ashley Madison breach, and with the process inherently requiring users to share personal information, it’s important to consider the potential dangers involved.