How Cyberbullies Attack

Computer safety tips from the Ascentive team

As technology evolves exponentially, it’s crucial that parents, educators, and local law authorities keep abreast of the potential threats that children may encounter online. Unfortunately, Cyberbulling is a rapidly growing problem. A cyberbully uses the Internet, cell phone, or other device to send or post text or images to try to hurt or embarrass other people. Here are the types of abuse to watch out for:

Trolling
A popular form of Cyberbullying, trolling is the act of sending or posting electronic messages that are deliberately hostile, insulting, mean, angry, vulgar or insulting, to one person or several, either privately or publicly to an online group.

Gossiping
Inspired by popular Internet gossip sites, gossiping occurs when a person sends or publishes cruel rumors, or false statements about a person to intentionally damage the victim’s reputation or friendships.

Message Board Posts
Message Boards are online bulletin boards where people post anything they choose. Although there are many good bulletin boards on the net, there are many hostile message boards like 4chan that children should avoid, as the postings on these types of message boards are abusive.

Harassment
Harassment is when the electronic bully repeatedly sends insulting, hurtful, rude, or insulting communications via email or text messages.

Impersonation
Impersonation the act of breaking into someone’s account by stealing a password and changing it, or by maliciously using information provided by a friend.

Happy slapping
Happy slapping occurs when an unsuspecting victim is physically attacked as an accomplice films or take pictures of the incident. The image or video is then posted online at a video site like YouTube or distributed electronically.

Text Wars
Similar to harassment, a Text War occurs when several people gang up on the victim, sending the target hundreds of emails or text messages, resulting in high cellphone bills.

Hate polls
A hate poll asks readers to vote on specific hateful questions, such as “Ugliest freshman” or “Biggest slut on campus?”

Spying
A more sophisticated form of Cyberbullying, this is the act of a computer hacker sending malicious computer code to the victim’s system in order to spy on the victim.

Images and videos
A result of the popularity of camera cell phones, photographs and videos of unsuspecting victims are now taken in bathrooms and locker rooms, then distributed online to humiliate the victims.

Outing
Outing occurs when a Cyberbully releases a victim’s confidential, private, or embarrassing information online, including private email messages or images meant for private viewing.

Trickery
Trickery is when a person purposely convinces another person into divulging secrets, private information or embarrassing information, and subsequently publishes that information online.

Exclusion
A relatively minor form of Cyberbullying, exclusion occurs when someone intentionally excludes another person from an online group or community.

Advertisements

One response to “How Cyberbullies Attack

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s