Cyber Bullying: The Danger of Online Bullying

Cyber Bullying Is A Serious Problem

When Governments and non government organizations produce websites on bullying and cyber safety as well as hosting conferences on cyber bullying around the world you know it is a serious problem. If you, or a family member have ever been a victim of bullying or cyber bullying, you will already know how serious it is.

What Is Cyber Bullying?

This is when someone uses the internet, mobile phones or other digital technologies to harm others.

This extends to include cyber threats which is often the cause of psychological harm and has led to suicide in many serious cases. Public concern at the extent of this crime has led to legislation and educational campaigns to increase awareness.

This has occurred around the world and is work in process as the effectiveness of legislation evolves.

The usual definition is when a young person uses the internet or phone to target another young person for harm. The targeted child, preteen or teen is then intimidated, tormented, harassed, threatened, humiliated or embarrassed by posts and messages.

However, let us be clear about this, in the business world cyber bullying also often occurs, but it can be sexual in nature or even for financial advantage. When an adult targets a young person for harassment or exploitation it is called cyber stalking. Online bullying has been known to lead to tragedy, even suicide.

cyber bullying

Bullying By Proxy

A common form of online bullying is called "Bullying by Proxy". Bullying by proxy involves someone who starts the process and then encourages others join in and participate. Bullying by proxy can be especially dangerous because it increases the intimidation factor and adults may get involved with the harassment and it can lead to stalking and other potential crimes.

In the past bullying used to be done by groups using pressure tactics, body language, exclusion and shunning. There are incidents where people and organizations stupidly accepted bribes to do this. The processes that led to the Global Financial Crisis could be viewed as a form of bullying by proxy. There are some high profile court cases that have led to long gaol terms by the perpetrators. However, it will not help the victims who lost their money, both individuals and organizations.

Cyber Bullying Methods

The methods are diverse, they can take the form of:

  • Flaming - using over-the-top, filthy, accusative, offensive language;
  • Belittling - posting cruel gossip intending to harm someone's reputation;
  • Harassment - sending constant and endless hurtful and insulting messages to someone;
  • Stalking - taking harassment to the level of threatening someone's safety;
  • Trolling - provoking people to anger to attempt to get them to inappropriately respond;
  • Impersonation or Imping - an imp pretends to be another person online in order to get that person in trouble or embarrass him or her;
  • Outing - finding personal and embarrassing information about a person and using this to blackmail or harass them by threatening to reveal it online;
  • Phishing - tricking a person into revealing personal and financial information.

The methods used by perpetrators is only limited by their imagination and emerging social media.

Should You Or Your Children Ignore Cyber Bullying?

Parents can deal with cyber bullying by telling their children not to engage in online arguments. Ignored bullies are ineffective, but it takes a strong person to do this and can be a disaster. Keep a file of the bullying activities including posts, emails and messages. These can be tracked and when it comes time to confront the bully or the bully's parents you have a record. People can be blocked, sites can be alerted, and forums monitored. If forums and sites will not cooperate, leave them behind and find ones that will. Remember: never share personal information with open forums and in unsecured chat rooms.

For identity protection and avoidance of bullies, it's best to keep quiet on as much of your own personal information as possible - this philosophy is especially important for a minor's safety and protection!

If you are not sure what to do and how to handle cyber bullies I would refer to the resource at the top of this article.

We are always interested to hear feedback about better publications and videos to share. There are books and digital tools to help victims, parents and schools to fightback and here are some of them:

 

   


I you wish to check the details of the correct Webwatcher service for you click on the appropriate letters or words at the bottom of the graphic, which are PC, MAC, Android or iOS.

WebWatcher helps parents to monitor their children's computer activity remotely. You can check out their products:

WebWatcher for PC, MAC, Android, iOS 

Disclosure:  We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites

Disclosure: We are a participant in the Awareness Technologies Webwatcher Affiliate Program which is designed to provide a means for us to earn fees by promoting their products.


Go to the Top of Cyber Bullying page

Go to Identity Theft home page 


IT Governance Limited Disclosure: Identity-Theft-Scout.com is participating in the IT Governance Limited Affiliate  Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to their affiliate platform.

What Can You Write About?

We are looking for content related to cybercrimes and identity theft. There are tens of possible topics you can pick on these subjects. Moreover, we appreciate innovative issues, critical opinions, and solution-based articles on an area related to our main topics.

In addition to the topics below, if you have anything else related to our line of interest, please let us know, and we will be glad to share with our readers.


Possible Broad Areas

  • Malware
  • Laptop hacking
  • Cyberbullying
  • Internet security
  • Identity
  • Phishing
  • Data security
  • Bring Your Own Device
  • Data protection regulations
  • Data recovery
  • Data loss or DDOS mitigation
  • Identity theft recovery … and many more.


Guidelines for Content Contribution

Feel free to send us your submissions or topic ideas through our email address. We strive to respond to every request as fast as we can.

Before working on a topic, please take a look at our guidelines we would like all writers to follow. Please feel free to drop us a line if you do not understand any of the guidelines below or have a suggestion.

  • All articles should be at least a 1000 words long. We believe that long articles expound on the topics at hand better than short ones
  • Articles should be written in English. And must be written following the steps mentioned here.
  • All articles should be original and not copied from the internet even if it is your website. They must pass the Copyscape check before we can publish them.
  • The Articles should have useful and quality content, well written and easy to understand
  • Headlines written following the guidelines mentioned here.
  • The articles should be in an editable format such as .odt, docx or .txt format. Please double space your lines for the ease of reading through
  • No offensive or adult language should be employed
  • Please, check the article using a spell checker tool (like as Grammarly) before sending the copy to us.
  • Please provide a high resolution image for each 250 words (Though, we reserve the right of using the images provided by you). At least 3 images is required for a 1000 words article. The images must be from the free sources (like as Pixabay, Unsplash.com, or Pexels.com). The exact image source link must be provided under each images. 



What Will You Get In Return?

  • We give full credits for your published work
  • If we publish your article, we will give credits to you. Besides, we will write a short bio of you below the article and link to your blog social media pages or website.

We Pay Writers For Exceptional Contributions!

Where a contribution meets our guidelines and is an exceptional idea to help our readers and community we will pay up to AUD50 for the contribution.

Our editorial committee will be the sole judge of what is an exceptional idea. If you have an idea that you wish to pitch to us please use the contact email mentioned in this article. 

For the new freelance writers, it is a great chance to earn money online by writing for our website.

This is to encourage you in freelance writing, blogging, and making money online.


How Do You Submit Your Articles?

Take a look at our published work to help generate unique ideas.

Please check and double check that you’ve fulfilled all the criteria.

Then, send the article to us at john[at]identity-theft-scout.com 

We get several submissions every day. Therefore it may take time for us to go through each submission. Please bear with us. We promise to respond to each request within a few days

We look forward to publishing your next article.


Happy writing!!


Amazon Disclosure: We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites. 


New! Comments

Have your say about what you just read! Leave me a comment in the box below.