Fight Cyberbullying

Guest Post by Katherine Clarke, Media Relations, Patient Advocacy Group

According to the Megan Meier Foundation—a foundation created by Tina Meier after her 13-year-old daughter, Megan, took her own life as a result of being cyberbullied—approximately 34 percent of all school-aged kids have endured cyberbullying at some point in their lives.

While many people think of this type of bullying as strictly a teenage issue, one study conducted by Pew Research Center found that cyberbullying isn’t something that stops upon high school graduation. In fact, as many as 40 percent of adult internet users indicate that they’ve been bullied in one way or another while they were online.

What Is Cyberbullying?

The >Cyberbullying Research Center (CRC) defines cyberbullying as a “willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices.” Thus, in order for someone’s actions to be considered cyberbullying, they must be:

  • Intentional,
  • Occur more than once,
  • Cause harm to someone else (whether actual or perceived), and
  • Be conducted via a technologically-based source.

It is the fourth element—the technological source—that distinguishes cyberbullying from other types of bullying, some of which include physical, verbal, and sexual.

How Cyberbullying Happens

Kids Safety explains that there are several different “forms” of cyberbullying, or ways that one person can bully another online. Each one is designed to impact the victim in a different way.

Some of the most common forms include:

  • Excluding the victim from activities, conversations, or social network sites so they feel socially isolated and alone.
  • Harassing the victim via abusive and/or threatening messages, causing them to fear the person doing the cyberbullying.
  • Dissing the victim by sharing something personal about them, the intent being to damage their reputation or damage their relationships with others.
  • Outing the victim (sharing a piece of extremely private information) in an attempt to humiliate them. Sometimes, the cyberbully gathers this information through trickery by first gaining the victim’s trust in an effort to extract the information for release.
  • Cyberstalking the victim, causing them to feel as is if their physical safety is compromised. This fear can be real or perceived.
  • Fraping the victim, which involves impersonating the victim by signing in to their online accounts, then posting something that could damage their reputation or otherwise put them in harm’s way.
  • Catfishing, or setting up fake accounts with the victim’s information and images, then posting things on these accounts that will likely damage their reputation.
    Sometimes the cyberbully’s identity is known by the victim, especially if they use their own online presence to attack the victim. Other times, the cyberbully may choose to set up a fake profile to hide who they are.

It’s also possible that the cyberbully doesn’t know the victim personally. This occurs in cases of “trolling,” which is when someone goes online with the intent of provoking a response by commenting on social media posts and in online forums in an effort to degrade or destroy the original poster’s credibility or self-esteem. Thus, anyone who spends time online is a potential cybervictim.

To read more about this article and the following below click:

Warning Signs
Why People do it
Who is at Risk?
Link to School Bullying
Substance Abuse Connection
Ways to Deal
Helping Others

Digital/Cyber Security For Kids

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!