This blog is part of the requirements for the PRO 622 course. This Cyber Bully Campaign is a make-believe campaign and is used only for the purpose of this course.
Cyber bullying occurs when electronic communications such as text messages, emails, instant messages, and social media updates are used to threaten or humiliate someone. Its consequences can be just as serious as the effects of bullying that occurs in person. Learn how to recognize and address cyber bullying before it gets out of hand.
There are 4 steps on how to overcome the cyber bullying. These precautions must be taken as soon as possible because it may affect an individual’s self confidence and self esteem.
Part 1 of 4: Know What to Look For
1. Look for signs of harassment through emails, instant messages, text messages or other modes of electronic communication.
a) Harassment is taking place if the bully is directly contacting someone who create an unpleasant or hostile situation for especially by uninvited and unwelcome verbal or physical conduct
b) Hateful or threatening verbal messages. This includes name-calling, attempt control someone's behavior by threatening to expose embarrassing information and/or threats of violence.
2. Look for signs of public humiliation or public embarrassment, rather than directly contacting him or her. Cyber bullies may use these public tactics:
a) Posting humiliating messages on a social media site, a blog, or another public
space.
b) Spreading rumors and gossip using social media, text messages and other tools.
c) Sharing pictures or videos that are embarrassing or explicit in nature, or are
altered with the intent to humiliate, on social media websites and through text
messaging.
d) Creating a website filled with defamatory images, insults, and rumors about the
target.
3. Look for signs of impersonation. A less obvious, but equally harmful form of cyber bullying takes place when the bully attacks someone by impersonating him or her as a way to bring about humiliation or punishment. In this case it is more difficult to identify the perpetrator.
a) In some cases the bully may create a screen name nearly identical to the screen
name used by someone else, then use that name to create embarrassing or
threatening situations for him or her.
b) The bully may steal the target's password, hack his or her accounts, and send
embarrassing messages to others or make expensive purchases.
Part 2 of 4: Take Immediate Action
1. Attempt to identify the cause. Have the conversation in person, not through email or text.
a) Keep in mind there may not always be a reason for cyber bullying, or one that
is straightforward. Sometimes people lash out on others because of their own
insecurities. In any case, it is not your fault.
b) If you don't know who the bully is, or if you're being bullied by a group of people,
attempting to talk it out probably won't work. You may need to take a stronger
action.
2. Stop responding to the bully's messages. If talking it out won't work, don't directly respond to the text messages, instant messages, emails or other communications you may have received from the bully. Bullies want to elicit a reaction from their targets, so firing back a text will only make things worse.
a) Don't threaten the bully to get back at him or her. Sending a threatening message
out of exasperation will only provoke the bully to keep up the bad behavior, and it
may get you in trouble, too.
3. Save the evidence. File away every email, text, instant message, web address, and other evidence you collect from the bully. Record the time and date that each message was sent. Having as much information as possible about the bully's behavior will help you determine how to stop his or her behavior.[4]
a) Block the bully. Immediately put an end to the bully's most invasive threats by
blocking that person from direct communication with you. Once you've made sure
all prior messages have been saved, take the following steps to protect yourself:
b) Delete the person from your email contacts and block instant messaging
communication.
c) Delete the person from your social networks and prevent them from getting in
contact with you again.
d) Block the person from your phone.
4. Change your account settings. Prevent the person from finding a new way to contact you by limiting the amount of personal information you make available online. Take the following measures to protect yourself:
a) Don't reveal your address, phone number and whereabouts online. Social media
sites make it easy for people to contact you in a lot of different ways, but they all
have privacy settings you can employ to keep certain people from bothering you.
Change your settings so that only close friends are able to contact you.
b) Consider changing your screen name and other online identification. If you've
been using the same screen name for years, the bully may be able to find a way
to continue harassing you by posing as someone else. Eliminate the possibility by
changing your screen name, as well as your profile picture and other information
that makes you easy to find online.
c) Create new accounts. If you fear someone else is impersonating you, it might be
necessary to create new accounts so that that person is no longer able to pretend
to be you. Notify your friends and family that you have a new email address,
social media page, and so on.
Part 3 of 4: Get Outside Help
1. Don't wait too long to ask for help. You might be tempted to let the bullying run its course instead of bringing attention to the problem, but if you do that the bully will get the message that there's no penalty for putting someone else in danger.
a) Don't assume the problem will go away on its own; speak up immediately to
put a stop to it.
b) If you're a child or teenager, ask an adult for help. Your parents, teachers,
principal and school counselor are all in a position to put a stop to the situation
before it goes any further.
c) If you're a parent, take the situation seriously and address it immediately.
2. Talk to your school administrators. Every school has a policy for dealing with bullying, and more and more schools have a specific plan for putting a stop to cyber bullying. Some states require this by law. No matter what your school's individual policy might be, it's the administrators' job to resolve the situation.
a) If you're a child or teenager, know that taking this issue to the school is the
right thing to do. Other kids at the school may be experiencing cyber bullying,
too; the school needs to be made aware of the problem to take steps to end it.
b) If you're a parent, set up a meeting with the school principal or dean to
address the problem head-on.
3. Report the bully to your service providers. Cyber bullying usually violates the terms of service laid out by social media sites, cell phone providers, and other service providers. Read up on your providers' policies and take steps to report threatening behavior.
a) You may have to send your records of the cyber bully's messages to the
provider as proof you are being bullied.
b) The provider may decide to penalize the person as a result of your report.
4. Get law enforcement involved. In some cases cyber bullying may be classified as a crime, which places it beyond the jurisdiction of schools and service providers. If the cyber bullying involves one of the following elements, call your local police department:
a) Stalking and use of intimidation.
b) Threats of violence or death.
c) Sexually explicit photos or descriptions of a minor, which is considered child
pornography.
d) Secretly-recorded photos or videos that were taken without the subject's
knowledge.
e) Hate-related communications or actions.
Part 4 of 4: Prevent Cyber Bullying
1. Never share information online if it could be used against you. Cyber bullies often use pictures, status updates, and personal information they find online to harass their targets. It's fine to share a little information about yourself online, but never reveal something you don't want the whole world to know.
a) Don't take an explicit photo of yourself to send to someone else, and never
let someone else take an explicit photo of you. You may be in love with your
significant other now, but if you break up, you won't have control over what
happens to those pictures. Many cases of cyber bullying involve former significant
others trying to get revenge on their exes by distributing explicit pictures.
b) Personal information sent through private emails, texts and instant messages
could land in the hands of a cyber bully. Try not to discuss embarrassing or
deeply personal information online. Even if you're only telling a friend, you never
know how the information might get out. It's best to discuss serious matters in
person.
2.Watch your tone when you communicate online. Sometimes online
communications can be misread by the recipient, leading to a conflict that
can escalate into a bullying situation. Be respectful to people with whom you communicate online to avoid making enemies. If a conflict develops, try to resolve it in person.
a) A good rule of thumb is to be as polite to someone online as you would be in
person.
b) Don't send messages when you're feeling angry or emotional. They are more
likely to be taken the wrong way by the recipient.
3. Don't participate in cyber bullying behavior. Even if all of your friends are doing it, cyber bullying is still wrong. People choosing to go along with the crowd in cases of cyber bullying is what makes these types of attacks so effective and damaging. Your behavior can influence other people's actions; make it clear that you don't stand for cyber bullying by setting a good example for others.
a) If your friends start teasing someone online or via text, don't participate. Ask
them to stop, and let them know that cyber bullying has the same dangerous
consequences as in-person bullying does.
b) Don't take photos or videos of someone else without their knowledge and
permission. It's against the law to secretly record someone else's behavior when
they believe no one is watching.
c) Even if you take photos or video of someone with their permission, don't distribute them unless the person agrees to it. Never distribute photos or videos that could be considered explicit, humiliating or could somehow be used against the person.
There are 4 steps on how to overcome the cyber bullying. These precautions must be taken as soon as possible because it may affect an individual’s self confidence and self esteem.
Part 1 of 4: Know What to Look For
1. Look for signs of harassment through emails, instant messages, text messages or other modes of electronic communication.
a) Harassment is taking place if the bully is directly contacting someone who create an unpleasant or hostile situation for especially by uninvited and unwelcome verbal or physical conduct
b) Hateful or threatening verbal messages. This includes name-calling, attempt control someone's behavior by threatening to expose embarrassing information and/or threats of violence.
2. Look for signs of public humiliation or public embarrassment, rather than directly contacting him or her. Cyber bullies may use these public tactics:
a) Posting humiliating messages on a social media site, a blog, or another public
space.
b) Spreading rumors and gossip using social media, text messages and other tools.
c) Sharing pictures or videos that are embarrassing or explicit in nature, or are
altered with the intent to humiliate, on social media websites and through text
messaging.
d) Creating a website filled with defamatory images, insults, and rumors about the
target.
3. Look for signs of impersonation. A less obvious, but equally harmful form of cyber bullying takes place when the bully attacks someone by impersonating him or her as a way to bring about humiliation or punishment. In this case it is more difficult to identify the perpetrator.
a) In some cases the bully may create a screen name nearly identical to the screen
name used by someone else, then use that name to create embarrassing or
threatening situations for him or her.
b) The bully may steal the target's password, hack his or her accounts, and send
embarrassing messages to others or make expensive purchases.
Part 2 of 4: Take Immediate Action
1. Attempt to identify the cause. Have the conversation in person, not through email or text.
a) Keep in mind there may not always be a reason for cyber bullying, or one that
is straightforward. Sometimes people lash out on others because of their own
insecurities. In any case, it is not your fault.
b) If you don't know who the bully is, or if you're being bullied by a group of people,
attempting to talk it out probably won't work. You may need to take a stronger
action.
2. Stop responding to the bully's messages. If talking it out won't work, don't directly respond to the text messages, instant messages, emails or other communications you may have received from the bully. Bullies want to elicit a reaction from their targets, so firing back a text will only make things worse.
a) Don't threaten the bully to get back at him or her. Sending a threatening message
out of exasperation will only provoke the bully to keep up the bad behavior, and it
may get you in trouble, too.
3. Save the evidence. File away every email, text, instant message, web address, and other evidence you collect from the bully. Record the time and date that each message was sent. Having as much information as possible about the bully's behavior will help you determine how to stop his or her behavior.[4]
a) Block the bully. Immediately put an end to the bully's most invasive threats by
blocking that person from direct communication with you. Once you've made sure
all prior messages have been saved, take the following steps to protect yourself:
b) Delete the person from your email contacts and block instant messaging
communication.
c) Delete the person from your social networks and prevent them from getting in
contact with you again.
d) Block the person from your phone.
4. Change your account settings. Prevent the person from finding a new way to contact you by limiting the amount of personal information you make available online. Take the following measures to protect yourself:
a) Don't reveal your address, phone number and whereabouts online. Social media
sites make it easy for people to contact you in a lot of different ways, but they all
have privacy settings you can employ to keep certain people from bothering you.
Change your settings so that only close friends are able to contact you.
b) Consider changing your screen name and other online identification. If you've
been using the same screen name for years, the bully may be able to find a way
to continue harassing you by posing as someone else. Eliminate the possibility by
changing your screen name, as well as your profile picture and other information
that makes you easy to find online.
c) Create new accounts. If you fear someone else is impersonating you, it might be
necessary to create new accounts so that that person is no longer able to pretend
to be you. Notify your friends and family that you have a new email address,
social media page, and so on.
Part 3 of 4: Get Outside Help
1. Don't wait too long to ask for help. You might be tempted to let the bullying run its course instead of bringing attention to the problem, but if you do that the bully will get the message that there's no penalty for putting someone else in danger.
a) Don't assume the problem will go away on its own; speak up immediately to
put a stop to it.
b) If you're a child or teenager, ask an adult for help. Your parents, teachers,
principal and school counselor are all in a position to put a stop to the situation
before it goes any further.
c) If you're a parent, take the situation seriously and address it immediately.
2. Talk to your school administrators. Every school has a policy for dealing with bullying, and more and more schools have a specific plan for putting a stop to cyber bullying. Some states require this by law. No matter what your school's individual policy might be, it's the administrators' job to resolve the situation.
a) If you're a child or teenager, know that taking this issue to the school is the
right thing to do. Other kids at the school may be experiencing cyber bullying,
too; the school needs to be made aware of the problem to take steps to end it.
b) If you're a parent, set up a meeting with the school principal or dean to
address the problem head-on.
3. Report the bully to your service providers. Cyber bullying usually violates the terms of service laid out by social media sites, cell phone providers, and other service providers. Read up on your providers' policies and take steps to report threatening behavior.
a) You may have to send your records of the cyber bully's messages to the
provider as proof you are being bullied.
b) The provider may decide to penalize the person as a result of your report.
4. Get law enforcement involved. In some cases cyber bullying may be classified as a crime, which places it beyond the jurisdiction of schools and service providers. If the cyber bullying involves one of the following elements, call your local police department:
a) Stalking and use of intimidation.
b) Threats of violence or death.
c) Sexually explicit photos or descriptions of a minor, which is considered child
pornography.
d) Secretly-recorded photos or videos that were taken without the subject's
knowledge.
e) Hate-related communications or actions.
Part 4 of 4: Prevent Cyber Bullying
1. Never share information online if it could be used against you. Cyber bullies often use pictures, status updates, and personal information they find online to harass their targets. It's fine to share a little information about yourself online, but never reveal something you don't want the whole world to know.
a) Don't take an explicit photo of yourself to send to someone else, and never
let someone else take an explicit photo of you. You may be in love with your
significant other now, but if you break up, you won't have control over what
happens to those pictures. Many cases of cyber bullying involve former significant
others trying to get revenge on their exes by distributing explicit pictures.
b) Personal information sent through private emails, texts and instant messages
could land in the hands of a cyber bully. Try not to discuss embarrassing or
deeply personal information online. Even if you're only telling a friend, you never
know how the information might get out. It's best to discuss serious matters in
person.
2.Watch your tone when you communicate online. Sometimes online
communications can be misread by the recipient, leading to a conflict that
can escalate into a bullying situation. Be respectful to people with whom you communicate online to avoid making enemies. If a conflict develops, try to resolve it in person.
a) A good rule of thumb is to be as polite to someone online as you would be in
person.
b) Don't send messages when you're feeling angry or emotional. They are more
likely to be taken the wrong way by the recipient.
3. Don't participate in cyber bullying behavior. Even if all of your friends are doing it, cyber bullying is still wrong. People choosing to go along with the crowd in cases of cyber bullying is what makes these types of attacks so effective and damaging. Your behavior can influence other people's actions; make it clear that you don't stand for cyber bullying by setting a good example for others.
a) If your friends start teasing someone online or via text, don't participate. Ask
them to stop, and let them know that cyber bullying has the same dangerous
consequences as in-person bullying does.
b) Don't take photos or videos of someone else without their knowledge and
permission. It's against the law to secretly record someone else's behavior when
they believe no one is watching.
c) Even if you take photos or video of someone with their permission, don't distribute them unless the person agrees to it. Never distribute photos or videos that could be considered explicit, humiliating or could somehow be used against the person.
Sources and Citations
1. http://www.ncpc.org/cyberbullying
2. http://www.stopcyberbullying.org/what_is_cyberbullying_exactly.html
3. http://www.stopcyberbullying.org/how_it_works/direct_attacks.html#im
4. http://www.safeteens.com/tips-to-stop-cyberbullying/
5. http://www.stopbullying.gov/cyberbullying/how-to-report/index.html
6. http://www.stopbullying.gov/cyberbullying/how-to-report/index.html
7. http://www.stopbullying.gov/cyberbullying/how-to-report/index.html
8. http://www.helpguide.org/mental/cyber-bullying.htm
1. http://www.ncpc.org/cyberbullying
2. http://www.stopcyberbullying.org/what_is_cyberbullying_exactly.html
3. http://www.stopcyberbullying.org/how_it_works/direct_attacks.html#im
4. http://www.safeteens.com/tips-to-stop-cyberbullying/
5. http://www.stopbullying.gov/cyberbullying/how-to-report/index.html
6. http://www.stopbullying.gov/cyberbullying/how-to-report/index.html
7. http://www.stopbullying.gov/cyberbullying/how-to-report/index.html
8. http://www.helpguide.org/mental/cyber-bullying.htm