Google Find us on Google+

Michael Nuccitelli, Psy.D. | 2014 Cyberbullying Examples



PASSWORD THEFT  AND LOCKOUT-CYBERBULLYING TACTIC-IPREDATOR .

CYBERBULLYING TACTIC: PASSWORD THEFT & LOCKOUT

15. Password Theft & Lockout: A cyberbully steals the target child’s password and begins to chat with other people, pretending to be the target child (a.k.a. Impersonation.) Confident that others think he/she is the target child, they begin to communicate provocative and adversarial messages that are offensive and anger the target child’s friends or strangers. In addition to impersonating the target child, the cyberbully locks out the target child from his/her accounts by changing his/her password. Without having access to his/her username or email account, the target child is unable to close or prove he/she is not the culprit spreading the vitriolic information.

WEB PAGE ASSASSINATION-CYBERBULLYING TACTIC-IPREDATOR

CYBERBULLYING TACTIC: WEB PAGE ASSASSINATION

16. Web Page Assassination: This is a tactic whereby the cyberbully creates websites that insult or endanger the target child. The cyberbully creates, designs, and posts web pages specifically designed to insult the target child, their peers or groups of people who share similar characteristics as the target child such as their race, religion or sexual orientation. Although website creation has become an easy task with contemporary information technology software, many cyberbullies have acquired skills enabling them to create websites that are both appealing to viewers, but presenting the target child in a negative light.

VOTING AND POLLING BOOTH DEGRADATION-CYBERBULLYING TACTIC-IPREDATOR

CYBERBULLYING TACTIC: VOTING & POLLING BOOTH DEGRADATION

17. Voting & Polling Booth Degradation: Some websites offer online users the opportunity to create online polling/voting booths that are free of charge and easy to post. Cyberbullies use these websites to create web pages that allow others to vote online for categories that are deemed highly embarrassing by the target child. Examples of voting and polling include the ugliest, fattest, dumbest, most sexually promiscuous and a plethora of other deprecating attributes. The primary purpose of this cyberbullying tactic is to encourage group consensus by encouraging peers to engage in disparaging the target child.

BASH BOARDS-CYBERBULLYING TACTIC-IPREDATOR

CYBERBULLYING TACTIC: BASH BOARDS

18. Bash Boards: Bash Boards are online bulletin boards where children post anything they choose and frequented by both the cyberbully and target child’s peer groups and school acquaintances. At these online bulletin boards, negative and deprecating information is posted by the cyberbully about the target child that is public for all to read and is shared with others. Generally, bash boards encourage postings that are mean, hateful, malicious and embarrassing.

HOODWINKING-CYBERBULLYING TACTIC-IPREDATOR

CYBERBULLYING TACTIC: HOODWINKING

19. Hoodwinking (aka, Trickery): Hoodwinking is a tactic similar to phishing in that a cyberbully purposely tricks a target child into divulging secrets, private information, and/or embarrassing information about themselves and then publishes that information online. Like phishing, Trickery requires the target child to have some element of trust or respect for the cyberbully by agreeing to post sensitive information about them thinking the cyberbully’s rationale will be beneficial and/or positive. With this tactic, the target child is led to believe the sensitive information they consensually give the cyberbully will somehow be presented in a positive light.

HAPPY SLAPPING-CYBERBULLYING TACTIC-IPREDATOR

CYBERBULLYING TACTIC: HAPPY SLAPPING

20. Happy Slapping: Happy Slapping is a relatively new type of cyberbullying that integrates the rapid growth of video online and classic bullying. This occurs when a target child or unsuspecting victim is physically attacked or embarrassed in person and an accomplice video records or takes pictures of the incident. The image or video is then posted online at video and social networking sites for public consumption. With the widespread growth of mobile device technology, Happy Slapping is a cyberbullying tactic likely to grow.

TEXT WARS AND ATTACKS-CYBERBULLYING TACTIC-IPREDATOR

CYBERBULLYING TACTIC: TEXT WARS AND ATTACKS

21. Text Wars and Text Attacks: Text Wars and Text Attacks are cyberbullying tactics when the cyberbully and a group of his/her accomplices’ gang up on the target child by sending hundreds of emails or text messages. Besides the emotional toll it can take on the target child, their cell phone charges may escalate causing parental admonishment. Text Wars and Text Attacks are cyberbullying tactics that encourage other children to engage in harmful behaviors against the target child.

home-button-education-news-information-age-news-education-views-ipredator-image

1st-page-button-education-news-information-age-news-education-views-ipredator-image

Print Friendly, PDF & Email
Advertisements
Tweet about this on TwitterShare on Google+Share on FacebookPin on PinterestShare on LinkedInShare on TumblrShare on StumbleUponPrint this pageEmail this to someone

Pages: 1 2 3 4 5 6 7 8

UA-24036587-1
%d bloggers like this: