Google Find us on Google+

Michael Nuccitelli, Psy.D. | 2014 Cyberbullying Examples



MALICIOUS CODE DISSEMINATION-CYBERBULLYING TACTIC-IPREDATOR

CYBERBULLYING TACTIC: MALICIOUS CODE DISSEMINATION

22. Malicious Code Dissemination: Sending malicious code is a cyberbullying tactic whereby malicious information is sent intentionally to a target child to damage or harm their ICT. Many cyberbullies will send viruses, spyware and hacking programs to a target child that can be very costly to repair. The act of sending malicious code as a cyberbullying tactic is usually reserved for children and adolescents advanced in ICT. As Information Age children become more adept with information technology, the tactic of sending malicious codes will become more frequent in the cyberbullies arsenal of online assaults.

WARNING WARS-CYBERBULLYING TACTIC-IPREDATOR

CYBERBULLYING TACTIC: WARNING WARS

23. Warning Wars: Internet Service Providers (ISP) offers a way for consumers to report an online user who is posting inappropriate or abusive information. As a tactic used in cyberbullying and harassment, children engage in “warning wars” by making false allegations to the ISP regarding the target child posting inappropriate information. By doing this frequently enough, often times the target child has their profile and/or account suspended by the ISP. Concurrent with this tactic, the cyberbully informs the target child’s parents causing additional admonishment.

SCREEN NAME MIRRORING-CYBERBULLYING TACTIC-IPREDATOR

CYBERBULLYING TACTIC: SCREEN NAME MIRRORING

24. Screen Name Mirroring: Screen Name Mirroring is a cyberbullying tactic used against a target child by constructing a screen name or user name that is very similar to the target child’s name. The name may have additional or removed letters, numbers or combinations of the two to appear the same as the target child’s screen name. With Screen Name Mirroring, the cyberbully uses screen names and user names almost identical to the target child’s requiring the respondent of the information to be attentive in differentiating the minor differences.

CYBER DRAMA-CYBERBULLYING TACTIC-IPREDATOR

CYBERBULLYING TACTIC: CYBER DRAMA

25. Cyber Drama: Cyber Drama is a cyberbullying tactic that is a lot more common than extreme cases of cyberbullying. Cyber Drama tends to be gossip that was not supposed to be shared on a blog or a “flame war” that ends after a few messages. Most child and adolescent online users are perceptive about telling each other to refrain and will block a user or open a new account when necessary. Some children engaged in Cyber Drama can be psychologically affected due to their negative perception of the information being disseminated. Cyber Drama is best described as a passive aggressive form of cyberbullying.

SEXTING-CYBERBULLYING TACTIC-IPREDATOR

CYBERBULLYING TACTIC: SEXTING

26. Sexting: Sexting is the slang term for the use of a cell phone or other Information and Communications Technologies to distribute images or videos of a sexually explicit nature. It can also refer to text messages of a sexually charged theme. Sexting is both a sexually oriented form of communication and a cyberbullying tactic. As a cyberbullying tactic, the cyberbully creates and/or disseminates sexually themed information about the target child that is both highly embarrassing and humiliating.

PSEUDONYM STEALTH-CYBERBULLYING TACTIC-IPREDATOR

CYBERBULLYING TACTIC: PSEUDONYM STEALTH

27. Pseudonym Stealth: A pseudonym is a nickname cyberbullies use when they are online as opposed to when offline. They do this to keep their real identity a secret from the target child. When using instant messaging services like MSN Messenger or Yahoo Messenger, an online user has a nickname they have chosen. Cyberbullies use this same feature to change their name to something that a target child would not expect. Having a nickname, then the cyberbully proceeds to taunt, tease and humiliate the target child without the ability of the target child to know their identity.

INSTANT MESSAGING ATTACKS-CYBERBULLYING TACTIC-IPREDATOR

CYBERBULLYING TACTIC: INSTANT MESSAGING ATTACKS

28. Instant Messaging Attacks: Instant Messaging is a type of communications service that enables online users to create a private chat room with another individual. Cyberbullies use IM to send harassing and threatening messages to the target child themed with disparaging information. IM has become a very large part of the social lives of child and adolescent online users. The conversations and conflicts that arise online often give rise to behaviors that are acted out in person during school or at the local shopping mall.

home-button-education-news-information-age-news-education-views-ipredator-image

 

1st-page-button-education-news-information-age-news-education-views-ipredator-image

Print Friendly, PDF & Email
Advertisements
Tweet about this on TwitterShare on Google+Share on FacebookPin on PinterestShare on LinkedInShare on TumblrShare on StumbleUponPrint this pageEmail this to someone

Pages: 1 2 3 4 5 6 7 8

UA-24036587-1
%d bloggers like this: