Recent stories may stick in your head of cyber-bullying. Such as the mom on Myspace who bullied a young girl into killing herself. But in reality you have probably seen it a million times and never reported it.
Lately in the mom blogging community there has been one particular instance that has blown up forums, twitter, facebook and blogs around the nation. In recent weeks a “Mom Blogger” had posted a few photos on her site and not only started off the bashing, but encouraged others to join it. These photos were of random people in an airport, 2 happen to be teenagers. The one with the most comments was a 15 year old, who was called fat, & overweight. (The specified post has now been removed)
Although there is a freedom of speech act, there are many boundaries this went past. One would be the defamation of character, and Second, i am sure would be distributing photos of a minor (since they were used in a wrong way.) Some of you may ask why this is such a big deal. Consider this your child. Would you want someone posting pictures of your daughter on their site to be made fun of ? This is a prime example of Cyber -Bullying.
What is Cyberbullying?
Cyberbullying is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor. Once adults become involved, it is plain and simple cyberharassment or cyberstalking. Adult cyberharassment or cyberstalking is NEVER called cyberbullying.
Direct cyber bullying includes all of cyber stalking’s modes, and then some: (from Officer.com)
- Instant or text messaging harassment. Bullies use these tools the same way they’d use e-mail – to threaten or say hurtful things.
- Password stealing. With the victim’s password, a bully can impersonate the victim, change profile information to include personal or inflammatory language, or use the password to hack the victim’s account.
- Blogs and Web sites. Blogs are free online diaries. They can stand alone or be linked to a Web site. In both cases, a bully might post disparaging information about a victim, or start a blog or site impersonating the victim.
- Digital pictures. Teens may use their phones to take pictures of other teens in the locker room or shower, then e-mail the pictures to friends or even post them online.
- Internet polling. Bullies participate in insulting or degrading polls about a classmate’s physical characteristics or sexual experience.
Another form, cyber bullying by proxy, is more troublesome than direct cyber bullying, because bullies involve people who don’t know what they are getting into. In most cases, cyber bullying by proxy makes it look as if the victim has started trouble, most often when a bully impersonates the victim. The victim’s friends may become angry and shun him; the victim’s parents may punish him; or a bully may even notify the ISP that the victim is a bully, so the ISP takes action against the victim.
One of the most dangerous forms of cyber bullying by proxy involves the bully either pretending to be the victim, or posting the victim’s personal information, in chatrooms and bulletin boards that pedophiles or hate groups frequent. Advertising the victim for sex, or portraying the victim as a racist, can put the victim in significant physical danger.
Who are the bullies?
StopCyberBullying.org identifies four main types of bullies. These bullies are not like “traditional” playground bullies. Moreover, no one group or “type” is more at risk than another to become either a bully or a victim.
- “Vengeful angels” typically cyber bully teens who have been bullying them or their friends.
- “Revenge of the nerds” cyber bullies are similar to vengeful angels, though they bully more to have power over others with whom they normally have no power. Unlike vengeful angels, they need others to know what they’re up to.
- “Mean girls” get together in a group to cyber bully, often for entertainment. Attention feeds their egos (and thus their behavior).
- “Inadvertent” cyber bullies either don’t know they are doing wrong when they respond to an upsetting message or intend to be “playful” and don’t understand that others could take it seriously.
STOP BULLYING NOW
STUDENT VIOLENCE IN AMERICA’S SCHOOLS – A NEW YORK TIMES ISSUE IN DEPTH
VIOLENCE PREVENTION RESOURCES
WHAT’S WRONG WITH BULLYING?
BULLYING MYTHS – TRUE/FALSE QUIZ
OPERATION RESPECT: DON’T LAUGH AT ME
OUT ON A LIMB – A GUIDE TO GETTING ALONG
SCHOOL VIOLENCE RESOURCE CENTER
THE SCHOOL VIOLENCE WATCH NETWORK
YOUTH VIOLENCE THEME PAGE
Ning Network- Bloggers United
Petition For Removal Of CyberBullying
To report a website or blog you think may be harrasing anyone, please use these:
FTC (Federal Trade Commission)
FBI in connection to the Internet Crime Complaint Center
Specifically For Child Harassment Awareness or Danger:
By the time you finish reading this, 15 children will have been abused; In the next five minutes, 30 more; Within the next hour, 360 more; And by tonight, close to 8,000+ children will have suffered from abuse, 5 of which will die. Child abuse has increased 134% since 1980 and is now considered a worldwide epidemic. The high jump in child abuse deaths and the shocking increase in statistics highlights the frightening lack of public knowledge.
Educate Yourself -- Learn the Facts
It May Just Save a Child's Life!!