By Tyanna Paling and Manpreet Gill Stop Cyberbullying By Tyanna Paling and Manpreet Gill
Anonymity Anonymity is when someone makes threatening comments to you, but is able to hide who they are. That it is difficult for you to try and figure out who is sending you threatening message or email. Anonymity also includes usage of Aliases or Pseunionyms. When someone else uses another persons phone you send you a message, email or text.
Pseudonyms Pseudonyms is like a nickname. Some bullies can call themselves a different name when there online. When you use instant messenger like MSN or Yahoo messaging, you’re a nickname to others online. Bullies may change their name to something offensive.
Flaming Flaming is a really intense argument, that regularly takes place in a chat rooms over instant messages. Flaming bullies use capital letters, images and symbols to add emotion to the argument. This is a real life example: “I was instant messaging my best friend, and we had an argument over a guy...The next day she printed the conversation and handed it to a group of girls, but she’d changed it. It read like I had said all these really mean things (about them) that I never said, and they believed her.” *Never reply to a bully when you are angry!.. Wait a bit.*
Masquerading Masquerading is a form of cyberbullying when the bully try's to pretend to be someone else when they aren’t. they create fake email addresses or messaging names, they might use another persons cell number to bully you. Example: “A 13-year-old gave her password to her best friend. After they had a fight, the ex-friend used the girls screen name to enter on an adult chat room and gave out the girl’s phone number. A man from the chat room called the girl’s house- but luckily intercepted by the mother.
Cyberstalking Cyberstalking is one of the forms of harassment. Messages are sent through personal communications like text or email message.
Outing Outing is a public display of personal communications like text messages. Some bullies print out or screen shot email or messaging conversations, also containing sexual or personal information. And will like to decide to send by text or show them to face friends or other people around them the conversation.
Harassment Harassment includes bullies sending offensive messages towards an individual or a group. Bullies send the same messages over and over again every hour of the day everyday. Example: “I’m going to kill you.” How would you feel if someone sends that to?
Exclusion Exclusion: A teenager who didn’t have a mobile phone are excluded from the other teenagers who do have a mobile phone. Girls are to be more likely to exclude others. Boys try to threaten physical violence. Example: “ an 11-year-old American, Natalie recalled in an newspaper interview how every girl in a class was invited but one to a recent sleepover. The girls at the party went on the internet that night and taunted the one who had been left out.”
How to stop cyberbullying Cyberbullying occurs when electronic communications such as text messages, emails, instant messages, and social media updates are used to threaten or humiliate someone. Its consequences can be just as serious as the effects of bullying that occurs in person.
3 ways to help stop cyberbullying…1 way Look for sings of harassments. Cyberbullying often takes the form of one person harassing another through emails, instant messaging, text messages or other modes of electronic communication. Hateful or threatening messages. This includes name-calling, attempts to control someone’s behavior by threatening to expose embarrassing information and or threats of violence. Embarrassing or threatening images. An unending barrage of emails, instant messages, or text, whether or not they are threatening in nature.
2 way… Look for signs of public humiliation. Another common form of cyberbullying happens when the bully harasses a target by the way of public embarrassment, rather than directly contacting them, cyber bullies may use these public tactics: Posting humiliating messages on a social media site, a blog, or another public space. Spreading rumors and gossip using social media, text messages and other tools. Sharing pictures that are embarrassing or explicit in nature, or are altered with the internet to humiliate, on social ,media websites and through text messaging.
3 way… Look for signs of impersonation. A less obvious, but equally harmful form of cyberbullying takes place wen the bully attacks someone by impersonating them as a way to bring about humiliation or punishment. In this case it is more difficult to identify the perpetrator. In some cases the bully may create a screen name nearly identical to the screen name used by someone, then use that name to create embarrassing or threatening situations for them. The bully may steal the target’s password, hack their accounts ,and send embarrassing message to others or make expensive purchases.