Browse Definitions :
Definition

cyberbullying

Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.

Cyberbullying is often done by children, who have increasingly early access to these technologies. The problem is compounded by the fact that a bully can hide behind a pseudonymous user name, disguising his or her true identity. This secrecy makes it difficult to trace the source and encourages bullies to behave more aggressively than they might in a situation where they were identified.

Cyberbullying can include such acts as making threats, sending provocative insults or racial or ethnic slurs, gay bashing, attempting to infect the victim's computer with a virus and flooding an e-mail inbox with messages. If you are a victim, you can deal with cyberbullying to some extent by limiting computer connection time, not responding to threatening or defamatory messages, and never opening e-mail messages from sources you do not recognize or from known sources of unwanted communications. More active measures include blacklisting or whitelisting e-mail accounts, changing e-mail addresses, changing ISPs, changing cell phone accounts and attempting to trace the source.

Because the use of mobile and online communications has grown so rapidly and the crime is relatively new, many jurisdictions are deliberating over cyberbullying laws. However, the crime is covered by existing laws against personal threats and harassment. In some cases, it may be advisable to inform the local police department or consult an attorney. It is not recommended that you retaliate in kind because such behavior can lead to heightened attacks, or even civil actions or criminal charges against you.

See Monica Lewinsky's TED talk about cyberbullying: The Price of Shame.

This was last updated in December 2015

Continue Reading About cyberbullying

Join the conversation

8 comments

Send me notifications when other members comment.

Please create a username to comment.

Wow! Very very helpful. Thank you.
Cancel
Good information!
Cancel
Wow, very helpful for my research paper. Thank you!
Cancel
Great with this information.
Cancel
I was bullied when I was in school in the late 70's. The problem is kids today have more means for doing this with methods that were not available back then.  I am shocked at the number of kids with access to cell phones today. There is no need for it really. How often are you calling your 10 year old and who is he calling ??. If a parent feels their child needs a phone, are they restricting it's use or giving in because of the peer pressure the child faces? Do they monitor what the child does? Do they monitor the internet use?   I don't think so...To me, parents are just using this as a babysitter to keep their kids occupied. 
Cancel
So helpful! :)
Cancel
You are an inspiration to me!! Thank you for the video!! You done an amazing job!
Cancel
Visit STOMP Out Bullying for help and resources
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating ...

  • van Eck phreaking

    Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by...

  • zero-trust model (zero trust network)

    The zero trust model is a security model used by IT professionals that requires strict identity and device verification ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • solid-state storage

    Solid-state storage (SSS) is a type of computer storage media made from silicon microchips. SSS stores data electronically ...

  • persistent storage

    Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes ...

  • computational storage

    Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to ...

Close