Browse Definitions :
Definition

cyberbullying

Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.

Cyberbullying is often done by children, who have increasingly early access to these technologies. The problem is compounded by the fact that a bully can hide behind a pseudonymous user name, disguising his or her true identity. This secrecy makes it difficult to trace the source and encourages bullies to behave more aggressively than they might in a situation where they were identified.

Cyberbullying can include such acts as making threats, sending provocative insults or racial or ethnic slurs, gay bashing, attempting to infect the victim's computer with a virus and flooding an e-mail inbox with messages. If you are a victim, you can deal with cyberbullying to some extent by limiting computer connection time, not responding to threatening or defamatory messages, and never opening e-mail messages from sources you do not recognize or from known sources of unwanted communications. More active measures include blacklisting or whitelisting e-mail accounts, changing e-mail addresses, changing ISPs, changing cell phone accounts and attempting to trace the source.

Because the use of mobile and online communications has grown so rapidly and the crime is relatively new, many jurisdictions are deliberating over cyberbullying laws. However, the crime is covered by existing laws against personal threats and harassment. In some cases, it may be advisable to inform the local police department or consult an attorney. It is not recommended that you retaliate in kind because such behavior can lead to heightened attacks, or even civil actions or criminal charges against you.

See Monica Lewinsky's TED talk about cyberbullying: The Price of Shame.

This was last updated in December 2015

Continue Reading About cyberbullying

Join the conversation

10 comments

Send me notifications when other members comment.

Please create a username to comment.

Wow! Very very helpful. Thank you.
Cancel
Good information!
Cancel
Wow, very helpful for my research paper. Thank you!
Cancel
Great with this information.
Cancel
I was bullied when I was in school in the late 70's. The problem is kids today have more means for doing this with methods that were not available back then.  I am shocked at the number of kids with access to cell phones today. There is no need for it really. How often are you calling your 10 year old and who is he calling ??. If a parent feels their child needs a phone, are they restricting it's use or giving in because of the peer pressure the child faces? Do they monitor what the child does? Do they monitor the internet use?   I don't think so...To me, parents are just using this as a babysitter to keep their kids occupied. 
Cancel
So helpful! :)
Cancel
You are an inspiration to me!! Thank you for the video!! You done an amazing job!
Cancel
Visit STOMP Out Bullying for help and resources
Cancel
cannot use it. without date published
Cancel
The publication date for definitions is at the bottom -- look under the video and you will see the last date this definition was updated.
Cancel

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

Close