Browse Definitions :
Definition

cyberbullying

Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.

Cyberbullying is often done by children, who have increasingly early access to these technologies. The problem is compounded by the fact that a bully can hide behind a pseudonymous user name, disguising his or her true identity. This secrecy makes it difficult to trace the source and encourages bullies to behave more aggressively than they might in a situation where they were identified.

Cyberbullying can include such acts as making threats, sending provocative insults or racial or ethnic slurs, gay bashing, attempting to infect the victim's computer with a virus and flooding an e-mail inbox with messages. If you are a victim, you can deal with cyberbullying to some extent by limiting computer connection time, not responding to threatening or defamatory messages, and never opening e-mail messages from sources you do not recognize or from known sources of unwanted communications. More active measures include blacklisting or whitelisting e-mail accounts, changing e-mail addresses, changing ISPs, changing cell phone accounts and attempting to trace the source.

Because the use of mobile and online communications has grown so rapidly and the crime is relatively new, many jurisdictions are deliberating over cyberbullying laws. However, the crime is covered by existing laws against personal threats and harassment. In some cases, it may be advisable to inform the local police department or consult an attorney. It is not recommended that you retaliate in kind because such behavior can lead to heightened attacks, or even civil actions or criminal charges against you.

See Monica Lewinsky's TED talk about cyberbullying: The Price of Shame.

This was last updated in December 2015

Continue Reading About cyberbullying

Join the conversation

7 comments

Send me notifications when other members comment.

Please create a username to comment.

Wow! Very very helpful. Thank you.
Cancel
Good information!
Cancel
Wow, very helpful for my research paper. Thank you!
Cancel
Great with this information.
Cancel
I was bullied when I was in school in the late 70's. The problem is kids today have more means for doing this with methods that were not available back then.  I am shocked at the number of kids with access to cell phones today. There is no need for it really. How often are you calling your 10 year old and who is he calling ??. If a parent feels their child needs a phone, are they restricting it's use or giving in because of the peer pressure the child faces? Do they monitor what the child does? Do they monitor the internet use?   I don't think so...To me, parents are just using this as a babysitter to keep their kids occupied. 
Cancel
So helpful! :)
Cancel
You are an inspiration to me!! Thank you for the video!! You done an amazing job!
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • certificate authority (CA)

    A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically...

  • hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and ...

SearchHealthIT

  • Cerner Corp.

    Cerner Corp. is a public company in North Kansas City, Mo., that provides various health information technologies, ranging from ...

  • clinical decision support system (CDSS)

    A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and ...

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

SearchDisasterRecovery

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

SearchStorage

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • cache (computing)

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

  • mebibyte (MiB)

    A mebibyte (MiB) is a unit of measurement used in computer data storage.

Close