Browse Definitions :
Definition

cyberbullying

Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.

Cyberbullying is often done by children, who have increasingly early access to these technologies. The problem is compounded by the fact that a bully can hide behind a pseudonymous user name, disguising his or her true identity. This secrecy makes it difficult to trace the source and encourages bullies to behave more aggressively than they might in a situation where they were identified.

Cyberbullying can include such acts as making threats, sending provocative insults or racial or ethnic slurs, gay bashing, attempting to infect the victim's computer with a virus and flooding an e-mail inbox with messages. If you are a victim, you can deal with cyberbullying to some extent by limiting computer connection time, not responding to threatening or defamatory messages, and never opening e-mail messages from sources you do not recognize or from known sources of unwanted communications. More active measures include blacklisting or whitelisting e-mail accounts, changing e-mail addresses, changing ISPs, changing cell phone accounts and attempting to trace the source.

Because the use of mobile and online communications has grown so rapidly and the crime is relatively new, many jurisdictions are deliberating over cyberbullying laws. However, the crime is covered by existing laws against personal threats and harassment. In some cases, it may be advisable to inform the local police department or consult an attorney. It is not recommended that you retaliate in kind because such behavior can lead to heightened attacks, or even civil actions or criminal charges against you.

See Monica Lewinsky's TED talk about cyberbullying: The Price of Shame.

This was last updated in December 2015

Continue Reading About cyberbullying

Join the conversation

8 comments

Send me notifications when other members comment.

Please create a username to comment.

Wow! Very very helpful. Thank you.
Cancel
Good information!
Cancel
Wow, very helpful for my research paper. Thank you!
Cancel
Great with this information.
Cancel
I was bullied when I was in school in the late 70's. The problem is kids today have more means for doing this with methods that were not available back then.  I am shocked at the number of kids with access to cell phones today. There is no need for it really. How often are you calling your 10 year old and who is he calling ??. If a parent feels their child needs a phone, are they restricting it's use or giving in because of the peer pressure the child faces? Do they monitor what the child does? Do they monitor the internet use?   I don't think so...To me, parents are just using this as a babysitter to keep their kids occupied. 
Cancel
So helpful! :)
Cancel
You are an inspiration to me!! Thank you for the video!! You done an amazing job!
Cancel
Visit STOMP Out Bullying for help and resources
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close