6 types of cyberbullying
Ambassador
Created on June 15, 2019
Over 30 million people build interactive content in Genially.
Check out what others have designed:
Transcript
6 Types of Cyberbullying
Harassing Someone
Using Photographs
Participating in Video Shaming
Impersonating Someone
Creating Websites, Blogs, Polls, and More
Engaging in Subtweeting or Vaguebooking
- Using text messaging, instant messaging and email to harass, threaten or embarrass the target.
- Posting rumors, threats or embarrassing information on social networking sites such as Facebook, Twitter, and Instagram.
- Engaging in “warning wars.” (Many Internet Service Providers and social media sites offer a way to report a user who is saying something inappropriate. Kids use these report buttons as a way to get the victim in trouble or kicked offline.)
- Participating in text wars or text attacks, which occur when bullies gang up on the victim and send thousands of texts. These attacks not only cause emotional distress but create a large cell phone bill.
- Developing a screen name that is similar to the victim’s screen name and then posting rude or hurtful remarks while pretending to be the victim.
- Stealing the victim’s password and chatting with other people while pretending to be the victim. The bully will say mean things that offend and anger the victim’s friends or acquaintances.
- Changing the target’s online profile to include sexual, racist or other inappropriate things.
- Setting up an account on a social networking site and posting as the victim while saying mean, hurtful or offensive things online. Actual photos of the victim may be used to make the account look authentic.
- Posing as the victim and posting in chat rooms of known child molesters, hate groups or dating sites. The bully may even provide the victim’s personal information encouraging those in the groups to contact the victim.
- Pretending to be someone else in order to lure an unsuspecting person into a fake relationship. This type of activity is often called catfishing.
- Taking nude or degrading pictures of the victim in a locker room, a bathroom or dressing room without his or her permission.
- Threatening to share embarrassing photos as a way of controlling or blackmailing the victim.
- Sending mass emails or text messages that include nude or degrading photos of the victim. This behavior is often called "sexting" and once the photos are sent, there is no way to control it. The photos can be distributed to hundreds of people within just a few hours.
- Posting nude pictures on photo sharing sites for anyone on the Internet to view and download.
- Using photographs to shame someone online. One common tactic teens use is to engage in slut shaming. This behavior involves shaming someone, usually a girl, for the way she dresses, acts or the number of people she has dated.
- Developing a website with information that is humiliating, embarrassing or insulting for the victim.
- Spreading rumors, lies or gossip about the victim online through websites or blogs.
- Posting the victim’s personal information and pictures on a website, which puts the victim in danger of being contacted by predators.
- Creating a blog about the victim that is embarrassing, insulting or humiliating.
- Using the information that was shared in confidence and making it public.
- Conducting an Internet poll about the victim. Questions in the poll may vary including everything from who is ugly and who smells to who is dumb and who is fat.
- Posting rude, mean or insulting comments about the victim via the chat option of online gaming sites.
- Sending viruses, spyware or hacking programs to the victim in order to spy on the victim or control his or her computer remotely.
- Using a camera phone to video and later share a bullying incident, which may include one or more kids slapping, hitting, kicking or punching the victim.
- Downloading a video of something humiliating and posting it to YouTube in order to allow a larger audience to view the incident.
- Sharing a video via mass e-mail or text messaging to humiliate and embarrass the victim.
- Creating an incident that causes another person to become upset or emotional and then record the incident. This type of activity is often referred to as cyberbaiting. Teachers are a common target for cyberbaiting incidents.
- Posting tweets or Facebook posts that never mention the victim's name. Yet the victim, the bully and often a larger audience know who the posts are referencing.
- Using subtle posts and tweets to fuel the rumor mill while avoiding detection by teachers, administrators, and parents.