0% found this document useful (0 votes)
158 views3 pages

Cyber Bulliying Scenarios and Preventions: Scenaroi #1

1) The document discusses different scenarios of cyberbullying including flaming, fraping, and cyberstalking and provides examples of each. 2) Prevention strategies for flaming include not responding to messages, saving messages to show trusted adults, and being wary of messages from unknown people. 3) For fraping, the document recommends setting passwords on devices and screensavers to prevent unauthorized access to accounts. 4) Cyberstalking involves threats of harm and can be a criminal offense, so the prevention tips include keeping software updated to avoid information leaks that could aid stalkers.

Uploaded by

accounts 3 life
Copyright
© Public Domain
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
158 views3 pages

Cyber Bulliying Scenarios and Preventions: Scenaroi #1

1) The document discusses different scenarios of cyberbullying including flaming, fraping, and cyberstalking and provides examples of each. 2) Prevention strategies for flaming include not responding to messages, saving messages to show trusted adults, and being wary of messages from unknown people. 3) For fraping, the document recommends setting passwords on devices and screensavers to prevent unauthorized access to accounts. 4) Cyberstalking involves threats of harm and can be a criminal offense, so the prevention tips include keeping software updated to avoid information leaks that could aid stalkers.

Uploaded by

accounts 3 life
Copyright
© Public Domain
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CYBER BULLIYING SCENARIOS AND PREVENTIONS 

SCENAROI #1 Flaming

Joanne was a freshman in high school when she had a fight with


one of her friends at a sleepover. After that, she received e-mails that
threatened her life. The cyberbully also constantly left rude and
threatening messages on her blog. This cyberbullying lasted for three
months. Joanne hated going on her computer and feared what she might
find when logging on to the Internet. She told her parents and her school
about the cyberbullying. The cyberbully finally stopped after the school
got involved

PREVENTION

This type of online bullying constitutes of posting about or directly


sending insults and profanity to their target. Flaming is similar to
trolling, but will usually be a more direct attack on a victim to incite
them into online fights

To prevent flaming, do not respond, save the messages so you can show a
trusted adult, and don't worry if the message is from someone you don't
know or recognize; there are ways to track the person do.
SCENARIO #2 FRAPPING

 Fifteen year-old Ghyslain was cyberbullied by millions of people when his


home movie was posted on the Internet. Ghyslain was a Star Wars fan; he
videotaped himself using a golf ball retriever as a light saber and making
his own sound effects. Some of his classmates found the video at school
and posted it online to make fun of him. Millions of people downloaded
the video and Ghyslain became known as “The Star Wars Kid.” His video
was even shown on several television shows. Ghyslain was so humiliated
by the video that he had to have counseling; he also transferred to
another school.

PREVENTION

Fraping is when a bully uses your child’s social networking accounts to


post inappropriate content with their name. It can be harmless when
friends write funny posts on each other’s profiles, but has potential to be
incredibly harmful. For example, a bully posting racial/homophobic slurs
through someone else’s profile to ruin their reputation.

To prevent Fraping Set up a password-ed screensaver on laptops and


desktops to prevent access if the machine is left unattended. Set up a
'standby' password for smartphones and tablets – where the device
requires a password or pin code for access if it is not used for more than a
few minutes.
SCENARIO #3 Cyberstalking

Chester, a tall, skinny teenager who excels in math and science classes,
feels embarrassed when he has to change into gym clothes in the boy’s
locker room at school because he lacks muscularity and size. Other, more
athletic, and well-built teens notice Chester’s shyness and decide to
exploit it. Using their phones, they covertly take pictures of Chester
without his shirt on and in his boxer shorts. These pictures are then
circulated among the rest of the student body via Instagram. Soon
enough, boys and girls are pointing, snickering, and laughing at Chester
as he walks down the school hallways. He overhears comments such as
“There goes Bird-Chested Chester,” “Big Wus,” and “Pansy.” These words
cut him deeply, and the perception that his classmates have of him begins
to affect his math and science grades

PREVENTION

Cyberstalking is a particularly serious form of cyberbullying that can


extend to threats of physical harm to the child being targeted. It can
include monitoring, false accusations, threats, and is often accompanied
by offline stalking. It is a criminal offense and can result in a restraining
order, probation, and even jail time for the perpetrator.

 Keep Your Software Updated

This stands on its own as a general rule of cybersecurity, but it is also


important if you don’t want to get cyberstalked easily. The software is
constantly being updated to prevent leaks of information and other
security threats, and these leaks might lead to your stalker getting more
personal information about you.

You might also like