CYBER BULLIYING SCENARIOS AND PREVENTIONS
SCENAROI #1 Flaming
Joanne was a freshman in high school when she had a fight with
one of her friends at a sleepover. After that, she received e-mails that
threatened her life. The cyberbully also constantly left rude and
threatening messages on her blog. This cyberbullying lasted for three
months. Joanne hated going on her computer and feared what she might
find when logging on to the Internet. She told her parents and her school
about the cyberbullying. The cyberbully finally stopped after the school
got involved
PREVENTION
This type of online bullying constitutes of posting about or directly
sending insults and profanity to their target. Flaming is similar to
trolling, but will usually be a more direct attack on a victim to incite
them into online fights
To prevent flaming, do not respond, save the messages so you can show a
trusted adult, and don't worry if the message is from someone you don't
know or recognize; there are ways to track the person do.
SCENARIO #2 FRAPPING
Fifteen year-old Ghyslain was cyberbullied by millions of people when his
home movie was posted on the Internet. Ghyslain was a Star Wars fan; he
videotaped himself using a golf ball retriever as a light saber and making
his own sound effects. Some of his classmates found the video at school
and posted it online to make fun of him. Millions of people downloaded
the video and Ghyslain became known as “The Star Wars Kid.” His video
was even shown on several television shows. Ghyslain was so humiliated
by the video that he had to have counseling; he also transferred to
another school.
PREVENTION
Fraping is when a bully uses your child’s social networking accounts to
post inappropriate content with their name. It can be harmless when
friends write funny posts on each other’s profiles, but has potential to be
incredibly harmful. For example, a bully posting racial/homophobic slurs
through someone else’s profile to ruin their reputation.
To prevent Fraping Set up a password-ed screensaver on laptops and
desktops to prevent access if the machine is left unattended. Set up a
'standby' password for smartphones and tablets – where the device
requires a password or pin code for access if it is not used for more than a
few minutes.
SCENARIO #3 Cyberstalking
Chester, a tall, skinny teenager who excels in math and science classes,
feels embarrassed when he has to change into gym clothes in the boy’s
locker room at school because he lacks muscularity and size. Other, more
athletic, and well-built teens notice Chester’s shyness and decide to
exploit it. Using their phones, they covertly take pictures of Chester
without his shirt on and in his boxer shorts. These pictures are then
circulated among the rest of the student body via Instagram. Soon
enough, boys and girls are pointing, snickering, and laughing at Chester
as he walks down the school hallways. He overhears comments such as
“There goes Bird-Chested Chester,” “Big Wus,” and “Pansy.” These words
cut him deeply, and the perception that his classmates have of him begins
to affect his math and science grades
PREVENTION
Cyberstalking is a particularly serious form of cyberbullying that can
extend to threats of physical harm to the child being targeted. It can
include monitoring, false accusations, threats, and is often accompanied
by offline stalking. It is a criminal offense and can result in a restraining
order, probation, and even jail time for the perpetrator.
Keep Your Software Updated
This stands on its own as a general rule of cybersecurity, but it is also
important if you don’t want to get cyberstalked easily. The software is
constantly being updated to prevent leaks of information and other
security threats, and these leaks might lead to your stalker getting more
personal information about you.