Friday, August 27, 2010

Dealing With Cyber Bullying

(Students)
-Stop Don’t respond to the bully. Victims often want to befriend the bully to solve the problem or even worse they want to retaliate. Responding to the cyberbully only escalates the problem, and in turn, the victim becomes part of the problem.



-Block Block the cyberbully or limit all communications to those you can trust. This is especially effective with bullying in chat rooms, Instant messaging, and email. Most electronic communication programs allow users to block specific screen names or email addresses. With social networking sites it may be necessary to delete the child's current account and open a new one that limits access to trusted friends. In some cases, it may be necessary for the victim to stay off the computer for a short period of time to remove themselves as the target of the attack.


-Tell Tell a trusted adult. The messages posted by the cyberbully are often vulgar or embarrassing. Victims often keep the bullying a secret for this reason. Also, kids are afraid that the adult will overreact and remove the source of the problem - the computer or cell phone -- or react in an irrational manner. Encourage children to tell someone if they are harassed or threatened online or if someone they know is bullied. Reassure the child that you will not overreact if they discuss a cyberbullying experience with you.

(Parents)
If your child is bullied online:



-Do not erase the evidence


-Contact your Internet provider, the social networking site, or cell phone company and file a complaint


-Contact the child’s school if the bullying is school-related


-Contact local law enforcement if your child has been threatened or if a crime has been committed.


-Report cyberbullying to the CyberTipline.


If the cyberbully makes statements which place the victim in reasonable fear for his or her physical safety or if the cyberbully continues to threaten or harass the victim, despite warnings, notify law enforcement.






A cyberbully can be traced. Each time the Internet is accessed, an IP (Internet Protocol) address, a type of electronic fingerprint, is established. This IP address can be used by the authorities to trace all electronic communications between computers and/or mobile phones.





No comments:

Post a Comment