What is Cyberbullying/Bullying?

9 min read

Deviation Actions

wwwarea's avatar
By
Published:
3.4K Views
Online-market-research by wwwarea

Face it, research will always matter over opinions involving how the world works.
It is time to let the truth out once more, based off careful research, law research, etc.
Sadly, I did make one mistake recently with the word 'Defame', as it must apply 'false' statement involving people legally. However, using subjective opinions such as "gross", "sick", etc, etc, can be false as subjective personal opinions are not facts.
Oh well, like I said, nobody is perfect. You can learn from your own mistakes!
And again, calling people "bullies" for standing up for yourself can possibly count as 'false information'. The term however, may still be a mixed.. I do believe damaging someone's reputation can possibly still happen even if something is true, as to the sense of the words..

I will also underline the info from my own research to what I may think I've seen involving me or other people around random parts of the Internet.
Due to some issues, I cannot underline some stuff due to a mix of links underlined and such. Haha
Note: Some underlining isn't done by me.

Turning on Anti-bias. *Click*


bul·ly1

verb
gerund or present participle: bullying
use superior strength or influence to intimidate (someone), typically to force him or her to do what one wants.
"a local man was bullied into helping them"
synonyms:persecute, oppress, tyrannize, browbeat, harass, torment, intimidate, strong-arm, dominate; More

cy·ber·bul·ly·ing

noun
noun: cyberbullying
  1. the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
    "children may be reluctant to admit to being the victims of cyberbullying"
It is best to use the term 'cyberbullying' more as it takes place in the digital world.

The Law

www.stopbullying.gov/cyberbull…
Cyberbullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites.
Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.
Some people seem to view that cyberbullying only apply to kids. However, it's also said that it can apply to adults too.
cyberbullying.us/advice-for-ad…
nobullying.com/adult-cyber-bul…

So back to it's meaning, this is one of the interesting researches I found from yet, other Law/Legal sources:
definitions.uslegal.com/c/cybe…

Other Info and Examples

www.commonsensemedia.org/cyber…
-Video somewhere-

nobullying.com/cyberbullying-e…
  • Cyber stalking – cyber stalking can be described as the sending of messages to frighten or threaten someone. The person receiving these messages begins to worry about their safety and general well being.
  • Degradation/humiliation bullies will use cyber bullying to spread rumours and hearsay with the purpose of damaging the victim’s reputation to ensure that they are shunned.
  • Harassing harassing is the sending of insulting, threatening and harassing messages via the internet or cell phones. These messages are however sent persistently and tirelessly.
  • Impersonating – impersonation is the act of taking on an identity that is false for the purpose of tormenting a person and damaging their reputation. Impersonation can also be acted out by pretending to be the victim also by creating a false identity or profile.
  • Flamingthis is a very hostile and rude form of abuse where the bully uses vulgar and abusive language with the intention of starting a fight with the victim.
  • Text messaging – most bullies will use text messaging to torment another teenager or pre-teen. They do this by enlisting the help of other bullies and together they keep sending endless text messages to their victim’s phone. The purpose of all this is to run up the victim’s phone bill which will eventually get them into serious trouble.
  • Password theft – some bullies will do everything possible to gain the passwords of a teenager illegally. After gaining these passwords, the bully enters the victim’s sites and locks them out. In some cases, the bully will use these sites to bully others.
  • Web site creating – bullies will create websites and pages and load them with images, statements and insulting remarks for the sole purpose of tormenting and humiliating a person.
  • Use of Photos and images bullies will post embarrassing photos of their victims all over the internet to torment and humiliate them. In most cases, these photos and images are fake and just altered to portray the victim. We all have  heard of stories where teenagers have been tricked into sending their naked photos to a stranger they met online only for the stranger to post them all over the internet just to humiliate and torture the victim emotionally.
  • PC attacks – this is the sending of Trojan horses, viruses, worms, spyware and so on to another person’s computer. With our youth becoming more knowledgeable on computer technology, pc attacks have become extremely easy to employ.
  • Proxy attacks – bullies who prefer this kind of bullying usually enlist the help of their fellow bullies and friends to humiliate and cause emotional damage to others. Proxy attacks are where the bully with the help of someone else will install a proxy into the computer of the victim. By doing this, the bully will be able to access even the most confidential information of the victim through the proxy which will transmit it to him or her. The bully will then use this information to humiliate or threaten the victim.

---

www.understood.org/en/friends-…

  • Sending a mean email or IM to someone
  • Posting mean things about someone on a website
  • Making fun of someone in an online chat
  • Doing mean things to someone’s character in an online world
  • Creating a hostile environment in an online world or game
  • Impersonating someone online—including creating a fake online profile
  • Repeatedly texting someone to the point of harassment
  • Directly threatening or intimidating someone online or in a text
  • Starting rumors or spreading gossip online
  • Stealing someone’s password and logging into someone else’s account
  • Taking a photo or video and sharing it without the subject’s consent, knowing it might be embarrassing

---



---
www.meganmeierfoundation.org/c…
Stuff too much to copy for me.
---
www.ncpc.org/topics/cyberbully…
  • Sending someone mean or threatening emails, instant messages, or text messages
  • Excluding someone from an instant messenger buddy list or blocking their email for no reason
  • Tricking someone into revealing personal or embarrassing information and sending it to others
  • Breaking into someone's email or instant message account to send cruel or untrue messages while posing as that person
  • Creating websites to make fun of another person such as a classmate or teacher
  • Using websites to rate peers as prettiest, ugliest, etc

---

en.wikipedia.org/wiki/Cyberbul…

Legal definition


Cyberbullying is defined in legal glossaries as

  • actions that use information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm another or others.
  • use of communication technologies for the intention of harming another person
  • use of internet service and mobile technologies such as web pages and discussion groups as well as instant messaging or SMS text messaging with the intention of harming another person.

Examples of what constitutes cyberbullying include communications that seek to intimidate, control, manipulate, put down, falsely discredit, or humiliate the recipient. The actions are deliberate, repeated, and hostile behavior intended to harm another. Cyberbullying has been defined by The National Crime Prevention Council: “When the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person."[5][6]

A cyberbully may be a person whom the target knows or an online stranger. A cyberbully may be anonymous and may solicit involvement of other people online who do not even know the target. This is known as a "digital pile-on."[7]

Cyberbullying has been defined as "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person".[8] Other researchers use similar language to describe the phenomenon.[9][10]

---
www.ipredator.co/cyberbullying…
---


__________________________

Well that's "all". I mean, there is many more out there too.
Some of the links may contain same examples. Each 'link and/or info' is separated by "---".

Sadly, though, it could probably be blurry. But I do believe bashing someone online for liking water can be cyberbullying.
Sometimes I used 'bully' only for the sake of similar things, though, it's really cyberbullying due to it taking place in the cyber world. Haha

Other Examples of Cyberbullying and Involving Me


AN EXACT COPY UPLOADED BY ANOTHER USER: [link]

^^Slander, mock, ridicule, etc. On both of them.
Call outs or not (Which is complete biases, and whining), those purposes are still valid, which still doesn't change the fact that it's a hate video, and for the purpose of cyberbullying.
Here is an explanation that destroys almost all slander I think:
The Right to Self Defence - The Truth? by wwwarea
Before certain people say anything:
<da:thumb id="483904067"/>
No, this one ISN'T mine, but I wanted to spread the truth again.
Comments19
Join the community to add your comment. Already a deviant? Log In
CutePastelStars's avatar
What if you've gone to dA several times about the same person because they won't cut their cyberbullying out, and they just give you the regular copy and paste "oh just block them" excuse, even though you've had them blocked on all of their account for a while?