3. There are many ways to bully someone other than just sending them a message.
4.
5. Instant messaging Sending threatening messages through IMâs or texting. Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone elseâs screen name and sending offensive messages Texting wars and death threats
6. Stealing passwords Studentâs may steal passwords and access otherâs accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out.
7. Blogs Blogs are used as online journals to write damaging thing about someoneâs reputation.
8. Web Sites Web sites are created to insult another student or a group of students. Students also post pictures and personal information about other students.
9. Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once.
10. Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer.
11. Impersonation When a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.
12. Prevention Understand that teasing, threats and taking over someoneâs identity are all forms of bullying. If this happens to you report the behaviors to an adult. Parents
13. Parents Tell you parents. Parents need to inform you school counselor of the cyberbullying. Parents need to tell your doctor. It may be necessary to have counseling until the problems are resolved. Netiquette
17. Instant messaging Sending threatening messages through IMâs or texting. Sending warning messages not to tell on them. Creating screen names that are 1 letter away from someone elseâs screen name and sending offensive messages Texting wars and death threats Go back to question
21. Stealing passwords Studentâs may steal passwords and access otherâs accounts to send offensive messages to anger them. Students may gain access to an account and then change the settings to lock them out. Go back to question
25. Web Sites Web sites are created to insult another student or a group of students. Students also post pictures and personal information about other students. Go back to question
29. Sending pictures through cell phones and email Sending degrading photos through e-mails; the emails can then be passed around to hundreds of emails within hours. New cell phones are now able to send photos and can be spread to an entire address book at once. Go back to question
33. Sending Malicious Code Student send viruses, spyware and hacking programs to other computers as a form of harassment. Some programs can even give the student access to a victims computer. Go back to question Impersonation When a student impersonates another students they usually do this in a chat room. The students reveals personal information that could include name, address and phone number. This could lead to an attack on the victim.