{"id":1827,"date":"2019-03-24T11:57:57","date_gmt":"2019-03-24T17:57:57","guid":{"rendered":"https:\/\/billbelsey.com\/?p=1827"},"modified":"2019-03-24T11:58:29","modified_gmt":"2019-03-24T17:58:29","slug":"cyberbullying-an-emerging-threat-to-the-always-on-generation","status":"publish","type":"post","link":"https:\/\/billbelsey.com\/?p=1827","title":{"rendered":"Cyberbullying: An Emerging Threat to the \u201cAlways On\u201d Generation"},"content":{"rendered":"<ul class=\"wpfai-list\"><li class=\"wpfai-list-item facebook\">\r\n      <a href=\"http:\/\/www.facebook.com\/sharer.php?u=http%3A%2F%2Fbillbelsey.com%2Findex.php%3Frest_route%3D%252Fwp%252Fv2%252Fposts%252F1827&amp;t=\" title=\"Facebook\" class=\"wpfai-facebook wpfai-link wpfainw\">\r\n        <span class=\"fa-stack \">\r\n          \r\n          <i class=\"fa fa-facebook fa-stack-1x \"><\/i>\r\n        <\/span>\r\n      <\/a>\r\n    <\/li><li class=\"wpfai-list-item twitter\">\r\n      <a href=\"http:\/\/twitter.com\/share?text=&url=http%3A%2F%2Fbillbelsey.com%2Findex.php%3Frest_route%3D%252Fwp%252Fv2%252Fposts%252F1827\" title=\"Twitter\" class=\"wpfai-twitter wpfai-link wpfainw\">\r\n        <span class=\"fa-stack \">\r\n          \r\n          <i class=\"fa fa-twitter fa-stack-1x \"><\/i>\r\n        <\/span>\r\n      <\/a>\r\n    <\/li><li class=\"wpfai-list-item google-plus\">\r\n      <a href=\"https:\/\/plus.google.com\/share?url=http%3A%2F%2Fbillbelsey.com%2Findex.php%3Frest_route%3D%252Fwp%252Fv2%252Fposts%252F1827\" title=\"Google Plus\" class=\"wpfai-google-plus wpfai-link wpfainw\">\r\n        <span class=\"fa-stack \">\r\n          \r\n          <i class=\"fa fa-google-plus fa-stack-1x \"><\/i>\r\n        <\/span>\r\n      <\/a>\r\n    <\/li><li class=\"wpfai-list-item pinterest\">\r\n      <a href=\"http:\/\/pinterest.com\/pin\/create\/button\/?url=http%3A%2F%2Fbillbelsey.com%2Findex.php%3Frest_route%3D%252Fwp%252Fv2%252Fposts%252F1827&amp;description=&amp;media=\" title=\"Pinterest\" class=\"wpfai-pinterest wpfai-link wpfainw\">\r\n        <span class=\"fa-stack \">\r\n          \r\n          <i class=\"fa fa-pinterest fa-stack-1x \"><\/i>\r\n        <\/span>\r\n      <\/a>\r\n    <\/li><li class=\"wpfai-list-item linkedin\">\r\n      <a href=\"http:\/\/linkedin.com\/shareArticle?mini=true&amp;url=http%3A%2F%2Fbillbelsey.com%2Findex.php%3Frest_route%3D%252Fwp%252Fv2%252Fposts%252F1827&amp;title=\" title=\"Linked In\" class=\"wpfai-linkedin wpfai-link wpfainw\">\r\n        <span class=\"fa-stack \">\r\n          \r\n          <i class=\"fa fa-linkedin fa-stack-1x \"><\/i>\r\n        <\/span>\r\n      <\/a>\r\n    <\/li><li class=\"wpfai-list-item tumblr\">\r\n      <a href=\"http:\/\/www.tumblr.com\/share\/link?url=http%3A%2F%2Fbillbelsey.com%2Findex.php%3Frest_route%3D%252Fwp%252Fv2%252Fposts%252F1827&amp;name=&amp;description=\" title=\"Tumblr\" class=\"wpfai-tumblr wpfai-link wpfainw\">\r\n        <span class=\"fa-stack \">\r\n          \r\n          <i class=\"fa fa-tumblr fa-stack-1x \"><\/i>\r\n        <\/span>\r\n      <\/a>\r\n    <\/li><li class=\"wpfai-list-item stumbleupon\">\r\n      <a href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fbillbelsey.com%2Findex.php%3Frest_route%3D%252Fwp%252Fv2%252Fposts%252F1827\" title=\"Stumble Upon\" class=\"wpfai-stumbleupon wpfai-link wpfainw\">\r\n        <span class=\"fa-stack \">\r\n          \r\n          <i class=\"fa fa-stumbleupon fa-stack-1x \"><\/i>\r\n        <\/span>\r\n      <\/a>\r\n    <\/li><li class=\"wpfai-list-item envelope\">\r\n      <a href=\"mailto:?subject=&amp;body=http%3A%2F%2Fbillbelsey.com%2Findex.php%3Frest_route%3D%252Fwp%252Fv2%252Fposts%252F1827%20-%20\" title=\"E-Mail\" class=\"wpfai-envelope wpfai-link wpfainw\">\r\n        <span class=\"fa-stack \">\r\n          \r\n          <i class=\"fa fa-envelope fa-stack-1x \"><\/i>\r\n        <\/span>\r\n      <\/a>\r\n    <\/li><li class=\"wpfai-list-item bullseye\">\r\n      <a href=\"http:\/\/www.specificfeeds.com\/follow\" title=\"Specific Feeds\" class=\"wpfai-bullseye wpfai-link wpfainw\">\r\n        <span class=\"fa-stack \">\r\n          \r\n          <i class=\"fa fa-bullseye fa-stack-1x \"><\/i>\r\n        <\/span>\r\n      <\/a>\r\n    <\/li><\/ul>\n<h2 class=\"wp-block-heading\">Cyberbullying: An Emerging Threat to the \u201cAlways On\u201d Generation <\/h2>\n\n\n\n<p>By Bill Belsey, President and Founder\nof Bullying.org<\/p>\n\n\n\n<p>April 20<sup>th<\/sup>, 1999 was a day\nthat changed my life. It began like many other days, but somewhere along the\nway, an emotional tsunami flooded my consciousness as news emerged of a school\nshooting at Columbine High School in Middleton, Colorado. Eight days later, a\ncopycat shooting took place at a high school in rural Alberta. This was clearly\nnot a \u201cBig-city\u201d problem or an \u201cAmerican\u201d problem; it was everyone\u2019s problem,\nas a Canadian parent and educator, it was also MY problem.<\/p>\n\n\n\n<p>It became apparent soon afterwards\nthat the young people who committed these heinous acts were relentlessly\nbullied and teased throughout their young lives.<\/p>\n\n\n\n<p>In response to these deeply disturbing\ntragedies, I created a Web site, <strong><a href=\"http:\/\/www.bullying.org\/\">www.bullying.org<\/a><\/strong>.&nbsp; I decided that the Web site would have three\ngoals; first, to help people, especially\nyoung people, learn that they are NOT alone in dealing with bullying in their\nlives, to help them realize that being bullied is NOT their fault and that they\nCAN do something positive about it.<\/p>\n\n\n\n<p><strong><a href=\"http:\/\/www.bullying.org\/\">www.bullying.org<\/a><\/strong> allows people to connect in a safe, moderated\nonline community where they can share their stories, poetry, drawings, music,\nanimations and videos. A team of volunteer reviewers moderates replies and the\noriginal submissions. Visitors to the Web site can also use the worlds\u2019 largest\nonline database of helpful resources on <strong><a href=\"http:\/\/www.bullying.org\/\">www.bullying.org<\/a><\/strong> to find\ninformation about bullying.<\/p>\n\n\n\n<p><strong><a href=\"http:\/\/www.bullying.org\/\">www.bullying.org<\/a><\/strong>\nbegan to quickly create quite a buzz online through \u201cword-of-mouth\u201d referrals,\nas it was successfully filling a tremendous need for information and support.\nThen, on May 21, 2001, I was fortunate enough to do an interview with CBC\nNational Television News anchor Peter Mansbridge during which Mr. Mansbridge\nwas generous enough to refer to <strong><a href=\"http:\/\/www.bullying.org\/\">www.bullying.org<\/a><\/strong>\nas \u201cOne of the best Web sites in the world for young people\u201d, that night, <strong><a href=\"http:\/\/www.bullying.org\/\">www.bullying.org<\/a><\/strong> was\npropelled to another level.<\/p>\n\n\n\n<p>The\nnational non-profit educational organization, Bullying.org Canada was created\nshortly thereafter to help support and expand our national vision.<\/p>\n\n\n\n<p><strong><a href=\"http:\/\/www.bullying.org\/\">www.bullying.org<\/a><\/strong> has since received as many as three quarters of a million visitors and\ncontributors from across Canada and around the world in one month and is listed\nas one of the top &#8220;bullying&#8221; referenced Web sites in the world by\nwww.google.com and many other Internet search engines. <strong><a href=\"http:\/\/www.bullying.org\/\">www.bullying.org<\/a><\/strong>\nhas since been chosen for the ChildNet International Award which goes to\nprojects that make the Internet a better place for youth, as well as being a\nfinalist in the Stockholm Challenge Award which has been called the Nobel Prize\nof the IT (Information Technology) world.<\/p>\n\n\n\n<p>Shortly after <strong><a href=\"http:\/\/www.bullying.org\/\">www.bullying.org<\/a><\/strong>\u2018s launch, I\nrealized that something new was being experienced and reported by young people\naround the world. In response, I created <strong><a href=\"http:\/\/www.cyberbullying.ca\/\">www.cyberbullying.ca<\/a><\/strong>, the\nworld&#8217;s first Web site specifically dedicated to the emerging issue of\ncyberbullying. <strong><a href=\"http:\/\/www.cyberbullying.ca\/\">www.cyberbullying.ca<\/a><\/strong> has\noften been cited as the first to use this word and define this emerging behaviour.<strong><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">&nbsp;<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\">FIRST SOME CONTEXT<\/h2>\n\n\n\n<p><strong>Young Canadians are more connected than ever<\/strong>\n<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Access is almost\n     universal. Ninety-four percent of young people say they go online from\n     home, compared with 79 percent in 2001. Sixty-one percent report having\n     high-speed access. *<\/li><li>Many students\n     report that they have their own Internet connection. In total, 37 percent\n     have their own Internet-connected computer. Twenty percent of Grade 4\n     students access the Internet through their own personal computer. That\n     number climbs to 51 percent by Grade 11. *<\/li><li>Points\n     of access include more than computers. Twenty-three percent of students\n     report having their own cell phone, 44 percent of which have Internet\n     capability. Fifty-six percent of students\u2019 cell phones have text messaging\n     and 17 percent have cameras. *<\/li><li>Twenty-two\n     percent of students have their own Webcam. In Grade 11 that number is 31\n     percent. *<\/li><li>A\n2002 British survey found that one in four youth, aged 11 to 19 has been\nthreatened via their computers or cell phones, including death threats. -NCH\n-National Children&#8217;s Home (UK)<\/li><\/ul>\n\n\n\n<p>*\n<em>Young Canadians in a Wired World<\/em> \u2013 Phase II<br>\nConducted by ERIN Research for\nthe Media Awareness Network and funded by the Government of Canada<strong><\/strong><\/p>\n\n\n\n<p>Adults\nsee the Internet as a resource or a \u201cplace that they can go to\u201d to serve their\nneeds. Young people don\u2019t think of it as being separate from their lives,\nincreasingly it is a normal and \u201cnatural\u201d part of their world.<\/p>\n\n\n\n<p>For\nthis \u201cAlways On\u201d generation, being connected to one\u2019s peer group means being\nonline often. Increasingly it means being online synchronously, in \u201creal time\u201d\nor at the very same time as your peers. Most of the time these connections are\nmade via \u201cI-M\u201d or Instant Messaging. I-M is facilitated through programs such\nas ICQ, AOL, MSN, or Yahoo! Messenger systems as it is instantaneous, and\ne-mail is now considered \u201ctoo slow\u201d for many young people today.<\/p>\n\n\n\n<p>Adults\ntend to relate to the use of various Information and Communication Technologies\n(ICTs) in quite functional ways. We do our work, send our e-mails and the like\nand then we are done for the most part. But for the \u201cAlways On\u201d generation, the\nuse of ICTs has become a digital umbilical chord to their peer group. Among the\nA-O generation, responses are not only expected, they are expected promptly, to\ndo so otherwise is considered a real social faux-pas.<\/p>\n\n\n\n<p>If\nyou are thinking that I-M-ing is some \u201cTween or teen-fad\u201d that will eventually\ngo away, to illustrate how mainstream this has become, it might interest you to\nlearn that I-M is growing at a rate 30% faster than e-mail did at its\ninception.<\/p>\n\n\n\n<p>The\nmobile phone is to today\u2019s kids what the Nike \u201cAir Jordan\u201d sneaker was to\nprevious generations to young people. The mobile has become the new\nprototypical \u201cTeen badge\u201d social status item. It is personalized with coloured\nfaceplates, personalized ringtones, still and video cameras and more.<\/p>\n\n\n\n<p>It\nused to be that school and home were the places where kids went online and\nadults had some control over when and where they went online, but no more.\nYoung people can now chat via I-M, send text and multimedia messages with still\nand video images, surf the Web and chat online, all from the palm of their hand\nfrom almost anywhere, because today\u2019s mobile phones are really powerful, very\nportable multimedia computers.<\/p>\n\n\n\n<p>The ubiquitous nature of Internet\nconnectivity poses real problems for young people today, and for we adults who\ncare about our kids. One of the very real threats to our kids in this fluid,\nmobile communications environment is cyberbullying.<\/p>\n\n\n\n<p><strong>WHAT IS\nCYBERBULLYING?<\/strong><\/p>\n\n\n\n<p><em>&#8220;Cyberbullying involves the use of information and\ncommunication technologies to support deliberate, repeated, and hostile\nbehaviour by an individual or group, that is intended to harm others.&#8221;<\/em> <\/p>\n\n\n\n<p>\u2013Bill Belsey<\/p>\n\n\n\n<p>What Forms Does Cyberbullying Take?<\/p>\n\n\n\n<p>Cyberbullying can\nhappen through the use of e-mail, cell phone text&nbsp; (SMS) and multimedia messages (MMS), instant\nmessaging (IM), defamatory Web logs (Blogs), personal Web sites, and online\npersonal polling sites.<\/p>\n\n\n\n<p><strong>What is a\nWeblog?<\/strong><\/p>\n\n\n\n<p>\u201c A personal Web site that provides updated headlines and news articles\nof other sites that are of interest to the user, also may include journal\nentries, commentaries and recommendations compiled by the user; also written\nweb log. Weblog; also called blog.\u201d <\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211; Dictionary.com (<a href=\"http:\/\/dictionary.reference.com\/search?q=weblog\">http:\/\/dictionary.reference.com\/search?q=weblog<\/a>)<\/p>\n\n\n\n<p><strong>How is\ncyberbullying different from other forms of bullying?<\/strong><\/p>\n\n\n\n<p>Cyberbullying,\nlike other forms of bullying, is about human relationships, power and control.\nThose who bully others are trying to establish power and control over others\nthat they perceive to be \u201cweaker\u201d than them. Those who bully want to make\nvictims feel that there is something wrong with them, but victims should know\nthat there is NOTHING wrong with THEM. It is THE BULLIES who have the real\nproblems.<\/p>\n\n\n\n<p>Cyberbullying\nis different from other forms of bullying in a number of ways. While bullying\nis something that is often under the radar screen of adults, cyberbullying is\neven more so as today\u2019s youth, a group that I have dubbed the \u201cAlways On\u201d\ngeneration, feel it most often and most intensely.&nbsp; This generation is increasingly communicating\nin ways that are often unknown by adults and away from their supervision.<\/p>\n\n\n\n<p>Cyberbullying\nis also different in that it is a particularly cowardly form of bullying.\nCyberbullies can more easily hide behind the anonymity that the Internet can\nprovide. <\/p>\n\n\n\n<p>Cyberbullies\ncan communicate their hurtful messages to a very wide audience with remarkable\nspeed.<\/p>\n\n\n\n<p>Cyberbullying\ndoes not provide any tangible feedback about the consequences of using\ninformation technologies to cyberbully others. Cyberbullies do not have to own\ntheir actions, as it is usually very difficult to identify cyberbullies, so\nthey do not fear being punished for their actions.<\/p>\n\n\n\n<p>Cyberbullying\nis often outside of the legal reach of schools and school boards as this\nbehaviour often happens outside of school on home computers or via mobile\nphones.<\/p>\n\n\n\n<p>Victims\nof bullying are often fearful of telling others about being bullied because\nthey fear that the bullying may actually become worse if they tell. Victims of\ncyberbullying are often also afraid to report to adults about being\ncyberbullied, as they also fear that adults will over-react and take away their\nmobile phone, computer and\/or Internet access. This is something that is\nincreasingly unthinkable for the \u201cAlways On\u201d generation as not being online\nmeans not being able to socialize or communicate with their peers, and this\nfear of exclusion is paramount in the lives of most adolescents and teens.<\/p>\n\n\n\n<p>In\nmost cases, cyberbullies know their victims, but their victims may not know\ntheir cyberbullies, the aggressors may or may not bully their victims through\nphysical, verbal, emotional or psychological means that are more easily\nidentified.<\/p>\n\n\n\n<p>With\nthe advent of mobile, wireless Internet access, communications have become more\nubiquitous. As a result, Cyberbullying can happen any time and any place and\nfor many children, home is no linger a refuge from negative peer pressure such\nas bullying.<\/p>\n\n\n\n<p><strong>CYBERBULLYING\nAND THE LAW<\/strong><\/p>\n\n\n\n<p>Some\nforms of cyberbullying are considered criminal acts. Under the Criminal Code of\nCanada, it is a crime to communicate repeatedly with someone if your\ncommunication causes them to fear for their own safety or the safety of others.<\/p>\n\n\n\n<p>It\nis also a crime to publish a \u201cdefamatory libel\u201d, writing something that is\ndesigned to insult a person or likely to hurt a person\u2019s reputation by exposing\nhim or her to hatred, contempt or ridicule.<\/p>\n\n\n\n<p>A\ncyberbully may also be violating the Canadian Human Rights Act, if he or she\nspreads hate or discrimination based on race, national or ethnic origin,\ncolour, religion, age, sex, sexual orientation, marital status, family status\nor disability.<\/p>\n\n\n\n<p><strong>WHAT CAN BE\nDONE ABOUT CYBERBULLYING?<\/strong><\/p>\n\n\n\n<p><strong><br>\nAwareness and education are the keys to the prevention of cyberbullying!<\/strong><\/p>\n\n\n\n<p>Spend some\ntime on the <strong><a href=\"http:\/\/www.cyberbullying.org\/\">www.cyberbullying.org<\/a>\n<\/strong>Web site learning what you can do about cyberbullying. It is often a very\nhurtful, difficult and time-consuming challenge to deal with the effects of\ncyberbullying after it has occurred. It can take a lot of time and effort to\nget Internet Service Providers (ISPs) and Mobile Telecommunications Service\nProviders (the phone companies who sell you your cell phone and pagers) to\nrespond and deal with your complaints about being cyberbullied.<\/p>\n\n\n\n<p><strong>An ounce of\nprevention, a word of advice for \u201cNetizens\u201d (citizens of the Internet, advice\nfor youth AND adults)\u2026<\/strong><\/p>\n\n\n\n<p><strong>Students\nshould be reminded regularly to never give out or share personal information\nnumbers (PIN), etc<\/strong>. Personal information includes their names, the names of friends or\nfamily, their address, phone number, school name (or team name if students play\nsports). Personal info also includes pictures of themselves and their e-mail\naddresses. They should ask permission before sharing any information with a\nwebsite, a &#8220;chat buddy&#8221; and even when registering a product purchased\nfor their computer (like a game). Passwords are secret. They should never tell\nanyone their password except their teachers, or perhaps their parents or\nguardians.<\/p>\n\n\n\n<p><strong>Don\u2019t\nbelieve everything you read<\/strong> Just because someone online tells young people that they are 15\ndoesn&#8217;t mean they are telling the truth. Even adults can&#8217;t tell when a male\npretends to be a female or a 50 year old pretends to be a 15 year old.<\/p>\n\n\n\n<p><strong>Use\nNetiquette<\/strong> <strong>(Internet etiquette).<\/strong> Students should\nbe reminded to be polite to others online just as they would offline. If\nsomeone treats them rudely or meanly &#8211; do not respond. Online bullies are just\nlike offline ones &#8211; they WANT others to answer (don&#8217;t give them the\nsatisfaction). DON\u2019T WRITE ALL IN CAPITALS!!! This is considered \u201cyelling\u201d on\nthe Internet and is very rude. It may encourage others to \u201cFLAME\u201d them. Flaming\nis the sending of repeated, aggressive messages to others.<\/p>\n\n\n\n<p><strong>Students\nshould never send a message to others when they are angry<\/strong> Wait until you have had time to calm down and\nthink. Do your best to make sure that your messages are calmly and factually\nwritten. You will usually regret sending a &#8220;Flame&#8221; (angry message) to\nsomeone else. Once you&#8217;ve sent a message, it is VERY hard to undo the damage\nthat such &#8220;flames&#8221; can do.<\/p>\n\n\n\n<p><strong>Students\nshould never open a message from someone you don\u2019t know <\/strong>If in doubt about it, they should ask their\nteachers, parents, guardians or another adult.<\/p>\n\n\n\n<p><strong>If students\nencounter something online that doesn\u2019t look or \u201cfeel right\u201d, it probably\nisn\u2019t. <\/strong>Students\nneed to learn to trust their instincts.While surfing the Internet, if\nthey find something that they don&#8217;t like, makes them feel uncomfortable or\nscares them, they should turn off the computer and tell an adult. Internet\nfilters can only go so far. After working with students, teachers and\ntechnology for many years, I truly believe that the only truly effective filter\nwe should spend time and energy on is the one between the ears of our young\npeople. For every filter that schools in school boards put in place, there are\nmany ways around each and every one of them. In fact, there are many Web sites\nthat have been created to show people (read kids) how to get around them.<\/p>\n\n\n\n<p><strong>Young\npeople don\u2019t have to be \u201cAlways on\u201d. <\/strong>They should be encouraged to turn off, disconnect,\nand unplug, at least for a while. They should be encouraged to give themselves\na break. Encourage young people not to stay online or connected too long.\nFamilies need to work at spending time with their family and friends offline.\nWhy not try a little less virtual reality and a lot more actual reality!<\/p>\n\n\n\n<p><strong>Sign on the\ndotted line. <\/strong>Parents and\nguardians should be strongly encouraged to create an Internet Acceptable Use\nAgreement with their children. Bullying.org Canada has examples of such\ncontracts for families to consider using. It should be made clear the Internet\naccess and use is a privilege to be earned and honoured, not assumed right.<\/p>\n\n\n\n<p><strong>Update your\nAUPs\u2026 ASAP! <\/strong>Schools and\nschool boards should update their computer and Internet Acceptable Use Policies\n(AUPs) to include harassment done with mobile and wireless Internet information\ntechnologies. Schools and school boards should work with their local parent\ncouncils to include the idea that members of the school community are\nresponsible their online behaviour and actions away from the school every bit\nas much as they need to be responsible and accountable for their actions and\nbehaviours There should be clear and serious consequences for anyone who\ndoesn\u2019t follow the AUP that should be signed by both students and parents. The\nupdated AUP should specifically prohibit the use of ICTs for cyberbullying.<\/p>\n\n\n\n<p><strong>IF YOU ARE\nA VICTIM OF A CYBERBULLY, WHAT CAN YOU AND YOUR PARENTS DO?<\/strong><\/p>\n\n\n\n<p>Do not keep this to yourself! You are NOT alone! Tell an adult you know\nand trust! It is\nvery hard to solve such problems on your own.<\/p>\n\n\n\n<p><strong>Inform your\nInternet, Instant Messaging or mobile phone service provider<\/strong><\/p>\n\n\n\n<p>Such as MSN for\ninstant messaging: http:\/\/ca.support.sympatico.msn.com\/contactus.aspx?productkey=messenger<\/p>\n\n\n\n<p><strong>Inform your\nlocal police<\/strong><\/p>\n\n\n\n<p><strong>Do not\nreply to messages from cyberbullies! <\/strong>&nbsp;Even though\nyou may really want to, this is exactly what cyberbullies want. They want to\nknow that they&#8217;ve got you worried and upset. They are trying to mess with your\nmind and control you, to put fear into you. Don&#8217;t give them that pleasure.<\/p>\n\n\n\n<p><strong>Do not\nerase or delete messages from cyberbullies <\/strong>You don&#8217;t have to read it, but keep it, it is your\nevidence. Unfortunately you may get similar messages again, perhaps from other\naccounts. The police and your ISP, and\/or your telephone company can use these\nmessages to help you. You might notice certain words or phrases that are also\nused by people you know. These messages may reveal certain clues as to who is\ndoing this to you, but don&#8217;t try and solve this on your own. Tell an adult you\nknow and trust. GET HELP!<\/p>\n\n\n\n<p><strong>WHAT KIND\nOF INFORMATION SHOULD BE SAVED?<\/strong><\/p>\n\n\n\n<p><br>\nTo report cyberbullying, it&#8217;s really important to save as much info as you can.\nThe more you have saved, the easier it will be to track down the people\nbothering you. <br>\n<br>\n<strong>Save the following from\nE-mail:<\/strong> <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>E-mail address <\/li><li>Date and time received <\/li><li>Copies of any relevant e-mails with full\n     e-mail headers <\/li><\/ul>\n\n\n\n<p><strong>Save the following from Groups or communities<\/strong><strong>:<\/strong> <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>URL of offending MSN Group site <\/li><li>Nickname of offending person <\/li><li>E-mail address of offending person <\/li><li>Date you saw it happen <\/li><\/ul>\n\n\n\n<p><strong>Save the following from Profiles you see on\nthe web:<\/strong><strong> <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>URL of Profile <\/li><li>Nickname of offending person <\/li><li>E-mail address of offending person <\/li><li>Date you viewed this Profile <\/li><\/ul>\n\n\n\n<p><strong>Save the following from Chatrooms:<\/strong><strong> <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Date and time of chat <\/li><li>Name and URL of chat room you were in <\/li><li>Nickname of offending person <\/li><li>E-mail address of offending person <\/li><li>Screenshot of chatroom<strong><\/strong><\/li><\/ul>\n\n\n\n<p><strong>REPORT CYBERBULLYING E-MAIL<\/strong> <br>\n<br>\nIf you receive e-mail from cyberbullies, you can report it to your ISP with the\nfull headers displayed. The full header shows every stage of an e-mail&#8217;s\njourney. Forwarding e-mail with the full header displayed will let the support\nteam track down where it came from.<br>\n<br>\n<\/p>\n\n\n\n<p><strong>WHAT TO DO IF SOMEBODY HAS STOLEN YOUR ACCOUNT<\/strong><br>\n<br>\nIf somebody has stolen or &#8220;hacked&#8221; your account and changed all the\nlogin details, you will need to get in touch with a support team to get it\nback. <br>\n<br>\n<br>\n<\/p>\n\n\n\n<p><strong>HOW DO I REPORT CHATROOM CYBERBULLYING?<\/strong> <br>\n<br>\nYou don&#8217;t have to put up with abuse in chat, and the companies that run\nchatrooms don&#8217;t want abusive people using their service. <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Highlight the chatter&#8217;s name <\/li><li>Use the ignore button to stop all\n     conversation with that person <\/li><li>Take a screenshot of the abuse <\/li><li>Note the time, date and chatroom name <\/li><li>Report to the chatroom moderator and service\n     operator <\/li><li>Speak to a parent or a teacher <\/li><\/ul>\n\n\n\n<p><strong>Students should know that it isn&#8217;t their\nfault<\/strong> that\nthere are some very strange people in the world. <strong>Students should not be ashamed<\/strong>\nto tell somebody about any disturbing, threatening, weird or frightening\nbehaviour you encounter in chat. <\/p>\n\n\n\n<p>People aren&#8217;t anonymous online, and with the right info saved, they can be traced by the Police and\ndealt with.<strong><\/strong><\/p>\n\n\n\n<p><strong>PROTECT\nYOURSELF<\/strong><\/p>\n\n\n\n<p>Never arrange to meet with someone you have\nmet online unless your parents go with you. If you are meeting them make\nsure it is in a public place.<\/p>\n\n\n\n<p>Young people may need to delete your\ncurrent e-mail accounts, cell phone\/pager accounts and set up new ones.&nbsp; If they have persistent cyberbullying\nproblems, it is recommend that they do this as soon as possible, unless they\nare working with the police and their Telecommunications Provider to keep the\naccount (s) active to try and catch the cyberbully. Bullying.org is currently\nin discussions with various Internet Service Providers (ISPs) and Mobile\nService Providers (MSPs) to address these issues.<\/p>\n\n\n\n<p><strong>CYBERBULLYING SOLUTIONS:<\/strong><\/p>\n\n\n\n<p><strong>Youth Solutions&#8211;If being cyberbullied:<\/strong><\/p>\n\n\n\n<p>1. Do not respond\/engage to the abuse.<\/p>\n\n\n\n<p>2. Tale to someone about it. Ignoring\nbullying often leads to it becoming worse.<\/p>\n\n\n\n<p>3. Keep records\/print off messages if\npossible, to help identify bully.<\/p>\n\n\n\n<p>4. If necessary get a new number,\naccount, give it out one person at a time and keep a diary to record any abuse.\nYour tormenter may be closer than you think.<\/p>\n\n\n\n<p>5. Take a break&#8211;Unplug.<\/p>\n\n\n\n<p><strong>Parent Solutions&#8211;If your child is\nbeing cyberbullied.<\/strong><\/p>\n\n\n\n<p>1. Make a more &#8220;talkable&#8221;\nsubject.<\/p>\n\n\n\n<p>2. Place and keep the computer in an\nopen, common area.<\/p>\n\n\n\n<p>3. Inform Internet Service Provider\n(ISP) or cell phone service provider of abuse.<\/p>\n\n\n\n<p>4. Do not erase messages; keep for\nevidence.<\/p>\n\n\n\n<p>5. Software help&#8211;McAfee Parental\nControls filter both IM and Chat Rooms. Tracker programs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SCHOOL SOLUTIONS<\/h3>\n\n\n\n<p>1. Amend anti-bullying policies to\ninclude text messaging, cell phone use and online bullying.<\/p>\n\n\n\n<p>2. Make a commitment to educate\nteachers, students and parents about cyberbullying.<\/p>\n\n\n\n<p>3. Make sure parents know whom to\ncontact at the school if there is a problem.<\/p>\n\n\n\n<p>4. Never allow a\nknown incident of bullying to pass unchallenged and not deal with it.<\/p>\n\n\n\n<p>5. We need to\n\u201cWalk the Walk\u201d of positive, respectful online communication and behaviour in\nour schools and not simply \u201cTalk the talk\u201d. We need to strongly encourage\nteachers and students to become engaged in collaborative, international projects\nwhere there is a well-established, mutually respectful online community with a\nsolid track record in education. One outstanding example of this is iEARN, the\nInternational Education and Resource Network, <a href=\"http:\/\/www.iearn.org\/\">www.iearn.org<\/a>.\niEARN has over one million k-12 student and teacher members in over 110\ncountries around the world, all of whom share iEARN\u2019s vision of \u201cConnecting\nyouth and making a difference!\u201d Schools participate in students and\nteacher-created projects that not only relate to curriculum, they also serve\niEARN\u2019s vision of helping to make our world a better place in which to live. <\/p>\n\n\n\n<p><strong>USEFUL\nTIPS<\/strong><strong><\/strong><\/p>\n\n\n\n<p><strong>How do I take a screenshot of offensive content?<\/strong><\/p>\n\n\n\n<p>A screenshot is a like a photograph of\nyour screen. It captures everything that you can see on your screen at the\npress of a key and is useful for recording details you might want to report.<strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Have the information\nyou wish to record open on your screen and press the PrintScn \/ SysRq key on\nyour keyboard. The image is now saved in a temporary memory.<strong><\/strong><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Open a new Word\ndocument, right click your mouse and select Paste to insert the screenshot.*<strong><\/strong><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Make a note of the\ndate, location, e-mail address, name (nickname or real name) and any other\ninformation that you think might be useful and then Save the file. * The\nscreenshot can be inserted into any program that accepts images.<strong><\/strong><\/li><\/ul>\n\n\n\n<p><strong>How do I save an address in Groups?<\/strong>\n<br>\n<br>\n<\/p>\n\n\n\n<p>If someone or something makes you feel\nuncomfortable it is important to tell someone you trust who can help you to\nreport your experience to the right people. If you encounter potentially\nillegal or offensive content in MSN Groups or have seen a Group that you\nbelieve should be placed behind an adult advisory notice, save the URL and\ncontact the service provider immediately. <strong><\/strong><\/p>\n\n\n\n<p><strong>How do I report cyberbullying from a Hotmail account?<\/strong><strong><\/strong><\/p>\n\n\n\n<p>You can report cyberbullying messages\ndirect from your e-mail inbox and every report you make will actually improve\nthe intelligent filters that protect your account.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Sign in to Hotmail\nand click on the Mail tab to open the inbox.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Select an e-mail you\nsuspect to be an abusive message. <strong>Tip<\/strong>\n&#8211; a question mark is placed on all e-mail from unknown senders.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Click the Junk\noption and select from either Report or Report and Block sender, and then simply\nfollow the directions given.<\/li><\/ul>\n\n\n\n<p><strong>How do I report Hotmail with full headers\nincluded?<\/strong> <\/p>\n\n\n\n<p>If you need to report an e-mail to an authority or\norganization, then include the full header so that action can be taken.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Sign in to Hotmail, click Options (next to help) and select Mail\n     from the left-hand panel, followed by Junk E-Mail Protection.<\/li><li>On the following screen select Mail Display settings.<\/li><li>Under Message Headers select Full and then click OK. You will now\n     be able to forward mail with full headers displayed.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Further Information and Resources:<\/h2>\n\n\n\n<p><strong><a href=\"http:\/\/www.bullying.org\/\">www.bullying.org<\/a>,<\/strong> \u201cWhere you are NOT alone!\u201d, is a multiple award-winning Web site that\nwas created to help people address the issues of bullying within a safe,\npositive, moderated international community. <strong><a href=\"http:\/\/www.bullying.org\/\">www.bullying.org<\/a><\/strong> is the\nmost-visited and referenced Website about bullying in the world.<\/p>\n\n\n\n<p><strong><a href=\"http:\/\/www.cyberbullying.ca\/\">www.cyberbullying.ca<\/a> and <a href=\"http:\/\/www.cyberbullying.org\/\">www.cyberbullying.org<\/a>,<\/strong> \u201cA<em>lways on? Always Aware!\u201d<\/em> is the world\u2019s\nfirst Web sites to specifically dedicated to the emerging issue of\ncyberbullying. Bill Belsey is often cited as the first person to use this word\nand define this behaviour.<\/p>\n\n\n\n<p><strong>Mr. Belsey<\/strong> is the creator and facilitator of the\n<strong>annual<em> Bullying Awareness and Prevention Week.<\/em><\/strong> Check the web site <strong><a href=\"http:\/\/www.bullyingawarenessweek.org\/\">www.bullyingawarenessweek.org<\/a>\n<\/strong>for dates and details each year.<\/p>\n\n\n\n<p>For more information about Bullying.org, please visit:<\/p>\n\n\n\n<p>For more information about educator Bill Belsey, please\nvisit:<\/p>\n\n\n\n<p><a href=\"www.billbelsey.com\">www.billbelsey.com<\/a><\/p>\n\n\n\n<p>For more information, or to have me present to your school community about the issues of bullying and\/or cyberbullying to your organization, please contact: <g class=\"gr_ gr_21 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling\" id=\"21\" data-gr-id=\"21\">billbelsey<\/g>(a)<g class=\"gr_ gr_27 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del multiReplace\" id=\"27\" data-gr-id=\"27\">gmail<\/g>.com<\/p>\n\n\n\n<p>Bill Belsey<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberbullying: An Emerging Threat to the \u201cAlways On\u201d Generation By Bill Belsey, President and Founder of Bullying.org April 20th, 1999 was a day that changed my life. It began like&#8230; <span class=\"more-link\"><a href=\"https:\/\/billbelsey.com\/?p=1827\">Read More<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,13,8,9,4],"tags":[],"class_list":["post-1827","post","type-post","status-publish","format-standard","hentry","category-bullying","category-cyberbullying","category-education","category-technology","category-writing"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/billbelsey.com\/index.php?rest_route=\/wp\/v2\/posts\/1827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/billbelsey.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/billbelsey.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/billbelsey.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/billbelsey.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1827"}],"version-history":[{"count":1,"href":"https:\/\/billbelsey.com\/index.php?rest_route=\/wp\/v2\/posts\/1827\/revisions"}],"predecessor-version":[{"id":1829,"href":"https:\/\/billbelsey.com\/index.php?rest_route=\/wp\/v2\/posts\/1827\/revisions\/1829"}],"wp:attachment":[{"href":"https:\/\/billbelsey.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/billbelsey.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/billbelsey.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}