[ad_1]
The sad news about bullying is that this type of attacker has been utilizing computer technology to help them accomplish their dirty deeds. Since the problem is growing and becoming a very serious issue within the world that we live in there are certain things to keep in mind about cyber bullying. We will discuss what this term means and also how it occurs.
The most commonly seen type of cyber attack is one that is directed right at the victim from the bully. The bully uses internet websites and emails to directly slander and attack their victim, often in very negative and profane ways. The worst thing about these attacks is that they are often made very public for others online to see and this creates bad social situations for the victim.
Another way that a bully can single out a victim is by use of a proxy. Bullies are now starting to use one of their victims to attack another and this creates negative social situations as well as an awkward situation for an innocent person. Nobody wants to be accused of this type of cowardly slander, especially when they are not the ones responsible for it.
The most common age group that falls victim to this type of attack is the teenage age group. What has been occurring is that the traditional kind of high school bully is making use of current technologies to help him achieve attacks on his victims. If a school kid is attacked, it should be reported to the public or even private school as soon as it happens.
So what type of content is within the common attack of a cyber bully? There are many things to look out for and none of them are nice. Not only is their profane language that attacks and slanders others but there are also threats. Keep in mind that compromising or slanderous photos are sometimes used in these attacks. This became more common with the invention of the digital camera.
Anybody with kids, especially ones in their teens, needs to keep a close eye out for this type of cyber attack. As was mentioned most victims do happen to be teenagers, however there are younger and younger groups of children that are beginning to utilize these practices. If your child is acting very different of withdrawn, talk to them to see if they are a victim.
A bully does not need the use of a personal computer to attack a victim, especially when they have access to a cell phone. Cell phones are becoming more and more advanced and most kids and children are starting to carry them. An attacker can use text messages as well as cell phone pictures and videos to attack somebody and this is actually becoming very popular.
[ad_2]
Source: http://ezinearticles.com/?Cyber-Bullying-Technology&id=4932871
Table of Contents Introduction to IT Managed Service Providers Why Outsource IT Management? Cost-Effective Solutions…
Key Takeaways: The importance of selecting the correct thresholds for different areas in your home…
Key Takeaways: The variety of railing gate designs can significantly enhance the aesthetic appeal of…
For many, commuting is an unavoidable part of daily life. But when that commute extends…
When you're on the road, you want to feel safe, comfortable, and like you have…
Key Takeaways: Understanding the significance of indoor air quality. Identifying common pollutants in your home.…