This harassment can go down between kids when they send vicious messages to other kids. They may not realize that is a serious action even though there is no face-to-face meeting.  Warnings are used by many internet service providers to inform the user that their language is in violation of the etiquette. In some cases, kids use the button to kick someone from a chat room for a period. Other times a youngster may create a fake profile similar to another child’s name. They use it as a ruse to harass the other person online. Text wars are when a group of kids send a victim thousands of texts to their mobile. This increases the bill and infuriates parents. Another problematic issue is the kids who send death threats by IM and text message. This could include photos or videos.

loser

A kid may steal another kid’s password with the intention of using it to chat with someone. Pretending to be this person he/she could say offensive things towards friends or new acquaintances. Stealing passwords is the opportunity when a kid may feel free to change the other kid’s profile to include sexual, racist, and other graphic content that may attract unwanted attention. The kid who stole the password will lock the victim out of their account. A stolen password runs the risk of being hacked.

Blogs are a popular form of media to create content. Kids and teens send messages to share with all of their friends, but sometimes blogs are used for the malicious purpose of ruining a peer’s reputation or invading their privacy. Where once before a playground was the place to tease other classmates, kids now take it to the websites. Kids make websites that may disgrace another child. Kids post sensitive information that make it easy for them to be found or contacted. Mass emails to other users that include nudity or degrading images of other teens. Sending this email is permanent, and hundreds of people will share it within hours. It is out of the teen’s control where it ends up. Cell phones allow kids to send picture messages. The person receiving the photo can send it to everyone in their address book. Someone viewing it on a website can save it and upload it to a pornographic site. Kids will take a revealing picture of someone in the locker room, bathroom, or dressing room and post it online.

Internet polls are used to bully other kids. They may ask embarrassing questions. These questions will incite others to join in this hurtful behavior. Many kids are playing video games online using consoles such as Xbox Live or Sony Playstation Network. You may have heard or viewed the foul language. Your child can chat and use a headset to talk with other players online. Sending threats is not uncommon here.

You must realize a teen or young adolescent will not confide in you if they are being cyberbullied. Facebook is a familiar spot to launch verbal attacks, but kids may utilize other social media sites as well. You should be alert to the warning signs:

  • Your child will abruptly spend a little or a lot of texting, gaming, or on social networking sites.
  • After texting or logging out he or she is detached or upset.
  • Your child requests to have a social media account removed.
  • He or she places a bock on a number or an email address.
  • Many new numbers, texts, or email contacts appear on your child’s cellphone, laptop, or tablet.
  • He or she acts out of character (out of control).
  • Your child explains that there is gossip online about them.

concernedparentThis subject must be approached delicately. Be careful to do it in a manner in which they will feel unconditional love. You should show you are determined to stop it. A good move is to print or save evidence of the cyberbullying. It may also be necessary to have a conversation with the parents or guardian of the bully. Some schools may not help because of legal protocols. If the abuse escalates and the other parents will not assist go to the police.

With these points in mind, be informed about what social platforms do to prevent or combat it. Since kids spend most of their day in school, the institution bans certain websites. Some districts have the expense to hire social media listeners to find kids who are the bullies’ target. Social media have specific keywords that will notify if someone is being harassed.