Cyberbullying: Origins and forms of attack online

Cyberbullying has its origins in real bullying. There is, it does concrete and tangible damage but its most devious peculiarity is that it deeply affects its victim by making them believe that it is completely alone, weak and incapable of defending itself. Or at least that’s what the cyberbully, with the various forms of online attack at his disposal, wants to make believe. He wants you to believe.

The cyberbully is a persuader and manipulator who hides the opportunities of the web to induce you to enter the dead ends and convince you that you are wrong.

The more you feel belated in your way of being and doing and the more the action of the cyberbully is effective.

In the end, you feel lonely and wounded without even understanding why, what you have done and what is wrong with being different or, simply, yourself.

You want to know a secret? You’re not alone, there are ways to protect yourself from cyberbullying.

Cyberbullying: First rule of defense, know yourself and your enemy

If you want to stop cyberbullying, the first rule of defense is to know yourself and your enemy as well.

It’s true, how on earth do you know yourself if you seem to have no peace and teasing, at school and on social, are the order of the day?

You got the first point, you have no peace. This is the first action of cyberbullying, not giving time to his victim to rework what is happening to him and, as a result, react. Is to play on unconsciousness and give weight to what others think of you, without knowing you. A cyberbully, according to Wikipedia tends to:

  • Write aggressive comments accompanied by free insults to create tension in conversations under a post. Are the principle of flame,
  • Send offensive messages all the time. This practice is called harassment.
  • Publicly denigrate and with all the communication tools offered by the online world,
  • Publish content without knowing (and to the detriment) of the owner of the stolen online identity. It’s about impersonation, about substituting in person,
  • Deceive the victim to obtain the trust and then to explain around personal information, confidently said. This is doing trickery,
  • Exclude a person from an online community by margining her.
  • Do cyberstalking by repeating all the actions listed above every day, to exhaustion,
  • Disseminate sensitive and personal data without permission, Doxing action,
  • Threatening to death.

Now that you have all this information about online attack forms put into practice by the plague of cyberbullying, what could you do?

Everyone is free to publish and share what everyone wants as well as everyone is free to defend themselves with the same tools by obscing offensive comments and blocking the person who sends them.

A small and simple trick is not to leave unattended or without password the electronic devices through which you access your social networks.

Try to be very careful where and who you choose to put your trust in. Were you wrong to put too much trust in someone? It can happen and try not to see this opening you to the other as a flaw indeed, it is a beautiful quality. Continue to cultivate and take care of it keeping you aware that it is not all gold that glitfishes and that a cyberbully can hide even in the most unsuspected people.

Finally, and especially with regard to the last three points identifying the preferred attack forms of cyberbullying, do not be afraid to denounce to those who have jurisdiction.

Cyberbullying: Remember that you are not alone and never be afraid to speak or ask for help

Cyberbullying

To counter cyberbullying always remember that you are not alone and never be afraid to speak or ask for help. It may sound absurd but the same online tools used to attack can also be effective for defending and educating.

An example you can find in sites and blogs in the industry that are addressing the topic of cyberbullying to communicate that there are also places and people who offer help, assistance and support.

Some practical and concrete examples that are being done to address the topic of cyberbullying you can find them:

  1. In the posts that you find on In light, blog edited and managed by psychologist Francesca Ungaro. All its contents deserve to be read with calm and attention because they use a simple and clear language and help to reflect on mechanisms and dark sides of the online communication. In this sense, Be a bully on social It’s one of the most enlightening posts.
  2. In schools that take care of and bother to make known what bullying and cyberbullying is also to parents and foster dialogue between families and educational institutions
  3. and books. A headline recently published and that could be very useful for parents, boys and teachers is: It’s not a school for bullies-bullying prevention strategies, cyberbullying and homophobic bullying of Davide Viola, of the Galton editions.

They are all important tools to make you aware to know yourself and your enemy because very often it happens that failing to understand what is happening you hold it for yourself or you have the words to express what you feel and that makes you sick. However, in doing so you have offered fertile ground to the seed of cyberbullying which, like a weed, will grow to suffocate your being.

To neutralize cyberbullying and its forms of attack do not be afraid to speak or to ask for help and, remember, you are not alone. 🙂

Credits and Acknowledgements

Kindly offered by Paroleombra of Rita Fortunato.

Rita Fortunato, Blogger and owner of Paroleombra.com , great reader, personally cares for the famous curriculum of the player and actively deals with Social networks and relationships between people.

His watchword is “Interested in everything that surrounds me, I write around the web. Here I collect the #CurriculumDelLettore. To read even more “