Cyberbullying Tactics & Types of Cyberbullying
Sought for 2015 PSA Educational Article
Cyberbullying Tactics and Types of Cyberbullying Sought for 2015 PSA Educational Article. 38 2014 Tactics Pasted Below. Below I’ve pasted 38 Cyberbullying Tactics from 2014 and I’m now compiling iPredator’s Cyberbullying Tactics for 2015. Please scan the short definitions list below and comment to this post with new tactics not listed. My goal is to have the “2015 Cyberbullying Tactics” internet safety article available by Thanksgiving.
- Exclusion: Exclusion is a cyberbullying tactic that is highly effective and directly targets a minor’s developmental need to feel accepted and part of a social construct.
- Flaming: Flaming is a cyberbullying tactic defined as an online passionate argument that frequently includes profane or vulgar language.
- Exposure: Exposure is a cyberbullying tactic that includes the public display, posting or forwarding of personal communication, images or video by the cyberbully personal to the target minor.
- eIntimidation: This is a cyberbully tactic used to inspire fear in the target minor by communicating threats that may be direct or implied using email as the vehicle of communication.
- Cyber Harassment: Harassment is sending hurtful messages to the target minor that is worded in a severe, persistent or pervasive manner causing the respondent undue concern.
- Phishing: Phishing is a cyberbully tactic that requires tricking, persuading or manipulating the target minor into revealing personal and/or financial information about themselves and/or their loved ones.
- Impersonation: Impersonation or “imping” as a tactic in cyberbullying can only occur with the “veil of anonymity” offered by Information and Communications Technology.
- Denigration: Used in both classic and cyberbullying, denigration is a term used to describe when cyberbullies send, post, or publish cruel rumors, gossip and untrue statements about a target minor to intentionally damage their reputation or friendships.
- Mobile Device Image Sharing: Not only a tactic used in cyberbullying, but a form of information exchange that can be a criminal act if the images are pornographic or graphic enough depicting under aged minors.
- Non-Consensual Image and Video Dissemination: The usage of images and video as a cyberbullying tactic has become a growing concern that many communities, law enforcement agencies, and schools are taking seriously.
- Interactive Gaming Harassment: Interactive games on online gaming devices allow minors to communicate by chat and live Internet phone with others they are matched with online.
- Pornography and Marketing List Insertion: A frustrating and embarrassing tactic committed by cyberbullies is signing the target minor up to numerous pornography and/or junk marketing e-mailing and instant messaging marketing lists.
- Cyberstalking: Cyberstalking includes threats of harm, intimidation, and/or offensive comments sent through Information and Communications Technology channels.
- Griefing: Griefing is a term used to describe when a cyberbully habitually and chronically causes frustration to the target minor and his/her peers by not following the rules of an interactive online video game and intentionally disrupting the immersion of another player in their gameplay.
- Password Theft & Lockout: A cyberbully steals the target minor’s password and begins to chat with other people, pretending to be the target minor (a.k.a. Impersonation.)
- Web Page Assassination: This is a tactic whereby the cyberbully creates websites that insult or endanger the target minor.
- Voting & Polling Booth Degradation: Some websites offer online users the opportunity to create online polling/voting booths that are free of charge and easy to post.
- Bash Boards: Bash Boards are online bulletin boards where minors post anything they choose and frequented by both the cyberbully and target minor’s peer groups and school acquaintances.
- Trickery: Trickery is a tactic similar to phishing in that a cyberbully purposely tricks a target minor into divulging secrets, private information, and/or embarrassing information about themselves and then publishes that information online.
- Happy Slapping: Happy Slapping is a relatively new type of cyberbullying that integrates the rapid growth of video online and classic bullying.
- Text Wars and Text Attacks: Text Wars and Text Attacks are cyberbullying tactics when the cyberbully and a group of his/her accomplices’ gang up on the target minor by sending hundreds of emails or text messages.
- Malicious Code Dissemination: Sending malicious code is a cyberbullying tactic whereby malicious information is sent intentionally to a target minor to damage or harm their ICT.
- Warning Wars: Internet Service Providers (ISP) offers a way for consumers to report an online user who is posting inappropriate or abusive information.
- Screen Name Mirroring: Screen Name Mirroring is a cyberbullying tactic used against a target minor by constructing a screen name or user name that is very similar to the target minor’s name.
- Cyber Drama: Cyber Drama is a cyberbullying tactic that is a lot more common than extreme cases of cyberbullying. Cyber Drama tends to be gossip that was not supposed to be shared on a blog or a “flame war” that ends after a few messages.
- Sexting: Sexting is the slang term for the use of a cell phone or other Information and Communications Technologies to distribute images or videos of a sexually explicit nature.
- Pseudonym Stealth: A pseudonym is a nickname cyberbullies use when they are online as opposed to when offline. They do this to keep their real identity a secret from the target minor.
- Instant Messaging Attacks: Instant Messaging is a type of communications service that enables online users to create a private chat room with another individual.
- Cyberbullying by Proxy: Cyberbullying by Proxy is a tactic when a cyberbully encourages or persuades others to engage in deprecating and harassing a target minor.
- Social Media Cyberbullying: Social Media Cyberbullying is a tactic used by which the cyberbully persuades the target minor to include them in their “friends” or “buddy” lists and then begins to contact the target minor’s friends, peers and loved ones disseminating disparaging information about the target minor.
- Digital Piracy Inclusion: Digital or Internet Piracy is broadly defined as the illegal reproduction and distribution of copyrighted material on the internet using Information and Communications Technology.
- Tragedy News Mirroring: Local/National Tragedy Mirroring is a cyberbullying tactic whereby a cyberbully threatens a target minor that he/she will allege that the target minor is planning and preparing to engage in a violent activity directed at the targeted minor’s school or community.
- Slut Shaming: Slut Shaming is a cyberbullying tactic primarily targeting a female. A form of sexual cyberbullying, Slut Shaming occurs when a cyberbully records images or videos of the target minor that can easily be construed as sexually provocative.
- Cyber Threats: Cyber Threats is a cyberbullying tactic whereby a cyberbully actively engaged in passive aggressive strategies of informing the target minor that he or she is in danger from unknown or felonious assailants.
- Trolling: Trolling is the pediatric cyberbullying method of what has been termed, Internet Troll. Internet Trolls are often adults who disparage and harass unidentified online users, but the cyberbullying troll knows the identity of the target minor.
- Sextortion: Sextortion is a cyberbullying tactic by which minors exploit other minors for sex and/or sexually themed activities in exchange for not disclosing embarrassing and humiliating information about the target minor.
- Twitter Pooping: Twitter Pooping is a colloquial expression used to define the cyberbullying tactic of using Tweets to disparage and humiliate a target minor.
- Micro-Visual Cyberbullying: Micro-Visual Cyberbullying is a communication channel that is a future cyberbullying tactic trend.
iPredator Inc.: iPredator Inc. is a New York State based Internet Safety & Forensics company founded in September 2011 providing products & services regarding cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet trolls, internet addiction, online child pornography, online deception, cyber attacks and the new fields they are pioneering termed, Cybercriminal Psychology & Cybercriminal Profiling.
Created by a NYS licensed psychologist and forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. For visitors interested in learning more about Dark Psychology & iPredator, outside their parent website, please visit their many social site profiles. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the Google Plus & other social sites listed below used as their information and announcement vehicles.
Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with media and consult with online users. To contact Dr. Nuccitelli about training, education, investigation or consultation, please email him at email@example.com or via phone at 347-871-2416.