||Short for electronic mail, the transmission of messages over
communications networks. The messages can be notes entered from the keyboard or
electronic files stored on disk. Cyberbullies can and do use e-mail to send
harassing and threatening messages to the targets of their hatred and loathing.
Those who are bullied often ask themselves "What have I done to deserve
this?" and the usual answer is that they have not done anything to deserve
such awful messages.
||Some Web sites such as www.freevote.com, offer users the opportunity to
create online polling/voting booths. Cyberbullies can use these Web sites to
create Web pages that allow others to vote online for "The Ugliest ,
Fattest, Dumbest etc. Boy/Girl at ***** School".
||A type of communications service that enables you to create a private
chat room with another individual. Typically, the instant messaging system
alerts you whenever somebody on your private list is online. You can then
initiate a chat session with that particular individual. Cyberbullies
can and do use IM to send harassing and threatening messages to the targets of
their hatred and loathing. The
conversations and conflicts that arise online often give rise to behaviors that
are acted out in person during school or at the local shopping mall.
||A site (location) on the World Wide Web. Each Web site contains a home
page, which is the first document users see when they enter the site. The site
might also contain additional documents and files. Each site is owned and
managed by an individual, company or organization. Cyberbullies can create Web
sites that mock, torment and harass others.
||Blogs are online journals. They are a fun way for kids and teens to
messages for all of their friends to see. However, kids sometimes use these
blogs to damage other kids' reputations or invade their privacy.
||Sending Pictures through
E-mail and Cell Phones
||There have been cases of teens sending mass e-mails to other users, that
include nude or degrading pictures of other teens. Once an e-mail like this is
sent, it is passed around to hundreds of other people within hours; there is no
way of controlling where it goes. Many of the newer cell phones allow kids to
send pictures to each other. The kids receive the pictures directly on their
phones, and may send it to everyone in their address books. After viewing the
picture at a Web site, some kids have actually posted these often pornographic
pictures on Kazaa and other programs for anyone to download. Kids often take a
picture of someone in a locker room, bathroom or dressing room and post it
online or send it to others on cell phones.
||Sending Malicious Code
||Many kids will send viruses, spyware and hacking programs to their
victims. They do this to either destroy their computers or spy on their victim.
Trojan Horse programs allow the cyberbully to control their victim's computer
remote control, and can be used to erase the hard drive of the victim.
||Posing as the victim, the cyberbully can do considerable damage . They may post a provocative
message in a hate group's chatroom posing as the victim, inviting an attack
against the victim, often giving the name, address and telephone number of the
victim to make the hate group's job easier. They often also send a message to
someone posing as the victim, saying hateful or threatening things while
masquerading as the victim. They may also alter a message really from the
victim, making it appear that they have said nasty things or shared secrets