Cyberbullying
|
|
||||
|
|
|
|
|
1. Students are the most powerful influence on their schools tone and climate. They decide what kind of behavior is acceptable and unacceptable. |
||||
2. Bystanders have the power to stop or prevent injustice. |
||||
3. Stepping in when you see someone treated unfairly is easier in person than online. |
||||
4. The best way to stop teasing, harassment and bullying is to have a stronger system of enforcement and punishment. |
||||
5. If someone is verbally or physically attacking another student someone you do not know the best thing to do is to stay out of it. |
||||
6. It is unrealistic to think that social networks (such as Facebook) can be places where all students are treated fairly and kindly. |
||||
7. If someone is verbally or physically attacking your friend, the best thing to do is to stay out of it. |
Using web resources on school climate, bullying and hate crimes: After having students watch the video you might want to have them explore some of the following resources to learn more about school climate, bullying and hate crimes. Students can report back to the class about what they found. Or, you can use information from these websites to create a short lecture.
You could also ask your students to use online search engines to locate information from credible sources on bullying and/or hate crimes. In addition to the general search function, Google provides searches that present information in different ways. You can find these functions on the bottom left navigation list and/or by clicking the heading More search tools.
Review the strategy Evaluating internet resources for ideas on how to help students assess the validity of their sources.
Fishbowl After students have had the opportunity to process the video independently or in small groups, facilitate a whole-class conversation. Here are some specific questions with which you might consider having students grapple:
Fishbowl: Fishbowl is a strategy that helps students practice being active listeners and participants in a discussion. Half the class can debrief the video while the other half observes. Then students can switch roles.
Levels of questions -- Here is an example of the kinds of questions you can use with this strategy:
Teen Victims of Cyberbullying More
Likely to Abuse Drugs and Alcohol: Study
Spanish researchers found victims of cyberbullying are at higher risk for psychological and behavioral health problems, including substance abuse, after six months of bullying, Health Behavior News Service reports.
Manuel Gamez-Guadix, PhD of the University of Deusto in Spain surveyed 845 teens, and found 24 percent had been a victim of one cyberbullying behavior, 15.9 percent had experienced two such behaviors, and 8 percent had experienced cyberbullying three times.
The researchers note in the Journal of Adolescent Health that cyberbullying is a growing problem among teens. It can include hurtful and harassing messages, rumors, inappropriate or fake photos and videos posted on social networking sites, or in text messages or emails.
Gamez-Guadix said, It is important to include
strategies to prevent cyberbullying within interventions for
behavioral problems during adolescence. Mental health
professionals should pay special attention to these problems
in the treatment of victims of cyberbullying.
Source: www.drugfree.org/join-together/alcohol/teen-victims-of-cyberbullying-more-likely-to-abuse-drugs-and-alcohol-study?utm_source=Join%20Together%20Daily&utm_campaign=c68f4867c2-JT_Daily_News_Teen_Victims_of_Cyberbullying&utm_medium=email&utm_term=0_97f4d27738-c68f4867c2-221326937
Why Do Kids Bully Each Other
Online?
Each type of netbully requires a different approach. They
ways we can stop and prevent them are different. And our
educational campaigns have to cover all different
motiviations to be effective. And the approach to helping
the victim differs depending on why they have been bullied.
While all victims need support and caring and understanding,
there is a difference between the victim merely being in the
wrong cyberplace at the wrong time and being the intended
victim of a dangerous multi-pronged campaign of harassment
and terror. The educational and prevention programs need to
consider these differences as well.
Schools may try and take action when a student is bullied online. But they often find themselves defending an expensive lawsuit brought by the irate parent of the bully charging them with overstepping their authority. Schools have limited authority to address actions that take place outside of school grounds and off-hours unless it is a school-sponsored activity. Since most netbullying occurs from the bully's home computer after school, it may be outside fo the scope of a school's authority.
Unless the school plans carefully in advance and builds their authority into their acceptable use contracts, they may not be authorized to act.
Law enforcement is typically unprepared to deal with cyberharassment cases, specially when children are involved. They may be unable to conduct a cyber-investigation, and may not be able to find a crime to hang their hat on. While many cases of bullying online may be illegal, especially when hacking and death threats are involved, much of what occurs is not a crime.
ISPs are often the best place to start, after the bully's
parents have been contacted, or if the victim doesn't know
for sure the identity fo their bully. Most netbullying
violates the ISPs terms of service. And if the case is
recorded and reported correctly, the ISP may shut down the
netbully's account.
Death Hyperlink: Internet
Suicide Pacts: Medical Journal Warns of 'Cybersuicide' Trend
The car, parked on a deserted mountain road near Tokyo,
had its windows taped shut from the inside. In the car were
small charcoal burners -- and the bodies of seven
people.
Within a few miles of the scene, another car held two more bodies.
The suicide victims were five men and two women ranging in age from 34 to 20. They came from all over Japan. What drew them together was an Internet posting from the 34-year-old woman offering a suicide pact.
On Nov. 28, four men were found dead in a Tokyo apartment where they had gassed themselves. The next day, two men and two women were found dead in a car parked near a dam outside Tokyo. Police suspect the two unrelated groups met over the Internet.
Could it happen outside Japan? Psychiatrist Sundararajan Rajagopal, MD, thinks it might. His editorial in the Dec. 4 issue of the British Medical Journal sounds the alarm. Rajagopal is with the South London and Maudsley NHS Trust in London.
"In recent years there has been concern about the role of the Internet in normal suicide -- solitary suicide, people who take their lives on their own," Rajagopal tells WebMD. "There is evidence that the Internet can influence people to take their own lives. The term coined is 'cybersuicide.' What we are seeing in Japan may occur sporadically in other countries. We cannot rule out the possibility that people, who might otherwise have taken their lives on their own, will meet on the Internet to form suicide pacts."
Suicide Sites Easy to Find
Web sites dedicated to suicide are easy to find on the Internet. Here are some excerpts from one suicide chat room:
"I somethings [sic] think I'd prefer myself dead. And then other times I do as well. And sometimes, I think I'd prefer myself dead. And rarely I don't not think I'd prefer myself dead.
"You really want to die but on the good days you programmed yourself to know that on the bad days when you really want to die you don't really want to die and that you are thinking irrationally. But i want to die."
"Now if you'll excuse me, i have a bus to catch."
"Catching a bus," on these web sites, is slang for killing oneself. Don't try to log on to save anyone. Those leaving antisuicide messages are banned from the sites.
Perhaps it was just talk and nothing serious. But psychologist Gerald Goodman, PhD, professor emeritus at the University of California in Los Angeles, says it's important to take talk of suicide seriously.
"Suicide oftentimes involves some sense of isolation," Goodman says. "Theorists say that the heart of it is meaninglessness. Meaninglessness without hope. When you look at why people do it, there are several things that add up: isolation, meaninglessness, and self-loathing -- disgust with oneself."
If isolation is part of the recipe for suicide, wouldn't a community -- even an Internet chat room of suicidal people -- keep people from killing themselves?
No, Goodman says. In fact, suicidal patients often tell him in chilling language that other people's suicides gave them "inspiration" or "courage" to kill themselves. It comes, ironically, from the human need to be known.
"The suicide wants company. The suicidal person thinks, 'I want to be known by you, and if you truly empathize with me there is no question you will want to talk me out of it - because if you know me you know it is the right thing to do,'" Goodman says. "So the empathy on these web sites is not saying, "Oh, I really understand you.' Instead, they demonstrate that they know how you feel by adding to it. It is collaborative. It is mutual support for suicide."
Goodman notes that there are many more web sites dedicated to mental health, support, and professional help than there are to suicide. But the suicide sites offer something enormously powerful.
"Mutual support is more powerful as a change agent than psychotherapy," Goodman says. "Psychotherapy is one-way intimacy. But with mutual support, we are both in it together. You aren't going to try to talk me out of it. We want the same thing. I've heard the word inspiration twice in this context. Inspiration for suicide."
Since young people are at particular risk of Internet-supported suicide, Goodman suggests that parents monitor teens' Internet use. And Rajagopal suggests that doctors and psychologists should ask depressed patients about whether they have used the Internet to obtain information about suicide.
The good news, Rajagopal notes, is that very few suicides -- only about one in 100, even in Japan -- are linked to the Internet.
"Suicide pacts are a very small proportion of suicides,
and the number of Internet-linked suicides is still very
small," he says. "I don't want people to be unduly
alarmed."
Source: Daniel DeNoon,
Rajagopal, S. British Medical Journal, Dec.
4, 2004; vol 329: pp 1298-1299. Sundararajan Rajagopal, MD,
South London and Maudsley NHS Trust, Adamson Center for
Mental Health, St. Thomas's Hospital, London. Gerald
Goodman, PhD, professor emeritus, University of California,
Los Angeles. my.webmd.com/content/Article/97/104345.htm?printing=true
How do we help prevent the escalation of a bullying situation online? How do we spot the bullying websites early enough to prevent serious damage to the victim and potential bodily harm? What are the laws and what should they be? How can we get the ISP's help? And what can we do to shutdown a bullying message board, profile, guestbook or website?
I'll address these and other questions about bullying
online here at Net
Bullies.com
and at InternetSuperHeroes.org
.
And if you need help, feel free to reach out to our help
volunteers at WiredSafety.org. We are the world's largest
Internet safety and help group, comprised entirely of unpaid
volunteers from around the world. We're here if you need us.
To reach me, send me an e-mail to E-Mail.
Source: www.netbullies.com/pages/1/index.htm
Pediatric
Emergency Department Visits for Mental Health Crisis:
Prevalence of Cyber-Bullying in Suicidal Youth
Abstract
The objective of this work is to (1) study the prevalence of cyber-bullying amongst adolescents referred by Pediatric Emergency Department (PED) for urgent psychiatric assessment and (2) to examine the association between cyber-bullying and suicidal behavior to assist emergency department professionals in screening for risk and triage. This is a retrospective study of patients referred by PED to an urgent psychiatric clinic. Data was extracted for those with bullying victimization. Clinical variables included demographics, reason for referral, type of bullying, substance use, abuse, past psychiatric history, diagnosis and outcome. The cyber-bullying group was compared to those with traditional bullying and a group with no-bullying. Data analysis was conducted using Chi squares, multinomial and bimodal logistic regression. The urgent psychiatric clinic assessed 805 patients in 24 months, the prevalence of bullying was 26.9 % (n = 217). The prevalence of Cyber-bullying was 13.5 % (n = 109) and traditional bullying was 13.4 % (n = 108). Cyber-bullying victims have more suicidal ideation (?² = 7.82, p = .005; 85.3 vs. 69.4 %), more sexual abuse (?² = 5.75, p = .02; 29.4 vs. 15.7 %), more emotional abuse (?² = 10.8, p = .01; 30.3 vs. 12.0 %) and physical abuse (?² = 6.13, p = .01; 27.5 vs. 13.9 %) and a higher inpatient admission rate. Suicidal ideation is the presenting problem in more than two-thirds of patients, especially females, with history of cyber-bullying who present to the PED. Screening questions about cyber-bullying could assist emergency room professionals in establishing risk and making triage decisions.
References
Dooley, J. J., Pyzalski, J., & Cross, D. (2009). Cyber-bullying versus face-to-face bullying: A theoretical and conceptual review. Journal of Psychology, 217, 182188.
Gan, S. S., Zhong, C., Das, S., Gan, J. S., Willis, S., & Tully, E. (2011). The prevalence of bullying and cyber-bullying in high school: A 2011 survey. International Journal of Adolescent Medicine and Health, 26, 2731.
Goebert, D., Else, I., Matsu, C., Chung-Do, J., & Chang, J. Y. (2011). The impact of cyber-bullying on substance use and mental health in a multiethnic sample. Maternal and Child Health Journal, 15, 12821286.
Hinduja, S., & Patchin, J. W. (2006). Bullies move beyond the schoolyard. A preliminary look at cyber-bullying. Youth Violence and Juvenile Justice, 4, 148169.
Hinduja, S., & Patchin, J. W. (2009). Bullying beyond the schoolyard: Preventing and responding to cyber-bullying. Thousand Oaks, CA: Sage.
Hinduja, S., & Patchin, J. W. (2010). Bullying, cyber-bullying, and suicide. Archives of Suicide Research, 14, 206221.
Kaltiala-Heino, R., Rimpela, M., Marttunen, M., Rimpela, A., & Rantanen, P. (1999). Bullying, depression, and suicidal ideation in Finnish adolescents: school survey. British Medical Journal, 319, 348351.
Kim, Y. S., & Leventhal, B. (2008). Bullying and suicide. A review. International Journal of Adolescent Medicine and Health, 20, 133154.
Li, Q. (2005). New bottle but old wine: A research of cyber-bullying in schools. Computers in Human Behavior, 23, 17771791.
Mishna, F., Cook, C., Gadalla, T., Daciuk, J., & Solomon, S. (2010). Cyber-bullying behaviors among middle and high school students. American Journal of Orthopsychiatry, 80, 362374.
Modecki, K. L., Minchin, J., Harbaugh, A. G., Guerra, N. G., & Runions, K. C. (2014). Bullying prevalence across contexts: A meta-analysis measuring cyber and traditional bullying. Journal of Adolescent Health, 55, 602611.
Newton, A. S., Ali, S., Johnson, D. W., Haines, C., Rosychuk, R. J., Keaschuk, R. A., et al. (2009). A 4-year review of pediatric mental health emergencies in Alberta. Canadian Journal of Emergency Medicine, 11, 447454.
Olweus, D. (2012). Cyber-bullying: An overrated phenomenon? European Journal of Developmental Psychology, 9, 119.
Paglia-Boak, A., Adlaf, E. M., Hamilton, H. A., Beitchman, J. H., Wolfe, D., & Mann, R. E. (2014). The mental health and well-being of Ontario students, 19912011: Detailed OSDUHS findings. Retrieved Apr 25, 2015 from http://www.camh.ca/en/research/news_and_publications/ontario-student-drug-use-and-health-survey/Documents/2011%20OSDUHS%20Docs/2011OSDUHS_Detailed_MentalHealthReport.pdf
Prince, S., Wilmore, J., Ali, A., Leikin, B., & Ray, R. (2011). Mental Health, School Climate and Bullying among Youth: Results from the Ontario Student Drug Use and Health Survey 20092011
Sampasa-Kanyinga, H., Roumeliotis, P., & Xu, H. (2014). Associations between cyber-bullying and school bullying victimization and suicidal ideation, plans and attempts among Canadian school-children. PLoS One, 9, e102145. doi: 10.1371/journal.pone.0102145
Schneider, S. K., ODonnell, L., Stueve, A., & Coulter, R. W. (2012). Cyber-bullying, school bullying, and psychological distress: A regional census of high school students. American Journal of Public Health, 102, 171177.
Sills, M. R., & Bland, S. D. (2002). Summary statistics for pediatric psychiatric visits to US emergency departments. Pediatrics, 110, e40.
Sinyor, M., Schaffer, A., & Cheung, A. H. (2014). An observational study of bullying as a contributing factor in youth suicide in Toronto. Canadian Journal of Psychiatry, 59, 632638.
Slonje, R., & Smith, P. K. (2008). Cyber-bullying: Another main type of bullying? Scandinavian Journal of Psychology, 49, 147154.
Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyber-bullying victimization. Computers in Human Behavior, 26, 277287.
Forensic Mental Health Aspects of Adolescent Cyber Bullying: A Jurisprudent Science Perspective
Opportunistic Screening for Exposure to Bullying in the Pediatric Emergency Department
Pediatric Emergency Department Visits for Mental Health Crisis: Prevalence of Cyber-Bullying in Suicidal Youth
Source: https://link.springer.com/article/10.1007%2Fs10560-016-0442-8
Professional
Tennis Player Retires Following Cyber-Bullying Incident
Cyber-bullying has taken its toll on me, Marino told The Star. She went on to add that though it wasnt the main reason for her retirement, it did exacerbate the situtation. My depression had come way before the so-called cyberbullying, she said.
Marino had received several offensive tweets recently, including ones that said, go burn in hell and go die.
On a conference call with reporters, Marino said I am opening up to you all about this because I would like to get rid of the stigma attached not only to depression but also to mental illnesses both in the public and in professional sports. If I can share my story and change one persons outlook or life, I have reached my goal.
Its a sad story and shows hows social media can
really hurt people. Heres hoping that Marino gets the
help she needs and finds the happiness shes looking
for.
Source: josephsoninstitute.org/sports/pvwh-sportsmanship/2013/02/tennis-player-retires-following-cyber-bullying-incident/
Teen Victims of Cyberbullying More
Likely to Abuse Drugs and Alcohol: Study
Spanish researchers found victims of cyberbullying are at higher risk for psychological and behavioral health problems, including substance abuse, after six months of bullying, Health Behavior News Service reports.
Manuel Gamez-Guadix, PhD of the University of Deusto in Spain surveyed 845 teens, and found 24 percent had been a victim of one cyberbullying behavior, 15.9 percent had experienced two such behaviors, and 8 percent had experienced cyberbullying three times.
The researchers note in the Journal of Adolescent Health that cyberbullying is a growing problem among teens. It can include hurtful and harassing messages, rumors, inappropriate or fake photos and videos posted on social networking sites, or in text messages or emails.
Gamez-Guadix said, It is important to include
strategies to prevent cyberbullying within interventions for
behavioral problems during adolescence. Mental health
professionals should pay special attention to these problems
in the treatment of victims of cyberbullying.
Source: www.drugfree.org/join-together/alcohol/teen-victims-of-cyberbullying-more-likely-to-abuse-drugs-and-alcohol-study?utm_source=Join%20Together%20Daily&utm_campaign=c68f4867c2-JT_Daily_News_Teen_Victims_of_Cyberbullying&utm_medium=email&utm_term=0_97f4d27738-c68f4867c2-221326937
If You Have Been Harassed Online:
What to Do
Here is the legal definition of harassment according to Black's Law Dictionary: "a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose" or "words, gestures, and actions which tend to annoy, alarm and abuse (verbally) another person."
This is of course a very broad definition which state and federal legislation and common law have narrowed and refined in various ways. However, for our purposes, we will define online harassment as any actions that meet the qualifications of the above definition after the harasser has been told to cease. This definition, due to its broadness, is useful in that it fails to put value judgements on the complaints of individuals.
2. Tell the harasser to STOP! Clearly tell the perpetrator that his/her email, posts, comments, IRC or ICQ communications are unwanted and that you want an immediate end to them. Sometimes the best approach to this is a simple, rational "I am sorry that you feel that way, but I really feel that you are crossing some boundaries for me here and I would prefer it if we ended our communication here."
3. Contact the site administrator. If the behavior persists, you may want to contact the administrator responsible for the site. Who is the site administrator and how do you locate them? S/he is the operator of the BBS, the sysadmin of the system on which the web-based chat or other server is placed, or in the case of email the sysadmin of the system that the person harassing you is mailing from.
Most often, sites have an address called postmaster@[that site].com or webmaster@[that site] that you can use to report problems. If that fails, you can usually find contact addresses at web sites , which you can find by looking up the host name in a search engine like Alta Vista or Lycos (to name just a couple) or you can look them up through the internic. Searching for sites in the USA [.com, .mil, .org, .edu, .us and .gov] will give you the full contact information including names and addresses. The site is... rs.internic.net/cgi-bin/whois . Just type in the address after the "@" symbol.
4. Determine your desired result. What do you want to see happen in this situation? Try to think of this more rationally than emotionally, and try to be realistic about what you can expect.
Some very reasonable and realistic goals might be :
5. Take care of you first. In spite of what some people may say to you, words can hurt a lot. No matter what decisions you make about dealing with harassment, put your own emotional needs first. Sometimes you may want to simply walk away, and that's alright. There are times that we are too vulnerable to fight a battle. Get yourself into some safe places, talk it out with friends or ask me for a referral to organizations and/or professionals that can help you work through this.
6. Decide how you want to proceed. If you feel
that no progress has been made after attempts to contact and
educate the site administrator, you may feel that you want
to pursue the matter in some other way. I can make
suggestions and refer you to other sources if that is your
desire at that time.
Source: www.daffi.org/if_you_have_been_harassed.htm
Letting someone down easy, instead of saying a definitive NO if your not interested in a relationship. Trying to be nice can lead a potentially obsessive suitor to hear what he wants instead of the message that your not interested.
Ignoring the early warning signs that annoying attention might escalate into dangerous harassment and pursuit.
Responding to a stalker in any way, shape or form. That means not acceding to your stalkers demands even once he or she has introduced threats.
Trying to reason or bargain with a stalker. Stalking is a like a long rape.
Seeking a restraining or protective order. All to often, this one act propels stalkers to act violently.
Expecting police to solve your problems and make it go away. Even the LAPD's Threat Management Unit says that victims have to take 100 percent responsibility for their dealing with the situation.
Taking inadequate privacy and safety precautions.
Neglecting to enlist the support of family, friends, neighbors, co-workers, therapists and other victims. It may be tough to admit you're being stalked, but it's not your fault. Learn how to gather the people who will constitute your first line of defense.
Ignoring your emotional needs during and after a
stalking. Do you know how to get support you need?
Source: www.daffi.org/top_ten.htm
Be Even More Careful Who You Decide To Meet In Person. Friendships and professional relationships you start online can be special, beneficial relationships. But it's very difficult to predict what someone is like in person just from some text, GIF or video of them. Someone may seem normal on the phone even when they aren't. Be extra careful when you bring your online friendships offline. For your first meeting, bring a friend and/or meet in a public place.
Stalk Yourself. From your user ID to what Internet
directories say about you--check all the information about
you that could possibly be online. Every time you put a
piece of personal information into someone else's hands, you
are giving them power over you. Be careful where you send
your real name, address, phone number, picture, or work
history. Think about whether you really want your full
resume on the Web. Every person has to weigh the benefits
and risks and decide what personal information they want to
put online. The trick is to know what's out there and how to
hide that information if you need to.
Source: www.daffi.org/simple_avoidance_tactics.htm
Checklist on your Personal
Information.
Check your .sig file for personal info such as your full name, address (even just city and state), workplace, and phone numbers.
Have ICQ? Remove any information in your Global Directory (user's details) that could tell a person who you are or where you are. Check that the email address listed is not your personal email. Use one of the free one's on the internet.
Use finger to see what kinds of information might be listed about you, especially if you have a .edu account. If you think finger reveals too much about you, edit your .plan file or contact your system administrator for help.
Does your Web site contain a photo, a resume, your name, address, or phone numbers? Any information about friends, family, or the area where you live?
Check your source code to make sure registration information (like your name) hasn't been inserted by your HTML editor.
Internet directories. Remember six months ago when you put your resume on that BBS? Did you ever leave personal information at someone's Web site for all to see? Check Web/Usenet search engines (Alta Vista, WebCrawler) and 411 phone directories for your name.
Is your phone number listed in the local phone book? Your address? Could someone conceivably make a link between your online information and what's in the local phone directories?
How easy would it be for someone to find you at work?
What kinds of security measures do you have there?
Source: www.daffi.org/checklist.htm
1. Archive Every Piece of Communication Relating to the Situation: Save every piece of communication you get from this person. Save all of the e-mail header information you can if it is an e-mail or newsgroup posting. If you are getting chat requests, ICQ or IRC messages, or any other type of communication, take a screenshot, print it out, and write notes on it. Send copies of each harassing communication to your postmaster and the harasser's provider.
Don't forget to save communications to postmasters, providers, system administrators, police, supervisors at work, and security specialists.
2. Start a Log. In addition to your archive of communications, start a log that explains the situation in more detail. Document how the harassment is affecting your life, and document what steps you're taking to stop it.
3. Tell Your Harasser To Cease and Desist. It is important that you contact your harasser directly telling him or her in simple, strong, and formal terms to stop contacting you. You must state that the communications are unwanted and inappropriate and that you will take further action if it does not stop. Don't worry about whether your letter sounds too harsh--make sure it's professional and to the point. CC: your postmaster and your harasser's. Archive the mail you have sent, and note that you sent it in your log.
After you send this mail, your communication to this person must stop. Any further communication can feed the situation. The harasser's behavior will be rewarded by your attention, so it will continue. Also, if the case goes to court, your harasser can report that the communication was going both ways, and it could damage your case. It is best to keep quiet no matter how tempted you are to defend yourself. It is important that you tell your friends not to communicate with the harasser in your defense for the same reasons.
4. Tell the Right People. If this person makes contact with you via video conferencing, notify the owners or reflector monitors (refmons) of the reflector sites you frequent. The refmons can assist you and watch for any inappropriate behavior. They may even remove him from the reflector and/or ban him. There is a network of refmons out there and word can be passed on about harassment from a particular person.
Report the situation to your system administrator(s), your friends, family, and coworkers. Tell your supervisor and work security personnel. Tell your apartment building's security people. Report the situation to your local police. The FBI will also take down a complaint, and they'll follow up on it if they have the manpower.
5. Take Police Action. Many states have modified their stalking laws to include electronic communications. Many states will let you file for a restraining order in cases like this, and the courts will often let you ask that your harasser pay for any filing fees. You'll need the person's address if you want to serve them with a restraining order or press charges against them. The police can get this information from the harasser's postmaster if they need to.
6. Protect Your Online Space. Change your password frequently. Pay attention to your files, directories, and last logout information. Monitor information about yourself on the Net with Alta Vista and other search engines. You might want
to lay low for a while if the person is haunting you in Usenet or on IRC.
7. Protect your offline space. Take all the
precautions you would if an old boyfriend was acting crazy,
especially if you think the person can find you at home or
at work.
Source: www.daffi.org/if_it_does_happen.htm
Related Facing History Resources:
www.facinghistory.org/resources/lesson_ideas/nios-1
ostracism.facinghistory.org/
Related NIOS Videos:
Students Take On Cyberbullying
Source: www.niot.org/nios/lesson/lesson-idea-%E2%80%9Cstudents-take-cyberbullying%E2%80%9D
Parenting Online: www.wiredkids.org/parents/parentingonline/index.html
070816