{"id":7970,"date":"2017-06-16T08:11:17","date_gmt":"2017-06-16T16:11:17","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/06\/16\/news-1751\/"},"modified":"2017-06-16T08:11:17","modified_gmt":"2017-06-16T16:11:17","slug":"news-1751","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/06\/16\/news-1751\/","title":{"rendered":"Tackling the myths surrounding cyberbullying"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Fri, 16 Jun 2017 15:00:52 +0000<\/strong><\/p>\n<p>Cyberbullying is an act most of us are familiar with. Knowing what it is, who&#8217;re involved, and its harmful effects to targets are easy enough to identify; but do you know that cyberbullying is surrounded by misconceptions, too? In this post, we have identified six of these myths, explained why they&#8217;re worth discrediting, and lastly, provided ways to nip cyberbullying in the bud.<\/p>\n<h3>Myth #1: Bullying, whether done face-to-face or online, only negatively affects the target.<\/h3>\n<p>This may seem like an obvious and accepted truth; however, several <a href=\"http:\/\/www.webmd.com\/parenting\/news\/20100706\/emotional-troubles-for-cyberbullies-and-victims#1\" target=\"_blank\" rel=\"noopener noreferrer\">medical<\/a> <a href=\"https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC2556236\/\" target=\"_blank\" rel=\"noopener noreferrer\">studies<\/a> have shown otherwise. Both the offended <em>and<\/em> the offender experience emotional, physical, and social issues as a direct result of bullying and such effects have been consistently observed across youths in different countries, which includes headaches, recurrent stomach pains, feeling unsafe whether inside or outside the home, and difficulty sleeping at night.<\/p>\n<p>Perhaps the most harmful consequence of being targeted, especially in the case of teens, is \u201cinternalizing problems\u201d\u2014negative self-perception, anxiety, depression, and insomnia. Left untreated, these will grow worse and increase the likelihood of them developing mental health issues.<\/p>\n<p>Furthermore, cyberbullying has <a href=\"http:\/\/www.eyesonbullying.org\/bystander.html\" target=\"_blank\" rel=\"noopener noreferrer\">ill effects<\/a> <a href=\"http:\/\/us.reachout.com\/facts\/factsheet\/bystanders-role-in-cyberbullying\" target=\"_blank\" rel=\"noopener noreferrer\">on bystanders<\/a>\u00a0as well.<\/p>\n<h3>Myth #2: Only <a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/11\/anti-bullying-week-monkey-see-monkey-do\/\" target=\"_blank\" rel=\"noopener noreferrer\">kids<\/a> and <a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/11\/anti-bullying-week-no-sympathy-for-the-bully\/\" target=\"_blank\" rel=\"noopener noreferrer\">teens<\/a> experience cyberbullying.<\/h3>\n<p>According to a <a href=\"http:\/\/www.pewinternet.org\/2014\/10\/22\/part-1-experiencing-online-harassment\/\" target=\"_blank\" rel=\"noopener noreferrer\">survey<\/a> conducted by the Pew Research Center, 40% of adults in the United States have experienced some\u00a0form of bullying online. Forms of harassment range from name-calling, deliberate embarrassment, physical threats, to stalking.<\/p>\n<p>In the past, we used to hear about teachers picking on students, but now we&#8217;re as likely to read about <a href=\"https:\/\/nobullying.com\/students-bullying-teachers-a-new-epidemic\/\" target=\"_blank\" rel=\"noopener noreferrer\">students bullying teachers<\/a>.<\/p>\n<h3>Myth #3: The best way to beat the cyberbully is to fight back.<\/h3>\n<p>And by \u201cfight back\u201d, they mean \u201cbullying the bully\u201d. This may seem like sound advice from well-meaning friends or family members, but more often than not, hitting back with words may make matters worse. Those who are unable to fight back due to feelings of fear, anxiety, or powerlessness may begin blaming themselves for the bullying. It also sends the wrong message to kids and teens that out-bullying each other is the only way to stop the harassment.<\/p>\n<h3>Myth #4: Bullying is a part of life. Get over it.<\/h3>\n<p>Although bullying happens both in the digital and real domains, it shouldn\u2019t be considered normal, okay, or acceptable, and telling those being harassed to \u201cget over it\u201d doesn\u2019t help the already mentally and emotionally vulnerable. Bullying, regardless of where it takes place, is a societal problem that needs to be seriously addressed, not brushed aside.<\/p>\n<h3>Myth #5: Once the bullying stops, the life of the affected child\/person goes back to normal.<\/h3>\n<p>This is far from reality. According to a joint US\/UK study, people involved in bullying continue to feel and experience the effects of the act <a href=\"https:\/\/nobullying.com\/bullying-effects-lasting-until-adulthood\/\" target=\"_blank\" rel=\"noopener noreferrer\">until adulthood<\/a>. The severity of these effects also depends on the person\u2019s resilience and the positive relationships he\/she has with other people. Some of the <a href=\"https:\/\/www.nimh.nih.gov\/news\/science-news\/2013\/bullying-exerts-psychiatric-effects-into-adulthood.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">problems that can carry over to adulthood<\/a> are depression, panic attacks, and difficulties socializing.<\/p>\n<p>Scientists also stress the <a href=\"https:\/\/phys.org\/news\/2017-03-scientists-stress-lifelong-effects-cyberbullying.html\" target=\"_blank\" rel=\"noopener noreferrer\">long-term effects of cyberbullying<\/a>, even if it happens only once.<\/p>\n<h3>Myth #6: There are no laws against bullying and\/or cyberbullying.<\/h3>\n<p>On the contrary, the <a href=\"https:\/\/nobullying.com\/students-bullying-teachers-a-new-epidemic\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cyberbullying Research Center<\/a> has a dedicated page showcasing US states and <a href=\"http:\/\/cyberbullying.org\/bullying-laws\" target=\"_blank\" rel=\"noopener noreferrer\">their bullying laws<\/a>.<\/p>\n<h3>\u2018<b>Prevention is always better than cure\u2019<\/b><\/h3>\n<p>What most of us may not realize is that a number of\u00a0incidents of cyberbullying can be prevented. Here&#8217;s a few ways to tackle them:<\/p>\n<ul>\n<li><em>Never share your online credentials with anyone, not even with family members (except your parents if they asked for them), or friends.<\/em> Most kids and teens these days <a href=\"https:\/\/blog.malwarebytes.com\/101\/2014\/08\/what-are-online-problematic-situations-eu-kids-speak-up\/\" target=\"_blank\" rel=\"noopener noreferrer\">allow their friends to access their social profiles<\/a>, believing that doing so is cool. However, friends may begin posting images and messages without their consent, and may cause more headache to the innocent child or teen who owned the profile.<\/li>\n<li><em>Never share private or intimate photos of yourself to anyone.<\/em> Not only will teen girls gain Likes from peers, they may also grab the unwanted attention of strangers, which may further lead to stalking and other forms of online harassment. Additionally, revenge porn also happens among kids and teens.<\/li>\n<li><em>Consider limiting the number of people seeing what you post online.<\/em> Sadly, most users of social networking sites don\u2019t bother setting up the privacy level of their profiles and posts. As most (if not all) social sites show posts publicly by default, those who express their views on, say, politics usually invite ire from strangers who don\u2019t share similar views. If not mitigated from the get-go, the banter may quickly escalate to bullying. If you wish to remain posting publicly, then at the very least&#8230;<\/li>\n<li><em>Mind what you disclose online.<\/em> Kids and teens share quite a lot about themselves\u2014their thoughts, opinions, feelings, activities at the home or with friends. Although these are likely innocent, they can be used to fuel the bullying.<\/li>\n<li><em>Create strong passwords for all online accounts.<\/em> Some cyberbullies may attempt to infiltrate a target\u2019s account by hacking. Although this act is not considered cyberbullying, online bullies can use accounts they control to humiliate a target or harass other targets by posing as someone else. Make sure that you can <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/05\/dont-need-27-different-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">efficiently manage<\/a> the passwords you create.\n<ul>\n<li>A word on personally identifiable information (PII): Revealing information you use to access or create accounts, such as your dog\u2019s name and your date of birth, is highly discouraged. Not only will this contribute towards\u00a0impersonation, but it\u00a0may also lead to the compromise of your online account.<\/li>\n<\/ul>\n<\/li>\n<li><em>When using public or shared computers, make sure to log out of your social media accounts before leaving. <\/em>If possible, delete the browser history cache and cookies\u00a0or you may give\u00a0someone else the opportunity to be you online.<\/li>\n<\/ul>\n<p>The internet is what we make of it. On the one hand, it can be a great place to learn, meet new friends, reconnect with old ones, and discover the world without leaving the comfort of your sofa. On the other hand, it can also be a destructive and hurtful place. With the guidance of parents, teachers, law enforcement, and groups that deal with online harassment, children will\u00a0be steered in a\u00a0direction where future generations can still experience the internet as a safe place to be.<\/p>\n<p>For additional resources, take a look at our 2016 blogs from <a href=\"https:\/\/en.wikipedia.org\/wiki\/Anti-Bullying_Week\" target=\"_blank\" rel=\"noopener noreferrer\">Anti-Bullying Week<\/a>:<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/11\/pledge-to-use-your-power-for-good-this-anti-bullying-week\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pledge to use your power for good this Anti-Bullying Week<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/11\/anti-bullying-week-monkey-see-monkey-do\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u201cMonkey see, monkey do\u201d<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/11\/anti-bullying-week-no-sympathy-for-the-bully\/\" target=\"_blank\" rel=\"noopener noreferrer\">No sympathy for the \u2018bully\u2019?<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/11\/anti-bullying-week-of-weasels-snakes-and-queen-bees\/\" target=\"_blank\" rel=\"noopener noreferrer\">Of weasels, snakes, and queen bees<\/a><\/li>\n<\/ul>\n<p><em>The Malwarebytes Labs Team<\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/fyi\/2017\/06\/tackling-the-myths-surrounding-cyberbullying\/\">Tackling the myths surrounding cyberbullying<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/fyi\/2017\/06\/tackling-the-myths-surrounding-cyberbullying\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Fri, 16 Jun 2017 15:00:52 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/fyi\/2017\/06\/tackling-the-myths-surrounding-cyberbullying\/' title='Tackling the myths surrounding cyberbullying'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/05\/shutterstock_603672437.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Misconceptions abound when it comes to cyberbullying. In this post, we&#8217;ll identify six of these &#8220;myths&#8221; and then explain why they&#8217;re worth discrediting.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/\" rel=\"category tag\">101<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/fyi\/\" rel=\"category tag\">FYI<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/child-security-online\/\" rel=\"tag\">child security online<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cyberbullying\/\" rel=\"tag\">cyberbullying<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/misconceptions\/\" rel=\"tag\">misconceptions<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/myths\/\" rel=\"tag\">myths<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/online-bullying\/\" rel=\"tag\">online bullying<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/online-harassment\/\" rel=\"tag\">online harassment<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/teen-security\/\" rel=\"tag\">teen security<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/fyi\/2017\/06\/tackling-the-myths-surrounding-cyberbullying\/' title='Tackling the myths surrounding cyberbullying'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/fyi\/2017\/06\/tackling-the-myths-surrounding-cyberbullying\/\">Tackling the myths surrounding cyberbullying<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,12676,6503,10520,12677,11197,12678,12679,12680],"class_list":["post-7970","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-child-security-online","tag-cyberbullying","tag-fyi","tag-misconceptions","tag-myths","tag-online-bullying","tag-online-harassment","tag-teen-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7970"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7970\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7970"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}