%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 19 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 18 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240521192324+00'00') /ModDate (D:20240521192324+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 6364 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 69.220 521.469 677.514 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 69.220 l 565.984 69.220 l 565.984 745.984 l f 45.266 746.734 m 45.266 69.220 l 46.016 69.220 l 46.016 745.984 l f 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(BEAT THE CYBERBULLY)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(Cyberbullying)] TJ ET BT 121.028 564.033 Td /F4 9.0 Tf [( is deliberately and repeatedly harming or harassing someone using electronic technology - this includes )] TJ ET BT 61.016 553.044 Td /F4 9.0 Tf [(devices and equipment such as cell phones, computers, and tablets, as well as communication tools including social )] TJ ET BT 61.016 542.055 Td /F4 9.0 Tf [(media sites, text messages, chat, and websites.)] TJ ET BT 61.016 522.066 Td /F4 9.0 Tf [(With the increased use of communication technology, cyberbullying has become increasingly common, especially among )] TJ ET BT 61.016 511.077 Td /F4 9.0 Tf [(teenagers.While the term cyberbullying is used predominantly for children or teenagers, )] TJ ET BT 414.158 511.077 Td /F3 9.0 Tf [(cyberstalking)] TJ ET BT 472.181 511.077 Td /F4 9.0 Tf [( or )] TJ ET BT 61.016 500.088 Td /F4 9.0 Tf [(cyberharassment is when the same behaviour occurs in adults.)] TJ ET BT 61.016 480.099 Td /F3 9.0 Tf [(What is cyberbullying or -stalking?)] TJ ET BT 61.016 460.110 Td /F4 9.0 Tf [(The main goal of this harassment is to threaten a person's reputation, employment, earnings, safety or try to turn people )] TJ ET BT 61.016 449.121 Td /F4 9.0 Tf [(against them. Cyberbullies aim to intimidate, hurt, control, manipulate, humiliate or falsely discredit someone. Their actions )] TJ ET BT 61.016 438.132 Td /F4 9.0 Tf [(are deliberate, hostile, usually repeated and intended to harm.)] TJ ET BT 61.016 418.143 Td /F4 9.0 Tf [(Cyberstalkers use public forums, social media or online information sites to launch their attacks on. Online platforms )] TJ ET BT 61.016 407.154 Td /F4 9.0 Tf [(provide anonymity and bullies can remain ignorant of the consequences their attacks have on the victims.According to the)] TJ ET BT 61.016 396.165 Td /F4 9.0 Tf [(National Council on Crime Prevention's survey, 81% of teenagers thought others cyberbully because it's funny.)] TJ ET BT 61.016 376.176 Td /F4 9.0 Tf [(Cyberbullying can come in various forms. It can be someone repeatedly sending e-mails or text messages even when the )] TJ ET BT 61.016 365.187 Td /F4 9.0 Tf [(person clearly stated they don't want them. It can include repeated threats, sexual remarks, hate speech, false )] TJ ET BT 61.016 354.198 Td /F4 9.0 Tf [(accusations or ridiculing someone.)] TJ ET BT 61.016 334.209 Td /F4 9.0 Tf [(Some bullies/stalkers will even go so far as to hacking into a site and changing information or posting false statements to )] TJ ET BT 61.016 323.220 Td /F4 9.0 Tf [(humiliate or discredit a person. They may also publicise a victim's personal data or create a fake account to use to )] TJ ET BT 61.016 312.231 Td /F4 9.0 Tf [(defame, discredit or humiliate them.)] TJ ET BT 61.016 292.242 Td /F4 9.0 Tf [(The 8 most common cyberbullying tactics used by teens according to )] TJ ET 0.373 0.169 0.255 rg BT 338.630 292.242 Td /F4 9.0 Tf [(www.wikipedia.org)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 338.630 291.091 m 413.141 291.091 l S 0.400 0.400 0.400 rg BT 413.141 292.242 Td /F4 9.0 Tf [(are the following:)] TJ ET BT 78.360 272.269 Td /F4 9.0 Tf [(1.)] TJ ET BT 91.016 272.253 Td /F4 9.0 Tf [(Exclusion: Teenagers intentionally exclude others from an online group.)] TJ ET BT 78.360 261.280 Td /F4 9.0 Tf [(2.)] TJ ET BT 91.016 261.264 Td /F4 9.0 Tf [(Cyberstalking: Teens will harass others by constantly sending emails, messages, or tagging others in posts they )] TJ ET BT 91.016 250.275 Td /F4 9.0 Tf [(dont want to be tagged in.)] TJ ET BT 78.360 239.302 Td /F4 9.0 Tf [(3.)] TJ ET BT 91.016 239.286 Td /F4 9.0 Tf [(Gossip: Post or send cruel messages that damage anothers reputation, relationships, or confidence.)] TJ ET BT 78.360 228.313 Td /F4 9.0 Tf [(4.)] TJ ET BT 91.016 228.297 Td /F4 9.0 Tf [(Outing/Trickery: Trick another teen into revealing secrets or embarrassing information which the cyberbully will )] TJ ET BT 91.016 217.308 Td /F4 9.0 Tf [(then share online.)] TJ ET BT 78.360 206.335 Td /F4 9.0 Tf [(5.)] TJ ET BT 91.016 206.319 Td /F4 9.0 Tf [(Harassment: Post or send offensive, insulting, and mean messages repeatedly.)] TJ ET BT 78.360 195.346 Td /F4 9.0 Tf [(6.)] TJ ET BT 91.016 195.330 Td /F4 9.0 Tf [(Impersonation: Create fake accounts to exploit another teens trust. They may also hack into an account and post )] TJ ET BT 91.016 184.341 Td /F4 9.0 Tf [(or send messages that are damaging to the persons reputation or relationships.)] TJ ET BT 78.360 173.368 Td /F4 9.0 Tf [(7.)] TJ ET BT 91.016 173.352 Td /F4 9.0 Tf [(Cyber Threats: Threaten or imply violent behaviour toward others to make them feel uncomfortable.)] TJ ET BT 78.360 162.379 Td /F4 9.0 Tf [(8.)] TJ ET BT 91.016 162.363 Td /F4 9.0 Tf [(Flaming: Fights online that involve hateful or offensive messages that may be posted on various websites, forums, )] TJ ET BT 91.016 151.374 Td /F4 9.0 Tf [(or blogs.)] TJ ET BT 61.016 131.385 Td /F4 9.0 Tf [(More definitions of cyberbullying can be found on )] TJ ET 0.373 0.169 0.255 rg BT 259.115 131.385 Td /F4 9.0 Tf [(The Centre for Justice and Crime Prevention's website.)] TJ ET 0.18 w 0 J [ ] 0 d 259.115 130.234 m 478.913 130.234 l S 0.400 0.400 0.400 rg BT 61.016 111.396 Td /F3 9.0 Tf [(Who are the bullies?)] TJ ET BT 61.016 91.407 Td /F4 9.0 Tf [(The root of cyberbullying is the same as face-to-face bullying. The only difference is the convenience and anonymity of )] TJ ET BT 61.016 80.418 Td /F4 9.0 Tf [(technologywhich makes it even easier.)] TJ ET q 225.000 0 0 174.000 61.016 398.824 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 398.8243 286.0157 572.8243 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/2016/11/cyber-bullying/bully-655659_960_720/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 338.6297 291.4096 413.1407 300.5671 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://en.wikipedia.org/wiki/Cyberbullying) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 259.1147 130.5526 478.9127 139.7101 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://www.cyberbullying.org.za/what-is-cyberbullying.html) >> endobj 18 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 232 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 15126>> stream JFIF;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 82 C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$," }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?(((((((((((((((((((((QEQEQEQF((((((((((((((((((((((((((((((((? 3EP3Ef(E4Q@Q@Q@Q@h3EPEPEP3EQEQEQEQ((4f(3햇m۫o`y }9`O5m5>Ѝ>2.؟x@Ji;cJTVjݝe3;VREXnTM<=&_TW>i$1;M5~s =kMeë[~HW) >np)%FG}Bt s֞ufbɧ_Mv>.a8CTgf#i:HiMFjZ>A?R?'ռRnLI\`plTjzݵXi?{qBpMsF3ڿᲮ[:񝚙}?:m~.VMrNN m` Cý|7:؉Ñ"x G왨>,}vT 0[ pƗy#o>&xö>U{ {/w2+c0Þ95lX9OW.?;]˿hyO-v* 'gӉ^U!Ls^+)_Dz8l6tԪOigZ6øpׄlצV/[VGxz/ C5խ6@j8iaºD@*ۜa 'oJh}jym :w|K.Y ʌ)T)AnD0ҚM=ϠojZKhǂo$W#]C8^<05:|a/ p):Ox)aOX65v w=yz潯Bu7k孻^¨t&lztB="1TȵzHZޅWk i.e]WغT7mfUbT9Ǘ5蟵kcW1pV2:_+x@qҒ:3nI1n<cuݜ2KKl)9I3a$l|}AgdÚs*P)7Qs$u_9=iI쮮ث9dXd`Gp]7Omo#g4q>F Y@Qɪb֒t}\RQEHG.#ᩦ'bi}ԧom&4aF7_bOGZʴ`W p-ӿ|eHEu.6' 5z vI*o(*yںo5k;^BɅ ]BݙSnˆ'$QK>0†81 +p3NzW &_=9ziE=zY_rI<1s"C:6O>H#\4G _A6,Aw<d%m`0+ۥ`xo4Zb=Ai\,*|CI&^AiqQzׯU$څ:70Wv=+g[Coqf:}h`wlɂ9H Ӛ\k~'/"xu8Y H#:_ksw3w%ҬI a\q]3Bwwk]Oml?]J$Zջly- Hܟ*Y])7c;''ԡj7;OY&C_1MFm;LqŤ1BZ2e$Ԑs`SE]|vt3-ɹ@O(W}Sҭ>+H_k'm*AN+y+r; մj!+#$Hi 3pk˖e:WGT0I>b$iKG$%Oɑd }'is[[T_/ȋ@JpNz>|"YٱVB $>Z?:S6gTW i}68T $MZ *]G}JLE\hpHc9<[\xױqqvCk >r7#yZ|jODr0CO^sm͉qFH;'ֺ.W*e,qRd;/xKLJܕ+;dY.%)9Yӯ*wHe˨-.-[x|TciA)é*;q/Ñ>)?);BƹnNkƯ$š>ސ zlr/ChvG? -/3`+8`!4S*(0 Դi:i\/RHRt|O[x:BubiI0lB8l>*Z{п:xEmܾKUp%]J>n/?lٵͨAy}ȿ_坥nK67зħKX? WPl/a`_V:t3Mݮ$ yY-@ y\w.,RK2yFL0j#X#8^a{ka8vmEӴEyo/98cxnfWAv#Iz-a3<4>8M9BqdBAV,Gvb.RvjTil4{KUF $5)ɷr7ː2:zVR־-96cE8$S_.[ۥAs-$N zm$~-J/H9l*~cvw!P7K&qyY,s+k[x ;BHUI﹟]όPůfݽQ;6Tsk7k 1JԛK^X['V9iuşs*E ElcUqpzaa}^R~܌iqr GBMuӮVMO֎"@``mvGxEۑhUq34li;EPf%)2E+.:,ɞ~W<1k{]n[Y/.8Dt.p ?hnzD׍WZO9\^Gx ˙ 8'=)#gD oݸ*@a2O\zץӵg6A_|S"['Dd7b\}-WYԺvv|eMмY r>;Op$x~dףD!k4mGZܼw11˴e\/ڭj~ W[x`iRɯ.;I'SǛ;20A"lonB]ϥi?on#mho njoh7g dq+ӍjM;_O+;o櫫h[Nu7!+f>/C[H=ͺEclyH@xKƛ -Djki'4N aASXݿ!{MO{5b[wD>lp@\]5+rj-N{>ƞ,ҴhF!/̂.F@TS޿D"!cB"`:_%ʾu4y4 |Z P$U\d޾'Š(A_(~$"lh>!j;嶰gbGTWF4xr>0 2\4APH'Ծ"]oźݷm1[$fG_Tlkzם%h'x|QsJ,+S#c%'ֺMg[ӭ-/|GKiY3]b2̣Z9;rK孻6uKSVXabKrN6y9H?iZ-NJ=zl3v$| 8 H\Ïj^ a\h̶MܦFb) uEm .$ '"0UU6B`=JyeI$_MrhݨſMmxgᏍ$+غ~FOӵ=Z m.PI6U5K]t CeI?7|zW *ݦx},ܩ9Igx ״ʵ~:nQ4z_ R;D6ږd'bx|DԮd/ vЇ`#11\f緵܉Z͓B >l_ V1mη0̪ k6_0mh'ss|e?6/ޱLDKKszE=EAvY< i< c\Gt$-Fqolқĺ,`YVO)@03 ,q8ǃ5Ǿ E!Z<83_.p6 W-R>ZUoc]ⷋཊMBKK_1O3~t\7siSMqZ@gHBEba:qR,x-B&7g-!hD|c>:]SΗ0,A >W u$^QK_NI.KKwrmfх%&TVvbA#W KmMIXF4;[<9RT^Lb/g~[l'$6N9?_e,𧈥ӢmZ*?+ؾL\b,V6<kR פI2(ŇP@Ƕ{Wi$"[U7Nn`w0Fq[w7Xx~"}]=PFFPw vH;đIt!szXd,A;W x܃I+~'1g^m''d>Xlorhs'9⅖室]ihV"!'j?ZoFyھI38*ĸg2nQWԿKma2OmfF,$?f9UIh=ʊ(F7ͬjr$`Ɍ}*hlűTInVx\`a5o E}[R$i&*mrTc {dEj2yֶMŻFh [Y-<'`Op]h%] BɻxʜqN,Ϥ=ٳGmK8 9*!#wl uU9$f3\h]?e 9TqLϑϸ dZ.oh:U!訡G*w.b(jMOH|u6֑ m,tQߥ}9_)~<_':ywugn,^&$,рqF}}k$F{k\Ib(~k־voWy[([Ī2s5Ol4mUТ{wc]0Ӓ+uuc3iRZF$VnctVF;rX1pw dVuož%X`)p0@ 99N'4LIDbAXԕYu=;g1 # S_:_ZZï.鎜' 3AA஦Ȭ;fl?||=޻$QI@%!&U\r++[l4gw^<,~m[^r9D>9FA%_#>Ö{޳KjW:3xWOU5k>VY ?ylV>xfG.Q#;PHᤒiY-a#ct]5*Xhu;[o~2l&m'bs0Q\\-*Ib{WeiCGkduigrE}M/Þ 䰷ԯ,52'Y Lf^_'\hUiQZ?~7i7 Kn~OF>}]#}NDpa9^xZ|Jp>YnN$!prp9sm$? /e=>;nb8nTs{'{x(Il׮_ozg2hZƧ6mwcӷPySBYl[#NV)npǝжFk _Ű$dX'?e3|g+ҬsF捱csJQקo`爃qVn  4]k|n:@r~~8k)t𯈓IW[Eնc<9y|E8" o8ba.=AU?V4l4V4g4C pң35PIkz٣";.[xg54hF|cV?MJ,ޫ%m|,*LZ0f푚U㭖T%K__,|A:vK*1c[mnmn1 / ;R[\Ԝ+\85Bs}qY˲=w?e hhJr2#|ٯq[_Fq*˦8Q$9tRO՞8b=6Vr,KcـǞkVljׂڥt ( g~i>iӦys1ξk#>.'3(x#.铏NG?Q5x-&߇>~_O6xX9 H@'#W͗K/5Ⱦ[@uh[j1gImd}3q`4au0H `qe~gOQ~r֍;鯽tz.oe~D; ́v8&J̥Pʭ8+fPYl00B8}gv,t(oΒIG% IVV:ibp|i|N^/} m_/(XΟ'iϯ4Ii;v3S^og.a4 .ˉ7!lW?AeQu-IFr@$3*G2՜]ӓx0xZH3[l¿?UbڼV@T4*cA ~ׅw!q NxF :q^CJӌe~$u$' I+pеA{GvrMru ķV}ۉ$B/\ZUφuke+P-1;z^HiOx[H—,a'$\z_x6;w;.m̒(wڼv*ez8HI=[֛t0|k7&(> ,C4?0wN| .c' gvQʰF9ZB.UaϾ]*@ZՇ J݌12~L8ð+'sc^NNRoiUsjRvZ%׽n=*P:i/"E$m'~9q{d՘~Zk"?& ow|ۧLʶu JUEiťkB-O EZOo)lS{ VApqVu1mVZGMZn6ޝ/Wy1lOx\XϽ|hno$MId1$;R@^//K~_^&ɡ'V,{95+jQmV).y@۲9M&;3>"uIأN~gu5H-#*ƠV&1#+ɧk#Z9Kh.e{K=]>)cO+19 k8ŔG5xNa]Miyk2)8ݱ$Wˎ| {øI_SEo^%[I*۳gwn=OF[MNɪ; +"D} H]o=Hgl?Y%:/*NZ}Z]k+ O1o lcAX渉I1~T˗yn|4]AHVp`X1c;?7+ QdG ,*(S@cyW~ ^2mkɒ@ E0<7͞;((+>,Ņ֤%k~-"HPFף@>kUǰ_:2tlnz~zl@-Woqfu;Hb?3pp8_?Ś_/> endobj 20 0 obj << /Length 3045 >> stream 0.400 0.400 0.400 rg 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 472.621 521.469 285.363 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 472.621 m 566.734 472.621 l 565.984 473.371 l 46.016 473.371 l f 566.734 757.984 m 566.734 472.621 l 565.984 473.371 l 565.984 757.984 l f 45.266 757.984 m 45.266 472.621 l 46.016 473.371 l 46.016 757.984 l f 0.400 0.400 0.400 rg BT 61.016 740.193 Td /F4 9.0 Tf [(Usually, a bully will know their victim and attackthem because of their own prejudice, whether it's race, religion or sexual )] TJ ET BT 61.016 729.204 Td /F4 9.0 Tf [(orientation. Or merely because they're "not cool" or they didn't like something they said on social media.)] TJ ET BT 61.016 709.215 Td /F4 9.0 Tf [(It's important to keep in mind that, in general, a bully's behaviour stems from their own problems or issues. According to )] TJ ET BT 61.016 698.226 Td /F4 9.0 Tf [(Stopbullying.gov, there are two main groups who harass others. Popular kids or teens bully because they think it will make )] TJ ET BT 61.016 687.237 Td /F4 9.0 Tf [(them more popular or hurting others give them a false perception of power. At the other end of the spectrum are those )] TJ ET BT 61.016 676.248 Td /F4 9.0 Tf [(who bully because they are victims of bullying themselves and it's their way to lash out.)] TJ ET BT 61.016 654.459 Td /F3 9.0 Tf [(How to beat cyberbullying or cyberstalking)] TJ ET BT 61.016 634.470 Td /F4 9.0 Tf [(In most countries, cyberstalking has the same consequences as physical stalking. South Africadoes not have specific )] TJ ET BT 61.016 623.481 Td /F4 9.0 Tf [(legislation dealing with cyberbullying. The victims of cyberbullying, therefore, have to rely on criminal law and/or civil law. )] TJ ET BT 61.016 612.492 Td /F4 9.0 Tf [(More information on these laws can be found on )] TJ ET 0.373 0.169 0.255 rg BT 255.614 612.492 Td /F4 9.0 Tf [(The Centre for Justice and Crime Prevention's website.)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 255.614 611.341 m 475.412 611.341 l S 0.400 0.400 0.400 rg BT 61.016 592.503 Td /F4 9.0 Tf [(For this reason, it's important to deal with cyberbullying as soon as it rears its head. The )] TJ ET 0.373 0.169 0.255 rg BT 412.880 592.503 Td /F4 9.0 Tf [(video below)] TJ ET 0.18 w 0 J [ ] 0 d 412.880 591.352 m 460.400 591.352 l S 0.400 0.400 0.400 rg BT 460.400 592.503 Td /F4 9.0 Tf [( provides some )] TJ ET BT 61.016 581.514 Td /F4 9.0 Tf [(valuable hints in this regard.)] TJ ET BT 61.016 561.525 Td /F4 9.0 Tf [()] TJ ET BT 87.826 541.536 Td /F4 9.0 Tf [([SOURCES: http://www.bullying.co.uk/cyberbullying/,http://www.deletecyberbullying.org/why-do-people-cyberbully/, )] TJ ET BT 333.418 530.547 Td /F4 9.0 Tf [(http://www.cyberbullying.org.za/south-african-law.html])] TJ ET BT 61.016 510.558 Td /F4 9.0 Tf [()] TJ ET BT 61.016 490.569 Td /F4 9.0 Tf [(Posted in:Communication,E-mail,General,Security | Tagged:Cyberbullying | With 0 comments)] TJ ET endstream endobj 21 0 obj << /Type /Annot /Subtype /Link /A 22 0 R /Border [0 0 0] /H /I /Rect [ 255.6137 611.6596 475.4117 620.8171 ] >> endobj 22 0 obj << /Type /Action /S /URI /URI (http://www.cyberbullying.org.za/south-african-law.html) >> endobj 23 0 obj << /Type /Annot /Subtype /Link /A 24 0 R /Border [0 0 0] /H /I /Rect [ 412.8797 591.6706 460.3997 600.8281 ] >> endobj 24 0 obj << /Type /Action /S /URI /URI (https://www.youtube.com/watch?v=Jwu_7IqWh8Y) >> endobj xref 0 25 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000339 00000 n 0000000376 00000 n 0000000511 00000 n 0000000607 00000 n 0000007023 00000 n 0000007135 00000 n 0000007242 00000 n 0000007362 00000 n 0000007478 00000 n 0000007605 00000 n 0000007727 00000 n 0000007855 00000 n 0000007950 00000 n 0000008078 00000 n 0000008188 00000 n 0000023483 00000 n 0000023574 00000 n 0000026672 00000 n 0000026800 00000 n 0000026906 00000 n 0000027034 00000 n trailer << /Size 25 /Root 1 0 R /Info 5 0 R >> startxref 27129 %%EOF cyberbullying « Informasietegnologie
  • Recent Posts

  • Categories

  • Archives

cyberbullying

Beat the cyberbully

Friday, November 11th, 2016

bully-655659_960_720Cyberbullying is deliberately and repeatedly harming or harassing someone using electronic technology  – this includes devices and equipment such as cell phones, computers, and tablets, as well as communication tools including social media sites, text messages, chat, and websites. 

With the increased use of communication technology, cyberbullying has become increasingly common, especially among teenagers. While the term cyberbullying is used predominantly for children or teenagers, cyberstalking or cyberharassment is when the same behaviour occurs in adults. 

What is cyberbullying or -stalking?

The main goal of this harassment is to threaten a person’s reputation, employment, earnings, safety or try to turn people against them. Cyberbullies aim to intimidate, hurt, control, manipulate, humiliate or falsely discredit someone. Their actions are deliberate, hostile, usually repeated and intended to harm.

Cyberstalkers use public forums, social media or online information sites to launch their attacks on. Online platforms provide anonymity and bullies can remain ignorant of the consequences their attacks have on the victims. According to the National Council on Crime Prevention’s survey, 81% of teenagers thought others cyberbully because it’s funny. 

Cyberbullying can come in various forms. It can be someone repeatedly sending e-mails or text messages even when the person clearly stated they don’t want them. It can include repeated threats, sexual remarks, hate speech, false accusations or ridiculing someone.

Some bullies/stalkers will even go so far as to hacking into a site and changing information or posting false statements to humiliate or discredit a person. They may also publicise a victim’s personal data or create a fake account to use to defame, discredit or humiliate them.

The 8 most common cyberbullying tactics used by teens according to www.wikipedia.org are the following:

  1. Exclusion: Teenagers intentionally exclude others from an online group.
  2. Cyberstalking: Teens will harass others by constantly sending emails, messages, or tagging others in posts they don’t want to be tagged in.
  3. Gossip: Post or send cruel messages that damage another’s reputation, relationships, or confidence.
  4. Outing/Trickery: Trick another teen into revealing secrets or embarrassing information which the cyberbully will then share online.
  5. Harassment: Post or send offensive, insulting, and mean messages repeatedly.
  6. Impersonation: Create fake accounts to exploit another teen’s trust. They may also hack into an account and post or send messages that are damaging to the person’s reputation or relationships.
  7. Cyber Threats: Threaten or imply violent behaviour toward others to make them feel uncomfortable.
  8. Flaming: Fights online that involve hateful or offensive messages that may be posted on various websites, forums, or blogs.

More definitions of cyberbullying can be found on The Centre for Justice and Crime Prevention’s website.

Who are the bullies?

The root of cyberbullying is the same as face-to-face bullying. The only difference is the convenience and anonymity of technology which makes it even easier.

Usually, a bully will know their victim and attack them because of their own prejudice, whether it’s race, religion or sexual orientation. Or merely because they’re “not cool” or they didn’t like something they said on social media. 

It’s important to keep in mind that, in general, a bully’s behaviour stems from their own problems or issues. According to Stopbullying.gov, there are two main groups who harass others. Popular kids or teens bully because they think it will make them more popular or hurting others give them a false perception of power. At the other end of the spectrum are those who bully because they are victims of bullying themselves and it’s their way to lash out. 

How to beat cyberbullying or cyberstalking

In most countries, cyberstalking has the same consequences as physical stalking. South Africa does not have specific legislation dealing with cyberbullying. The victims of cyberbullying, therefore, have to rely on criminal law and/or civil law. More information on these laws can be found on The Centre for Justice and Crime Prevention’s website.

For this reason, it’s important to deal with cyberbullying as soon as it rears its head. The video below provides some valuable hints in this regard.

 

[SOURCES: http://www.bullying.co.uk/cyberbullying/, http://www.deletecyberbullying.org/why-do-people-cyberbully/, http://www.cyberbullying.org.za/south-african-law.html]

 

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.