{"id":11548,"date":"2016-11-11T09:21:14","date_gmt":"2016-11-11T07:21:14","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=11548"},"modified":"2016-11-11T10:56:49","modified_gmt":"2016-11-11T08:56:49","slug":"cyber-bullying","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2016\/11\/cyber-bullying\/","title":{"rendered":"[:en]Beat the cyberbully[:af]Wat is kuberafknouery?"},"content":{"rendered":"<p>[:en]<b><a href=\"http:\/\/blogs.sun.ac.za\/it\/2016\/11\/cyber-bullying\/bully-655659_960_720\/\" rel=\"attachment wp-att-11550\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2016\/11\/bully-655659_960_720-300x232.jpg\" alt=\"bully-655659_960_720\" width=\"300\" height=\"232\" align=\"right\" \/><\/a>Cyberbullying<\/b> is deliberately and repeatedly harming or harassing someone using electronic technology \u00a0&#8211; this includes devices and equipment such as cell phones, computers, and tablets, as well as communication tools including social media sites, text messages, chat, and websites.\u00a0<\/p>\n<p>With the increased use of communication technology, cyberbullying has become increasingly common, especially among teenagers.\u00a0While the term cyberbullying is used predominantly for children or teenagers, <strong>cyberstalking<\/strong> or cyberharassment is when the same behaviour occurs in adults.\u00a0<\/p>\n<p><strong>What is cyberbullying or -stalking?<\/strong><\/p>\n<p>The main goal of this harassment is to threaten a person&#8217;s reputation, employment, earnings, safety or try to turn people against them. Cyberbullies aim to intimidate, hurt, control, manipulate, humiliate or falsely discredit someone. Their actions are deliberate, hostile, usually repeated and intended to harm.<\/p>\n<p>Cyberstalkers use public forums, social media or online information sites to launch their attacks on. Online platforms provide anonymity and bullies can remain ignorant of the consequences their attacks have on the victims.\u00a0According to the\u00a0National Council on Crime Prevention&#8217;s survey, 81% of teenagers thought others cyberbully because it&#8217;s funny.\u00a0<\/p>\n<p>Cyberbullying can come in various forms. It can be someone repeatedly sending e-mails or text messages even when the person clearly stated they don&#8217;t want them. It can include repeated threats, sexual remarks, hate speech, false accusations or ridiculing someone.<\/p>\n<p>Some bullies\/stalkers will even go so far as to hacking into a site and changing information or posting false statements to humiliate or discredit a person. They may also publicise a victim&#8217;s personal data or create a fake account to use to defame, discredit or humiliate them.<\/p>\n<p>The 8 most common cyberbullying tactics used by teens according to <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cyberbullying\">www.wikipedia.org<\/a>\u00a0are the following:<\/p>\n<ol>\n<li>Exclusion: Teenagers intentionally exclude others from an online group.<\/li>\n<li>Cyberstalking: Teens will harass others by constantly sending emails, messages, or tagging others in posts they don\u2019t want to be tagged in.<\/li>\n<li>Gossip: Post or send cruel messages that damage another\u2019s reputation, relationships, or confidence.<\/li>\n<li>Outing\/Trickery: Trick another teen into revealing secrets or embarrassing information which the cyberbully will then share online.<\/li>\n<li>Harassment: Post or send offensive, insulting, and mean messages repeatedly.<\/li>\n<li>Impersonation: Create fake accounts to exploit another teen\u2019s trust. They may also hack into an account and post or send messages that are damaging to the person\u2019s reputation or relationships.<\/li>\n<li>Cyber Threats: Threaten or imply violent behaviour toward others to make them feel uncomfortable.<\/li>\n<li>Flaming: Fights online that involve hateful or offensive messages that may be posted on various websites, forums, or blogs.<\/li>\n<\/ol>\n<p>More definitions of cyberbullying can be found on <a href=\"http:\/\/www.cyberbullying.org.za\/what-is-cyberbullying.html\">The Centre for Justice and Crime Prevention&#8217;s website.<\/a><\/p>\n<p><strong>Who are the bullies?<\/strong><\/p>\n<p>The root of cyberbullying is the same as face-to-face bullying. The only difference is the convenience and anonymity of technology\u00a0which makes it even easier.<\/p>\n<p>Usually, a bully will know their victim and attack\u00a0them because of their own prejudice, whether it&#8217;s race, religion or sexual orientation. Or merely because they&#8217;re &#8220;not cool&#8221; or they didn&#8217;t like something they said on social media.\u00a0<\/p>\n<p>It&#8217;s important to keep in mind that, in general, a bully&#8217;s behaviour stems from their own problems or issues. According to Stopbullying.gov, there are two main groups who harass others. Popular kids or teens bully because they think it will make them more popular or hurting others give them a false perception of power. At the other end of the spectrum are those who bully because they are victims of bullying themselves and it&#8217;s their way to lash out.\u00a0<\/p>\n<p> <strong>How to beat cyberbullying or cyberstalking<\/strong><\/p>\n<p>In most countries, cyberstalking has the same consequences as physical stalking. South Africa\u00a0does not have specific legislation dealing with cyberbullying. The victims of cyberbullying, therefore, have to rely on criminal law and\/or civil law. More information on these laws can be found on <a href=\"http:\/\/www.cyberbullying.org.za\/south-african-law.html\">The Centre for Justice and Crime Prevention&#8217;s website.<\/a><\/p>\n<p>For this reason, it&#8217;s important to deal with cyberbullying as soon as it rears its head. The <a href=\"https:\/\/www.youtube.com\/watch?v=Jwu_7IqWh8Y\">video below<\/a> provides some valuable hints in this regard.<\/p>\n<p><iframe loading=\"lazy\" src=\"\/\/www.youtube.com\/embed\/Jwu_7IqWh8Y\" width=\"560\" height=\"314\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: right;\">[SOURCES: http:\/\/www.bullying.co.uk\/cyberbullying\/,\u00a0http:\/\/www.deletecyberbullying.org\/why-do-people-cyberbully\/, http:\/\/www.cyberbullying.org.za\/south-african-law.html]<\/p>\n<p>&nbsp;<\/p>\n<p>[:af]<b>Kuberafknouery<\/b> (<em>cyberbullying<\/em>) kan gedefinieer word as \u0149 opsetlike en aanhoudende poging om iemand leed aan te doen of te teister deur middel van elektroniese tegnologie. Dit sluit toestelle en toerusting soos selfone, rekenaars en tablette in, sowel as kommunikasiemiddele soos sosiale media webwerwe, teksboodskappe, kletsprogramme en webwerwe.<img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2016\/11\/bully-655659_960_720-300x232.jpg\" alt=\"bully-655659_960_720\" width=\"300\" height=\"232\" align=\"right\" \/><\/p>\n<p>Kuberafknouery, veral onder tieners, het toegeneem met die dienooreenkomstige toename in gebruik van tegnologie. Terwyl kuberafknouery gebruik word vir kinders en tieners, is die term vir dieselfde optrede by volwassenes kuberagtervolging (<em>cyberstalking<\/em>) of kuberteistering (<em>cyberharassment<\/em>)<\/p>\n<p><strong>Wat is kuberafknouery of -teistering?<\/strong><\/p>\n<p>Teistering se hoofdoel is om iemand se reputasie, veiligheid, werk of inkomste skade aan te doen of om ander mense teen hom\/haar te laat draai. Die kuberafknouer wil die slagoffer intimideer, seermaak, beheer, manipuleer, verkleineer of valslik diskrediteer. Hulle aksies is herhalend, opsetlik, vyandig en bedoel om skade aan te doen.<\/p>\n<p>Kuberboelies gebruik openbare forums, sosiale media of aanlyn inligtingswebwerwe. Aanlyn platforms gee aan boelies die mantel van anonimiteit en sodoende kan hulle maklik die gevolge van hul aksies verontagsaam, vermy of ignoreer. \u00a0Volgens \u0149 Amerikaanse opname deur die <em>National Council on Crime<\/em>\u00a0<em>Prevention <\/em>glo<em>\u00a0<\/em>81% van tieners dat kuberafknouery plaasvind omdat dit grappig is. A.g.v. die anonimiteit sien of besef die afknouers nooit die skade wat hulle aanrig nie.\u00a0<\/p>\n<p>Kuberafknouery kom in verskeie vorme voor. Dit kan iemand wees wat aanhoudend ongevraagde e-posse of teksboodskappe aan iemand stuur. Dit kan ook herhaalde dreigemente, seksuele opmerkings, haatspraak, valse beskuldigings of spottery wees.\u00a0<\/p>\n<p>Sommige teisteraars sal selfs so ver gaan as om by \u0149 webwerf in te breek en iemand se inligting te verander of vals stellings te plaas. Hulle kan ook die persoon se persoonlike inligting plaas of \u0149 vals rekening skep om\u00a0die persoon te verneder of in die skande te bring.<\/p>\n<p>Volgens <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cyberbullying\">www.wikipedia.org<\/a>\u00a0 is die 8 algemeenste kuberafknou-taktieke wat tieners gebruik die volgende:<\/p>\n<ol>\n<li>Uitsluiting: Tieners sluit\u00a0opsetlik ander tieners uit van \u0149 aanlyngroep.<\/li>\n<li>Kuberafknouing: Tieners kan ander onophoudelik lastig val deur e-posse of boodskappe te stuur of ander in fotos te merk waarin hulle nie gemerk wil wees nie.<\/li>\n<li>Skinderpraatjies: Plaas of stuur onnodige wrede boodskappe wat iemand se reputasie, verhoudings of selfvertroue leed aan kan doen. \u00a0<\/li>\n<li>Blootstelling\/Bedrie\u00ebry: Oortuig ander tieners om geheime of inligting wat hulle in die verleentheid kan bring te onthul en die inligting dan aanlyn met ander te deel.\u00a0<\/li>\n<li>Teistering: Plaas of stuur aanhoudend beledigende, aanvallende en gemene boodskappe.<\/li>\n<li>Nabootsing: Skep vervalsde rekening om \u0149 ander tiener se vertroue te wen. Hulle kan ook by rekeninge inbreek en as die rekeningeienaar boodskappe plaas of stuur wat skade aan die persoon se reputasie en verhoudings kan veroorsaak.<\/li>\n<li>Kuberdreigemente: Dreig of insinueer gewelddadige optrede teenoor ander om hulle ongemaklik te laat voel.<\/li>\n<li>Vlampos: Aanlyn argumente wat uit hatige en aanvallende boodskappe bestaan en op verskeie webwerwe, forums en blogs geplaas word.<\/li>\n<\/ol>\n<p>Verdere definisies van kuberafknouery kan gekry word op die plaaslike\u00a0<a href=\"http:\/\/www.cyberbullying.org.za\/what-is-cyberbullying.html\">Centre for Justice and Crime Prevention se webwerf.<\/a><\/p>\n<p><strong>Wie is die afknouers?<\/strong><\/p>\n<p>Die rede vir kuberafknouery is dieselfde as fisiese afknouery. Die enigste verskil is dat die anonimiteit en gerief van tegnologie dit selfs nog makliker maak.\u00a0<\/p>\n<p>Iemand wat afknou ken gewoonlik sy teiken en val hulle aan as gevolg van sy eie vooroordele &#8211; of dit ras, geloof of seksuele ori\u00ebntasie is. Dit kan ook net wees omdat hy dink iemand is nie &#8220;cool&#8221; genoeg nie of het iets op sosiale media ges\u00ea waarmee hy nie saamstem nie.\u00a0<\/p>\n<p>Dis belangrik om in ag te neem dat \u0149 afknouer se optrede gewoonlik voortspruit uit sy eie probleme of kwessies. Volgens\u00a0Stopbullying.gov is daar hoofsaaklik twee hoofgroepe wat geneig is om ander te teister. Popul\u00eare kinders of tieners wat glo deur ander seer te maak sal hulle selfs meer popul\u00ear en invloedryk word en aan die ander spektrum diegene wat afknou omdat hulle self afgeknou word en \u0149 uitlaatklep vir hulle frustrasie soek.<\/p>\n<p><strong>Hoe om kuberafknouery of -teistering te hanteer<\/strong><\/p>\n<p>In die meeste lande het kuberteistering dieselfde nagevolge as fisiese teistering. Suid-Afrika het nie spesifieke wette wat fokus op kuberteistering nie. Slagoffers moet hulle dus wend tot kriminele en\/of siviele reg. Meer inligting oor die bestaande wette kan gevind word op die\u00a0<a href=\"http:\/\/www.cyberbullying.org.za\/south-african-law.html\">Centre for Justice and Crime Prevention se webwerf.<\/a><\/p>\n<p>Gevolglik is dit belangrik om kuberafknouery te hanteer sodra dit kopuitsteek. Die <a href=\"https:\/\/www.youtube.com\/watch?v=Jwu_7IqWh8Y\">video <\/a>onder gee waardevolle inligting in di\u00e9 verband.\u00a0<\/p>\n<p><iframe loading=\"lazy\" src=\"\/\/www.youtube.com\/embed\/Jwu_7IqWh8Y\" width=\"560\" height=\"314\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p style=\"text-align: right;\">[BRONNE: http:\/\/www.bullying.co.uk\/cyberbullying\/,\u00a0http:\/\/www.deletecyberbullying.org\/why-do-people-cyberbully\/, http:\/\/www.cyberbullying.org.za\/south-african-law.html]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en]Cyberbullying is deliberately and repeatedly harming or harassing someone using electronic technology \u00a0&#8211; this includes devices and equipment such as cell phones, computers, and tablets, as well as communication tools including social media sites, text messages, chat, and websites.\u00a0 With the increased use of communication technology, cyberbullying has become increasingly common, especially among teenagers.\u00a0While the [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1103,20382,49,29187],"tags":[48732],"class_list":["post-11548","post","type-post","status-publish","format-standard","hentry","category-communication","category-email","category-general","category-security-2","tag-cyberbullying"],"publishpress_future_action":{"enabled":false,"date":"2026-05-09 17:36:15","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/11548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=11548"}],"version-history":[{"count":25,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/11548\/revisions"}],"predecessor-version":[{"id":11591,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/11548\/revisions\/11591"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=11548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=11548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=11548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}