School/Home Resources
Cyberslammed comes with two downloadable templates: 1) a customizable school policy template on bullying/cyberbullying. 2) An "Acceptable Technology Use" contract for kids that parents can use at home and teachers can use in the classroom.
Closed Facebook groups for adults and teens
![Picture](/uploads/2/5/5/5/2555843/7868456.png?80)
For cyberbullying situations, join our closed Facebook groups for adults and for teens. There, you can share stories, resources and support in a safe environment. The closed Facebook groups will only allow members to view other members' posts; the posts won't be viewable to the public.
Digital Pile On Resources
![Picture](/uploads/2/5/5/5/2555843/_1322238016.png)
This relational aggression tactic is when a group, led by a ringleader, bullies an individual in an online social setting such as an online chat forum. Here, the bully sees an opportunity to belittle the target while obtaining “safety in numbers.” The situation escalates when bystanders provide the bully with encouragement and support.
Netiquette
To prevent being both a target and a bully in a Digital Pile On, it helps to know the ten basic rules of Internet Etiquette, simply known as 'Netiquette. Here are the Core Rules, excerpted from Netiquette by Virginia Shea.
To see real-life example of A Digital Pile On and what the parties did to resolve the situation, check out our blog, Cyberslammed Hot Topics and click on the tag "Digital Pile On."
Netiquette
To prevent being both a target and a bully in a Digital Pile On, it helps to know the ten basic rules of Internet Etiquette, simply known as 'Netiquette. Here are the Core Rules, excerpted from Netiquette by Virginia Shea.
To see real-life example of A Digital Pile On and what the parties did to resolve the situation, check out our blog, Cyberslammed Hot Topics and click on the tag "Digital Pile On."
Rating Website Resources
![Picture](/uploads/2/5/5/5/2555843/_1322237970.png)
With this tactic, the target either uploads a photo of himself to a rating website or a bully posts an unflattering photo of the target without his or her knowledge. The bully and other downraters proceed to negatively rate the target’s attractiveness for the purpose of entertainment or revenge.
The Top Rating Sites
www.Hotornot.com
www.Ratemybody.com
www.Ratemyface.com
www.Cuteornot.com
www.Meoryou.com
To see real-life example of A Rating Website tactic and what the parties did to resolve the situation, check out our blog, Cyberslammed Hot Topics and click on the tag "Rating Website."
Imposter Profile Resources
![Picture](/uploads/2/5/5/5/2555843/_1322237997.png)
With this tactic, a bully creates a fake social networking profile or website to deceive others into believing that it is genuinely owned and maintained by the target. The profile or website provides humiliating, false, and incriminating information about the target and/or secret disclosures, as if the target were willingly “confessing” this information.
To see real-life example of Imposter Profiles and what the parties did to resolve the situation, check out our blog, Cyberslammed Hot Topics and click on the tag "Imposter Profiles."
To see real-life example of Imposter Profiles and what the parties did to resolve the situation, check out our blog, Cyberslammed Hot Topics and click on the tag "Imposter Profiles."
Haters' Club Resources
![Picture](/uploads/2/5/5/5/2555843/_1322238120.png)
With this tactic, a mob is involved in bullying the target, often prompted by discriminatory aspects like race, gender, or sexual orientation. The bullies start up a website or social networking profile with the target’s image and denigrating information so that followers can persistently defame the target’s reputation with name-calling, misinformation, lies, and other forms of harassment.
Trolling Behavior
A Haters’ Club is usually started by one or two bullies relying on the viral participation of their followers to post negative and derogatory statements about the target. This tactic is also known as “trolling.” To fully appreciate the various levels of trolling and source of online conflicts, this is essential reading:
Communities Online: Trolling and Harassment
To see real-life example of a Haters' Club and what the parties did to resolve the situation, check out our blog, Cyberslammed Hot Topics and click on the tag "Haters' Club."
Sexting Resources
![Picture](/uploads/2/5/5/5/2555843/_1322238055.png)
In this tactic, the target bears the responsibility of sending a nude and/or explicitly sexualized photo of himself or herself by cell phone or digital camera to a romantic partner. When the relationship ends, the recipient of this photo may turn into the perpetrator deliberately by forwarding the photo electronically to other recipients or posting the photos publicly on the Internet. An innocent recipient may also become an unwitting perpetrator by forwarding the photo electronically to the authorities. In other cases, a third party can be the perpetrator. For example, someone finds or hijacks the cell phone containing the Sexting photo, then circulates it by cell phone or uploads it to a website, unbeknownst to either the sender or recipient of the photo.
With cell phones, we recommend starting with limiting the device's controls and limiting on the teen's personal freedom at first on what they can do or say on their new phone. If your teen already has a cell phone and has made a mistake, this is the time to start again with new limits.
Parent-Teen Cell Phone Agreement
This downloadable and customizable agreement by Dale Wisely Ph.D. first sets the boundaries.
Filter, Control, Check…Repeat!
Katie LeClerc Greer's blog on EmpoweringParents.com provides common sense advice to parents before giving young tweens a cell phone. She recommends disabling the picture messaging capabilities and Internet access through your cell phone provider right off the bat.
More Severe Cases: Cell Phone Monitoring
In severe cases where the teen's health, intimate images, legal rights or safety may be at risk, we recommend cell phone monitoring software. For a monthly fee of roughly ten dollars, parents can load monitoring software such as My Mobile Watchdog (www.mymobilewatchdog.com) and Mobile Spy (www.mobile-spy.com) into the teen’s cell phone, and then create a list of contacts who are authorized to access the cell phone.
To see real-life example of Sexting incidents and what the parties did to resolve the situation, check out our blog, Cyberslammed Hot Topics and click on the tag "Sexting."
With cell phones, we recommend starting with limiting the device's controls and limiting on the teen's personal freedom at first on what they can do or say on their new phone. If your teen already has a cell phone and has made a mistake, this is the time to start again with new limits.
Parent-Teen Cell Phone Agreement
This downloadable and customizable agreement by Dale Wisely Ph.D. first sets the boundaries.
Filter, Control, Check…Repeat!
Katie LeClerc Greer's blog on EmpoweringParents.com provides common sense advice to parents before giving young tweens a cell phone. She recommends disabling the picture messaging capabilities and Internet access through your cell phone provider right off the bat.
More Severe Cases: Cell Phone Monitoring
In severe cases where the teen's health, intimate images, legal rights or safety may be at risk, we recommend cell phone monitoring software. For a monthly fee of roughly ten dollars, parents can load monitoring software such as My Mobile Watchdog (www.mymobilewatchdog.com) and Mobile Spy (www.mobile-spy.com) into the teen’s cell phone, and then create a list of contacts who are authorized to access the cell phone.
To see real-life example of Sexting incidents and what the parties did to resolve the situation, check out our blog, Cyberslammed Hot Topics and click on the tag "Sexting."
Videojacking Resources
![Picture](/uploads/2/5/5/5/2555843/_1322238156.png)
This tactic refers to a bully who videotapes the target on a cell phone, digital camera, or camcorder, or else finds existing footage and uploads potentially embarrassing or denigrating video online to popular video-sharing sites like YouTube without the expressed permission or knowledge of the target.
To see real-life example of A Videojacking Incident and what the parties did to resolve the situation, check out our blog, Cyberslammed Hot Topics and click on the tag "Videojacking."
To see real-life example of A Videojacking Incident and what the parties did to resolve the situation, check out our blog, Cyberslammed Hot Topics and click on the tag "Videojacking."