_“Use only that which works, and take it from any place you can find it.”
―
Bruce
Lee
Learn what you're up against
Each cyberbullying tactic involves a technological tool (a cell phone, a laptop, a video camera, or a social networking site for example). Even though the technology may change, the behavior doesn't. Learn how to understand, prevent, combat and transform a:
Digital Pile On: (When a group viciously gangs up on one person through Facebook, Twitter, Ask.fm, a group chat, comments or Instant Messaging);
Rating Website: (When someone uploads a photo of the target and gets bystanders to vote for their "ugliest," "fattest," "dumbest" peers on Instagram, Facebook or Internet polls, eg. "Hot or Not");
Imposter Profile: (When someone creates a fake website or Facebook profile to deceive people into thinking it is genuinely owned and maintained by the target); Haters' Club: (When a mob attacks one person by setting up a websites or Facebook page to harass or persecute the target);
Sexting: (When an explicit photo of oneself is sent electronically to the public for revenge);
Videojacking: (When someone videotapes a target without his knowledge/approval and uploads the video intended to harass the target to a popular video-sharing website.)
Are any of these tactics happening to you or someone you know? Buy the book ($12.50) for an at-home resource or a "what to do" guide for your school.