📚 Quick Study Guide: Understanding Cyberbullying
- 📱 Definition: Cyberbullying involves using digital technologies (internet, social media, mobile phones) to repeatedly harass, threaten, embarrass, or target another person.
- 🎭 Anonymity & Reach: Perpetrators can often hide behind anonymity, and their actions can reach a wider audience faster and persist online indefinitely.
- 🗣️ Forms of Cyberbullying:
- 📝 Harassment: Sending hurtful, rude, or insulting messages repeatedly.
- 🤫 Exclusion/Isolation: Intentionally leaving someone out of an online group or game.
- 📸 Impersonation: Pretending to be someone else online to post negative content.
- 🚫 Flaming: Engaging in heated online arguments or verbal attacks.
- 😈 Outing/Trickery: Sharing someone's private information or secrets online without their consent.
- ❓ Cyberstalking: Repeatedly sending messages that include threats of harm or are highly intimidating.
- 💔 Doxing: Revealing personal identifying information about an individual (name, address, workplace) online, often with malicious intent.
- ⚠️ Catfishing: Creating a fake online identity to trick someone into a relationship, often for personal gain or to cause harm.
- 🚨 Impact: Can lead to severe emotional distress, anxiety, depression, academic problems, and even suicidal thoughts in victims.
- 🛡️ Prevention & Response: Block bullies, report incidents to platforms, save evidence, talk to a trusted adult/authority, and promote digital citizenship.
🧠 Practice Quiz: Cyberbullying Scenarios
-
Question 1: Sarah keeps receiving anonymous messages on her social media, threatening to expose an embarrassing photo of her if she doesn't do what the sender asks. What type of cyberbullying is this primarily an example of?
A) Flaming
B) Doxing
C) Cyberstalking
D) Extortion/Threats
-
Question 2: A group of friends constantly creates group chats and posts funny memes, but they deliberately exclude Mark and make fun of him in separate private chats. What cyberbullying behavior is this?
A) Impersonation
B) Exclusion
C) Catfishing
D) Flaming
-
Question 3: Someone creates a fake profile using Alex's name and photos, then posts mean comments on other people's pages, making it seem like Alex wrote them. This is an example of:
A) Outing
B) Harassment
C) Impersonation
D) Cyberstalking
-
Question 4: Emily discovers that a former friend posted her home address, phone number, and school online after an argument. This act is known as:
A) Catfishing
B) Doxing
C) Trickery
D) Flaming
-
Question 5: Jake is in an online gaming community. Another player repeatedly sends him aggressive, insulting messages during games and in private chat, calling him names and telling him to quit. This is a clear instance of:
A) Exclusion
B) Impersonation
C) Harassment
D) Outing
-
Question 6: Maria received a message from someone pretending to be a new student at her school, asking for personal details and private photos. Later, she found out the "new student" was actually someone trying to trick her. What cyberbullying tactic was used?
A) Doxing
B) Catfishing
C) Flaming
D) Cyberstalking
-
Question 7: Two users engage in a public online forum, exchanging extremely aggressive and insulting messages back and forth, escalating into a shouting match using only text. This behavior is best described as:
A) Impersonation
B) Exclusion
C) Flaming
D) Doxing
Click to see Answers
1. D) Extortion/Threats
2. B) Exclusion
3. C) Impersonation
4. B) Doxing
5. C) Harassment
6. B) Catfishing
7. C) Flaming