Cyberbullying Research Center
Welcome to the Cyberbullying Research Center email newsletter! It's National Bullying Prevention Month. What are you doing in your school or community to combat cruelty?
The Cyberbullying Research Center can now be found at cyberbullying.org
! As always, you can find tons
resources to help you identify, prevent, and respond to online aggression. Check out our new site and let us know what you like and what could be improved. You can also connect and interact with us on Facebook
to keep even more up-to-date! If you have any comments or suggestions, please email us at [email protected]
Doxing and Cyberbullying
Slang for “dropping documents,” doxing (also spelled doxxing) typically occurs when someone collects another’s private personal information, such as a home address, contact information or social security number, and subsequently broadcasts or “outs” that information to the public without permission. Crash Override Network (a task force made up of people who have previously been targeted) describes doxxing as a “tactic of mobs of anonymous online groups” whose goal is to scare targets by exposing their personal information online. While your personal information may have nothing to do with them, their objective is to make you fearful about how it could potentially lead to your own victimization. To be sure, it might be prompted by seeking revenge for a perceived affront, or to bring attention to someone who has previously operated under the mask of anonymity or pseudonymity – or might simply be done for “kicks.” The scariest part, of course, is that once your private contact details are put out there electronically, it’s difficult to get them taken down – and is therefore available for anyone with malicious or reckless motives to see, find, and use against you.
Password Management Software for Teens
Think about how many times every day you use a password on a phone, computer, social media site, gaming network, or another online account. Passwords are a huge part of our daily lives. Technically, they serve as authentication to identify people as being who they claim to be. Correct authentication is supposed to prevent others from accessing or altering your personal data, so passwords should be kept very secure. Unfortunately, some people put themselves at risk of cyberbullying, identity theft, or other dangers by sharing or exposing their passwords. For instance, we’ve asked hundreds of groups of students if they know any of their friends’ passwords. The majority say ‘yes’ every single time!
Nothing Works? Taking Stock of America’s “War on Bullying”
The Obama administration arguably declared war on bullying in the fall of 2010 when it convened the first federally-supported Bullying Prevention Summit. In 2011, stopbullying.gov was launched. That same year, I attended a conference hosted by President Obama at the White House, where he said: “If there is one goal of this conference, it is to dispel the myth that bullying is just a harmless rite of passage or an inevitable part of growing up.” Since then, significant resources have been directed toward various programs and initiatives, resulting in what could be characterized as a “Bullying Industrial Complex.” Many companies now offer simple “solutions” to bullying. But are any of these efforts working?
Read more on our blog
Setting up a Free Bullying and Cyberbullying Reporting System with Google Voice
I have written in the past on anonymous reporting systems in schools, and I strongly advocate for them whenever I have the opportunity to speak to educators on how they should prevent cyberbullying. Based on your own observations, I am sure you’d agree with me that youth are way more comfortable texting/typing – especially when it relates to giving emotionally-laden statements or sharing stories of a sensitive or delicate nature to an adult (such as a teacher, counselor, or administrator). Not only do these systems cater to the preferred method of communication for kids, they also offer confidentiality to the person providing the report. Furthermore, they help to empower youth to be agents of change and step up for themselves or for others who are being victimized. Finally, they allow for real-time reporting, can alert you to minor situations before they become major, and can provide a tangible “paper trail” of documentation for each and every issue that is made known.
Read more on our blog