123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Advice For Adult Victims Of Cyberbullying

Profile Picture
By Author: sameer hindujo
Total Articles: 1
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

We get a lot of emails, phone calls, and comments on this blog from adults who are being bullied though technology. They stress to us that cyberbullying is not just an adolescent problem. Believe me, we know. We receive more inquiries from adults than teens. We know that cyberbullying negatively affects adults too. It's just that we spend the majority of our efforts studying how this problem impacts school-aged youth due to their tenuous developmental stage. That said, I thought I would take some time here to give the adults who have been victimized out there some general advice.

First, it is important to keep all evidence of the bullying: messages, posts, comments, etc. If there are ways you can determine who exactly is making the comments, also document that. Second, contact the service or content provider through which the bullying is occurring. For example, if you are being cyberbullied on Facebook, contact them. If you are receiving hurtful or threatening cell phone messages, contact your cell phone company to obtain assistance. Along those same lines, familiarize yourself with the Terms of Use for the ...
... various sites you frequent, and the online accounts you sign up for. Many web sites expressly prohibit harassment and if you report it through their established mechanisms, the content and/or bully should be removed from the site in a timely manner. To be sure, some web site administrators are better and quicker at this than others.

Also, please be careful not to retaliate - or do anything that might be perceived by an outsider to have contributed to the problem. Do not respond to the cyberbully except to calmly tell them to stop. If they refuse, you may have to take additional actions. If you are ever afraid for your safety, you need to contact law enforcement to investigate. They can determine whether any threats made are credible. If they are, the police will formally look into it. The evidence that you have collected will help them to evaluate your situation.

You should also take the time to check your state laws. We have discussed some of these laws on this blog and have a summary of many applicable laws here. In Wisconsin, for example, it is a misdemeanor if someone uses computerized communication systems to frighten, intimidate, threaten, abuse, or harass another person. It is also against the law to harass annoy, or offend another person. See what the laws in your state are to determine if the police should get involved.

If the threats or comments are detrimental to your health, safety, or occupation, you might want to consult with an attorney who specializes in harassment, defamation of character, false light, intentional infliction of emotional distress, or similar types of civil action. A letter sent from an attorney (on law firm letterhead) to the bully may be all that is necessary to get the bullying to stop. The problem with this approach is that it can be costly. I have spoken to some victims who have consulted with attorneys who want a significant sum of money to get involved, even at a basic level. I can only imagine how frustrating this is after experiencing emotional and psychological suffering - and then realizing that you can't afford to get legal help. Another problem associated with pursuing a bully through civil action is that, even if you are successful and a judge or jury rules in your favor, it can be difficult to determine an appropriate damage amount. I served as an expert witness in a cyberbullying case in the summer of 2008. In that case, the adult victims were being bullied in an AOL chat room. Everyone agreed that what the bully was doing was wrong, but to what were the victims entitled? They had some modest medical bills and could be reimbursed for costs associated with their AOL account - but these losses added up to less than $1,000. And while I don't know the actual amount, I am sure their legal bills were in the tens of thousands of dollars. They ended up settling for a very small amount - just to make a statement to the bully. Most of us can't afford to take those actions on principle alone.

In sum, it can be difficult to hold bullies accountable for their actions (for both adolescents and adults). In a country such as ours that values free speech so highly, many people genuinely believe they can say whatever they want, to whomever they want. We know that is not true, but it isn't clear where exactly the line is. And just because we *can* say certain things, doesn't mean we should. It's no wonder that many teens are wrestling with this problem—they see the adults in their lives saying mean and nasty things to others on a regular basis. Do your part to model appropriate behavior and address any hurtful language when it comes up. The kids (and other adults) in your life will hopefully see it, remember it, and act in the right ways.Y

ou can read the full analysis of the Cyberbullying here:

sameer hinduja - http://cyberbullying.us

Total Views: 113Word Count: 893See All articles From Author

Add Comment

Computers Articles

1. Future-proof Your Legacy Systems With Expert Foxpro Migration Services By Tech Gazebos
Author: Tech Gazebos

2. Why Fortigate 40f And Fortigate 60f Are The Best Choices For Business Network Security
Author: Stacklink uk

3. Why Modern Facilities Rely On Environmental Monitoring And Remote Temperature Probes For Compliance And Control
Author: Chris Miller

4. Spark Matrix™: Autonomous Mobile Robots (amr)
Author: Umangp

5. Spark Matrix™: Ai Observability Solutions
Author: Umangp

6. The Future Of Asset Intelligence: How Iot And Rfid Are Transforming Modern Operations
Author: TrackerIoT

7. Your Partner For Reliable Dynamics 365 Solutions!
Author: brainbell10

8. Download Pst Splitter Software (windows) – Split Large Pst Safely
Author: vSoftware

9. Buy Epson Thermal Printer: What To Know
Author: pbs

10. Pst To Mbox Conversion Without Losing Email Headers
Author: vSoftware

11. How Telecom Custom Order Management Software Is Transforming Customer Experience In The Digital Era
Author: Kevin

12. How To Launch A Successful Food Delivery App In Usa
Author: swizajoy

13. Flexible & Affordable Desktop Rental Solutions For Businesses | Renton Technologies
Author: Renton Technologies

14. Importance Of Good Identity And Access Management System In 2026
Author: adlerconway

15. What Is Vapt? Guide To The Introductory Vulnerability Assessment And Penetration Testing
Author: Lorcam Securities

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: