By Learning English

    It is very important to understand how children and adults are bullied in order to take an action.  As we have seen before, Cyber Bullying takes place over digital devices like cell phones, computers, and tablets. Cyber Bullying occurs through SMS, text, and apps. It can also occur in gaming where children participate, view, and share content.  Most of the time it happens by sending, posting or sharing negative harmful, false or mean content about someone else. Sometimes, it crosses the line into unlawful or criminal behavior. The most common places in which Cyber Bulling occurs is social media such as Facebook, Snapchat, Instagram, and Twitter. With the existence of social media and digital forums, comments, photos, pictures, posts, and contents, shared by adults and children, might be seen by strangers as well as acquaintances. This shared content creates kind of permanent public record of views, activities, and reactions that certainly lead to harass the online reputations of everyone involved. To clarify more, to bully someone online there are many ways:

·        Posting offensive, rude, and insulting comments or rumors about someone online. That is very hurtful and embarrassing especially for children who are not ready yet to endure such words and expressions.

·        Pretending to be someone else online by creating unreal accounts in social media. This is when someone wants to send information about another person that is fake, damaging and untrue without being known. This process can contain sharing photos, videos, audio recordings of someone to ridicule, soliciting, spreading fake rumors and gossip for the purpose of bullying.

·        Impersonation is another way of how children and adults bully and get bullied. This is when someone hacks someone’s email or social networking account and uses the identity of that person online to send or post vicious and embarrassing things about others. Hacking others’ profiles or creating new ones using their names on social media can be really difficult to get them closed down. Retrieved from

·        Doxing which means gathering information like social security, age, Email, addresses, phone numbers, photos etc. and make these personal information public. Doxing is used to extract, revenge, threaten, and destroy the privacy of others as the following story proves: A teenage boy posted comments on a public gaming forum, expressing his dislike of certain game features and tactics. Another user disagreed with him in the forum, then he searched for the boy’s information online and posted his address, email address, and social media links in another comment. The boy received multiple emails and messages from strangers threatening to come to his home and assault him, and to block him from games.  The federal government website managed by the U.S Department of Health and Human Services. Retrieved from

Mohamed El Houta and Soufiane El Moula                  University Moulay Ismail, Meknes, Morocco


'At, we try to provide our users with helpful and useful content. We do our best to talk about different topics in differnt fields. We love to see our visitors benifit from our content. We are always glad to receive your comments and thoughts.'. You can always visit our website for more precious knowledge.


  1. In fact, the Air Force Academy offers a degree in "computer science-cyberwarfare" and Naval Academy has made a course in "cyber security" mandatory for Freshman. How to hire a cybersecurity expert

  2. Excellent post. I was always checking this blog, and I’m impressed! Extremely useful info specially the last part, I care for such information a lot. I was exploring this particular info for a long time. Thanks to this blog my exploration has ended. traffic secrets

  3. Nice post. I was checking constantly this blog and I’m impressed! Extremely useful info specially the last part I care for such information a lot. I was seeking this certain info for a long time. Thank you and good luck. sviluppo siti web Milano