
·
Posting offensive, rude, and insulting
comments or rumors about someone online. That is very hurtful and embarrassing
especially for children who are not ready yet to endure such words and
expressions.
·
Pretending to be someone else online by
creating unreal accounts in social media. This is when someone wants to send
information about another person that is fake, damaging and untrue without
being known. This process can contain sharing photos, videos, audio recordings
of someone to ridicule, soliciting, spreading fake rumors and gossip for the
purpose of bullying.
·
Impersonation is another way of how children
and adults bully and get bullied. This is when someone hacks someone’s email or
social networking account and uses the identity of that person online to send
or post vicious and embarrassing
things about others. Hacking others’ profiles or creating new ones using their
names on social media can be really difficult to get them closed down. Retrieved
from www.bullying.co.uk
·
Doxing which means gathering information
like social security, age, Email, addresses, phone numbers, photos etc. and
make these personal information public. Doxing is used to extract, revenge,
threaten, and destroy the privacy of others as the following story proves: A
teenage boy posted comments on a public gaming forum, expressing his dislike of
certain game features and tactics. Another user disagreed with him in the
forum, then he searched for the boy’s information online and posted his
address, email address, and social media links in another comment. The boy received
multiple emails and messages from strangers threatening to come to his home and
assault him, and to block him from games.
The federal government website managed by the U.S Department of
Health and Human Services. Retrieved from
http://www.stopbullying.gov
Mohamed El Houta and Soufiane El Moula University Moulay Ismail, Meknes, Morocco
PRECIOUS KNOWLEDGE
'At https://www.precious-know-ledge.com, we try to provide our users with helpful and useful content. We do our best to talk about different topics in differnt fields. We love to see our visitors benifit from our content. We are always glad to receive your comments and thoughts.'. You can always visit our website for more precious knowledge.
great
ReplyDeleteIn fact, the Air Force Academy offers a degree in "computer science-cyberwarfare" and Naval Academy has made a course in "cyber security" mandatory for Freshman. How to hire a cybersecurity expert
ReplyDeleteExcellent post. I was always checking this blog, and I’m impressed! Extremely useful info specially the last part, I care for such information a lot. I was exploring this particular info for a long time. Thanks to this blog my exploration has ended. traffic secrets
ReplyDeleteNice post. I was checking constantly this blog and I’m impressed! Extremely useful info specially the last part I care for such information a lot. I was seeking this certain info for a long time. Thank you and good luck. sviluppo siti web Milano
ReplyDelete