0 Bewertungen0% fanden dieses Dokument nützlich (0 Abstimmungen)
35 Ansichten2 Seiten
Cyber harassment is an immoral behavior by someone or a group, who uses technology to send disturbing messages to bother, humiliate, threaten, or stalk someone else. The schemes used consist of emails, instant chat messaging, blog message, text messages sent via cell phones, digital photos, videos and all other means of electronic communication. The types of content a cyber harasser may send include the following: offensive and confrontational message foul words, cruel, hateful, and insulting remarks threats, intimidations and false promises.
Cyber harassment is an immoral behavior by someone or a group, who uses technology to send disturbing messages to bother, humiliate, threaten, or stalk someone else. The schemes used consist of emails, instant chat messaging, blog message, text messages sent via cell phones, digital photos, videos and all other means of electronic communication. The types of content a cyber harasser may send include the following: offensive and confrontational message foul words, cruel, hateful, and insulting remarks threats, intimidations and false promises.
Copyright:
Attribution Non-Commercial (BY-NC)
Verfügbare Formate
Als PDF, TXT herunterladen oder online auf Scribd lesen
Cyber harassment is an immoral behavior by someone or a group, who uses technology to send disturbing messages to bother, humiliate, threaten, or stalk someone else. The schemes used consist of emails, instant chat messaging, blog message, text messages sent via cell phones, digital photos, videos and all other means of electronic communication. The types of content a cyber harasser may send include the following: offensive and confrontational message foul words, cruel, hateful, and insulting remarks threats, intimidations and false promises.
Copyright:
Attribution Non-Commercial (BY-NC)
Verfügbare Formate
Als PDF, TXT herunterladen oder online auf Scribd lesen
someone or a group, who uses technology such as computers, internet or mobile devices to send disturbing messages to bother, humiliate, threaten, or stalk someone else. The schemes used consist of emails, instant chat messaging, blog message, text messages sent via cell phones, digital photos, videos and all other means of electronic communication. The types of content a cyber harasser may send include the following: offensive and confrontational message foul words, cruel, hateful, and insulting remarks threats, intimidations and false promises scandals or rumor mongering The methods a cyber harasser could use to bother the victim may include the following: publication of secrets or embarrassing situations, including pictures or videos, for everyone to see and hear publication of gossip or rumors for the explicit purpose of damaging the person's character sharing of messages pretending to be the victim in an attempt to damage that person's morality, friendships, family or work reputation to result in the separation of the victim from friends, co-workers and family Who are Cyber Harassers ? n some cases, a cyber harasser can also harass in face-to-face encounters. Harassing over the computer may be a natural extension of their disturbing behavior. Some people who become cyber harassers may be the victims of harassment and are taking out their anger and frustration in the internet. They may be targeting the people who harassed them or they may have picked a different target. Still others regard cyber harassing as a game or joke -- nothing more than a fun thing to do. Who are the Victims of Cyber harassment? Majority of victims are children and the youth but there are also adults who are cyber harassing grown-up victims usually women in the workplace. Generally, cyber harassers know their victim, but rarely do they pick victims they don't know. n these situations, the cyber harasser is picking on someone based on a type of bias or prejudice. They may pick on people based on religion, race, gender, sexual orientation, or people who are considered different from their point of view. Other times, they will pick on someone based on a message that he or she has posted or sent that the harasser doesn't like. Why Can Cyber harassment be as HarmfuI as PhysicaI Harassment? A lot of people mistakenly think that "words, pictures or videos can never hurt. n the internet, on the other hand, cyber harassers can conduct harassment at any given time and place, thanks to modern technology. As long as the victims are identified and online, they are open to cyber harassment. People who commit cyber harassment pick on an individual just for the feeling of power that it gives them, financial gain or favor. Because the nternet seems to give anonymity, cyber harassment is often seen to have less liability to the cyber harassers, which can encourage them to continue and be aggressive. An additional characteristic of internet that can lead cyber harassment to be as harmful as a physical harassment is that cyber harassers aren't physically there when they are harassing their victims which can lead to a lessened consideration. Since the harassers cannot see how much they are hurting the victims, they may think they have not actually hurt them much or at all and may, therefore, continue the harassing behavior. Some individuals believe that there are no rules in cyberspace. They feel free to do whatever they wish. Moreover, they believe they have the RGHT to do whatever they want in cyberspace without accountability or consequences. Some of the victims of cyber harassment, who are unable to handle it, either retaliate violently or in extreme situations commit suicide due to severe humiliation. Warning Signs Your ChiId may be a Victim of a Cyber harassment f your child exhibits the following, it may be a warning sign: displaying signs of depression, sadness, nervousness or fear particularly if these signs intensify after your child uses the cell phone or after being online avoiding friends, social activities, or school experiencing difficulty with school or a drop in grades for no apparent reason expressing slight comments that indicate your child is disturbed or upset What to do if a Cyber harasser Targets Your ChiId Revenge may only escalate the problem. f you feel the need to respond to a cyber harasser, help your child develop appropriate preventive actions by asking if possible the parent or guardian of the child who does cyber harassment to stop the misbehavior. By filtering email, instant messages and text messages and blocking mobile numbers, you can cut off many of the ways they can contact your child. By having your child avoid the sites and groups where the attacks occur, he or she can ignore the cyber harasser. n case harassment continues, then you can change your child's email address, nternet account, mobile number and username(s). f none of these steps are successful, you may need to take additional legal action, as follows: 1) Compile a copy of all harassing messages and postings. Save the addresses of web sites where other hostile information, embarrassing pictures or negative messages are posted. The more documentation you have the better. 2) Contact your child's school. Even if the cyber harassment is not occurring in school, officials might be able to assist. 3) Contact the child's parents or guardian by sending a formal letter, face to face conversation detailing the harassment messages sent and asking them to make it stop. The parents and their child could be liable for civil or criminal offenses due to emotional damages. 4) Finally, if the situation is not resolved, or if physical threats are made, contact the nearest PNP police station in your area. AdditionaI Information More information on cyber security awareness and crime prevention can be found and downloaded at PNP http://www.pnp.gov.ph and ITMS http://www.itms.pnp.gov.ph websites. Text PNP 2920 Produced by: PHILIPPINE NATIONAL POLICE Information TechnoIogy Management Service Web Services and Cyber Security Division A Guide on Cyber Harassment A cyber security awareness program of the Philippine National Police nformation Technology Management Service URL : http://www.pnp.gov.ph / http://www.itms.pnp.gov.ph Email: feedback@pnp.gov.ph / itms@pnp.gov.ph