Five Types of Internet Abuse Used to Cyberbully

Leave a comment

22/03/2013 by AndreaUrbanFox

Internet abuse, cyberstalking, cyberbullying are an addiction and those who engage in such activities are just like drug junkies.


Here is an article by Elizabeth Hartney, PhD, is a psychologist with extensive experience in research, practice and teaching in the field of addictions and concurrent disorders.

You might look at the internet in private, but anything you share can quickly become very public. Knowing these five types of internet abuse—which have been used by cyberbullies to embarrass, exploit and harrass others—as well as strategies for protecting yourself against them, can help you avoid running into problems.
1. Social Exclusion
Social exclusion might be one of the mildest forms of cyberbullying, but it can cause serious distress: it’s the online equivalent of leaving someone out of a group to which they should expect automatic membership. This could include an entire class not accepting a friend request from a particular classmate.

Tip: Focus on developing real-life relationships rather than depending on virtual relationships for social connection. If you or your child is being excluded online, this is probably an indication of a more serious social problem in real life. Talk to your parents, teachers, or a counselor if you’re being socially excluded at school. Joining online or real-life groups based on your interests, hobbies, or activities is also helpful.

2. Tagging Without Permission
Tagging is a way of attaching a person’s name to an online image so that her name appears on the image, or so that images of a particular person can be identified by searching for tagged images using her name. Tagging someone’s name against an embarrassing, defaming, or manipulated image—particularly without her permission—is a form of internet abuse, especially when the intention is to cause that person distress or ridicule.

Tip: Limit and censor images that you post of yourself, and that others post of you. Go into the privacy settings of the website you are using and adjust them so that tagged images of you cannot be seen by others. You may also be able to block specific people from accessing any information about you. If your image has been posted on a website, contact the website administrator and request that it be taken down. If the image is pornographic, you may be able to report the abuse to the police, although some teens have found themselves in trouble for others’ posting sext images of them online.

3. Flaming
Flaming is the practice of posting derogatory comments about another person. It can include outing another person by revealing that he is gay when he hasn’t come out himself; character assassination by berating someone’s character throught exaggerating her perceived faults in an unbalanced way; or posting up untrue information about someone in order to damage her image or reputation.

Tip: Although abuse is never the fault of the victim, you can reduce the likelihood that it will happen to you by conducting yourself appropriately online, avoiding provoking negative reactions in others by comments you make, and treating yourself and others with respect. At the very least, any flaming that does happen will be unsubstantiated and unconvincing. And if it does happen, report abuse to the owner of the website; webmasters are increasingly aware of internet abuse and have moderators who can remove offensive material.

4. Sext Re-Posting
Sexting is a risky activity, but when you are in a relationship, you can be drawn into sexting a picture of yourself to your loved one without thinking about the potential future risk of its being used against you.

5. Impersonation and Identity Theft
Impersonation is pretending to be someone else, and can range from obvious mockery to actually borrowing or stealing someone’s identity—such as their name, image, or identifying information—to carry out actions which are attributed to the victim.

Tip: For superficial impersonations, such as someone posting up a silly comment online using your name, simply adding a comment below stating that it was not made by you might be enough. For more serious impersonations—comments which indicate controversial views you do not agree with, for example—you can contact the webmaster and ask to have it removed. And if your personal information is used to commit theft or another crime, you should either confront the culprit to correct the matter, or report it to the police.


ORIGNAL ARTICLE POSTED AT and can be seen by clicking the following link



Stalking & Harassment – Definition & advice

How to document harassment and cyberstalking on Twitter – videoblog

Stop Cyberbullying – message to my stalker

“how to cross examine a sociopath”

report it

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: