{"id":8609,"date":"2017-03-08T13:00:24","date_gmt":"2017-03-08T18:00:24","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=8609"},"modified":"2017-06-09T11:42:51","modified_gmt":"2017-06-09T16:42:51","slug":"know-adult-cyberbullying","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/know-adult-cyberbullying\/","title":{"rendered":"What You Should Know About Adult Cyberbullying"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Most people might think that the brunt of cyberbullying falls on teens. While that still might be true, teens aren\u2019t the only targets of bullies. Social networking sites have increased in popularity, which means cyberbullying has increased, too \u2014 for all ages. Nonetheless, many American adults have reported facing harassment and threats online, showing that bullying certainly doesn\u2019t end at 18. <\/span><\/p>\n<p>According to a survey from the Pew Research Center, more than 40 percent of American adults have been bullied online. While there have been several creative anti-bullying campaigns online, both teens and adults still face Internet harassment at alarming rates. The following will talk about the definition of cyberbullying, and what you can do to protect yourself from online harassers.<\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/witness-antibullying-emoji-campaign\/\"><b>I Am A Witness: Antibullying Emoji Campaign<\/b><\/a><\/p>\n<p><b>Cyberbullying<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Cyberbullying takes place through several platforms, and includes several behaviors. Most harassment takes place through email, chat rooms, social media, website comments, or other digital messages sent to phones or computers. Cyberbullying can take the form of one user persecuting another for one reason or another, sharing private photos or videos of the victim online, or sending threatening message from one party to another.<\/span><\/p>\n<p>Some of the types of cyberbullying are:<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Impersonation<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Cyber-stalking<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Outing and trickery, or sharing personal information or secrets online without the subject\u2019s permission<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Denigration, or posting shameful information about someone online<\/span><\/li>\n<\/ul>\n<p><b>The Traits of Cyberbullies<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Cyberbullies are often difficult to track because they often want to preserve their anonymity by using pseudonyms or false pictures associated with the account. This is especially easy to do on social networks like Twitter. This anonymity, and even the vast number of victims available on the Internet, can make some people act in ways they wouldn\u2019t in real life.<\/span><\/p>\n<p><b>Fighting Back<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If you feel like you are being cyberbullied or know someone who is, there are several steps to make sure that you can fight back. First, don\u2019t get rid of the incriminating material. If someone sends you a nasty text or photo, make sure to keep it and make note of when it was sent. On many social media channels, you can report harassment, and the site can either block the user from contacting you, or block the user from the website altogether.<\/span><\/p>\n<p>If the level of harassment you\u2019re receiving starts to feel criminal, you can also contact law enforcement for your own protection. Sending sexually explicit material, invading your privacy, or threatening violence to your person \u2014 even virtually \u2014 are considered crimes. Authorities can deal with the cyberbullies who threaten you in this way.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nearly 50% of all American adults face cyberbullying.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[4319],"class_list":["post-8609","post","type-post","status-publish","format-standard","hentry","category-security","tag-cyberbullying"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/8609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=8609"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/8609\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=8609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=8609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=8609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}