Cyber Bullying (harassment) Tactics Used on Young people
1. Exclusion: Exclusion is a tactic when a cyber bully indirectly sends a provocative message to the target child that they are not included in social activities without the need for a verbal non-invitation. The process of designating who is a member of the peer group and who is not included can be devastating to the target child and one of the commonly used tactics used by cyber bullies.
2. Flaming: Flaming is a term describing an online passionate argument that frequently includes profane or vulgar language, that typically occurs in public communication environments for peer bystanders to witness including discussion boards and groups, chat rooms, and newsgroups.
3. Outing: Outing is a cyber bully tactic that includes the public display, posting, or forwarding of personal communication or images by the cyber bully personal to the target child. Outing becomes even more detrimental to the target child when the communications posted and displayed publicly contains sensitive personal information or images that are sexual in nature.
4. E-mail Threats and Dissemination: This is a cyber bully tactic used to inspire fear in the target child and then informing other members in the peer group of the alleged threat. The cyber bully sends a threatening e-mail to the target child and then forwards or copies and pastes the threatening message to others of the implied threat.
5. Harassment: Harassment is sending hurtful messages to the target child that is worded in a severe, persistent or pervasive manner causing the respondent undue concern. These threatening messages are hurtful, frequent and very serious.
6. Phishing: Phishing is a cyber bully tactic that requires tricking, persuading or manipulating the target child into revealing personal and/or financial information about themselves and/or their loved ones. Once the cyber bully acquires this information, they begin to use the information to access their profiles.
7. Impersonation: Impersonation or “imping” as a tactic in cyber bullying can only occur with the “veil of anonymity” offered by digital technology. Cyber bullies impersonate the target child and make unpopular online comments on social networking sites and in chat rooms.
8. Denigration: Used in both classic and cyber bullying, denigration is a term used to describe when cyber bullies send, post, or publish cruel rumors, gossip and untrue statements about a target child intentionally damaging their reputation or friendships. Also known as “dissing,” this cyber bullying method is a common element involved in most all of cyber bullying tactics.
9. E-mail and Cell Phone Image Dissemination: Not only a tactic used in cyber bullying, but a form of information exchange that can be a criminal act if the images are pornographic or graphic enough depicting minors. Some children actually post these images on video sites, their social networking profiles and other programs for anyone to download or view.
10. Images and Videos: The usage of images and video as a cyber bullying tactic has become a growing concern that many communities, law enforcement agencies and schools are taking seriously. Images and videos of the target child are emailed to peers, while others are published on video sites such as YouTube.
11: Trolling; provoking people to anger to attempt to get them to inappropriately respond;
Bullying By Proxy
A common form of online bullying is called "bullying by proxy". Bullying by proxy involves someone who starts the process and then encourages others join in and participate. Bullying by proxy can be especially dangerous because it increases the intimidation factor and adults may get involved with the harassment and it can lead to stalking and other potential crimes.