górne tło

Cyberbullying

Did you know that one in five girls has experienced cyberbullying? Let's identify it, respond to it, and prevent it. Cyberbullying is an increasingly common but relatively new form of abuse and is often downplayed or ignored. Cyberbullying is actions or threats, using information and communication technologies, most often computers and smartphones connected to the Internet, that cause (or are likely to cause) physical, sexual, psychological or economic harm or suffering. While there are times when cyberbullying is primarily understood as peer/youth abuse, it has no age restrictions - cyberbullying is also committed against adults, with this abuse also “being of” certain gender, age, sexual orientation, fitness level, and religion.

Identifying cyberbullying

Various forms of abuse using new technologies are described below. Knowledge of this subject is crucial. Sometimes people who are subject to such abuse do not know the words to describe their experience. Without descriptions and knowledge, it is also difficult to create legal, educational, awareness and other tools to prevent, respond to and prosecute perpetrators of this abuse.

Some of the most common online forms of abuse include:

Specific forms of cyberbullying also include doxing, trolling, flaming, sexting, and grooming.

E-mail, chat rooms, instant messaging, websites, blogs, social networks, newsgroups, SMS and MMS services, but also mobile applications (e.g., tracking) and electronic devices controlled remotely and connected to the Internet (e.g., cameras, microphones, etc.) are the tools mainly used for this abuse.

React

Although the vast majority of people consider cyberbullying unacceptable and at the same time a serious threat, often - whether we experience it ourselves or witness it - we don't know what to do.

If you face cyberbullying:

What to do when witnessing cyberbullying

Prevention

The more we know about abuse, including cyberbullying, the better situation we are in. The second principle is to break the silence, taboo and solidarity with those who have experienced abuse. Another principle is to develop in each community: in a group of friends, at school, at home - plans to prevent and respond to cyberbullying cases. We must also put pressure on the public institutions that are responsible for protecting us from abuse. Cyberbullying is not our private problem.

How to keep safe on the Internet?

While the person facing abuse is never to blame, there are some things you can do to increase your safety:

How to use the Internet and phone in a way not harmful to others

Glossary of terms related to the Internet and cyberbullying:

Bodyshaming

Bodyshaming involves commenting on and mocking the shape, size or appearance of someone’s body - this can be done online and outside the digital world.

Creepshot

sexually explicit photos of people taken without their consent.

Cyberstalking

includes methodical and persistent sending of offensive e-mails and messages (e.g., via instant messaging), sending threats, publishing intimate photos or videos, and following a person in various ways (online, or in “real life” - using tracking apps). The effect includes undermining the stalked person's sense of security.

Cyberbullying

persistent intimidation, coercion, or harassment intended to cause serious emotional distress and/or fear of physical harm. Most victims of this type of abuse are young people and children from vulnerable groups. Cyberbullying can also include requesting sexual favors or providing unwanted offensive, humiliating, degrading or intimidating content, as well as threats and hate speech on social media.

Cyberflashing

involves sending unwanted sexually explicit images via dating apps, messaging apps or SMS, as well as via Airdrop or Bluetooth.

Deadnaming

an intentional act of using the forename or surname given to a transgender person on his or her birth certificate (which does not correspond to his or her gender) to shame, threaten, intimidate or bully.

Deepfake

a video in which the original face/character has been (seamlessly) replaced with another face using algorithms, and sound is manipulated to create the illusion of another person's actions and expressions.

Doxing, doxxing

this type of abuse involves searching for, collecting and publicly sharing personal data (home address, photos, names of the victim and his or her relatives) and sensitive data (e.g., background, sexual orientation) without that person's consent. Doxing can have serious psychological consequences. Moreover, by allowing victims to be physically located, it can also precede physical abuse. Perpetrators obtain information by searching publicly available databases and social networks, but also use hacking and manipulation. Doxing can be used for harassment and financial, sexual and other types of extortion, or even to “track down” the victim in the real world.

Flaming

is a form of aggressive and hostile online communication that always contains insults, resentment and hatred. Typographically, comments are usually written in capital letters and include exclamation points. This type of cyberbullying is used to provoke a reaction from another user/user. It is closely related to trolling and is not generally recognized as abuse in legislation or politics. Flaming can be openly misogynistic and often contains threats or fantasies of sexual abuse or incites sexual abuse

Geolocation

a function of a device to determine its geographic location based on GPS signals or other forms of communication.

Grooming

Forcing a person to disclose or share their own erotic or sexual material. Unlike direct extortion, this is a process in which the perpetrator, using manipulation, enters into a relationship with the victim in order to obtain sexual content, such as nude photos, intimate conversations or other online interactions. Grooming begins with making contact with victims, especially minors, to build a relationship of trust, in which perpetrators use fake profiles to impersonate someone else and facilitate false friendships that end in extortion.

Hacking

a process of gaining access to a computer system or network in an illegal or undesirable manner.

“Happy slapping” (filmed attack).

a filmed assault/attack (physical or sexual assault) on a victim for the purpose of recording the assault and posting it on the Internet. Happy slapping is a euphemism for assault and battery.

Hate speech on the Internet

inciting abuse or hatred against a person who belongs to a discriminated group (such as women). Although hate speech is a broad term, usually associated with abuse against groups based on their ethnicity, religion or national origin, it also occurs against women. Gender-based hate speech includes sexualization, objectification and degrading comments about physical appearance, as well as threats of rape and physical violence, and encouraging other Internet users to engage in such abuse.

Spyware, stalkerware

software, usually in the form of an application, downloaded to someone's phone or device and used to track the activities of that device. Spyware is considered stalkerware in the context of domestic abuse.

Orbiting

the perpetrator does not respond to someone's messages or does not communicate directly, but continues to view their content online (liking, viewing stories, etc.).

Outing

the practice of revealing someone's sexual orientation or gender identity without their consent, often in public.

Retaliatory pornography

Publicly sharing sexual content with one or more people without their consent. Most of the people who are attacked in this way are women. Usually, such materials are distributed by an ex-partner/boyfriend of the girl/woman. The perpetrator obtains sexually explicit images or videos during the relationship, or hacks or steals them from the victim's computer, social media accounts or phone to share them online.

Abuse using internet-connected devices

Devices such as smart doorbells, speakers, security cameras or other internet-connected devices that can be remotely controlled are used to harass and control the victim. Examples of this type of abuse include turning on or off switches (such as lights or heat in the victim's home), locking (depriving) another person in a place by controlling a smart security system, or using security cameras or personal electronic devices for recording.

Trolling

is the intentional involvement of others to disrupt a discussion/event online. It involves publishing material in large quantities that deviates from the topic of discussion or disrupting discussions by sending aggressive and misleading messages. Trolls may not know the victims. Sexist trolling includes gender-based insults, cruel language and rape and/or death threats made by an organized group to humiliate women, especially those who express their opinions.

Silencing

in the digital sphere, this means preventing full participation and self-expression on the Internet of a person who remains silent due to fear of abuse and harassment, which ultimately results in exclusion from communities and public debates in which he or she would like to participate.

Sexting

involves exchanging, sending or receiving sexually explicit messages, often including pictures or videos, via SMS or chat.

Sexual extortion

also known as “sextortion,” involves using the threat of publishing sexual content (photos, videos, false content, sexual gossip) to intimidate, coerce or blackmail and then obtaining more sexual content or to obtain money.

Swatting

the use of telephones, and often computer systems, to fool emergency services into sending law enforcement to a specific location based on a false report.