examples-of-cyberbullying-images-ipredator

Educational Examples of Cyberbullying Images
by Michael Nuccitelli, Psy.D.

Examples of cyberbullying describe the variety of techniques cyberbullies use to taunt, threaten, humiliate and deprecate their target. The primary goal for the reader is to become familiar with the strategies children use to mistreat other children.

Many of these tactics are also made use of by adult online users engaged in cyber harassment, cyberstalking and predatory trolling. As humanity increasingly becomes dependent upon mobile device technology, virtual reality and artificial intelligence; the range and complexity of cyber-attacks will assuredly grow.

Provided are examples of cyberbullying in image form. As with all the content on this website, they are free to download, share and use for informational and educational purposes. All images are 1080×1080 compressed JPEG files 

Cyberbullying

Using Information and Communication Technology (ICT), cyberbullying is recurrent and sustained threats and taunts by one or more children towards another child who is unable or unwilling to deescalate the engagement. Cyberbullying is harmful, repeated and hostile behavior intended to deprecate a targeted minor.

Cyberbullying describes threatening or disparaging communications delivered through ICT. Whereas classic bullying typically involves face-to-face interactions and non-digital forms of communication, cyberbullying consists of information exchanged via ICT and may never involve face-to-face encounters.
.

Examples of Cyberbullying Images

Bash Boards: Defamatory content a cyberbully posts in chat rooms, online forums and message boards.

michael-nuccitelli-cyberbullying-bash-boards

BlogoBullying: A cyberbully creates a blog and then makes their target the central character and topic of defamatory posts.

michael-nuccitelli-cyberbullying-blogobullying

Cyberbullying by Proxy: Using deception, encouragement or manipulation; a cyberbully persuades other online users to harass their target.

michael-nuccitelli-cyberbullying-by-proxy

Cyberstalking: When a cyberbully uses intimidation and persistent taunting that frightens their target

michael-nuccitelli-cyberbullying-cyberstalking

Cyber Drama: When a cyberbully posts melodramatic content to alarm or defame their target.

michael-nuccitelli-cyberbullying-cyber-drama

Cyber Harassment: When a cyberbully repeatedly contacts and sends defamatory messages to their target.

michael-nuccitelli-cyberbullying-cyber-harassment

Cyber Threats: When a cyberbully falsely implies their target is in danger from unknown or nefarious assailants, which causes the target distress.

michael-nuccitelli-cyberbullying-cyber-threats

Denigration: When a cyberbully sends or publishes cruel rumors, gossip and false assertions about a target; trying to damage their reputation or friendships.

michael-nuccitelli-cyberbullying-denigration

Digital Piracy Inclusion: When a cyberbully persuades their target to engage in illegal digital piracy and then reports them to the authorities, their parents or educators.

michael-nuccitelli-cyberbullying-digital-piracy

eIntimidation: A colloquial expression that describes when a cyberbully attempts to control their target using emails to manipulate them.

michael-nuccitelli-cyberbullying-eintimidation

Exclusion: When a cyberbully informs their target that they are not invited to a social activity that other peers will be attending.

michael-nuccitelli-cyberbullying-exclusion

Exposure: Using social media, a cyberbully posts private communications, images or video about their target that is private and embarrassing.

michael-nuccitelli-cyberbullying-exposure

Flaming: Using social media, a cyberbully provokes an argument with their target that includes profane and vulgar terminology.

michael-nuccitelli-cyberbullying-flaming

Griefing: When a cyberbully frequents online gaming environments and frustrates their target by intentionally not following the rules.

michael-nuccitelli-cyberbullying-griefing

Happy Slapping: While the target is physically attacked and simultaneously recorded; the images and video are posted online by the cyberbully.

michael-nuccitelli-cyberbullying-happy-slapping

Impersonation: The cyberbully mimics their target and posts defamatory comments on social networking sites and in chat rooms.

michael-nuccitelli-cyberbullying-impersonation

Instant Messaging Attacks: Using an instant messaging account, the cyberbully bombards the target with harassing and threatening text messages.

michael-nuccitelli-cyberbullying-instant-messaging-attacks

Interactive Gaming Harassment: Having the ability to exchange information with online gaming opponents; cyberbullies verbally abuse their targets and lock them out of games.

michael-nuccitelli-cyberbullying-interactive-gaming-harassment

Malicious Code Dissemination: When a cyberbully sends malicious information like viruses, malware, spyware and ransomware to their target.

michael-nuccitelli-cyberbullying-malicious-code-dissemination

Micro-Visual Bullying: When a cyberbully creates and posts short videos to character assassinate their target.

michael-nuccitelli-cyberbullying-micro-visual-bullying

Mobile Device Image Sharing: When a cyberbully sends sexually suggestive or embarrassing images of the target to peer mobile devices.

michael-nuccitelli-cyberbullying-mobile-device-image-sharing

Non-Consensual Multimedia Bullying: The target does not know that embarrassing content is being disseminated by the cyberbully using various media formats.

michael-nuccitelli-cyberbullying-non-consensual-multimedia-bullying

Password Theft & Lockout: After a cyberbully steals & changes their target’s password, they impersonate them online and lock them out of their account.

michael-nuccitelli-cyberbullying-password-theft-and-lockout

Phishing: A cyberbully manipulates their target into revealing financial information and then purchases unauthorized items with their credit cards.

michael-nuccitelli-cyberbullying-phishing

Porn & Marketing List Insertion: Using confidential online sign-up forms, the cyberbully signs their target up to multiple pornography and junk lists.

michael-nuccitelli-cyberbullying-porn-marketing-list-insertion

Pseudonym Stealth: Cyberbullies secretly change their online usernames and begin to taunt, tease and humiliate their target while hiding their identity.

michael-nuccitelli-cyberbullying-pseudonym-stealth

Screen Name Mirroring: Similar to impersonation, the cyberbully uses screen names almost identical to the target and then posts provocative content.

michael-nuccitelli-cyberbullying-screen-name-mirroring

Sexting: The cyberbully text messages sexually themed information about their target that is embarrassing and hurtful.

michael-nuccitelli-cyberbullying-sexting

Sextortion: Using threats of revealing sexually themed content about their target, the cyberbully extorts them in exchange for not revealing the information.

michael-nuccitelli-cyberbullying-sextortion

Slut Shaming: The cyberbully records sexually suggestive images or videos of their target and distributes them throughout their school and online.

michael-nuccitelli-cyberbullying-slut-shaming

Social Media Bullying: The cyberbully persuades the target to include them in their “friends” or “buddy” lists, and then contacts their followers with derisive information.

michael-nuccitelli-cyberbullying-social-media-bullying

Text Wars and Text Attacks: The cyberbully and accomplices engage their target in a series of provocative text messages using a cellular phone service.

michael-nuccitelli-cyberbullying-text-wars-text-attacks

Tragedy News Mirroring: The cyberbully announces that their target is planning to engage in a violent activity soon after a similar regional or national tragedy.

michael-nuccitelli-cyberbullying-tragedy-news-mirroring

Trickery: The target is mistakenly led to believe that the sensitive information they share with the cyberbully will not be used for nefarious reasons.

michael-nuccitelli-cyberbullying-trickery

Trolling: The cyberbully repeatedly taunts their target across multiple online environments ranging from online gaming to chat rooms.

michael-nuccitelli-cyberbullying-trolling

Twitter Pooping: The cyberbully repeatedly tweets harmful and provocative insults about the target using current “net lingo” terms.

michael-nuccitelli-cyberbullying-twitter-pooping

Voting & Polling Booth Bullying: The cyberbully creates web pages that allow others to vote for categories deemed highly embarrassing to their target.

michael-nuccitelli-cyberbullying-voting-and-polling-booth-bullying

Warning Wars: The cyberbully makes frequent false allegations to an ISP seeking their target’s profile or account to be suspended.

Web Page Assassination: The cyberbully designs, and then posts web pages specifically intended to insult the target, their peers or loved ones.

michael-nuccitelli-cyberbullying-web-page-assassination

VLE Bullying: In Virtual Learning Environments (VLE), cyberbullies use VLE message boards, chat rooms and instant messaging functions to ridicule their target.

michael-nuccitelli-cyberbullying-vle-bullying

Virtual World Bullying: Using their avatar in 3D websites and virtual worlds, the cyberbully taunts and teases their target by using their avatar as the assailant or provocateur.

michael-nuccitelli-cyberbullying-vistual-world-bullying

YouTube Channeling: The cyberbully makes their target the principal character in a YouTube channel and publishes denigrating and disinformation-themed videos.

michael-nuccitelli-cyberbullying-youtube-channeling

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychologist and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

 

 

 

 

Pin It on Pinterest

Share This