10th Annual WiredKids Summit

Teenangels Trailer
|
Teenangels / For Parents / Cyberbullying / Telling the Difference / The Nature of the Threats
Telling the Difference: The Nature of the Threats
‹ The Source of the Threats
The Nature of the Threats
- Repeated e-mails or IMs
- Following the child around online, into chat rooms, favorite Web sites, etc.
- Building fake profiles, Web sites or posing as your child’s e-mail or IM
- Planting statements to provoke third-party stalking and harassment
- Signing your child up for porn sites and e-mailing lists and junk e-mail and IM.
- Breaking in to their accounts online
- Stealing or otherwise accessing their passwords
- Posting images of the child online (taken from any source, including video and photo phones)
- Posting real or doctored sexual images of the child online
- Sharing personal information about the child
- Sharing intimate information about the child (sexual, special problems, etc.)
- Sharing contact information about the child coupled with a sexual solicitation (“for a good time call …” or “I am interested in [fill in the blank] sex…”)
- Reporting the child for real or provoked terms of service violations (“notify wars” or “warning wars”)
- Encouraging that others share their top ten “hit lists,” or ugly lists, or slut lists online and including your child on that list.
- Posting and encouraging others to post nasty comments on your child’s blog.
- Hacking your child’s computer and sending your child malicious codes.
- Sending threats to others (like the president of the United States) or attacking others while posing as your child.
- Copying others on your child’s private e-mail and IM communications.
- Posting bad reviews or feedback on your child without cause.
- Registering your child’s name and setting up a bash Web site or profile.
- Posting rude or provocative comments while posing as your child (such as insulting racial minorities at a Web site devoted to that racial minority).
- Sending spam or malware to others while posing as your child.
- Breaking the rules of a Web site or service while posing as your child.
- Setting up a vote for site (like “hot or not?”) designed to embarrass or humiliate your child.
- Masquerading as your child for any purpose.
- Posting your child’s text messaging address or cell phone number online to encourage abuse and increase your child’s text messaging or cell phone charges.
- Launching a denial of service attack on your child’s Web site
- Sending “jokes” or rude things about your child to others or mailing lists.
|