Graphic: Spacer Pixel.
 
Photograph: Teenage girl, smiling. Graphic: Teenagels Logo. Photograph: Teen with a laptop.
10th Annual WiredKids Summit

Screenshot: Teenangels Trailer

Teenangels Trailer

Photograph: a group of Teenangels
Teenangels / For Parents / Cyberbullying / Telling the Difference / The Nature of the Threats

Telling the Difference: The Nature of the Threats

‹ The Source of the Threats

The Nature of the Threats

  • Repeated e-mails or IMs
  • Following the child around online, into chat rooms, favorite Web sites, etc.
  • Building fake profiles, Web sites or posing as your child’s e-mail or IM
  • Planting statements to provoke third-party stalking and harassment
  • Signing your child up for porn sites and e-mailing lists and junk e-mail and IM.
  • Breaking in to their accounts online
  • Stealing or otherwise accessing their passwords
  • Posting images of the child online (taken from any source, including video and photo phones)
  • Posting real or doctored sexual images of the child online
  • Sharing personal information about the child
  • Sharing intimate information about the child (sexual, special problems, etc.)
  • Sharing contact information about the child coupled with a sexual solicitation (“for a good time call …” or “I am interested in [fill in the blank] sex…”)
  • Reporting the child for real or provoked terms of service violations (“notify wars” or “warning wars”)
  • Encouraging that others share their top ten “hit lists,” or ugly lists, or slut lists online and including your child on that list.
  • Posting and encouraging others to post nasty comments on your child’s blog.
  • Hacking your child’s computer and sending your child malicious codes.
  • Sending threats to others (like the president of the United States) or attacking others while posing as your child.
  • Copying others on your child’s private e-mail and IM communications.
  • Posting bad reviews or feedback on your child without cause.
  • Registering your child’s name and setting up a bash Web site or profile.
  • Posting rude or provocative comments while posing as your child (such as insulting racial minorities at a Web site devoted to that racial minority).
  • Sending spam or malware to others while posing as your child.
  • Breaking the rules of a Web site or service while posing as your child.
  • Setting up a vote for site (like “hot or not?”) designed to embarrass or humiliate your child.
  • Masquerading as your child for any purpose.
  • Posting your child’s text messaging address or cell phone number online to encourage abuse and increase your child’s text messaging or cell phone charges.
  • Launching a denial of service attack on your child’s Web site
  • Sending “jokes” or rude things about your child to others or mailing lists.

Site Search Terms of Use Reprint Permission Privacy Policy WiredSafety.org

Graphic: Get Game Smart Logo.