top of page
  • Facebook Social Icon
  • YouTube Social  Icon

Similar to the traditional bullying, there are also many different types of Cyber Bullying and this can sometime cause confusion especially among young children.

Here is a list of different types of Cyber Bullying:

  • EXCLUSION 

  • HARASSMENT 

  • OUTING 

  • CYBER STALKING 

  • FRAPING 

  • FAKE PROFILES 

 

 

  • DISSING

  • TRICKERY

 

 

 

  • TROLLING

 

  • CAT FISHING

 

Harassment is a sustained, constant and intentional form of cyber bullying comprising abusive or  threatening messages sent to your child or to a group. This is a very dangerous form of cyber bullying. The messages are unkind or malicious, making the person feel scared and alone. The constant cyber bullying means that there is no escape from the cyber bullying attacks.

Exclusion is the deliberate act of leaving you out. Exclusion is the deliberate act of leaving someone out. Exclusion can happen in a number of ways: You might be excluded from friends’ parties or activities.  Your friends are having online conversations and tagging other friends but not you. You are not using social networking sites or doesn’t have any technology and is deliberately excluded from conversations by others because of this.

Outing is a deliberate act to embarrass or publicly humiliate you through the online posting of sensitive, private or embarrassing information without your permission. Outing can happen in a variety of ways. Reading out your personal messages on their mobile phone can be considered a form of outing. Personal information should not be shared and if someone reveals private information deliberately be sure you report it  as cyber bullying to your parent, teacher or another adult you trust.

Cyberstalking is very dangerous that can extend to the cybercyber bully making real threats to your child’s physical wellbeing and/or safety. It can have extremely serious consequences if something isn’t done immediately to stop it.

Fraping is when somebody logs into your social networking account and pretends to be you by posting inappropriate content and/ or sending nasty messages to people in your friends list.

Although some people think Fraping can be funny, it is a very serious offence. Impersonating somebody online and ruining their reputation can have serious consequences.

Fake profiles can be created in order for a person to hide their real identity with the intention of cyber bullying. Another way is if the cyber bully uses another person’s social media account, email or mobile phone to continue cyber bullying you so it appears that it someone else is cyber bullying. This occurs if the cyber bully is worried that he/she is about being caught. This can mean that the cyber bully could be someone you know well, or close too.

Cyber bullies may use this form of attack by sending or posting cruel information about you online such as photos, videos, screenshots, or creating memes to damage your reputation or friendships with others.

Trickery is the act of gaining your trust to give you a false sense of security, friendship and popularity, so that they can reveal secrets and or embarrassing personal information that then is shared online to cause further damage to your reputation or destroy friendships.

Cyber Bullies use trolling to attempt to provoke a reaction / response through the use of public insults or using online forums and social networking sites. The cyber bullies will use words to attack you so that you become angry, upset and frustrated enough to react in a nasty way. The other reason cyber bullies use trolling is to make themselves feel better by putting others down and making other feel bad about themselves.

Cat fishing is when another person steals your online identity, usually photos, and re-creates social networking profiles for deceptive purposes. A catfish is someone who wants to hide their real identity to pretend to be someone else for their own agenda.

This site has been created by students as part of a Curtin University assignment and does not represent the views of the university or its affiliates. To view the full disclaimer click here.

bottom of page