{"id":13616,"date":"2022-06-23T07:25:07","date_gmt":"2022-06-23T07:25:07","guid":{"rendered":"https:\/\/www.blueoceanglobaltech.com\/blog\/?p=13616"},"modified":"2024-11-22T11:41:11","modified_gmt":"2024-11-22T11:41:11","slug":"how-we-tackled-cyberbullying-a-case-study","status":"publish","type":"post","link":"https:\/\/www.blueoceanglobaltech.com\/blog\/how-we-tackled-cyberbullying-a-case-study\/","title":{"rendered":"How We Tackled Cyberbullying: A Case Study"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row_content&#8221; el_id=&#8221;blogmain&#8221; css=&#8221;.vc_custom_1655989370403{padding-right: 10% !important;}&#8221;][vc_column css_animation=&#8221;slideInLeft&#8221; width=&#8221;1\/3&#8243; el_id=&#8221;leftsection&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\"><a class=\"scrollTo\" href=\"#one\">How We Put a Stop to a Cyberbullying Case?<\/a><\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: left;\"><a class=\"scrollTo\" href=\"#two\">A Case in Point<\/a><\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: left;\"><a class=\"scrollTo\" href=\"#three\">How Can a Case of Cyberbullying be Addressed?<\/a><\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: left;\"><a class=\"scrollTo\" href=\"#four\">What Should You Do If Your Child Is a Victim of Cyberbullying?<\/a><\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: left;\"><a class=\"scrollTo\" href=\"#five\">What Challenges Am I Likely to Face?<\/a><\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: left;\"><a class=\"scrollTo\" href=\"#six\">Who Can be Targeted by Cyberbullying?<\/a><\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: left;\"><a class=\"scrollTo\" href=\"#seven\">What are the Consequences of Cyberbullying?<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;2\/3&#8243; el_id=&#8221;rightsection&#8221;][vc_column_text el_id=&#8221;one&#8221;]<\/p>\n<h4>How We Put a Stop to a Cyberbullying Case<\/h4>\n<p><span style=\"font-weight: 400;\">At a time when digital media is an integral part of our lives, it is easy to forget there are real people behind the avatars on our screens. Every word we type conveys emotion, thoughts, and ideas that have the potential to significantly impact another person. Cyberbullying has become prevalent with increased social media use and is now a persistent problem. This is especially concerning because it is often hardly visible to adults, and children are reluctant to report it because of the potential backlash they may face.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cases of cyberbullying are increasing slowly but steadily. <a href=\"https:\/\/www.stopbullying.gov\/resources\/facts\" rel=\"noopener\">Statistics by the United States government<\/a> suggest that 15% of students aged 12-18 have been victims of cyberbullying and 14.9% of students had been victims of cyberbullying in the year prior to the survey.<\/span>[\/vc_column_text][vc_single_image image=&#8221;13666&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221;][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-1-left&#8221; width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1654853436250{margin-left: 0px !important;padding-top: 20px !important;padding-right: 0px !important;padding-bottom: 0px !important;padding-left: 40px !important;background-image: url(https:\/\/www.blueoceanglobaltech.com\/blog\/wp-content\/uploads\/2022\/05\/background-cta.png?id=13450) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;border-radius: 20px !important;}&#8221;][vc_text_separator title=&#8221;Related&#8221; title_align=&#8221;separator_align_left&#8221; align=&#8221;align_left&#8221; color=&#8221;custom&#8221; border_width=&#8221;2&#8243; el_width=&#8221;10&#8243; accent_color=&#8221;#03315d&#8221;][vc_custom_heading text=&#8221;What is Online Defamation &amp; How to Fight Back&#8221; font_container=&#8221;tag:h2|text_align:left|color:%2303315d&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal&#8221;][vc_btn title=&#8221;Read More&#8221; style=&#8221;custom&#8221; custom_background=&#8221;#ffffff&#8221; custom_text=&#8221;#03315d&#8221; shape=&#8221;square&#8221; align=&#8221;left&#8221; el_class=&#8221;border-btm-btn&#8221; link=&#8221;url:https%3A%2F%2Fwww.blueoceanglobaltech.com%2Fblog%2Fonline-defamation-how-to-fight-back%2F&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-1-right&#8221; width=&#8221;1\/6&#8243; css=&#8221;.vc_custom_1654853237778{padding-top: 22px !important;padding-right: 20px !important;padding-bottom: 0px !important;padding-left: 40px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;border-radius: 20px !important;}&#8221;][vc_single_image image=&#8221;13469&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1654775297648{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;padding-top: 15px !important;padding-right: 38px !important;padding-bottom: 15px !important;padding-left: 38px !important;}&#8221;][\/vc_column_inner][\/vc_row_inner][vc_column_text el_id=&#8221;two&#8221;]<\/p>\n<h4>A Case in Point<\/h4>\n<p><span style=\"font-weight: 400;\">We recently resolved a sensitive case involving a fake account that posted defamatory content about our client.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the fall of 2021, James* told his aunt and uncle about an Instagram account that was impersonating him and posting horrible and ugly pictures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">James suspected the bully was a member of a friendship group he\u2019d grown apart from due to their differing interests and thought they may be feeling hurt because the friendship had ended.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The bully used pictures taken when he and James had been hanging out together as content on the fake account. This led to James being teased and humiliated at school, with fellow classmates calling him by the name used on the fake account. James tried reporting the account to Instagram multiple times, but he didn\u2019t have any success, so he gave up.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The fake account had been in existence for a year when his uncle took up the matter. He was directed to <a href=\"https:\/\/help.instagram.com\/446663175382270\/?helpref=hc_fnav\" rel=\"noopener\">Instagram\u2019s web page<\/a> that gave detailed instructions for what a user can do if someone else is impersonating them.<br \/>\n<\/span>[\/vc_column_text][vc_row_inner][vc_column_inner][vc_single_image image=&#8221;13662&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][vc_column_text]<span style=\"font-weight: 400;\">James\u2019 uncle took a picture of James holding his ID to prove the account they were reporting was fake. His uncle sent this information to Instagram but never got a reply, or an update on the status of his complaint, or even a notification to say his email had been received.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">James\u2019 uncle felt hugely frustrated by the lack of resources online about how to solve cases of cyberbullying and information about service providers that can help stop cyberbullying.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">He found an article on <a href=\"https:\/\/www.blueoceanglobaltech.com\/\">our website<\/a> about <a href=\"https:\/\/www.blueoceanglobaltech.com\/blog\/internet-defamation-and-cyberbullying\/\">cyber bully<\/a> and another about <a href=\"https:\/\/www.blueoceanglobaltech.com\/blog\/online-reputation-management-faqs\/\">online reputation management<\/a>. He saw value in both these services in relation to his nephew\u2019s situation. Inaccurate information posted about James was harming James\u2019 reputation at school, because it was hard to distinguish the real account from the fake one. Hence, he reached out to us for advice and help.<br \/>\n<\/span>[\/vc_column_text][vc_column_text el_id=&#8221;three&#8221;]<\/p>\n<h4>How Can a Case of Cyberbullying be Addressed?<\/h4>\n<p><span style=\"font-weight: 400;\">We first took the standard route of reporting the activity through official channels globally, even though it has been our experience, unfortunately, that despite the scale of Facebook and Meta, this route has never been fruitful. After two months of no success, we engaged our legal team. We worked with a group of lawyers to send a certified letter to our contacts at Facebook, and follow up relentlessly. As a result, we finally had James\u2019 case addressed and the fake account taken down.<br \/>\n<\/span>[\/vc_column_text][vc_column_text el_id=&#8221;four&#8221;]<\/p>\n<h4>What Should You Do If Your Child Is a Victim of Cyberbullying?<\/h4>\n<ol>\n<li>Listen without judgment, empathize with the victim, and reassure them there is a solution. James\u2019 uncle assured him he would find a way to fix the situation. Our team also gave James\u2019 uncle hope by doing everything we could to solve the matter.<\/li>\n<li>Talk to the victim about the best approach for dealing with the bullying. Ultimately, the solution should ease the victim\u2019s emotional burden. For example, reaching out to the bullies and asking them to stop may seem like the most straightforward approach, but unfortunately, the victim may then face retaliation. The bullies may find new ways to torment the victim or they may escalate the frequency of attacks. Because adolescent relationships are close and often volatile, it is easy for teenagers to regroup and find a new tactic. Word that a parent reached out on behalf of their child will quickly spread, and the outcome could be a more severe form of bullying. It\u2019s best to ask the victim what they would like to do, calmly discuss all options and possible outcomes, and support them in every way possible.<\/li>\n<li>Consider hiring a defamation attorney. How can they help? Lawyers\u2019 words have authority and carry weight. In James\u2019 case, the account was reported on ten different occasions by our global team with no success. The account was only taken down after a certified letter from a defamation attorney was sent to key contacts at Facebook.<\/li>\n<li>If the bullying continues, threaten to file a police report. This could result in the bully carrying around a tarnished reputation for the rest of their life and prompt them to reconsider their actions first.<\/li>\n<\/ol>\n<p>[\/vc_column_text][vc_column_text el_id=&#8221;five&#8221;]<\/p>\n<h4>What Challenges Am I Likely to Face?<\/h4>\n<ol>\n<li>There is a risk of retaliation by the bullies once they find out the victim reported the matter to an adult and that something is being done about it.<\/li>\n<li>There is a risk that the bullies might create another fake account when the reported account is taken down.<\/li>\n<li>Parents also face the challenge of how best to maintain confidentiality for their child, the victim, while working to stop the cyberbullying.<\/li>\n<\/ol>\n<p>[\/vc_column_text][vc_column_text el_id=&#8221;six&#8221;]<\/p>\n<h4>Who Can be Targeted by Cyberbullying?<\/h4>\n<p><span style=\"font-weight: 400;\">Anyone can be a target of cyberbullying, but those considered to be \u2018different\u2019 are at a greater risk. In James\u2019 case, we suspected three factors played a part:<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Children with disabilities<\/strong> \u2013 James had a learning disability that made school work difficult.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Children who are alienated from their peers<\/strong> \u2013 James didn\u2019t have age-appropriate friends because he was behind by one grade due to his learning disability. <\/span>[\/vc_column_text][vc_single_image image=&#8221;13629&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<span style=\"font-weight: 400;\">Children who struggle to form close friendships \u2013 It was difficult for James to form close friendships in his class because of differences in interests due to age. He also studied at a school that wasn\u2019t local to where he\u2019d grown up, forming further barriers.<\/span>[\/vc_column_text][vc_column_text el_id=&#8221;seven&#8221;]<\/p>\n<h4>What are the Consequences of Cyberbullying?<\/h4>\n<p><span style=\"font-weight: 400;\">Cyberbullying is a complex issue and <a href=\"https:\/\/socialmediavictims.org\/cyberbullying\/effects\/\" rel=\"noopener\">its effects are far-reaching<\/a>. It is crucial that cyberbullying isn\u2019t oversimplified, and that any studies of its effects reflect the nuances of the problem. Some of the general consequences are: <\/span><\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li>An increased likelihood of self-harm due to feelings of helplessness.<\/li>\n<li>A reduction of trust within the close friendship group. James had a difficult time trusting his friends after the incident, as they had followed the fake social media account, effectively partaking in the cyberbullying.<\/li>\n<li>Onset of depression and anxiety.<\/li>\n<li>Poor academic performance.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>[\/vc_column_text][vc_single_image image=&#8221;13667&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<span style=\"font-weight: 400;\">According to <a href=\"https:\/\/www.stopbullying.gov\/cyberbullying\/what-is-it\" rel=\"noopener\">The US Government\u2019s Stop Bullying campaign<\/a>, the effects of cyberbullying can impact the perpetrator too. Any content created or shared online by an individual forms part of their online public reputation, which may be accessible to schools, employers, colleges, clubs, and others who may be researching an individual now or in the future. These incidents become part of their official record and might be looked on unfavorably by a potential employer or college recruiter.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each case of cyberbullying is unique. If you, or someone you know is experiencing cyberbullying, you can seek help from a number of organizations, including <a href=\"https:\/\/www.blueoceanglobaltech.com\/about-us\/\">Blue Ocean Global Technology<\/a>, who can provide support in resolving the case and restoring your online reputation.<\/span>[\/vc_column_text][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1654856910875{background-image: url(https:\/\/www.blueoceanglobaltech.com\/blog\/wp-content\/uploads\/2022\/05\/Rectangle-102.png?id=13271) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;border-radius: 15px !important;}&#8221;][vc_column_inner el_class=&#8221;cta-3-2 cta-3-1 cta-3&#8243;][vc_custom_heading text=&#8221;Are You or Someone Close to You a Victim to Cyber Crime?. You Don\u2019t Have to Face It alone.&#8221; font_container=&#8221;tag:h2|font_size:40|text_align:center|color:%23ffffff&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221;][vc_custom_heading text=&#8221;We Are Here to Support You. Contact Us Today.&#8221; font_container=&#8221;tag:p|font_size:18|text_align:center|color:%23ffffff&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221; css=&#8221;.vc_custom_1663843066122{padding-bottom: 12px !important;}&#8221;][vc_btn title=&#8221;Request a Call Back&#8221; css=&#8221;.vc_custom_1732275841405{margin-right: 50px !important;margin-left: 50px !important;}&#8221; el_class=&#8221;solid-button-1 popmake-17237&#8243; link=&#8221;url:https%3A%2F%2Fwww.blueoceanglobaltech.com%2Fcontact-us%2F|target:_blank&#8221;][vc_btn title=&#8221;Send Us an Email&#8221; css=&#8221;.vc_custom_1732275832276{margin-right: 50px !important;margin-left: 50px !important;}&#8221; el_class=&#8221;border-button-2 border-button-2-dark&#8221; link=&#8221;url:mailto%3A%20info%40blueoceanglobaltech.com|target:_blank&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>We are a team of global professionals committed to learning, excellence and helping our clients achieve optimal results. We appreciate your sense of urgency and value your most precious asset \u2013 reputation.<\/p>\n","protected":false},"author":1,"featured_media":13752,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[23,274,275,545],"tags":[287,286,231,289,288,284,285],"class_list":["post-13616","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyber-bullying","category-cyber-crimes","category-reputation-management","tag-challenges-of-cyberbullying","tag-child-victim","tag-cyberbullying","tag-cyberbullying-consequences","tag-cyberbullying-targets","tag-cybercrime","tag-stop-cyber-crime","entry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/posts\/13616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/comments?post=13616"}],"version-history":[{"count":4,"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/posts\/13616\/revisions"}],"predecessor-version":[{"id":21165,"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/posts\/13616\/revisions\/21165"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/media\/13752"}],"wp:attachment":[{"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/media?parent=13616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/categories?post=13616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/tags?post=13616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}