{"id":15833,"date":"2023-03-17T10:52:26","date_gmt":"2023-03-17T10:52:26","guid":{"rendered":"https:\/\/www.blueoceanglobaltech.com\/blog\/?p=15833"},"modified":"2025-03-05T09:41:49","modified_gmt":"2025-03-05T09:41:49","slug":"guide-to-stop-cyberbullying","status":"publish","type":"post","link":"https:\/\/www.blueoceanglobaltech.com\/blog\/guide-to-stop-cyberbullying\/","title":{"rendered":"Stop Cyberbullying: Here&#8217;s Everything You Need to Know"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row_content&#8221; css=&#8221;.vc_custom_1663754994050{padding-right: 10% !important;}&#8221; el_id=&#8221;blogmain&#8221;][vc_column css_animation=&#8221;slideInLeft&#8221; width=&#8221;1\/3&#8243; el_id=&#8221;leftsection&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: left;\"><a class=\"scrollTo current\" href=\"#one\">Understanding Cyberbullying<\/a><\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: left;\"><a class=\"scrollTo current\" href=\"#two\">The Effects of Cyberbullying<\/a><\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: left;\"><a class=\"scrollTo current\" href=\"#three\">How to Spot and Stop Cyberbullying?<\/a><\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: left;\"><a class=\"scrollTo current\" href=\"#four\">Why Cyberbullies Bully?<\/a><\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: left;\"><a class=\"scrollTo current\" href=\"#five\">The Steps We Can Take to Prevent Cyberbullying<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1616742558303{padding-right: 3% !important;padding-left: 3% !important;}&#8221; el_id=&#8221;rightsection&#8221;][vc_row_inner el_id=&#8221;first&#8221;][vc_column_inner][vc_column_text]<span style=\"font-weight: 400;\">Cyberbullying may be a relatively new phenomenon, but the increase in social media sites and the ever-growing use of digital devices provide a ripe environment for the proliferation of bullying tactics. Unfortunately, it is something we must learn to live with and defend ourselves from.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to the global anti-bullying campaign by <\/span><a href=\"https:\/\/www.dosomething.org\/us\/facts\/11-facts-about-cyber-bullying\" rel=\"noopener\"><span style=\"font-weight: 400;\">DoSomething.org<\/span><\/a><span style=\"font-weight: 400;\">, about 37% of young people between the ages of 12 and 17 have been bullied online, and 30% have experienced it more than once. And worryingly, young people who experience cyberbullying are at a greater risk for both self-harm and suicidal behavior.<\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1662536375500{padding-bottom: 3% !important;}&#8221;][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-1-left&#8221; width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1654853436250{margin-left: 0px !important;padding-top: 20px !important;padding-right: 0px !important;padding-bottom: 0px !important;padding-left: 40px !important;background-image: url(https:\/\/www.blueoceanglobaltech.com\/blog\/wp-content\/uploads\/2022\/05\/background-cta.png?id=13450) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;border-radius: 20px !important;}&#8221;][vc_text_separator title=&#8221;Related&#8221; title_align=&#8221;separator_align_left&#8221; align=&#8221;align_left&#8221; color=&#8221;custom&#8221; border_width=&#8221;2&#8243; el_width=&#8221;10&#8243; css=&#8221;.vc_custom_1741167530249{padding-bottom: 2% !important;}&#8221; accent_color=&#8221;#03315d&#8221;][vc_custom_heading text=&#8221;What Is Cyberbullying? A Comprehensive Guide for Children and Parents&#8221; font_container=&#8221;tag:h2|text_align:left|color:%2303315d&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal&#8221; link=&#8221;url:https%3A%2F%2Fwww.blueoceanglobaltech.com%2Fblog%2Fwp-content%2Fuploads%2F2021%2F04%2Fimgonline-com-ua-CompressToSize-Y2siNL1Qcd80eAP3.jpg&#8221;][vc_btn title=&#8221;Read More&#8221; style=&#8221;custom&#8221; custom_background=&#8221;#ffffff&#8221; custom_text=&#8221;#03315d&#8221; shape=&#8221;square&#8221; align=&#8221;left&#8221; el_class=&#8221;border-btm-btn&#8221; link=&#8221;url:https%3A%2F%2Fwww.blueoceanglobaltech.com%2Fblog%2Fwhat-is-cyberbullying%2F&#8221;][\/vc_column_inner][vc_column_inner el_class=&#8221;cta-1-right&#8221; width=&#8221;1\/6&#8243; css=&#8221;.vc_custom_1654853237778{padding-top: 22px !important;padding-right: 20px !important;padding-bottom: 0px !important;padding-left: 40px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;border-radius: 20px !important;}&#8221;][vc_single_image image=&#8221;13469&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1679388387523{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;padding-top: 15px !important;padding-right: 38px !important;padding-bottom: 15px !important;padding-left: 38px !important;}&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;one&#8221;][vc_column_inner el_id=&#8221;one&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #636363;\">What is Cyberbullying?<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">According to the UN children\u2019s agency <\/span><a href=\"https:\/\/www.unicef.org\/end-violence\/how-to-stop-cyberbullying\" rel=\"noopener\"><span style=\"font-weight: 400;\">UNICEF<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">cyberbullying is simply bullying with the use of digital technologies. It can take place on social media, messaging platforms, gaming platforms, and mobile phones. It is often repeated behavior aimed at scaring, angering, or shaming the victims.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another definition put forward by the cyberbullying researcher PK <\/span><span style=\"font-weight: 400;\">Smith <\/span><span style=\"font-weight: 400;\">suggests cyberbullying is an \u201c<em>aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend himself or herself.<\/em>\u201d<\/span>[\/vc_column_text][vc_single_image image=&#8221;15856&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1679491198996{margin-bottom: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1675341888738{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;]<\/p>\n<p style=\"text-align: center; font-size: 13px;\">Image Credits: <a href=\"https:\/\/www.blueoceanglobaltech.com\/\">Blue Ocean Global Technology<\/a><\/p>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1679494631614{padding-top: 20px !important;}&#8221;]<span style=\"font-weight: 400;\"><a href=\"https:\/\/www.blueoceanglobaltech.com\/blog\/internet-defamation-and-cyberbullying\/\">Cyberbullying<\/a> may include posting embarrassing photos of someone on social media, sending hurtful or threatening messages, posing as someone and sending cruel messages to others, or exposing one&#8217;s personal information\u2014anything that shames, embarrasses, threatens, or otherwise upsets the victim.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are some key differences between face-to-face <a href=\"http:\/\/www.differencebetween.net\/miscellaneous\/culture-miscellaneous\/difference-between-bullying-and-cyber-bullying\/\" rel=\"noopener\">bullying and cyberbullying<\/a>. On the negative side, cyberbullies can hide behind an anonymous identity, potentially reducing the consequences of their behavior. The bullying is also visible to more people and can impact the public reputation of the victim. Conversely, cyberbullying leaves a digital footprint, content that can be used as proof of bullying, possibly to help report and\/or end the abuse.<\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;two&#8221;][vc_column_inner][vc_column_text]<\/p>\n<h4><span style=\"color: #636363;\">What Are the Effects of Cyberbullying?<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Unlike face-to-face bullying which tends to be localized, cyberbullying is often visible to the public and can happen at any time, in any place. Victims can be in their homes and still be bullied by someone online\u2014there is no escape. This can have a detrimental impact, especially on those of a vulnerable age, in terms of kids\u2019 social and cognitive development. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mentally, victims may question their worth or become angry; emotionally, they may develop feelings of shame or lethargy; and physically, they may experience symptoms caused by stress, such as stomach problems and even a tendency to self-harm.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to<\/span><span style=\"font-weight: 400;\">\u00a0<a href=\"https:\/\/www.stopbullying.gov\/cyberbullying\/what-is-it\" rel=\"noopener\">StopBullying<\/a><\/span><span style=\"font-weight: 400;\">, the effects of cyberbullying can also impact both the victim and the perpetrator later in life. Any content created or shared online by an individual forms part of their online public reputation, which<\/span><span style=\"font-weight: 400;\"> may be accessible to schools, employers, colleges, clubs, and others who may be researching an individual now or in the future. <\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1654079830380{background-color: #0b4c89 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cta-2-sec&#8221;][vc_column_inner el_class=&#8221;cta-2&#8243; css=&#8221;.vc_custom_1654084713893{background-image: url(https:\/\/www.blueoceanglobaltech.com\/blog\/wp-content\/uploads\/2022\/05\/Group-338.png?id=13390) !important;}&#8221;][vc_custom_heading text=&#8221;We Value Reputation,<br \/>\nLet\u2019s Rebuild Yours.&#8221; font_container=&#8221;tag:h2|text_align:center|color:%23FFFFFF&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221; css=&#8221;&#8221;][vc_column_text css=&#8221;.vc_custom_1741167705146{padding-bottom: 2% !important;}&#8221;]<span style=\"font-weight: 400;\">A Positive Reputation is Priceless. Value and Protect It.<\/span>[\/vc_column_text][vc_btn title=&#8221;Schedule a Call&#8221; css=&#8221;.vc_custom_1741167611719{margin-right: 50px !important;margin-left: 50px !important;padding-top: 2% !important;}&#8221; link=&#8221;url:https%3A%2F%2Fcalendly.com%2Fblue-ocean-global-team|target:_blank&#8221; el_class=&#8221;solid-button-1&#8243;][vc_btn title=&#8221;Contact Us&#8221; css=&#8221;.vc_custom_1741167621189{margin-right: 50px !important;margin-left: 50px !important;padding-top: 2% !important;}&#8221; link=&#8221;url:https%3A%2F%2Fwww.blueoceanglobaltech.com%2Fcontact-us%2F|target:_blank&#8221; el_class=&#8221;solid-button-1&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;three&#8221;][vc_column_inner el_id=&#8221;two&#8221;][vc_column_text]<\/p>\n<h4><span style=\"color: #636363;\">How Can We Spot and Stop Cyberbullying?<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Understanding how young people are cyberbullied is important so that the behavior can be easily recognized and preventive measures can be taken to stop cyberbullying. Some examples of <\/span><span style=\"font-weight: 400;\">cyberbullying tactics<\/span><span style=\"font-weight: 400;\"> include:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sharing a photo of somebody nude or in a compromising position. This can expose the victim to public ridicule, embarrassment, and shame.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">One person is singled out by a group and subjected to consistent harassment\u2014possibly false accusations or lies. This constant barrage of abuse via social media and direct messaging can be all-consuming and relentless, gradually wearing down victims until they break, either mentally or physically.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Victims are tormented due to prejudice on the part of the perpetrator, whether it is based on race, gender, sexual preference, background, or economic means.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Perpetrators may adopt a fake identity to coerce victims into sharing personal information or to shield their true identity, to avoid the consequences of online bullying. Similar to someone engaging in road rage, the perpetrator feels secure behind a screen and freer to bully without being discovered or punished.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Persuading victims to do something they don\u2019t want to or something that will make them look foolish. Cyberbullying tactics can include perpetrators putting pressure on victims to harm themselves, make a fool of themselves, or, in extreme cases, take their own lives.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Exposure of victims\u2019 personal details to invite further harassment or even a threat to their safety. Also known as <i>doxing<\/i>, this occurs when a perpetrator posts personal details such as a home address, email, and social media links online, inviting others to target the individual with abuse.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1662536479861{padding-bottom: 2% !important;}&#8221;][vc_column_inner][vc_single_image image=&#8221;15860&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1679497483563{margin-bottom: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1679491802524{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;]<\/p>\n<p style=\"text-align: center; font-size: 13px;\">Image Credits: <a href=\"https:\/\/www.pexels.com\/photo\/message-against-bullying-6936335\/\" rel=\"noopener\">Pexels<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;four&#8221;][vc_column_inner][vc_column_text]<\/p>\n<h4><span style=\"color: #636363;\">Why Do Cyberbullies Bully?<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Nowadays, <a href=\"https:\/\/www.forbes.com\/sites\/nicolemartin1\/2018\/12\/20\/from-cyberbullying-to-digital-addiction-how-social-media-is-affecting-teens\/?sh=19950fdf3a26\" rel=\"noopener\">young people are prone<\/a> to become addicted to social media, and this can increase their propensity to commit cyberbullying or fall victim to it. According to <\/span> <a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/23727810.2020.1835420\" rel=\"noopener\"><span style=\"font-weight: 400;\">a study by University of Georgia<\/span><\/a><span style=\"font-weight: 400;\"> researcher Amanda Giordano and others<\/span><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">those who spend more time online, have elevated social media addiction scores, and identify as male are more likely to commit acts of cyberbullying.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cSocial media addiction is when people crave it when they&#8217;re not on it, and continue their social media use despite negative consequences,\u201d said <\/span><span style=\"font-weight: 400;\">Giordano,<\/span><span style=\"font-weight: 400;\"> principal investigator of the study and associate professor at UGA.<\/span> <span style=\"font-weight: 400;\">\u201cSome negative consequences could be they&#8217;re tired during the day because they&#8217;re scrolling all night long, they\u2019re having conflicts with their parents, they&#8217;re getting poor grades in school or they&#8217;re engaging in actions online that they later regret, but they continue to use social media.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Social networking sites are designed to give people a dopamine hit, Giordano added, and some people compulsively look for that hit. \u201cIt\u2019s feeding into that addictive behavior, and they may be using cyberbullying as a way to get likes, shares, comments, and retweets,\u201d she said. \u201cThat\u2019s the common thread you see in behavioral addictions\u2014people start relying on a rewarding behavior as a way to make them feel better when they\u2019re experiencing negative emotions.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Other reasons people might cyberbully others: to get revenge for hurtful acts (intentional or otherwise) victims have committed, to gain popularity, to distract themselves from other issues in their lives such as problems at home, or simply to try to get enjoyment in cruelty.\u00a0 <\/span><span style=\"font-weight: 400;\">Traditionally, bullies tended to be physically bigger and stronger, or simply older, but the digital world presents the opportunity to people who don\u2019t have those characteristics. <\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1662536479861{padding-bottom: 2% !important;}&#8221;][vc_column_inner][vc_single_image image=&#8221;15858&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1679497524411{margin-bottom: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1679491352701{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;]<\/p>\n<p style=\"text-align: center; font-size: 13px;\">Image Credits: <a href=\"https:\/\/www.pexels.com\/photo\/woman-in-blue-shirt-talking-to-a-young-man-in-white-shirt-8550841\/\" rel=\"noopener\">Pexels<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;five&#8221;][vc_column_inner][vc_column_text]<\/p>\n<h4><span style=\"color: #636363;\">What Are the Steps We Can Take to Prevent Cyberbullying?<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Cyberbullying, despite the public nature of social media, can still go undetected by people around the victim, so it\u2019s important to be aware of friends\u2019 and loved ones\u2019 mental, emotional, and physical states. Watch to see if you notice any signs of change. Because of the shaming and embarrassing effects of cyberbullying, victims may be reluctant to tell anyone it\u2019s happening. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The good news is, once others who can help and support the victim become aware of the abuse, steps can be taken to stop it and punish the perpetrator(s). But it will take all of us to become vigilant and remain so about the existence of cyberbullying because, unfortunately, it isn\u2019t showing signs of going away.<\/span><\/p>\n<p>In order to <a href=\"https:\/\/www.verywellfamily.com\/how-to-prevent-cyberbullying-5113808\" rel=\"noopener\">stop cyberbullying<\/a>, it&#8217;s essential to determine the uniqueness of each case. If you or someone you know is experiencing cyberbullying, you can seek help from a number of organizations, including Blue Ocean Global Technology, that can provide support in resolving your case and <a href=\"https:\/\/www.blueoceanglobaltech.com\/blog\/protect-your-brand-reputation\/\">restoring your online reputation<\/a>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1654856910875{background-image: url(https:\/\/www.blueoceanglobaltech.com\/blog\/wp-content\/uploads\/2022\/05\/Rectangle-102.png?id=13271) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;border-radius: 15px !important;}&#8221;][vc_column_inner el_class=&#8221;cta-3-2 cta-3-1 cta-3&#8243;][vc_custom_heading text=&#8221;Are You or Someone Close to You a Victim to Cyber Crime?&#8221; font_container=&#8221;tag:h2|font_size:36|text_align:center|color:%23ffffff&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221;][vc_custom_heading text=&#8221;You Don\u2019t Have to Face It alone.We Are Here to Support You.<br \/>\nContact Us Today.&#8221; font_container=&#8221;tag:p|font_size:22px|text_align:center|color:%23ffffff&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221; css=&#8221;.vc_custom_1679299797409{padding-bottom: 12px !important;}&#8221;][vc_btn title=&#8221;Request a Call Back&#8221; css=&#8221;.vc_custom_1732191709545{margin-right: 50px !important;margin-left: 50px !important;}&#8221; el_class=&#8221;solid-button-1 popmake-14008&#8243; link=&#8221;url:https%3A%2F%2Fwww.blueoceanglobaltech.com%2Fcontact-us%2F|target:_blank&#8221;][vc_btn title=&#8221;Send Us an Email&#8221; css=&#8221;.vc_custom_1732191718499{margin-right: 50px !important;margin-left: 50px !important;}&#8221; el_class=&#8221;border-button-2 border-button-2-dark&#8221; link=&#8221;url:mailto%3A%20info%40blueoceanglobaltech.com|target:_blank&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>With the ever-growing use of social media sites and digital devices, cyberbullying is on the rise. Take the following actions to stop cyberbullying.<\/p>\n","protected":false},"author":1,"featured_media":15876,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[274,275,309,545],"tags":[336,276,231,52,95,339,340],"class_list":["post-15833","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-bullying","category-cyber-crimes","category-defamation","category-reputation-management","tag-blue-ocean-global-technology","tag-cyber-crimes","tag-cyberbullying","tag-digital-reputation","tag-online-reputation","tag-stop-cyberbullying","tag-stop-cybercrimes","entry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/posts\/15833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/comments?post=15833"}],"version-history":[{"count":5,"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/posts\/15833\/revisions"}],"predecessor-version":[{"id":20956,"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/posts\/15833\/revisions\/20956"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/media\/15876"}],"wp:attachment":[{"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/media?parent=15833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/categories?post=15833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.blueoceanglobaltech.com\/blog\/wp-json\/wp\/v2\/tags?post=15833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}