ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Child Safety- what is Cyber bulling, Stalkers

Updated on January 30, 2014

Thing associated with cyber bullying

# They spread lies

# Identity theft

# Impersonation

# They send threatening messages

# Threatening texts, emails

# Cause mental torture

# An could be sexual predators

Is your child safe from cyber bullies, cyber stalkers?

The main question is how safe is our children? Are they protected from cyber bullies, cyber stalkers, sexual perverts and predators not entirely, so long as they have easy access to the internet there is a chance for molestation. The fast improvement in smart technology is not helping matters from our basic smart phones to androids, tablets, iphone, table top computers, laptops and many more devices that can log unto the web add to a worrying trend of gadgets that can be used to browse the web. Who is your ward talking too, exchanging contact or socializing with, how many hours does he spend browsing/surfing the web?

Every good has a bad, plus a minus the web is loaded with useful information and resources that make our lives a little easier and exciting, but the biggest problem with online content is the ambiguity that the medium can offer. We are no longer dealing with our immediate community but the entire world where sex offenders, perverts, murders, rapists and pedophile abound.

Without proper guidance our children are exposed to all the dangers and risks associated with cyber space content, as long as children handle the device there is a risk that they may fall prey to cyber bullies or stalkers. There are some sick individuals who prey on young children by pretending friendship to lure the individual into some trap. These predators are coning, smart and savvy in their knowledge of the technology they use. Cyber predators come in many guises some of which are cyber bullies, cyber stalkers, and cyber teasers and so on.

About cyber bullies

Bullying is when a person uses superior strength or influence to intimidate, force a person to act against there true character. The act is carried out through aggressive behavior repeated intentional actions to cause grief and discomfort. Cyber bullies main course of action is to identify a potential victim, this he does by enrolling into several social websites, websites that have to do with specific areas of his interest. The bully would as a rule makes contact with the intended victim though friendly chat, sending and sharing of false picture-that is if the perpetrator targets a minor and establishes friendship.

Image of a Cyber stalker

Picture of Cyber Stalker
Picture of Cyber Stalker | Source


The bully may assume the personality of the victim through identity theft using fraudulent acquisition of sensitive information, which he applies for his personal gain, the bully/stalker may obtain this information for the sole purpose of assuming the person’s identity, to perpetuate fraud or harass the individual involved. A more sinister purpose may be to track down the individual.

Spread lies

The bully might be someone known who seeks mischief or revenge by spreading lies about the victim to victimize or discredit the individual in the eyes of his peers, the lies could be malicious, childish scandalous, it will be an intentional falsehood used or broadcasted to deceive and ridicule.


The cyber bully may decide to disseminate information into cyber space about the victim that was not true or half truths, the malicious ones might fabricate information about the person to hurt the persons reputation identity or personality- the information could range from the persons sexual preferences, business, family background and so on. The rumors are tailored to hurt or elicit a response.

Cyber threats

Cyber threats may have behind them real dangers or mere bravado, it is extremely difficult to determine the source and intention of the cyber bully, the intention could by all intents and purposes be real, the perpetuator may be tending or intending menace, fear, uneasiness through aggravated and systemic harassment. The bully may carry out this act through unsolicited emails, could send threatening text messages could use spamming, may access the victims profile with malicious intent and many other means directly aimed at the child/victim.

Keeping your child safe

How to keep your child safe from stalkers

See results

Sexual comments

The cyber bully may resort to dirty unwholesome comments with sexual undertones, suggestion and inappropriate gesture; they could result to in appropriate imagery, talk and baiting Exposing your child to such threats like easy availability of pornographic material and the damaging effect of underage exposure can have on a child confused and unsure. Sexual predators come under the guise of bullies or friendship to express their perversions and find easy pray.

Cyber sexual predators are one of the most dangerous set of people a child may be exposed too, they may first come out friendly, understanding the problems of their victims, study their behavior likes and wants skillfully manipulating the actions of the minor, some may be closet perverts while others act on their perversions and make contact with the victims through requests for an offline meet.

Mental torture

Cyber stalking puts a lot of pressure on the recipient it can translate into mental torture, psychological problems, agony and suicidal tendencies with serious devastating results, constant texting, and phone calls at odd hour with the silent caller, a barrage of emails can cause serious health issues for the victim

Image of stalker

image of stalker
image of stalker | Source


There are rules to being online which you should teach your child some of which are

Rules of cyber engagement

1 don’t speak to strangers

2 protect your personal information

3 to much information is bad, limit disclosure

4 remember you are dealing with the entire world

5 avoid porno- set barring on some home appliances like computers

6 be weary of social networks

7 apply filters to personal email, text messages by blocking or spamming unsolicited contact

8 be careful how you use private photographs

9 don’t respond to unsolicited contact

10 if harassed let them come to you for assistance

11 Report cyber predators to relevant authorities.

Decoding a troubled victim

Parents should be alert at subtle signs in their children, some of which are

School blues. When the child suddenly shows unwillingness to go to school from a formally eager scholar then the red flags are up, the attitude may mean trouble at school from bullies, unusual activities or anxiety. The job of the parent is to recognize such signs and approach the child cautiously offer a friendly hand and express your willingness to tackle any problems the child may seem to have. Offer direct heart felt counsel and solutions to any problems they face, your goal is to make the child open up to you. The victim might take a few days but try to show support and solidarity until they are able and ready to seek you council.

Evasive behavior

Evasive fright is another sign the victim is being bullied they sometimes feel ashamed and un edge thinking that some how they deserve the negative attention of the stalker, their self worth is low or the child may be into porno, it is the parents duty to find out what is wrong, again an offer of friendship and an open door policy with a little investigation on your part could get results. If the child is indeed into some form of antisocial practices being bullied or looks at explicate imagery. The parents duty is to find a solution to the problem without blaming the child, by pointing out the risks and offering a practical solutions.

Fear. Have you noticed fear in your child sudden jerky movements to sound then something is going on in the child’s life you have little knowledge about, youthfulness comes with courage, daring and silly behavior a show of unwarranted fear is not normal for youths. Talk plainly to the child to get direct answer to his problems, be the one he would come to for solutions.


If the youth shows unprovoked anger, sustained over a period something might be wrong, anger is an expression of the inner feelings of a person, it is an outlet for expression in reaction to certain conditions the child might find threatening .

Which is not a pointer to bullying?

1 fear

2 secretiveness

3 depression

4 redrawn behavior

5 long hours browsing

6 abrupt behavior

Bully a fall Away novel-(Image of a couple)

Effective ways to stop cyber bullies

One effective method id switch off your phone and connection to the internet, cyber bullies thrive on attack and response after a while when they are not getting the appropriate feed back the y look for other subjects. Before the advent of the web and smart phone we existed so going off this device for several months cannot harm the child.

Close social media account

Closing up all or most of your social media network accounts to some people might spell disaster but in reality there is nothing gained nothing loss, you can after a while open a new one but hid you true identity from identity thieves, the victim can use other medium where the perpetrator is unaware off or haven’t compromised.

Limit personal information

Sometimes I cringe when I come open someone in a social network that ha his entire family portrait image, schools they attend and other sensitive information displayed where a predator may stumble upon. The person has made a grievous error refusing to acknowledge the far reach of the web; the entire world can access your bio data sometimes with deadly or unwholesome repercussions.

Advice a ward to inculcate the habit of limiting pictures, phone numbers and address they supply to their groups or social groups. Take charge of what your child watches, reads or listens too, be attentive to changes in the child’s behavior, offer regular advice know his friends. Anyone can be a victim, teach the child responsible use of the power of the net and always pay attention to your kid.


    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)