ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Help teens prevent cyber bullying

Updated on March 2, 2016

When science and technology get more advanced, it remains more risks of Internet attackers, especially for teens who are easily vulnerable to harmful activities. Cyber bullying happens when such electronic communications as text messages, instant messages, emails, or social media updates are used to intimidate or humiliate someone. This can result in serious effects in those victims that are bullied. Below are few essential steps to help teens recognize and prevent cyber bullying.

  1. 1. Types of cyber bullying

Cyber bullying often takes place in the major forms of personal harassment, public humiliation and impersonation.

Harassment is occurring if the bully is directly contacting someone through some modes of electronic communication as follow:

  • Threatening verbal messages, such as name – calling, threats of violence or exposing embarrassing information.
  • An unending barrage of instant messages or texts, emails, whether or not they are threatening in nature.
  • Lies about the victim in order to make them look bad

Public humiliation can use some public tactics. For example, spreading gossip and rumors using social media, or posting intimidating messages on a social media site, or a blog, and even creating a website of defamatory images, rumors and insults about the target.

Impersonation is another harmful form of cyber bullying which can be more difficult to detect the perpetrator. The bully can steal the victim’s password, then hack the accounts in order to send embarrassing information to others or even to make expensive purchases. In some circumstances, the bully may also create a fake screen name which is almost identical to the target’ screen name used for the sake of creating embarrassing or threatening situations.

  1. 2. Take your immediate action and get outside help

Identify the cause - Some bullies start out as a family member, an ex, a friend, or someone else you know well. In this case, have the conversation in person, do not make it through email or text.

Do not respond - If talking it out will not work well, stop directly responding to the bully’s messages. If someone bullies you, keep in mind that your reaction is often exactly what the bully wants. It might give him or her power over you.

Save the evidence – Record every text, email, web address as well as the date and time that each message was sent. File away all evidence you collect from the bully’s behavior, which could help you deal with the situation.

Block the bully. If the harassment comes in the form of email, texts, instant messages, or other profile comments, use your privacy tools to block the person from your phone, email contacts and other social networks to prevent the bully against contacting you again.

Change your account settings including your screen names and other online identifications, or create new accounts if you really want to. Do not reveal your personal information like your address or phone number, because social communication makes it easy for the bully to get in contact with you in plenty of different ways.

Talk to a trusted adultDon't wait too long to ask for help. It is highly recommended to involve a parent or a school administrator so as to know how to help you resolve. Sometimes both are needed. If you are afraid or nervous about saying the problem, look for another way to report the incident anonymously at your school. Additionally, if the cyber bullying involves any threat of violence, death, or sexual or secretly-recorded photos, report it to the law enforcement.

  1. 3. Prevent cyber bullying

Protect your accounts – never share your passwords with anyone, even he or she is your closest friends or ex-lover (who might not be close forever). Share as little information about yourself online as possible. Cyber bullies usually use status updates, pictures, and other personal information on the internet to harass their targets. Protect your phone so that no one could use it to impersonate you as well.

Avoid participating in cyber bullying behavior – Even if your friends are doing this, don’t participate. Explain them that this bullying has dangerous consequences, and ask them to stop.

  1. 4. Additional advice for parents

Work with your children – If they report there is any cyber bullying happening to them, involve the children in finding solutions to help them regain that.

Use parental control software – The program should be installed on your computer as well as smart phone to protect your kids from appropriate sites and help you block any attempt of cyber bullying.


    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)