Examples of Cyberbullying for Kids, Teens & Adults (2023)

Cyberbullying can include:

  • Sendingmean textsor IMs to someone
  • Prankingsomeone’s cell phone
  • Hackinginto someone’s gaming or social networking profile
  • Being rudeor mean to someone in an online game
  • Spreading secretsor rumours about people online
  • Pretending to be someone elseto spread hurtful messages online

Harassing or threatening someone or sending mean messages through instant messages (IMs), phone calls, text messages or emails

Three of Johnny’s teammates send texts to him, blaming him for the team’s loss and telling him that he does not know how to play the game. Johnny is afraid to tell his coach and parents so tolerates the bullying for the entire hockey season. He does not return to hockey the next season.

Mike is a member of the hockey team and likes to turn other team members against Sarah, who is the only girl on the team. The entire team is friends on Facebook, but Mike talks most of the team into removing Sarah as a friend. This upsets Sarah and she decides she wants to quit hockey.

(Video) Is it Cyberbullying?

Posting private or embarrassing photos online or sending them to others

While traveling on the road with a junior team, one of the players takes an embarrassing photo of a girl that he met at the rink. He then posts the photo on Facebook and sends the photo to all of the other players on the team. The photo then gets distributed.

Starting a website that rates someone’s appearance or popularity

At the beginning of the season, a player who is upset that another player was named captain starts a new website about this person that is both degrading and insulting. At the same time, he invites visitors to the website to list all the things this person does wrong throughout the season. As time goes on, more and more negative and insulting posts accumulate on the site.

Verbally abusing other players in multiplayer online games, Internet-connected console games and virtual worlds

(Video) Protect Yourself Rules - Cyber Bullying

Terry constantly bullies a player on his team. One afternoon, as practice ends, Terry apologizes to the player and asks him to join an online game when he gets home. The bullied player is relieved as he thinks Terry is now his friend, but little does he know Terry is a “griefer,” which is a term given to those who make use of online games as a way to target others that are taking part in online gaming. Terry purposely sought out the other player as he played the game and targeted him. As well, not only did Terry attack the other player as part of the game, Terry also engaged in aggressive behaviour outside the parameters of the game, including sending threatening and harassing messages. This makes the player being bullied feel even worse and he no longer wants to be part of the hockey team.

Creating fake Facebook or Twitter accounts that ridicule someone

A junior hockey player is jealous of Jerry, who has been given extra ice time. He poses as a recruiter that is allegedly interested in Jerry, but is just trying to embarrass and disappoint the player.

Stealing someone’s password and impersonating them online

Two players access the coach’s email account and send a message to one of the other players on the team telling him he is released because he is a weak player.

(Video) Responsible Use of Technology for Kids - First Mobile - Cyberbullying - Fake News - Online Privacy

Spreading gossip, secrets or rumors about another person that will damage that person’s reputation

A group of highly-motivated parents do not like the coach’s policy of equal ice times. They want to win at all costs. They create a plan to try and have the coach removed. They videotape the coach at practices and games and then digitally alter the video. They create a website in the coach’s name and post the materials. The coach is so upset, he quits.

Engaging someone in instant messaging and tricking them into revealing personal information and then forwarding that information to others

Linda has been a referee for two years; she is only 16 and is learning the skills to be an excellent referee. She has just finished refereeing a Novice game and the coach of one of the teams is not happy with the calls made. The kids on the team pick up on this and one of the kids who knows the referee, as she babysits for his family, tricks her into giving him her cell number. The player gives the number to all the players on the team and tells them to text her and tell her what a poor referee she is. The referee quits.

Breaking into an email account and sending hurtful materials to others under an assumed identity

(Video) What is Cyberbullying? How to Help Children and Teenagers Who are Cyberbullied

Mike’s minor hockey team has a team Facebook page where the entire team can communicate throughout the hockey season. Before practice, Mike goes on the page and notices that one of the players, pretending to be an assistant coach, posted a rumor on the team page that Mike’s son, Gerry, made the team because his dad was the coach. Gerry has already seen the comment and decides he does not want to go to practice.

Creating blogs or websites that have stories, cartoons, pictures or jokes ridiculing others

Two parents get into a heated argument at the rink about the abilities of each other’s children. One of these parents writes a popular blog about being a hockey parent. That night, the blogger writes a pointed article about a “misguided parent” who cannot face the truth that his son doesn’t have what it takes to play at this level. The blog includes enough hints about the misguided parent’s identity that it is obvious to the whole community who was being attacked.

NOTE: In these examples, cyberbullying impacting bystanders is not addressed. Often, bystanders either tacitly participate by not stepping in, or they feel uncomfortable by the bullying they are observing but not sure what to do. The examples shown here are fictitious in nature and the names given are simply created for the examples.

"; // $(this).append(embeddedVideoPlaceholder); // var w = $(window).width(); // if (w >= 1024) { // attachVideoModal(this, e); // } // else { // attachVideoPlayer(this, e, "videophotocarousel"); // } //}); var link = document.createElement("a"); //var videoURL = ApplicationRootURL + "en-ca" + "/videos/" + video.BrightcoveVideoID + "/" + video.TitleURL; //var videoURL = https://video.hockeycanada.ca+ video.TitleURL; var videoURL ="https://video.hockeycanada.ca" +video.TitleURL; // alert(videoURL); //videoURL += video.TitleURL; //var videoURL = "https://video.hockeycanada.ca" + video.TitleURL; link.setAttribute("href", videoURL); link.setAttribute("title", video.Title); //video placeholder image var videoPositioner = document.createElement("div"); videoPositioner.setAttribute("class", "videoPositioner"); var imagePhoto = document.createElement("img"); imagePhoto.setAttribute("class", "videoPlaceholder"); if (video.ThumbnailURL) { imagePhoto.setAttribute("src", video.ThumbnailURL + '/resize/w/373/h/210/quality/60'); //imagePhoto.setAttribute("src", video.ThumbnailURL ); } else { imagePhoto.setAttribute("src", "/content/images/hockey_canada_640.jpg"); } var imageContainer = document.createElement("div"); imageContainer.setAttribute("style", "border: 1px solid #CCCCCC;"); imageContainer.appendChild(imagePhoto); link.appendChild(imageContainer); var play = document.createElement("div"); play.setAttribute("class", "playdiv"); play.setAttribute("onmouseover", "$(this).find('.play_button').attr('src', '/content/images/playbutton_latest_small_rollover.png')"); play.setAttribute("onmouseout", "$(this).find('.play_button').attr('src', '/content/images/playbutton_latest_small.png')"); link.appendChild(play); var playimage = document.createElement("img"); playimage.setAttribute("class", "play_button"); playimage.setAttribute('src', '/content/images/playbutton_latest_small.png'); play.appendChild(playimage); $(link).append("

(Video) What is Cyberbullying?

"); var title = document.createElement("div"); title.setAttribute("class", "videoTitle "); var subtitle = document.createElement("span"); subtitle.setAttribute("class", "subtitle"); subtitle.appendChild(document.createTextNode(video.Title)); title.appendChild(subtitle); videoPositioner.appendChild(link); videoDiv.appendChild(videoPositioner); videoDiv.appendChild(title); videoContainer.appendChild(videoDiv); var clearItem = document.createElement("div"); clearItem.setAttribute("class", "clear"); videoContainer.appendChild(clearItem); $("#videos-277945").append(videoContainer); Size = video.Size; ii++; } $(".video").css('width', '170px'); $('#VideoCarousel-277945 .bx-next').css('margin-right', '20px'); $('#VideoCarousel-277945 .bx-prev').css('margin-left', '20px'); }, error: function(a,b,c){ $("#videos-277945").empty(); } }); }; function videoNextPage() { $('.videoPage').each(function () { if ($(this).is(':visible')) { if ($(this).next().attr('class') == 'videoPage') { $(this).next().show(); $(this).hide(); $('#videoPrevPage').removeClass('Disabled'); if ($(this).next().attr('data-page') == 'last') { $('#videoNextPage').addClass('Disabled'); } return false; } } }); } function videoPrevPage() { $('.videoPage').each(function () { if ($(this).is(':visible')) { if ($(this).prev().attr('class') == 'videoPage') { $(this).prev().show(); $(this).hide(); $('#videoNextPage').removeClass('Disabled'); if ($(this).prev().attr('data-page') == 'first') { $('#videoPrevPage').addClass('Disabled'); } return false; } } }); } function photoNextPage() { $('.photopage').each(function () { if ($(this).is(':visible')) { if ($(this).next().attr('class') == 'photopage') { $(this).next().show(); $(this).hide(); $('#photoPrevPage').removeClass('Disabled'); if ($(this).next().attr('data-page') == 'last') { $('#photoNextPage').addClass('Disabled'); } return false; } } }); } function photoPrevPage() { $('.photopage').each(function () { if ($(this).is(':visible')) { if ($(this).prev().attr('class') == 'photopage') { $(this).prev().show(); $(this).hide(); $('#photoNextPage').removeClass('Disabled'); if ($(this).prev().attr('data-page') == 'first') { $('#photoPrevPage').addClass('Disabled'); } return false; } } }); }


Which of these is an example of cyberbullying? ›

Cyberbullying can include: Sending mean texts or IMs to someone. Pranking someone's cell phone. Hacking into someone's gaming or social networking profile.

What is cyberbullying in your own words essay? ›

It includes actions to manipulate, harass and defame any person. These hostile actions are seriously damaging and can affect anyone easily and gravely. They take place on social media, public forums, and other online information websites. A cyberbully is not necessarily a stranger; it may also be someone you know.

Which is an example of cyber bullying quizlet? ›

An example of "cyberbullying" is: Constantly instant messaging rude comments to a classmate, Uploading embarrassing pictures of friends at school without their permission, Spreading rumors about kids at school using e-mail.

What is not an example of cyberbullying? ›

Correct option is b. Bullying a classmate in the school corridor.

What are the social impact of cyberbullying? ›

Victims of cyberbullying can experience wide-ranging effects, including mental health issues, poor academic performance, a desire to drop out of school, and even suicidal ideation. Bullies themselves are also at an increased risk of issues such as substance abuse and experiencing violence.

What is the factor of cyberbullying? ›

Whereas low self-esteem is usually linked to traditional bullying, many cyberbullies demonstrate a high perception of self-esteem in perceiving their relationships with peers as satisfying. However, feelings of loneliness and a perception of unsafety at school were often linked to cyberbullying.

Does cyberbullying affect mental health? ›

The effects of cyberbullying also include mental health issues, increased stress and anxiety, depression, acting out violently, and low self-esteem. Cyberbullying can also result in long-lasting emotional effects, even if the bullying has stopped.

What is another name of cyberbullying? ›

Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyberharassment are also known as online bullying.

What are the three emotional effects of cyberbullying? ›

Three Common Emotional Effects of Cyberbullying

Bellow are the most common forms of emotional effects of cyberbullying: Higher rates of depression and anxiety. Reduced feelings of self-worth. Increased suicide attempts.

What is an example of cyberattack? ›

Cyber attacks occur when an individual, group, or organized gang attempts to maliciously breach the security system of another person or organization. While this might prompt you to envision hackers breaking into an online banking system to steal billions, the most common example of a cyber attack is a data breach.

What does cyberbully mean? ›

Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone. Cyberbullying is often done by children, who have increasingly early access to these technologies.

Which of the following are common risks of using social media? ›

Security Risks
  • Unmonitored social media accounts. Social media accounts that are left unattended or no longer used are a target for hackers. ...
  • Imposter accounts. ...
  • Privacy settings. ...
  • Vulnerable third-party apps. ...
  • Human error. ...
  • Phishing attacks and scams. ...
  • Malware attacks and hacks. ...
  • Unsecured mobile phones.

What does Antibullying mean? ›

Anti-bullying refers to laws, policies, organizations, and movements aimed at stopping or preventing bullying. Bullying is a situation where a person, called a bully, verbally or physically threatens or assaults a person, causing the person to feel a real or perceived power imbalance.

Is sexting a form of cyberbullying? ›

Any threatening communication sent electronically to another person. Any explicit pictures intended to harm another person. In addition, sexting is often included in cyberbullying legislation.

Is cyberbullying one word or two words? ›

verb (used with or without object), cy·ber·bul·lied, cy·ber·bul·ly·ing. to bully online by sending or posting mean, hurtful, or intimidating messages, usually anonymously: The 12-year-old had been cyberbullied for almost a year.

How does cyberbullying link to mental health? ›

Cyberbullying can have negative impacts on the wellbeing and mental health of youths, who may be uncertain of what to do, leading some young people to feel isolated, scared or alone. Currently, almost a quarter (22.8 per cent) of young Australians aged 15 to 19 experience serious mental health concerns.

What is problem statement on cyberbullying? ›

Statement of the Problem: Cyberbullying as the name implies is the use of cyberspace as a mechanism to bully others known or unknown to the bully.

Why is cyberbullying research important? ›

Significance of the Study

Cyberbullying is a relatively new phenomenon. The digital nature of it allows a permanent record of negative information that has the potential to affect students' current and future psychological and emotional states.

What are the effects of cyberbullying on students health? ›

Self-esteem, of all parties involved, is affected by cyberbullying. Cyberbullying is similar to traditional bullying, because victims of cyberbullying often report mental health issues such as anxiety, depression, feelings of alienation, reduced concentration, and suicidal thoughts (Kowalski et al., 2012).

What is the impact of online shaming and cyberbullying? ›

The intention is to shame, embarrass, and humiliate the person being bullied. In my work as a mind-body practitioner, I witness the many ways that a negative body image can hurt someone. It can lead to self-destructive behavior such as extreme dieting, eating disorders, self-harming and devastated self-esteem.

What is cyberbullying in social media essay? ›

Executive Summary Cyberbullying is referred as an act of harassment using electronic means. The victims are usually targeted by the means of social media and other such online tools. This may vary from disturbing rumours, threats to sexual remarks about a person. It also includes...

How many people get depressed because of cyberbullying? ›

Results. The prevalence of cyberbullying victimization increased from 3.8% to 6.4% among female respondents and 1.9% to 5.6% among male respondents over three years. About 33% of females and 16.6% of males had depressive symptoms in their young adulthood.

What is the conclusion of cyberbullying? ›

Conclusion: In conclusion, cyber bullying has very damaging consequences to individuals. It disrupts school life, has great emotional damage and may have fatal consequences. Though technology has brought new opportunities for students and teenagers, it is important that everyone learn to use it responsibly.

How many people get anxiety from cyberbullying? ›

37% of bullying victims develop social anxiety.

The effects of cyberbullying statistics point to social anxiety as one of the most damaging issues that arise from being a victim of harassment.

What is online abuse called? ›

cyberbullying. Cyberbullying or online bullying is any type of bullying that happens online. Unlike bullying that takes place offline, online bullying can follow the child wherever they go and it can sometimes feel like there's no escape or safe space.

What is the opposite of cyberbullying? ›

Cyberkindness is using technological means to uplift, serve, love, improve someone's day, or otherwise use digital media to make life easier for someone, emotionally strengthen them, or mentally uplift them.

Why do they call it bully? ›

It comes from the Middle Dutch word boele, which means “lover.” At that time, bully was used in English to mean “sweetheart.” Its use then became more general, coming to mean “fine fellow,” and, eventually, the opposite: “swaggering coward.” Bully began to be used in this sense around the 1700s.

How cyberbullying causes depression and anxiety? ›

How Cyberbullying Affects Children. Victims of cyberbullying can experience symptoms of depression including sadness, loneliness, insecurity, poor self-esteem, academic decline, feelings of not belonging, and suicidal thoughts and behavior.

Why anxiety is effect of cyberbullying? ›

Cyberbullying can strip you of your sense of worth and security, leaving you fearful of others and reluctant to participate in both online and in-person social situations.

What are the 10 common types of cyber threats? ›

Top 10 common types of cyber security attacks
  • Malware.
  • Phishing.
  • Man-in-the-Middle (MitM) Attacks.
  • Denial-of-Service (DOS) Attack.
  • SQL Injections.
  • Zero-day Exploit.
  • Password Attack.
  • Cross-site Scripting.
31 Jan 2022

What are the Top 5 cyber attacks? ›

Below are some of the most common types of cyber-attacks:
  • Malware.
  • Phishing.
  • Man-in-the-middle attack (MITM)
  • Distributed Denial-of-Service (DDoS) attack.
  • SQL injection.
  • Zero-day exploit.
  • DNS Tunnelling.
  • Business Email Compromise (BEC)
7 Nov 2022

What is cybercrime give 5 examples? ›

cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.

What means cyber victim? ›

Cyber-victimization refers to the process of victimizing others through the use of information and communication technologies. Cyber-victims can be governments, organizations or individuals. In this chapter, cyber-victimization is used to refer specifically to the victimization resulting from cyber-criminal behaviour.

Where is cyberbully on? ›

How to Watch Cyberbully. Right now you can watch Cyberbully on Amazon Prime.

Is cyberstalking a cyber crime? ›

Cyberstalking is a crime committed when someone uses the internet and other technologies to harass or stalk another person online. Even though cyberstalking is a broad term for online harassment, it can include defamation, false accusations, teasing, and even extreme threats.

What are 5 dangers of social media? ›

The dangers
  • cyberbullying (bullying using digital technology)
  • invasion of privacy.
  • identity theft.
  • your child seeing offensive images and messages.
  • the presence of strangers who may be there to 'groom' other members.

What are 5 risks? ›

Here Are The Five Essential Steps of A Risk Management Process
  • Identify the Risk.
  • Analyze the Risk.
  • Evaluate or Rank the Risk.
  • Treat the Risk.
  • Monitor and Review the Risk.
20 Jan 2022

Why are teens addicted to social media? ›


Adolescents are at the highest risk of falling into addiction, experts say, for three basic reasons: their tendency to be impulsive, their need for a widespread and growing social influence, and finally, the necessity for them to reaffirm their group identity.

What is the anti-bullying color? ›

Unity Day, on October 10, is a time when people across the country wear orange as a show of support for students who have been bullied.

Is today anti-bullying? ›

U.S. National Stop Bullying Day, which falls on the second Wednesday in October, schoolchildren, their teachers and their parents spend time learning about bullying and recognizing how they can prevent it.

Who is called bully? ›

: a blustering, browbeating person. especially : one who is habitually cruel, insulting, or threatening to others who are weaker, smaller, or in some way vulnerable. tormented by the neighborhood bully. : pimp. : a hired ruffian.

Is grooming a form of cyberbullying? ›

A particular issue related to cyber bullying is grooming online. One of the most sinister aspects of grooming is that it mimics genuinely positive relationships and makes it harder for the victim to reject or report seriously abusive behaviour.

What are 3 forms of sexting? ›

Sexting can happen through sexually explicit text messages, provocative audio clips, suggestive selfies, or videos. No matter what form sexting takes, it should always be a consensual practice between two or more parties.

Is texting considered cyber? ›

The use of technology in any capacity – email, texting, chatrooms, instant messaging – to harass someone qualifies as cyberstalking in a court of law. Common cyberstalking cases include using technology for identity fraud, making threats, and data destruction or manipulation.

What is the best example of cyberbullying *? ›

Here are examples of cyberbullying
  • Sending mean texts or IMs to someone.
  • Pranking someone's cell phone.
  • Hacking into someone's gaming or social networking profile.
  • Being rude or mean to someone in an online game.
  • Spreading secrets or rumours about people online.
  • Pretending to be someone else to spread hurtful messages online.

What are the classification of cyberbullying? ›

Multinomial Naïve Bayes classifier is used to classify the type of bullying. With training, the algorithm classifies cyber bullying as-Shaming, Sexual harassment and Racism.

Which form of cyberbullying is the most common quizlet? ›

About half of young people have experienced some form of cyberbullying, and 10 to 20 percent experience it regularly. Mean, hurtful comments and spreading rumors are the most common type of cyber bullying.

What is the statement of cyberbullying? ›

Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal information, pictures, or videos designed to hurt or embarrass someone else.

What are the 3 factors that motivate perpetrators of cyberbullying? ›

There are a range of reasons why someone might perpetrate cyberbullying behaviors, including revenge, jealousy, boredom, and seeking approval (Varjas, Talley, Meyers, Parris, & Cutts, 2010).

What is a good title for a cyber bullying essay? ›

👍 Good Essay Topics on Cyber Bullying
  • Is Cyber Bullying Morally Justifiable.
  • Cyber Bullying And Its Effect On Our Youth.
  • An Analysis of Cyber Bullying in Today's World.
  • Cyber Bullying And Its Effect On The Lives Of The American.
  • Bullying And The Potential Motives Behind Cyber Bullying.
  • Cyber Bullying And Its Various Forms.
20 Nov 2022


1. What's Cyberbullying?
(Common Sense Education)
3. Cyberbullying - What is it, what law applies to it, and how to we protect our children from it?
(The Law Center)
4. Cyber-bullying Facts – Top 10 Forms of Cyber Bullying
5. Social Media and Cyberbullying 📲 Top Signs of Cyberbullying
(Sam.K Tween & Teens)
6. NetSafe Episode 5: Cyberbullies are No Fun! (Grades 4-6)
(Planet Nutshell)
Top Articles
Latest Posts
Article information

Author: Sen. Ignacio Ratke

Last Updated: 11/27/2022

Views: 5608

Rating: 4.6 / 5 (76 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Sen. Ignacio Ratke

Birthday: 1999-05-27

Address: Apt. 171 8116 Bailey Via, Roberthaven, GA 58289

Phone: +2585395768220

Job: Lead Liaison

Hobby: Lockpicking, LARPing, Lego building, Lapidary, Macrame, Book restoration, Bodybuilding

Introduction: My name is Sen. Ignacio Ratke, I am a adventurous, zealous, outstanding, agreeable, precious, excited, gifted person who loves writing and wants to share my knowledge and understanding with you.