mfrantz

Untitled

Jan 22nd, 2018
94
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 13.55 KB | None | 0 0
  1.  
  2. <?xml version="1.0" encoding="iso-8859-1"?>
  3. <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
  4. "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd ">
  5. <html xmlns="http://www.w3.org/1999/xhtml">
  6. <!--updated 27 June 2005 18:25 GMT by pb -->
  7. <head>
  8. <title>STOP cyberbullying: Cyberbullying by proxy</title>
  9. <meta name="Keywords" content="cyberbullying,cyber-bullying,cyberbully,cyberbullies,cyber bullies,cyber bullying,e-bullying,electronic bullying,internet bullying,online bullying,bully,bullying,bullied,bullies,teasing,tease,victims,internet,safety,support,helpline,anti-bullying,antibullying,legal,law,harassment,stalking,teasing,taunting,hazing" />
  10. <meta name="Description" content="What cyberbullying is, how it works and how to understand and deal with cyberbullies." />
  11. <meta name="OWNER" content="WiredSafety.org" />
  12. <meta name="AUTHOR" content="WiredSafety.org" />
  13. <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
  14. <meta name="rating" content="general" />
  15. <meta name="robots" content="index,follow" />
  16. <meta name="revisit-after" content="4 weeks" />
  17. <meta name="MSSmartTagsPreventParsing" content="TRUE" />
  18. <meta http-equiv="imagetoolbar" content="no" />
  19. <meta http-equiv= "pragma" content="no-cache" />
  20. <base href="http://www.stopcyberbullying.org/" target="_top" />
  21. <link rel="shortcut icon" href="/favicon.ico" />
  22. <style type="text/css" media="screen">
  23. /*<![CDATA[*/
  24. @import url(/css/01.css);
  25. /*]]>*/
  26. </style>
  27. <script type="text/javascript" src="/js/rainbow.js"></script>
  28. <script type="text/javascript">
  29.  
  30. var _gaq = _gaq || [];
  31. _gaq.push(['_setAccount', 'UA-34068211-2']);
  32. _gaq.push(['_setDomainName', 'stopcyberbullying.org']);
  33. _gaq.push(['_trackPageview']);
  34.  
  35. (function() {
  36. var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true;
  37. ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js';
  38. var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s);
  39. })();
  40.  
  41. </script>
  42. <script language="JavaScript" type="text/javascript">
  43. <!--
  44. function MM_preloadImages() { //v3.0
  45. var d=document; if(d.images){ if(!d.MM_p) d.MM_p=new Array();
  46. var i,j=d.MM_p.length,a=MM_preloadImages.arguments; for(i=0; i<a.length; i++)
  47. if (a[i].indexOf("#")!=0){ d.MM_p[j]=new Image; d.MM_p[j++].src=a[i];}}
  48. }
  49.  
  50. function MM_swapImgRestore() { //v3.0
  51. var i,x,a=document.MM_sr; for(i=0;a&&i<a.length&&(x=a[i])&&x.oSrc;i++) x.src=x.oSrc;
  52. }
  53.  
  54. function MM_findObj(n, d) { //v4.01
  55. var p,i,x; if(!d) d=document; if((p=n.indexOf("?"))>0&&parent.frames.length) {
  56. d=parent.frames[n.substring(p+1)].document; n=n.substring(0,p);}
  57. if(!(x=d[n])&&d.all) x=d.all[n]; for (i=0;!x&&i<d.forms.length;i++) x=d.forms[i][n];
  58. for(i=0;!x&&d.layers&&i<d.layers.length;i++) x=MM_findObj(n,d.layers[i].document);
  59. if(!x && d.getElementById) x=d.getElementById(n); return x;
  60. }
  61.  
  62. function MM_swapImage() { //v3.0
  63. var i,j=0,x,a=MM_swapImage.arguments; document.MM_sr=new Array; for(i=0;i<(a.length-2);i+=3)
  64. if ((x=MM_findObj(a[i]))!=null){document.MM_sr[j++]=x; if(!x.oSrc) x.oSrc=x.src; x.src=a[i+2];}
  65. }
  66. //-->
  67. </script>
  68. </head>
  69. <body >
  70. <table width="75%" border="0" align="center" cellpadding="0" cellspacing="0" name="mainframe">
  71. <tr>
  72. <td width="20" height="20" valign="bottom" class="blank"><img src="/images/curve1.gif" alt="corner image" width="20" height="20" /></td>
  73. <td height="20" align="center" valign="bottom" class="white">&nbsp;</td>
  74. <td width="20" height="20" valign="bottom" class="blank"><img src="/images/curve2.gif" alt="corner image" width="20" height="20" /></td>
  75. </tr>
  76. <tr valign="middle" class="white">
  77. <td width="20">&nbsp;</td>
  78. <td valign="top" class="white"><table width="100%" border="0" cellspacing="0" cellpadding="0">
  79. <tr>
  80. <td width="31%"><a href="/index2.html"><img src="/images/main_logo_sm.gif" alt="stopcyberbullying.org" width="251" height="102" border="0" /></a></td>
  81. <td width="69%" align="right" valign="top"><a href="/doc/cyberbullying_by_proxy.doc"><img src="/images/doc.gif" alt="Download this article in DOC [Word] format" width="42" height="40" border="0" /></a><a href="/pdf/cyberbullying_by_proxy.pdf"><img src="/images/pdf.gif" alt="Download this document in PDF [Acrobat] format" width="40" height="40" border="0" /></a></td>
  82. </tr>
  83. </table>
  84. <p align="center"><a href="/what_is_cyberbullying_exactly.html" title="Link to information about cyberbullying and what cyberbullying is">what is it?</a> :: <a href="/how_it_works/index.html" title="Link to information on how cyberbullying works">how it works</a> :: <a href="/why_do_kids_cyberbully_each_other.html" title="Link to information about why kids cyberbully each other">why cyberbully?</a> :: <a href="/prevention/index.html" title="Link to information on preventing cyberbullying">prevention</a> :: <a href="/take_action/take_a_stand_against_cyberbullying.html" title="Link to information about how to take a stand against cyberbullying">take action</a> :: <a href="/lawenforcement/index.html" title="Link to information about cyberbullying and the law">what's the law?</a></p>
  85. <p><strong><img src="/images/icon_arrow.gif" alt=">" width="15" height="15" align="absmiddle" /> In this section:<br />
  86. </strong><a href="/how_it_works/direct_attacks.html" title="Link to information about direct attacks">Direct Attacks</a> :: <span class="current">Cyberbullying by proxy</span></p>
  87. <p><strong>Cyberbullying by proxy</strong></p>
  88. <p>Cyberbullying by proxy is when a cyberbully gets someone else to do their dirty work. Most of the time they are unwitting accomplices and don't know that they are being used by the cyberbully. Cyberbullying by proxy is the most dangerous kind of cyberbullying because it often gets adults involved in the harassment and people who don't know they are dealing with a kid or someone they know.</p>
  89. <p>"Warning" or "Notify Wars" are an example of cyberbullying by proxy. Kids click on the warning or notify buttons on their IM screen or e-mail or chat screens, and alert the ISP or service provider that the victim has done something that violates their rules. If the victim receives enough warnings or notifications, they can lose their account. The service providers are aware of this abuse, and often check and see if the warning were justified. But all the cyberbully has to do is make the victim angry enough to say something rude or hateful back. Then, BINGO! they warn them, making it look like the victim had started it. In this case, the ISP or service provider is the innocent accomplice of the cyberbully.</p>
  90. <p>Sometimes the victim's own parents are too. If the cyberbully can make it look like the victim is doing something wrong, and the parents are notified, the parents will punish the victim. Alyssa, one of our Teenangels, had this happen to her. To learn more about her cyberbullying problem, read Alyssa's story.</p>
  91. <p>Cyberbullying by proxy sometimes starts with the cyberbully posing as the victim. They may have hacked into their account or stolen their password. They may have set up a new account pretending to be the victim. But however they do it, they are pretending to be the victim and trying to create problems for the victim with the help of others.</p>
  92. <p>The most typical way a cyberbullying by proxy attack occurs is when the cyberbully gets control of the victim's account and sends out hateful or rude messages to everyone on their buddy list pretending to be the victim. They may also change the victim's password so they can't get into their own account. The victim's friends get angry with the victim, thinking they had sent the messages without knowing they have been used by the cyberbully. But it's not always this minor. Sometimes the cyberbully tries to get more people involved. </p>
  93. <p>For example...Mary wants to get Jennifer back for not inviting her to her party. She goes online and, posing as Jennifer, posts "I hate Brittany, she is so stupid, ugly and fat!" on buddyprofile.com. Mary may tell Brittany and her friends that she read the post on buddyprofile.com and blames Jennifer for being mean. Brittany and her friends now start attacking Jennifer, and may report her to buddyprofile.com or her school. They are doing Mary's dirty work for her. Mary looks like the "good guy" and Jennifer may be punished by her parents, lose her account with buddyprofile.com and get into trouble at school. And Brittany and her friends may start to cyberbully Jennifer too.</p>
  94. <p>Sometimes it is much more serious than that. When cyberbullies want to get others to do their dirty work quickly, they often post information about, or pose as, their victim in hate group chat rooms and on their discussion boards. Cyberbullies have even posted this information in child molester chat rooms and discussion boards, advertising their victim for sex. They then sit back and wait for the members of that hate group or child molester group to attack or contact the victim online and, sometimes, offline.</p>
  95. <p>For this to work, the cyberbully needs to post offline or online contact information about the victim. Real information, not the account they used to impersonate the victim (if they are posing as the victim to provoke an attack). For example...Jack is angry that Blake was chosen as captain of the junior varsity basketball team. Blake is black. Jack finds a white supremist group online and posts in their chat room that Blake said nasty things about whites and their group in particular. He then posts Blake's cell phone number and screen name. People from the group start calling and IMing Blake with threats and hateful messages. Jack has no idea how much danger he has placed Blake in, and Blake doesn't know why he in under attack. In cases of cyberbullying by proxy, when hate or child molester groups are involved, the victim is in danger of physical harm and law enforcement must be contacted immediately.</p>
  96. <p>Can you think of examples of cyberbullying by proxy? Share them with us and other kids, preteens and teens here at the site. We'll never use your name or personally identifying information, share it with others or bother you. Read our privacy policy to know how we use your information. You should always read a privacy policy before submitting anything to anywhere online.<br />
  97. <img src="/images/pixel.gif" alt="" width="1" height="20" /></p></td>
  98. <td width="20">&nbsp;</td>
  99. </tr>
  100. <tr valign="middle" class="white">
  101. <td>&nbsp;</td>
  102. <td align="right" valign="top" class="white"><a href="/about.html"><img src="/images/home.gif" alt="About stopcyberbullying.org" width="70" height="70" border="0" /></a><a href="/kids/index.html"><img src="/images/red_frame.gif" alt="Information for kids aged seven to ten" width="70" height="70" border="0" /></a><a href="/tweens/index.html"><img src="/images/orange_frame.gif" alt="Information for tweens aged eleven to thirteen" width="70" height="70" border="0" /></a><a href="/teens/index.html"><img src="/images/yellow_frame.gif" alt="Information for teens aged fourteen to seventeen" width="70" height="70" border="0" /></a><a href="/parents/index.html"><img src="/images/green_frame.gif" alt="Information for parents and carers" width="70" height="70" border="0" /></a><a href="/educators/index.html"><img src="/images/blue_frame.gif" alt="Information for educators" width="70" height="70" border="0" /></a><a href="/lawenforcement/index.html"><img src="/images/purple_frame.gif" alt="Information for law enforcement" width="70" height="70" border="0" /></a></td>
  103. <td>&nbsp;</td>
  104. </tr>
  105. <tr valign="middle" class="white">
  106. <td>&nbsp;</td>
  107. <td align="center" valign="top" class="white"><p class="small"><a href="/contact_us.html" title="Link to stopcyberbullying.org contact details"><br />
  108. contact us</a> :: <!---<a href="/donations.html" title="Link to information about making a donation">donate</a> :: --><a href="http://www.wiredsafety.org/volunteer/" title="Link to a step by step guide to volunteering with this organization, at WiredSafety.org">volunteer</a> :: <a href="/media.html" title="Link to resources for our friends in the media">media </a><br />
  109. <a href="/privacy.html" title="Link to stopcyberbullying.org privacy policy">privacy policy</a> :: <a href="/terms.html" title="Link to stopcyberbullying.org terms of use">terms of use</a></p>
  110. <noscript>
  111. If you are reading the messages at the bottom of this page, it is because you do not have JavaScript enabled.
  112. </noscript>
  113. <script type="text/javascript" src="/js/copyright_graphics.js"></script>
  114. <noscript>
  115. Some images on this Web site are protected by copyright. Please refer to http://www.wiredsafety.org/resources/ for a list of approved graphics.
  116. </noscript>
  117. <script type="text/javascript" src="/js/breakout.js"></script>
  118. <noscript>
  119. We do not permit the framing of pages from our Web site. If you are viewing this page in another Web site's frame set, please tell us: https://www.wiredsafety.org/forms/contact.html
  120. </noscript></td>
  121. <td>&nbsp;</td>
  122. </tr>
  123. <tr>
  124. <td width="20" height="20" valign="top" class="blank"><img src="/images/curve3.gif" alt="corner image" width="20" height="20" /></td>
  125. <td valign="top" class="white"><div align="center" class="small">&copy; WiredSafety.org All rights reserved.</div></td>
  126. <td width="20" height="20" valign="top" class="blank"><img src="/images/curve4.gif" alt="corner image" width="20" height="20" /></td>
  127. </tr>
  128. </table>
  129. <br />
  130. <br />
  131. </body>
  132. </html>
Add Comment
Please, Sign In to add comment