cyberbullying research center   "There were bad comments made about my daughter on topix.com that she had been sexually active with several people and she named listed as the topic in my small town. How can topic be stopped. They don't sensor anything that anyone says and this has given my daughter a bad reputation because it's not true." (15 year-old girl from KY)
...identifying the causes and consequences of cyberbullying
Navigation Menu
Check out our books!
Addressing Cyberbullying
1.
What are some electronic devices used to bully others?
A. Cell phones
B. Computers
C. Internet-enabled gaming consoles
D. Digital camera
E. All of the above

2.
How many active users does Facebook - generally regarded as the #1 social networking site, have?
A. 500 thousand
B. 10 million
C. 100 million
D. 250 million
E. 500 million

3.
How many hours of the day are children vulnerable to cyberbullying?
A. 0
B. 2
C. 6
D. 12
E. 24

4.
Why don't victims tell their parents what is happening to them on the computer?
A. They don't want their computer privileges taken away
B. They are embarrassed that they are being picked on
C. They don't think their parents can do anything to help
D. They aren't able to openly share their struggles and problems with parents
E. All of the above

5.
Parents should keep the computer their child(ren) use in:
A. A high-traffic area
B. The child's bedroom
C. The bathroom
D. The garage
E. There should not be computers in anyone's homes.

6.
Cyberbullying victims tend to be harassed by:
A. A stranger who is much older than them
B. A stranger who is much younger than them
C. Someone they know at school
D. A relative
E. None of the above

7.
Let's say that you use AOL for your email. What email address should you use to contact AOL if you receive a harassing, threatening, or otherwise problematic email?
A. "abuse@aol.com"
B. "cyberbully@aol.com"
C. "help@aol.com"
D. "saveme@aol.com"
E. "spam@aol.com"

8.
How do you know that a web site has a secure connection?
A. There is a lock in the top right or bottom right corner of your web browser
B. There is a red flashing pop-up that informs you
C. It is your friend's site
D. The web address looks to be legitimate
E. It is impossible to know

9.
Who among the following are most likely to be a perpetrator of sexual abuse against a child?
A. Registered sex offender
B. Friend
C. Stranger
D. Online acquaintance
E. Other relative

10.
The parents of a cyberbullying victim can possibly sue the parents of a cyberbullying offender in civil court for:
A. Defamation of character
B. Intentional infliction of emotional distress
C. Invasion of privacy
D. None of the above
E. Any of the above

Follow Us!

youtube twitter
Sameer's Linkedin Cyberbullying Research Center on Facebook! Justin's Linkedin

What They're Saying...
"I found your presentation insightful, informative, and eye opening. I recommend anyone who can attend this workshop should attend. You will not regret attending this session." Deborah Washington, Family Liaison at Aurora West Academy with Aurora Public Schools, Aurora, CO
Recent Comments

Link Buttons
Use these buttons to link to our site:

cyber bullying
cyberbullying research center
online harassment
Internet bullying