cyberbullying research center   "When I was 8 years old, I met a girl who had gotten into a fight with me a week later. This resulted in cyber bullying that lasted 5 years. The girl was now 16 and was still harassing me. I told my parents who stopped the messages but then the girls mugged me and attacked me. I was in the hospital for 1 week. The girls were caught by the police and now the girls are in juvenile hall. I'm glad that it stopped." (14 year-old girl from Wales, UK)
...identifying the causes and consequences of cyberbullying
Navigation Menu
Check out our books!
Addressing Cyberbullying
1.
What are some electronic devices used to bully others?
A. Cell phones
B. Computers
C. Internet-enabled gaming consoles
D. Digital camera
E. All of the above

2.
How many active users does Facebook - generally regarded as the #1 social networking site, have?
A. 500 thousand
B. 10 million
C. 100 million
D. 250 million
E. 500 million

3.
How many hours of the day are children vulnerable to cyberbullying?
A. 0
B. 2
C. 6
D. 12
E. 24

4.
Why don't victims tell their parents what is happening to them on the computer?
A. They don't want their computer privileges taken away
B. They are embarrassed that they are being picked on
C. They don't think their parents can do anything to help
D. They aren't able to openly share their struggles and problems with parents
E. All of the above

5.
Parents should keep the computer their child(ren) use in:
A. A high-traffic area
B. The child's bedroom
C. The bathroom
D. The garage
E. There should not be computers in anyone's homes.

6.
Cyberbullying victims tend to be harassed by:
A. A stranger who is much older than them
B. A stranger who is much younger than them
C. Someone they know at school
D. A relative
E. None of the above

7.
Let's say that you use AOL for your email. What email address should you use to contact AOL if you receive a harassing, threatening, or otherwise problematic email?
A. "abuse@aol.com"
B. "cyberbully@aol.com"
C. "help@aol.com"
D. "saveme@aol.com"
E. "spam@aol.com"

8.
How do you know that a web site has a secure connection?
A. There is a lock in the top right or bottom right corner of your web browser
B. There is a red flashing pop-up that informs you
C. It is your friend's site
D. The web address looks to be legitimate
E. It is impossible to know

9.
Who among the following are most likely to be a perpetrator of sexual abuse against a child?
A. Registered sex offender
B. Friend
C. Stranger
D. Online acquaintance
E. Other relative

10.
The parents of a cyberbullying victim can possibly sue the parents of a cyberbullying offender in civil court for:
A. Defamation of character
B. Intentional infliction of emotional distress
C. Invasion of privacy
D. None of the above
E. Any of the above

Follow Us!

youtube twitter
Sameer's Linkedin Cyberbullying Research Center on Facebook! Justin's Linkedin

What They're Saying...
"Dr. Hinduja's presentation was just what we needed. He did an excellent job of connecting with our 650 middle schoolers; he spoke their language and got the message across that quick electronic messages can have a lasting impact on others, as well as on one's own future. His evening presentation with the parents was especially informative. With visual aids and handouts, Dr. Hinduja did an outstanding job of covering the world of social networking sites and then responding to their questions and concerns. Overall, we were very pleased, and are even talking about having him come and speak again some time." Tammy Stamm, Assistant Head of Middle School, Pine Crest School, Boca Raton
Recent Comments

Link Buttons
Use these buttons to link to our site:

cyber bullying
cyberbullying research center
online harassment
Internet bullying