5 Types of Internet Abuse Used in Cyberbullying

You might look at the internet in private, but anything you share can quickly become very public. Knowing these five types of internet abuse—which have been used by cyberbullies to embarrass, exploit and harass others—as well as strategies for protecting yourself against them, can help you avoid running into problems.

1

Social Exclusion

Girl being excluded by peers

Vicky Kasala / Getty Images

Social exclusion might be one of the mildest forms of cyberbullying, but it can cause serious distress: it's the online equivalent of leaving someone out of a group to which they should expect automatic membership. This could include an entire class not accepting a friend request from a particular classmate.

Tip: Focus on developing real-life relationships rather than depending on virtual relationships for social connection. If you or your child is being excluded online, this is probably an indication of a more serious social problem in real life. Talk to your parents, teachers, or a counselor if you're being socially excluded at school. Joining online or real-life groups based on your interests, hobbies, or activities is also helpful.

2

Tagging Without Permission

Tagging is a way of attaching a person's name to an online image so that their name appears on the image, or so that images of a particular person can be identified by searching for tagged images using their name.

Tip: Limit and censor images that you post of yourself, and that others post of you. Adjust the privacy settings of Facebook or the website you are using and so that tagged images of you cannot be seen by others.

Block people from accessing any information about you. If your image has been posted on a website, contact the website administrator and request that it be taken down. If the image is pornographic, you may be able to report the abuse to the police, although some teens have found themselves in trouble for others' posting sexual images of them online.

3

Flaming

Flaming is the practice of posting derogatory comments about another person. It can include outing another person by revealing that they're gay when they haven't come out; character assassination by berating someone's character through exaggerating perceived faults in an unbalanced way; or posting untrue information about someone in order to damage their image or reputation.

Tip: Although abuse is never the fault of the victim, you can reduce the likelihood that it will happen to you by conducting yourself appropriately online, avoiding provoking negative reactions in others by comments you make, and treating yourself and others with respect. At the very least, any flaming that does happen will be unsubstantiated and unconvincing.

If you are the victim of flaming, report abuse to the owner of the website; webmasters are increasingly aware of internet abuse and have moderators who can remove offensive material.

4

Sext Re-Posting

Sexting is a risky activity, but when you are in a relationship, you can be drawn into sexting a picture of yourself to your loved one without thinking about the potential future risk of its being used against you.

Younger internet users, especially teenage girls, can also be flattered into sexting images of themselves, or flashing on a webcam, by predators, pedophiles, and pornographers who can use these images for cybersex. This is known as coercion and is a form of internet abuse. While you may feel embarrassed by such images of you being made public, it is not your fault.

Ask them to take the image down, and if they do not, report it to the website as being posted without your consent. If they continue to leave it online, and especially if they are harassing you in any other way, report it to the police.

5

Impersonation and Identity Theft

Impersonation is pretending to be someone else and can range from obvious mockery to actually borrowing or stealing someone's identity—such as their name, image, or identifying information—to carry out actions that are attributed to the victim.

Tip: For superficial impersonations, such as someone posting up a silly comment online using your name, add a comment below stating that it was not made by you. For more serious impersonations, like comments expressing controversial views you do not agree with, contact the webmaster and ask to have it removed. If your personal information is used to commit theft or another crime, you either confront the culprit to correct the matter or report it to the police.

1 Source
Verywell Mind uses only high-quality sources, including peer-reviewed studies, to support the facts within our articles. Read our editorial process to learn more about how we fact-check and keep our content accurate, reliable, and trustworthy.
  1. Indiana University. What is flaming?.

By Elizabeth Hartney, BSc, MSc, MA, PhD
Elizabeth Hartney, BSc, MSc, MA, PhD is a psychologist, professor, and Director of the Centre for Health Leadership and Research at Royal Roads University, Canada.