Now, They?re Bullying My Daughter in Our Home: Welcome to Cyber-bullying

Last night Tom's daughter, Sue, came out of her room to see her dad and said, "I got another one of those instant messages. It says, 'tomorrow you had better not show up at school or else'." She has been getting messages like this now for weeks. The result of this is that she no longer likes to turn her computer on.

Sue is now 14 years-old and in the 8th grade. She has been bullied at school for a number of years and they have had a difficult time getting the Principal and teachers to put a stop to it. Sue has two disadvantages that make her a target. First, she has always had a weight problem, not extremely heavy but just a little over weight. Second, her last name is hard to pronounce. This has led to numerous ways to say and spell her name. They have been very creative and cruel. Tom is aware that she needs to lose about 20 pounds but what can he do about his name, change it?

This should come as no surprise to anyone, but as technology changes we all adjust; unfortunately, so do the bullies. Bullying has gone wireless. These are situations our children face that we never did.

How does this happen? The internet, cell phones with text messaging, instant messaging, camera phones and e-mail are the bullies new tools.

This is coming to a school near you if it hasn't already. The concerns involving cyber-bullying include:

1. Cyberbullying can be much more damaging psychologically and can be much more intense.

2. It creates a barrier between the bully and the victim. This can make anyone who normally wouldn't be a bully now becomes a potential bully because there is no face to face contact. Smaller students have found a way to act tough.

3. It is very difficult to catch the bully. When the victim is suspected or caught their defense is that it was someone else impersonating me or someone must of used my password.

4. Camera phones is making cyber-bullying more creative. Taking someone's picture and then manipulating it. When finished it is posted on a web site or e-mailed out. Imagine getting an e-mail of a nude individual with your face attached to it, and you're only a teenager.

5. Many think this is a joke and not as serious as bullying face to face.

Parents must be aware

Many kids, including Sue, do not want to report this problem to their parents for fear of how their parents may react. Many believe their parents will take away their cell phone, computer, or internet access. This is an obvious solution to stopping the messages, but it is only a temporary one. Sue feels harassed by the bully and punished by her parents when her equipment is removed. This is a double punishment for her.

SOLUTIONS are available - ask questions and act as if you're unfamiliar with the topic. For example, Have you ever heard of anyone receiving improper messages on their phone? Does anyone at school use their camera phones for taking pictures of others who don't want their picture taken? Then Sue's dad should educate her about each situation and how to handle it when and if it arises.

Text Messaging ? When Sue receives an obscene message, threat, or abusive message on her phone teach her to not respond. Your wireless provider should be notified to see how they handle this situation.

Chat-rooms and Instant Messaging ? This is what we need to teach Sue:

1. She should never give out her personal information.

2. She should not share her password.

3. If Sue receives inappropriate messages, have her disconnect or block the sender.

4. She should not respond to inappropriate messages. We do not want a dialogue to begin.

5. She should avoid giving out the name of her school.

6. No child should ever agree to meet anyone from a chat-room. That 17 year-old stud just may be a 53 year -old bald man with a pot belly.

E-Mail ? Once again, when Sue is sent an inappropriate email, she should not respond. Go to the source button to find out information on tracking where it was sent from. If it was sent from someone at school, then print the e-mail to use as proof. Sue's parents can contact the school or their service provider to see what options are available. If there are threats involved, then contacting the police is always an option.

Look into e-mail filters, creating folders for these e-mails, and spam software to block them. Whatever you choose, it will never be 100% perfect in blocking unwanted e-mails.

Here are some warning signs that Sue's dad needs to be aware of and Sue needs to inform an adult if she comes across these:

? If anyone insists on having her send her personnel information to the online "buddy."

? If she is sent messages, pictures, or offered gifts and told not to share these them with anyone.

? If she is requested to send pictures of herself to the e-mailer.

Remember adults do not make friends with children over the internet, then tell the child to keep it quiet without a purpose.

Handling the topic of cyber-bullying with your child before it becomes a problem will make it easier when and if it becomes a problem. Your child needs your guidance and ignoring this issue does not help or support anyone who is a victim of cyber-bullying.

Derek Randel is a parent coach who consults and works with parents in removing the yelling from their home. He has started http://www.stoppingschoolviolence.com a program for parents to help stop bullying. He has authored three books and can be reached at 847-853-4308 or http://www.stoppingschoolviolence.com

cleaning help near Mundelein ..
In The News:

A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.

Childs Play: Treating The Insanity of the Mental Health System

In today's mental health system there is a pattern of... Read More

10 Steps To Prepare You For Life With Children

It's hard to explain to the uninitiated the changes that... Read More

Mutants or Clones?

In a single dose of children's television, I was bombarded... Read More

10 Steps to School Year Success

One of the most important aspects of parenting, is ensuring... Read More

Income that PAYS Your Child Support WITHOUT Increasing Your Child Support

Child support is defined as that part of your income... Read More

Playground Pettiness

Recently I took my two children to a popular new... Read More

Wholism and Materialism

Perhaps I could make a lot of money by founding... Read More

Tips for Single Parents

Prioritize. Learn to say No. Steal some time for yourself.Don't... Read More

Teaching Problem Solving Skills to Children with ADHD

Even though the "Stop and Think" movement in ADHD treatment... Read More

End Babysitter Abuse

Not many things are more upsetting than discovering that your... Read More

Toxic Chemicals, Are Your Children Being Exposed?

You do what you can to keep your little ones... Read More

The Effects of Televised Sexual Content on Adolescents

According to a September 2004 study by the RAND Corporation,... Read More

Guerilla Parenting Techniques: What Are They?

When you hear the phrase, 'guerrilla parenting techniques', what images... Read More

Uniforms

Direct Answers - Column for the week of May 31,... Read More

Punishing the Victim -- Why Public Schools Pressure Parents To Give Their Kids Mind-Altering Drugs

Public-school teaching is structured in such a way that it... Read More

Top Ten Common Sense Rules for Fathers

There are a lot of sophisticated parenting theories and techniques... Read More

How Effective Are Ritalin and Dexedrine in Treating the Symptoms of ADHD?

Many research studies have shown the overall effectiveness of stimulant... Read More

Preparing Your Child for the Three Rs

There is little doubt that reading, 'riting and 'rithmetic are... Read More

The Truth About Motherhood

What is the mystery of motherhood? I know that when... Read More

Watering Your Young Child?s Mind

Mary, Mary, quite contrary, How does your garden grow? With... Read More

Confident Children - Avoid Overparenting

For many years underparenting was perhaps the biggest problem facing... Read More

Sanity Savers For Busy Mums Page

Question 1 "How do I get more time to play?"... Read More

Banishing Bedtime Blues

"My son won't go to bed at night without a... Read More

Teaching Respect And Values In Todays Society

The girl's jaw dropped in horror as the police officer... Read More

When Time Out Dont Work

Joey steps away from his time out chair "I won't... Read More

reliable maid service Wilmette ..