Cyberbullying is a Serious Issue Everywhere

Cyberbullying is a Serious Issue Everywhere

As technology has evolved, so have our capabilities of using it. While this has led to great improvements in how we can live our lives, it has also made it much easier for us to torment and harass one another. This is a huge problem, and growing, so it is important to know how to take a stand against it - both at home, and in the workplace.

The Cybersmile Foundation was formed on June 17th, 2012, to help spread awareness of this problem and promote online inclusivity over toxic harassment and abuse. Unfortunately, their efforts are very much needed, as cyberbullying is still a pervasive problem.

What is a Cyberbully?

A cyberbully is pretty much what it sounds like: they are someone who torments others, causing them pain and angst, over a digital medium. Common media for a cyberbully to leverage include social media, online forums, and even texting and instant messaging. Since this form of harassment doesn’t require the bully and their target to be in the same place, there is a much greater timeframe of opportunity for this kind of bullying to take place. While many cyberbullies work alone, it isn’t uncommon for groups of people to engage in such activities cooperatively. Not only can this kind of bullying be very public, it can more insidiously be kept private, and many cyberbullies act anonymously to protect their own identities. Even worse, a total stranger may be the one to target someone as a victim of their attacks.

What possibly makes cyberbullying so insidious, is the fact that the target may not even be aware that it is going on. If, for instance, nasty things are being said on a social media platform or profile that the target cannot access, the only way they will find out is if someone says something - which doesn’t always happen.

Workplace Cyberbullying

While it may be known best as something that kids and adolescents have to contend with, cyberbullying has been seen among all age groups. This has only become more true in an increasingly digital workplace, where tools like email, instant messaging, and social media are leveraged for their productivity benefits. Considering this increase, it comes as no surprise that the workplace is becoming prime hunting grounds for cyberbullies. A study that polled almost 3,000 people found that 96 percent - yes, 96 - had been on the receiving end of workplace bullying.

Whether this cyberbullying takes the shape of gossip over instant messages between conspiring coworkers or a manager that sends abusive and unpleasant emails at intentionally inconvenient times, it creates a hostile work environment that erodes motivation and engagement and makes collaboration effectively impossible.

What Can Be Done

There are actions that both the recipient of cyberbullying and their employer can take to discourage this kind of unprofessional and hurtful behavior from occurring.

First, if the recipient of this kind of abuse is aware of the situation, they need to keep a cooler head and speak up for themselves. Calmly, rationally, and politely, the recipient should inform the perpetrating coworker that the behavior is to stop. Taking the high road, as it is with most interpersonal confrontations, is the best option when harassment is involved.

The receiving employee should also start collecting evidence. This will help them support their position if the time should come that they need to lodge a formal complaint. Keeping emails, social media posts, and other instances that they feel constitute abusive and hurtful behavior will give them what they need. Furthermore, they should also educate themselves on their rights as they pertain to their personal information. If some has been shared by the cyberbully, there could have been some laws broken. Neither defamation nor data protection are laughing matters.

An employer should want to create a working environment that runs smoothly, making it more likely to be productive. Harassment and cyberbullying throw a wrench in operations, so it only makes sense that an employer would want it to stop. Furthermore, the employer needs to make it clear to their employees that cyberbullying will not be tolerated. To do this, there should be a policy prepared that informs their employees what conduct will (and what conduct will not) be tolerated between employees, inside and outside of the office and work hours. This policy should be introduced during a new employee orientation, and if the issue was widespread enough, reviewed among the staff after an instance of workplace cyberbullying.

For more information about cyberbullying and additional resources, visit the official Stop Cyberbullying Day website. Technology is meant to help us grow as businesses, as people, and ultimately, as a society - not to tear each other down. Together, we can work to make that more the case.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, November 18 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Email Privacy Malware Hackers Business Network Security Business Computing Software Computer Internet Microsoft IT Services Google Tech Term Hosted Solutions Ransomware User Tips Mobile Devices Efficiency Data Android Backup Smartphone Communication Small Business Managed IT Services Internet of Things Data Recovery Saving Money Browser Cloud Computing Innovation Business Continuity Productivity Hardware Windows 10 Data Management Windows IT Support Managed IT Services App Cybersecurity Productivity Data Backup Remote Monitoring Server Business Management Facebook Microsoft Office Gmail Workplace Tips Artificial Intelligence Word Disaster Recovery Encryption Passwords Office 365 Upgrade Infrastructure Chrome Analytics Applications Managed Service Provider communications BYOD Phishing Outsourced IT Network IT Support Money Website Windows 10 Employer-Employee Relationship Tip of the week Smartphones Vulnerability Settings IT Management Maintenance Data storage YouTube Company Culture Social Media Risk Management Save Money Robot Office Tips Mobile Device Google Drive Antivirus Big Data Bandwidth Content Filtering Miscellaneous Government Unified Threat Management Education Mobile Security Data loss Apple Telephone Systems Holiday Storage VPN desktop Access Control Business Intelligence Data Security Alert Server Management Users Firewall Business Technology Display Virtual Private Network Managed Service Touchscreen Vendor Management Monitors Wireless Outlook Spam Information Computing Operating System Managing Stress WiFi Automation LiFi Laptop End of Support Development Hosted Solution Two-factor Authentication Paperless Office Virtual Reality Administration Avoiding Downtime The Internet of Things Scam Mouse HIPAA VoIP SaaS Search Black Friday Marketing Wi-Fi Solar Hacks Networking Writing Assessment Troubleshooting Gadgets Work Bitcoin Emergency Computers Smart Tech Spying Google Wallet Servers Google Calendar Digital Payment Cooperation Service Level Agreement Business Growth Human Error Dark Web Dark Data Update Router Voice over Internet Protocol Analysis Printing Network Management Cyber Monday Disaster Compliance Password Retail Hotspot Digital Internet Exlporer Legal Legislation Halloween Collaboration IT Technicians Politics Optimization Windows 8 Connectivity Unified Communications Employee-Employer Relationship Drones Staff Leominster Hacker Device Microsoft Excel Customer Service Modem FinTech SharePoint LED Managed IT Smart Technology Uninterrupted Power Supply Regulations Mobile Device Management Quick Tips Techology Office Document Management Language Samsung Spyware Value Deep Learning Statistics Tablet Scary Stories File Sharing Mirgation Tech Support Recycling How To Lenovo Computer Care IBM IoT PowerPoint Augmented Reality K-12 Schools Alt Codes Mail Merge Blockchain Chromebook Solid State Drive Cookies MSP Downloads Running Cable Bring Your Own Device Co-Managed IT Shortcut Distributed Denial of Service Buisness Social Networking VoIP Unified Threat Management Social Engineering Identity Theft Computing Infrastructure Professional Services Bluetooth Comparison Sports Chatbots Websites eWaste Social Firefox Superfish Virtual Desktop Training Corporate Profile Star Wars Onboarding Budget Automobile Wearable Technology Network upgrade Typing Humor Address Permissions Hard Disk Drive Nanotechnology Slack Information Technology Best Practice Content Patch Management Managed IT Service Dell Motherboard Cables Current Events User Error Safety Alerts USB Specifications Cabling Identity Continuity Customer Relationship Management Fraud Remote Computing WannaCry Cost Management Digital Signage Google Maps Smart Office Cryptocurrency Network Congestion Screen Reader Charging Apps Monitoring Heating/Cooling Multi-Factor Security Dongle Streaming Google Docs Break Fix Downtime Wires IT solutions Going Green Time Management Printer Cybercrime Licensing Machine Learning GPS Processors Unsupported Software IT Consultant Virtualization Regulation Cameras Meetings Computer Repair Relocation Tracking Printers Mobile Data Cleaning How To Work/Life Balance CCTV Recovery Webcam Health Private Cloud Black Market Error Law Enforcement Point of Sale Electronic Medical Records Ben McDonald shares Mobile Computing Notifications Travel Physical Security Twitter Upgrades Gadget G Suite Emoji Supercomputer Crowdsourcing CrashOverride Motion Sickness Personal Information Botnet Staffing Administrator 3D Printing Taxes Cortana Web Server what was your? BDR IT Budget

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3