Cyberbullying is a Serious Issue Everywhere

Cyberbullying is a Serious Issue Everywhere

As technology has evolved, so have our capabilities of using it. While this has led to great improvements in how we can live our lives, it has also made it much easier for us to torment and harass one another. This is a huge problem, and growing, so it is important to know how to take a stand against it - both at home, and in the workplace.

The Cybersmile Foundation was formed on June 17th, 2012, to help spread awareness of this problem and promote online inclusivity over toxic harassment and abuse. Unfortunately, their efforts are very much needed, as cyberbullying is still a pervasive problem.

What is a Cyberbully?

A cyberbully is pretty much what it sounds like: they are someone who torments others, causing them pain and angst, over a digital medium. Common media for a cyberbully to leverage include social media, online forums, and even texting and instant messaging. Since this form of harassment doesn’t require the bully and their target to be in the same place, there is a much greater timeframe of opportunity for this kind of bullying to take place. While many cyberbullies work alone, it isn’t uncommon for groups of people to engage in such activities cooperatively. Not only can this kind of bullying be very public, it can more insidiously be kept private, and many cyberbullies act anonymously to protect their own identities. Even worse, a total stranger may be the one to target someone as a victim of their attacks.

What possibly makes cyberbullying so insidious, is the fact that the target may not even be aware that it is going on. If, for instance, nasty things are being said on a social media platform or profile that the target cannot access, the only way they will find out is if someone says something - which doesn’t always happen.

Workplace Cyberbullying

While it may be known best as something that kids and adolescents have to contend with, cyberbullying has been seen among all age groups. This has only become more true in an increasingly digital workplace, where tools like email, instant messaging, and social media are leveraged for their productivity benefits. Considering this increase, it comes as no surprise that the workplace is becoming prime hunting grounds for cyberbullies. A study that polled almost 3,000 people found that 96 percent - yes, 96 - had been on the receiving end of workplace bullying.

Whether this cyberbullying takes the shape of gossip over instant messages between conspiring coworkers or a manager that sends abusive and unpleasant emails at intentionally inconvenient times, it creates a hostile work environment that erodes motivation and engagement and makes collaboration effectively impossible.

What Can Be Done

There are actions that both the recipient of cyberbullying and their employer can take to discourage this kind of unprofessional and hurtful behavior from occurring.

First, if the recipient of this kind of abuse is aware of the situation, they need to keep a cooler head and speak up for themselves. Calmly, rationally, and politely, the recipient should inform the perpetrating coworker that the behavior is to stop. Taking the high road, as it is with most interpersonal confrontations, is the best option when harassment is involved.

The receiving employee should also start collecting evidence. This will help them support their position if the time should come that they need to lodge a formal complaint. Keeping emails, social media posts, and other instances that they feel constitute abusive and hurtful behavior will give them what they need. Furthermore, they should also educate themselves on their rights as they pertain to their personal information. If some has been shared by the cyberbully, there could have been some laws broken. Neither defamation nor data protection are laughing matters.

An employer should want to create a working environment that runs smoothly, making it more likely to be productive. Harassment and cyberbullying throw a wrench in operations, so it only makes sense that an employer would want it to stop. Furthermore, the employer needs to make it clear to their employees that cyberbullying will not be tolerated. To do this, there should be a policy prepared that informs their employees what conduct will (and what conduct will not) be tolerated between employees, inside and outside of the office and work hours. This policy should be introduced during a new employee orientation, and if the issue was widespread enough, reviewed among the staff after an instance of workplace cyberbullying.

For more information about cyberbullying and additional resources, visit the official Stop Cyberbullying Day website. Technology is meant to help us grow as businesses, as people, and ultimately, as a society - not to tear each other down. Together, we can work to make that more the case.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, February 17 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Business Computing Malware Hackers Network Security Productivity Google User Tips Business Software Tech Term Computer Internet Microsoft IT Services Hosted Solutions Efficiency Mobile Devices Ransomware Communication Small Business Hardware Smartphone IT Support Data Android Backup Saving Money Managed IT Services Innovation Business Continuity Data Recovery Data Management Windows 10 Windows Managed IT Services Internet of Things Browser Cloud Computing Workplace Tips Cybersecurity App Microsoft Office Business Management Productivity Server Data Backup Vulnerability Remote Monitoring Mobile Device Office 365 Upgrade Disaster Recovery Encryption Windows 10 Passwords Artificial Intelligence Gmail Facebook Word Outsourced IT Phishing Users Applications Employer-Employee Relationship Website Analytics Infrastructure BYOD communications VoIP Smartphones Information Tip of the week Chrome Managed Service Provider Network IT Support Money Automation YouTube Router Virtual Reality Access Control Risk Management Social Media Google Drive Paperless Office IT Management Company Culture Bandwidth Office Tips Government Content Filtering Miscellaneous Employee-Employer Relationship Managed Service Big Data Display Settings Maintenance Data storage Robot Antivirus Save Money Outlook Spam Computing Wireless Operating System End of Support WiFi Networking Business Intelligence LiFi VPN Hosted Solution Administration Data Security Mouse SaaS Server Management Business Technology Touchscreen Virtual Private Network Computers Laptop Holiday Quick Tips Apple Managing Stress Unified Threat Management Tablet Education The Internet of Things Data loss Storage Retail Alert Telephone Systems Development desktop Printing Downtime Two-factor Authentication Firewall Avoiding Downtime Hacker Monitors Gadgets HIPAA Vendor Management Document Management Scam Mobile Security Shortcuts Time Management Printer Alt Codes Smart Tech Solid State Drive Monitoring Break Fix Halloween Work Websites Bring Your Own Device Voice over Internet Protocol Search Black Friday Cooperation Service Level Agreement Identity Theft Streaming Servers Google Calendar Social Hotspot Internet Exlporer Training Corporate Profile Safety Troubleshooting Emergency Budget Compliance Security Cameras Network Management Typing Humor Connectivity G Suite Hard Disk Drive Remote Computing Spying Dark Web Scary Stories Information Technology IT Technicians Optimization Automobile Best Practice Modem FinTech Dell Network Congestion Analysis Cyber Monday Running Cable Current Events Staff Leominster Human Error Buisness Regulations Cabling Legislation Language Value WannaCry Wi-Fi Managed Services SharePoint Cryptocurrency Virtual Desktop IoT Writing Microsoft Excel Apps Sports Mirgation Recycling Google Maps Google Docs Cookies MSP Virtualization Managed IT Smart Technology IT solutions Going Green Augmented Reality K-12 Schools Device Techology Social Networking Dark Data Update Statistics Hacks Computing Infrastructure Professional Services LED How To Lenovo Laptops Downloads Bitcoin Star Wars PowerPoint Mail Merge Blockchain Google Wallet Chatbots eWaste VoIP Unified Threat Management Business Growth Nanotechnology Shortcut Distributed Denial of Service Wearable Technology Network upgrade Digital Payment Politics Mobility Legal Motherboard Cables Disaster Customer Service Bluetooth Comparison Cybercrime Password Alerts USB Digital Co-Managed IT Firefox Superfish Software as a Service Windows 8 Fraud Cost Management Office Samsung Onboarding Address Permissions Marketing Unified Communications Drones Identity Continuity Collaboration User Error Screen Reader Charging Slack Patch Management Managed IT Service Smart Office Tech Support Print Toner Deep Learning Wires Uninterrupted Power Supply Chromebook Specifications Mobile Device Management Licensing Dongle Spyware Content Customer Relationship Management File Sharing Heating/Cooling Multi-Factor Security Assessment Computer Care IBM Social Engineering Digital Signage Solar Regulation Twitter Error Physical Security Point of Sale Ben McDonald shares Emoji Mobile Computing Upgrades Gadget Travel Crowdsourcing Personal Information Botnet Cortana Supercomputer CrashOverride 3D Printing Motion Sickness Staffing Printers Machine Learning Taxes Processors Administrator Web Server what was your? IT Budget Unsupported Software GPS Computer Repair Relocation IT Consultant Cameras Mobile Data Meetings Recovery Tracking How To Work/Life Balance Health Private Cloud Cleaning CCTV Black Market BDR Webcam Law Enforcement Electronic Medical Records Entertainment Notifications

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3