Now, They?re Bullying My Daughter in Our Home: Welcome to Cyber-bullying

Last night Tom's daughter, Sue, came out of her room to see her dad and said, "I got another one of those instant messages. It says, 'tomorrow you had better not show up at school or else'." She has been getting messages like this now for weeks. The result of this is that she no longer likes to turn her computer on.

Sue is now 14 years-old and in the 8th grade. She has been bullied at school for a number of years and they have had a difficult time getting the Principal and teachers to put a stop to it. Sue has two disadvantages that make her a target. First, she has always had a weight problem, not extremely heavy but just a little over weight. Second, her last name is hard to pronounce. This has led to numerous ways to say and spell her name. They have been very creative and cruel. Tom is aware that she needs to lose about 20 pounds but what can he do about his name, change it?

This should come as no surprise to anyone, but as technology changes we all adjust; unfortunately, so do the bullies. Bullying has gone wireless. These are situations our children face that we never did.

How does this happen? The internet, cell phones with text messaging, instant messaging, camera phones and e-mail are the bullies new tools.

This is coming to a school near you if it hasn't already. The concerns involving cyber-bullying include:

1. Cyberbullying can be much more damaging psychologically and can be much more intense.

2. It creates a barrier between the bully and the victim. This can make anyone who normally wouldn't be a bully now becomes a potential bully because there is no face to face contact. Smaller students have found a way to act tough.

3. It is very difficult to catch the bully. When the victim is suspected or caught their defense is that it was someone else impersonating me or someone must of used my password.

4. Camera phones is making cyber-bullying more creative. Taking someone's picture and then manipulating it. When finished it is posted on a web site or e-mailed out. Imagine getting an e-mail of a nude individual with your face attached to it, and you're only a teenager.

5. Many think this is a joke and not as serious as bullying face to face.

Parents must be aware

Many kids, including Sue, do not want to report this problem to their parents for fear of how their parents may react. Many believe their parents will take away their cell phone, computer, or internet access. This is an obvious solution to stopping the messages, but it is only a temporary one. Sue feels harassed by the bully and punished by her parents when her equipment is removed. This is a double punishment for her.

SOLUTIONS are available - ask questions and act as if you're unfamiliar with the topic. For example, Have you ever heard of anyone receiving improper messages on their phone? Does anyone at school use their camera phones for taking pictures of others who don't want their picture taken? Then Sue's dad should educate her about each situation and how to handle it when and if it arises.

Text Messaging ? When Sue receives an obscene message, threat, or abusive message on her phone teach her to not respond. Your wireless provider should be notified to see how they handle this situation.

Chat-rooms and Instant Messaging ? This is what we need to teach Sue:

1. She should never give out her personal information.

2. She should not share her password.

3. If Sue receives inappropriate messages, have her disconnect or block the sender.

4. She should not respond to inappropriate messages. We do not want a dialogue to begin.

5. She should avoid giving out the name of her school.

6. No child should ever agree to meet anyone from a chat-room. That 17 year-old stud just may be a 53 year -old bald man with a pot belly.

E-Mail ? Once again, when Sue is sent an inappropriate email, she should not respond. Go to the source button to find out information on tracking where it was sent from. If it was sent from someone at school, then print the e-mail to use as proof. Sue's parents can contact the school or their service provider to see what options are available. If there are threats involved, then contacting the police is always an option.

Look into e-mail filters, creating folders for these e-mails, and spam software to block them. Whatever you choose, it will never be 100% perfect in blocking unwanted e-mails.

Here are some warning signs that Sue's dad needs to be aware of and Sue needs to inform an adult if she comes across these:

? If anyone insists on having her send her personnel information to the online "buddy."

? If she is sent messages, pictures, or offered gifts and told not to share these them with anyone.

? If she is requested to send pictures of herself to the e-mailer.

Remember adults do not make friends with children over the internet, then tell the child to keep it quiet without a purpose.

Handling the topic of cyber-bullying with your child before it becomes a problem will make it easier when and if it becomes a problem. Your child needs your guidance and ignoring this issue does not help or support anyone who is a victim of cyber-bullying.

Derek Randel is a parent coach who consults and works with parents in removing the yelling from their home. He has started http://www.stoppingschoolviolence.com a program for parents to help stop bullying. He has authored three books and can be reached at 847-853-4308 or http://www.stoppingschoolviolence.com

tidy up service Glenview ..
In The News:

Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.

Twins - Double The Trouble Or Double The Pleasure? Both!

If You're Having Twins..is it double the headache, or double... Read More

Keep the Little Ones Safe, Follow Pool Safety Guidelines

Pool safety should be on the minds of every parent... Read More

The Parent Teen Relationship: How Effective is Yours?

It was the homework that did it. Each night became... Read More

Facing the Homeschool Super Mom

I know this Mom. She homeschools her 5 children, plus... Read More

Monitoring Your Teens for Drug Use Without Appearing to be Spying

Even if your teenagers do not use drugs, you still... Read More

Children Need Roots and Wings

"Good parents give their children Roots and Wings." --Jonas SalkThe... Read More

Parenting Your Teenager: When is it OK to Quit?

Q. My daughter is a junior in high school and... Read More

Missing The Bus

As a step daughter and step grand daughter, I followed... Read More

Your Job as a Role Model

A certain educator was once asked at what point should... Read More

Really Good News About Your Children?s Video Games

Research published by University of Rochester neuroscientists C. Shawn Green... Read More

Create Your Dream Family

There has been much attention in the media of late... Read More

Top 20 Items To Pack In A Diaper Bag

1. Diapers (5 -7 is a fairly safe supply)2. Wipes3.... Read More

Muscle Pain And Children Do Not Mix

I am in pain. I've been in pain all day.... Read More

An Overview of Alternative Treatments for Attention Deficit Hyperactivity Disorder

Since so many would rather avoid the use of stimulant... Read More

Handling Failure -- Teaching Kids How to Profit From It

There is nothing pleasant about failure, at least not at... Read More

Empty Nest Syndrome

Paula's last child had just gone off to college and... Read More

How to Raise Creative Kids

"Where did he come up with that?" Kids often amaze... Read More

Understanding A Childs Beliefs, Nuturing Young Beliefs

Children are moral and make moral determinations... at least until... Read More

Stay at Home Mom You Need to Raise Cowboys

Now I know that is not how the song goes,... Read More

COMMITMENT: Teaching Children the Lessons of a Lifetime

It's been said, time and again, that for a child... Read More

The Metamorphosis of The Brain: Raising Your child to be a Brainiac

The human brain never actually stops developing. Beginning formation in... Read More

Top Seven Tips for Back-to-School Success

Parents play a critical role in their child's success. These... Read More

Going Out to a Restaurant with Kids

Dining in a restaurant with kids can be very enervating... Read More

How to Set Healthy Limits at Work

Back in college, I wrote for a five-day-a-week, award-winning campus... Read More

Scolding: One of Communications Tools of Last Resort

(Excerpted from Jim Rohn's 2004 Weekend Leadership Event)You have to... Read More

maid service near Winnetka ..