Now, They?re Bullying My Daughter in Our Home: Welcome to Cyber-bullying

Last night Tom's daughter, Sue, came out of her room to see her dad and said, "I got another one of those instant messages. It says, 'tomorrow you had better not show up at school or else'." She has been getting messages like this now for weeks. The result of this is that she no longer likes to turn her computer on.

Sue is now 14 years-old and in the 8th grade. She has been bullied at school for a number of years and they have had a difficult time getting the Principal and teachers to put a stop to it. Sue has two disadvantages that make her a target. First, she has always had a weight problem, not extremely heavy but just a little over weight. Second, her last name is hard to pronounce. This has led to numerous ways to say and spell her name. They have been very creative and cruel. Tom is aware that she needs to lose about 20 pounds but what can he do about his name, change it?

This should come as no surprise to anyone, but as technology changes we all adjust; unfortunately, so do the bullies. Bullying has gone wireless. These are situations our children face that we never did.

How does this happen? The internet, cell phones with text messaging, instant messaging, camera phones and e-mail are the bullies new tools.

This is coming to a school near you if it hasn't already. The concerns involving cyber-bullying include:

1. Cyberbullying can be much more damaging psychologically and can be much more intense.

2. It creates a barrier between the bully and the victim. This can make anyone who normally wouldn't be a bully now becomes a potential bully because there is no face to face contact. Smaller students have found a way to act tough.

3. It is very difficult to catch the bully. When the victim is suspected or caught their defense is that it was someone else impersonating me or someone must of used my password.

4. Camera phones is making cyber-bullying more creative. Taking someone's picture and then manipulating it. When finished it is posted on a web site or e-mailed out. Imagine getting an e-mail of a nude individual with your face attached to it, and you're only a teenager.

5. Many think this is a joke and not as serious as bullying face to face.

Parents must be aware

Many kids, including Sue, do not want to report this problem to their parents for fear of how their parents may react. Many believe their parents will take away their cell phone, computer, or internet access. This is an obvious solution to stopping the messages, but it is only a temporary one. Sue feels harassed by the bully and punished by her parents when her equipment is removed. This is a double punishment for her.

SOLUTIONS are available - ask questions and act as if you're unfamiliar with the topic. For example, Have you ever heard of anyone receiving improper messages on their phone? Does anyone at school use their camera phones for taking pictures of others who don't want their picture taken? Then Sue's dad should educate her about each situation and how to handle it when and if it arises.

Text Messaging ? When Sue receives an obscene message, threat, or abusive message on her phone teach her to not respond. Your wireless provider should be notified to see how they handle this situation.

Chat-rooms and Instant Messaging ? This is what we need to teach Sue:

1. She should never give out her personal information.

2. She should not share her password.

3. If Sue receives inappropriate messages, have her disconnect or block the sender.

4. She should not respond to inappropriate messages. We do not want a dialogue to begin.

5. She should avoid giving out the name of her school.

6. No child should ever agree to meet anyone from a chat-room. That 17 year-old stud just may be a 53 year -old bald man with a pot belly.

E-Mail ? Once again, when Sue is sent an inappropriate email, she should not respond. Go to the source button to find out information on tracking where it was sent from. If it was sent from someone at school, then print the e-mail to use as proof. Sue's parents can contact the school or their service provider to see what options are available. If there are threats involved, then contacting the police is always an option.

Look into e-mail filters, creating folders for these e-mails, and spam software to block them. Whatever you choose, it will never be 100% perfect in blocking unwanted e-mails.

Here are some warning signs that Sue's dad needs to be aware of and Sue needs to inform an adult if she comes across these:

? If anyone insists on having her send her personnel information to the online "buddy."

? If she is sent messages, pictures, or offered gifts and told not to share these them with anyone.

? If she is requested to send pictures of herself to the e-mailer.

Remember adults do not make friends with children over the internet, then tell the child to keep it quiet without a purpose.

Handling the topic of cyber-bullying with your child before it becomes a problem will make it easier when and if it becomes a problem. Your child needs your guidance and ignoring this issue does not help or support anyone who is a victim of cyber-bullying.

Derek Randel is a parent coach who consults and works with parents in removing the yelling from their home. He has started http://www.stoppingschoolviolence.com a program for parents to help stop bullying. He has authored three books and can be reached at 847-853-4308 or http://www.stoppingschoolviolence.com

no-contract cleaning service Mundelein ..
In The News:

Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.

Positive Parenting of Teenagers: Helping Your Teen Understand What I Cant Afford It Means

Because most teens have not had the experience of getting... Read More

How Effective is the Nutraceutical ATTEND with ADHD?

I really like all natural remedy for Attention Deficit Disorder... Read More

The Great Baby Name Debate

Winifred or Willow? Thomas or Troy? The name you choose... Read More

How to End the Misery of Bedwetting

When a child wets the bed they worry. Children tend... Read More

The Top 10 Tips for Communicating with Children

Most people have more training before they receive their driver's... Read More

Influencing Adolescents - Guided Democracy

You need to smart to be able influence adolescents. You... Read More

How To Teach Children Loyalty and Dependability

Individualism is a common thing in today's modern society. Many... Read More

Winning The Whining War

Jason Meridith's two-year old son whines when he wants more... Read More

Ready, Aim, Achieve! - Become An On-purpose Family Through Goal Setting

Successful families don't just happen. They take time, talent and... Read More

Are Parents Trying Too Hard?

One of the implications of the current trend toward smaller... Read More

The Seven Keys to Child Obedience

Learning obedience is an important part of child development. This... Read More

Clean Your House Green for your Children?s Sake

My thirteen-year-old daughter recently called me up to say she... Read More

Organizing a Car Wash Fundraiser

The key to a successful car wash fundraiser event is... Read More

Toxic Chemicals, Are Your Children Being Exposed?

You do what you can to keep your little ones... Read More

I Cant Sleep Without You

When my firstborn arrived into this serene and peaceful household,... Read More

Assertiveness: Key to Better Parenting

I have always been aware of my number one weakness:... Read More

How Often Does Child Sexual Abuse Get Reported?

Not nearly as often as it should. Most child abuse... Read More

Mom, Dad and the Big Brother

Software for parental control is a useful tool, if applied... Read More

Powerful Tips for Increasing Your Childs Self-Esteem

Here is a list of ways to convey the message... Read More

How to Foster a Love of Reading and Writing in Your Child

The key to lifelong learning is reading and writing. When... Read More

Help Your Kids Learn More About Managing Their Personal Economy

Remember when cash was a tangible commodity in all of... Read More

My Husband Prioritizes Making Money Above Family Time

"Money is tight, and my husband's obsessed with doing everything... Read More

Inattentive ADHD: Just Like Winnie the Pooh

Winnie the Pooh is the classic picture of Inattentive ADHD.... Read More

Moms - Get More Energy Now

Let's be honest! When it comes to parenting, men expect... Read More

Time, Stress, and a Baby

The main thing we noticed since having a baby is... Read More

maid service near Glenview ..