Now, They?re Bullying My Daughter in Our Home: Welcome to Cyber-bullying

Last night Tom's daughter, Sue, came out of her room to see her dad and said, "I got another one of those instant messages. It says, 'tomorrow you had better not show up at school or else'." She has been getting messages like this now for weeks. The result of this is that she no longer likes to turn her computer on.

Sue is now 14 years-old and in the 8th grade. She has been bullied at school for a number of years and they have had a difficult time getting the Principal and teachers to put a stop to it. Sue has two disadvantages that make her a target. First, she has always had a weight problem, not extremely heavy but just a little over weight. Second, her last name is hard to pronounce. This has led to numerous ways to say and spell her name. They have been very creative and cruel. Tom is aware that she needs to lose about 20 pounds but what can he do about his name, change it?

This should come as no surprise to anyone, but as technology changes we all adjust; unfortunately, so do the bullies. Bullying has gone wireless. These are situations our children face that we never did.

How does this happen? The internet, cell phones with text messaging, instant messaging, camera phones and e-mail are the bullies new tools.

This is coming to a school near you if it hasn't already. The concerns involving cyber-bullying include:

1. Cyberbullying can be much more damaging psychologically and can be much more intense.

2. It creates a barrier between the bully and the victim. This can make anyone who normally wouldn't be a bully now becomes a potential bully because there is no face to face contact. Smaller students have found a way to act tough.

3. It is very difficult to catch the bully. When the victim is suspected or caught their defense is that it was someone else impersonating me or someone must of used my password.

4. Camera phones is making cyber-bullying more creative. Taking someone's picture and then manipulating it. When finished it is posted on a web site or e-mailed out. Imagine getting an e-mail of a nude individual with your face attached to it, and you're only a teenager.

5. Many think this is a joke and not as serious as bullying face to face.

Parents must be aware

Many kids, including Sue, do not want to report this problem to their parents for fear of how their parents may react. Many believe their parents will take away their cell phone, computer, or internet access. This is an obvious solution to stopping the messages, but it is only a temporary one. Sue feels harassed by the bully and punished by her parents when her equipment is removed. This is a double punishment for her.

SOLUTIONS are available - ask questions and act as if you're unfamiliar with the topic. For example, Have you ever heard of anyone receiving improper messages on their phone? Does anyone at school use their camera phones for taking pictures of others who don't want their picture taken? Then Sue's dad should educate her about each situation and how to handle it when and if it arises.

Text Messaging ? When Sue receives an obscene message, threat, or abusive message on her phone teach her to not respond. Your wireless provider should be notified to see how they handle this situation.

Chat-rooms and Instant Messaging ? This is what we need to teach Sue:

1. She should never give out her personal information.

2. She should not share her password.

3. If Sue receives inappropriate messages, have her disconnect or block the sender.

4. She should not respond to inappropriate messages. We do not want a dialogue to begin.

5. She should avoid giving out the name of her school.

6. No child should ever agree to meet anyone from a chat-room. That 17 year-old stud just may be a 53 year -old bald man with a pot belly.

E-Mail ? Once again, when Sue is sent an inappropriate email, she should not respond. Go to the source button to find out information on tracking where it was sent from. If it was sent from someone at school, then print the e-mail to use as proof. Sue's parents can contact the school or their service provider to see what options are available. If there are threats involved, then contacting the police is always an option.

Look into e-mail filters, creating folders for these e-mails, and spam software to block them. Whatever you choose, it will never be 100% perfect in blocking unwanted e-mails.

Here are some warning signs that Sue's dad needs to be aware of and Sue needs to inform an adult if she comes across these:

? If anyone insists on having her send her personnel information to the online "buddy."

? If she is sent messages, pictures, or offered gifts and told not to share these them with anyone.

? If she is requested to send pictures of herself to the e-mailer.

Remember adults do not make friends with children over the internet, then tell the child to keep it quiet without a purpose.

Handling the topic of cyber-bullying with your child before it becomes a problem will make it easier when and if it becomes a problem. Your child needs your guidance and ignoring this issue does not help or support anyone who is a victim of cyber-bullying.

Derek Randel is a parent coach who consults and works with parents in removing the yelling from their home. He has started http://www.stoppingschoolviolence.com a program for parents to help stop bullying. He has authored three books and can be reached at 847-853-4308 or http://www.stoppingschoolviolence.com

recurring maid service Wilmette ..
In The News:

OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.
Archer Aviation has acquired Hawthorne Airport for $126M to launch an LA air taxi network ahead of the 2028 Olympics, featuring AI-powered eVTOL operations and next-gen aviation tech.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Fake AI apps disguised as "ChatGPT" and "DALLĀ·E" are flooding app stores with dangerous malware that steals data and monitors users without detection.
Fake buyers demand specific vehicle reports from unknown sites to steal credit card information from car sellers, but warning signs can help identify these scams before paying.
Android users can now manage apps across multiple devices more easily with Google Play Store's updated remote uninstall button in the latest update.
NASA's Perseverance rover discovers shiny metallic rock on Mars that could be a meteorite from an ancient asteroid, containing high levels of iron and nickel.
Holiday scams spike during Black Friday and Cyber Monday as criminals exploit your leaked personal data. Learn how to protect yourself from fake stores and phishing.
Commerce Department proposes TP-Link router ban over Chinese security risks. Learn how this potential prohibition could affect your home network and devices.
Hyundai AutoEver America suffered a data breach affecting 2,000 current and former employees, exposing names, Social Security numbers and driver's license information.
Washington court rules automated license plate reader images are public records, even when stored by vendors like Flock Safety, setting precedent for transparency.
Fake airline texts claiming flight cancellations are targeting travelers with convincing scams. Learn how cybercriminals steal personal data and credit card info.
Discover how iOS 26's new Adaptive Power feature automatically extends iPhone battery life by learning your usage patterns and adjusting performance intelligently.
New TikTok malware campaign tricks users into running PowerShell commands that download Aura Stealer, which steals credentials and authentication tokens.
Gaia Family offers fixed upfront pricing for IVF cycles with unlimited embryo transfers and financial protection, partnering with over 100 U.S. fertility clinics.
The Jetsons Act aims to position Pennsylvania as a leader in advanced air mobility by establishing regulations for hybrid ground-air vehicles.
Fake Geek Squad invoice emails are targeting users with convincing charges and urgent phone numbers to steal personal information and money.

Helping Your Kids Handle Divorce

Every year over one million parents have to talk to... Read More

Promoting Your Childs Motor Development

Assuming there are no serious motor problems present, what can... Read More

How Do I Get My Child to Read?

Well first off, please to don't institute the ? hour... Read More

Build Character Now! Practical Tools for Busy Parents

"To educate a person in mind and not in morals... Read More

Film Industry and Our Youth

In the first premise, some films and video tapes which... Read More

Family Meals: When Dinner Schedules Dont Match

Mealtimes together deserve an important place in any family. Around... Read More

Raising A High Maintenance Child

Do you have a high maintenance child?"Thank goodness my second... Read More

Why Consistency Is The Key To Raising Well-behaved Kids

Being consistent when children are less than perfect can make... Read More

Cooking With Your Kids Helps Develop Motor Skills for Preschoolers

Did you know that cooking with your kids is a... Read More

Managing Your Stepfamily

If you are a member of a stepfamily, you know... Read More

What is Prenatal Intelligence?

Prenatal intelligence, also known as fetal intelligence, has become a... Read More

Lets Pretend

Children explore the world around them and learn through pretend... Read More

Moms - Get More Energy Now

Let's be honest! When it comes to parenting, men expect... Read More

Teaching Reading: Part 3, Whole Language Vs. Phonics

There are two methods for teaching children to read; whole... Read More

Spelling Games

The following spelling games can be used by parents to... Read More

Babys First Month at a Glance

Congratulations on your new baby! You have just brought your... Read More

COMMITMENT: Teaching Children the Lessons of a Lifetime

It's been said, time and again, that for a child... Read More

Send the Kids Outside!

Think back to your own childhood. Chances are, some of... Read More

Defrazzle with a Hearty Guffaw

"The best blush to use is laughter: It put roses... Read More

Marriage, Divorce, and Kids

Are men to blame for the divorce problem in this... Read More

The Top 5 Reasons Why Unwed-Parents Must Establish Paternity

"It takes a village to raise a child" is more... Read More

So, The Thing Is... Im Feeling A Little Guilty

So, the thing is? I am feeling a little guilty.I... Read More

MORAL ARMORS Irrational Parenting, Part III

Not Letting Them Think.We all implicitly know that anything questioning... Read More

Mommies and Me Special Time

Creating and making special memories with your child is very... Read More

How to Foster a Love of Reading and Writing in Your Child

The key to lifelong learning is reading and writing. When... Read More

last minute cleaning help Highland Park ..