Welcome to YLOAN.COM
yloan.com » Health » Turning a nobody into somebody
Health Medical Acne Aerobics-Cardio Alternative Anti-Aging Build-Muscle Chronic-Illness Dental-Care Depression Diabetes Disability Exercise Eye-Care Fitness-Equipment Hair-Loss Medicine Meditation Nutrition Obesity Polution Quit-Smoking Sidha Supplements Yeast Infection H1N1 Swine Flu SARS herpes therapy panic surgeon hurts teeth remedies eliminate chiropractic arthritis ingredients syndrome binding anxiety surgery medication psychic dental reflux doctor relief premature emotional stress disorder implants wrinkles vision infection aging liposuction seattle stunning sweating hair treatment tinnitus

Turning a nobody into somebody

Turning a nobody into somebody

Turning a nobody into somebody

As I've taken more time to research cyberbullies and their tactics, I've come to the conclusion that those who behave on the internet in this manner must be very lonely people who seek out attention. It seems they spend so much wasted time and effort just tocause pain and suffering to others. Many anti bullying websites are spot on when it comes to identifying a bully and figuring out why they do what they do.

One of the tactics that a cyberbully will employ is creating lies about their intended target.Lies could range from simple fabricated stories to quite outlandish claims such as fabricatingthat the target has a serious criminal record, or is into the drug trade, or is a prostitute or is this, that and the other thing. For those who are not familiar withcyberbullying or stalking, keep in mind that the obvious answer to the question, "Why wouldsomeone harassanother individual on the internet who are nobodies?" is that once lies are circulated by the offending cyberbully over the internet, their intended target is no longer a "nobody." They now become a "person of interest" in a very derogatory sense of the word.

A cyberbully who targets a specific business or individual through electronic means,employs the "character assassination" tactic. Ifthe intended victim works in any position where he or shedeals with the internet public, there will be a steady stream of supposed "customers" who fabricate supposed complaints about him or her through electronic means..ie...various websites, forums, hubs and groups.If heor she has an internet business presence, thevictim may also experience a steady stream of prospects who occupytheir time either in person or by telephone, but the fake customers never actually do business with the intended victim. Many times a cyberbully will employ their own family members, friends and/or co-workers to help them further their goals.

One objective of the cyberbully is to isolate their intended target from his or her family and friends. If the intended target has a strong internet presence, the bully will make attempts to isolate the victim from theirinternetsocial connections.This tactic is deployed by sending personal messages to the target's social connections...letters to other family members...phone calls, letters or email to friends. The messages will vary and of course, will sound deeply disturbing. The bully may tell thevictim's connectionsabout all the strange things happening around him or her that they believe is "linked" to their intended victim. The target's connections will notunderstand why a "complete stranger" has sent them such a disturbing message. Some may believe the bully and somewill think he or she is crazy. Those who believe the bully disconnect from the intended victim but if the victim's connections stand up for their family member, friend or connection, the bully will thengive the same treatment to the individual they have sent the messages to.

There are quite a few tactics that bullies will use in order to further harass their intended victim. In the extreme form, a bullymay pretend thatthey are a member of a 'citizens group' or they are members of various other types of groups which assistslegal agencies. The bully will make claims that they are 'just keeping track of' a certain individual, for whatever reason. The illusion of this tactic is reinforced by the photoshopped "case files" (Photos they put together by using head shots of the intended victim/target) they email personally or that they personally share in a secretive manner with the intended target's connections.

The cyberbully is often connected by way of websites or forums regarding photoshopping if they employ photoshop tactics. Some photos will appear to be officialor made to look like those used by police.

There are a few books out that people may find interesting if they are the victim of stalking and cyberbullying or being harassed by someone.

Terrorist Stalking in America ISBN: 0-9703092-0-1

That book is now out of print. Lawson then produced an updated book on the same subject in March 2007:

Cause Stalking ISBN-13: 978-0-9703092-3-5

Group harassment in the workplace is fairly common, and well documented in this book:

Mobbing: Emotional Abuse in the American Workplace


By Dr. Noa Davenport, Ruth Distler Schwartz, Gail Pursell Elliott

Copyright 1999

ISBN 0-9671803-0-9

*About the author: Dee has written many articles about Goldendoodles and life in general. This article is copyright protected June 10, 2010.
Herbal Male Libido Enhancement Causes and Treatment for Bleeding Gums Transexual Overall health - Advice and Sources Proper hCG Diet Schedule ensures guaranteed and healthy weight loss Body care oils Ozone Therapy: Get Healthy with More Oxygen The Highly Beneficial Bifidobacterium Electronic Cigarettes is the Best Quit Smoking Device ? Electronic Cigarette Review - E-Cigarette Herbal Remedies for Erectile Dysfunction Testosterone Propionate Bodybuilding Properties Health is Wealth Quit Smoking With Electronic Cigarette - Best Electronic Cigarettes Starter Kit Best Electronic Cigarette Review
print
www.yloan.com guest:  register | login | search IP(216.73.216.91) California / Anaheim Processed in 0.028773 second(s), 5 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 33 , 4736, 61,
Turning a nobody into somebody Anaheim