888.678.7282    Get SUPPORT

Strata Information Technology Blog

Cyberbullying is a Serious Issue Everywhere

Cyberbullying is a Serious Issue Everywhere

As technology has evolved, so have our capabilities of using it. While this has led to great improvements in how we can live our lives, it has also made it much easier for us to torment and harass one another. This is a huge problem, and growing, so it is important to know how to take a stand against it - both at home, and in the workplace.

The Cybersmile Foundation was formed on June 17th, 2012, to help spread awareness of this problem and promote online inclusivity over toxic harassment and abuse. Unfortunately, their efforts are very much needed, as cyberbullying is still a pervasive problem.

What is a Cyberbully?

A cyberbully is pretty much what it sounds like: they are someone who torments others, causing them pain and angst, over a digital medium. Common media for a cyberbully to leverage include social media, online forums, and even texting and instant messaging. Since this form of harassment doesn’t require the bully and their target to be in the same place, there is a much greater timeframe of opportunity for this kind of bullying to take place. While many cyberbullies work alone, it isn’t uncommon for groups of people to engage in such activities cooperatively. Not only can this kind of bullying be very public, it can more insidiously be kept private, and many cyberbullies act anonymously to protect their own identities. Even worse, a total stranger may be the one to target someone as a victim of their attacks.

What possibly makes cyberbullying so insidious, is the fact that the target may not even be aware that it is going on. If, for instance, nasty things are being said on a social media platform or profile that the target cannot access, the only way they will find out is if someone says something - which doesn’t always happen.

Workplace Cyberbullying

While it may be known best as something that kids and adolescents have to contend with, cyberbullying has been seen among all age groups. This has only become more true in an increasingly digital workplace, where tools like email, instant messaging, and social media are leveraged for their productivity benefits. Considering this increase, it comes as no surprise that the workplace is becoming prime hunting grounds for cyberbullies. A study that polled almost 3,000 people found that 96 percent - yes, 96 - had been on the receiving end of workplace bullying.

Whether this cyberbullying takes the shape of gossip over instant messages between conspiring coworkers or a manager that sends abusive and unpleasant emails at intentionally inconvenient times, it creates a hostile work environment that erodes motivation and engagement and makes collaboration effectively impossible.

What Can Be Done

There are actions that both the recipient of cyberbullying and their employer can take to discourage this kind of unprofessional and hurtful behavior from occurring.

First, if the recipient of this kind of abuse is aware of the situation, they need to keep a cooler head and speak up for themselves. Calmly, rationally, and politely, the recipient should inform the perpetrating coworker that the behavior is to stop. Taking the high road, as it is with most interpersonal confrontations, is the best option when harassment is involved.

The receiving employee should also start collecting evidence. This will help them support their position if the time should come that they need to lodge a formal complaint. Keeping emails, social media posts, and other instances that they feel constitute abusive and hurtful behavior will give them what they need. Furthermore, they should also educate themselves on their rights as they pertain to their personal information. If some has been shared by the cyberbully, there could have been some laws broken. Neither defamation nor data protection are laughing matters.

An employer should want to create a working environment that runs smoothly, making it more likely to be productive. Harassment and cyberbullying throw a wrench in operations, so it only makes sense that an employer would want it to stop. Furthermore, the employer needs to make it clear to their employees that cyberbullying will not be tolerated. To do this, there should be a policy prepared that informs their employees what conduct will (and what conduct will not) be tolerated between employees, inside and outside of the office and work hours. This policy should be introduced during a new employee orientation, and if the issue was widespread enough, reviewed among the staff after an instance of workplace cyberbullying.

For more information about cyberbullying and additional resources, visit the official Stop Cyberbullying Day website. Technology is meant to help us grow as businesses, as people, and ultimately, as a society - not to tear each other down. Together, we can work to make that more the case.

Intro to Your Tech: RAM
Your Network Infrastructure Needs to be Secured
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, May 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Managed IT Services Privacy Cloud Network Security Malware Hackers Internet User Tips Data Productivity Communications Efficiency Microsoft Communication IT Support Business Management Outsourced IT Cybersecurity Passwords Software Tech Term Ransomware Backup Business Smartphones Windows 10 Hardware Innovation Google VoIP Email Productivity Small Business Alert Mobile Device IT Services Users Network Social Media Data Recovery Apps Smartphone Browser Data Backup Bandwidth Cloud Computing Microsoft Office Phishing Holiday Collaboration Miscellaneous Save Money Hosted Solutions Business Continuity Workplace Tips Vulnerability Data Breach Office 365 Android Saving Money App Access Control Twitter Internet of Things Mobile Devices Computer Compliance BDR Applications Facebook Law Enforcement Blockchain Gadgets Patch Management Workers Office Personal Information Settings Employer-Employee Relationship Net Neutrality Remote Monitoring Scam Excel Company Culture Cybercrime Networking Politics Wireless Chrome Government Mobile Device Management Wi-Fi Connectivity How To Entertainment Recovery Marketing Antivirus Maintenance Password Healthcare Retail Managed Service Computers Website Data Security Paperless Office BYOD Education Upgrade Medical IT Vendor Management Automation Managed IT Service Voice over Internet Protocol SaaS Spam Dark Web Managing Stress Virus Telephony Information Remote Monitoring and Management Windows Word Virtual Assistant Value instant Messaging Email Management Tech Terms Staffing Technology Efficiently Licensing Voice over IP Amazon Smart Technology HaaS Printer Server Tech Support Solid State Drive Cortana Bring Your Own Device Printer iPhone Biometrics Error Human Resources Data loss Gadget Safety Help Desk Telephone System WannaCry Unified Threat Management HP Regulation Vulnerabilities Sales Managed Service Provider Cost Management Streaming Media Outlook Travel Business Intelligence The Internet of Things Managed IT Cleaning Printers Budget Troubleshooting Hard Disk Drive Physical Security Technology Tips Hybrid Cloud WiFi Database Leadership Access Touchscreen Employee-Employer Relationship Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Current Events Shortcut Certification HIPAA Botnet VPN Document Management Reporting Cryptocurrency Tablet Downloads Live Streaming Encryption Computer Care VoIPMyths Video Files Battery Data Management Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Tactics Customer Service Microsoft Office 365 Electronic Health Records Gmail Automobile Websites Microsoft Teams CrashOverride Mobility Remote Support Hard Drive Knowledge Artificial Intelligence Trends Profitability WhatsApp Wireless Charging Synergy e-waste Disaster Recovery IT budget PowerPoint Gaming Console VoIPSavings Yahoo SSD Proactive IT E-Commerce Remote Control Digital Internet Explorer Analytics Authentication Health Training Processors GDPR Time Management Comparison Hard Drives A.I. Scalability Phone System Eliminating Downtime Lead Generation disposal IT Management Sports Video Games Google Maps Update Emergency DDoS Inventory Payment Edge Threat IaaS Two-factor Authentication Authorization Employees Dongle Worker Security Cameras Apple Information Technology Storage Multi-Factor Security Specifications Avoiding Downtime Movies Credit Cards Wireless Internet News Dark Data Spyware Television Business Technology Instagram Mobile Security Paste Augmented Reality Money Laptop Printing Quick Tips Remote Computing Samsung Wireless Technology 5G Wearables IBM Conferencing Unified Communications Network Attached Storage Managed IT Services Hacker eCommerce Operating System Paper Telecommuting Customer Relationship Management Competition Big Data Server Management IP Address Online Shopping Environment Fun Ink Millennials Windows 7 Google Drive Mobile Office File Sharing OneNote IT Support Hosted Solution Domains User Tip Virtualization Autocorrect Machine Learning Spam Blocking User Security Search Scheduling Copy Public Speaking Tip of the week Server G Suite Windows 10 Presentation Chrome OS Telecommute VoIP Lithium-ion battery Emoji

Newsletter Sign Up