{"id":937,"date":"2012-04-05T15:01:44","date_gmt":"2012-04-05T14:01:44","guid":{"rendered":"http:\/\/dpscomputing.com\/wordpress\/?p=937"},"modified":"2012-04-05T15:02:47","modified_gmt":"2012-04-05T14:02:47","slug":"internet-bullies-not-as-anonymous-as-they-may-think","status":"publish","type":"post","link":"https:\/\/www.dpscomputing.com\/blog\/2012\/04\/05\/internet-bullies-not-as-anonymous-as-they-may-think\/","title":{"rendered":"Internet Bullies &#8211; Not As Anonymous As They May Think"},"content":{"rendered":"<p><a href=\"http:\/\/dpscomputing.com\/wordpress\/wp-content\/uploads\/2012\/04\/cyberbullying.jpg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"938\" data-permalink=\"https:\/\/www.dpscomputing.com\/blog\/2012\/04\/05\/internet-bullies-not-as-anonymous-as-they-may-think\/cyberbullying\/\" data-orig-file=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2012\/04\/cyberbullying.jpg\" data-orig-size=\"600,423\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"Cyber Bullying\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2012\/04\/cyberbullying-300x211.jpg\" data-large-file=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2012\/04\/cyberbullying.jpg\" tabindex=\"0\" role=\"button\" class=\"alignright  wp-image-938\" title=\"Cyber Bullying\" src=\"http:\/\/dpscomputing.com\/wordpress\/wp-content\/uploads\/2012\/04\/cyberbullying.jpg\" alt=\"Cyber Bullying\" width=\"324\" height=\"229\" srcset=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2012\/04\/cyberbullying.jpg 600w, https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2012\/04\/cyberbullying-150x105.jpg 150w, https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2012\/04\/cyberbullying-300x211.jpg 300w\" sizes=\"auto, (max-width: 324px) 100vw, 324px\" \/><\/a>With the rise of social media in the last few years, this has also paved the way for cyber bullying. \u00a0One of the key advantages seen by cyber bullies is that they can be anonymous &#8211; they can say things and not worry about the ramifications as no one will ever know who they are&#8230;.. or will they?<\/p>\n<p>A misconception has spread through out the Internet that &#8216;anonymous&#8217; services are truly anonymous and untraceable. \u00a0Wrong! \u00a0That fake Facebook profile that you have set up, if you cause enough trouble and the Police start to investigate, they can and will track you down!<\/p>\n<p>No matter which website you go to there will be certain logs of your activity, where they originated from, e-mail address used to register and so on. \u00a0There is nothing anonymous about what you do on the Internet, it&#8217;s just all about whether you become &#8216;interesting&#8217; enough to investigate.<\/p>\n<p>BBC Panorama <a href=\"http:\/\/www.bbc.co.uk\/programmes\/b01c00y3\" target=\"_blank\">recently dedicated a program to Internet bullying<\/a> and more specifically &#8211; bullying through social media websites such as YouTube and Facebook.<\/p>\n<p>In it, among other things, the track down a so called &#8216;internet troll&#8217; who has used to social networking site Facebook to post offensive comments on tribute pages for people that have died, including a particularly vicious racist comment to one person. \u00a0When confronted, he stated that everyone is allowed to have their views and say what they want. \u00a0But that is only partly right.<\/p>\n<p>Yes, we have free speech in this country, but the laws that apply in real life also apply online. \u00a0So if you start making racist \/ homophobic comments or harassing people using the Internet then you are just as guilty of the offence as if you did it in real life.<\/p>\n<p>The program shows the true devastating effects that cyber bullying can have on people, especially children. \u00a0It shows how a worldwide bullying campaign was waged against a girl from the United States, aged 11.<\/p>\n<p>The BBC Panorama documentary is available on YouTube:<\/p>\n<p>&nbsp;<\/p>\n<p><iframe loading=\"lazy\" src=\"http:\/\/www.youtube.com\/embed\/Vk12Eutpl6M\" frameborder=\"0\" width=\"560\" height=\"315\"><\/iframe><br \/>\n<iframe loading=\"lazy\" src=\"http:\/\/www.youtube.com\/embed\/uy2Dr_ujWoY\" frameborder=\"0\" width=\"560\" height=\"315\"><\/iframe><br \/>\n<iframe loading=\"lazy\" src=\"http:\/\/www.youtube.com\/embed\/9BebjtV8HP0\" frameborder=\"0\" width=\"560\" height=\"315\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the rise of social media in the last few years, this has also paved the way for cyber bullying. \u00a0One of the key advantages seen by cyber bullies is that they can be&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[55,8],"tags":[307,308,305,302,72,306,304,303,309,74],"class_list":["post-937","post","type-post","status-publish","format-standard","hentry","category-articles","category-news","tag-bbc","tag-bbc-panorama","tag-bullying","tag-cyber-bullying","tag-facebook","tag-harassment","tag-internet-bullying","tag-online-bullying","tag-panorama","tag-social-networking"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p3nsfA-f7","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts\/937","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/comments?post=937"}],"version-history":[{"count":3,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts\/937\/revisions"}],"predecessor-version":[{"id":941,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts\/937\/revisions\/941"}],"wp:attachment":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/media?parent=937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/categories?post=937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/tags?post=937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}