Loading...
E-DICTIONARYLoading...
Loading...
KNOWLEDGE PROTECTSLoading...
eTwinning project 2023Loading...
By project membersCyberbullying Terminology
3
Cyberbullying Terminology
4
1
Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . .
Page 6-7 . . . . . Cyberbullying . . . . . . . . . . .
Page 8-9 . . . . .Doxing. . . . . . . . . . . . . . . . . .
Page 10-11 . . . Digital citizenship. . . . . . . .
Page 12-13 . . .Digital footprint. . . . . . . . . .
Page 14-15 . . . Hate Speech . . . . . . . . . . . . .
Page 16-17 . . .Flaming . . . . . . . . . . . . . . . . .
Page 18-19 . . . Ransomware . . . . . . . . . . . .
Page 20-21 . . . Social media . . . . . . . . . . . .
Page 22-23 . . .Cyber Abuse. . . . . . . . . . . . .
Page 24-25 . . . Blocking. . . . . . . . . . . . . . . . .
Page 26-27 . . . Malware . . . . . . . . . . . . . . . .
Page 28-29 . . .Impersonation Case . . . . .
Page 30-31. . . .Happy Slapping. . . . . . . . . . .
Page 32-33 . . .Swatting. . . . . . . . . . . . . . . . .
Page 34-35 . . .Bot. . . . . . . . . . . . . . . . . . . . . .
Page 36-37 . . . Troll . . . . . . . . . . . . . . . . . . . . .
Page 38-39 . . .Cyber-harassment . . . . . . . .
Page 40-41. . . .Grooming . . . . . . . . . . . . . . . .
Page 42-43 . . .Spam . . . . . . . . . . . . . . . . . . . .
Page 44-45. . . .Emoji . . . . . . . . . . . . . . . . . . . .
Page 46-47 . . .Cyberstalking . . . . . . . . . . . .
Page 48-49. . . .Haters . . . . . . . . . . . . . . . . . . .
Page 50-51 . . . Web Filtering. . . . . . . . . . . . .
Page 52-53 . . . Cookie. . . . . . . . . . . . . . . . . . .
Page 54-55 . . . Sub tweeting . . . . . . . . . . . . .
Page 56-57 . . . Baiting . . . . . . . . . . . . . . . . . .
Page 58-59 . . . Information Security . . . . . .
Page 60-61 . . .Netiquette. . . . . . . . . . . . . . .
Page 62-63. . . .Intrusive Interstitials. . . . . .
Page 64-65 . . .Phishing . . . . . . . . . . . . . . . . .
Page 66-67. . . Cybersecurity . . . . . . . . . . . .
Page 70-71 . . . Trojan. . . . . . . . . . . . . . . . . . . .
Page 72-73 . . .Data Theft. . . . . . . . . . . . . . . .
Page 74-75 . . .Digital Extortion . . . . . . . . . .
Page 76-77 . . .Masquerading. . . . . . . . . .
Page 78-79 . . .Sensitive data . . . . . . . . . . . .
Page 80-81. . . .Newbie . . . . . . . . . . . . . . . . . . .
Page 82-83 . . .Meme . . . . . . . . . . . . . . . . . . . .
Page 84-85 . . . Catfishing. . . . . . . . . . . . . . . . .
Page 86-87 . . .Blogger. . . . . . . . . . . . . . . . . . .
Page 88-89 . . .Influencer. . . . . . . . . . . . . . . .
Page 90-91. . . .Denigration. . . . . . . . . . . . . . .
Page 92-93 . . .Hacking. . . . . . . . . . . . . . . . . .
Page 94-95. . . .Media Literacy. . . . . . . . . . . .
Page 96-97 . . .Carding . . . . . . . . . . . . . . . . . .
Page 98-99. . . .Aggressor . . . . . . . . . . . . . . . . .
Page 100-101 . Bully. . . . . . . . . . . . . . . . . . . . ..
Page 102-103. . Body Shaming. . . . . . . . . . . .
Page 104-105 . .Ostracism . . . . . . . . . . . . . . . .
Page 6-7 . . . . . Cyberbullying . . . . . . . . . . .
Page 8-9 . . . . .Doxing. . . . . . . . . . . . . . . . . .
Page 10-11 . . . Digital citizenship. . . . . . . .
Page 12-13 . . .Digital footprint. . . . . . . . . .
Page 14-15 . . . Hate Speech . . . . . . . . . . . . .
Page 16-17 . . .Flaming . . . . . . . . . . . . . . . . .
Page 18-19 . . . Ransomware . . . . . . . . . . . .
Page 20-21 . . . Social media . . . . . . . . . . . .
Page 22-23 . . .Cyber Abuse. . . . . . . . . . . . .
Page 24-25 . . . Blocking. . . . . . . . . . . . . . . . .
Page 26-27 . . . Malware . . . . . . . . . . . . . . . .
Page 28-29 . . .Impersonation Case . . . . .
Page 30-31. . . .Happy Slapping. . . . . . . . . . .
Page 32-33 . . .Swatting. . . . . . . . . . . . . . . . .
Page 34-35 . . .Bot. . . . . . . . . . . . . . . . . . . . . .
Page 36-37 . . . Troll . . . . . . . . . . . . . . . . . . . . .
Page 38-39 . . .Cyber-harassment . . . . . . . .
Page 40-41. . . .Grooming . . . . . . . . . . . . . . . .
Page 42-43 . . .Spam . . . . . . . . . . . . . . . . . . . .
Page 44-45. . . .Emoji . . . . . . . . . . . . . . . . . . . .
Page 46-47 . . .Cyberstalking . . . . . . . . . . . .
Page 48-49. . . .Haters . . . . . . . . . . . . . . . . . . .
Page 50-51 . . . Web Filtering. . . . . . . . . . . . .
Page 52-53 . . . Cookie. . . . . . . . . . . . . . . . . . .
Page 54-55 . . . Sub tweeting . . . . . . . . . . . . .
Page 56-57 . . . Baiting . . . . . . . . . . . . . . . . . .
Page 58-59 . . . Information Security . . . . . .
Page 60-61 . . .Netiquette. . . . . . . . . . . . . . .
Page 62-63. . . .Intrusive Interstitials. . . . . .
Page 64-65 . . .Phishing . . . . . . . . . . . . . . . . .
Page 66-67. . . Cybersecurity . . . . . . . . . . . .
Page 70-71 . . . Trojan. . . . . . . . . . . . . . . . . . . .
Page 72-73 . . .Data Theft. . . . . . . . . . . . . . . .
Page 74-75 . . .Digital Extortion . . . . . . . . . .
Page 76-77 . . .Masquerading. . . . . . . . . .
Page 78-79 . . .Sensitive data . . . . . . . . . . . .
Page 80-81. . . .Newbie . . . . . . . . . . . . . . . . . . .
Page 82-83 . . .Meme . . . . . . . . . . . . . . . . . . . .
Page 84-85 . . . Catfishing. . . . . . . . . . . . . . . . .
Page 86-87 . . .Blogger. . . . . . . . . . . . . . . . . . .
Page 88-89 . . .Influencer. . . . . . . . . . . . . . . .
Page 90-91. . . .Denigration. . . . . . . . . . . . . . .
Page 92-93 . . .Hacking. . . . . . . . . . . . . . . . . .
Page 94-95. . . .Media Literacy. . . . . . . . . . . .
Page 96-97 . . .Carding . . . . . . . . . . . . . . . . . .
Page 98-99. . . .Aggressor . . . . . . . . . . . . . . . . .
Page 100-101 . Bully. . . . . . . . . . . . . . . . . . . . ..
Page 102-103. . Body Shaming. . . . . . . . . . . .
Page 104-105 . .Ostracism . . . . . . . . . . . . . . . .
2
Cyberbullying
Bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation.
The most common places where cyberbullying occurs are:
1.Social Media, such as Facebook, Instagram, Snapchat, and Tik Tok
2.Text messaging and messaging apps on mobile or tablet devices
3.Instant messaging, direct messaging, and online chatting over the internet, online forums, chat rooms, and message boards, such as Email,
online gaming communities
The most common places where cyberbullying occurs are:
1.Social Media, such as Facebook, Instagram, Snapchat, and Tik Tok
2.Text messaging and messaging apps on mobile or tablet devices
3.Instant messaging, direct messaging, and online chatting over the internet, online forums, chat rooms, and message boards, such as Email,
online gaming communities
Lia Sartania/ Georgia/ LEPL Tbilisi #141 Public School