Bullying-Cyberbullying Example-Twitter Pooping-Cyberbullying Tactic 2015 Image-Public Domain-iPredator Inc. Designed

Twitter Pooping: Twitter Pooping is a colloquial expression used to define the cyberbullying tactic of using Tweets to disparage and humiliate a target child. Given that Tweets are restricted to 140 characters, Twitter Pooping tends to be frequent insults and provocations that often use “net lingo” to fit the harmful message the cyberbully is attempting to convey. Because Tweets can be disseminated in a rapid and hidden manner, cyberbullies are using this method of taunting at greater rates. If the Tweet is creatively and skillfully designed, the cyberbully will receive accolades on their skillful use of "net lingo".

Information Age bullying, or cyberbullying, is described as aggressive, repetitive and sustained verbal and physical provocations between children using Information and Communication Technology (ICT). Similar to classic bullying, cyberbullying is premeditated, exploitive and divisively designed to subjugate a vulnerable child. Different from traditional bullying, cyberbullying can occur anonymously, publicly or by using felonious identities when cloaked by cyberspace and information technology. Whereas classic bullying typically involves face-to-face interactions and non-digital forms of communication, cyberbullying consists of correspondence exchanged via ICT and may never require face-to-face meetings. The digital universe allows a cyberbully to design and implement a myriad of cyberbullying tactics non-existent to children prior to the Information Age.
Cyberbullying is an abuse directed interpersonal dynamic that includes aggressors, targets and bystanders. The hallmark developmental issues inciting cyberbullies are irrational needs for acceptance and recognition and intrapersonal factors involving anger, discontent and discouragement. Not all cyberbullies have maturational deficits or psychosocial distortions. On rare occasions, there are instances when a child cyberbullies another child ignorant of the harm they are causing. Unique to the Information Age, cyberbullies are not bound to real environments, physical attributes or gender. Having the "veil of anonymity" afforded by cyberspace, children of the Information Age are no longer limited by the determinants that once kept pre-Information Age children from becoming aggressors. In today's world, a bullied or cyberbullied child is twice as likely to become cyberbullies themselves. 

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.'s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies. iPredator Inc. offers an enormous database of internet safety information, at no cost, at their website by visiting https://www.iPredator.co  

"Not to say that Pre-Information Age bullied children were not traumatized, but Information Age cyberbullied children are relentless, tormented 24 hours a day, seven days a week and 365 days a year." Michael Nuccitelli, Psy.D. (2014)

I. Cyberbullying Examples and Tactics 2015 PDF Paper Link: goo.gl/ynVYfk 
II. Cyberbullying Facts iPredator Page: https://www.ipredator.co/cyberbullying-examples/ 
III. Cyberbullying Tactics Pinterest: http://www.pinterest.com/ipredator/cyberbullying-2015/ 
IV. Online Psychopathy PDF Direct Download Link: http://goo.gl/aOZP17  

#Bullying #Cyberbullying #CyberbullyingFacts #CyberbullyingExamples #CyberHarassment #CyberbullyingTactics #BullyingFacts #iPredator #NoBullying #InternetSafety #Twitter 
Shared publicly