The Daily Telegraph in Australia reports a rise over the past two years in requests for restraining orders against online stalkers by young Australians, “claiming they are victims of intimidation.” Restraining orders are called “AVOs,” for apprehended violence orders, in Australia, and an attorney there “said this sort of behaviour could happen through a combination of mediums such as Facebook or Twitter and phone texting,” the Daily Telegraph reports, adding that “victims were often intimidated through threats written on their sites or by text while others had their sites hacked and information stolen which was then used against them.” I guess I can see why the Telegraph calls this cyberbullying, but it’s probably more accurate to stick with “stalking,” though even that term is used both lightly (for getting to know someone before asking him or her out on a date) and, as in this story, seriously. And, to be fair, “cyberbullying” is being used very broadly now, for everything from mean gossip to defaming social rivals to criminal “sextortion” (extorting someone with sexting photos of them). The Times of India picked this story up here.
NetFamilyNews – by Anne Collier
- Pretty faces in social media vs. mass media
- Risk implications of kids going mobile: Research
- A positive, insightful new book for schools on bullying
- Students called heroes in this 6th-grade class
- In the face of school violence, what do we default to?
- Popularity: The other kind of vulnerability
- FB & Oculus VR: The potential of a virtual-reality platform
- What’s (importantly) different about Snapchat
Analysis & News – by Larry Magid
- Anonymous apps and services are not synonymous with ominous
- Facebook’s ‘Nearby Friends’ feature: What you need to know
- Identity theft a problem from cradle to grave — Kids most vulnerable
- How to protect your family from Heartbleed security flaw (slideshow)
- Beware of Heartbleed inspired phishing scams
- Are sites you use vulnerable to Heartbleed security flaw?
- Microsoft ends support of Windows XP: Machines highly vulnerable to security risks
- The evolution of online safety: Lessons learned over 20 years