Let's Talk
Press or Marketing Inquirespress@dosomething.org
Grant Programgrants@dosomething.org

An intermediary which hides or disguises the IP address associated with the Internet user. Generally, this allows a person to engage in various Internet activities without leaving a digital footprint that can be tracked.
An online bulletin board on which individuals can post anything they want. Generally, posts are malicious and hateful statements directed against another person.
The denial of access to particular parts of the Internet. Usually a message will be shown on screen to say that access has been denied.
Interactive web journal or diary, the contents of which are posted online and then viewable by some or all individuals. The act of updating a blog is called "blogging". A person who keeps a blog is called a "blogger".
"Longstanding violence" – physical or psychological. Aggressive behavior or intentional “harm doing” by one person or a group, generally carried out repeatedly and over time.
Suicide stemming directly or indirectly from cyber bullying victimization.
Willful or repeated harm inflicted through the medium of electronic text. Generally, the offender has perceived or actual power over the victim(s).
A term used to describe the electronic universe created by computer networks in which individuals interact.
Harassment that includes threats of harm or is highly intimidating and intruding upon one’s personal privacy.
Electronic material that either generally or specifically raises concerns that the creator may intend to inflict harm or violence to other or self.
Evidence of a person’s use of the Internet. This includes anything that can be linked to his or her existence, presence, or identity.
The applying of a set of criteria against which Internet content is judged acceptable or not. For example, a filter might check the text on a web page with a list of forbidden words. If a match is found, that web page may be blocked or reported through a monitoring process. Generally speaking, it lets data pass or not pass based on previously specified rules.
Sending angry, rude, or obscene messages directed at a person or persons privately or an online group. A "flame war" erupts when "flames" are sent back and forth.
An extreme form of bullying where physical assaults are recorded on mobile phones and distributed to others.
Unsolicited words or actions intended to annoy, alarm, or abuse another individual.
Stands for "Internet Protocol" address. It is a unique address assigned to a computing device that allows it to send and receive data with other computing devices that have their own unique addresses.
Internet Relay Chat, a network over which real time conversations take place among two or more people in a "channel" devoted to a specific area of interest.
Internet Service Provider, the company that provides an Internet connection to individuals or companies. Can help with identifying the individual who posts or sends harassing or threatening words.
The recording and reporting of online activity through software. It may record a history of all Internet use or just of inappropriate use. A person can also serve this function.
Two or more computers connected so that they can communicate with each other.
The person who instigates online social cruelty. Also known as the "aggressor."
Short Message Service - a communications protocol that allows short (160 characters or less) text messages over cellular phone.
Unsolicited electronic mail sent from someone you do not know.
Deliberately but disingenuously posting information to entice genuinely helpful people to respond (often emotionally). Often done to inflame or provoke others.
The one who is on the receiving end of online social cruelty. Also known as the "target."
Sources:
Cyberbullying.us