{"id":14063,"date":"2020-09-18T16:37:22","date_gmt":"2020-09-18T19:37:22","guid":{"rendered":"https:\/\/ostec.blog\/?p=14063"},"modified":"2020-09-18T16:39:08","modified_gmt":"2020-09-18T19:39:08","slug":"cyberbullying","status":"publish","type":"post","link":"https:\/\/ostec.blog\/en\/general\/cyberbullying\/","title":{"rendered":"Cyberbullying: attacks in the online world"},"content":{"rendered":"<p>In the virtual world, messages with images and offensive comments spread quickly, which makes bullying even more perverse. This practice is now called\u00a0<b>Cyberbullying<\/b>\u00a0and generates great concern among parents and educators.<\/p>\n<p>As the virtual space is unlimited, the power of aggression expands and the victim feels cornered. What\u2019s worse, the victim often doesn\u2019t even know who to defend against.<\/p>\n<p>Have you ever gone through or witnessed a similar situation?<\/p>\n<p>Continue reading and understand what\u00a0<b>cyberbullying<\/b>\u00a0is, its types, consequences and attitudes to avoid it.<\/p>\n<h2>Do you know what Cyberbullying is?<\/h2>\n<p><img decoding=\"async\" class=\"wp-image-6686 size-full alignnone lazyloaded\" src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/crianca_loira.jpg\" sizes=\"(max-width: 567px) 100vw, 567px\" srcset=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/crianca_loira.jpg 567w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/crianca_loira-300x169.jpg 300w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/crianca_loira-539x303.jpg 539w\" alt=\"\" width=\"567\" height=\"320\" data-lazy-srcset=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/crianca_loira.jpg 567w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/crianca_loira-300x169.jpg 300w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/crianca_loira-539x303.jpg 539w\" data-lazy-sizes=\"(max-width: 567px) 100vw, 567px\" data-lazy-src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/crianca_loira.jpg\" data-was-processed=\"true\" \/><\/p>\n<p><strong>Cyberbullying\u00a0<\/strong>is the practice of intimidation, humiliation, harassment, slander and defamation through virtual environments. For example: social networks, e-mail and messaging applications.<\/p>\n<p>The highest incidence of cases occurs among adolescents. However, there are a considerable number of young adults who use this criminal practice.<\/p>\n<p><strong>Cyberbullying<\/strong>\u00a0is a practice widely used by malicious people because it allows for anonymous offenses. Attackers use fake profiles, believing they are fully protected as to their real identity. Or they simply manifest themselves by virtual means to protect themselves.<\/p>\n<p>The following actions can be considered\u00a0<strong>cyberbullying<\/strong>:<\/p>\n<ul>\n<li>Exposure of photos or embarrassing montages;<\/li>\n<li>Disclosure of intimate photos;<\/li>\n<li>Repeatedly criticizing the physical appearance, opinion and social behavior of individuals.<\/li>\n<\/ul>\n<h2>Types de Cyberbullying<\/h2>\n<p><img decoding=\"async\" class=\"alignnone wp-image-6689 size-full lazyloaded\" src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/jovem_isolada.jpg\" sizes=\"(max-width: 567px) 100vw, 567px\" srcset=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/jovem_isolada.jpg 567w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/jovem_isolada-300x170.jpg 300w\" alt=\"\" width=\"567\" height=\"321\" data-lazy-srcset=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/jovem_isolada.jpg 567w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/jovem_isolada-300x170.jpg 300w\" data-lazy-sizes=\"(max-width: 567px) 100vw, 567px\" data-lazy-src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/jovem_isolada.jpg\" data-was-processed=\"true\" \/><\/p>\n<p>There are seven types of quite common<strong>\u00a0cyberbullying<\/strong>\u00a0actions. Which are:<\/p>\n<ol>\n<li>Slander: stating that the victim has committed some criminal act.<\/li>\n<li>Defamation: Imputing a fact to someone who offends your reputation. It doesn\u2019t matter if the fact is true or not, what matters is that it reaches your honor.<\/li>\n<li>Injury: Offending the dignity or decorum of other people, attaining their subjective honor. It usually relates to insults that are posted online. Filming and publicizing a victim being assaulted also fits the crime.<\/li>\n<li>Threat: threatening the victim of unjust and serious harm.<\/li>\n<li>Illegal constraint: regarding cyberbullying, this crime is consummated when the victim does something he does not want and the law does not determine.<\/li>\n<li>False identity: the act of attributing or attributing to another person a false identity to gain an advantage or cause harm.<\/li>\n<li>To harass or disturb the tranquility: an example is the individual who sends unpleasant messages, bothering the victim.<\/li>\n<\/ol>\n<h2>Consequences of aggressions<\/h2>\n<p><img decoding=\"async\" class=\"alignnone wp-image-6690 size-full lazyloaded\" src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/crianca_maos.jpg\" sizes=\"(max-width: 567px) 100vw, 567px\" srcset=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/crianca_maos.jpg 567w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/crianca_maos-300x169.jpg 300w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/crianca_maos-539x303.jpg 539w\" alt=\"\" width=\"567\" height=\"320\" data-lazy-srcset=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/crianca_maos.jpg 567w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/crianca_maos-300x169.jpg 300w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/crianca_maos-539x303.jpg 539w\" data-lazy-sizes=\"(max-width: 567px) 100vw, 567px\" data-lazy-src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/crianca_maos.jpg\" data-was-processed=\"true\" \/><\/p>\n<p><strong>Cyberbullying<\/strong>\u00a0can have serious consequences for victims. An initial picture of isolation and sadness can progress to depression, anxiety disorder and panic syndrome. And when not discovered and treated in time, victims can carry symptoms and trauma for the rest of their lives.<\/p>\n<p>Meet some of them:<\/p>\n<ul>\n<li>Low self esteem;<\/li>\n<li>Difficulty in relationships with other people;<\/li>\n<li>School performance below expectations (when children and adolescents);<\/li>\n<li>Difficulty placing in the job market;<\/li>\n<li>Propensity to use drugs;<\/li>\n<li>In extreme cases, suicide.<\/li>\n<\/ul>\n<h2>Attitudes to avoid being a victim of cyberbullying<\/h2>\n<p><img decoding=\"async\" class=\"alignnone wp-image-6691 size-full lazyloaded\" src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/maos_sobrepostas.jpg\" sizes=\"(max-width: 567px) 100vw, 567px\" srcset=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/maos_sobrepostas.jpg 567w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/maos_sobrepostas-300x160.jpg 300w\" alt=\"\" width=\"567\" height=\"303\" data-lazy-srcset=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/maos_sobrepostas.jpg 567w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/maos_sobrepostas-300x160.jpg 300w\" data-lazy-sizes=\"(max-width: 567px) 100vw, 567px\" data-lazy-src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/maos_sobrepostas.jpg\" data-was-processed=\"true\" \/><\/p>\n<p>Talking about attitudes to prevent\u00a0<strong>cyberbullying<\/strong>\u00a0from happening can be awkward, since the victim should\u00a0<strong>never<\/strong>\u00a0be held responsible for the crime. However, as the aggressions exist, it is always good to take certain precautions to avoid becoming a victim.<\/p>\n<p>Some of the actions to be taken are:<\/p>\n<ul>\n<li>Try not to expose your life too much on social networks;<\/li>\n<li>Avoid sharing intimate content on the internet, regardless of the link with that person;<\/li>\n<li>When attacked by someone, block that person;<\/li>\n<li>In case of exposure of intimate photos on the network, look for a police station and register a police report;<\/li>\n<li>If the aggressions cause moral damages due to injury, slander and defamation, register a police report;<\/li>\n<li>Always seek the support and assistance of a responsible or trusted adult before taking any action (when children and adolescents);<\/li>\n<li>Parents and guardians must always monitor the behavior of minors on the internet, helping when they suffer aggression;<\/li>\n<li>Act quickly when realizing that your child is committing an act of aggression, raising awareness and preventing such practice.<\/li>\n<\/ul>\n<p>According to product engineer of Intel Security, an Intel company, Thiago Hypollito:<\/p>\n<blockquote><p><em>\u201cMany parents think their children know more about technology than they do, and end up not monitoring them on the internet. However, knowing the tools does not mean using them wisely. The internet is an inhospitable environment and children need guidance, just like when they are on the street. If you wouldn\u2019t let your child go out alone in a big city, don\u2019t leave him alone on the internet\u201d.<\/em><\/p><\/blockquote>\n<h2>Data on Cyberbullying in Brazil<\/h2>\n<p><img decoding=\"async\" class=\"alignnone wp-image-6687 size-full lazyloaded\" src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/graficos_painel.jpg\" sizes=\"(max-width: 538px) 100vw, 538px\" srcset=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/graficos_painel.jpg 538w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/graficos_painel-300x170.jpg 300w\" alt=\"\" width=\"538\" height=\"305\" data-lazy-srcset=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/graficos_painel.jpg 538w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/graficos_painel-300x170.jpg 300w\" data-lazy-sizes=\"(max-width: 538px) 100vw, 538px\" data-lazy-src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/graficos_painel.jpg\" data-was-processed=\"true\" \/><\/p>\n<p>Intel Security interviewed 507 children and adolescents between the ages of 8 and 16, with the objective of obtaining data on digital behavior and\u00a0<strong>cyberbullying<\/strong>\u00a0in Brazil.<\/p>\n<p>The survey revealed important data, as shown below:<\/p>\n<ul>\n<li>66% have seen cases of aggression on some social media;<\/li>\n<li>21% have already suffered\u00a0<strong>cyberbullying<\/strong>\u00a0and most victims are between 13 and 16 years old;<\/li>\n<li>24% carried out some aggression in the virtual environment;<\/li>\n<\/ul>\n<p>Of that 24%:<\/p>\n<ul>\n<li>14% say they speak ill of one person to another;<\/li>\n<li>13% made fun of someone for their appearance;<\/li>\n<li>7% tagged someone in vexing photos;<\/li>\n<li>3% threatened someone;<\/li>\n<li>3% made fun of someone\u2019s sexuality;<\/li>\n<li>2% intentionally posted an event in which a colleague was excluded so that they could see that they were excluded.<\/li>\n<\/ul>\n<p>The main reasons children used to justify their actions were:<\/p>\n<ul>\n<li>Defense: the person who attacked treated them badly before;<\/li>\n<li>Do not like the affected person;<\/li>\n<li>Accompany others who have already practiced aggressive actions before.<\/li>\n<\/ul>\n<h2>Punishments<\/h2>\n<p><img decoding=\"async\" class=\"alignnone wp-image-6692 size-full lazyloaded\" src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/malhete_mesa.jpg\" sizes=\"(max-width: 567px) 100vw, 567px\" srcset=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/malhete_mesa.jpg 567w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/malhete_mesa-300x169.jpg 300w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/malhete_mesa-539x303.jpg 539w\" alt=\"\" width=\"567\" height=\"319\" data-lazy-srcset=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/malhete_mesa.jpg 567w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/malhete_mesa-300x169.jpg 300w, https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/malhete_mesa-539x303.jpg 539w\" data-lazy-sizes=\"(max-width: 567px) 100vw, 567px\" data-lazy-src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/01\/malhete_mesa.jpg\" data-was-processed=\"true\" \/><\/p>\n<p>There are articles in the penal code: 138 (libel), 139 (defamation), 140 (insult), 146 (illegal constraint), 147 (threat) and 307 (false identity).<\/p>\n<p>These codes deal with crimes against honor and are fully applicable in cases of cybercrimes. Whether on social media, e-mail, cell phone messages, videos or any other medium.<\/p>\n<p>Crimes of slander, injury, defamation, among others, fit into\u00a0<b>cyberbullying<\/b>\u00a0and define the same penalty for the offender. Depending on the offense, you can get from one month to three years in jail.<\/p>\n<p>When the offender is a minor, those responsible are responsible for their actions. Those responsible are obliged to pay compensation for moral damages.<\/p>\n<p>In some Brazilian capitals, such as S\u00e3o Paulo, Rio de Janeiro and Curitiba, there is an electronic crime police station. This was created to assist victims on how to proceed in a cybercrime situation.<\/p>\n<p>The number of children and young people who suffer from cyberbullying is high. We can say that many of these young people will have serious problems in the future if they do not have the necessary help.<\/p>\n<p>Be sure to report it, whether it\u2019s a specific case with you or someone you know. Cyberbullying is a crime and can be combated and even avoided with the proper guidelines.<\/p>\n<p>Everyone deserves respect, whether on or off the Internet.<\/p>\n<p>Would you like to know more about cyberbullying? Is there any other topic you would like to see here? Leave your suggestion in the comments and follow us on social media.<\/p>\n<p>Instagram and Twitter: @ostecsecurity<\/p>\n<p><a href=\"https:\/\/www.facebook.com\/ostec\/\">Facebook<\/a><span class=\"apple-converted-space\">\u00a0<\/span>and<span class=\"apple-converted-space\">\u00a0<\/span><a href=\"https:\/\/www.linkedin.com\/company\/ostecsecurity\">Linkedin<\/a>: OSTEC Business Security<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the virtual world, messages with images and offensive comments spread quickly, which makes bullying even more perverse. This practice is now called\u00a0Cyberbullying\u00a0and generates great concern among parents and educators. As the virtual space is unlimited, the power of aggression expands and the victim feels cornered. What\u2019s worse, the victim often doesn\u2019t even know who [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":14066,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[984,992],"tags":[],"class_list":["post-14063","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-learning-and-discovery"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyberbullying: attacks in the online world - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/en\/general\/cyberbullying\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberbullying: attacks in the online world - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"In the virtual world, messages with images and offensive comments spread quickly, which makes bullying even more perverse. This practice is now called\u00a0Cyberbullying\u00a0and generates great concern among parents and educators. As the virtual space is unlimited, the power of aggression expands and the victim feels cornered. What\u2019s worse, the victim often doesn\u2019t even know who [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/en\/general\/cyberbullying\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-18T19:37:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-18T19:39:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/12\/cyberbullying.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thais Souza\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/cyberbullying\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/cyberbullying\/\"},\"author\":{\"name\":\"Thais Souza\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33\"},\"headline\":\"Cyberbullying: attacks in the online world\",\"datePublished\":\"2020-09-18T19:37:22+00:00\",\"dateModified\":\"2020-09-18T19:39:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/cyberbullying\/\"},\"wordCount\":1118,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/cyberbullying\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/12\/cyberbullying.jpg\",\"articleSection\":[\"General\",\"Learning and discovery\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/en\/general\/cyberbullying\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/cyberbullying\/\",\"url\":\"https:\/\/ostec.blog\/en\/general\/cyberbullying\/\",\"name\":\"Cyberbullying: attacks in the online world - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/cyberbullying\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/cyberbullying\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/12\/cyberbullying.jpg\",\"datePublished\":\"2020-09-18T19:37:22+00:00\",\"dateModified\":\"2020-09-18T19:39:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/cyberbullying\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/en\/general\/cyberbullying\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/cyberbullying\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/12\/cyberbullying.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/12\/cyberbullying.jpg\",\"width\":928,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/cyberbullying\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberbullying: attacks in the online world\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33\",\"name\":\"Thais Souza\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g\",\"caption\":\"Thais Souza\"},\"url\":\"https:\/\/ostec.blog\/en\/author\/thais-souza\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberbullying: attacks in the online world - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/en\/general\/cyberbullying\/","og_locale":"en_US","og_type":"article","og_title":"Cyberbullying: attacks in the online world - OSTEC | Seguran\u00e7a digital de resultados","og_description":"In the virtual world, messages with images and offensive comments spread quickly, which makes bullying even more perverse. This practice is now called\u00a0Cyberbullying\u00a0and generates great concern among parents and educators. As the virtual space is unlimited, the power of aggression expands and the victim feels cornered. What\u2019s worse, the victim often doesn\u2019t even know who [&hellip;]","og_url":"https:\/\/ostec.blog\/en\/general\/cyberbullying\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2020-09-18T19:37:22+00:00","article_modified_time":"2020-09-18T19:39:08+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/12\/cyberbullying.jpg","type":"image\/jpeg"}],"author":"Thais Souza","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/en\/general\/cyberbullying\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/en\/general\/cyberbullying\/"},"author":{"name":"Thais Souza","@id":"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33"},"headline":"Cyberbullying: attacks in the online world","datePublished":"2020-09-18T19:37:22+00:00","dateModified":"2020-09-18T19:39:08+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/en\/general\/cyberbullying\/"},"wordCount":1118,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/en\/general\/cyberbullying\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/12\/cyberbullying.jpg","articleSection":["General","Learning and discovery"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/en\/general\/cyberbullying\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/en\/general\/cyberbullying\/","url":"https:\/\/ostec.blog\/en\/general\/cyberbullying\/","name":"Cyberbullying: attacks in the online world - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/en\/general\/cyberbullying\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/en\/general\/cyberbullying\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/12\/cyberbullying.jpg","datePublished":"2020-09-18T19:37:22+00:00","dateModified":"2020-09-18T19:39:08+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/en\/general\/cyberbullying\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/en\/general\/cyberbullying\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/en\/general\/cyberbullying\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/12\/cyberbullying.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/12\/cyberbullying.jpg","width":928,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/en\/general\/cyberbullying\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/en\/"},{"@type":"ListItem","position":2,"name":"Cyberbullying: attacks in the online world"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33","name":"Thais Souza","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g","caption":"Thais Souza"},"url":"https:\/\/ostec.blog\/en\/author\/thais-souza\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/14063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/comments?post=14063"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/14063\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media\/14066"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media?parent=14063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/categories?post=14063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/tags?post=14063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}