ALL THE PAGES ON THIS BLOG SHOW YOU WHAT THIS IS ALL ABOUT
WHAT IT DOESNT SHOW YOU ARE THE CONSEQUENCES
DONT BE PART OF THE PROBLEM, BE PART OF THE SOLUTION
THIS BLOG IS DEDICATED TO THOSE WHO SUFFER IN SILENCE
BULLIES ARE COWARDS
They pick their targets carefully, mostly from the weak and vulnerable, they hunt in packs. They are able to keep their true identities secret, as they inflict misery on the lives of their victims, the twitter accounts mentioned in this blog are some of the most cowardly and destructive people you will ever come across, on Twitter.
@Angleseydrift @deadkeneneddie @janerussellsays @mia_mir @bromsville @downedanother1 @aliesalie7 (alias @mfoglasgow) @gojam_I’m_not @cantankerous71 @aphroditenight alias @jenniejenjen1 @madamemooch @luperthelupe @sadieksays @lordtat @_alldaylong @grannyofmax @carl2407 @siouxicooke @hughjardon2304 @we_are_the_mob @Markin_time @RailgunnerKid
Their ring leader
Unlike the victims of traditional bullying, the targets of cyber bullies have nowhere to run. In the most serious cases, the harassment vis carried out via postings on social media sites, blogs and elsewhere on the internet and occurs 24 hours a day, seven days a week. Once posted, the attacks and abuse are there for all the world to see, and it is not uncommon for people who are not known to either the victim or the original perpetrator to join in.
- DEFINITIONS OF CYBER BULLYING
- Definition 1: when a person or group makes public posts in order to single out another user and insult, put down, tease, or otherwise abuse that user
- Definition 3: when a person or group users another user’s private information to harm that user; this can involve hacking that user’s profile information or simply abusing that user’s trust after learning his/her secrets (which were given freely because that user thought the information was going to be safe)