View allAll Photos Tagged Cyberbully

Outfit: Gaia - Meds tube top @ Equal10

Gaia - Meds denim short @ Equal10

Hair: Stealthic - Rush @ Kustom9

Pose: piXit - Cyberbully @ Reborn Event

Wise men once said

"Wild winds are death to the candle"

A rose by any other name is a scandal

Cautions issued, he stood

Shooting the messengers

They tried to warn him about her

 

Cross your thoughtless heart

Only liquor anoints you

She's the albatross

She is here to destroy you

 

Wise men once said

"One bad seed kills the garden"

"One less temptress, one less dagger to sharpen"

Locked me up in towers

But I'd visit in your dreams

And they tried to warn you about me

 

Cross your thoughtless heart

Only liquor anoints you

She's the albatross

She is here to destroy you

Devils that you know

Raise worse hell than a stranger

She's the death you chose

You're in terrible danger

 

And when that sky rains fire on you

And you're persona non grata

I'll tell you how I've been there too

And that none of it matters

 

Wise men once read fake news

And they believed it

Jackals raised their hackles

You couldn't conceive it

You were sleeping soundly

When they dragged you from your bed

And I tried to warn you about them

 

So I crossed my thoughtless heart

Spread my wings like a parachute

I'm the albatross

I swept in at the rescue

The devil that you know

Looks now more like an angel

I'm the life you chose

And all this terrible danger

(This terrible danger)

 

So cross your thoughtless heart

She's the albatross

She is here to destroy you

  

Yes, I have a new most favorite song since I've got the CD with bonus track after album's release and was able to finally listen to it. xD And I also have quite of collection of very different interpretations of it, written by curious Swifties. ;) No, I'm not going to share here which theory I support, but I think if true one day it will be mainstream knowledge, just like that theory about Folklore some people tell y'all two years ago and were ridiculed (and cyberbullied), which theory was basically confirmed by an official account this year and people acted like it's new, but it's not. So no, this picture is not about any theory (though some of them may overlap with it). :)

  

Those lyrics are great example of visual storytelling, and there is a certain scene with certain vibes, which triggered a memory and reminded me of something that literally happened in a game... at least from my POV it looked more or less like that when I had the choice of which player to save (I chose the danger and I have no regrets). No, I swear, I'm not being dramatic, it was the other player who wrote about falling from the cliff twice and the second time I just couldn't let it happen again! xD

 

I wanted to include the Albatross to stay as close to the lyrics as possible, because this is a tribute to the song first and foremost. So instead of including the actual characters from that game, I chose another character as a guest character, and I made some redesign, because my own characters were redesigned in previous pictures as well... :) I have our game host's permission to include the character which is not mine, so I hope it's okay. I just wanted to find a way to share a song, cause I think someone would like it.

  

My favorite part is, of course, the Albatross. I chose Laysan albatross as reference, cause I started with a tail so I needed to keep other parts dark too. I had to digitally recolor the head, though, cause Lego released only three colors, with one of them not being a bird's head at all despite the shape. So don't worry, everything is Lego here. :)

 

I hope you'll like the picture, cause I'm very excited about how it looks now with all the effects. :D

  

You can listen to the song here:

Taylor Swift - The Albatross (Official Lyric Video)

There will be no instructions. For anything. Ever.

 

The nice version: LEGO is LEGO. The whole point is to make your own. The same way I do. It's an expression of creativity, the same way a child builds a colourbarf pyramid or a 2x4 brick "worm." They do not take these and sell them for £1 at the lemonade stand.

Building instructions for other people take more time and effort than building, and turning my hobby into a business kills the art and my enjoyment of LEGO. Just let creators create, and so should you

 

The not nice version: It's my MOCs for me, fuck off.

 

The honest version: I barely build. There are many reasons, one being that I'm a 28yr old overgrown kid trying to live an adult life and struggling to not drown in it. LEGO is my escapism, and so far probably my only way I can channel a seemingly useless Art and Design degree. That is why I build for myself, it's channeling the creativity I have inside me.

Most people build for themselves, and so do I And some of y'all don't get that.

"But we want to build the best version of such and such..."

Bruh me too. So I do that. You can too.

Some people have been relentless hounding me for instructions for my MOCs. Some people have been very entitled and demanding, even downright rude. No wonder I'm currently in a state of not wanting to build again.

I build because that's what I liked to do. The people that make instructions are doing it because that's the thing they like to do, bless them. And that takes a lot of work. The LEGO Company has an entire department to create building instructions for their products. The builders who make instructions are doing it on their own time (while also building LEGO and having their own lives) and selling them for £5 to £50 is seriously underselling them.

But me, I don't want to make it a business. I'll build something, and if you're lucky, I'll post it. If you're even more lucky, then you'll see it at a convention, and if you hit the jackpot then you'll get a hands-on experience then and there.

 

TLDR: No more instructions. Please voice your complaints to my agent, she's in the mood to cyberbully some entitled kids

So I like these figs so here I am showing them.

 

L to R:

 

Rebirth Deathstroke: Quite simple just wanted to use this belt piece for him and I came um with this. (Kinda inspired off DC Purist Figs)

 

Catwoman: A combo of the LBM version and my previous version.

 

Batgirl: Just testing combos with the LBM fig cause I had a few of them.

 

Spoiler: If no one can cyberbully me about this fig it would be appreciated. But I tried to make a more accurate version to this photo. comicsalliance.com/files/2016/05/spoiler1.png?w=630&h...

 

So that is all comment and like and all that jazz.

+1 in comments

all credit for this group goes to Jake

here is how it all started

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^READ THIS FIRST^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

I don't know about you, but to me everyone on flickr is like family. We support each other through good and bad. So many times I read in descriptions when people are going through serious troubles like being bullied, abused, or other issues and they have no one to talk to. This needs to stop. SO many kids don't let out their hurt feelings and end up in deep depression or suicide. This is where we can help. Jake started a group called Build Me Up everyone is welcome to help out. We're trying to reach out to those hurt people and encourage them to talk to us! Trust me Jake gives the best advice(: Even if you just want to talk to someone flickrmail us! He also started a Tag-Along so we can get to know each other. (because we're family [: ) We got our inspiration from the movie Cyberbully on ABC Family. I really recommend watching it. It shows you what really happens online to everyone, and what you should do to stop it.(: thanks for reading this far, please think about it.

I hope what i wrote inspired you. Thank you

   

love.lee☼

"Isn't it odd that Melania put the presidential medal of freedom on Rush Limbaugh? He's a cyberbully if I ever saw one."

Late in the afternoon on the last day in March 2009, I walked into Bryant Park, which is located behind the New York Public Library, between 41st and 42nd Street, facing Avenue of the Americas. There were several people reading and basking in the sun, a couple people typing on their laptop computers, and one chess game underway. I spent about half an hour wandering around to see what looked photo-worthy, and then wandered off to get some dinner...

 

This woman was typing away on a laptop computer ... alas, it was not an Apple Powerbook. But maybe she doesn't know any better. Just think: if she had been typing on a Mac, her photo probably would have been published a thousand times by now!

 

*****************

 

Even though this photo was taken in March 2009, Karen Bryan claims to have published it in a Nov 13, 2008 blog titled “'The Future of the Travel Blog' Presentation, Travel Blog Camp, London 11 November 2008." Back in the "real world," the photo was also published in an Apr 22, 2009 blog entitled "Greenify Your PC!." And it was published in a May 1, 2009 blog titled "Our New Toolbar Helps You Go Green." Then it was published in a Jul 8, 2009 blog titled "Five ways to maximize freelance writing income." And it was published in a Jul 16, 2009 blog titled "Facebook Your Way to Universal Healthcare in The Atlantic. More recently, it was published in an Aug 6, 2009 blog titled "Loudoun County Puts Development Applications Online, Earns National Accolades." And it was published in an Aug 17, 2009 Lifehacker blog titled "What Email Service Do You Use?" It was also published in a Sep 4, 2009 blog titled "http://humantrafficking.change.org/blog/view/want_to_blog_for_changeorg"

 

It was published in an undated (Oct 2009) blog titled "How to Fix Common Laptop Problems." And it was published in an Oct 21, 2009 Brazilian blog title " Custo é o diferencial na hora de escolher uma plataforma de blog." It was also published in a Nov 3, 2009 blog titled "What Do You Want Students To Do?" And it was published in an undated (Nov 2009) blog titled "Sedentary Runners." It was also published in a Nov 9, 2009 blog titled "Keep Your Health Club Members Coming Back By Allowing Them to Book Appointments Online." And it was published in a Nov 27, 2009 blog titled "Degrees of Presence IV: My experience." It was also published in a Dec 2, 2009 blog titled "Internet Linked to Intellect."

 

It was published again in a Dec 13, 2009 blog titled "Las ciudades del mundo más conectadas con Internet." It was also published in a Dec 14, 2009 German blog titled "Modisch immer Online auf MySpace Fashion." And it was published in a Dec 18, 2009 blog titled La primera red 4G del mundo se estrena en Suecia, whose URL Flickr is not allowing me to embed -- but it's www dot tuexperto dot com slash 2009/12/18/la-primera-red-4g-del-mundo-se-estrena-en-suecia/

 

Moving into 2010, the photo has been published in a Jan 5, 2010 Fast Company blog titled "What Women Want: Facebook Ads!", www-dot-fastcompany-dot-com/blog/maccabee-montandon/upswing/rise-fan-girls. And it was published in a Jan 11, 2010 blog titled "Caen las disqueras, sube la música." It was also published in a Jan 15, 2010 blog titled "School Lunches and 'Home' Work: Friday Finds." And it was published in a Jan 20, 2010 blog titled "Welcome to Mobility Hacks." It was also published in a Feb 2, 2010 blog titled "Thanks for Visiting." A week later, it was published in a Feb 9, 2010 blog titled "Większość polskich internautów korzysta z internetowych multimediów."

 

The photo was published in a Feb 17, 2010 blog titled "What does Matador mean to you?," as well as a Feb 17, 2010 Polish blog titled "Informacja stanie się walutą." On Feb 18, 2010 it was published in a blog titled "School uses laptop webcams to spy on students." And I discovered that it was published in an undated (Mar 2010) German blog titled "Einführung," which seems to provide an online service for Germans who want to learn to speak Italian. It was also published in a Mar 24, 2010 Mexican blog titled "Uso de software ilegal en el mundo." And it was published in an Apr 14, 2010 Italian blog titled "Le donne sfruttano il lato oscuro di Facebook," as well as an Apr 14, 2010 blog titled "10 Ways To Make The Most Of Your Laptop." About a week later, I found it on an undated (Apr 22, 2010?) blog titled "Ask the Readers: Your Favorite Online Resources." It was also published in an Apr 22, 2010 blog titled "The Evolution of a Blog." And it was published in an undated (Apr 2010) Mahalo-dot-com blog titled "Ask any question, any time." It was also published as an illustration in a May 12, 2010 Romanian(?) Gadgets blog, with the same title as the caption that I put on this Flickr page; and it was also published on May 12, 2010 in a blog titled "Definition of a Truly Mobile Job."

 

On May 17, 2010 the photo was published without any title or description on a Technologeek site. And on May 26, 2010, the photo was published in a Spanish blog titled "Buscar Pareja," and also a Norwegian blog titled "Her handler du best på nett." On May 30, 2010, it was published in a blog titled "What is the best laptop?." And on Jun 2, 2010 it was published in what appears to be a Polish blog, titled "Yahoo! grozi lokalnym mediom. Będzie walka o reklamodawców." It was also published in a Jun 10, 2010 Rent Laptop Computer blog, with a title that was a slightly bizarre variation on the caption that I used for this Flickr page: "ONE OF A SINGULAR NON-APPLE LAPTOPS SEEN IN AN DIFFERENTLY COLD PLAY GROUND FULL OF COLD PEOPLE."

 

On Jun 12, 2010, the photo was published in an Italian blog titled "Libri di donne: scarichiamoli gratis dalla rete." And on Jun 16, 2010 a cropped version of the photo was published in a Spanish blog titled "Encuentros en Sevilla: los mejores sitios para ligar." It was also published in a Jun 21,2010 FixALaptop blog titled "Where can I download a new free camera software for toshiba vista laptop?" And it was published in a Jun 23, 2010 blog titled " per unit community college fee gets some support." It was also published in two Jun 28, 2010 blogs" "Where to Write Out of the House," and "Why It’s So Easy to Spend Too Much Online." And it was published in a Jun 29, 2010 blog titled "What Women Want ... Online."

 

The photo was also published in a Nov 26, 2010 blog titled "Going Internet-Lite." And it was also published in a Nov 26, 2010 blog titled アメリカ旅行でも仕事環境を準備するお話。at linker.in/journal/2010/11/mobile-trip.php. It was also published as an illustration in an undated (late Nov 2010) Writer's World blog.

 

The photo was also published in a Dec 8, 2010 blog titled "The Brief History of Apple Laptops." It was also published in a Dec 9, 2010 blog titled "A Guide To Online Dating In New York City." And it was published in a Dec 10, 2010 Smookey blog with the same title and detailed notes that I had written on this Flickr page. It was also published in a Dec 15, 2010 Dutch "Joop" blog titled "EU-surfer beter beschermd tegen ongewenste reclame." And it was published in a Dec 16, 2010 blog titled "mi date un sito per comprare online?" It was also published in a Dec 17, 2010 blog titled "Ma con POSTEPAY posso comprare nei negozi? o posso solo comprare su internet?" as well as another Dec 17, 2010 blog titled "What are tips on how to avoid players with online dating? What should I look for in the profile?" and yet another Dec 17, 2010 blog titled "Pranzare di fronte al computer fa mangiare di più." It was also published in an undated (late Dec 2010) blog titled "Q&A: mi potete cosigliare un sito per comprare trucchi, pennelli ecc online?" It was also published in a Dec 26, 2010 New Home Businesses blog, with the same title as the caption that I put on this Flickr page. And it was published in a Dec 29, 2010 blog titled "How An Entrepreneur Create New Products At Lightning Speed."

 

Moving into 2011, the photo was published in a Jan 2, 2011 blog titled "Q&A: how could i make money online free?", as well as a Jan 2, 2011 blog titled "How to know which SEO software suits your search engine optimization needs?" It was also published in a Jan 4, 2011 blog titled "Online Degrees: A More Affordable And Flexible Higher." And it was published in a Jan 5, 2011 blog titled "Legitimate Paid Surveys – How to Earn Money Online from Home Starting Today ." It was also published in a Jan 9, 2011 blog titled "ciao raga ho un amica che vorrebbe comprare un cell su e bay, sevondo voi e sicuro?" And it was published in an undated (Jan 2011) "Forward SIngles" blog, titled "Медиите за Forward Singles (3)." It was also published in a Jan 19, 2011 blog titled "Getting A Degree In Sports Marketing." And it was published in a Jan 21, 2011 blog titled " Evoquer publiquement sa réussite, ses revenus internet, ou pas…" It was also published in a Jan 27, 2011 blog titled "http://interaktywnie.com/biznes/newsy/domeny/home-pl-tworzy-gielde-domen-18993." And it was published in a Jan 30, 2011 blog titled "Q&A: do I have an eating disorder?"

 

The photo was also published in a Feb 3, 2011 blog titled "AWP 2011 Panel Post: How To Get Beyond “Using Social Media” & Become A Social Artist Instead." And it was published in a Feb 4, 2011 blog titled "Thanks for Visiting." It was also published in a Feb 7, 2011 blog titled "Consommation et Affirmation de soi : quand le numérique détrône l’automobile." And it was published in a Feb 8, 2011 blog titled "Zoosk To Lead Online Dating Space." It was also published in a Feb 15,2011 blog titled "Unable to meet enrollment goals, CSU may have to return state funds." And it was published in a Feb 18, 2011 blog titled "Google’s travel deal faces regulatory turbulence." It was also published in a Feb 19, 2011 blog titled "MIT Entrepreneurship Review: Designing Customer Surveys That Work: Focus On Value," with the same caption and detailed notes that I had written on this Flickr page. It was also published in a Feb 23, 2011 blog titled "Digitale bouwstenen." And it was published in a Feb 27, 2011 Eliminate Debt Working from Home blog, with the same caption and detailed notes that I had written on this Flickr page. And it was published in an Apr 23, 2011 blog titled Laptop Reviews – Best Mini Laptop 2011

 

The photo was also published in a Mar 4, 2011 Chilean blog titled "10 formas de organizar mejor tu tiempo." And it was published in a Mar 5, 2011 blog titled "Local High School Uses Digital Textbooks." It was also published in a Mar 7, 2011 blog titled "La crisis dispara la tasa de ocupación de la mujer mayor de 45 años." And it was published in a Mar 11, 2011 blog titled "Une table ronde autour des tendances du eCommerce." It was also published in a Mar 14, 2011 PC Gadgiator blog, with the same caption and detailed notes that I had written on this Flickr page. And it was published in a Mar 15, 2011 blog titled "New Cyberbullying Study Reveals that Students Bullying Are More Likely Insecure, Negative Towards Teachers." It was also published in a Mar 22, 2011 blog titled "How to Speak in German: 3 Unusual Facts for Beginners." And it was published in a Mar 24, 2011 blog titled "Cum abordezi o tipa pe Facebook."

 

The photo was also published in an Apr 7, 2011 blog titled "Download Sucker Punch Movie-The Story of A Young Courageous Girl." It was also published in an Apr 17, 2011 blog titled "Keeping JSP Development Alive." It was also published in an Apr 19, 2011 "Moscow News" article titled "Попались в женские сети." And it was published in an Apr 23, 2011 blog titled "Laptop Reviews – Best Mini Laptop 2011." It was also published in an Apr 27, 2011 blog titled "Planning For Content Delivery, Consumption and Context." And it was published in an Apr 28, 2011 blog titled "¿Eres una mujer PANK?" It was also published in a Jun 6, 2011 blog titled "This question is for bloggers who make money blogging?" And it was published in a Jun 9, 2011 blog titled "New York City Adds Free AT&T Wi-Fi to Public Parks."

 

It was also published in a Jul 29, 2011 blog titled "Travel Blogger, una nuova professione?" And it was published in an Aug 10, 2011 blog titled "Russian Storybooks Good for Beginners Learning the Language?" It was also published in an Aug 11, 2011 blog titled "Study Reports More Girls than Boys Cyberbullied." And it was published in an Aug 26, 2011 blog titled "Social networking helps students perform better, professor says," as well as an Aug 26, 2011 blog titled "Los amores en tiempos de internet." And it was published in a Sep 17, 2011 blog titled "La etopeya personal." It was also published in an Oct 3, 2011 Cool Best New Technology Gadgets images blog, with the same caption and detailed notes that I had written on this Flickr page. And it was published in an Oct 15, 2011 "Surviving College" blog titled "PROPERLY COMMUNICATING WITH YOUR PROFESSOR." It was also published in an Oct 21, 2011 blog titled "Disruptive News 21 Oktober 2011," and an Oct 21, 2011 blog titled "UC online instruction pilot sparks excitement, controversy." And it was published in a Nov 2, 2011 blog titled "Going Pro, at BlogWorld Expo 2011." It was also published in a Nov 22, 2011 blog titled "Virtuelle Adventskalender." And it was published in a Dec 9, 2011 blog titled "Es viernes ¿cuánto tiempo pasas conectado?

 

Moving into 2012, the photo was published in a Jan 2, 2012 blog titled "What would be the job title or the industry for these computer skills? , as well as a Jan 3, 2012 blog titled "looking for a part time job in west philadelphia pa?" It was also published in a Jan 9, 2012 blog titled "Personality Types and Blogging: How Personality May Affect Your Writing, as well as a Jan 12, 2012 blog titled "single mens in chicago, il? gonna moves there to start dating?" And it was published in a Feb 10, 2012 blog titled "Sleep Disorders News : 1800 – 2000 words regarding sleep disorders on insomnia. HUGE TASK ASSIGNMENT. HELP HELP!?

 

It was also published in a Feb 21, 2012 blog titled "If You Give a Gen-Y a Computer…" And it was published in a Mar 12, 2012 Fast Company blog titled "5 Tips To Retaining Star Gen Y Talent," at www-dot-fastcompany-dot-com/1823890/5-tips-to-retaining-star-gen-y-talent, as well as a Mar 20, 2012 blog titled "Le recrutement via les réseaux sociaux sera la tendance 2012 (étude Viadeo)." It was also published in an Apr 10, 2012 blog titled "The One Where I Turn Writer." And it was published in an Apr 14, 2012 blog titled "Are You Old Enough for Facebook?" It was also published in an Apr 27, 2012 blog titled "Nude Photo of Female Agoura High School Staffer Ends Up On Facebook." And it was published in a May 10, 2012 blog titled "Quiero ser Freelance ¿cómo empiezo?" It was also published in a May 17, 2012 blog titled "What Facebook Teaches Us About Time," as well as a May 30, 2012 blog titled "9 Studies That Show Women Rule Social Media." And it was published in a Jun 10, 2012 blog titled "Women's Studies Should Include High-Tech Mastery," as well as an undated (late Jun 2012) blog titled "La netiqueta."

 

In the final month of 2012, the photo was published in a blog titled "Does Twitter Improve Education?" And it was published in a Dec 6, 2012 blog titled "Single To SoulMate." It was also published in a Dec 7, 2012 blog titled "Do You Belong to an Online Community?" And it was published in a Dec 11, 2012 blog titled "漂流する彼女。 ," as well as a Dec 11, 2012 blog titled "Calling all Delaney cousins! It was also published in a Dec 12, 2012 blog titled "Status Changing Strain," as well as a Dec 12, 2012 blog titled "Sabies que… pots estudiar de franc a la Universitat de Harvard?", and also a Dec 12, 2012 blog titled "Buscar trabajo fuera de España como alternativa." And it was published in a Dec 24, 2012 blog titled "Las mujeres y nuestra arma demográfica." It was also published in a Dec 26, 2012 blog titled "Sabies que... pots estudiar de franc a la Universitat de Harvard?"

 

Moving into 2013, the photo was published in a Jan 10, 2013 blog titled "A List of IT Jobs Will Make Obsolete." And it was published in a Jan 25, 2013 Scientific American blog "How Much Control Will We Have Over Our Personal Data?" It was also published in a Jan 29, 2013 bog titled "Nice Best Laptop Photos." And it was published in a Feb 4, 2013 blog titled "Building a Consistent Blog Readership," as well as a Feb 28, 2013 blog titled "Why Wont He Make It “Facebook Official” – Daily Dilemma?" and a Mar 1, 2013 blog titled "Ligar por internet: ¿Una necesidad o una nueva moda?" It was also published in a Mar 8, 2013 blog titled "How to Earn a Side Income as a College Student." And it was published in a Mar 14, 2013 blog titled "The post-job interview assignment: troubling trend?" It was also published in an Apr 12, 2013 blog titled "Can Online Learning Replace Traditional Educations? Exploring the Future of Education in America." And it was published in a May 8, 2013 blog titled "Freelance Writing Jobs for May 8, 2013." And it was published in a Jul 22, 2013 blog titled "New Coursesmart Survey Shows Increased Digital Textbook Adoption, But Not Increased Sales."

 

Moving into 2014, the photo was published in a Jan 8, 2014 blog titled "How to Find a Job in 2014."

title from cyberbully mom club song, friends!

something i did for art honor society

Over my years in the Lego community, I have been the victim of multiple cyberbully attacks, often by the same people. I am often seen as an easy muse, an easy target, and someone who can be harassed, mocked, and more.

 

I am making this post to help shine light on this issue. This is not just something that happens to me. This happens to people in a multitude of different communities, even outside of Lego. These may seem like harmless pranks, but they carry with them severe ramifications for the victim's mental health. Because of these kinds of pranks, I have trust issues with those I used to value in this community. Cyberbullying can also lead to things like depression and other, darker things.

 

All I'm asking for is for you guys to spread the word, and help me help you and others from getting harassed online and used for the butt of people's jokes. I don't know if this will make a dramatic impact on the community, but it will be a step in the right direction.

 

Thank you

 

~Sarah

16.365

 

i remember when you used to lie through your teeth; you used to lie and say you were fine and i didn't know how to help you because you wouldn't help yourself

 

About an hour ago I wrote a piece for the local newspapers' Facebook page. There has been recent debate over renovations to our high school and the debate between adults has turned downright hostile. So I wrote on the page about how students are taught not to be "cyberbullies" and yet the ones who chastise them are the ones setting the poor examples by exchanging harsh and negative comments between each other over the internet. Mainly I wanted everyone to be respectful and to know that they're setting a bad example for 17 year olds like me.

 

That was like an hour ago and the post has blown up with positive attention (i.e. comments, likes, shares) and I feel like people might listen and start being more respectful toward each other. I'm really excited.

I took a stand in an incident. Supporting SL okiya against Cyber bullies and the result is now that same day she targeted my store to find someone to copy my designs.

Though by standing up I am now the Target I still stand and say NO TO CYBERBULLYING!!

Song-https://www.youtube.com/watch?v=SFGvmrJ5rjM

 

Just because someone looks happy doesn't mean they are because even a white rose has a black shadow. - c.m.h

 

I watched Cyberbully last night starring Maisie Williams and it definitely had an impact.

 

Email- clairewellerphotography@hotmail.com

 

Facebook page-https://www.facebook.com/pages/Claire-Weller-Photography/300843600087825?ref=hl

 

Instagram- clairewelleryt

Here is my group of characters for Ninjago Beyond.

 

When the bomb that destroyed all technology went off, one man was prepared. His true name was shrouded in mystery, but the locals called him Noodle Joe, as he was thought to be homeless and Randy who runs the supermarket swears he saw him slurping noodles out of a drainpipe once. Little did Randy know, he could now have been more wrong, for Noodle Joe was neither homeless nor slurping noodles out of that drainpipe (in fact, he was actually trying to see if his sneeze would come out the other side if he sneezed in one end). Noodle Joe was, however, Ninjago's local corn flake enthusiast and apocalypse conspiracy theorist. Noodle Joe had stockpiled away enough corn flakes to last him for years.

 

The old man with the metal hat, Master Betcha, was once the most feared bouncer in the land. Legend tells that he once ejected the a Sykovian Dragon from the Ninjago City brewery at which he was employed. However, on one fateful night, Master Betcha ejected an underage drinker from the premises, only to find out the next day that it was a young Steve Jobs. When Stevie sobered up the next day, Master Betcha paid dearly for this grave error. Steve used his influence to change Ninjago's law: it was now illegal for anyone OVER the age of 21 to be caught drinking (Steve paid for this decision a few years later. Also this law would become obsolete once the bomb went off.) Master Betcha, an uncontrollable drinker of water, lost his job, and was became a degenerate bum who hung out in alleyways and did unspeakable acts just to get a quick shot of water. He's been to jail like a ton and let me tell you, he's seen things that would make you paint your knickers yellow.

 

However, this is where Master Betcha's grandson, Hugh, comes in (the one with the flaming red hair). Master Betcha found himself in a familiar situation. Slumping against a dumpster in the worst neighborhood in Ninjago, he raised a Dasani water bottle to his lips, thinking "how did I end up here again?" His whole body shuddered as it trickled down his throat. He knew that he would just end up thirsty again later. This was no permanent fix. But he just couldn't help himself. He had tried everything. Rehab, photosynthesis, alcohol, but none of it matched the cool, refreshing feeling he got when he gulped down that blissful H2O. Suddenly, that mailman guy from the TV show came up to him.

"You Betcha?" he asked.

"You betcha." Master Betcha replied.

The mailman handed him a letter and walked off, not eager to be seen with such a unfashionable person. Master Betcha opened the letter and read it. Apparently, his grandson had anonymously cyberbullied his parents out of the house, and child services was asking Master Betcha to watch over the boy. Master Betcha got up, hopeful. If he could do right by this boy, then maybe, just maybe, he could do right by himself. Maybe this boy who happened to also be the world's greatest cyberbully, was his chance to redemption.

 

Master Betcha adopted Hugh. Hugh was able to cyberbully Steve Jobs into sending funds to an mysterious bank account belonging to a Mr U. Nderagedrinker. With the money, the Betchas had been able to buy a house on the outskirts of Ninjago City, next to a shack belonging to a crazy old man named Noodle Joe. Master Betcha began to train Hugh in the ancient art of the bouncer, called "Bounce-Ing" (pronounced like "Bounce_EEEEEEENGGG").

 

However, Master Betcha had foolishly trusted his grandson and invested all his money in Bitcoin. When the bomb went off, Master Betcha was left completely bankrupt and unable to feed either himself or Hugh. Noodle Joe, however, offered corn flakes in exchange for one thing: help in vanquishing his enemies. You see, Noodle Joe despised the people of Ninjago for naming him Noodle Joe. As a child, Noodle Joe's village was invaded by a man named George Eo, heir to the Eo noodle dynasty. Noodle Joe was forced to watch as George Eo personally choked out each of his family members with a piece of lo mein. Ever since, Noodle Joe has sought vengeance on George Eo, and wishes death upon all those who call him "Noodle Joe". Since that's everybody, Noodle Joe sees the world as his enemy, so the Betchas really have their work cut out for them. Not to mention, Hugh has kept up his cyberbullying through the mail, and sends Noodle Joe anonymous troll letters making bad jokes about noodles and telling him his quest folly.

 

What ensues is a heartfelt sitcom about the strenuous relationships forged by an obscene amount of cornflakes, an addiction to water, and the technology-free cyberbullies who lurk in the shadows of society (AKA regular bullies.) Thanks for reading all that and I hope you consider me!!!

Melania, what would you say to such a cyberbully?

This is a part of my AP Studio Art Concentration and the Concentration is Addictions.

 

Addiction: Internet

Model: Kera Lalli

 

About the Addiction:

Internet is a different kind of Addiction, there is all sorts of forms of Internet Addiction. This one shows the side effects of it. I wanted to go for the whole old school Myspace look, because that is what many people thought about other than using someone else. What i was portraying was the negative side, how the longer you use it the more exposed to things you get, and exposed you get which could lead to hurtful cyber bullying which i portrayed in the photo. As it may not be as bad as the others, but the deeper in to the internet the more you disconnect from reality and have the internet as your own reality.

 

***IF ANY QUESTIONS MESSAGE ME! (: I DON'T REPLY IN COMMENTS!***

 

There is more of this collection to come from now till April. (About 20)

Message me if you want to be kept up to date with the newest ones or more information and help)

Like the tan-line on my feet? Merp.. I went white water rafting in Tennessee recently.. and I got a horrible sunburn. So now I have white feet and tan legs. =/ Oh, and I've learned so much from Ell in one day of how to edit. GO LOOK AT HER PHOTOS!

 

Here I go wiff da tagging...

10 wishes:

1. A new iPod touch

2. A new book:)

3. Peace in this world

4. To finally learn how to do an aerial and a back hand-spring

5. To be a professional dancer

6. A rocket ship to Pigfarts...

7. A genie. So that I can have MORE WISHES!

8. To be GIMP savvy

9. To never change

10. To turn back time to the good times...

 

1.Your favourite song right now: Moonlight Sonata. Forever and always. (There's a story behind it)

2. The nicest text message you ever got: Probably something along the lines of 'I love you soo much'

3. Your favorite place in the WORLD: The STAGE<3

4. Your favourite foods: Noodles

5. Your favourite WORD: Comeuppance

-------

1. What's the last movie you watched? Cyberbully (such a depressing movie)

2. What's your favorite noise? The quiet kind

3. Do you like some kind of light on when you go to bed, or just darkness? THE DARK CLOAK OF NIGHT

4. What's the weirdest thing you've ever eaten? It was some kind of sea creature...

5. What's something you really want right now but don't need? A NEW IPOD TOUCH!!! (My other one was stolen.. -sniffles-

6. What's your hair look like right now? It's aight. Needs to be brushed, though.

7. Have you seen waldo? ..................................Who?

This is an edited version of a talk I presented a talk of at Trampoline 2 [0] in Melbourne [1], Saturday 24th of October, 2009 called "Hacking People, Hacking Bullies". [2],[3],[4],[5],[6].

 

The talk was divided into three parts: a) "Know your Enemy, Hacking humans"; b) "In the field: real life examples"; and c) "Hacking Bullies". In this, the first part of the talk I identifying bullies and their modes of attack. The second will possibly never be written up for public consumption but it illustrated how bullies operate using using personal anecdotes. The last part of the talk I have already written up. It explains how you might go about Hacking Bullies [7] using network science concepts.

 

Preamble

My name is Peter. I'm a programmer. One of those gen-X slackers you hear about. My second computer was an Apple 2e clone shipped from Singapore in parts and hand assembled.

 

I'll be as lo-tech as you can get and read from sheets of paper. My talk is on bullies and what happens when they discover computers. I'm not a psychologist, I'm a technologist with crap social skills. I'm interested in how bullies are adapting to computers and network, how to identify and neutralise them.

 

The idea I want to explore, "Is there a better way to identify and disrupt Cyberbullies?". To do this we first must understand bullies and the mechanics of bullying.

 

Introduction

The effects of bullying is enough of a problem for the United States Secret Service to carry out a threat assessment [8] to understand why so many school kids carried out "targeted violence" [9] in American schools? One of the findings: Bullying was identified as a major contributor in shootings in the United States secondary schools. [10] The number of reported bully attacks in lower level schools in Norway 1983 was 1 in 7. In the same country the number of reported attacks in lower schools in 2001, increased by 50%. And more worrying statistic, the number of students in the most serious forms, up 67%. [11]

 

Bullying has serious implications and it can be quantified. So what and who are these bullies?

 

Know your enemy

First some terminology. I want to use the word ATTACKER and TARGET to describe a "bully" and their "victim". I choose these words carefully to redefine the problem. People who are attacked, shouldn't be thought of as being helpless as the term "victim" implies. Neither, should bullies be described in favourable terms.

 

When I say ATTACKER, I want you to think "bully" and "looser". When I say TARGET I want you to think, "could this be me?".

 

What is bullying?

Bullying is any negative action that is intentional, systematic and repeated. The majority of bullying is by two to three ATTACKERs. [12] The TARGET is chosen for a number of reasons, but mostly because of some in-balance of social power. [13]

 

Recognition

The key to recognition, is realising an ATTACKER is someone who has a strong need for power and negative dominance. Recognition relies on understanding the psychology of the ATTACKER, not just their appearance. This makes recognition difficult.

 

Fighting style

When it comes to attacking men, women, girls and boys each have their own particular style. The simplest explanation I can think of is "Men attack like paratroopers. Women, special agents". Males are aggressive and physical. Why bother talking, when you push, shove, kick and punch your TARGET. As a rule, males tend to be regressive and overt. Males attack their TARGET directly just like Paratroopers. Violent, fast, no retreat, no prisoners.

 

"Men attack like paratroopers. Women, special agents"

 

Females are less physically able than males but can be just as aggressive and have a uniquely adapted fighting style. They excel at indirect attack. Indirect attacks are concealed and subtle, something males can't quite comprehend. This is why females are special agents. They can get in under your guard and deliver attacks just devastating as the male, undetected. Do not underestimate the arsenal female ATTACKER have at their disposal.

 

Males might take things from you, be physical, be overtly verbal, make threats and force you to do things. Female use of social exclusion, spreading rumours, lies and sophisticated use of language is relatively undetectable in comparison to crude methods used by Males. [14]

 

Hacking Humans

Why do ATTACKERS try to hack humans? How do they find their TARGET? Why do they engage an audience?

 

Weakness

How does an ATTACKER select a TARGET? It's not difficult. An ATTACKER will select a TARGET by identifying and exploiting weakness in certain individuals. An ATTACKER will try to ascertain if a person is more vulnerable than others using a wide variety of criteria. Is the person socially excluded? Are they introverted? Are they different? Some common ways to access weakness include: Gait, [15] blind spots [16] and asymmetry. [17]

 

An anatomy of an attack

When an attack occurs the ATTACKER and TARGET engage in a sort of choreographed dance. ATTACKER, TARGET, HENCHMEN and OUTSIDERs playing a defined but changeable role.

  

- SCAN The ATTACKER views the battlefield scanning for TARGETs. [18] Them things happen fast.

 

- SIGNAL The ATTACKER has signaled the TARGET. At this point if the battleground is public, onlookers are now involved.

 

- ATTACK The bully can now joined by HENCHMEN, followers of the bully who actively join in on the attack. The TARGET probably has no idea this is going to happen because of blind spots and will be stunned. Unable to respond. It's at this stage OUTSIDERs, people who happen to be in the battleground become involved.

 

- CHOOSING SIDES The ATTACKER needs OUTSIDERS to join in to re-inforce their social status. An OUTSIDER has multiple choices. They can support the ATTACKER and actively join in or remain passive. An OUTSIDER may choose not to get involved and watch. An OUTSIDER might choose to actively DEFEND or potentially DEFEND.

 

- OUTCOME The ATTACKER has bullied the TARGET. Depending on the circumstances HENCHMEN may have also joined in.

 

Intervention as a solution?

What about the OUTSIDERS? Why didn't they DEFEND? Why did some join the ATTACKERS side? The sad truth is most OUTSIDERs are of no help to the TARGET. [18]

 

Why don't OUTSIDERs choose to help a TARGET? The most common explanation is OUTSIDERs are fearful of loosing status or worry about getting hurt or can't decide and choose to remain passive. The ATTACKER asymmetrically takes control of a larger group even though OUTSIDERs potentially have numerical advantage. This is called the "Bystander Paradox". [19]

 

For the TARGET there is no easy way out of this situation. It is up to the OUTSIDERs to intervene. By taking a stand, OUTSIDERs have a chance to reduce or circumvent the cycle of bullying. How do you do this? Counter attack the ATTACKER. The single point of weakness an ATTACKER is lack of numerical force. If you can turn enough bystanders back onto the ATTACKER and HENCHMEN you may be able to blunt and reduce the ATTACK at the SIGNAL phase. [20]

 

What about the bullying on the Internet? Bullies have now discovered the Internet. Can you start Hacking Bullies. [21]

 

Reference

[0] Peter Renshaw, Trampoline 2, flickr, "My Trampoline 2 flickr set: Trampoline was an informal day of sharing ideas in Melbourne, Australia, Saturday 24th of October, 2009." [Accessed Friday, 16th October 2009]

http://www.flickr.com/photos/bootload/sets/72157622667018586/

 

[1] Peter Renshaw, Melbourne, Australia, flickr, "My Melbourne Flickr set showing images from around Melbourne CBD.", [Accessed Friday, 16th October 2009]

http://www.flickr.com/photos/bootload/sets/72157600195992630/

 

[2] Peter Renshaw, seldomlogical, "Hacking Bullies: 'is there a better way to identify and disrupt Cyber Bullies?'"., [Accessed Saturday, 13th March 2010]

http://seldomlogical.com/2010/03/13/hacking-bullies/

 

[3] At the time, I didn't mention the focus of the talk. I was thinking about what might happen when you try to replicate "social networks" on-line exclusively for women. This was unintentional and might have turned a few listeners off.

Wikipedia defines "social networks" as "... a physical description of how people organise themselves. The self organising nature of social networks appear to follow the rules of network science which allows the study of networks to be done using various mathematical techniques.", [Accessed Saturday, 13th March 2010]

http://en.wikipedia.org/wiki/Social_network

www.flickr.com/photos/bootload/4501255443/

[4] Looking at bullying from a specific gender viewpoint is interesting, because I suspect the more verbal culture women exhibit captured online can now more easily be analysed for signs of bullying. I tend to write about these ideas to look for new insights into problems. Bullying is a problem. I've experienced it first hand but not on-line. I see bullying on-line as an bigger problem. We are now in a period of time where "social software" is growing quickly and worth exploring further. See point [2].

 

[5] Paul Graham, paulgraham.com, "What you can't say: 'It seems to be a constant throughout history: In every period, people believed things that were just ridiculous, and believed them so strongly that you would have gotten in terrible trouble for saying otherwise.'", [Accessed Friday, 16th October 2009]

http://paulgraham.com/say.html

 

[6] Peter Renshaw, flickr, "2009AUG251053: SBS INSIGHT: girls, relationships & cattiness: Computers are powerful amplifiers, so small spats between individuals can become front page news. Tactics used by Women that might work face to face, have the potential to back-fire big time on the Internet. Anywhere computers come into the conversation, the resultant data can be stored, searched, retrieved and with the advent of social software this can now be done real time.", [Accessed Friday, 16th October 2009]

http://www.flickr.com/photos/bootload/3854522410/

 

[7] Peter Renshaw, seldomlogical, "Hacking Bullies: The idea, a simple hypothesis, 'Is there a better way to identify and disrupt Cyber Bullies?'", 13 March 2010, [Accessed Saturday, 13th March 2010]

seldomlogical.com/2010/03/13/hacking-bullies/

 

[8] Fein, R.A. Ph.D., Vossekuil, B., Pollack, W.S. Ph.D., Borum, R. Psy.D., Modzeleski W., Reddy M., Ph.D., "Threat Assessment in Schools: A guide to managing threatening situations and to create safe school climates", United States Secret Service & United States Department of Education, Washington, D.C., 2002. (pdf, 754Kb), [Accessed Friday, 16th October 2009]

http://www.secretservice.gov/ntac/ssi_guide.pdf

 

[9] Fein, R.A. Ph.D., Vossekuil, B., Pollack, W.S. Ph.D., Borum, R. Psy.D., Modzeleski W., Reddy M., Ph.D., "Threat Assessment in Schools: A guide to managing threatening situations and to create safe school climates: 'Targeted violence' any incident of violence where a known or knowable attacker selects a 1 particular target prior to their violent attack.", P 3., Ibid, [Accessed Friday, 16th October 2009]

 

[10] Fein, R.A. Ph.D., Vossekuil, B., Pollack, W.S. Ph.D., Borum, R. Psy.D., Modzeleski W., Reddy M., Ph.D., "Chapter III - Key findings of the safe school initiative's study of targeted school violence: '... Many attackers felt bullied, persecuted, or injured by others prior to the attack ...'", P17., Ibid, [Accessed Friday, 16th October 2009]

 

[11] olweus.org, FAQ, "Question: How Common Is Bullying?",

[Accessed Friday, 16th October 2009]

http://www.olweus.org/public/faqs.page#Answer_numberCbQ7

 

[12] Center for the Study and Prevention of Violence, colorado.edu "Olweus Bullying Prevention Program (BPP): 'In the context of school bullying, the victim is usually a single student, who is generally harassed by a group of two or three students, often with a "negative leader." A considerable proportion of the victims, 20-40 percent, report, however, that they are mainly bullied by a single student.'", [Accessed Saturday, 13th March 2010]

http://www.colorado.edu/cspv/blueprints/modelprograms/BPP.html

 

[13] Center for the Study and Prevention of Violence, colorado.edu "Olweus Bullying Prevention Program (BPP): Prevalence of Bullying" Ibid, [Accessed Saturday, 13th March 2010]

 

[14] This is a gross generalisation but for the purposes of the talk it worked. It is interesting to read what Olweus has found looking at this issue. This is some of what he had to say:

"... This shows that it is boys who are more likely to be the perpetrators of what Olweus calls "direct" bullying, that is, bullying which involves direct physical or verbal attacks. He has concluded that girls are more likely to use indirect, subtle, social means to harass other girls. He refers to behaviour such as social exclusion, manipulation of friendship relationships, spreading rumours, etc. ..." (Olweus, D. 1993, Bullying at School: What We Know and What We Can Do. Oxford UK: Blackwell Publishers.)

 

Sudermann, Jaffe, Schieck, Watson, Lehmann, Greer "A School-based Anti-Violence Program", 1996, [Accessed Friday April 2, 2010]

http://www.lfcc.on.ca/bully.htm

 

[15] The study of Psychopaths has revealed interesting insights into possible ways TARGETS can be exploited for weakness by ATTACKERS. Weakness comes in many forms. One in particular is gait or the way people move. This helps explain how Bullies can scan for TARGETS so easily.

"Psychopaths target anything weak. They assess voice,

gait, circumstances, height, weight, etc. Yes fam with

gait studies"

 

Joe Navarro/@navarrotells, [Accessed Wednesday, 7th April 2010]

http://twitter.com/navarrotells/status/11069087171

 

Interested in spotting Psychopathic behaviour? Here are some further references:

 

a) Joe Navarro, "How to Spot a Psychopath", (Kindle Edition only), ASIN: B002TX70G8

[Accessed Wednesday, 7th April 2010]

www.amazon.com/How-Spot-Psychopath-ebook/dp/B002TX70G8/re...

b) Ian Walker, Fibro Majestic Film, "I, Psychopath: A 1hr documentary available on DVD who documents scientific testing 'Sam Vaknin' to see if he is in fact a Psychopath.", ASIN: B002W6ZI1Q, 2009. [Accessed Wednesday, 7th April 2010]

http://www.magicreal.com.au/filmandtv.php?film=4

www.amazon.com/I-Psychopath-Ian-Walker/dp/B002W6ZI1Q/ref=...

  

[16] The ATTACKER simply exploits a vulnerability in how individuals view themselves. We may be able to understand how others view some of our personality traits, but not all of them.

 

[17] ATTACKERS will exploit a TARGETs disparity in size, strength or social status. ATTACKERS use superior force and peer pressure.

 

[18] Read through reference [15] to understand how ATTACKERS achieve this.

 

[19] Bystander paradox How can the TARGET decide what the roles OUTSIDERs choose? Are OUTSIDERs supporting the ATTACKER?, helping the TARGET?, or remaining neutral? The TARGET cannot tell. If you fight back and take on an ATTACKER and OUTSIDER can you justify both? This is the bystander paradox - the ability to justify the response when attacked. The ATTACKER has no such problem.

 

[20] Larry Abramson, NPR (National Public Radio), "Hit Back At Bullies? Not At This School", "That's why the Olweus Bullying Prevention Program tries to turn anti-bullying efforts into part of the school culture, rather than just the topic of an occasional assembly. The concepts are simple: Don't bully, help those who are being bullied and tell an adult what's going on. Pearre tries to reinforce the idea that the bully doesn't act alone. The community can take away the bully's power by refusing to cheer him on, by telling an adult, or perhaps the ultimate step: stepping in to help the victim."

 

http://www.npr.org/templates/story/story.php?storyId=125137071

 

[21] Peter Renshaw, seldomlogical, "Hacking Bullies: 'is there a better way to identify and disrupt Cyber Bullies?'"., Ibid. [Accessed Saturday, 13th March 2010]

 

next >>>

Belinda 2011, belinda y su novio, Belinda camaleones, Belinda y Giovanni, Belinda antes y después, Belinda opera, Belinda Fotos comprometedoras de Belinda con empresario dominicano Saymon Diaz,

Nuevas Fotos de Belinda y Saymon Díaz, Nuevas Fotos de Belinda y Saymon Díaz – Conconada,

Misterio entre Saymon Díaz y Belinda ¿Quién filtró las fotos, Fuertes imágenes del empresario Saymon Díaz junto a la cantante Belinda salen al Internet (mira esto), Fotos eróticas de Belinda y Saymon Díaz, Saymon Díaz prepara su explicación de las fotos hot con Belinda, Mira todas las fotos de Belinda junto a Saymon Diaz desnudos, Publican fotos de Belinda en sexy lencería, Se filtran fotografias sensuales de Belinda, Belinda Peregrin Scholl, cantante, beli Belinda, jczr, confidente web, topless, porno sex, muere juan ramón saenz creador de la mano peluda, Belinda hacer cyberbullying a Belinda, twitter Belinda pop, @belindapop, belindapop, Belinda vs giovanni, Belinda sexo en limosina, Carpe diem, egoista, muere abel membrillo voz de otro rollo e iniciativa mexico, lady gaga, press, megan fox, trailer de piratas del caribe, trailer de x-men firs class, xmen primera generación, BELINDA HACE CYBERBULLYING - Univision Foro / Forum,

@Belindapop realiza ciberbullying, elinda hace Cyberbullying a otra Belinda, La cantante Belinda propicia el CiberBullying,

 

Belinda biografía, Belinda cantante en escandalos, belinda contra vs tvnotas, tvynovelas. belinda 2011, belinda y su novio, belinda camaleones, belinda y giovanni, belinda antes y despues, belinda opera, fotos eróticas y prohibidas con saymon diaz, tv azteca, imágenes tvynovelas Belinda xxx.

 

Belinda peregrin Scholl, beli, video erotico, cyberbullying, saymon diaz, empresario, twitter, dopamina, Carpe diem, facebook, muere juan ramon saenz, muere abel membrillo, otro rollo, iniciativa mexico, chicharito, lady gaga

 

La cantante duda que el empresario con el que aparece en las imágenes, las haya sacado a la luz. Tras las fotografías que publicó TV Notas en donde se ve a la cantante Belinda, Nuevas Fotos de Belinda y Saymon Díaz. By Raymond. La cantante Belinda nuevamente se encuentra en el ojo del huracán luego que la revista TV Notas publicó.

 

Por: jczr

PRCE

   

This is an edited talk I presented at Trampoline 2 [0] in Melbourne [1], Australia, Saturday 24th of October, 2009 entitled: "Hacking People, Hacking Bullies".

 

Several months later

It has now been several months since I presented the talk at Trampoline. The idea, a simple hypothesis, "is there a better way to identify and disrupt Cyber Bullies?".

 

I know for example the current best detection and prevention systems we have, the Olweus Bullying Prevention Program (OBPP) [2] by Dan Olweus [3], manually identify bullies by peer association in their social networks. [4] Could this technique be extended to on-line social networks? I wanted to explore the idea of using network science techniques using maths and computers to identify hidden bully clusters in social networks.

 

The talk was divided into three parts: a) "Know your Enemy, Hacking humans"; b) "In the field: real life examples" and c) "Hacking Bullies". [5] I tend to write about these ideas to look for new insights into problems I see. [6] Bullying is a problem. I've experienced it first hand. It is the prime motivation for exploring these ideas. Bullying on-line is an even bigger problem and in an age of "social software" worth exploring further.

 

Preamble

My name is Peter. I'm a programmer. One of those gen-X slackers you hear about. My second computer was an Apple 2e clone shipped from Singapore in parts and hand assembled.

 

I'll be as lo-tech as you can get and read from sheets of paper. Occasionally I'll digress from the script. I tried to Kevin Bacon to stand in but he was busy and suggested Derek Zoolander and as soon as I mentioned to Derek there would be lots of big words and no cat-walk - Derek bailed, so you're stuck with me.

 

My talk is on bullies and what happens when they discover computers. If you want to use twitter and hash tags try #hackbully [7] I'll probably read the comments later. I'm not a psychologist, I'm a technologist with crap social skills. I'm interested in how bullies are adapting to computers and network, how to identify and neutralise them.

 

Hacking Bullies

The Internet is a big network. Bullies now have a much bigger playground and audience to choose from. So lets look at some real world examples. Some people collect stamps, others prefer spore, moulds and fungus mine is on-line behaviour.

 

Here's a few examples of cyber-bullying I've found. Gretel was on live national television and Will Anderson (ATTACKER) decided that Gretel Kileen was good TARGET and posted live insults on twitter taunting OUTSIDERS to join in on the fun. Gordon Ramsey, a known ATTACKER gets lots of attention these day when OUTSIDERs look for images of "fat Gordon Ramsey", for fun. Is this a case of OUTSIDERs fighting back? Erin Andrews, a news sports reporter in the US was ATTACKED by having video footage of her walking around after coming out of a shower posted on Youtube. Then had trouble convincing police she was TARGET.

 

Bullies have discovered computers and networks. Even Mika uses the power of song writing to asymmetrically attack bullies from his childhood. I think it's time to use our powers for good. What can we do?

 

Network science 101

Now we are almost up to the fun bit, where we use out knowledge of network science to hack bullies. But first a short diversion into Network science theory. Understanding networks allows us to understand markets, societies, species, corporations. Networks can be biological man made or social.

 

If we understand the rules of networks it give us the theory to create tools to hack bullies. There are four ideas that make hacking bullies possible: Small world networks, hubs, how information spreads and mapping networks.

 

1) Small world networks

Steven Strogatz and Duncan Watts are both mathematicians who succeeded in understanding the properties and structures of small worlds. Strogatz/Watts started asking basic questions about connections and relatedness of nodes in networks and realised understanding the "relatedness" of nodes and how each node is connected to another node is an important problem.

 

Strogatz/Watts, first tested their ideas on a network model of Hollywood actors and their relationship to "Kevin Bacon". They had a theory but no confirmation. The problem to solve? If an actor plays a part in a film, what is the chain of actors to reach Kevin Bacon. How many links is there in the chain? Lets try an example. How is Derek Zoolander (Ben Stiller) related to Kevin Bacon?

 

"Ben Stiller" was in "Tenacious D in the Pick of Destiny" (2006) with "John C. Reilly" who was in "The Wild River" (1994) with "Kevin Bacon"

 

Strogatz/Watts discovered two structural properties of what we now call "small world systems". The first, there are relatively few related nodes in a small world. The second, small world systems tend to cluster together closely. The cluster close enough to find another node in a distant small world via minimal hops.

 

2) Hubs

Albert-Laszlo Barabasi looked over the results of Watts/Strogartz data and made an interesting discovery, networks are not connected randomly. Barabasi found the mechanism that lets small world link together. The idea he observed is that some nodes in a network have many more links to them than other nodes. We call these super nodes, hubs. The two most important insights Barabasi has made: a) Networks are robust. If individual nodes are knocked out, the network survives. b) The hub is the weak spot. Knock a hub out, the network is severely interrupted.

 

3) Spread of information

Alessandro Vespignani is a physicist who specialised in understanding how disease spreads in biological systems. By reading Barabasi work on networks, Vespignani observed transmission of disease in a network is not random. Diseases moves quickly and spreads far via hubs. Conclusions: Small changes in the network have an effect on the whole system because the network is inter-related. But a virus, disease or information will not be eradicated in a network unless you take into account hubs. Understanding Hubs is the key.

 

4) Marc Vidal and genetic maps

 

Marc Vidal is a geneticist interested in looking at the inter-connectedness of cells. After reading the research by Barabasi decided to look at disease as a network. Instead of looking at the connected cells one by one Barabasi suggested to Vidal to look at the connections of disease and genes to create a map. A map of related diseases and genes. This idea is significant. It means you can now see how diseases are related. An idea made possible because it was redefined as a network science problem.

 

Now we come to our ultimate aim. Can we hack bullies who inhabit our electronic networks? Can we use network science for example in the same way terrorist cells are identified and disrupted?

 

Predicting behaviour

Could we use network science to predict where bullies might be operating? If so, how might we go about this? Lets think about what we know about bullies.

 

- bullies inhabit small world social networks online and offline

 

- bullies have identifiable negative behavioural characteristics

 

- bullies attract followers who attack,defend or remain neutral

 

- bullies exhibit hub like behaviour

 

- bullies have victims

 

What would happen if on a social network service we looked at reported behaviour and people at the same time. Just like Marc Vidal and genetic maps. What if we mapped the behaviour of social networks to look for related behaviour and hubs? What we would be looking for is the hubs of bad behaviour. Could we identify bullies by their associations to HENCHMEN, OUTSIDERs who observe an ATTACK? We know from Barabasi that if we ignore the hubs the problem remains.

 

A network of bad behaviour is stable because the hub remains intact. Can we knock out hubs and interrupt bad behaviour? There is nothing to stop any of the big social software site doing this. We now have enough theory to create the tools to disrupt bullies in networks. We know from Vespignani that small changes in the network make a difference and that if we redefine the problem and think of bullying and bad behaviour as a network science problem, we can tackle it successfully with maths instead of ignoring it.

 

Reference

[0] Trampoline 2, "my images of Trampoline 2 taken on the day on flickr"

www.flickr.com/photos/bootload/collections/72157622546767...

 

[1] Melbourne, "my flickr set of Melbourne"

www.flickr.com/photos/bootload/sets/72157608350016296/

 

[2] olweus.org, "Olweus Bullying Prevention Program"

www.olweus.org/public/bullying_prevention_program.page?me...

 

[3] Dan Olweus, "History of Dan Olweus"

www.clemson.edu/olweus/history.htm

 

[4] Olweus Bullying Prevention Program, "The Olweus Bullying Prevention Program Overview: (Research_OBPP_Effective.pdf) Black, S. A., & Jackson, E. (2007). Using bullying incident density to evaluate the Olweus Bullying Prevention Programme. School Psychology International, 28, 623-638."

www.olweus.org/public/document/obpp_effective_research

 

[5] Paul Graham, "What you can't say"

paulgraham.com/say.html

 

[6] seldomlogical.com, "Don't read this: Don't think I write for anything, other than for my own selfish reasons. So stop reading, right now. Stop!"

seldomlogical.com/2009/08/27/don-t-read-this

 

[7] #hackbully, "a twitter hashtag for responses on the talk. I was interested to see what kinds of responses I would get on the back channel"

twitter.com/#search?q=#hackbully

 

Credit: Thanks to Trace and the attendees at Trampoline 2 for corrections and listening.

 

next >>>

This was an entry for a contest on Brickfish .com.

The contest was to create an anti-bullying poster. I ranked 32 out of 532 entries, but alas, I did not win the contest :(

  

I've noticed this poster getting alot of views from image search sites(google, yahoo, etc.), and I have no problem with people using it in presentations or projects, I'm just curious about what it's being used for :)

This person pretended to be my friend but was helping the cyber bully!

We should #endcyberbullyng

Song- www.youtube.com/watch?v=DF0zefuJ4Ys

 

Your words have powers. Use them wisely.

 

Another photo inspired by Cyberbully, this was actually the original idea I had after watching the film :)

 

Email- clairewellerphotography@hotmail.com

 

Facebook page-https://www.facebook.com/pages/Claire-Weller-Photography/300843600087825?ref=hl

 

Instagram- clairewelleryt

  

I exposed a poser for a Disney star that is a friend. This person attacked me, cussed and made a video saying he would shoot me! not cool!

Selling prints and bracelets.

Another from the pantherettes. This is Kim. :]

You can view all the photos here. :]

 

I was tagged so here it goes.

 

1. I am addicted to the song "Breathe" by Sia at the moment.

2. We watched Cyberbully in my Multimedia class the other day. Emily Osment did an amazing job, and it was a touching story. Although, like all high school movies, it was over dramatized, but it did it's part in making me cry in the MIDDLE of class

3. Relationship problems are always great. I don't even know what I'm doing with my love life.

4. I think about giving up on photography sometimes, and I almost just sold me camera. Really glad I didn't because now I have 2 shoots I really want to do. I have a lot of shoots that I want to do, but I have to wait for money to do them.

5. I honestly have no idea what I want to do with my life anymore.

6. I just want to give a huge thanks to Miss Anna for supporting me. She's a great listener, and I can't tell you how much I appreciate it. <3 Her photos are amazing, check them out!

7. I'm trying to figure out how to get my camera in the rain without it getting wet, and actually capture the rain. Because everytime I try, it never looks like it's raining.

8. It's be a horribly rainy labor day weekend.

9. I really hate homework, and it just keeps piling up.

10. I really hate it when people talk to you one day, and the next act like they hate you.

11. I am officially addicted to The Sims Social on Facebook.... oops.

  

Message me on flickr for the prints. If you want one from comments, just let me know which one.

facebook page

tumblr

 

I also really wanna do some print exchanges, so please, feel free to do so with me!

How Flickr decided to use this layout:

 

Braniac scoured the galaxy searching for information and knowledge. He soon found his greatest weapon: The Internet. He wanted to control the internet, and so, he downloaded everything from it, and created his greatest piece of destructive technology, the Troll! The Troll caused people to rage and stop using the internet. But the web users soon created a way to block the troll, and Braniac was back to square one. HE then created the cyberbully, who aimed to rid the internet of all the inhabitants by creating sadness and depression. It then gave the cyberbully the best weapon to eliminate females, the Nude. These cyberbully's had great effect on the insecure, but soon, the citizens started to copy these cyberbullys, and they were out of hand, and could only effect the lowly. So, Braniac went back to the Troll, reprogramming it to evade deletion. This had a greater effect on the world, and Braniac decided to revisit the cyberbully program to see what it could do. It also created the scammer variation to have more effects on men, making them think the man was talking to a hot girl with gargantuan boobs, while it being just a computer program. It would then reveal its self, and cause despair and depression in the men. But, by now, the troll had mutated. It had come to the point where it couldn't be deleted, even by Braniac. It became so persistent, that it was unstoppable. It even became obsessed with Marvel. It came to the center of the internet, Flickr. It's account was Extremis Genius. It wrecked havoc across the land. It forced man to create a way to delete it. But it came back. And back. And back. And now, it was Iron Legion. Braniac was so disgusted with the destruction of knowledge that the Supertroll brought, that it had to be stopped. Braniac reached out to the Flickr team, and, to destroy Iron Legion, creates the worst layout in the history of the internet. It hopes to force Iron Legion to leave the internet, and save the center of the internet, and all the knowledge of the DC story groups that have been created. By God, I hope it works so that we can move on past this layout and go back to a useable interface.

 

He made a video saying he's shoot her and deleted it when he saw we called the police

Alexi's mom

Belinda 2011, belinda y su novio, Belinda camaleones, Belinda y Giovanni, Belinda antes y después, Belinda opera, Belinda Fotos comprometedoras de Belinda con empresario dominicano Saymon Diaz,

Nuevas Fotos de Belinda y Saymon Díaz, Nuevas Fotos de Belinda y Saymon Díaz – Conconada,

Misterio entre Saymon Díaz y Belinda ¿Quién filtró las fotos, Fuertes imágenes del empresario Saymon Díaz junto a la cantante Belinda salen al Internet (mira esto), Fotos eróticas de Belinda y Saymon Díaz, Saymon Díaz prepara su explicación de las fotos hot con Belinda, Mira todas las fotos de Belinda junto a Saymon Diaz desnudos, Publican fotos de Belinda en sexy lencería, Se filtran fotografias sensuales de Belinda, Belinda Peregrin Scholl, cantante, beli Belinda, jczr, confidente web, topless, porno sex, muere juan ramón saenz creador de la mano peluda, Belinda hacer cyberbullying a Belinda, twitter Belinda pop, @belindapop, belindapop, Belinda vs giovanni, Belinda sexo en limosina, Carpe diem, egoista, muere abel membrillo voz de otro rollo e iniciativa mexico, lady gaga, press, megan fox, trailer de piratas del caribe, trailer de x-men firs class, xmen primera generación, BELINDA HACE CYBERBULLYING - Univision Foro / Forum,

@Belindapop realiza ciberbullying, elinda hace Cyberbullying a otra Belinda, La cantante Belinda propicia el CiberBullying,

 

Belinda biografía, Belinda cantante en escandalos, belinda contra vs tvnotas, tvynovelas. belinda 2011, belinda y su novio, belinda camaleones, belinda y giovanni, belinda antes y despues, belinda opera, fotos eróticas y prohibidas con saymon diaz, tv azteca, imágenes tvynovelas Belinda xxx.

 

Belinda peregrin Scholl, beli, video erotico, cyberbullying, saymon diaz, empresario, twitter, dopamina, Carpe diem, facebook, muere juan ramon saenz, muere abel membrillo, otro rollo, iniciativa mexico, chicharito, lady gaga

 

La cantante duda que el empresario con el que aparece en las imágenes, las haya sacado a la luz. Tras las fotografías que publicó TV Notas en donde se ve a la cantante Belinda, Nuevas Fotos de Belinda y Saymon Díaz. By Raymond. La cantante Belinda nuevamente se encuentra en el ojo del huracán luego que la revista TV Notas publicó.

 

Por: jczr

PRCE

 

Abbi with Emily Osment !

 

Wiki.

 

Emily Jordan Osment (born March 10, 1992) is an American actress, and singer-songwriter born in Los Angeles, California. After working in several television films in her childhood, she gained fame for co-starring as the character Gerti Giggles in Spy Kids 2: Island of Lost Dreams and Spy Kids 3-D: Game Over.

 

She went on to co-star alongside Miley Cyrus in the Emmy Award-nominated Disney Channel sitcom Hannah Montana as Lilly Truscott as well as the series movie, Hannah Montana: The Movie.

 

She also starred as Cassie in R. L. Stine's: The Haunting Hour Volume One: Don't Think About It and the Disney Channel Original Movie, Dadnapped as Melissa Morris. She most recently starred in the 2011 ABC Family Original Movie, Cyberbully, the 2013 TV series Cleaners, produced for the online service Crackle and the 2014 Lifetime movie A Daughter's Nightmare. She currently stars in the ABC Family television series Young & Hungry (2014) as Gabi Diamond.

 

Osment expanded her repertoire into pop music and more recently alternative/indie rock where she has recorded teen pop hits like "I Don't Think About It", "If I Didn't Have You" alongside her Hannah Montana co-star Mitchel Musso, and most recently "Once Upon a Dream".

Postcard art: Barbara Kruger. Art History Archive entry:

 

www.arthistoryarchive.com/arthistory/feminist/Barbara-Kru...

 

He has committed one crime thus far; mail fraud. Through this latest communication he may have committed a second one.

 

If I know you personally and you want to see his latest writings on the flip side of the card, please message me.

 

My initial response: www.flickr.com/photos/joebehr/16079931136/

 

History/Context

 

Anonymous hate mail started about seven years ago. To get a professional viewpoint on the guy I've shared the mailings - and before them, the anonymous comments left on my Livejournal - with my therapist. Her perspective and advice were both helpful.

 

The trigger for his obsession is a mystery. His narrative - his words, and the items he's mailed - point to a hate of my life as an out gay man; attempts to make me question my masculinity, an assumption that I fear getting older, a mocking of my interests and hobbies.

 

What's really weird is the juvenile, off-base context of his material. It's like a clever 10-year-old brat wants to hurt me. My therapist thinks he may be on the autism spectrum. His anger has a cast both airless and hysterical, like hate is the only emotion he can access.

 

As much as anything I am sad for him.

#Cyberbullying #ChildSafety PSA Image – Edu. Online Assailant #Cybercriminal Psychology Concept Web Page and Free PDF Paper Download by Michael Nuccitelli, Psy.D. #iPredator NYC #BeBest - SSL Safe Link: www.ipredator.co/ipredator/

Belinda 2011, belinda y su novio, Belinda camaleones, Belinda y Giovanni, Belinda antes y después, Belinda opera, Belinda Fotos comprometedoras de Belinda con empresario dominicano Saymon Diaz,

Nuevas Fotos de Belinda y Saymon Díaz, Nuevas Fotos de Belinda y Saymon Díaz – Conconada,

Misterio entre Saymon Díaz y Belinda ¿Quién filtró las fotos, Fuertes imágenes del empresario Saymon Díaz junto a la cantante Belinda salen al Internet (mira esto), Fotos eróticas de Belinda y Saymon Díaz, Saymon Díaz prepara su explicación de las fotos hot con Belinda, Mira todas las fotos de Belinda junto a Saymon Diaz desnudos, Publican fotos de Belinda en sexy lencería, Se filtran fotografias sensuales de Belinda, Belinda Peregrin Scholl, cantante, beli Belinda, jczr, confidente web, topless, porno sex, muere juan ramón saenz creador de la mano peluda, Belinda hacer cyberbullying a Belinda, twitter Belinda pop, @belindapop, belindapop, Belinda vs giovanni, Belinda sexo en limosina, Carpe diem, egoista, muere abel membrillo voz de otro rollo e iniciativa mexico, lady gaga, press, megan fox, trailer de piratas del caribe, trailer de x-men firs class, xmen primera generación, BELINDA HACE CYBERBULLYING - Univision Foro / Forum,

@Belindapop realiza ciberbullying, elinda hace Cyberbullying a otra Belinda, La cantante Belinda propicia el CiberBullying,

 

Belinda biografía, Belinda cantante en escandalos, belinda contra vs tvnotas, tvynovelas. belinda 2011, belinda y su novio, belinda camaleones, belinda y giovanni, belinda antes y despues, belinda opera, fotos eróticas y prohibidas con saymon diaz, tv azteca, imágenes tvynovelas Belinda xxx.

 

Belinda peregrin Scholl, beli, video erotico, cyberbullying, saymon diaz, empresario, twitter, dopamina, Carpe diem, facebook, muere juan ramon saenz, muere abel membrillo, otro rollo, iniciativa mexico, chicharito, lady gaga

 

La cantante duda que el empresario con el que aparece en las imágenes, las haya sacado a la luz. Tras las fotografías que publicó TV Notas en donde se ve a la cantante Belinda, Nuevas Fotos de Belinda y Saymon Díaz. By Raymond. La cantante Belinda nuevamente se encuentra en el ojo del huracán luego que la revista TV Notas publicó.

 

Por: jczr

PRCE

   

Belinda 2011, belinda y su novio, Belinda camaleones, Belinda y Giovanni, Belinda antes y después, Belinda opera, Belinda Fotos comprometedoras de Belinda con empresario dominicano Saymon Diaz,

Nuevas Fotos de Belinda y Saymon Díaz, Nuevas Fotos de Belinda y Saymon Díaz – Conconada,

Misterio entre Saymon Díaz y Belinda ¿Quién filtró las fotos, Fuertes imágenes del empresario Saymon Díaz junto a la cantante Belinda salen al Internet (mira esto), Fotos eróticas de Belinda y Saymon Díaz, Saymon Díaz prepara su explicación de las fotos hot con Belinda, Mira todas las fotos de Belinda junto a Saymon Diaz desnudos, Publican fotos de Belinda en sexy lencería, Se filtran fotografias sensuales de Belinda, Belinda Peregrin Scholl, cantante, beli Belinda, jczr, confidente web, topless, porno sex, muere juan ramón saenz creador de la mano peluda, Belinda hacer cyberbullying a Belinda, twitter Belinda pop, @belindapop, belindapop, Belinda vs giovanni, Belinda sexo en limosina, Carpe diem, egoista, muere abel membrillo voz de otro rollo e iniciativa mexico, lady gaga, press, megan fox, trailer de piratas del caribe, trailer de x-men firs class, xmen primera generación, BELINDA HACE CYBERBULLYING - Univision Foro / Forum,

@Belindapop realiza ciberbullying, elinda hace Cyberbullying a otra Belinda, La cantante Belinda propicia el CiberBullying,

 

Belinda biografía, Belinda cantante en escandalos, belinda contra vs tvnotas, tvynovelas. belinda 2011, belinda y su novio, belinda camaleones, belinda y giovanni, belinda antes y despues, belinda opera, fotos eróticas y prohibidas con saymon diaz, tv azteca, imágenes tvynovelas Belinda xxx.

 

Belinda peregrin Scholl, beli, video erotico, cyberbullying, saymon diaz, empresario, twitter, dopamina, Carpe diem, facebook, muere juan ramon saenz, muere abel membrillo, otro rollo, iniciativa mexico, chicharito, lady gaga

 

La cantante duda que el empresario con el que aparece en las imágenes, las haya sacado a la luz. Tras las fotografías que publicó TV Notas en donde se ve a la cantante Belinda, Nuevas Fotos de Belinda y Saymon Díaz. By Raymond. La cantante Belinda nuevamente se encuentra en el ojo del huracán luego que la revista TV Notas publicó.

 

Por: jczr

PRCE

 

Belinda 2011, belinda y su novio, Belinda camaleones, Belinda y Giovanni, Belinda antes y después, Belinda opera, Belinda Fotos comprometedoras de Belinda con empresario dominicano Saymon Diaz,

Nuevas Fotos de Belinda y Saymon Díaz, Nuevas Fotos de Belinda y Saymon Díaz – Conconada,

Misterio entre Saymon Díaz y Belinda ¿Quién filtró las fotos, Fuertes imágenes del empresario Saymon Díaz junto a la cantante Belinda salen al Internet (mira esto), Fotos eróticas de Belinda y Saymon Díaz, Saymon Díaz prepara su explicación de las fotos hot con Belinda, Mira todas las fotos de Belinda junto a Saymon Diaz desnudos, Publican fotos de Belinda en sexy lencería, Se filtran fotografias sensuales de Belinda, Belinda Peregrin Scholl, cantante, beli Belinda, jczr, confidente web, topless, porno sex, muere juan ramón saenz creador de la mano peluda, Belinda hacer cyberbullying a Belinda, twitter Belinda pop, @belindapop, belindapop, Belinda vs giovanni, Belinda sexo en limosina, Carpe diem, egoista, muere abel membrillo voz de otro rollo e iniciativa mexico, lady gaga, press, megan fox, trailer de piratas del caribe, trailer de x-men firs class, xmen primera generación, BELINDA HACE CYBERBULLYING - Univision Foro / Forum,

@Belindapop realiza ciberbullying, elinda hace Cyberbullying a otra Belinda, La cantante Belinda propicia el CiberBullying,

 

Belinda biografía, Belinda cantante en escandalos, belinda contra vs tvnotas, tvynovelas. belinda 2011, belinda y su novio, belinda camaleones, belinda y giovanni, belinda antes y despues, belinda opera, fotos eróticas y prohibidas con saymon diaz, tv azteca, imágenes tvynovelas Belinda xxx.

 

Belinda peregrin Scholl, beli, video erotico, cyberbullying, saymon diaz, empresario, twitter, dopamina, Carpe diem, facebook, muere juan ramon saenz, muere abel membrillo, otro rollo, iniciativa mexico, chicharito, lady gaga

 

La cantante duda que el empresario con el que aparece en las imágenes, las haya sacado a la luz. Tras las fotografías que publicó TV Notas en donde se ve a la cantante Belinda, Nuevas Fotos de Belinda y Saymon Díaz. By Raymond. La cantante Belinda nuevamente se encuentra en el ojo del huracán luego que la revista TV Notas publicó.

 

Por: jczr

PRCE

  

The recent "skanks" blogger case created new boundaries for cyberstalking and internet defamation which the landmark "Google bomb" case in 2006 helped to define. In the Google bomb case, the court awarded Sue Scheff a record $11.3 million judgment after statements were posted attacking her character and business practices on public inernet forums and websites. Scheff's book, co-authored by Internet law specialist John W. Dozier, Jr., chronicles this landmark case and legal aspects of cyber abuse - "Google Bomb, The Untold Story of the $11.3M Verdict That Canged the Way We Use the Internet."

Image shot for a story on cyber bullies

1 3 4 5 6 7 ••• 13 14