Cyberbullying is the latest, most advanced, and potentially one of the most dangerous forms of bullying. This form of bullying involves using electronic communication to bully a person. Today, nearly everyone has access to a cell phone or computer, which makes it easier for cyberbullies to target their victims. It is the only form of bullying that can follow the victim anywhere, affecting them both online and offline simultaneously. What sets this type of bullying apart from all the other forms of bullying is the bully’s ability to remain hidden behind a screen or device, making it harder for retaliation. Furthermore, it is more challenging for the person being bullied, law enforcement, and authorities to trace and stop the bully, as the instigator can target the victim across multiple online and offline spaces with an unknown identity. Therefore, cyberbullying has emerged as one of the most severe forms of verbal and nonverbal bullying.
The 5 Basic Forms of Cyberbullying
1. Direct Electronic Bullying
This form of bullying looks a lot like in-person verbal bullying but is done through an electronic avenue. It is where the bully expresses hurtful, vulgar, offensive, or threatening language with the intention to hurt the person receiving the messages through email, text messages, or messenger apps. Most of the time, the bully’s identity is known in this form, while other times, it is not. An example is a female middle schooler texting another female peer: “Maddie, WYA? Girl, look in the mirror. WECTS?” The intention of this bullying is to offend, tear down, and make the target feel “less than” or “lower than” the one sending the message in order for the other child to feel powerful. An adult form of this is this text: “Wendy, did you watch your interview air on the Today Show? Girl, what were you thinking? Why even bother again?”
Photo Credit:Unsplash/Jae Park
2. Impersonation through Text Messages
Someone impersonates another person by sending text messages saying they are from the victim. These messages contain false gossip, secretive information, embarrassing information about the victim or someone else, or information that makes authorities think the victim is bullying someone else even though it was another person writing the message. For example, a man sends a text to a boy saying, “Hey, Caleb, this is Anna. Man, that shirt you wore today "fire emoji." Let’s meet up for drinks today at _______.” It looks like the text was from Anna, but really, Noah sent it to Caleb, pretending to be Anna. Anna has no idea about this text, and Caleb shows up at the place Anna had told her friends she was going to be with confidence, thinking Anna really likes him. Noah sent this to Caleb as he knows Caleb likes Anna, and he wanted to embarrass and hurt him because he stole his spot on the football team.
A severe form of this is a child pretending to be someone else and threatening to do something dangerous. For example, Daniel is angry at Josh for something he did earlier that day. He grabs Josh’s cell phone off the bench at soccer practice and sends a text to a mutual friend saying, “Man, I hate Principal ____. I can’t take it anymore. I am going to bring a gun to school tomorrow. Are you with me?” Daniel knows the text sounds like Josh and will cause the peer to panic because she is a rule follower. She tells her parents or an authority, and the school authorities call Josh and his parents in for questioning. This makes Josh look really bad to his peers and the school staff, could get him expelled, suspended, or even kicked off the soccer team, and hurts him emotionally, mentally, and socially.
Photo Credit: William Hook/Unsplash
3. Social Media Posts
This form of cyberbullying is where the bully posts embarrassing videos or pictures of the “target” on social media platforms, such as YouTube or Instagram. A person purposely takes a series of photos or records one or more videos of the target on their phones and then posts online directly, creating reels, YouTube videos, or social media content with the photos or video footage. Some examples of where these videos are taken are at a pool, in the locker room, in the bathroom, at a party, at a social gathering, at school, or even at work if phone use is not closely monitored. These photos or videos are altered, enhanced, or taken out of context with photo-editing programs or video apps to portray the target in whatever manner they want. The intention is to embarrass, gossip about, or make the target feel lesser than the bully which results in taking power away from the target. For example, Bella takes a picture of Lilly in her swimsuit at the pool, at a party, and at a concert. Then, she enhances the photos to make Lilly look fatter than she is. Bella uploads it to Instagram with mean words and #fat #girlloseweight #diet #dietgoals #beast
Photo Credit: Tim Mossholder/Unsplash
4. Gossip Groups
Gossip groups are social media groups where people view images, posts, or a chain of messages or comments among several people with the intention of targeting or criticizing others. These groups are formed around negative discussions where people come together to bash peers, discuss other people they don’t like, or belittle others. A common child form of this is where children vote for the “most hated student,” “ugliest student,” “dumbest student,” and more. The comments are online for anyone to read and, if not deleted, can remain online forever, serving as an ongoing reminder and source of emotional pain for the target for years to come. Some go as far as tagging the target in the posts or comments or someone screenshotting a post and sending it to the target. This ensures that the targeted individual sees the post and experiences the intended harm.
An adult version of this type of cyberbullying is a group or chain of comments on a post dedicated to tearing down an aspiring author, singer, musician, influencer, etc. The person behind the bullying often has a personal connection with the person they are bullying, such as a rival, former colleague, or acquaintance. Their sole purpose is to make the one being bullied stop what they are doing out of fear that they are not good enough, don’t have a big enough following, or to demoralize their worth and value and make them insecure, self-doubt, and ultimately quit what they are aspiring to.
Photo Credit: GettyImages/Prostock-Studio
5. Harassing Websites
This form of bullying is exactly what it states. They are websites designed with the purpose of harassing an individual. Providers and platforms have simplified the process of creating a new website, and often, they are free to create. A public bullying example of this was the website “Kill Kylie Incorporated.” The purpose of this website was to accuse a girl of being gay and threaten her life online. According to public records, it took nine months for the police to find the bullies behind this website because of how easy it was to hide their identity. It is very easy today for others to steal our identities on platforms like Facebook and Instagram, and even through financial platforms and store apps. Websites are another way to harass and bully others with negative motives.
As Christians, we are called to stand firm in our faith even when faced with trials and challenging topics like cyberbullying. 1 Corinthians 16:13 reminds us, “Be on your guard; stand firm in the faith; be courageous; be strong.” By understanding the five basic forms of cyberbullying—Direct Electronic Bullying, Impersonation through Text Messages, Social Media Posts, Gossip Groups, and Harassing Websites–you will be better equipped to recognize and respond to these hurtful and harmful behaviors. Armed with knowledge and compassion, you can stand guard and advocate for those being targeted by cultivating a culture of love and respect as Jesus did in the marketplace, workplace, home, and communities. As Christians, we are called to be light in the world, ensuring that even our digital spaces reflect His love and kindness to those around us physically and virtually.
Photo Credit: Philipp Katzenberger/Unsplash
Rachel is the coauthor of the Barnes and Noble Bestseller More than Enough: The Silent Struggle of a Woman’s Identity. She brings fourteen years of experience as an educator advocating for students from preschool to twelfth grade across three states. Her journey as a parent advocate started when one of her four children faced bullying, motivating her to provide the resources found in her book Behind the Hidden Doors: Bullying, Hope, and Identity.
She is mostly known for her gift of mercy, helping all who meet her feel seen, heard, and valued. With a passion for empowering women and children to walk in freedom, she dedicates herself through her vlog, books, Freedom Diaries Podcast, speaking, and community engagements and events to help them reclaim hope, identity, and joy. Connect with Rachel on her website and Instagram.
Originally published Friday, 17 January 2025.