I read an article in Black Belt recently about cyber bullying. Did anybody else catch this one?
The article covered bully tactics likely found on a forum, but did not go into the use of cyber technology - picture morphing, voice adjusters and hacking - which allbeit are more sophisticated methods used by cyber bullies.
The article covered bully tactics likely found on a forum, but did not go into the use of cyber technology - picture morphing, voice adjusters and hacking - which allbeit are more sophisticated methods used by cyber bullies.
Comment