{"id":25117,"date":"2014-05-07T08:22:43","date_gmt":"2014-05-07T15:22:43","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=25117"},"modified":"2017-02-03T12:49:31","modified_gmt":"2017-02-03T20:49:31","slug":"parental-concerns-inappropriate-communications-and-digital-harassment","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/","title":{"rendered":"Inappropriate Communications: How To Cope with Cyberbullying"},"content":{"rendered":"<address><em>This is the second installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. See part 1, <a title=\"Parental Concerns in the Digital Era: An Introduction\" href=\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era\/\" target=\"_blank\">Parental Concerns in the Digital Era: An Introduction<\/a>.<\/em><\/address>\n<p>In the first installment, we introduced our Five Minute Family Protection Tips series, outlining why parents should be concerned with their children\u2019s online activities and some initial advice about online predators.<\/p>\n<p>Today, we continue with a look at the risks of inappropriate communications and how to cope with digital harassment.<\/p>\n<h3>Inappropriate Communications: Express with Caution<b>\u00a0<\/b><\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-22759\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/self-expression.jpg\" alt=\"I'm expressing myself\" width=\"600\" height=\"375\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/self-expression.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/self-expression-150x93.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/self-expression-300x187.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Personal technology is now the main method young people use to express themselves in modern society. An obvious example is the rise of social media.<\/p>\n<p>There is nothing wrong with social media; after all, billions of people use it daily to share what\u2019s on their mind and to keep in contact with friends, family and colleagues. But it is also a potential platform for abuse.<\/p>\n<p>It should come as no surprise to learn that another major parental concern is the possibility that their teenager may be having inappropriate communications with others.<\/p>\n<p><a title=\"Teens and Sexting - Pew Research\" href=\"http:\/\/www.pewinternet.org\/2009\/12\/15\/teens-and-sexting\/\" target=\"_blank\">Pew<\/a>\u00a0research\u00a0found that many parents, educators and security advocates were deeply concerned about the practice of &#8220;sexting.&#8221;<\/p>\n<p>One thing that is decidedly different from the offline world, is that online, information is forever. That racy picture sent to a crush cannot be un-sent. The status update about weekend shenanigans can easily be captured and copied before someone can think better of it and hit delete. The Internet has a memory that is extremely difficult to erase.<\/p>\n<p>Everyone can think of an example, either within their own lives or on the news, about some unfortunate person whose life has been significantly changed because of poor sharing choices.\u00a0As such, an important question has surfaced in the last few years: What can parents do to maintain their child&#8217;s reputation in the digital era?<\/p>\n<p>After all, something that might seem like a good idea at the age of 14 could have repercussions in school or later down the line.<\/p>\n<p>Parents should consider teaching their child how to maintain a level of diligence when communicating online. Have a serious talk about safe Internet use and think about setting boundaries about what is appropriate online behavior.\u00a0Mobile phones present a problem, which is why keeping an open dialogue with a child is so important.<\/p>\n<p>On the computer there are parental controls available to help set and maintain boundaries and these should be a platform for starting the conversation.<\/p>\n<p>That way, whether a secret alias account is used or not, the child has the foundation to know right from wrong and the parent has the tools in place to keep an eye on their children even when they are away from home.<\/p>\n<h3>Cyberbullying: It&#8217;s An Ugly Thing<a href=\"#_msocom_1\"><br \/>\n<\/a><\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-22714\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/digital-harassment-cyberbullying.jpg\" alt=\"cyber bullying\" width=\"600\" height=\"375\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/digital-harassment-cyberbullying.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/digital-harassment-cyberbullying-150x93.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/digital-harassment-cyberbullying-300x187.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>It is no secret that children can be particularly vicious in what they say to each other (heck, even adults can too). It is a problem that has occurred offline since the dawn of time, but as the Internet has progressed, an issue that has taken prominence in the world of parenting.<\/p>\n<p>Recently, bullying others online has been called, &#8220;<a title=\"A New Way to Terrorize - YouTube\" href=\"http:\/\/youtu.be\/nz1PEt1KlqQ\" target=\"_blank\">A New Way to Terrorize<\/a>,&#8221; and most kids probably do not understand what the consequences might be.<\/p>\n<p>Examples of <a title=\"How to Know if Your Child is Facing Cyberbullying\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-know-if-your-child-is-facing-cyberbullying\/\" target=\"_blank\">cyberbullying<\/a> include sending insulting text messages, creating rumors about other students on Facebook, publishing embarrassing pictures of a victim online, abuse of Twitter and other platforms, and general horrible behavior.<\/p>\n<p>Part of the danger of children opening themselves up online is they can provide extra ammunition for bullies. With unmonitored and possibly anonymous access to social media sites, bullies become less inhibited than when they have to face their victims.\u00a0Their attacks can be crueler and they can inflict significant emotional damage rather than just physical abuse.<\/p>\n<p><strong>What can parents do to deter this from happening?<\/strong><\/p>\n<p>First, don&#8217;t sweat the small stuff\u2014with technology, there is a propensity for it to be a cause of anxiety. Unfortunately, any tool can also be used to harass people.\u00a0It\u00a0is important to recognize that technology and the Internet are not to blame for cyberbullying; it is merely a platform.<\/p>\n<p>Instead, parents should consider thinking of it as an opportunity for their children.\u00a0Kids these days can use technology for good, as a tool for guidance, support and maintaining friendships. Parents can use it\u00a0to help build a positive network for their children. Social media and even texting are ways to engage and connect with young people.<\/p>\n<p>An important skill parents should teach their children about is how to be empathetic. Empathy is being able to look at the world through other people&#8217;s eyes; it is the first and perhaps most important step a child can take on the path to develop resilience.<\/p>\n<p>Children do not always tell their parents about what is happening online, but there are tools out there to help surface these issues. These allow parents to see if their child is being harassed.<\/p>\n<p><a title=\"Mac Parental Control &amp; Security | Family Protector Secure X8\" href=\"https:\/\/www.intego.com\/contentbarrier-secure\" target=\"_blank\">Parental control software<\/a> can offer parents peace of mind when they are not around, but the most effective tool is talking to the child and creating an environment where they feel safe opening up about what is happening offline and on the Internet.<\/p>\n<div>\n<hr \/>\n<div>\n<p><span style=\"line-height: 1.5em;\">Next time, in the third installment of our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/five-minute-family-protection-tips\/\" target=\"_blank\">Five Minute Family Protection Tips<\/a> series, we look at some aspects that are often overlooked from an online safety perspective: the <a title=\"Parental Concerns in the Digital Era: Exposing Personal Information\" href=\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/\" target=\"_blank\">dangers of peer-to-peer file sharing and password sharing<\/a>.<\/span><\/p>\n<\/div>\n<\/div>\n<p><span style=\"font-size: x-small;\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/48112820@N05\/6784102187\/\" target=\"_blank\">kid-josh<\/a> via <a href=\"http:\/\/photopin.com\" target=\"_blank\">&#8220;photopin&#8221;<\/a><a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/2.0\/\">cc<\/a><\/span><br \/>\n<span style=\"font-size: x-small;\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/quinnanya\/4342016700\/\" target=\"_blank\">quinn.anya<\/a> via <a href=\"http:\/\/photopin.com\" target=\"_blank\">&#8220;photopin&#8221;<\/a><a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/2.0\/\">cc<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the second installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. See part 1, Parental Concerns in the Digital Era: An Introduction. In the first installment, we introduced our Five Minute Family Protection Tips series, outlining why parents should be concerned with their [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":25720,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10],"tags":[1090,994],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"This is the second installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. See part 1,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inappropriate Communications: How To Cope with Cyberbullying - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"This is the second installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. See part 1,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-07T15:22:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-02-03T20:49:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/teen-cyber-bullying.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/teen-cyber-bullying.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/teen-cyber-bullying.jpg\",\"width\":400,\"height\":260,\"caption\":\"cyber bullying\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/\",\"name\":\"Inappropriate Communications: How To Cope with Cyberbullying - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#primaryimage\"},\"datePublished\":\"2014-05-07T15:22:43+00:00\",\"dateModified\":\"2017-02-03T20:49:31+00:00\",\"description\":\"This is the second installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. See part 1,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Inappropriate Communications: How To Cope with Cyberbullying\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Inappropriate Communications: How To Cope with Cyberbullying\",\"datePublished\":\"2014-05-07T15:22:43+00:00\",\"dateModified\":\"2017-02-03T20:49:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#webpage\"},\"wordCount\":924,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/teen-cyber-bullying.jpg\",\"keywords\":[\"Cyberbullying\",\"Five Minute Family Protection Tips\"],\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"This is the second installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. See part 1,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/","og_locale":"en_US","og_type":"article","og_title":"Inappropriate Communications: How To Cope with Cyberbullying - The Mac Security Blog","og_description":"This is the second installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. See part 1,","og_url":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-05-07T15:22:43+00:00","article_modified_time":"2017-02-03T20:49:31+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/teen-cyber-bullying.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/teen-cyber-bullying.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/teen-cyber-bullying.jpg","width":400,"height":260,"caption":"cyber bullying"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/","name":"Inappropriate Communications: How To Cope with Cyberbullying - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#primaryimage"},"datePublished":"2014-05-07T15:22:43+00:00","dateModified":"2017-02-03T20:49:31+00:00","description":"This is the second installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. See part 1,","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Inappropriate Communications: How To Cope with Cyberbullying"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Inappropriate Communications: How To Cope with Cyberbullying","datePublished":"2014-05-07T15:22:43+00:00","dateModified":"2017-02-03T20:49:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#webpage"},"wordCount":924,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/teen-cyber-bullying.jpg","keywords":["Cyberbullying","Five Minute Family Protection Tips"],"articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/teen-cyber-bullying.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-6x7","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25117"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=25117"}],"version-history":[{"count":72,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25117\/revisions"}],"predecessor-version":[{"id":62158,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25117\/revisions\/62158"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/25720"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=25117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=25117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=25117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}