Cyberbullying Word Search

Edit Answers
KIDKFXZSDFOOTEYWQHCP EUTQOEXNSUJXWHBYFGAH YTVDXGJYSMKVRHLBWYTN FNPCANEBWWPXUZTPQDFR YEALOIAXIAGPDBLJGZIO AMIKUYKQCCZXOONVSZSP TSHBMLRNYLSHPKXXGDHE RSGYPLKOXNUUQOAXNXIG OAANKUGCFIKSBUSKIZNN LRSTTBSDJLINIULHKNGE LALQBRINOMHXMOJALEGV IHIMPERSONATIONCAHKE NQGEGBVBMEHNYGOKTIZR GHHAFYZKRDAEPBLISSZV PYTYWCTLISLPYQBNRQCT LMIPHEEYLSHAMINGETJU GSNBJJHRFSGGMGQPBCER NPGXQMJAOKAHLXRXYXUU XCAYLMDIBQACBUCZCDHB TSLPCJHZWMMLRZQRNJIQ
1.
Repeatedly sending hurtful messages or threats to intimidate or distress someone online.
2.
Pretending to be someone else to deceive, manipulate, or harm them online.
3.
Intentionally leaving someone out of online activities or groups to isolate and hurt them.
4.
Publishing someone's private or sensitive information online to humiliate or endanger them.
5.
Obsessively monitoring someone's online activity or whereabouts to intimidate or harass them.
6.
(Image-based Abuse) Sharing intimate images or videos of someone without their consent to shame or control them.
7.
Deliberately provoking others by posting inflammatory or off-topic messages to disrupt online discussions.
8.
Manipulating someone into doubting their own experiences or feelings through deceptive online tactics.
9.
Creating fake online personas to deceive or manipulate others for personal gain or amusement.
10.
Publicly humiliating someone online for their actions, appearance, or beliefs.
11.
Illegally accessing someone's online accounts or devices to steal information or control their online presence.
12.
Using technology to try and harm others. It can take the form of hurtful online gossip, nasty messages, pictures or videos, imitating, and/or discluding others from groups.