{"id":541,"date":"2024-01-28T02:31:01","date_gmt":"2024-01-28T07:31:01","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?p=541"},"modified":"2024-04-02T11:21:27","modified_gmt":"2024-04-02T15:21:27","slug":"apply-the-phrase-victim-precipitation-to-cyber-victimization","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2024\/01\/28\/apply-the-phrase-victim-precipitation-to-cyber-victimization\/","title":{"rendered":"Module 4: \u201cApply the phrase victim precipitation to cyber victimization\u201d."},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>Cyber victimization happens very commonly in today&#8217;s day and age. Recently, there has been a spike where many people &#8220;hype&#8221; up someone in the media and praise them, but then suddenly something is done that turns the users away. In other words, they have been &#8220;canceled&#8221;. On social media, you can deep dive into a person&#8217;s information and history. A blog post on the Grand Canon&#8217;s University page lists victim precipitation as being able to describe someone&#8217;s ethnicity, gender, or identity. It also explains that the description of the victim typically can cause the attack.&nbsp;<\/p>\n\n\n\n<p>This same concept is not different online than in person. Someone does not have to be egging another&#8217;s house to torture or attack a victim. Instead, it has changed to stalking someone&#8217;s account and posting threatening words on their wall or page or post. You can find someone&#8217;s email, phone number, and address online and use that information against them to send threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber victimization happens very commonly in today&#8217;s day and age. Recently, there has been a spike where many people &#8220;hype&#8221; up someone in the media and praise them, but then suddenly something is done that turns the users away. In&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2024\/01\/28\/apply-the-phrase-victim-precipitation-to-cyber-victimization\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[11],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/541"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=541"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/541\/revisions"}],"predecessor-version":[{"id":647,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/541\/revisions\/647"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/categories?post=541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/tags?post=541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}