Case Study – Cyber Bullies, Online Trolls and James Welch

[vc_row][vc_column width=”1/2″][vc_column_text]

Cyber Bullying is a problem which is getting worse each year. In the latest report from Childline it showed that concerns about Online bullying rose by 87% in 2013 compared with 2011/2012. More than 30,000 young people were counseled by the charity with older children from 12-18 feeling more targeted online.

However its not just Children who feel the pressure of Online Abuse,there is also a large number of adults who bully and troll online.

The goal of an adult bully is to gain power over another person, and make himself or herself the dominant adult. They try to humiliate victims, and “show them who is boss.”
http://cyberguardiansonline.com/

[/vc_column_text][vc_column_text]This week at the age of 33 I found myself the victim of a Cyber Bullying Attack – you can read more in my case study below.[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cCUzQSUyRiUyRmNmLmRhdGF3cmFwcGVyLmRlJTJGRVhRcVAlMkYxJTJGJTIyJTIwZnJhbWVib3JkZXIlM0QlMjIwJTIyJTIwYWxsb3d0cmFuc3BhcmVuY3klM0QlMjJ0cnVlJTIyJTIwYWxsb3dmdWxsc2NyZWVuJTIwd2Via2l0YWxsb3dmdWxsc2NyZWVuJTIwbW96YWxsb3dmdWxsc2NyZWVuJTIwb2FsbG93ZnVsbHNjcmVlbiUyMG1zYWxsb3dmdWxsc2NyZWVuJTIwd2lkdGglM0QlMjI0NjAlMjIlMjBoZWlnaHQlM0QlMjI0MDAlMjIlM0UlM0MlMkZpZnJhbWUlM0U=[/vc_raw_html][/vc_column][/vc_row][vc_row][vc_column width=”1/1″][vc_row_inner][vc_column_inner width=”1/1″][vc_text_separator title=”What Makes a Cyber Bully or Troll?” title_align=”separator_align_center”][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”2/3″][vc_column_text]

What makes a Cyber Bully or Internet Troll?

In A recent Article by Chris Mooney his headline was “Internet Trolls Really Are Horrible People”, his posts talks about a Psychology paper written by Erin Buckels to characterise the personality of who engages in Trolling.

In the study carried out by Buckels he identified Trolls in a number of ways, one was simply to ask via a poll on what people enjoyed doing most when online and related this in a Psychological manner to the personality traits of:

  • Machiavellianism (willingness to manipulate and deceive others),
  • Narcissism (egotism and self-obsession),
  • Psychopathy (the lack of remorse and empathy)
  • Sadism (pleasure in the suffering of others).
    Chris Mooney
[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/3″][vc_single_image image=”915″ img_link_target=”_self” img_size=”full”][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/3″][vc_single_image image=”914″ img_link_target=”_self” img_size=”full”][vc_column_text]

Cyber bullies are often motivated by anger, revenge or frustration. Sometimes they do it for entertainment or because they are bored and have too much time on their hands and too many tech toys available to them. Many do it for laughs or to get a reaction.
Fred Hetner

[/vc_column_text][/vc_column_inner][vc_column_inner width=”2/3″][vc_column_text]Psychology Aside Cyber bullies can be typically categorised into the following types according to Fred Hetner in his article on the examiner.

The Vengeful Angel, the Power Hungry, the Mean Girls, and the Inadvertant Cyber Bully (or Because I can).
Fred Hetner – NY Law Enforcement Examiner

Vengeful Angel

A Vengful Angel is when someone is bullied and there friends react and then bully back.

Power Hungry bullies

They use Cyber bullying to try and embarrass, frighten or even tarnish more socially accepted peers.

Mean Girls

Normally the most immature who write information to gain attention.

The Inadvertant Cyber Bully

This happens when someone writes something without thinking about the possible consequences of their actions.[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row el_class=”widget-wrapper-white”][vc_column width=”1/1″][vc_row_inner][vc_column_inner width=”1/1″][vc_text_separator title=”Cyber Bullying Case Study – James Welch” title_align=”separator_align_center”][/vc_column_inner][/vc_row_inner][vc_column_text]

Case Study – Cyber Bullying – James Welch

[/vc_column_text][vc_row_inner][vc_column_inner width=”1/3″][vc_single_image image=”887″ img_link_large=”yes” img_link_target=”_self” img_size=”200×400″][vc_column_text]Article written about “Plagiarism by James Welch”[/vc_column_text][/vc_column_inner][vc_column_inner width=”2/3″][vc_column_text]This week I myself was subjected to a wild accusation of “Plagiarism”  initially over twitter which pointed to a full blog post about “Plagiarism by Neil Walker”.

I was “horrified” that such a statement could be made and I went through all the feelings that many people go through when they are feeling bullied of Anger, Frustration and I simply wondered why James Welch had tried to discredit me in such a fashion.

This is the first time I’ve personally received negative publicity online and this is not from an Ex Client, a disgruntled employee, no this was from an Ex Colleague, someone who I previously had respect for.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/1″][vc_text_separator title=”The Accusation” title_align=”separator_align_center”][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”2/3″][vc_column_text]

The Accusation

In the blog post written by James he says a number of comments to discredit my Skill and even deter clients from using my services.

Neil Walker, had been passing off my work as his own at various trade shows
James Welch 

He also makes a bold comment of me actually stealing his work.

Neil having no strategy of his own, or to actually steal something such as someone else’s work
James Welch

His aim to deter clients is what hurts mostly as when we worked together it was great – Now he’s a director of a rival company i simply can’t believe how unprofessional he has been.[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/3″][vc_video link=”http://www.youtube.com/watch?v=d4eFQ51GmL8″][vc_column_text]

This, good marketing directors and managing directors of the UK, is what is wrong with much of the SEO industry still to this day.
James Welch

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/1″][vc_text_separator title=”5 Years Ago” title_align=”separator_align_center”][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/3″][vc_column_text]
[/vc_column_text][/vc_column_inner][vc_column_inner width=”2/3″][vc_column_text]

5 Years Ago

The biggest insult is that James is referring to a presentation (Video above) of a seminar I performed at Adtech London in 2009 but originally performed in 2008 at a conference in Stockholm.

I just didn’t quite understand where this accusation had come from especially when I had a glowing recommendation on LinkedIn from him.[/vc_column_text][vc_single_image image=”889″ img_link_target=”_self” img_size=”full”][vc_column_text]To Give you an idea of how long Five years ago is,  since 2008 the following has happened (Remember?)

  • 2009 – Barack Obama became president
  • 2009 – The Ipad Launched
  • 2010 – Volcanic ash from the eruption of Eyjafjallajökull in Iceland
  • 2011 – An earthquake measuring 9.0 in magnitude strikes east of Sendai, Japan, triggering a tsunami killing thousands of people.
  • 2011 – Osama Bin Ladan is killed
  • 2012 – London Hosted the Olympics
  • 2013 – A Royal Baby is born
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/1″][vc_text_separator title=”The Bold Truth” title_align=”separator_align_center”][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”2/3″][vc_column_text]

The Bold Truth

So did I steal his work? To give you some back ground I worked with James Welch whilst at Just Search 2007 – 2008, James was Head of Research with a small team under him which produced innovations for the company.

James presented to some employees including myself a document that he and his team had produced, a Mind Map (Basically a brainstorm) of what factors contributed to a successful website – this was nothing new but a great visual format and I credited him and his team for the work.

This is what James’s job role was, yet he has accused me of “stealing his work and passing it off as my own” – yet this initial diagram was done for and on behalf of the company.

I’m fully aware of the contract we had in place whilst we both worked at Just Search and the comment to the left fully applies from http://www.own-it.org/knowledge/i-m-an-employee-who-owns-the-ip-rights[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/3″][vc_column_text]

It is not always clear what constitutes producing a work in the course of employment, but factors taken into consideration include: undertaking work that falls within the type of activities that can be expected from the employee’s line of employment, and so on. If the work falls within the scope of tasks that the creator was employed to carry out then the resulting IP can still belong to their employer even if the employee worked in his spare time and used his own equipment.
– own-it.org

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”2/3″][vc_column_text]

The Truth

After James resignation was accepted from Just Search it was my role to manage his team and the work that had been produced. I worked with the Research and Development team to produce seminars such as discussed in this cases study.

Our research showed that this concept or mind map was actually built on early ideas from search marketing experts like:

[/vc_column_text][vc_column_text]

Claiming this work to be my own

Again this accusation was unfounded – I clearly state in my blog post from September 2009 (waybackmachine) before the video was taken that:

This year I’m speaking about “The Mind Map of a successful website.” It’s based on the work of a number of SEO experts who have had input at Just Search and each year we’ve expanded the information to add the next set of details on the subject.
-Neil Walker September 2009

[/vc_column_text][vc_column_text]Its also clear from statements i make in the video that I have not claimed this work is sole-fully mine.

The Synopsis of why we came up with the seminar
– Neil Walker – Adtech 2009

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/3″][vc_column_text]
Do I still use the presentation?

Its on my YouTube channel and my website but if I’m honest I’ve not physically used it as sales material in over four years, why? – Since then I’ve spoken at the following conference on various different subjects:

  • IonSearch – 2013 – SEO Tools of the Trade
  • Brighton SEO – 2013 – Post Penguin Link Building
  • A4u London – 2012 – You are the weakest link – Good Bye
  • SASCON – 2012 – Breaking free of Panda (joint presentation with Pete Young Mediacom)
  • SMX Advanced London – 2012 – IS Mobile Search Important
  • SMX West – 2012 – Webmaster Tools Tactics
  • SES London  – 2012 – SEO Power Tools
  • Brighton SEO – 2011 – Links Value V Clients
  • Think visibility 2011 – Marketing Statistics and How to use them
  • SMX Stockholm 2011 – Competitor Research
  • SASCON – 2011 – Forecasting SEO
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/1″][vc_text_separator title=”Dealing with A Cyber Attack” title_align=”separator_align_center”][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/1″][vc_column_text]

Dealing with the Cyber Attack

When i first received the tweet about this article of course I was frustrated and wanted to reply and defend myself but that would have only made the matter initially worse so I did what I think was the best practice.

  • I took a deep breath
  • I simply didn’t respond online in any format.
  • I talked to my wife.
  • I talked to my friends
  • I went to a forum with some of the top digital marketers in the world and told them what happened and asked opinions.
  • I documented and took screen shots.

With a lot of cyber bullying the “bully” or “troll” is often anonymous however I knew this had been produced by James Welch – and although its still online I thought the best way to deal with this matter would be to go and see him personally to discuss what had been written. (As I had conversations with James in earlier years advising him that i had done this presentation.)[/vc_column_text][vc_column_text]James was conveniently unable to talk with me for the hour I spent at their office, but I did speak with his fellow director  and explained how unprofessional his post was and that it made not only him but his company look bad and all I wanted was the post to be removed – Unfortunately 4 days later his post has not been removed.

This Case Study – clearly outlines the truth about his post.
Neil Walker Feb 2014

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/1″][vc_text_separator title=”Conclusion” title_align=”separator_align_center”][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/1″][vc_column_text]

Conclusion – Why did he write his post?

There is no winner in a cyber bullying case – the victim still has to recover from the attack and will feel discredited like the bully will feel discredited, but it still begs the question what provoked this malicious behavior.

Avenging Angel?

Did James feel retribution was needed because he lost a client to my business?[/vc_column_text][vc_column_text]Power Hungry?

Did James feel he needed to discredit me because since we worked together I have gone onto speak at some of the leading Digital Marketing Conference not just in the UK but Worldwide on panels of my peers with some of which are considered to be some of the greatest SEO and Digital Marketing experts on the planet?

Mean Girls?

Did James just want to practice his controversial content marketing efforts?

The Inadvertant

I would tend to think this is what has happened and James has simply posted things without actually think how negative they sound and what potential repercussions may happen.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_text_separator title=”Case Study End” title_align=”separator_align_center”][/vc_column][/vc_row][vc_row][vc_column width=”1/1″][vc_column_text]

More Information About Cyber Bullying

[/vc_column_text][vc_text_separator title=”Where does Cyber Bullying Occur?” title_align=”separator_align_center”][/vc_column][/vc_row][vc_row][vc_column width=”2/3″][vc_column_text]

Where does Cyber Bullying Occur?

In The Annual Cyber Bullying report from Ditch The Label (The focus is on 13-22 year olds) – It showed the use of cyber bullying in social media, with 54% of its users being Cyber Bullied on Facebook, 28% Twitter but all social networks it covered had at least 14% of young users feeling bullied which had repercussions such as:

  • Self Esteem
  • Social Life
  • Optimimism
  • Studies / Work
  • Home Life
[/vc_column_text][vc_column_text]However Digital Harassment is not just restricted to Social Media according to  Stomp Out Bullying it can happen across many other digital platforms such as:

  • Instant Messaging Platforms
  • Website and Forums
  • Blogs
  • Interactive Gaming
[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_gallery type=”nivo” interval=”5″ images=”871,872,873,876,877″ onclick=”link_no” custom_links_target=”_self” img_size=”full” el_class=”widget-wrapper-black”][/vc_column][/vc_row][vc_row][vc_column width=”1/1″][vc_text_separator title=”How Should You Deal With Cyber Bullying?” title_align=”separator_align_center”][/vc_column][/vc_row][vc_row][vc_column width=”2/3″][vc_column_text]

How should you deal with Cyber Bullying or Reputation Management

There is far more information about dealing with online trolls available for children and parents than other adults but the theory is still the same.

  1. Communication – If You feel you are a victim of Cyber Bullying the first step is to tell someone.
  2. Don’t React – Take a deep breath – Comments may be hurtful or simply a lie – An initial reaction can only exacerbate the situation.
  3. Document the evidence  – Take screen shots of instant messages, posts etc. – They are often deleted.
  4. Know how to block people – Make sure you are aware of how to use social network properly.
[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_single_image image=”853″ img_link_target=”_self” img_size=”full”][/vc_column][/vc_row][vc_row][vc_column width=”1/1″][vc_column_text]
For Help and Support with Cyber Bullying and Online Trolls you can contact one of the following Charities:
[/vc_column_text][vc_gallery type=”image_grid” interval=”3″ images=”899,900,898″ onclick=”custom_link” custom_links_target=”_blank” img_size=”full” custom_links=”http://www.cybersmile.org/,http://www.ditchthelabel.org/,http://www.bullying.co.uk/”][/vc_column][/vc_row][vc_row][vc_column width=”1/1″][vc_column_text]
Credits: (Cyber Bullying References)
  1. http://www.bbc.co.uk/news/technology-26121199
  2. http://www.stompoutbullying.org/index.php/information-and-resources/parents-page/tip-sheet-how-understand-and-handle-cyberbullying/
  3. http://www.ditchthelabel.org/downloads/the-annual-cyberbullying-survey-2013.pdf
  4. http://www.slate.com/articles/health_and_science/climate_desk/2014/02/internet_troll_personality_study_machiavellianism_narcissism_psychopathy.html?utm_content=buffer15755&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
  5. http://www.theguardian.com/news/datablog/2014/jan/09/cyberbullying-childline-statistics-online-bullying
  6. http://www.slate.com/articles/health_and_science/climate_desk/2014/02/internet_troll_personality_study_machiavellianism_narcissism_psychopathy.html?utm_content=buffer15755&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
  7. http://www.sciencedirect.com/science/article/pii/S0191886914000324
  8. http://cyberguardiansonline.com/2013/11/04/cyber-bullying-not-just-a-teenage-issue/
  9. http://www.bullyingstatistics.org/content/dealing-with-bullying.html
  10. http://www.examiner.com/article/what-makes-a-cyber-bully
[/vc_column_text][/vc_column][/vc_row]

2 thoughts on “Case Study – Cyber Bullies, Online Trolls and James Welch”

Comments are closed.