1,873
18
Thesis, 4 pages (850 words)

Cyber bullying outline and thesis

Cyberbullying is defined in legal glossaries as •actions that use information andcommunicationtechnologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm another or others. •use of communication technologies for the intention of harming another person •use of internet service and mobile technologies such as web pages and discussion groups as well as instant messaging or SMStext messaging with the intention of harming another person.

Examples of what constitutes cyberbullying include communications that seek to intimidate, control, manipulate, put down, falsely discredit, or humiliate the recipient. The actions are deliberate, repeated, and hostile behavior intended to harm another. Cyberbullying has been defined by The National Crime Prevention Council: “ When the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person. ” A cyberbully may be a person whom the target knows or an online stranger.

A cyberbully may be anonymous and may solicit involvement of other people online who do not even know the target. This is known as a ‘digital pile-on. ‘Cyberbullying vs. Cyberstalking Further information: Cyberstalking The practice of cyberbullying is not limited to children and, while the behavior is identified by the same definition when practiced by adults, the distinction in age groups sometimes refers to the abuse as cyberstalking or cyberharassment when perpetrated by adults toward adults.

Common tactics used by cyberstalkers are performed in public forums, social mediaor online information sites and are intended to threaten a victim’s earnings, employment, reputation, or safety. Behaviors may include encouraging others to harass the victim and trying to affect a victim’s online participation. Many cyberstalkers try to damage the reputation of their victim and turn other people against them.

Cyberstalking may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass. A repeated pattern of such actions and harassment against a target by an adult constitutes cyberstalking. Cyberstalking often features linked patterns of online and offline behavior. There are consequences of law in offline stalking and online stalking, and cyber-stalkers can be put in jail. Cyberstalking is a form of cyberbullying.

Comparison to TraditionalBullyingCertain characteristics inherent in online technologies increase the likelihood that they will be exploited for deviant purposes. Unlike physical bullying, electronic bullies can remain virtually anonymous using temporary email accounts, pseudonyms in chat rooms, instant messaging programs, cell-phone text messaging, and other Internet venues to mask their identity; this perhaps frees them from normative and social constraints on their behavior. Additionally, electronic forums often lack supervision.

While chat hosts regularly observe the dialog in some chat rooms in an effort to police conversations and evict offensive individuals, personal messages sent between users (such as electronic mail or text messages) are viewable only by the sender and the recipient, thereby outside the regulatory reach of such authorities. In addition, when teenagers know more about computers and cellular phones than their parents or guardians, they are therefore able to operate the technologies without concern that a parent will discover their experience with bullying (whether as a victim or offender).

Another factor is the inseparability of a cellular phone from its owner, making that person a perpetual target for victimization. Users often need to keep their phone turned on for legitimate purposes, which provides the opportunity for those with malicious intentions to engage in persistent unwelcome behavior such as harassing telephone calls or threatening and insulting statements via the cellular phone’s text messaging capabilities. Cyberbullying thus penetrates the walls of a home, traditionally a place where victims could seek refuge from other forms of bullying.

Compounding this infiltration into the home life of the cyberbully victim is the unique way in which the internet can ” create simultaneous sensations of exposure (the whole world is watching) and alienation (no one understands). ” For youth who experience shame or self-hatred, this effect is dangerous because it can lead to extreme self isolation. One possible advantage for victims of cyberbullying over traditional bullying is that they may sometimes be able to avoid it simply by avoiding the site/chat room in question.

Email addresses and phone numbers can be changed; in addition, most e-mail accounts now offer services that will automatically filter out messages from certain senders before they even reach the inbox, and phones offer similar caller ID functions. However, this does not protect against all forms of cyberbullying; publishing of defamatory material about a person on the internet is extremely difficult to prevent and once it is posted, many people or archiving services can potentially download and copy it, at which point it is almost impossible to remove from the Internet.

Some perpetrators may post victims’ photos, or victims’ edited photos like defaming captions or pasting victims’ faces on nude bodies. Examples of famous forums for disclosing personal data or photos to ” punish” the ” enemies” include the Hong Kong Golden Forum, Live Journal, and more recently JuicyCampus. Despite policies that describe cyberbullying as a violation of the terms of service, manysocial networkingWeb sites have been used to that end.

Thank's for Your Vote!
Cyber bullying outline and thesis. Page 1
Cyber bullying outline and thesis. Page 2
Cyber bullying outline and thesis. Page 3
Cyber bullying outline and thesis. Page 4
Cyber bullying outline and thesis. Page 5

This work, titled "Cyber bullying outline and thesis" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Thesis

References

AssignBuster. (2021) 'Cyber bullying outline and thesis'. 13 November.

Reference

AssignBuster. (2021, November 13). Cyber bullying outline and thesis. Retrieved from https://assignbuster.com/cyber-bullying-outline-and-thesis/

References

AssignBuster. 2021. "Cyber bullying outline and thesis." November 13, 2021. https://assignbuster.com/cyber-bullying-outline-and-thesis/.

1. AssignBuster. "Cyber bullying outline and thesis." November 13, 2021. https://assignbuster.com/cyber-bullying-outline-and-thesis/.


Bibliography


AssignBuster. "Cyber bullying outline and thesis." November 13, 2021. https://assignbuster.com/cyber-bullying-outline-and-thesis/.

Work Cited

"Cyber bullying outline and thesis." AssignBuster, 13 Nov. 2021, assignbuster.com/cyber-bullying-outline-and-thesis/.

Get in Touch

Please, let us know if you have any ideas on improving Cyber bullying outline and thesis, or our service. We will be happy to hear what you think: [email protected]