StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Threatening Through the Internet - Research Paper Example

Cite this document
Summary
The paper "Threatening Through the Internet" presented a detailed discussion on the concept of cyberbullying which has emerged as a very serious criminal act that is supported through modern technologies in the past few years…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
Threatening Through the Internet
Read Text Preview

Extract of sample "Threatening Through the Internet"

?Cyberbullying Cyberbullying Affiliation Introduction In the past few years, the use of digital media and modern technologies has increased to a massive extent. Though, these innovations and technologies have brought a large number of benefits and opportunities for all kinds of people. However, at the same time they have introduced a wide variety of threats and crimes. In this scenario, cyberbullying is one of the latest emerging crimes that are performed with the support of digital media. Basically, cyberbullying is the latest form of digital media or electronic (by means of computers and mobile phones) harassment or blackmailing that is repeated eventually and entails a power inequality. Additionally, it is believed to be a violent, intended act conducted by an individual or a group, by making use of communication tools supported by digital media, repetitively as well as ultimately against a sufferer who cannot simply protect him or herself. In the past few years, the occurrences and potential for cyberbullying have increased with the growing dissemination of mobile phones and networked computers among young people. Some of the major instances of cyberbullying can comprise having confidential emails of text messages forwarded, getting frightening messages, discomforting images distributed or rumors spread on the Internet (Cheng, 2012; Ortega, Calmaestra, & Mercha?n, 2008). In addition, cyberbullying is not limited to any specific country and it is very common throughout the world. However, Cyberbullying rates differ from time to time and location to location. The research has shown that almost 10–50% of young people undergo some kind of digital media based cyberbullying or harassment. In addition, the results of these threats can appear in the forms of depression, school avoidance and suicide. Moreover, interference gives emphasis to the role of teachers and parents in educating young people about adopting security and privacy measures while using digital media and technologies (Cheng, 2012; Ortega, Calmaestra, & Mercha?n, 2008). This paper presents a detailed analysis of cyberbullying. The basic purpose of this research is to offer an understanding of the concept and suggest some steps to avoid such serious acts. Cyberbullying: An Overview Cyberbullying is the process of using digital media and technologies such as instant messaging, mobile phones, chat rooms, e-mail, or social networking sites such as Facebook and Twitter with the purpose of carrying out some specific criminal tasks such as threatening, harassment or intimidate someone. The research has shown that these criminal activities are often performed by children, who have increasingly untimely access to these technologies. However, cyberbullying is difficult to detect for the reason that a person who is carrying out this act can cover himself behind an electronic cover, making his or her true identity difficult to detect. In this scenario, this confidentiality offered by the digital media strengthens the behavior of bullies and allows them to act more violently than they might have acted confronting each other. Additionally, cyberbullying is an umbrella term which covers a wide range of digital crimes such as sending provoking racial or abuse or ethnic slurs, threatening someone, putting an attempt to infect someone’s computer with a virus, gay bashing, and flooding an e-mail inbox with useless messages (Rouse, 2010; Silverman, 2013). Though, there are so many ways to deal with these acts however the best ways is to train yourself and get aware of these latest crimes. In this scenario, a victim can take in hand cyberbullying somewhat by off-putting computer connection time, never clicking or responding e-mail messages from persons or sources you do not identify or from identified persons and sources of unnecessary communications and not reacting to aggressive or insulting messages. Moreover, some other actions can comprise whitelisting or blacklisting e-mail accounts, changing ISPs, updating email addresses, attempting to trace the source and changing cell phone numbers or accounts. In this scenario, there are still confusions about cyberbullying laws for the reason that the use of online communications and digital media has increased so quickly and the crime is comparatively new. On the other hand, this crime is considered under available laws and regulations against personal harassment and threats. It is also recommended to notify the local police department or discuss this matter with a legal representative. However, it is not suggested that you get your own back in kind for the reason that such act can cause sensitive attacks, or criminal charges or even civil actions against you (Rouse, 2010; Silverman, 2013). As discussed above, these crimes are specifically designed for young people who have new got access to the latest technologies such as mobile phones or the Internet. Hence, the majority of cyberbullying victims are students anywhere they can be able to use their cell phones or a computer no matter where they are at home, at a relative or friend's house, at school, and even at the mall or on the bus. In this scenario, a most recent study has shown that more than 50% of preteens and more than 30% of teens are cyber bullied when they are studying at school level (Feinberg & Robey, 2009; Davis, 2011). Though, the majority of schools have taken significant steps to prevent their students from these criminal acts while they are at school. Additionally, at the present a large number of schools install and use filtering software applications and tools that help stop students from making use of school computers to perform these acts against other students. However, it does not show that cyberbullying is not an element of the school environment or the accomplishment of these practices does not have negative effects on students' experience while they stay at school. In fact, it raises a number of concerns and questions on the subject of privilege and scope of school involvement. For example, what is the role of school if a student performs such an act against another student using an email or text message while actually remaining outside the campus? In the same way, if a student uses social network site to distribute a nasty message about another student while sitting outside the school but the other student does not know about it until other students talk about it in class. Moreover, taking into consideration such scenarios and concerns and having discussion with respective staff members and legal authority is very important to deal with cyberbullying (Feinberg & Robey, 2009). In their research article, (Feinberg & Robey, 2009) discuss the nature and characteristics of victims and cyberbullies. According to their research findings, victims of cyberbullying are more likely to be female similar to male and more likely to be older, instead of young people. Additionally, sometimes there is no relationship between victims and cyberbullies and both are strangers to each other; however in many cases they know each other very well. In addition, some cyberbullies work individually and some work in a team, with the purpose of making it hard for others to recognize the attacker. In addition, sometimes cyberbullying is done to attain certain goals and objectives. For instance, in some cases cyberbullies consider themselves as vigilantes who are attempting to protect others who are suffering through cyberbullying. Additionally, the majority of cyberbullying attacks are launched to hold power over others through terror. For instance, for victims who are usually believed to be pathetic within society or physically, cyberspace can provide with a great deal of power and control through secrecy or through superior ability of implementing and controlling latest technologies. Additionally, female cyberbullies normally work in a group for launching an attack and can simply be uninterested or feel defensible in their Internet attack of a not as much of the publicly expert peer. The research has shown that the majority of cyberbullying victims comprise those people who have been targeted through traditional bullying. In this scenario, victims of cyberbullying are more disliked, out-of-the-way, unhappy, nervous, and scared than other peers (Feinberg & Robey, 2009; Davis, 2011; Silverman, 2013). Recommendations and Suggestions In view of the fact that cyberbullying is increasingly launched for young people so schools and educational institutes can play a significant role in overcoming this serious crime. In this scenario, one of the most well-liked interference strategies that are taken on the majority of people is avoidance, for instance, changing their e-mail addresses or blocking messages. Though, this practice can be helpful for individuals, however it brings little to change the on the whole conduct. Additionally, principals of schools should work in cooperation with staff members, students and their parents in an attempt to stop and act in response more efficiently to cyberbullying (Feinberg & Robey, 2009; Davis, 2011; Silverman, 2013). In addition, principles and information regarding cyberbullying should be incorporated into all applicable school strategies and plans. These strategies and policies must take into consideration all the forms of cyberbullying such as harassment, sexual harassment, and mobile phone and Internet use policies. It is the responsibility of principals that they fully cooperate with their staff members in creating an apparent definition and description of cyberbullying, identifying how its effect on students' stay in school will be determined, and developing mechanisms for documenting and reporting cyberbullying, superseding, and working together with particular law firms. Moreover, necessary training and education should be provided to staff members, parents and students on the subject of cyberbullying. This training should cover all the important aspects of cyberbullying such as where and how most cyberbullying takes place, how to be familiar with the actions and performance, its harmful effects (such as behavioral, social, and educational), and ways to stop and deal with cyberbullying. In this scenario, the active participation and interest of parents is critical for the reason that most of cyberbullying attacks are commenced at home. Hence, the knowledge and training gained by parents can help them understand how digital media such as social networking sites work (like Facebook or Twitter etc), signs that point toward that their kid is being attacked or is attacking others. They should get knowledge of how to talk and deal with their children on the subject of cyberbullying, and what support can be taken from their school. In the same way, teach students and children to be internet savvy (Feinberg & Robey, 2009; Davis, 2011; Silverman, 2013). Conclusion In the past few years, there have emerged a large number of innovative tools and technologies that have modernized the entire world. Though, they bring innovative ways to manage daily tasks however they have also given birth to many criminal acts. This paper has presented a detailed discussion on the concept of cyberbullying. In the past few years, cyberbullying has emerged as a very serious criminal act that is supported through modern technologies. That is why, these criminal acts are difficult to avoid and detect. The research has shown that these acts are conducted by young people and their victims are also their age or class fellows. The research has also presented the ways they adopt to launch these attacks. These attacks have serious negative effects on behavior of young people which can negatively affect the emotional, social and academic working of the victim. Principals and teachers must work with parents and community agencies to deal with the problem. In addition, parents should strictly monitor the activities of their children. References Cheng, K. (2012). Cyberbullying. Neuropsychiatrie de l'Enfance et de l'Adolescence, Volume 60 Issue 5, pp. 118-119. Davis, M. (2011). Cyberbullying. Library Media Connection, Volume 29 Issue 6, p.30. Feinberg, T., & Robey, N. (2009). Cyberbullying. The Education Digest Volume 74 Issue 7, pp. 26-31. Ortega, R., Calmaestra, J., & Mercha?n, J.­n. M. (2008). Cyberbullying. International Journal of Psychology and Psychological Therapy, volume 8 Issue 2, pp. 183-192. Rouse, M. (2010, October). cyberbullying. Retrieved April 20, 2013, from TechTarget.com: http://whatis.techtarget.com/definition/cyberbullying Silverman, J. (2013). Is cyberbullying getting out of control? Retrieved April 20, 2013, from HowStuffWorks: http://computer.howstuffworks.com/cyberbullying1.htm Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Bullying Research Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.org/sociology/1475728-cyber-bullying
(Cyber Bullying Research Paper Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/sociology/1475728-cyber-bullying.
“Cyber Bullying Research Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/sociology/1475728-cyber-bullying.
  • Cited: 0 times

CHECK THESE SAMPLES OF Threatening Through the Internet

Abusive Usage of Internet Can Destroy Society

However, misuse of the internet in an organization ahs detrimental effects that can destroy the organization and the society (Anandarajan, 2006, p.... This is certainly destroying the society and the same will continue unless the society develops moderate use of the internet.... Overdependence Although the internet is a relevant source of information, overdependence on the internet is arguably one of the factors that have led to a lazy society and poor quality of education....
5 Pages (1250 words) Essay

Collaborative Processes: Government as Catalyst

government funded the demonstration of the first telegraph and also foresaw the creation of the internet.... Basing on the above justifications, it is argued that, the access to wireless internet helps in fulfilling the government intervention requirements as it uses the radio frequency spectrum that is publicly owned....
4 Pages (1000 words) Admission/Application Essay

Internet And Market Research

Due to the internet the world has become a global village and the target audience has increased.... Due to the internet the world has become a global village and the target audience has increased.... Due to the internet the world has become a global village and the target audience has increased.... The audiences are more open in the internet-based research because they feel that their lifestyle is technically upgraded by net-based activities....
2 Pages (500 words) Essay

Young Peoples Use of Mobile and Internet

In the research paper “Young People's Use of Mobile and internet” the author examines the increase of usage of mobiles and internet in younger's who are in between 11 to 14.... Younger's has become edict of using mobiles and internet.... Firstly younger's use internet just for enjoyment and having fun but with the passage of time they become edict of internet and has started to stay away from their families....
6 Pages (1500 words) Essay

Internet Strategy

The amount of information and resources that firms can access through the internet has revolutionized the sector.... The firms can now reach the consumers… thout much hustle because most of them use the internet to interact and search for channels, companies or products and services that can help satisfy their needs.... This is the reason most companies have resorted to the internet to sell and advertise their products because of the However, not all companies use the internet to advertise or sell their products; some use many channels to market their products in a bid to reach a large base of consumers....
5 Pages (1250 words) Essay

Regulation of Free Speech on Social Media

Considering the rate and the scale in which messages can be spread through the internet raises a question of under which conditions should the freedom of expression should be restricted legitimately.... This essay presents internet which has unquestionably posed numerous challenges for balancing right to non-discrimination or equality and on the other hand freedom of expression.... hellip; According to the report free speech which has been provided by internet has played a role in undermining people's human rights....
9 Pages (2250 words) Research Paper

The Effect of the Internet on Teenagers

The paper “The Effect of the internet on Teenagers” offers summarized information about different and numerous aspects of one's lifestyle.... Teenagers are exposed to the internet in various aspects of their lives.... With all these numerous applications that the internet holds in the daily life of an average teenager, it is no surprise that the effect the internet has on these young adults is a prominent and visible one....
15 Pages (3750 words) Research Paper

Internet Censorship in China

The government, therefore, has the right to ensure that no material on the internet is a threat to national security or one that could subvert the power of the government or undermine national security or honor.... Violation of the rules and regulations concerning the internet is punishable by very heavy fines or imprisonment, and the government of China does this just to safeguard its political interest and easily manipulate the people.... The Chinese government should not censor the internet in China because this is limiting the citizens' rights to access information, freedom of speech, and expression and it leads to a gross violation of human rights....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us