Premium Essay

Cyberbullying vs. Bullying

In:

Submitted By cpmurray
Words 648
Pages 3
The emergence of information and communication technological tools and techniques have enabled people to do things differently as compared to how these things were done prior to the Digital Age. There is a saying that goes "the more things change, the more they remain the same" and in this instance, things never really changed despite the technological innovations. Take for instance one of the dreads of any primary, secondary or college student – or anyone for that matter who has fallen prey, bullying; before the Internet and computers, this deviant act is a form of abuse and normally done by stronger person on weaker ones. The goal of bullying is usually to make the weaker person do something against his will, project power on someone else or simply hurt another because they are deemed different.
Bullying has been a societal problem since people began walking upright and "as old as recorded history (“Cain attacked his brother Abel and killed him,” reads Genesis 4:8), but, unfortunately, its methods have evolved with technology. (Billitteri 2010)" The reasons and motivations for bullying, the victims of the act and the intended affects really remain the same. It’s only that the methods and techniques differ because of the use of technological tools and techniques. From the physical, bullying gave rise to cyberbullying or what "the Centers for Disease Control and Prevention labeled “electronic aggression” (Billitteri 2010)" where bullies who are now cyberbullies used the Internet to harass, malign, ridicule, threat, scare or intimidate their victims.
Victims of bullies who cannot take the abuse often commit violent or suicidal acts on themselves because of their helplessness; victims of cyberbullies often resort to the same extreme measures. For example in Massachusetts, Phoebe Prince, a high school could not take the bullying of her six classmates and ended up

Similar Documents

Free Essay

Cyberbullying: the Era of Virtual Bullying

...Cyberbullying: The Era of Virtual Bullying Rae Black EDUC 16 Mt. San Antonio College November 4, 2015 Table of Contents Introduction …………………………………….. 3 What is Cyberbullying? …….………………….. 4 Effects on Family ……………………………….. 5 Effects of Cyberbullying on the Victim ……….. 6 Effects on School ……………………………… 8 Conclusion ……………………………………… 9 Reference Page …………………………………. 10 Introduction Young people today are using the internet more than ever. They view the internet and even more so the mobile phones as positive aspects of our society. The internet and mobile phones systems are the two biggest systems of communication which play a crucial role in our daily activities and development of identities. On the other hand, these same technologies are also often used negatively. Many children are the targets of bullying via the internet or mobile phones resulting in total confusion on the part of the "target". Very often, children are not able to understand that what they are going through is a form of bullying. As a result the previously safe environment of the internet is now becoming a source of confusion and anxiety. Cyberbullying follows children around the clock, and into the safety of their homes. Many times, kids are scared to tell their parents about cyberbullying, thinking they will be blamed, lose their Internet privileges, or that their parents will call the school or other parents, probably making the bullying worse. However, the pain...

Words: 2258 - Pages: 10

Premium Essay

Cyber Bulling

...The dangers of cyber bullying have tentacles that reach all aspects of society. Teresa Pankey Com/172 December 22, 2011 Sheila Bassoppo-Moyo Being a victim of cyberbullying can be a common and painful experience, and can be hard to prove, but with proper knowledge one does not have to be a victim. A cyberbully can be someone the person knows, or thought they knew, and it can stem from anger, frustration, and revenge. A cyberbully can bully a person directly or by proxy. What exactly is cyber bullying? “Cyber bullying” is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. Cyber bullying usually occurs over several communications, unless the person communicates a death threat or a threat to inflict serious bodily harm. Sometimes after a minor starts a cyber-bullying campaign it can involve a sexual predator who is intrigued by the sexual harassment. The approaches used are controlled only by the child’s imagination and access to technology. A person can be a cyber-bully one-minute and a victim the next. Cyber bullying can sometimes be clear-cut. If someone leaves an overtly cruel text messages or cruel notes posted to a Website. They can also be less obvious, like impersonating the victim online or posting someone’s personal information or videos meant to hurt or if it...

Words: 2732 - Pages: 11

Free Essay

Cyber Bullying

...as it can be used for mischief, not only by certain adults but also by the young people themselves; a phenomenon known as Cyber Bullying. Young people to bully peers can use emails, texts, chats, phones, websites and cameras. It is now a worldwide problem with countless occurrences reported and has yet to get the attention it merits and remains nearly vague from research works. This paper reconnoiters definitional problems, the incidences and potential outcomes of cyber bullying, as well as deliberating possible intervention and prevention stratagems. While most youngsters seem conscious of what cyberbullying involves, occurrences of cyberbullying in educational institutions seem to be minimal. Although students have entree to many technologies, the mainstream seem not to participate in bullying over the internet. However, persons who are cyber bullies are also likely to be targets of cyberbullying. Cyber Bullying Cyber bullying is becoming a crisis with the progression of social media tools. Should government create new laws to protect the people who are being targeted? This is just but one of the many questions people seek for answers. Cyber bullying has been in existence since time in memorial but has gained fame and become more wide spread with the introduction of the internet some few years back. It is common to see instances of cyber bullying nowadays unlike in the past, children are no longer the victims but everyone is; be it old or young, the crime has experienced an...

Words: 1542 - Pages: 7

Premium Essay

Cyber Bullying- Should Schools Be Held Responsible

...Cyber Bullying- Should Schools be Held Responsible Abstract We’ve all heard the saying “stick and stones can break my bones, but words can never hurt me.” Sure words don’t hurt physically, but to those who have been or are currently victims of cyberbullying words can be the difference between life and death. Technology such as smart phones, tablets and the internet allows students spend more time being connected. With this cyberbullying is becoming more frequent. Texting, instant messaging and over the social networks are just a few ways that the cyberbullies can reach their victims. A few of the forms of cyberbullying are harassment, cyberstalking and impersonating their victim. Cyber bullying has become a serious problem amongst teens. The victim can begin to feel inadequate and self-conscious causing the victim to become depressed to the point of committing suicide. In the past the cyberbully had no consequences to their action. Two such cases are addressed in this paper. States are now passing laws to address this issue and making schools responsible for developing anti-bullying policies. Cyber bullying- Should Schools be held responsible Matt was on both the Citizenship and Honor Rolls in Middle School. Voted by his eighth grade classmates to have the best smile, the best personality, and most likely to become an actor (Eppling, 2006). Taylor was a soccer player, a soloist in the school choir, and on the volleyball team. Although she was taller and a little...

Words: 2931 - Pages: 12

Premium Essay

How Not to Be a Victim of Cyberbullying

...How not to be a victim of Cyberbullying Abstract: Bullying is a persistent willful act by an individual or a group to intimidate or hurt a weaker-than-bully victim. Cyber bullying in the social media is a very dangerous problem, especially because the major users of social networks are youngsters and adolescents who themselves are the top targets of conventional bullying. Bullying of any form causes deep scars in the psyche of the victim and at times may be even fatal. It is important to understand the causes, consequences of bullying which this report addresses. Introduction to the problem Bullying is generally an aggressive act intentionally designed to cause hurt, bodily/mental, to a person of lower power strata. Cyber bullying is a version of bullying in a digital world, where almost no bodily harm is met. In the United States, cyber-bullying is legally defined as “cyber-bullying could be limited to posting rumors or gossips about a person in the internet bringing about hatred in other’s minds; or it may go to the extent of personally identifying victims and publishing materials severely defaming and humiliating them” (Definitions.uslegal.com, 2015). Other definition of cyberbullying (Menesini & Spiel, 2012), has been more general not restricted to legal point of view, incorporating the electronic nature of the issue and specifically outlining the methods used for such bullying. Statistics indicate that between a substantial proportion (20-40%) of the children...

Words: 2881 - Pages: 12

Free Essay

Argumentation Paper

...Social Media vs. Freedom of Speech Since the Bill of Rights was ratified in 1791, freedom of speech has been a hallmark of American democracy and freedom. Obviously the U.S. in 2014 is a radically different place from the nation the Founders knew. Yet, the U.S. is governed essentially by the same Constitution adopted in 1787. There have been times when our freedom of speech was tested. The Alien and Sedition Act of 1790 prevented writing against the government and newspapers were censored during the Civil War, but these were later struck down in favor of freedom of speech. The lines seemed fairly well drawn until 10 years ago when people could express themselves freely, publicly, and privately if it was not slander. The growth and scope of social media has challenged this. To remain true to our democratic fathers, there must be a stand against denials of free speech and the ability to express opinions on all manner of subjects. In the early 2000’s employers began to look at employees posts online and to fire or not hire because of what was said in a private chat. There has always been bullying especially in the teen years. Young people who were harassed could go home and escape the taunts. They were safe until school the next day. Since the advent of social media, there is not even a safe haven at home or on holiday or at night. Text messaging, tweets, and facebook are invasive every minute of the day. There is no escape for the bullied child. Some teens have been unable...

Words: 894 - Pages: 4

Premium Essay

Ap Psychology

...Tommy Collins Period 5 English 10 Student’s vs Technology According to Daniel Willingham, the average student is on his or her phone for up to 8 hours a day. Technology is everywhere, but it shouldn’t be in classrooms. The reason being is, because of student behavior, the device being non-motivating, and a decrease of productivity. Student behavior is a major reason why cell phones shouldn’t be in classrooms. Technology use increases the risk of cyberbullying among students. In 2011, 28 percent of students reported being bullied; nine percent of those were cyberbullied (Simmons). When cyber bullying occurs a students are under constant stress and depression. Students who undergo cyber bullying have a very low self-esteem, compared to those with little or no experience to cyber bullying (Simmons). Cell phones can also be non-motivating to students. For example, certain music types are distracting based on what the student is listening too. By multi tasking there is a risk on the student’s accuracy and speed (Willingham). When a student is trying to multi task, he or she does their work not as well as they would do if one at a time. For example, a student may have work due the next day and will try to multi task, but won’t get the same results if they did one at a time. Devices will be a major decrease of productivity if in classrooms. According to Willingham, twenty five percent of students report watching TV or chatting...

Words: 452 - Pages: 2

Premium Essay

School Law

...Bullying and cyberbullying cases have been increasing each year. The number of suicides related to bullying has increased as well. I have always been interested in the school’s liability in bullying cases. I have also wanted to know how responsible the courts held the bully for the victim’s emotional distress, or death. With these inquisitive thoughts, I continued to question whether or not the bullying laws actually protected the recipient of the bullying, or if they were put in place to not hold schools or districts responsible for the suffering these children went through. In my research I have found there is no federal law that addresses bullying directly. However, schools have an obligation to resolve the harassment, majority of bullying concerns aren’t adequately resolved. Sometimes the bullying escalates after the bully is reprimanded for their actions. When families feel the issue hasn’t been resolved and/or the bullying has worsened, they are able to file a lawsuit against the school or school district. Although there aren’t any federal laws against bullying, there are instances in which bullying overlaps with discrimination which are covered under federal civil rights laws. These laws are enforced by the U.S. Department of Education and the Department of Justice. Whether it the harassment is referred to as bullying, hazing, or teasing, schools are obligated to provide a safe learning environment for all students. This is to be done regardless of race...

Words: 2524 - Pages: 11

Premium Essay

Media

...Carel Bou Maroun Research Paper on Media ENG 203 – Layla Al Kadi Harmouch Introduction: Everywhere you go, you hear people talking about Media. Media is the plural of Medium. But what is a medium? A medium is a mean of mass communication. How can you communicate with a big number of people without what we call a medium, such as newspapers, television, or the Internet for example? Simply, you can’t. Media are elements that help to communicate messages. Any element. In a classroom for example, media are the walls, the board, and even the people inside it. The term mass communications alludes to any type of correspondence that at the same reaches a huge number of people, including yet not constrained to radio, TV, daily papers, magazines, bulletins, movies, record. (Wimmer and Dominick, 1983.) As we all know it, some media are more active and used than others today. For instance, we can think about televisions or mobile phones. But we all know that television is not the first technology used to spread messages. “Media are the result of technology.” (Avery and McCain, 1982.) Day by day, new technologies are emerging and the “old” ones are being forgotten. This is what our modern-day world looks like. It’s constantly changing, moving, evolving… The innovation and models for creating and conveying media substance are always advancing. (Croteau, David, Hoynes, and Milam, 2003.) Media are also socialization agents. You learn...

Words: 2901 - Pages: 12

Premium Essay

Social Media Influence

...of people you might not even know. Social media is a term used to describe the interaction between groups or individuals in which they produce, share, and sometimes exchange ideas over the internet and in virtual communities. The impact of social media on young adolecents is significant, children are growing up surrounded by mobile devices and interactive social media sites such as Facebook, Instagram, Twitter, and Snapchat which has made the social media a vital aspect of their life. Social media is transforming the manner in which teenages interact with their parents, peers, as well as how they make use of technology. If not used properly however social media can be used in a negative context. My niece has been a victim of social cyberbullying on 2 of the 3 sites named above. She is a gorgeous 15yr old girl with full potential to take life by storm. Unfortunately, a group of her peers didn’t feel the same about her they not only shamed her at school but would post things on Facebook and Instagram about her. I believe the infatuation today’s world has with posting everything on a social media site is a little out of hand. It causes so much doubt about oneself, questions am I good enough? Could my life be more? Because they compare their own strides to those of others they see on Instagram, Facebook, or any of the other sites mentioned above. My niece dealt with her own struggles believing she was the ugly duckling because of Instagram shaming every time she would...

Words: 1736 - Pages: 7

Premium Essay

Is Social Network Affecting Society

...Social networking sites allow people to stay in touch like never before. However, people who are using them spend too much time on these social networks that it begins to interfere with their lives. Are social networks good for our society? While it is true that social networking is educational, people should regulate the amount of time spent on social network because it’s addicting or obsessive, eliminates privacy, and it’s affecting the way we communicate. To begin with, Social networks may be filled with negativity it’s also a way to improve information literacy skills. This skill is the ability to recognize the quality of information. Social networks expands exposure to information which allows people the chance to analyze, create, and evaluate information to develop critical thinking skills. With social networks and teenagers, this is important as the most impactful part of social networks. When collecting information, people can learn to blend it into ideas and present it. Information literacy alone encourages critical thinking, and skepticism. Moreover, social networks like Facebook increases communication. Facebook offers a great program for teachers to build study groups. Professors/teachers can also utilize Facebook to set up projects or lesson plans. With Facebook students can collaborate easily on assignments and the teacher is more accessible. Another advantage is that the students who are shy can direct message the teacher to for questions. With professors/teachers...

Words: 1031 - Pages: 5

Premium Essay

Paper

...adoption Adoption AIDS AIDS (Disease); AIDS (Disease) in children AIDS (Disease); Pediatric AIDS (Disease) Alzheimer's disease Alzheimer's disease Alzheimer's disease Animal rights Animal experimentation; Animal rights Animal experimentation; Animal rights Anorexia and Bulimia SEE Eating disorders Athletes and drugs Doping in Sports Drugs and Athletes Banking Bailout (2008) Bailout Battered women SEE ALSO Wife Abuse Abused women Conjugal abuse Birth control Birth control; Contraception Birth control; Contraception Black Reparations Movement Reparations; Slavery--Law and legislation Reparations Body language Body language; Gesture; Nonverbal communication Nonverbal communication Bullying Bullying Bullying; Cyberbullying Business ethics Business ethics; Corporations - Corrupt practices Business ethics; Business enterprises, Corrupt practices Capital punishment (Death Penalty) Capital punishment; Death row Capital punishment Cancer Cancer--Prevention SEE ALSO types of cancer, such asBreast--Cancer Neoplasms--Prevention and Control;Cancer Treatment Censorship SEE ALSO Freedom of the Press Censorship; Prohibited books Censorship; USA Patriot Act 2001-US AND Civil liberties; Filtering software;Banned books Child abuse SEE ALSO Domestic violence Abused children; Child abuse Child abuse Child custody/support Custody of children Child custody Children of alcoholics Children of alcoholics;...

Words: 1762 - Pages: 8

Premium Essay

Gender Exploitation in Social Networks

...GENDER EXPLOITATION IN SOCIAL NETWORKS A Research Proposal presented to The Faculty of College of Arts and Sciences Cebu Technological University – Main Campus In Partial Fulfillment Of the Requirements for DC 4117 (Manuscript Planning and Preparation) For the Degree Bachelor of Science in Development Communication Jievah Cris Codeniera Cantiveros Mark Anthony Dumaguit Gumera Genevive Jakosalem Monteceno 2013 Chapter I THE PROBLEM AND ITS SCOPE INTRODUCTION Rationale of the Study The 20th century has been a remarkable era in the communication field. The entertainment and information industries have been developed through motion pictures, sound recordings, print serials, radio, television, computers, video games and the Internet. All these are now universally available and can distribute any form of content imaginable (Grimes et al., 2008). While the flow of technology continues to advance, humanity cannot help it but go along with it. The more people are inclined to the new technological advancements, the more they struggle with its various advantages and disadvantages. One of these technologies is the Internet. The Internet is a data communication system that provides connectivity between computers. It encompasses a variety of electronic forms of communication such as moving images, audio transmission, electronic mail, online chat, file transfer and sharing, and databases, some of which are live and in real time. Interaction with other individuals...

Words: 4999 - Pages: 20

Premium Essay

Effects of Social Networking

...SETA survey of representatives in Tribunal cases 2008 t Research Paper Workplaces and Social Networking The Implications for Employment Relations ns Ref: 11/11 2000 1 0 Andrea Broughton, Tom Higgins, Ben Hicks and Annette Cox (The Institute for Employment Studies) For any further information on this study, or other aspects of the Acas Research and Evaluation programme, please telephone 020 7210 3673 or email research@acas.org.uk Acas research publications can be found at www.acas.org.uk/researchpapers ISBN 978-1-908370-07-5 Workplaces and Social Networking The Implications for Employment Relations Andrea Broughton Tom Higgins Ben Hicks Annette Cox Prepared for Acas by: Institute for Employment Studies Sovereign House Church Street Brighton BN1 1UJ UK T: 01273 763400 F: 01273 763401 www.employment-studies.co.uk Copyright © 2009 Acas The Institute for Employment Studies The Institute for Employment Studies is an independent, apolitical, international centre of research and consultancy in public employment policy and organisational human resource issues. It works closely with employers in the manufacturing, service and public sectors, government departments, agencies, and professional and employee bodies. For 40 years the Institute has been a focus of knowledge and practical experience in employment and training policy, the operation of labour markets, and human resource planning and development. IES is a not-for-profit organisation which has over...

Words: 16924 - Pages: 68

Premium Essay

Computer Crime Journal

...Journal - Week 1, Due 09.28.2014 Beginner’s Guide to Internet Protocol (IP) Addresses Beginner’s Guide to Internet Protocol (IP) Addresses. (2011, Mar. 04). Retrieved on September 26. 2014 from ICANN site: https://www.icann.org/resources/files/ip-addresses-beginners-guide-2011-03-04-en The Beginner’s Guide to IP Addresses is a publication by the Internet Corporation for Assigned Names and Numbers (ICANN), the private sector, non-profit corporation which assumes responsibility for IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions. The publication is part of the Beginner’s Guide series, published in the interest of educating new users about internet issues. The document details IP addresses, why we need them, protocol version history, implementation/distribution methods, and how these topics affect users. This particular concept is not new to me, but reading the document provided a ‘refresher course’ on topics that I have not recently studied. I use this information and technology on a daily basis - but through the course of use it is easy to step away from the fundamental details. In follow up reading, I find myself curious about the success of implementing IPv6 addressing. I know that it can be done, but have not seen a great deal of evidence that it is being done. As of June, 2014 the percentage of users accessing Google via IPv6 reached a milestone. 4%. While the 4% mark...

Words: 7665 - Pages: 31