Cyber Bullying Outline And Thesis Analysis

Last Updated: 20 Apr 2022
Essay type: Thesis
Pages: 4 Views: 960

Actions that use information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm another or others. •use of communication technologies for the intention of harming another person •use of internet service and mobile technologies such as web pages and discussion groups as well as instant messaging or SMStext messaging with the intention of harming another person. Examples of what constitutes cyberbullying include communications that seek to intimidate, control, manipulate, put down, falsely discredit, or humiliate the recipient.

The actions are deliberate, repeated, and hostile behavior intended to harm another. Cyberbullying has been defined by The National Crime Prevention Council: “When the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person. " A cyberbully may be a person whom the target knows or an online stranger. A cyberbully may be anonymous and may solicit involvement of other people online who do not even know the target.

The practice of cyberbullying is not limited to children and, while the behavior is identified by the same definition when practiced by adults, the distinction in age groups sometimes refers to the abuse as cyberstalking or cyberharassment when perpetrated by adults toward adults.  Common tactics used by cyberstalkers are performed in public forums, social media or online information sites and are intended to threaten a victim's earnings, employment, reputation, or safety. Behaviors may include encouraging others to harass the victim and trying to affect a victim's online participation.

Order custom essay Cyber Bullying Outline And Thesis Analysis with free plagiarism report

feat icon 450+ experts on 30 subjects feat icon Starting from 3 hours delivery
Get Essay Help

Many cyberstalkers try to damage the reputation of their victim and turn other people against them. Cyberstalking may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass.  A repeated pattern of such actions and harassment against a target by an adult constitutes cyberstalking. Cyberstalking often features linked patterns of online and offline behavior. There are consequences of law in offline stalking and online stalking, and cyber-stalkers can be put in jail.

Cyberstalking is a form of cyberbullying.  Comparison to Traditional Bullying Certain characteristics inherent in online technologies increase the likelihood that they will be exploited for deviant purposes. Unlike physical bullying, electronic bullies can remain virtually anonymous using temporary email accounts, pseudonyms in chat rooms, instant messaging programs, cell-phone text messaging, and other Internet venues to mask their identity; this perhaps frees them from normative and social constraints on their behavior. Additionally, electronic forums often lack supervision.

While chat hosts regularly observe the dialog in some chat rooms in an effort to police conversations and evict offensive individuals, personal messages sent between users (such as electronic mail or text messages) are viewable only by the sender and the recipient, thereby outside the regulatory reach of such authorities. In addition, when teenagers know more about computers and cellular phones than their parents or guardians, they are therefore able to operate the technologies without concern that a parent will discover their experience with bullying (whether as a victim or offender).

Another factor is the inseparability of a cellular phone from its owner, making that person a perpetual target for victimization. Users often need to keep their phone turned on for legitimate purposes, which provides the opportunity for those with malicious intentions to engage in persistent unwelcome behavior such as harassing telephone calls or threatening and insulting statements via the cellular phone’s text messaging capabilities. Cyberbullying thus penetrates the walls of a home, traditionally a place where victims could seek refuge from other forms of bullying.

Compounding this infiltration into the home life of the cyberbully victim is the unique way in which the internet can "create simultaneous sensations of exposure (the whole world is watching) and alienation (no one understands). "For youth who experience shame or self-hatred, this effect is dangerous because it can lead to extreme self isolation. One possible advantage for victims of cyberbullying over traditional bullying is that they may sometimes be able to avoid it simply by avoiding the site/chat room in question.

Email addresses and phone numbers can be changed; in addition, most e-mail accounts now offer services that will automatically filter out messages from certain senders before they even reach the inbox, and phones offer similar caller ID functions. However, this does not protect against all forms of cyberbullying; publishing of defamatory material about a person on the internet is extremely difficult to prevent and once it is posted, many people or archiving services can potentially download and copy it, at which point it is almost impossible to remove from the Internet.

Some perpetrators may post victims' photos, or victims' edited photos like defaming captions or pasting victims' faces on nude bodies. Examples of famous forums for disclosing personal data or photos to "punish" the "enemies" include the Hong Kong Golden Forum, Live Journal, and more recently JuicyCampus. Despite policies that describe cyberbullying as a violation of the terms of service, many social networking Web sites have been used to that end.

Cite this Page

Cyber Bullying Outline And Thesis Analysis. (2016, Sep 03). Retrieved from https://phdessay.com/cyber-bullying-outline-and-thesis-2/

Don't let plagiarism ruin your grade

Run a free check or have your essay done for you

plagiarism ruin image

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Save time and let our verified experts help you.

Hire writer