Cyber Bullying

Read Complete Research Material

CYBER BULLYING

Cyber Bullying



Cyber Bullying

Introduction

Cyberbullying generally encompasses any kind of harassing or bullying conduct that occurs through electronic communication channels or devices, including e-mail, Web pages, blogs, online video sharing sites, social networking services, cell phones, and camcorders. Cyberbullying is a fairly recent educational and legal concern and is fueled by the ever-increasing affordability and ease-of-use of digital technologies. This entry describes the behavior and some policy guidelines.

The online cruelty and harassment uniquely associated with cyber bullying has recently become popular among college students due largely to the virtual anonymity of online communication, which makes it extremely difficult to identify bullies or instigators of online bullying or harassment (Brady, 2008, 92).

Cyberbullying can take many forms. For example, a harassing message can be transmitted as a blog post, cell phone text message, or Web page comment. Similarly, bullying behavior can occur as mocking videos, pictures with denigrating captions, hurtful user-created cartoons or animations, and so on. The very tools that empower numerous legitimate uses also enable harassing behaviors.

One of the biggest challenges facing educators who are trying to address cyberbullying issues is the difficulty of monitoring all of the various communication methods that are available to students and employees. Shutting down a Web page or blog is not a viable solution when individuals can easily repost offending material on an infinite variety of free Web site or blog hosts. Tracking down an anonymous e-mail could require a court order and still might result in failure. Even finding harassing or bullying content within the vast ocean of online material can be quite difficult; educators typically learn about hurtful messages from victims or other students and employees.

The ability of individuals to anonymously send or post material online is another challenge for educators. For example, if a student receives a harassing text message on her cell phone from an anonymous antagonist, it can be nearly impossible to track down the offender. Similarly, Internet service providers and online companies often provide individuals with the ability to either keep their identities secret or to create alternative, false identities. Cracking the veil of anonymity poses significant difficulties for educators attempting to address cyberbullying issues.

Discussion and Analysis

In October 2006, the world was introduced to a new type of crime known as cyberbullying. Similar to cyberbullying , cyberbullying is typically described as continued harassment and torment with the use of an electronic communications device, most often via the Internet. The main difference is that cyberbullying most often involves adolescents as victims and/or offenders. While cyberbullying had been discussed long before October 2006, it was the case of Megan Meier that really brought it to the attention of the American public.

Earlier that year, 13-year-old Megan Meier befriended whom she thought was a teenage boy named Josh on MySpace. For a while, the correspondence was mutually friendly, as the two exchanged flirtatious messages. However, events suddenly took a turn for the worse when Josh, along with several other teenagers, began posting very derogatory comments about ...
Related Ads
  • Cyberbullying
    www.researchomatic.com...

    Cyberbullying , Cyberbullying Research ...

  • Cyberbullying
    www.researchomatic.com...

    Cyberbullying , Cyberbullying Essay wri ...

  • Cyberbullying
    www.researchomatic.com...

    Cyberbullying , Cyberbullying Essay wri ...

  • Cyber Bullying
    www.researchomatic.com...

    Cyber Bullying , Cyber Bullying Resear ...

  • Cyber Bullying
    www.researchomatic.com...

    It has been reported that more than 13,000,000 child ...