Difference between revisions of "Cyberbullying"

From SI410
Jump to: navigation, search
(More damaging)
Line 1: Line 1:
'''Cyberbullying''' is defined as the use of any technological means of communication, such as email, text messaging, websites, or discussion forums, to intentionally hurt, defame, or intimidate another person.<ref name="Cyberbullying">Cyberbullying – teen violence statistics. (2009).  Retrieved from http://www.teenviolencestatistics.com/content/cyberbullying.html</ref>  It can be in the following forms: a treat of violence, hate speach, harrassment, peer pressure, bribery, psychological abuse or extortion.<ref name="types">Types. Retrieved from http://www.safetyweb.com/stop-cyber-bullying</ref>  As technology immerses itself further into the lives of society, cyberbullying can follow a victim anywhere through a cell phone, computer and other emerging communication devices.<ref>Holladay - missing reference?</ref> Compared to traditional bullying, cyberbulling occurs because the increase use of technology had made bullying even easier with chat rooms and social networking sites. Nevertheless, cyber bullying is just as unethical as traditional bullying. The ubiquitous nature of cyberbullying has made it into an important social issue, and has led to the formation of initiatives such as [http://www.stoptherage.org/ Stop the Rage].
+
'''Cyberbullying''' is defined as the use of any technological means of communication, such as email, text messaging, websites, or discussion forums, to intentionally hurt, defame, or intimidate another person.<ref name="Cyberbullying">Cyberbullying – teen violence statistics. (2009).  Retrieved from http://www.teenviolencestatistics.com/content/cyberbullying.html</ref>  Cyberbullying can occur in the following forms: a threat of violence, hate speach, harrassment, peer pressure, bribery, psychological abuse or extortion.<ref name="types">Types. Retrieved from http://www.safetyweb.com/stop-cyber-bullying</ref>  As technology immerses itself further into the lives of society, cyberbullying can follow a victim anywhere through a cell phone, computer and other emerging communication devices.<ref>Holladay - missing reference?</ref> Compared to traditional bullying, cyberbullying occurs because the increased use of technology had made bullying even easier with chat rooms and social networking sites. Nevertheless, cyberbullying is just as unethical as traditional bullying. The ubiquitous nature of cyberbullying has made it into an important social issue, and has led to the formation of initiatives such as [http://www.stoptherage.org/ Stop the Rage].
  
 
([[Tops & Categories|Back to index]])
 
([[Tops & Categories|Back to index]])
Line 18: Line 18:
 
   
 
   
 
===Widespread===
 
===Widespread===
Traditional bullies has to let their victims see them and could only gain supposed from friends around them. Cyberbullies on the other hand, can threaten or humiliate their victims without their identity being knows to an audience of thousands of people. Using social networking sites, a cyberbully can post stories to a large number of people with minimal effort. There are potentially an unlimited number of witnesses.  
+
Traditional bullies have to let their victims see them and can only gain supposed from friends around them. Cyberbullies, on the other hand, can threaten or humiliate their victims without their identity being known to an audience of thousands of people. Using social networking sites, a cyberbully can post stories to a large number of people with minimal effort. There are potentially an unlimited number of witnesses.  
 
   
 
   
 
===Location===
 
===Location===
It is easier to be cruel using technology because a bully will not feel the repercussions of their actions in a timely manner. They do not get the social cues from the victim letting them know when they have gone too far like crying, and facial expressions. Those around them do not a chance to ostracize or scold the bully due to the lack of an audience. The lack of normal social cues from others enhances the victimization.
+
It is easier to be cruel using technology because a bully will not feel the repercussions of their actions in a timely manner. They do not get the social cues from the victim, such as crying or pained facial expressions, that let them know they have gone too far. Those around them do not a chance to ostracize or scold the bully due to the lack of an audience. The lack of normal social cues from others enhances the victimization.
  
 
===More damaging===
 
===More damaging===
Cyberbullying is more threatening than traditional bullying because the potential for damaging statements is greater. With cyberbullying, victimization is more prevalent ad the dangerous effects of bullying are amplified. Cyberbullying communications are difficult to completely delete. In turn, a victim has the same opportunity to lash out at their bully, continuing a cycle of victimization.
+
Cyberbullying is more threatening than traditional bullying because the potential for damaging statements is greater. With cyberbullying, victimization is more prevalent and the dangerous effects of bullying are amplified. Cyberbullying communications are difficult to completely delete. In turn, a victim has the same opportunity to lash out at their bully, continuing a cycle of victimization.
  
 
===Characteristics===
 
===Characteristics===
Cyberbullies share many of the same characteristics as those of traditional bullies. Both parties are know to have poor relationships with parents or guardians.  
+
Cyberbullies share many of the same characteristics as those of traditional bullies. Both parties are known to have poor relationships with parents or guardians.  
  
 
Cyberbullies are also more likely to:  
 
Cyberbullies are also more likely to:  
 
*be victims of traditional bullying
 
*be victims of traditional bullying
*be frequent and daily internet users
+
*be frequent and daily Internet users
 
*be involved with harmful substances
 
*be involved with harmful substances
 
*be responsible for other delinquent behavior <ref name="Feinberg"/>
 
*be responsible for other delinquent behavior <ref name="Feinberg"/>
Line 47: Line 47:
 
==Platforms==
 
==Platforms==
  
Cyberbullying can occur anywhere technology allows. Examples include social media sites such as [[Wikipedia:Facebook|Facebook]] and [[Wikipedia:Twitter|Twitter]], as well as cell phones, chatrooms, forums, blogs etc. Social media sites stand as the most common instruments employed by cyberbullies to harm their victims. Social media sites, with their sense of anonymity granted as a result of the complex social organization found within them, allows for users to speak up against bullying that they see taking place.  
+
Cyberbullying can occur anywhere technology allows it. Examples include social media sites such as [[Wikipedia:Facebook|Facebook]] and [[Wikipedia:Twitter|Twitter]], as well as cell phones, chat rooms, forums, blogs etc. Social media sites stand as the most common instruments employed by cyberbullies to harm their victims. Social media sites, with their sense of anonymity granted as a result of the complex social organization found within them, allows for users to speak up against bullying that they see taking place.  
  
 
== Victims ==
 
== Victims ==
  
Victims of cyberbullying are most commonly vulnerable members of the population being examined. They are often also victims of traditional bullying. They often experience isolation or exclusion from other peers because of a lack of popularity or other factors. Victims often suffer from depression, anxiety, and low self confidence.<ref name="Feinberg"/> Because of these factors, victims are more likely to experience cyberbullying because they seek attention and/or acceptance from peers and hence are easier to manipulate. They are also apathetic in observing internet safety strategies, in relying on their parents for guidance or help, and in reporting abusive situations.<ref name="Feinberg"/>
+
Victims of cyberbullying are most commonly vulnerable members of the population being examined. They are often also victims of traditional bullying. They often experience isolation or exclusion from other peers because of a lack of popularity or other factors. Victims often suffer from depression, anxiety, and low self confidence.<ref name="Feinberg"/> Because of these factors, victims are more likely to experience cyberbullying because they seek attention and/or acceptance from peers and hence are easier to manipulate. They are also apathetic in observing Internet safety strategies, in relying on their parents for guidance or help, and in reporting abusive situations.<ref name="Feinberg"/>
  
 
== Effects ==
 
== Effects ==
Line 58: Line 58:
  
 
== Prevention and Solutions ==
 
== Prevention and Solutions ==
There are no magic solutions to combat cyberbullying and other treats over the Internet. However, people can take preventative measures to reduce any risk that exsists. On the internet, there are many public displays of connections. For example, on [[Wikipedia:Facebook|Facebook]], the list of friends people have allows access to friends profiles and then to friends of friends profiles. Keeping friend lists on Facebook accurate and up to date is an important way to avoid unwanted encounters. Cyberbullies seek a reaction from the people they harass. When they fail to get one, they often give up.  
+
There are no magic solutions to combat cyberbullying and other threats over the Internet. However, people can take preventative measures to reduce any risk that exsists. On the Internet, there are many public displays of connections. For example, on [[Wikipedia:Facebook|Facebook]], the list of friends people have allows access to friends profiles and then to friends of friends profiles. Keeping friend lists on Facebook accurate and up to date is an important way to avoid unwanted encounters. Cyberbullies seek a reaction from the people they harass. When they fail to get one, they often give up.  
  
 
== Ethics==
 
== Ethics==
Line 65: Line 65:
  
 
==Cases==
 
==Cases==
[[Wikipedia:Phoebe Prince|Phoebe Prince]] was a 15 year old girl who in early 2010 hung herself after months of bullying and ridicule that occurred both in person and over the popular social media site Facebook<ref>Setoodeh, R. (2010, October 18). Phoebe prince’s legacy: a town tries to heal. People. Retrieved from http://www.people.com/people/article/0,,20432959.html </ref>.
+
[[Wikipedia:Phoebe Prince|Phoebe Prince]] was a 15 year old girl who in early 2010 hung herself after months of bullying and ridicule that occurred both in person and over the popular social media site Facebook<ref>Setoodeh, R. (2010, October 18). Phoebe Prince’s legacy: a town tries to heal. People. Retrieved from http://www.people.com/people/article/0,,20432959.html </ref>.
  
 
[[Wikipedia:Megan Meier|Megan Meier]] was a 13 year old girl who committed suicide by hanging a few weeks short of her 14th birthday. She was humiliated via hurtful messages through MySpace from a fake profile created by a fellow classmate and the classmate’s mother. <ref name="Anon">Anonymous. Dudnikov v. Chalk & Vermilion V. Cyberlaw - Additional Developments</ref>
 
[[Wikipedia:Megan Meier|Megan Meier]] was a 13 year old girl who committed suicide by hanging a few weeks short of her 14th birthday. She was humiliated via hurtful messages through MySpace from a fake profile created by a fellow classmate and the classmate’s mother. <ref name="Anon">Anonymous. Dudnikov v. Chalk & Vermilion V. Cyberlaw - Additional Developments</ref>

Revision as of 15:05, 8 December 2011

Cyberbullying is defined as the use of any technological means of communication, such as email, text messaging, websites, or discussion forums, to intentionally hurt, defame, or intimidate another person.[1] Cyberbullying can occur in the following forms: a threat of violence, hate speach, harrassment, peer pressure, bribery, psychological abuse or extortion.[2] As technology immerses itself further into the lives of society, cyberbullying can follow a victim anywhere through a cell phone, computer and other emerging communication devices.[3] Compared to traditional bullying, cyberbullying occurs because the increased use of technology had made bullying even easier with chat rooms and social networking sites. Nevertheless, cyberbullying is just as unethical as traditional bullying. The ubiquitous nature of cyberbullying has made it into an important social issue, and has led to the formation of initiatives such as Stop the Rage.

(Back to index)

An example of cyberbulling in which the bully enters the victim's home and types their insult on Wordpad


Background

While traditional bullying is not a new concern, the emergence of cyberbullying brings to light many new methods of harassment and questions about solutions to stop the hurtful behavior. [4] Cyberbullies feel they do not have to face the consequences of their actions in the online environment and often say things they would not normally say in person. [4] One environment in particular where ramifications of cyberbullying are seen is in schools, as any form of bullying is most commonly displayed between children and adolescents. This generates discussion of ethical responsibility because the act of cyberbullying does not occur in the school, but the effects are very evident in the environment. [4]The idea of cyberbullying can also be extended to include hurtful tabloid talk and exploitation of celebrities.

Cyberbullying vs. Traditional Bullying

While traditional bullying in schoolyards or hallways has been a long problem, cyberbullying creates new methods of harassment with a much greater effect.

Anonymity

There was a time when all bullying happened face to face. However with Internet, people can bully anonymously through social networking sites. A cyberbully can cloak his or her identity using anonymous email addresses or pseudonymous screen names. The victim usually doesn’t know who is bullying them or why they are being bullied.

Widespread

Traditional bullies have to let their victims see them and can only gain supposed from friends around them. Cyberbullies, on the other hand, can threaten or humiliate their victims without their identity being known to an audience of thousands of people. Using social networking sites, a cyberbully can post stories to a large number of people with minimal effort. There are potentially an unlimited number of witnesses.

Location

It is easier to be cruel using technology because a bully will not feel the repercussions of their actions in a timely manner. They do not get the social cues from the victim, such as crying or pained facial expressions, that let them know they have gone too far. Those around them do not a chance to ostracize or scold the bully due to the lack of an audience. The lack of normal social cues from others enhances the victimization.

More damaging

Cyberbullying is more threatening than traditional bullying because the potential for damaging statements is greater. With cyberbullying, victimization is more prevalent and the dangerous effects of bullying are amplified. Cyberbullying communications are difficult to completely delete. In turn, a victim has the same opportunity to lash out at their bully, continuing a cycle of victimization.

Characteristics

Cyberbullies share many of the same characteristics as those of traditional bullies. Both parties are known to have poor relationships with parents or guardians.

Cyberbullies are also more likely to:

  • be victims of traditional bullying
  • be frequent and daily Internet users
  • be involved with harmful substances
  • be responsible for other delinquent behavior [4]

Motivations

Cyberbullies find many different reasons for their actions:

  • protection of another friend under attack
  • establishing power by instilling fear
  • invincibility through anonymity
  • technological manipulation skills
  • boredom
  • attack of a weaker peer [4]

Platforms

Cyberbullying can occur anywhere technology allows it. Examples include social media sites such as Facebook and Twitter, as well as cell phones, chat rooms, forums, blogs etc. Social media sites stand as the most common instruments employed by cyberbullies to harm their victims. Social media sites, with their sense of anonymity granted as a result of the complex social organization found within them, allows for users to speak up against bullying that they see taking place.

Victims

Victims of cyberbullying are most commonly vulnerable members of the population being examined. They are often also victims of traditional bullying. They often experience isolation or exclusion from other peers because of a lack of popularity or other factors. Victims often suffer from depression, anxiety, and low self confidence.[4] Because of these factors, victims are more likely to experience cyberbullying because they seek attention and/or acceptance from peers and hence are easier to manipulate. They are also apathetic in observing Internet safety strategies, in relying on their parents for guidance or help, and in reporting abusive situations.[4]

Effects

The main effect of cyberbullying is significant emotional hurt. Victims have trouble in school, including poor concentration, poor class performance, and tardies or absences because of low self confidence, depression, and anxiety.[4] Because cyberbullies are commonly anonymous, victims can become hypersensitive and paranoid in their environment. [4] Some serious documented effects include violence, severe dysfunction, and even suicide.[4]

Prevention and Solutions

There are no magic solutions to combat cyberbullying and other threats over the Internet. However, people can take preventative measures to reduce any risk that exsists. On the Internet, there are many public displays of connections. For example, on Facebook, the list of friends people have allows access to friends profiles and then to friends of friends profiles. Keeping friend lists on Facebook accurate and up to date is an important way to avoid unwanted encounters. Cyberbullies seek a reaction from the people they harass. When they fail to get one, they often give up.

Ethics

Bullying in any form is considered an unethical action. Because of the pervasive nature of technology in people's lives, a very efficient outlet for harassment is created in a technological environment with the birth of social networking sites and other communication portals. Techonology progresses faster and easier, but our moral principles are no different from what existed before; rather there are the same ethical issues just on a larger scale. For many victims of bullying, the virtual environment is only another place for them to be bullied. Anonymity online has made it easier for bullies to target their victims because at times they are able to generate fake profiles on multiple social networking sites to target their victims.

Cases

Phoebe Prince was a 15 year old girl who in early 2010 hung herself after months of bullying and ridicule that occurred both in person and over the popular social media site Facebook[5].

Megan Meier was a 13 year old girl who committed suicide by hanging a few weeks short of her 14th birthday. She was humiliated via hurtful messages through MySpace from a fake profile created by a fellow classmate and the classmate’s mother. [6]

Tyler Clementi was an 18 year old student at Rutgers University who committed suicide in 2010 by jumping off of the George Washington Bridge after a webcam video displaying him kissing another male classmate was posted on the Internet.

References

  1. Cyberbullying – teen violence statistics. (2009). Retrieved from http://www.teenviolencestatistics.com/content/cyberbullying.html
  2. Types. Retrieved from http://www.safetyweb.com/stop-cyber-bullying
  3. Holladay - missing reference?
  4. 4.0 4.1 4.2 4.3 4.4 4.5 4.6 4.7 4.8 4.9 Feinberg, T., & Robey, N.. (2009, March). CYBERBULLYING. The Education Digest, 74(7), 26-31. Retrieved October 5, 2011, from Research Library. (Document ID: 1653003151).
  5. Setoodeh, R. (2010, October 18). Phoebe Prince’s legacy: a town tries to heal. People. Retrieved from http://www.people.com/people/article/0,,20432959.html
  6. Anonymous. Dudnikov v. Chalk & Vermilion V. Cyberlaw - Additional Developments