We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

See Pricing

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
Back
2/4 steps

How Many Pages?

Back
3/4 steps

Sign Up and See Pricing

"You must agree to out terms of services and privacy policy"
Back
Get Offer

Cyber bullying outline and thesis

Hire a Professional Writer Now

The input space is limited by 250 symbols

Deadline:2 days left
"You must agree to out terms of services and privacy policy"
Write my paper

Legal definition Cyberbullying is defined in legal glossaries as •actions that use information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm another or others. •use of communication technologies for the intention of harming another person •use of internet service and mobile technologies such as web pages and discussion groups as well as instant messaging or SMStext messaging with the intention of harming another person.

Examples of what constitutes cyberbullying include communications that seek to intimidate, control, manipulate, put down, falsely discredit, or humiliate the recipient.

Don't use plagiarized sources. Get Your Custom Essay on
Cyber bullying outline and thesis
Just from $13,9/Page
Get custom paper

The actions are deliberate, repeated, and hostile behavior intended to harm another. Cyberbullying has been defined by The National Crime Prevention Council: “When the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person. “[5][6] A cyberbully may be a person whom the target knows or an online stranger.

A cyberbully may be anonymous and may solicit involvement of other people online who do not even know the target.

This is known as a ‘digital pile-on. ‘[7] Cyberbullying vs. Cyberstalking Further information: Cyberstalking The practice of cyberbullying is not limited to children and, while the behavior is identified by the same definition when practiced by adults, the distinction in age groups sometimes refers to the abuse as cyberstalking or cyberharassment when perpetrated by adults toward adults.

[8] Common tactics used by cyberstalkers are performed in public forums, social media or online information sites and are intended to threaten a victim’s earnings, employment, reputation, or safety. Behaviors may include encouraging others to harass the victim and trying to affect a victim’s online participation. Many cyberstalkers try to damage the reputation of their victim and turn other people against them.

Cyberstalking may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass. [9] A repeated pattern of such actions and harassment against a target by an adult constitutes cyberstalking. Cyberstalking often features linked patterns of online and offline behavior. There are consequences of law in offline stalking and online stalking, and cyber-stalkers can be put in jail. [10] Cyberstalking is a form of cyberbullying.

[11] Comparison to Traditional Bullying Certain characteristics inherent in online technologies increase the likelihood that they will be exploited for deviant purposes. [12] Unlike physical bullying, electronic bullies can remain virtually anonymous using temporary email accounts, pseudonyms in chat rooms, instant messaging programs, cell-phone text messaging, and other Internet venues to mask their identity; this perhaps frees them from normative and social constraints on their behavior. Additionally, electronic forums often lack supervision.

While chat hosts regularly observe the dialog in some chat rooms in an effort to police conversations and evict offensive individuals, personal messages sent between users (such as electronic mail or text messages) are viewable only by the sender and the recipient, thereby outside the regulatory reach of such authorities. In addition, when teenagers know more about computers and cellular phones than their parents or guardians, they are therefore able to operate the technologies without concern that a parent will discover their experience with bullying (whether as a victim or offender).

Another factor is the inseparability of a cellular phone from its owner, making that person a perpetual target for victimization. Users often need to keep their phone turned on for legitimate purposes, which provides the opportunity for those with malicious intentions to engage in persistent unwelcome behavior such as harassing telephone calls or threatening and insulting statements via the cellular phone’s text messaging capabilities. Cyberbullying thus penetrates the walls of a home, traditionally a place where victims could seek refuge from other forms of bullying.

Compounding this infiltration into the home life of the cyberbully victim is the unique way in which the internet can “create simultaneous sensations of exposure (the whole world is watching) and alienation (no one understands). “[13]For youth who experience shame or self-hatred, this effect is dangerous because it can lead to extreme self isolation. One possible advantage for victims of cyberbullying over traditional bullying is that they may sometimes be able to avoid it simply by avoiding the site/chat room in question.

Email addresses and phone numbers can be changed; in addition, most e-mail accounts now offer services that will automatically filter out messages from certain senders before they even reach the inbox, and phones offer similar caller ID functions. However, this does not protect against all forms of cyberbullying; publishing of defamatory material about a person on the internet is extremely difficult to prevent and once it is posted, many people or archiving services can potentially download and copy it, at which point it is almost impossible to remove from the Internet.

Some perpetrators may post victims’ photos, or victims’ edited photos like defaming captions or pasting victims’ faces on nude bodies. Examples of famous forums for disclosing personal data or photos to “punish” the “enemies” include the Hong Kong Golden Forum, Live Journal, and more recently JuicyCampus. Despite policies that describe cyberbullying as a violation of the terms of service, many social networking Web sites have been used to that end. [14]

Cite this Cyber bullying outline and thesis

Cyber bullying outline and thesis. (2016, Jul 17). Retrieved from https://graduateway.com/cyber-bullying-outline-and-thesis/

Show less
  • Use multiple resourses when assembling your essay
  • Get help form professional writers when not sure you can do it yourself
  • Use Plagiarism Checker to double check your essay
  • Do not copy and paste free to download essays
Get plagiarism free essay

Search for essay samples now

Haven't found the Essay You Want?

Get my paper now

For Only $13.90/page