Bystander(s) in cyberbullying are the ones that see the text messages, emails, social media posts, pictures, and videos, but do not forward them onto their contacts. There is also a secondary cyberbully, this person sees the texts, emails, embarrassing photos and/videos, and passes them on to their contacts (Bhat, C.S., Chang, S.H., & Linscott, J.A., 2010). Now I want to look at the risk factors that could be involved with being a bully and a victim. The person being victimized generally may have risk factors like being
When children start to abuse the convenience of the internet by harassing other people, the internet becomes very dangerous. What makes cyber bullying so dangerous? Cyber bullying is dangerous because it has the ability to take the smallest incident and build up so much tension around it that it results in a murder or suicide. Some people may blame the victim for lacking self control and not being able to ignore the situation. Some people may claim it was just a joke and may blame the victim for being too sensitive or insecure.
Cyber terrorists can be motivated to target organizations that will result in the radical’s group to cause the most harm and/or receive the most attention for their party. Cyberterrorists use the internet to spread propaganda and enlist new members and use DoS/DDoS attacks to cause disruption to companies that represent actions against their belief’s (Vacca & Rudolph, 2011). Cyber terrorists can also steal information to be used for self-serving strategic purposes. Kostadinov (2012) makes the distinction between cybercrime and cyberterrorism in that the latter should resemble terrorist attacks via traditional methods but perpetrated virtually. Kostadinov goes on to note that most cyberterrorism actions are generally focused on website sabotage and email blasting.
• Question 33 The motives for many writers of malicious software have changed from profit to curiosity and revenge. • Question 34 What major category of information warfare/cyber-terror does “data hiding” fall into? • Question 35 Hackers predominantly associate themselves with illegal acts. • Question 36 What major category of information warfare/cyber-terror does “cyber-plagues” fall into? • Question 37 This group tends to define hackers and their activities in terms of the danger associated with hacking and its sometimes malicious intent.
Individuals can select a range of coping mechanisms when they endure cyberbullying. Victims can block bullies from contacting them through various means (Campbell 2005). Sufferers can change their identification on networking sites such as switching passwords, online identity, e-mail addresses and deleting anonymous text messages to terminate potential bullying from happening (Juvonen & Gross 2008). If perpetrator continue to annoy the innocent, the one who is affected can take further actions to prevent themselves from reading hurtful messages or the rumours spreading online. Seek help from a friend, inform parents, teachers or the more experienced can be alternatives (Cassidy et al., 2009).
Examples are instant messaging, text messaging, blog, emails, etc. cyber bullying through proxy is when the bully gets someone else to do their dirty work. Cyber bullying by proxy is consider the most dangerous type do cyber bullying because adults often get involved and majority of the time the adults are unaware that they are bullying a child. Statistics says that nearly 46% of kids have been bullied online. 70% of students report seeing bullying online.
Children and young people are at risk of bullying when using the internet, mobile phone and other technologies as it provides an anonymous method of bullying by way of text messages and emails which can be emotionally damaging to a child or young person. Racist, anti-social and cult groups use modern technologies to preach and spread what they are and what they stand for, leaving children and young people very venerable to becoming part of their activity which is unhealthy, unsafe and often illegal. Children and young people are very venerable to predators of all natures using the internet and other technologies, by the encouragement of giving out personal information about them and others close to them, which will put not
Anonymity One of the factors explaining the rise of cyber bullying is anonymity. Social networking sites provide the bullies with the ability to remain anonymous. However, this allows cyber bullies with the opportunity not only to exploit but also manipulate the vulnerable identities of teenagers. The mask of anonymity on the internet has become common and it has become impossible for victims to deal with their bullies directly face to face. People have the opportunity to construct one’s identity on social networking sites such as Facebook and My space.
Privacy is slowly corroding, and all this information can be obtained from any social networking site. Young adults who are struggling to find themselves can face some level of identity crisis. He or she may become involved in drugs or criminal behavior, which could result in negative circumstances. Many young adults find themselves in possession of an identity characterized by these rebellious behaviors. They claim to be non-conformist to show that they're different from their peers.
Paper on Cyberbullying Texts(articles): Nina Lakhani: “One in five children is victim of cyberbullying” Aleks Krotski: “Hate and the Internet” Jan Hoffman: “Online Bullies Pull Schools Into the Fray” In the first text, we are introduced to an article describing the current situation in cyberbullying. The writer Nina Lakhani describes how cyberbullying has become an extremely viral phenomenon and how this type of teenage cruelty hasn’t been present until now due to the lack of technology. She explains why this is a serious threat to young people, due to the intensity of the bullying which is caused by the fact that teenagers are not able to isolate themselves from the bullying. Surveys have also concluded that the impact is much greater than with regular bullying because of how it can spread out to the rest of the world in however long it takes load a picture. Nina ends her article with three cases of cyberbullying causing the victim to commit suicide.