Cyber-Bullying
Bullying may be a practice that has been around since the beginnings of human history, but with the increasing access that people have to technology a new medium is now used by aggressors. Cyber bullying is an act that involves using computers, cell phones and other sorts of media to consistently harass others. The object of the bullying, to cause physical or psychological damage to another, is the same, but the perpetrators have changed. Girls are both more likely to use cyber means to bully and they are also more likely to be the targets. Because the practice is so new, there are no prevention programs which specifically target cyber bullying. Also, because this type of aggression occurs in a private setting, it more often goes unnoticed by parents and other concerned adults. Researchers need to further understand the nuances of cyber bullying and determine the best methods to combat the practice.
Cyber-Bullying
Introduction
The act of bullying is as old as humanity. It has gone by many different names and has seen various levels of acceptance, but whatever people call it the act remains the same. It has been justified as hazing, entry into a club or organization, since there has to be some way to include new members. Leaders, from nation heads to teachers, have bullied the members of their groups through misuse of given authority. Sometimes the practice has been sanctioned because it is either seen as a rite of passage or because the bullied is seen as weak.
It has been stated that "It is a fundamental democratic right for a child to feel safe in school and to be spared the oppression and repeated, intentional humiliation implied in bullying" (Smith & Brain, 2000). While right may be too strong a word to use in this instance, it is at the very least the expectation of every child that they will be safe at school. The statistics say that a majority (75%) of school age children have experienced an act of bullying during the academic year, and at least 10% have been the target of extreme bullying (Sassu, Elinoff, Bray, & Kehle, 2004).
Unfortunately, the practice of bullying has embraced the information age. Since it is now possible to have access to people around the clock, bullies have begun using electronic media to either increase or enhance activities against victims. Research shows that "58% of kids admit someone has said something mean or hurtful to them online; 53% of kids admit to having said something mean or hurtful to someone else online; and, 42% of kids have been bullied online" (iSafe, 2010). Although schools and other concerned groups have tried to stop the practice, it is becoming more of a problem over time. What cyber bullying is, how it has spread, who the bullies are, who the victims are, how the practice is viewed, and some possible solutions are the focuses of this research paper.
Method
Since cyber-bullying is a new issue, few studies have specifically addressed the problem. Bullying research does include mentions of the process by which cyber bullying is accomplished, and most articles include definitions with similar components. Due to the scarce nature of resources it is necessary to include generic bullying information that can be extrapolated to the cyber bully phenomenon. This parallel data includes motives for bullying, characteristics of bullies, and the characteristics of people who observe bullying. All of these factors are consistent across the entire spectrum of bullying types.
The data was gathered via peer-reviewed articles on the ProQuest and Questia database sites along with reputable web sites which provided statistical information. All sources are properly cited in the text and referenced at the end of the paper. Texts used were properly vetted for their stringent use of reviewed statistics.
Data analysis was not necessary due to the nature of the paper.
Results
Cyber bullying has been defined as "involve[ing] the use of information and communication technologies such as e-mail, cell phone and pager text messages, instant messaging, defamatory personal Web sites, blogs, online games and defamatory online personal polling Web sites, to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others" (Belsey, 2004). The use of technology to remotely attack someone in a negative way (Smith & Brain, 2000), has only existed in theory for approximately the past decade because of the availability of new electronic media. However, its roots can be traced further back to people using the telephone for harassing 'prank' calls (Belsey & Brain, 2000).
The...
Cyber Bullying: An Impact on Adolescents College Students In this literature review, the author will be reviewing literature regarding cyber bullying and how it impacts upon college students. This is especially fertile ground for research because there is not much information about how such electronic aggression affects college students. The focus of most of the research has been upon younger adolescents. In such individuals, concern is widespread that new forms of
Cyberbullying The effects of the recent trend known as cyberbullying was investigated. Current literature was examined on the subject in order to establish a general basis of the various potentialities of this harmful activity. Upon synthesizing a working knowledge and hypothesis from this data, a comprehensive research method was developed whereby participants were asked to temporarily forgo their privacy in online and electronic environments. By allowing the research team to assiduously
Cyber Bullying One definition of Cyber bullying is that it is the employment of technology by a person to intimidate, upset, harass, demean and humiliate another person. Targets chosen by cyber bullies are no different from those picked by face-to-face bullies. These targets share characteristics such as being lonely or loners, vulnerable, socially uncomfortable, and hence mostly isolated. Some bullies choose to remain anonymous so as to escape accountability for their
These by standers usually come in form of cheerleaders, protector for the victim and the silent onlookers. It is worth noting that all those involved in the chain, and even those not directly mentioned here still get affected by the vice of bullying. It is therefore important to look at what forms of conflict are manifest from a bullying scenario and experience among the little children in school. There is
Cyberbullying Independent and dependent variables used in the study In an experiment, the independent variables are the variables manipulated by the experimenter, while the dependent variables are the aspects of the experiment that are 'dependent' or affected by the independent variables. In Hinduja and Patchin's 2011 research for the Cyberbullying Research Center, the independent variables under study were the rates of cyberbullying, while the dependent variables were the characteristics associated with teens
Bullying can be a difficult topic to tackle. That is why this bullying essay will help offer an idea of what will comprise a good paper and what potential areas of research to cover within this controversial and popular subject. From developing a good thesis, carrying it throughout body paragraphs, and closing with a brief and concise conclusion, this essay will show what to do to obtain a high grade.
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now