Edudorm Facebook

Cyberbullying

Cyberbullying

Introduction

Cybercrime is the most predominant and widespread crime based on its increasing technology advancement (Cooley, 2011). This criminal activity is mainly facilitated by the use of computers or internet-powered devices. In the recent years, it has become evident that cybercrime has doubled thus emerging to be the most widespread crime across the globe. To most, cybercrimes incorporate the use of computers to conduct some sort of stealing which is not true as the crime take different forms ranging from less harmful to adverse and pricey attacks. Cybercrime takes the form of either forgery, identity theft, fraud or bullying. Technology is evolving rather fast in the contemporary society and based on its essence, almost every individual with computer operation knowledge participates in the use of the fast-growing trend. Actually, technology has made the world to become a small community for the present generation based on its ability to connect people regardless of their location and time (Sullivan & Dawsonera, 2011). However, it is the same technology development that has led to the rise and prevalent of cybercrimes. Cybercrime refers to an illegal violation that is conducted via the use of computer processors and internet. In the world of cybercrimes, cyberbullying is the most prevalent attack that affects millions of people and has gained increased attention in the research and media sectors due to the rising suicidal and conviction events (Taylor, Fritsch & Liederbach, 2015). This report will, therefore, present an analysis of the cyberbullying crime and how it has evolved. In addition, the contributions of technology advancement to the increasing cyberbullying will also be explored.

Cyberbullying is moderately a new type of bullying that has gained popularity due to the increased adoption of the internet globally. Cyberbullying best refers to the situation in which one is attacked by another anonymous or a known person on the internet via social media sites such as Facebook, Twitter and so on (Sullivan & Dawsonera, 2011). Cyberbullying is a serious crime in most cases results in self-destruction among the victims. It has been established that close to 50 percent of the internet users particularly teenagers have an experience of cyberbullying leading to psychological harm. Cyberbullying is a recognizable act that is being used to intimidate and manipulate others. This act can lead to depression, anxiety, and suicidal based on the psychological harm that is caused on the victims (Cooley, 2011). Today, mobile and computers are the most common tools that are utilized by young and older people for communication making the trend even more prevalent. Cyberbullying ranges from sending intimidating messages to posting pictures and post that seeks to cause harm to the victims. The internet is being utilized by young people more than before due to its availability and accessibility. To the contemporary world, mobile devices, computers, and internet are perceived as a desirable aspect that is necessary for life. While these technologies play an essential role in running daily operations they are the source of bullying. Most young individuals based on their vulnerability are the target of internet bullying leading to deaths and increased depression among young people as the internet environment is no longer safe (Cooley, 2011).

In the society, where the views of others count many cyberbullying results in harm by causing repeated torment, provocation, disgrace, shame or intimidation (Sullivan & Dawsonera, 2011). Cyberbullying contrary to what most individuals imagine it to be can be as simplified as just sending a mail to an individual who holds no interaction interests. This becomes serious in instances when the messages or posts incorporates threats, intimidation or sexual harassment that ridicules one’s wellness (Cooley, 2011). Most cyberbullies are involved in the sending of privatized information, pictures, and videos regarding their victims on their social media platforms for the followers to see. Some go to the level of acting as someone else in the quest of posting details using the victims’ names in order to shame them. It is rather surprising that most bullies will mainly utilize similar strategies that mainly includes sending threatening messages to their victims (Donegan, 2012). Based on reported cases, it is evident that bullies are well known to the victim and they tend to use their victim’s weaknesses in the quest of causing disgrace and end up feeling very powerful.

The growth of cyberspace intimidation originates back as far as in 1999. The extent to which the crime has spread in the contemporary society is hard to measure based on the complexity that surrounds the issue. This issue is not only prevalent in the United States but it mainly affects individuals from across the globe. Their recognition of cyberbullying was mainly fueled by the increasing concerns by parents, tutors and the public in general in reference to the rising teenager’s harassment via the internet (Sullivan & Dawsonera, 2011). Despite the fact that the issue has been prevalent for years, it is still challenging to develop and apply effective intervention approaches since the motivations and the aims of those that conduct the act are not known. The evolution of cyberbullying has been a consistent one and it is categorized as part of the contemporary society. a couple of years ago, bullying would mainly occur within learning institutions where children would get bullied for different reasons ranging from verbal to physical bullying. However, with the increased adoption of the internet, social networking sites, mobile and computer devices, bullies have acquired an online platform to extend their crimes. With the presence of the platforms, bullies have the opportunity of reaching their targets at any given time without being suspected (Norden, 2013). In this context, the evolution is that originally cyberbullying occurred in the chat spaces and direct messaging options but it has thus shifted to online networking sites such as Facebook. In the recent the popularity of some networking sites that permits anonymous accounts has sadly supported cyberbullying by equipping the bullies with the power to send inhumane things without the panic of their acts outcomes. 

Throughout history, the United States has been founded on protecting individual’s rights and freedom such as the expression freedom. This right gives people the power to communicate mean things about others as part of their expression while exposing the victims to the danger of humiliation and self-destruction (Taylor, Fritsch & Liederbach, 2015). Bullying has additionally, evolved from making some oblivious commentaries communicated directly to the multimedia networking that involves messaging through different electronic tools. Technology development and innovations including the increased use of smartphones and the internet have changed the human association for good. The concept of bullying was conventionally introduced back in the 16th century which mainly involved the act of subjecting another person to physical or oral abuse with the aim of gaining superiority and authority over the targeted victim (Taylor, Fritsch & Liederbach, 2015). Such actions would thus result in either physical or psychological harm (Sullivan & Dawsonera, 2011). However, cyberbullying has evolved from such a foundation and graduated to more psychological effects. Cyberbullying has evolved with time thus creating some aspects where it permits bullies to hide their actual identities behind the computers while asserting their superiority through intimidation. With such aspects, it is therefore very challenging to recognize the actual identities of bullies in the cyberspace today. This is because the advancement of technology that enables bullies to mask their identities provides them with the authority of messaging just anything to the victims without having to worry about the consequences.

Cyberbullying gained popularity amid the media institutions and researchers as more and more harassments particularly pertaining students were being reported in early 2000. This being an infringement of the first amendment rights provisions led to the rise of controversial debates among the public (Taylor, Fritsch & Liederbach, 2015). In that learning, institutions had been restricting their control over only the things that occurred within the settings. This resulted in more and more cyberbullying cases since students acquired no protection in cases that they were bullied outside the institutions even though the bullies were well known. The destruction ranging from health deterioration to suicidal deaths that are caused by cyberbullying on a national and global level has resulted in most legislators and researchers stepping in the quest of solving the issue (Sullivan & Dawsonera, 2011). due to the constant events that have been witnessed in most states in America where individuals particularly teenagers have resulting to committing suicide due to the trauma of being cyber-bullied, a number of laws have thus been implemented with the intention of combating the crime. This clearly demonstrates the severity of the issue.

It cannot be denied that technology has significantly contributed towards the prevalence of cyberbullying. In itself, technology has brought about newer complexities in dealing with cyberspace bullying (Gillespie, 2006). Cyberbullying has occupied the leading position in the categorization of the prevalence of crimes that are committed through the internet. Globally, millions of individuals utilize mobile phones and computers on daily basis. These devices are being used for communication, work and learning which have in turn made life much easier thus creating a lot of advantages to the society but also a number of issues as well cyberbullying being one. Cyberbullying has been a major public problem for a notable period. With technology development, cyberbullying has in turn grown to be one of the most pressing and yet difficult issues to solve in the society (Taylor, Fritsch & Liederbach, 2015). With the largest populace owning technological devices such as computers, smartphones, and tablets it is not easy to monitor the activities taking place within the cyberspace settings. The Internet is also a result of technology which is easily accessible globally thus giving individuals more power to participate. Presently, the internet is utilized by bullies as their bullying weapon that facilitates their intimidation motives.

As technology advances, the chances for adverse cyberbullying are on the rise. Technology has provided elements that work to ensure that one operates computers without being known (Gillespie, 2006). With the dominance of social media creating new accounts with incorrect identities is easier which supports bullying. The highest bullying incidents are conducted through sending direct texts and posts. In addition, the networking platforms have features that support sending videos and pictures and linking them to an account. In this context, some pictures and videos that are meant to remain private end up being exposed thus causing a high rate of agony and humiliation (Fenn, 2012). Statistics prove that cyberbullying results in decreased esteem leading to depression and suicide. Self-esteem is essential and one is never themselves without it. For instance, in cases that nudes pictures are exposed to social networks, one begin to gain the feeling of being worthless which might contribute to depression and suicidal thoughts (Fenn, 2012).

Technology has created more platforms for cyberbullying to take place. Technology has resulted in the loss of cyberspace security more than most individuals recognize. In that, the increasing cyberbullying rate is consistent with that of technology growth. With the expansion of technology so does the cyberbullying (Gillespie, 2006). Technology gives hackers the accessibility to personal details with some sites even having advanced features that might share hidden content on devices such as mobile phones. These features places the sites users at an intense risk. Most sites offers the features for commenting regarding the created post or direct texts. Most bullies will use these aspects to send demeaning messages that directly attacks their victims while other viewers are following (Gillespie, 2006). With this they become superior by subjecting them to the agony of dealing with unreasonable comments. If an image that one has struggled to create is destroyed, this therefore imply that their wellness is hurt as well. Bullied victims find it rather challenging to share their experiences based on the fear of being judged or being subjected to further attacks. Without sharing thoughts regarding such acts continue to pile which leads to depression a state that disintegrates one’s wellness and the loss of hope (Taylor, Fritsch & Liederbach, 2015). In other words, technology has created vulnerability for attack to most internet users by giving bullies hidden identities and platforms to achieve their missions. The evolution of technology has also led to the loss of privacy an asset that has increased the growth of cyberbullying (Donegan, 2012). Social networking has created the need to living a lie. In that if the actual standards are exposed to the world then humiliation cannot be avoided. Bullies depend on the technology features that facilitate sending horrifying posts constantly without revealing their identities. It is rather surprising that most of this sites do not regulate user’s activities thus creating more vulnerability and power for those with undesirable intentions of causing harm (Bauman, 2015). Cyberbullying remains to be one of the most destructive cybercrime in the technology world based on its ability to silently cause harm.

There was no legislation that handled cyberbullying until recently (Fenn, 2012). As cyberbullying is growing to be a dominant issue in the technology-driven world laws are being constructed both by state and federal legislators in regard to penalizing those involved in committing crimes (Fenn, 2012). In most states, the anti-harassment law has been implemented to incorporate cyberbullying as a criminal rather than a civil offense. This legislation describes harassment to be incorporating torture that is subjected through electronic means thus threatening the emotional and physical wellness of another. While the constitution grants every citizen the freedom to be expressive the right should not be utilized to cause any harm. It is obvious that the existing legislation that seeks to curb cyberbullying is objected at guarding citizen’s rights based on the constitutional provisions while still focusing on creating a favorable surrounding for social networking without causing any form of harm to the public. It is widely acknowledged that one can use their expression freedom to communicate what they think or feel but it is illegal if the right is utilized with the intention of causing emotional harm since this would be an infringement of another individual’s privilege. cyber-bullying similar to other kinds of harassment are illegal and the current laws are aimed at curbing the violation given that if the expression freedom that causes harm is encouraged then the provisions of the first amendment will have been violated (Bauman, 2015). Those engaged in cyberbullying are being charged differently based on the laws passed in different states and bullying leads to conviction based on the intention and the harm caused.

Cyberbullying is a crime that is complex in its own nature due to the involvement of technology. Some of the current legislation involves monitoring social networking activities mainly for all users. It is rather evident that this kind of monitoring is bound to result in positivity by preventing bullying before it causes more harm but the implementation of the legislation is a major challenge (Hinduja & Patchin, 2017). To begin with, there are several limitations in regard to the implementation of the legislation includes inadequate, knowledge and resources. Technology is evolving rather fast thus requiring the legislation to evolve in similar speed an aspect that possesses a lot of challenges (Fenn, 2012). With the evolution, the success of monitoring activities secretly not only necessitates advanced knowledge and skills but also a lot of resources in terms of finances. Hiring expertise or even training staffs to effectively monitor social networking sites is expensive an aspect that leads to the failure of some initiated programs. Even with the regarding how some programs might be implemented the rapid evolution places the bullies at an advantage as they can advance their tactics and skills more easily before being noticed (Hinduja & Patchin, 2017). In addition, most of the incidents are only reported to have much damage such as death has been cause thus making it difficult for the investigations to be conducted effectively.

In the state cyberbullying is recognized as a form of a criminal offense rather than a civil misconduct thus making then penalties more severe. The adversity of the punishment is derived from the harm that the acts cause on the victims and the society in general (Hinduja & Patchin, 2015). While the right to free speech is to be respected if it is utilized with the intention of causing harm then conviction and fine are obvious. Those that participate in cyberspace bullying are categorized as guilty with respect to conducting criminal harassment thus being required to pay up to a thousand dollars fine or 2 years sentence (Hinduja & Patchin, 2015). However, this penalty is only for those that have caused harm while those that cause major damages such as intimidating their victims to the point of committing suicide having to get conviction for murder. Causing emotional harm is not excepted as the damage is accounted as a severe one that leads to the loss of one’s capability to participate in their normal lives.

In my opinion, based on the harm that cyberbullying causes on the affected persons and their family the penalties are adequate but should be upgraded to deter others from engaging in such acts. In that, in instances when the penalties are severe individuals tend to avoid being part of such activities based on the fear of the severe consequences that are associated. Most individuals that engage in these crimes are not only experts but they understand the law quite well and if the punishments are lenient this might encourage them to participate more while luring others to get involved (Bauman, 2015). The laws are therefore adequate but they are not effective based on the current state of the issue and the harm that is being caused by the prevalence of cyberbullying. Harassment should be treated as a tolerable crime based on the notion that it not only affects individuals safety but also their wellness that is necessary for self-growth and that of the society. It is thus evident that life sentence for an attempted murder can be the most suitable punishment for the bullies. This is because the bullies act with adequate knowledge that their actions are meant to cause harm but ignores all that on the need of gaining superiority over the victims (Hinduja & Patchin, 2017). Some of the challenges that might be faced by law enforcers in their attempt to prevent crimes include resources and the complexity of technology. In that, skills for operating and understanding the tactics utilized by the bullies are needed. The cost of implementing such strategies might be a problem given that technology evolves consistently thus giving the bullies more authoritative approaches (Hinduja & Patchin, 2017).

Conclusion

Apparently, cyberbullying is a major problem in the technological society. The prevalence and development of cyberbullying have mainly been facilitated by technology growth in general. Millions of individuals have access to computers and mobile devices that make it easier to use the internet. The networking sites create opportunities for communication and networking thus making the world a favorable place but also exposes the users to a number of problems such as cyberbullying. This crime is usually achieved by sending threatening or intimidating contents to the victims thus causing them unending harm. It is rather evident that technology has contributed highly to the development of the crime by creating platforms for bullies. While the current legislation seeks to combat the problem more measures should be taken to fully assert individuals safety. Cyberbullying can best be prevented by increasing awareness of the issue and implementing more strict policies.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Bauman, S. (2015). Strategies to Prevent and Reduce Cyberbullying. Cyberbullying, 85-91.

Cooley, A. H. (2011). Guarding against a radical redefinition of liability for Internet misrepresentation: The United States v. Drew prosecution and the         Computer Fraud and Abuse Act. Journal of Internet Law, 14(8), 1, 15–28.

Donegan, R. (2012). Bullying and cyberbullying: History, statistics, law, prevention and   analysis. The Elon Journal of Undergraduate Research in Communications, 3(1), 33-42.

Fenn, M. (2012). A web of liability: Does new cyberbullying legislation put public schools in a sticky situation. Fordham L. Rev., 81, 2729.

Gillespie, A. A. (2006). Cyber-bullying and harassment of teenagers: The legal response. Journal of Social Welfare & Family Law, 28(2), 123–136.

Hinduja, S., & Patchin, J. W. (2015). Cyberbullying legislation and case law: Implications for school policy and practice. Cyberbullying Research Center.

Hinduja, S., & Patchin, J. W. (2017). Cultivating youth resilience to prevent bullying and cyberbullying victimization. Child abuse & neglect, 73, 51-62.

Norden, S. (2013). How the internet has changed the face of crime (Doctoral dissertation, Florida Gulf Coast University).

Sullivan, K., & Dawsonera. (2011). The anti-bullying handbook. Los Angeles, [Calif.: SAGE.

Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism. (3rd ed.). Upper Saddle River, NJ: Pearson.

 

 

 

 

 

 

 

3448 Words  12 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...