StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Identity Online: Bullying and Anonymity - Term Paper Example

Comments (0) Cite this document
Summary
The "Identity Online: Bullying and Anonymity" paper explores the issue of cyber-bullying as part of online identity, considering the question of whether being anonymous when online allows bullying within online communities, such as those associated with academic institutions such as universities…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Identity Online: Bullying and Anonymity
Read TextPreview

Extract of sample "Identity Online: Bullying and Anonymity"

Download file to see previous pages Bullying is defined as to “act the bully (towards); persecute, intimidate, oppress (physically or morally) by threats or superior force” (Shorter Oxford English Dictionary, 2003).  However, this dictionary does not contain a definition of cyber-bullying, implying that the word was not in common usage at the time and the issue has evolved as a phenomenon since 2003. This would tie in with increased usage of the internet for such things as socializing using Twitter and Facebook, as well as more educational establishments using e-resources and virtual learning environments as part of their teaching.

Recently, attention has focussed on the phenomenon of cyber-bullying following the deaths of two students who were apparently bullied online – Tyler Clementi committed suicide following the posting of videos online (Guardian 2010), and Phoebe Prince killed herself following months of cyber-bullying at school (McGreal 2010). Last year, the first person ever to be convicted of cyber-bullying was Keeley Houghton in August (Carter 2009). People are bullied for a variety of reasons, some relating to aspects of discrimination and others relating to simple disagreements over opinions. Various reports have stated that cyber-bullying is a major problem, linked to continuing inequality in the UK and requiring resolution (see, for example, the Equality and Human Rights Commission’s report ‘How fair is Britain’ available for download at http://www.equalityhumanrights.com/key-projects/triennial-review/full-report-and-evidence-downloads/). And it is not just children and students who are targeted. Teachers are frequently targeted by students (when it is referred to as ‘cyber-stalking’ or ‘cyber-harassment’ to distinguish the age of the target [Meredith, 2010]). Cyber-bullying is even a political issue for the USA, with policies such as “Don’t ask, don’t tell” being challenged through the courts and the Senate (Guardian 2010). ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Identity Online: Bullying and Anonymity Term Paper, n.d.)
Identity Online: Bullying and Anonymity Term Paper. https://studentshare.org/education/1747208-e-learning
(Identity Online: Bullying and Anonymity Term Paper)
Identity Online: Bullying and Anonymity Term Paper. https://studentshare.org/education/1747208-e-learning.
“Identity Online: Bullying and Anonymity Term Paper”. https://studentshare.org/education/1747208-e-learning.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Identity Online: Bullying and Anonymity

Anonymity on the Internet

... be upheld. Most internet users do not intent that all the information received or transferred shall be traced to their identity. Ironically, the internet makes it both difficult and easier to uphold anonymity. On one hand, it can be argued that all the information exchanged through the internet except during video conferencing should be considered anonymous since the identity of the other user cannot be verified with certainty (Schwabach 13). In this case, users can send mails and participate in group chats using a fictitious identity. Conversely, it is impossible to uphold anonymity on the internet since all internet communications are recorded (Schwabach 13). Some communications especially those involving internet transactions can...
12 Pages(3000 words)Case Study

Bullying

... must teach their children strategies that they can comfortably follow to stop bullying before it does physical and psychological damage. References Barlett, C. P., & Gentile, D. A. (2012). Attacking others online: The formation of cyberbullying in late adolescence. Psychology Of Popular Media Culture, 1(2), 123-135. DOI:10.1037/a0028113 Correia, I., Alves, H., De Almeida, A., & Garcia, D. (2010). Norms regarding secondary victimization of bullying victims: Do they differ according to the victim’s categorization?. Scandinavian Journal Of Psychology, 51(2), 164-170. DOI:10.1111/j.1467-9450.2009.00732.x Jansen, D. C., Veenstra, R., Ormel, J., Verhulst, F. C., & Reijneveld, S. A. (2011). Early risk factors for being a bully, victim, or bully...
5 Pages(1250 words)Research Paper

Bullying

... The Negative Effects of Bullying Throughout Human Life Introduction One’s personality is shapedgreatly by the experiences and attitudes that he is subjected to, throughout his life. Positive and negative attitudes have the same impact on a person’s psychology. Since childhood is the most vulnerable period in anyone’s life, due to the newness of the real world, the most impact is made by the experiences of this phase. Where positive experience are ideal for a healthy psychological development, negative experiences lead to severe damaging psychological affects in a child’s life when he steps into adolescent age and it is cemented in his adulthood. Bullying is the act of intimidating or influencing someone who is weak in terms of strength...
5 Pages(1250 words)Research Paper

Bullying

... Bullying In relation to Coyne & Monks (pp.43), bullying in the social order takes a variety of forms. This led to my comprehension of the varieties of bullying that were taking place in my society. Through this work, I also became acquainted with the fact that, in one way or another, bullying cannot be evaded in the society. According to Coyne & Monks (pp.44), the provocative parties, will always aggravate conflicts in the society, while the passive parties end up suffering the most from the afflictions. With these concepts in mind, it is almost palpable that in one way or another, bullying will always be an attribute of the society, regardless of the kinds of relations present. This is from the fact the provocative victims always want...
1 Pages(250 words)Essay

Anonymity in Rape Cases

... the complainant since it prevented them facing the consequences of false allegations. Provision for anonymity for both the complainant and the defendant was not the case in the previous years. The Helibron Committee of 1975 did not intend to extend anonymity to the defendant. However, anonymity was granted to the defendant when the parliament voted to extend anonymity to the defendants. This saw the rising of the sexual offence amendment act 1976 which saw anonymity granted to both the defendant and the complainant. Though there are restrictions that prohibit the media to publish the identity of the complainant, there are some times when the restrictions are lifted. For example when the complainant decides to reveal his or her identity...
10 Pages(2500 words)Coursework

Anonymity and exclusion

...Anonymity and exclusion Task: ANONYMITY AND EXCLUSION Introduction The paper gives a brief summary of anonymity and exclusion together with a few examples as pertaining legal terms. The two terms are mostly used as legal terms to mean two different viewpoints . AnonymityAnonymity typically means a state of an individual hiding his or her personal identity hence publicly unknown. There are several reasons as to why people prefer being anonymous or to withhold identity. People prefer taking charity acts so that benefactors are not easily identified. Witnesses who appear in court cases are usually nowhere to be seen in a criminal activity because they would like to avoid vengeance. They usually fear for their lives hence must keep anonymity...
1 Pages(250 words)Essay

Bullying

...Bullying- consequences and preventive measures of the Bullying is widely prevalent phenomena in many schools within the US. It is associated with several health and developmental consequences both for the bully and the victim. In order to prevent bullying in schools several policies and laws are implemented across many schools in the US. In addition, adequate training is provided to teachers and school staff to effectively handle the issue and prevent it in future. Various interventional approaches have been successful in many schools which include counseling and identifying students at risk as a long term measure in controlling bullying. Keywords: bully, policies, teachers, students, counseling Bullying is still widely prevalent across...
8 Pages(2000 words)Essay

Anonymity: Morals, Ethics, Responsibilities

Anonymity refers to a situation where the name of the acting person remains unknown. For instance, an individual can send messages using a hidden identity. The message is sent without the author being shown. Anonymity is implemented in order for the receiver of the message to have difficulties identifying the author. One of the most common examples of anonymity, in which anonymity is enforced and protected by law, is the act of voting in a free election. In some of the instances, anonymity may be accepted as a natural occurrence. This occurs during instances such as conversations with strangers or purchasing services or goods from a shop. There are situations where people may decide to withhold their identity. For instance, acts...
7 Pages(1750 words)Essay

Online identity theft

...Online Identity Theft al affiliation: Online Identity Theft Technological advancement is almost changing the world into an online platform. People eat, communicate, trade, find pleasure and receive government services through internet. The changes have forced diversification and adjustment to remain relevant in various fields. Interestingly, thieves have not been left behind in the switch leading to internet malpractices. Among the many opportunities exploited by internet thieves, online identity theft stands out (OECD, 2009). The group is gradually shifting from stealing purses and wallets for documentation to online platforms where access is easy and many fail to realise the problem. The malicious activity has left many victims cashless...
6 Pages(1500 words)Assignment

Online identity theft

...The Cybercrime. Identity Theft. What is this? How to distinguish this phenomenon and protect oneself against it? Title Date Abstract This work is devoted to the topic of the identity theft, which is one of the top problems in the modern world. The development of the computer systems and internet resources is always accompanied with the development of cybercrimes and computer viruses as the tools for committing this type of crimes. No one has the insurance against being a subject to the cybercrime, but we can learn more about it and protect our information, because currently, computer crime reaches the international scale. This work sums up the information from the well-known websites of Encyclopedia Britannica, Presti and Naegele...
6 Pages(1500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Identity Online: Bullying and Anonymity for FREE!

Contact Us