StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Bullying and Cyber Stalking - Essay Example

Cite this document
Summary
This essay "Cyber Bullying and Cyber Stalking" explores the factors that contribute to cyberbullying by focusing on the use of media in networking. Cases of cyberbullying have continued to hit the headlines in the United States. In 2008, 1, 521, 000 reported cases of cyberbullying…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
Cyber Bullying and Cyber Stalking
Read Text Preview

Extract of sample "Cyber Bullying and Cyber Stalking"

? Cyber Bullying Cyber Bullying Cyber bullying entails cyber harassment, cyber stalking, and impersonation (Kalpidou, Costin & Morris, 2008). The use of media in the society provides a path for socializing, cognitive development of the youth, emotional expression, thus it defines the way a person would spend his time. The advent of internet led to social networking which has rapidly grown in the recent past. Many social networking sites such as Facebook, MySpace, twitter, Fraudster provide an interface, which links people from various parts of the world (Kalpidou, Costin & Morris, 2008). Technology has provided a means through, which people are able to post their photographs and shares their views about life. The number of social network users keeps growing everyday. Social networks provide a cheap way of expressing ideas. The use of social network poses various challenges in the society (Karen, 2006). Reports indicate that many people utilize the social networks and other online services to create harm to others. This paper explores the factors that contribute to cyber bullying by focusing on use of media in networking. Cases of cyber bullying have continued to hit the headlines in United States. In 2008, 1, 521, 000 reported cases of cyber bullying. The bullying spanned all the races regardless of their religious affiliations. Research indicates that 20 percent of students in United States exhibit tendencies of committing suicide. The alarming statistics of cases of cyber bullying prompted the government of United States to enact rules and policies to curb the crime. Many states in United State have enacted to control cyber bullying (Hinduja & Patchin, 2010). The method used in passing information influences the legal implication on the victims. In some cases, an individual may fail to identify the gravity of the information that he relays to the society. Before an individual describes a case as cyber stalking, one has to identify the legal authority and its description to cyber stalking. Each case of cyber bullying has its own magnitude to an individual, thus prompting different approach in each case of cyber stalking. Some identified cases of cyber bullying include; premeditation, malice, distress, repetition, obsession, without legitimate purpose, vendetta, harassment, personally directed and disregarded warning to stop (Hinduja & Patchin, 2010). The legal implication that various forms of bullying carry depends on the existing legislations in the society. For instance, malice has a different psychological impact to an individual compared to issuing of threats. Repetition of an event or various events in an individual life leads to internal mental movie or schemas (Hinduja & Patchin, 2010). An individual has the ability to develop schemas of any occurrence. For instance, relationship schemas occur when a person experiences romantic or parental relationship. These schemas develop because of the perception developed by an individual regarding life experience. Bullying on the other hand would influence individual schemas since it occurs without the consent of the perpetrated party (Kalpidou, Costin & Morris, 2008). The society is experiencing various forms of bullying, which have psychological effects to the victim. For instance, cyber bullying may promote threatening information to unsuspecting individual. This information would psychologically torture the victim due to the internal mental schemas that he or she develops (Beran, 2007). Proper functionality of an individual depends on schemas that one develops over a certain period. Fear occurs due to schemas that an individual develops. A research into the causative factors of cyber bullying argues that crime depends on numerous social factors, which include differential association (Karen, 2006). For instance criminal activities of significant others have an influence to the associated parties e.g. peers. On the other hand, differential costs or benefits of the crime are another factor that influences crime in societal set up. Arguing from learning theory, crime is social activity, which an individual may learn through interaction that happens within intimate groups (Beran, 2007). Factors such as individual opinion, attitude, and perception concerning peer relationship have an influence on cyber stalking. An individual develops criminal intents after considering social and differential factors. It is apparent that each person is responsible for his behavior. Further, a perception towards a behavior has a greater influence than the behavior in question. Dealing with cyber bullying is a big challenge to the law enforcement officers because one, the perpetrators commits the offense through internet second, tracking of the criminal is not only expensive, but also requires ultra modern facilities (Beran, 2007). Available academic articles suggest that stepping up the war against cyber bullying demands goodwill from the society. Timely report furnished to the authority can help in boosting the fight against the cyber bullying. Police officers have the capability of acting on the information provided especially when the victims provide the information at the right time. Unfortunately, law enforcement officers encounter resistance from the public especially when the society fails to furnish the information about the perpetrators. Some critics have suggested that victims of cyber and cyber bullying often receive the bully information from people that they know (Kalpidou, Costin & Morris, 2008). Some states in America have constituted legal measures, which aim at addressing cases of cyber bullying. However, the implementation of the cyber bullying laws has not been effective because of the partial goodwill from the stakeholders to address the issue. For instance, in adequate information provided by the society would harbor the trend as opposed to stepping up the fight. Many reported cases of cyber bullying illustrate involvement of the perpetrator over along period. This indicates that the bullying activities form a habit of the perpetrator. Study on perception about cyber bullying presents a hypothetical scenario where an individual stalks the other (Beran, 2007). Further, observation indicates that gender factor influence the behavior of stalkers. For example, a male stalker continuously stalks a female victim for some time. The scenarios observed revealed a female bullying were frequent than in cases of male. The observation depicts a trend observed by women in the society. In many cases, women often fall prey to social evils directed to them by men (Beran, 2007). The research is not able to reveal the perception of the stalkers, but provide a basis of argument which illustrate the in all cases stalkers engaged in unwanted behavior for repeated number of times. Research on factors contributing to formation of bullying schemas argues that people develop schemas from various sources. Evidently, forms of mild harassing attitude such as give or send her/him a gift to severe bullying behavior such as threatening with a weapon occur to female than men (Karen, 2006). This illustrates that women are attuned to bullying than men. The method applied by men to seduce women also illustrates the extent of bullying in the society. It is probable that some cases of communication may expose one to bullying schemas based on previous experience. For example, some men insist on continuing with their quest for romantic relationship by ignoring women rejection. Online bullying behavior also illustrates similar bullying trends observed previously. Social networking sites provide information about individual background. For example, Facebook may contain detailed information about individual private life. Studies conducted among Facebook users indicate that cyber bullying is common (Beran, 2007). This occurs because the information of the Facebook user provides information that he or she did not intend to share in public. While the intention of social network is to provide a means of linking people, some bullying may occur when one is offline. In conclusion, the cyber bullying is an emergent social problem that has both psychological and physical effects on the victims. The concerned law enforcement officers can fight the crime through applying modern tracking techniques to acquire information about the where about of the perpetrators. In addition, arraigning and prosecuting the offenders will influence the social beliefs against the activity. The society would probably respond to the reaction of the law enforcers by reducing their activity in fear of the penalty for the crime. This paper recommends stern legal penalties for the offenders. There is need for enhances of legislation which aim at protecting victims of cyber stalking. In addition, it recommends public sensitization. This would help in fighting the problem because many people will see the sense of acting against such vises. References Beran, T. (2007). The Relationship between Cyberbullying and School Bullying. Retrieved 1 Dec 2012, from http://www.ojs.unisa.edu.au/index.php/jsw/article/viewfile/172/139. Hinduja, S. & Patchin, J. (2010). Bullying, Cyberbullying and Suicide. Archives of Suicide Research, 14 (3), 206-221. Kalpidou, M., Costin, D. & Morris, J. (2008).Cyberpsychology, Behavior, And Social Networking. The Relationship Between Facebook and the Well-Being of Undergraduate College Students. New York: Mary Ann Liebert, Inc. Karen, L. Y. (2006). Violence and Victims. Influence of Gender and Experience on College Students' BullyingSchemas. Arkansas: Arkansas State University Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Analyzing a Major Issue/ Bullying (may focus on school bullying or Essay”, n.d.)
Analyzing a Major Issue/ Bullying (may focus on school bullying or Essay. Retrieved from https://studentshare.org/psychology/1463125-analyzing-a-major-issue-bullying-may-focus-on
(Analyzing a Major Issue/ Bullying (may Focus on School Bullying or Essay)
Analyzing a Major Issue/ Bullying (may Focus on School Bullying or Essay. https://studentshare.org/psychology/1463125-analyzing-a-major-issue-bullying-may-focus-on.
“Analyzing a Major Issue/ Bullying (may Focus on School Bullying or Essay”, n.d. https://studentshare.org/psychology/1463125-analyzing-a-major-issue-bullying-may-focus-on.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Bullying and Cyber Stalking

The Role of Government in Information Assurance and Security

With increasing incidences of cyber crime and unwanted access to public and private online data rising, the need for more government input is highly needed.... cyber criminals have continued to develop better and more sophisticated tools of accessing private information of highly confidential government agencies, banks, credit bureaus and research institutes.... Backstreet terrorism has been replaced with more advanced techniques that vary from cyber attacks, access to confidential security details online and attacks on bank information....
18 Pages (4500 words) Research Paper

The Problem of Cyberbullying

According to the article “National Center for Missing & Exploited Children”, cyber bullying is a kind of bullying that is practiced through internet applications as well as technologies like messaging, This type of bullying often starts as a rumor, a photo or sometimes a forwarded message which spiral out of control.... Other forms of cyber bullying include identity theft that involves stealing someone's password and hijacking their online accounts to post humiliating pictures or information, photo-shopping, physical threats and rumor spreading....
4 Pages (1000 words) Essay

Ethical Issues in Social Networking

From the paper "Ethical Issues in Social Networking" it is clear that despite the popularity of social networks such as Facebook, Twitter, LinkedIn, and MySpace, there are important ethical issues or questions that the use of social networks as a means of communication raises.... ... ... ... The main reason why I have chosen to research ethical issues in social networking is that social networks are currently among the major types of technology with a significant impact on information privacy....
2 Pages (500 words) Essay

Cyber Bullying - Sealing a Tragic Faith

The paper "cyber bullying - Sealing a Tragic Faith" states that cyberbullying is certainly a serious issue nowadays.... According to Gaines and Miller (2011), aside from the fact that this case implicated an adult harassing a minor, this incident is cyber bullying because Drew was criminally tried in federal court.... Nevertheless, bullying is a social issue that has apparently lived even in the earliest societies.... According to Meredith (2010), although cyberbullying can be differentiated on that basis from other kinds of harassment and bullying, it is indefinite whether there has really been a quantifiable boost in the rate of harassment and bullying in our nation, or if the arrivals of sophisticated technologies only make it more noticeable or observable....
6 Pages (1500 words) Research Paper

Cyber-Bullying and Gender Differences

The paper "Cyber-bullying and Gender Differences" highlights that most cases where cyberbullying prevalent is during the middle school years and it diminishes during high school.... It was important to note that males reported verbal victimization, physical victimization and verbal bullying and very less relational victimization (Craig, H.... Repetition is a common theme that is involved in the literature on bullying, this describes the time frame and number of occurrences of the harassment; bullying is said to exist if it occurs over and over again during an extended period of time (Olweus, 1993)....
10 Pages (2500 words) Literature review

Ethical Issues in Social Networking

This question is particularly important considering cybercrimes like Cyber Bullying and Cyber Stalking.... Crimes such as Cyber Bullying and Cyber Stalking have made the lives of some social networks users, especially the teenagers, completely miserable.... Many victims of Cyber Bullying and Cyber Stalking develop psychological disorders and some of them even commit suicide (Gayle, 2014).... From the deontological theory of ethics point of view, since the law does not allow one to commit crimes like cyber bullying on social networks, social networks cannot be blamed for the cybercrimes; it is the individual criminals who choose to commit cybercrimes who should be blamed for social crimes, but not the social networks....
3 Pages (750 words) Research Paper

Combating Cyber Victimisation: A Comparative Investigation of the UAE and the UK

The paper "Combating cyber Victimisation: A Comparative Investigation of the UAE and the UK" tells that cyber victimization is the case where crimes are committed using computers or information communication technologies to offend or defraud unsuspecting individuals.... Before examining what constitutes cyber victimization and the related theories, it is essential to have a deeper understanding of cyber victimization from different perspectives and further connect such understanding with relevant legislations that have been passed in both the United Kingdom and Saudi Arabia with aim of combating cases of cyber victimizations....
38 Pages (9500 words) Literature review

Word Grammar-based Articles

This paper ''Word Grammar-based Articles'' tells that Electronic commerce (e-commerce) enables us to carry out business transactions online.... You can buy a phone from a business that sells items online by simply registering with the business through its website, locating the item that you want to buy....
24 Pages (6000 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us