Edudorm Facebook

Technology and Cyber Bullying

Technology and Cyber Bullying

Cyberbullying has increased rather drastically in the recent years due to the advancement of technology. Cyberbullying can best be described as the utilization of electronic messaging to intimidate an individual by sending threatening or horrifying messages. Technology in most instances can be applied both in a desirable and undesirable manner (Cooley, 2011). Several technologies such as mobile phones, computer, social media and instant messaging are utilized for communication as well as cyberbullying intentions. To begin with, while mobile phones are designed to ease the means of communication and to ensure that people are always in-touch with each other they are mainly utilized to intimidate others. In that, it is through the use of such devices that the sharing of hash messages and ruining pictures are sent. This normally leads to the loss of the self-confidence sense. By making nasty calls and harassing information in addition to sharing humiliating photos the intention of cyberbullying is accomplished through this technology. In addition, the gadgets are utilized to take videos that are supposed to remain private and posting them on different internet sites thus violating individuals privacy right (Cooley, 2011).

Computer is an additional technology that cannot be undermined based on its ability to facilitate cyberbullying. Most individuals depend on computers to accomplish daily activities such as workloads and communication an aspect that is exploited by others. In that, computers are currently utilized in hacking individual’s data and essential information courtesy of information technology (Taylor, Fritsch & Liederbach, 2015). By hacking most of the private content is exposed while most of it is utilized for intimidating as well as humiliating individuals. This is not only an infringement of privacy but it also results in psychological instability in general. On the other hand, social media sites are a different technology that is widely known for cyberbullying. In that, these sites are characterized by a number of features that assist in the general communication as well as viewing posts and sharing. Bullies will mainly utilize the sites to send horrifying and demeaning messages to their targets based on their motives constantly. In addition, it is the same platforms that offer opportunities for sharing humiliating images as well as videos in general that causes trauma and in most cases suicide (Taylor, Fritsch & Liederbach, 2015).

Cyberbullying is one of the most destructive activities currently in the world of technology. Cyberbullying usually leaves the victims traumatized and psychologically affected to the point that they can no longer take part in their usual lives routines (Sullivan & Dawsonera, 2011). In that based on the humiliation that the activity generates it can cause the victims to lose their self-confidence by getting the feeling that they are unworthy or unneeded. If the individual’s psychological level is not good this implies that their general ability to take part in the socio-economic setting is affected as well. This implies that most of them with withdrawing from the social circles leading to isolation and trauma and in most cases suicide. Some tactics such as raising awareness and anonymous management of individual’s online activities can help in combating cyberbullying. In that most of the internet users are not even aware of the dangers that the sites create and therefore educating them will be useful in ensuring that the guard themselves against such attacks as well as help in changing the perception of those that bully others (Sullivan & Dawsonera, 2011). While monitoring individuals activities it will help in getting those involved in bullying and stopping the activities before they can cause more harm to the victims.

 

 

References

 

Cooley, A. H. (2011). Guarding against a radical redefinition of liability for Internet misrepresentation: The United States v. Drew prosecution and the         Computer Fraud and Abuse Act. Journal of Internet Law, 14(8), 1, 15–28.

Sullivan, K., & Dawsonera. (2011). The anti-bullying handbook. Los Angeles, [Calif.: SAGE.

Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism. (3rd ed.). Upper Saddle River, NJ: Pearson.

 

667 Words  2 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...