Buy Existing Paper - How is cyberbullying defined in this article?

How is cyberbullying defined in this article?

Category:

Description

How is cyberbullying defined in this article?

The author of the article has borrowed Cyberbullying Research Center’s description to define cyberbullying as a harm that is willfully inflicted on a person over and over through electric devices such as computers and mobile phones. Therefore, the act must be deliberate, exhibit a certain pattern, must involve electronic devices, and must cause harm on the intended target who is the victim.

  • What are the most common places where cyberbullying occurs?

The most common places where cyberbullying takes place are social media cites such as Instagram, Facebook, and Twitter. It is also common in emails and text messages.

  • Describe the types of Cyberbullying the article addresses

The author of the artilce has identified six different types of cyberbullyig:

  1. Flaming: This involves one or more bullies posting insults aimed at attacking a person simply because of their views or comments on social media sites. The attacker can lace their cruel words with harsh images.
  2. Exclusion: Since people have attendance to be social by nature, the bullies choose their target and intentionally detach them from social interactions such as chats or simply ignore them on message boards. At times, those seeking to socially exclude a person may make disgusting comments about their target.
  3. Harassment: This type of cyber bullying involves one or more bullies attacking their target repeatedly. It may involve the internet where a person attacked on a social media platform. It can also take the form of text messaging.
  4. Cyberstalking: In this type of the cyberbullying, the bullies use electronic communications to gather information about their target. They threaten them repeatedly and stalk them around various internet sites including social platforms. It involves behavior pattern that is malicious, and which can pose a credible threat to a person especially when the bully crosses the line into physical stalking.
  5. Outing: Outing involves the act of releasing or sharing of private information with malicious intentions, for example, to humiliate or embarrass the target. For instance outing occurs when one or more bullies may decide to publish on the internet financial information that was meant to be private and thus to be viewed by one person. It can also include malicious sharing of pictures or videos, or just spreading rumors that target the personal life of an individual such as their sexuality.   How is cyberbullying defined in this article?
  6. Masquerading: This an elaborate cyberbullying form where one or more bullies create a fake identity with the aim of harassing a person anonymously. The attacker presents to be or impersonates another person. On social media sites, the bully can impersonate the victim themselves with the view of destroying their reputation.
  • What are some of the effects of cyberbullying on the victim that the article lists

The author points out that cyberbullying can have negative psychological effects on the victims. It lowers their self-esteem since apart from having little protection; they do not have a chance to face the anonymous attacker. The victims can develop depression, which in some cases has resulted in suicide. Other effects include alcohol abuse as a result of depression, poor academic performance, loss of productivity, and anger.

  • On a college campus, discuss the options for reporting cyberbullying. What administrators should a student report incidences of cyberbullying to?

College campuses have recognized the need to address the problem of cyberbullying and several options are available for victims to report this form of the attack. They include campus security, local law enforcement, student services, and information and telecommunication department.

It has been established that cyberbullying can cause students to commit suicide. Campuses declared harassment and stalking as illegal, in accordance with the law. A student that experiences any manner of cyberbullying can, therefore, involve campus security teams who have the authority to address the vice and prevent its escalation in this environment. He should provide all the details including the dates and description of activities.

Another resource available to students on campus is local law enforcement. These are particularly helpful where campus security lack the necessary tools to prosecute the bullies. The IT department could also be a helpful resource. Usually, the bullies tend to be anonymous. However, the technology available such as new applications, detection software, and sensing devices could be helpful to uncover the attacker. In some campuses, a student could seek help from student services. Apart from providing the necessary guidance and counseling, the victims can get assistance to report to local law enforcement agencies or IT department.How is cyberbullying defined in this article?

A student should report incidences of cyberbullying to trusted administrators within their college or university. These administrators could be resident assistant, advisor, or faculty member. He could also report to campus security.

  • Describe how Facebook is addressing this problem and how to report on Instagram.
  • Facebook has approached the problem of cyber bullying by providing clear guidance and instruction on how users can make can take advantage of already developed safety features that give them the freedom to control the extend of exposures and level of interaction. The company introduced a “reporting” tool where a person can report a video, comment or photo that they would like to be removed. Moreover, it has introduced Suicide Prevention tools that make it possible for third parties to report posts, images, and videos identified as distress signals. Reporting any form of cyberbullying on integral is easy. When a person is tagged in a photo that they deem as cruel, inappropriate, and embarrassing, they can “Report it as Inappropriate” on that social media platform. They can also lick and remove it from their profile by clicking “Hide.”
  • What is bystander intervention?

 

Usually, cyberbullying incidents take place when other people are around and watching. These individuals are referred to as bystanders. Bystander intervention refers to the action taken by a person to provide support to a victim or stop an incidence of cyberbullying. Such a person can intervene by reporting to the relevant authority or telling a family member.

  • Read the Tyler Clementi story and watch the video and write a brief reaction. Describe what Rutgers University has done to address this problem.How is cyberbullying defined in this article?

 

After watching the video, I felt it was so unfortunate that a student would invade the privacy of his colleague and to make matters worse, let the whole world know about what the targeted victim does in his private life. It is only after I read the article about Tyler Clementi story and watching the short video that I realized the harm that can result from extreme forms of cyber bullying. Although students  enter colleges hoping to achieve academically, forge new friendships, and pursue their career aspirations, it can also mean a time of humiliation as it was the case for Tyler. His friend intentionally humiliated him. It was this development, and the fear of being alienated from his friends, that could have forced him to commit suicide. The story indicates that there is need for colleges and universities to be proactive in dealing with various forms of cyberbullying in this environment. It is tragic to loss a student to suicide. It becomes necessary for institutions to eliminate or reduce the potential for victims of cyberbullying developing mental or emotional harm by addressing the problem itself.  Rutgers University has done a commendable job to address the problem. The institution, in conjunction with Tyler Clementi Foundation established the Tyler Clementi Center that works to provide education with the aim of addressing bias and peer aggression that target stigmatized populations. This way, the institution provides the support that some of its young adults, especially those that do not conform to their gender, could be dearly in need of. By taking this approach, the institution has become more responsive to the changing world that students live in.

  • There is an interview at the end of the article. What is the most important step that Claire K. Hall, J.D. recommends a college student take if they become a victim of cyberbullying?

 

Claire K. Hall recommends that to protect themselves, students that have become victims of cyberbullying should report it to an administrator that they trust since they can determine who the bully is. Even when determining the identity of the attacker is not possible, the administration can provide resources that students would require at that particular time, such as counseling services. If identified, the institution would take the necessary disciplinary action against cyberbully. How is cyberbullying defined in this article?

  1. B) If you have personally been a victim of cyberbullying, please describe in as much or as little detail as is comfortable for you what occurred and what, if any, steps you took to stop the cyberbullying.

Yes, I have been a victim of cyberbullying. When I was in my early teen years, I developed friendship with presumably a young girl that I had met via a social media platform. Soon our friendship developed into a romantic one. This was my first encounter, though, and at times I felt I was not so sure of what I was doing. Soon I realized that the relationship was taking most of my time. We would spend a lot of time texting each other and chatting. Soon, I had to tell her that I needed some time to concentrate on my studies since I had an exam approaching. To my surprise, this triggered her to send me abusive texts and to post obscene photos on my profile. It was then that I realized that I was being bullied by a person that I did not even know. Luckily, I quickly blocked her on the platform she could cause any mental or psychological damage to me. It was then that I appreciated some of the features that the platform had to address the problem of cyberbullying.

  1. C) If a friend of yours has been a victim of cyberbullying, please describe in as much or as little detail as is comfortable for you what occurred and what, if any, steps your friend took to stop the cyberbullying.  Please try not to identify your friend in the interest of their privacy

 

Yes, I have a friend was once a victim of cyberbullying.  On one day, my colleague in high school received a text in his phone that asked him to consider committing suicide. The bully claimed that he was worthless and everyone knew that. Luckily, this person was the brightest person in our class given that he would score the highest marks. He immediately recognized that the message was from a bully since what the attacker claimed was not true. My friend went and reported the message to his parents straight away. The following day, they went and reported it to the police. After two weeks, the culprit was identified. He was another classmate.

  1. D) Watch the video posted on Blackboard entitled Under Seige: Women Gamers Shine Despite Online Bullies.   Write your reaction to this video.   If you are a gamer, male or female, describe any experience you have had or that you have seen regarding online gaming harassment or bullying.  

After watching the video, I have realized that online games are rife with cyberbullying. One strategy of minimizing incidences of bullying is for the gamers not to reveal their gender, especially if they are females. Moreover, gamers who avoid playing with strangers minimize chances of being bullied online. Being with video gamer comes with many challenges. For example, negative comments can be made in group chatting, making a player feel humiliated or embarrassed. The most harassed players are women, minority, and gay gamers. However, there are strategies that gamers could use to stop this online harassment. For instance, they could choose to avoid group chats altogether, mute players that seem to be bullies, or utilize bystander intervention by defending other players being targeted.

  1. E) Read the article entitled “5 Ways to Stop Online Gaming Harassment, and Stop Getting Harassed and write your reaction to the article.How is cyberbullying defined in this article?

 

 

The article provides helpful clues that online gamers could apply to stop harassment.  The article is also helpful to those who perpetuate the problem of cyber bullying in online games. For instance, when both the victim and the bully decide to avoid participating in bullying, cases of cyberbullying can decrease. Muting bullies is also a helpful resource that rivals the blocking tool available on various social media platforms. The article identifies the bystander intervention as an effective way of combating harassment in online gaming. There are also other steps that a gamer could take to protect himself. For instance, they should avoid giving personal information or put in place a filtering system that would protect them from encountering bullies.

  1. F) Read the article posted on Blackboard entitled Preventing Cyberbullying – then describe which of the recommended steps you have personally taken after reading this article.

I have taken most of the steps described in this article to protect myself from cyberbullying.  I have restricted access to personal information such as my phone number, email and physical address in all my social media accounts to insure that they do not get into the wrong hands. Moreover, I avoid writing in all caps. I the article, the author has emphasized on the need to avoid sending inappropriate pictures or videos. Therefore, I ensure that the pictures and videos that I send are appropriate and that I will not have to worry in the event that they become exposed to the public. Once in a while, I Google my full name to see if there is any information that has been posted online about me. Although the article highlights the need to avoid accepting requests from strangers, I find this difficult to implement given that I like to connect with people and make new friendships online. However, I am now using site-based controls to prevent people from searching my name or information about me. Moreover, I am skeptical in all my online interactions and I always try to restrict the information that I share with my followers or friends.How is cyberbullying defined in this article?