Curbing Cyber Bullying - Edited

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Student’s Name

Instructor’s Name

Affiliated Institution

Date

Curbing Cyberbullying

Introduction.

In the United States, cyberbullying is categorized and recognized as a significant

public health concern, primary contextualized as a digital form of peer aggression (Espelage,

Hong, & Vilado, 65). Social networking sites (SNSs) are regarded as the most profound mode

of communication in the current century as they provide a platform on which people can

interact with their friends and relatives. However, while the sites were intended for

communication purposes, they have become breeding grounds for cyberbullies (Chan,

Cheung, & Wong, 575). The practice's perpetrators have adopted the different social

networking sites as their avenues for harassment, exploitation, and spreading threats to their

potential victims. Cyberbullying is a type of abuse that is developed through the use of

information and communication technology, which is inclusive of social media, through

which culprit's spread their terror, intimidation, discriminatory and demeaning messages to

their victims. While social media sites are in operational and accessible at any given time, the

messages can be passed down to the target without facing any barriers. Mainly, the messages

spread regarding the victim are intended at shaming them through pictures or messages as

well as rumours. Since the practice is profound, the affected individuals develop emotional

feelings of torment, threat, humiliation, harassment, embarrassment and also as a target for the

perpetrator. The context of the issue may be carried out through the use of e-mails, mobile

phones, and even social sites, where derogatory, heinous and hostile messages may be sent to
the victim or for others to see. Also, images that aim at harming or hurting the person's

reputation may be shared through the platforms. According to Selkie et al. (2016), individuals

affected by the practice have been identified as exhibiting signs of mental and physical health

problems, accompanied by anxiety, depression and suicidal tendencies. Therefore, the

implications associated with this social vice in the society are dire and severe, and a

contingency plan needs implementing with immediate urgency. This research paper argues

that in curbing cyberbullying punishing perpetrators caught through the use of tracking

devices should be imposed.

Children across different ages are affected mainly by bullying, thus posing a

significant challenge for them that might be delivered in various forms and each, it leads to

traumatic outcomes. Some people might have a different opinion on the concept of

cyberbullying; for instance, they may argue that it is not a significant problem. To such

people, offline bullying poses more considerable harm to a person than online harassment.

These people imply those trolled and taunted on the cyberspace have contributed to the

generation of the issue. Furthermore, they note that the context of cyberbullying is a matter

that quickly gets resolved. Therefore, by imposing strict policies and laws on cyberbullying

present a potential help in curbing the distressing social problem; however, those arguing

against the problem hold that the challenges faced from cyberbullying are easily solved, as

such stricter laws and policies are inconsequential (Espelage, & Hong, 375). Thus, these

groups believe that the most obvious solution to the issue is through the victims' avoidance of

the aspects that instigate the problem, that is by stoping the act of making themselves the

target. According to Amanda Lenhart, senior research specialist at the Pew Internet and

American Life Project, teenagers sharing identities and thoughts on social networking sites

are likely to end up as the primary targets as compared to those who present a minimal online

presence. Mainly, cyberbullies access the shared private information and then use it in a
manner that fits their interpretation and then proceeds to share it in an uncouth way almost

electrically. At times teens might be trapped into saying something profound and secretive

about themselves or sending unappealing photos of themselves which are then used to harass,

and even socially tarnish their reputation. The information and pictures are posted on social

networking services where every person can access them. However, in some instances where

people post their personal information or photos online, those against the context of

cyberbullying as having a severe effect might imply that the person, especially teenagers

doing this are making themselves a centre of attraction for the bullies

Technology is presented with unlimited potentials as it advances new devices,

software and innovation are introduced in the market. The issue of cyberbullying is in

existence due to several of these advances. Nevertheless, while it instigated the platforms on

which perpetrators carry out their ungodly intentions on innocent victims, through its

measures to curb the problem are founded. Among the innovations serving this purpose are

tracking devices, which are advanced enough to provide the criminal's location through their

IP address as well as identity. Engaging law enforcement agencies ensure that the identified

culprits are brought to justice. However, those opposing the argument believe that technology

should be held solely accountable in the development and growth of cyberbullying practices

and that those who feel at risk should remove the social sites from their devices or exit from

them. They believe that through this approach, they can easily protect themselves from the

harm posed. According to Kowalski et al. (41) before the era of technological advancements

issues of cyberbullying were not as reported as they are today, this is because children are

following the changes in technology more than the adults. Cyberbullying does not identify

victims as the guilty party in the events of the issue since the victims have not requested on

becoming targets for harassment. The culprits need to acknowledge morally that the practice

is not a positive thing. Subjecting another person to humiliation and gaining enjoyment from
it can be considered a mental problem. Arguments are presented that the victims in

suppressing the impact of the bullying, should reduce or eliminate the aspects of cyber in the

context of bullying. Cyberbullying may be prevented by assessing and tracking suspicious

pages. Students and internet users will report any unusual behaviour they might have been

subjected to while visiting numerous websites. According to Rice et al. (2015), the leading

cause most adolescents and teens fall prey to online harassment is that majority of them

neglect to use the cyberbullying prevention's precautions provided.

Automatic detection of cyberbullies is a potentially practical approach in dealing with

the issue by use of the law (Akshi & Sachdeva. 23975). Cyberbullying is a significant

problem that needs to be handled with a sense of strictness. Several studies have provided

information that through the use of detection devices, the practice can be curbed and also

promote the probability of the culprit facing justice. Most cyberbullies acquire information

used against the victim through online platforms such as Twitter, where they share specific

details. However, even though a person shares details that are tainted, it is not a positive

approach for another sane person to use it as a tool for harassment. This is because to some

extent, the approach taken by the bully might negatively affect them and end up causing a

suicide. With regards to suicide, the perpetrator needs to be charged with an offence similar

to that of a murder. This is because, they are the significant instigators and igniters of the

outcome, through their inhuman act of trolling and haunting the later to their demise. From

this perspective as such, law enforcement agencies need to utilize the resources availed to

them, such as IP address tracking and use it to locate and capture the criminal, whose penalty

will serve as an example to others of their kind. Instagram is among the social networking

sites that have adopted technologically approaches to combating the effects and prevalence of

the issue in the United States. The company implemented an artificial intelligence measure for

the detection of cyberbullying words and behaviours and blocking them once sighted.
The government's role in facilitating the adoption and implementation of the various

laws and policies against cyberbullying is significant. Over the years, as the issue developed

into a national health problem, the government has provided substantial requirements in

ensuring that culprits face the rule of law whenever they engage in the social vice and are

caught. Penalties and punishments consisting of fines and jail terms are in place intending to

curb the issue. According to Cornell and Limber (64), the government has stipulated several

policies aimed at governing how bullying is handled and controlled. A lot of people have

specific experiences where a bully intimidates or makes fun of them is unforgivable. For

several years bullying has occurred in school; it can happen at any point in the life of someone

at any age. And if a lot of people believe this is a natural part of life and it only needs to be

dealt with the right way. No one should ever have to be ashamed to reveal cyberbullying, hide

in isolation, or live in terror. Cyberbullies use brutal methods considered a felony, due to the

severe implications that accrue.

Further, the government indicates that the Children's Internet Security Act of 2000

(CIPA) is the principal federal legislation governing Internet protection (Kaough, 3). Schools

and libraries applicable to the CIPA will have an Internet protection strategy for their devices

that filters and removes obscene content to earn internet concessions through the E-rate plan.

This program allows e-mail facilities more accessible to some schools and libraries. They will

need to provide a strategy that tackles the exposure of minors to unsafe online content.

Strict actions, such as deleting the social media page of the cyberbully, must be

considered. Redacting social media from a cyberbully will minimize the amount of online

harassment that teens face because it won't allow certain types of people to threaten others.

Select different platforms for social media should be designed where people can report online

trolls, and these social networking sites should also investigate the accounts mentioned.

People can inform other users of social media. However, it is not considered seriously, and
the social networking site's creators are not scrutinizing anyone recorded (Buckels et al. 330).

By having their accounts deleted, and traced will ensure that the perpetrator is caught and

punished by the law. Social media does have its drawbacks, but it must be used appropriately.

Cyberbullying is a severe crime that endangers security and ravages the Internet, and online

abuse must be avoided by all means. The consequences of harassment can be crippling and

life-threatening with an increasing rate of suicides within a month, and it requires eliminating

before it gets out of control. Although harassment can not necessarily be stopped, it can be

avoided by creating awareness that it will mitigate many needless deaths among children and

adolescents.

Including harsh harassment, penalties have the power to alter online culture amongst

minors. Enhanced legal penalties mean that parents could become more interested in the

digital life of their child or embark on a more active role in the domestic debate on online

bullying. This is not only to cut off their kids from turning into bullies but also to make

parents more cautious when cyberbullies target their kids. Strong legal sanctions for

cyberbullying will raise awareness of the issue, and more parents will be able to prevent the

situation from getting worse. Having parents and teachers aware of cyberbullying will help

teach children how to safeguard themselves through internet protection and inappropriate

content that can emerge from the site (Chatzakou et al., 25). The essential thing is always to

track them. Parents must have updates to all their children's accounts, and their children

should understand that their parents may periodically monitor to ensure their internet activity

are secure. Most of the time, many people want to leap in and help, but don't know how to

cope with this problem.  Friends and acquaintances will help by stepping up and fighting back

against the culprit. Confronting the cyberbullies and making them understand the

implications that their actions have, might help in presenting a solution to the problem. 


It's often reported that online bullying isn't as dangerous as physical harassment. Still,

the reality that cyberbullying targets can be abused endlessly at any time implies that

cyberbullying may be even more damaging psychologically. Some claim that cyberbullying

regulations would infringe freedom of speech for Americans. Through making cyberbullying

a punishable offence, perpetrators will be deterred from sending offensive messages, and

cyberbullying targets can feel better with the knowledge that they will be protected under the

law. Besides, taking cyberbullying more seriously and punishing cyberbullies can reduce the

number of suicides caused by bullying and save young people's lives nationwide. When

punishments are not put in place for the crimes committed by cyberbullies, the cases and

numbers of affected and victimized individuals will continue to grow as technologies continue

to advance. Therefore, any person owning a smartphone or access to social networking sites

was vulnerable to online harassment. Thus, to ensure the safety of individuals from

cyberbullying, perpetrators caught should be held accountable and punished for the crime.

Work Records
Buckels, Erin E. et al. "Internet Trolling And Everyday Sadism: Parallel Effects On Pain

Perception And Moral Judgment". Journal Of Personality, vol 87, no. 2, 2018, pp. 328-

340. Wiley, doi:10.1111/jopy.12393.

Chan, Tommy K. H. et al. "Cyberbullying On Social Networking Sites: The Crime

Opportunity And Affordance Perspectives". Journal Of Management Information

Systems, vol 36, no. 2, 2019, pp. 574-609. Informa UK Limited,

doi:10.1080/07421222.2019.1599500.

Chatzakou, Despoina et al. "Detecting Cyberbullying And Cyber aggression In Social

Media". ACM Transactions On The Web, vol 13, no. 3, 2019, pp. 1-51. Association For

Computing Machinery (ACM), doi:10.1145/3343484.

Espelage, Dorothy L, and Jun Sung Hong. “Cyberbullying Prevention and Intervention

Efforts: Current Knowledge and Future Directions.” Canadian journal of psychiatry.

Revue Canadienne de Psychiatrie vol. 62, 6 (2017): 374-380.

doi:10.1177/0706743716684793

Kaough, Eliot. “Combatting Cyberbullying: Government, NGO and the Private Sector.”

Information & Knowledge Services.

https://www.gov.il/BlobFolder/reports/cyberbullying_brief/en/cyberbullying%20brief

%2001.13.pdf

Lenhart, Amanda. "Cyberbullying Is Not Worse than Physical Bullying." Media Violence.

Ed.Louise I. Gerdes. San Diego: Greenhaven Press, 2004. Opposing Viewpoints. Rpt.

From "Cyberbullying and Online Teens." Pew Internet & American Life Project. 2007.

Opposing Viewpoints in Context.


Kowalski RM, Morgan CA, Limber SP. Traditional bullying as a potential warning sign of

cyberbullying. School Psychology International. 2012;33(5):505–519

Kumar, Akshi, and Nitin Sachdeva. "Cyberbullying Detection on Social Multimedia Using

Soft Computing Techniques: A Meta-Analysis." Multimedia Tools and Applications, vol

78, no. 17, 2019, pp. 23973-24010. Springer Science And Business Media LLC,

doi:10.1007/s11042-019-7234-z.

Selkie, Ellen M. et al. "Cyberbullying Prevalence Among US Middle And High School–Aged

Adolescents: A Systematic Review And Quality Assessment". Journal Of Adolescent

Health, vol 58, no. 2, 2016, pp. 125-133. Elsevier BV,

doi:10.1016/j.jadohealth.2015.09.026.

You might also like