Cyber Bullying Essays
Did you know that approximately 43 percent of young adults and teens have had experiences with bullying online? In fact, studies show that 1 in 4 young adults and teens has experienced it more than once and 81 percent of young people feel that bullies get away with bullying online because it is so much easier than doing it in person. Social media, such as Facebook, Twitter, and Instagram, has become the home of so many young adults and teens. It has grown popular worldwide with people of all ages using them. With the increase in popularity of social networking sites, online activity and messaging apps, online bullying is increasing every day and has tripled within the last year. Users do not realize how easy it has become for someone to get their information, and how easy it is to have that information used against them for bullying. Social media lacks when it comes to the privacy and security of its users, leaving its users to become easy targets for bullies to get away with verbally abusing and threatening other users.
The loss of privacy on social media over the years has led to an increase in online bullying. For example, all your personal information such as what city and state you live in, your phone number, what school you attend, and email addresses can be seen by people who aren’t even on your friend’s list. According to internetsafety101.org, statistics say 72 percent of teens have a profile on a social networking site or app, and roughly 47 percent have a profile on a social networking site or app that can be seen by anyone. This has made it easy for people to be able to use user information to bully social media network users. Social media network users do not realize how easy it is to be able to use their information. Not only is your information used as a weapon against you, but your information can even be used by bullies to be able to find you. Your information such as what school you attend, what city you live in, phone number, and email, are displayed to everyone, even those who aren’t on your friends list, and even strangers. Bullies can even copy all of your photos and information to make a fake profile of you. I myself, am a victim to a fake with all my information.
It seems unfair to become a victim of bullying, and no one suffering any kind of consequences for it. Social networking users have to go through being insulted, humiliated, and not be able to do anything about it. It is very easy for a bully to change their name and age on a social networking profile. They can open profiles with different photos too. Having a fake profile makes it easier for someone to bully you and go unpunished for it. Bullies can even tag a photo of you without your permission, and also tag others in the same photo who will also bully you, leaving you and your profile exposed for everyone to join in on the bullying by leaving mean comments about you on the photo.
It happens in outside in or outside the classroom in the workplace, and online Boys and arils are equal. Cyber bullies: Individuals with no strong relationships that are immature who are involved with hate groups who have been bullied themselves cliques. Just like bullies in the real world, cyber bullies get pleasure from tormenting their […]
Megan Meier of Darlene Prairie, MO, made a new friend Josh, who she met on Namespace. After only a month of conversation, Josh started to post messages saying that Megan was cruel, a slut, and that she was fat. After that one short month, they ended their friendship. One day later, Megan committed suicide (Democrat […]
How to Prevent Cyberbullying Start by gathering survey and/or interview data from your students to formally assess the extent and scope of the problem within your school district. This data will serve as a baseline measure to develop specific strategies that will effectively educate students and staff about online safety and Internet use in innovative […]
Good Morning, Today I will be doing my oral presentation on cyber bullying and how it affects young children all over the world. How many of you in this room have been cyber bullied? I’m pretty sure all of you have. A survey shows that a huge 42 percent of young girls and boys have […]
Though the use of sexual remarks and threats are sometimes present in cyber-bullying, it is not the same as sexual harassment and does not necessarily involve sexual predators. [edit] Cyber-bullying vs. cyber-stalking The practice of cyberbullying is not limited to children and, while the behavior is identified by the same definition in adults, the distinction […]
The measure of time that kids and teenagers commit to the digital world has expanded. Ninety-three percent of youngsters in the United States have a PC, while 78 % have phones (Madden et al. 2013). The present family Internet get to rate in Taiwan is 85 %, while 95 % of adolescents have utilized the […]
At some point in ones life they probably encountered a troubled person, Usually known as a “bully”, the one who tears down one’s self, mentally and physically. Online, bullies have access to many platforms to find their victims and harass them. A study showed that about 10 to 20 percent that youths experience the most […]
The smallest prank becomes the biggest crime if it isn’t terminated, Cyberbullying often isn’t only taking place on the internet but in real-life as well. Bullies may be engaging in similar behavior on the playground as they do online, so if you are a teacher or a parent, it’s important to watch for visible signs […]
Introduction With the ease of access to internet and social media becoming an integral part of our day-to-day life, cyberbullying has been an issue for many years, especially among the youngsters. Cyberbullying is an aggressive act that harasses, humiliates or threatens other people via the Internet, social media or other electronic contents. The two main […]
My name is Kevin a Computer Science (CS) major and a member of California State University Monterey Bay (CSUMB). I’m honored to belong to this amazing community, and I welcome anything that I can do to improve continuously and develop it. In this discussion, I will explicitly look into the ethical dilemma relating to the […]
Tinder is an online app for dating that has totally dominated the dating scene in the UK. It is mostly used by people who are single to get potential dates. According to research, the app has approximately 50 million users who are active, going through their accounts up to 11 times every day and spending […]
Bullying has become a rampant problem in the world today as it was in previous years with the magnitude of the problem increasing and with no signs of ending anytime soon. Different types of bullying that have emerged among teenagers and children are such as utter harassment, cyberbullying, and bullying in schools among other forms. […]
When students began attending middle school a decade ago, they faced physical bullying from older students who saw themselves as superior. This grave issue caught the attention of school counselors, who intervened to halt this form of mistreatment towards new students. At that time, communication among students occurred face-to-face. However, advancements in technology have completely […]
The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around […]
Hacking into the mind of the Hacker Computer hackers regardless of what ever may say are technology happy thefts who are thrilled by their success in breaking into others private data accounts. Generally, hackers do their thing for fun at first. Monte Enbysk (2003) stated that most hackers started out for fun but finished their […]
According to the Merriam-Webster’s Dictionary, cyber security refers to the actions taken to safeguard a computer or computer system (such as over the Internet) against unauthorized access or attack. While most people perceive hackers as individuals who aim to disrupt your computer, legitimate hackers break into systems to explore their capabilities and may leave a […]
COMPUTER CRIME Criminal activity is a frequent term heard in today’s globalized world. It encompasses any contravention of legislation or the carrying out of a prohibited act. Humans have been linked with illegal activity throughout history. Various countries adopt diverse approaches to combat crime, depending on its type and magnitude. It is evident that countries […]
Social engineering refers to the collection of techniques used to persuade individuals to reveal their personal information to a third party (Mitnick et al.). According to experts (, 2002), social engineering is a type of fraud that involves tricking individuals into divulging important information through a computer website without the attacker physically present. This scam […]
Spyware, also known as sneakware, is a type of software that secretly enters computers and sends data to external sources. It can be installed in various ways, such as downloading free software online, visiting websites, or using CDs. Spyware remains hidden from users while monitoring their preferences and personal details. In certain instances, the data […]
Within this text, we aim to elucidate the four primary classifications of computer crimes and furnish an exemplification for each respective category. There are various types of computer crime and classification methods. This discussion will highlight four categories to show the risks associated with using personal or public computers for tasks like transmitting confidential information, […]
In defining computer viruses Parsons and Oja wrote that the technical definition of a computer virus is a set of program instructions that attaches itself, and spreads to other files. Viruses corrupt files, destroy data, displays irritating messages, or otherwise disrupt computer operations. In continuing, Parsons and Oja explained that there is a common misconception […]
Research conducted by IBM Security and the Ponemon Institute has unveiled a worrisome level of insecurity in the mobile space. The findings suggest that nearly 40 percent of large companies, including those listed in the Fortune 500, are not adequately safeguarding the mobile apps they develop for their customers. Furthermore, the study highlights the insufficient […]