Please enter something

Did you know that approximately 43 percent of young adults and teens have had experiences with bullying online? In fact, studies show that 1 in 4 young adults and teens has experienced it more than once and 81 percent of young people feel that bullies get away with bullying online because it is so much easier than doing it in person. Social media, such as Facebook, Twitter, and Instagram, has become the home of so many young adults and teens. It has grown popular worldwide with people of all ages using them. With the increase in popularity of social networking sites, online activity and messaging apps, online bullying is increasing every day and has tripled within the last year. Users do not realize how easy it has become for someone to get their information, and how easy it is to have that information used against them for bullying. Social media lacks when it comes to the privacy and security of its users, leaving its users to become easy targets for bullies to get away with verbally abusing and threatening other users.

The loss of privacy on social media over the years has led to an increase in online bullying. For example, all your personal information such as what city and state you live in, your phone number, what school you attend, and email addresses can be seen by people who aren’t even on your friend’s list. According to, statistics say 72 percent of teens have a profile on a social networking site or app, and roughly 47 percent have a profile on a social networking site or app that can be seen by anyone. This has made it easy for people to be able to use user information to bully social media network users. Social media network users do not realize how easy it is to be able to use their information. Not only is your information used as a weapon against you, but your information can even be used by bullies to be able to find you. Your information such as what school you attend, what city you live in, phone number, and email, are displayed to everyone, even those who aren’t on your friends list, and even strangers. Bullies can even copy all of your photos and information to make a fake profile of you. I myself, am a victim to a fake with all my information.

It seems unfair to become a victim of bullying, and no one suffering any kind of consequences for it. Social networking users have to go through being insulted, humiliated, and not be able to do anything about it. It is very easy for a bully to change their name and age on a social networking profile. They can open profiles with different photos too. Having a fake profile makes it easier for someone to bully you and go unpunished for it. Bullies can even tag a photo of you without your permission, and also tag others in the same photo who will also bully you, leaving you and your profile exposed for everyone to join in on the bullying by leaving mean comments about you on the photo.

At What Age Is It Acceptable to Allow a Child Unsupervised Internet Use?
4479 words 9 pages

My name is Kevin a Computer Science (CS) major and a member of California State University Monterey Bay (CSUMB). I’m honored to belong to this amazing community, and I welcome anything that I can do to improve continuously and develop it. In this discussion, I will explicitly look into the ethical dilemma relating to the […]

Read more
Bullying Cyber Bullying
Social Media and the Law
2816 words 6 pages

Tinder is an online app for dating that has totally dominated the dating scene in the UK. It is mostly used by people who are single to get potential dates. According to research, the app has approximately 50 million users who are active, going through their accounts up to 11 times every day and spending […]

Read more
Bullying Cyber Bullying
Causes of Bullying and Itd Impact on Adolescents
1883 words 4 pages

Bullying has become a rampant problem in the world today as it was in previous years with the magnitude of the problem increasing and with no signs of ending anytime soon. Different types of bullying that have emerged among teenagers and children are such as utter harassment, cyberbullying, and bullying in schools among other forms. […]

Read more
Bullying Cyber Bullying
Cyber Bullying in College Essay
1217 words 3 pages

When joining the middle school, a decade ago students were faced with the challenge of physical bullying by the students who considered themselves seniors of the school in question. The situations of the physical form of bullying raised too much attention that school counselors got itself involved in stopping that kind of discrimination that the […]

Read more
Cyber Bullying Cyber Bullying College
Routine Activity Theory
745 words 2 pages

Routine activity theory is a crime event theory which focuses on explaining why some people commit a crime. The theory, therefore, states that, for a crime to occur three elements must come together in any given space and time: an available target, a motivated offender, and absence of a capable guardian that could intervene. In […]

Read more
Activity Cyber Bullying Cyber Crime Cybercrime Identity Theft
New Media and New Crime
2297 words 5 pages

The digital media is being praised as a platform that is new and exciting representing the international development. Cell phone, the internet and other new social technologies are being used in strengthening the global communities by readily availing information and also offering some power to the voiceless. The internet and technologies in communication are a […]

Read more
Crime Prevention Cyber Crime Cybercrime Hate Crime
The Estonian Cyberwar Shamoon
1481 words 3 pages

Cyber-attacks are the new tools of national power. The attacks provide a means of influence, coercion and attack. The use of cyber techniques does date back to the 1980s while cyber-attacks for militaries do date back to the 1990s. In the Gulf region, the use of cyber techniques and tools does serve as the instrument […]

Read more
Cyber Crime Cybercrime Nuclear Power
Cyber Crime and Cyberterrorism Essay
745 words 2 pages

Introduction Cybercrime involves all illegal activities through a computer or any telecommunication network. It includes hacking and other crimes conducted through the internet like identity theft and credit card account theft. Financial crimes involve misrepresentation of financial records with an intent of obtaining financial benefits. This includes unauthorized altering of financial data by entering of […]

Read more
Computer crime Cyber Crime Cybercrime Identity Theft
The Data Security Essay
903 words 2 pages

Introduction The information technology is fundamental in our day to day life. However, the emergence and continued growth of the technology has been associated with some various problems. For instance, data security menace including the cyber-attacks, hacking as well as identity theft. The ordeal has until now been declared a catastrophe in the United States […]

Read more
Cyber Crime Cybercrime Identity Theft
Essay About Cyber Bullying
3245 words 7 pages

Cyber bulling refers to the act in which someone deliberately threatens to harm or makes an harassment by the use of the internet and other information technology avenues in a manner that is consistent. The act of cyber bulling can take different methods ranging from acts like spreading rumors to even performing acts of defamation […]

Read more
Cyber Bullying Cyber Crime Cybercrime
Online Scams and Hacking
2413 words 5 pages

Overview Issues of online scams and hacking have been disturbing for quite long. A large number of those involved in such activities are majorly driven by the desire to acquire money easily. They take it as a kind of business in which a very minute efforts result into lots of profits. This analysis starts by […]

Read more
Cyber Crime Cybercrime V For Vendetta
Business and Threats Essay
582 words 2 pages

How Security Manifest in Businesses Technology is widely employed in current businesses to streamline the operations and increase the output due to reduced cost of operation. However, it encounters cybercrime due its global nature. Cybercriminals with malicious ambitions are able to hack and sabotage a company’s information in an aim to discover its competition strategies […]

Read more
Business Cyber Crime Cybercrime Identity Theft
Benefits and Demerits of the Digital Space to the Society
2228 words 5 pages

Technological developments have had a great impact on people’s day to day activities and more arguably ways of communication. Extensive research in the recent years has been done to study the current relationship between people and their phones and other technologies and also their face to face communication with other people. According to my general […]

Read more
Cyber Crime Cybercrime
Cyber Security and Smart City Singapore Smart City
3954 words 8 pages

Abstract Singapore is well recognized as a leading partner in Waste management, strategic security, and technological innovation. The development of Singapore Smart City introduces the country into the leadership of global smart cities in the history of the world. But, Smart Cities comes with their own package of challenges which Singapore Smart City concept must […]

Read more
Cyber Security Cybercrime Security
Privacy Issues Related to Personal and Business-Related Cybersecurity Scenarios
1529 words 3 pages

Individuals value their privacy as well as the protection of their personal areas in life. They do value some control over who does know anything about them. Most of the time they do not want their personal information being accessed by anybody at any time. Analyzing personal privacy issues that are related to various business-related […]

Read more
Cyber Security Cybercrime Security
Cyber criminals and security
1246 words 3 pages

Introduction Cybersecurity refers to a collection of technologies, practices and processes designed for the sole purpose of protecting computer, programs, networks and data against damage attacks or from any kind of unauthorized attacks (Von Solms & Van Niekerk, 2013). Generally, in the IT sector the word security refers to cybersecurity. To understand cybersecurity, one should […]

Read more
Cyber Security Cybercrime Security
Cyber Security and Computer
1012 words 2 pages

Abstract Computer hacking involves the modification of computer hardware and software to attain an objective external to the owners innovative function. Hacking involves people who are not proficient in their profession and it is majorly meant to break or alter the functioning of an existing system. Computer hacking has increased drastically over the years. This […]

Read more
Cyber Security Cybercrime Security
Cyber Security and Victimization
2906 words 6 pages

Introduction The internet is amongst the fastest-growing fields of technical infrastructure advancement. Currently, information and communication technologies (ITCs) are everywhere, and the world is becoming more digitized by the minute. The bidding for computer and internet connectivity has brought about a high degree of assimilation of computer technology into the field of production so that […]

Read more
Cyber Security Cybercrime Security
Smart City and Cyber Security: A Case Study on San Diego
3117 words 6 pages

Introduction Cities all over the world are increasing growing smart. These include San Diego, Barcelona, New Yolk, and Dubai among many others. However, this has been posed them in the fatal risk of compromised cyber security and potential loss of their assets such as information system concerning the local department, general security, schools, power plants, […]

Read more
Cyber Security Cybercrime Security
The protection of the information system
1573 words 4 pages

Introduction Cyber security mainly involves guarding of information system from either damage or theft (Glantz et al, 2014). The protection of the information system also starts from enacting of measures which also prevent certain individuals from physical access of the hardware which contains the information (Glantz et al, 2014). Despite all this protection, some people […]

Read more
Cyber Security Cybercrime Security The juvenile
Cyber terrorism and Terrorist organizations
756 words 2 pages

Cyber terrorism is the intentional use of computers, networks and internet to cause harm and destruction (Conway, 2014). It is done to intimidate a government in furtherance of social and political objectives. An attack should result in violence against people and property or at least cause enough harm to generate fear in order to qualify […]

Read more
Cyber Security Cybercrime Reign of Terror Security
Information and Cyber Security
2746 words 6 pages

Introduction The Internet has forever changed the way the world does business, communicates, and shares information. Because the Internet and computers provide a convenient, fast method to communicate, do business, and share information, there are a growing number of businesses, individuals, and governments that have shifted its functions and activities to the Internet. Like all […]

Read more
Cyber Security Cybercrime Security

Popular Questions About Cyber Bullying

What are the problems with cyber bullying?
Cyber bullying is related to short and long term problems for the victims and the bullies, such as depression, anxiety, poor school attendance and performance, and feeling fear and mistrust toward others.
What are the bad things about cyberbullying?
Cyberbullying is harmful for the following reasons: Cyberbullying behaviors are carried out from a distance and can be instantly broadcasted to a large number of people. Cyberbullying does not require physical strength or face-to-face contact. Messages are sometimes sent anonymously so those targeted have no idea who is responsible.
What are the 5 types of cyberbullying?
The Five Types of Cyberbullying. There are five different types of cyberbullying. They are harassing someone, impersonating someone, photo harassment, creating websites, blogs, and polls, and participating in “Happy Slapping” (Gordon). All of this makes cyberbullying a very dangerous form of bullying.
How can you deal with cyber bullying?
Other ways to help deal with cyber bullying is “blocking” a person, changing a phone number and/or email address. In cases where cyber bullying continues to occur, contact police and involve law enforcement.