Did you know that approximately 43 percent of young adults and teens have had experiences with bullying online? In fact, studies show that 1 in 4 young adults and teens has experienced it more than once and 81 percent of young people feel that bullies get away with bullying online because it is so much easier than doing it in person. Social media, such as Facebook, Twitter, and Instagram, has become the home of so many young adults and teens. It has grown popular worldwide with people of all ages using them. With the increase in popularity of social networking sites, online activity and messaging apps, online bullying is increasing every day and has tripled within the last year. Users do not realize how easy it has become for someone to get their information, and how easy it is to have that information used against them for bullying. Social media lacks when it comes to the privacy and security of its users, leaving its users to become easy targets for bullies to get away with verbally abusing and threatening other users.

The loss of privacy on social media over the years has led to an increase in online bullying. For example, all your personal information such as what city and state you live in, your phone number, what school you attend, and email addresses can be seen by people who aren’t even on your friend’s list. According to internetsafety101.org, statistics say 72 percent of teens have a profile on a social networking site or app, and roughly 47 percent have a profile on a social networking site or app that can be seen by anyone. This has made it easy for people to be able to use user information to bully social media network users. Social media network users do not realize how easy it is to be able to use their information. Not only is your information used as a weapon against you, but your information can even be used by bullies to be able to find you. Your information such as what school you attend, what city you live in, phone number, and email, are displayed to everyone, even those who aren’t on your friends list, and even strangers. Bullies can even copy all of your photos and information to make a fake profile of you. I myself, am a victim to a fake with all my information.

It seems unfair to become a victim of bullying, and no one suffering any kind of consequences for it. Social networking users have to go through being insulted, humiliated, and not be able to do anything about it. It is very easy for a bully to change their name and age on a social networking profile. They can open profiles with different photos too. Having a fake profile makes it easier for someone to bully you and go unpunished for it. Bullies can even tag a photo of you without your permission, and also tag others in the same photo who will also bully you, leaving you and your profile exposed for everyone to join in on the bullying by leaving mean comments about you on the photo.

Computer Crime: Prevention and Innovation Essay Example
3071 words 12 pages

Since the introduction of computers to our society, and in the early 80s the Internet, the world has never been the same. Suddenly our physical world got smaller and the electronic world set its foundations for an endless electronic reality. As we approach the year 2000, the turn of the millenium, humanity has already well […]

Read more
Computer Crime Cybercrime Information Age
Cypcore33 Consequences For Children And Essay Example
1234 words 5 pages

With all today’s continuing technology we have a responsibility to help and look after children and young people. E-safety is a safeguarding issue and we must have an understanding of it. Children and young people are open to many risks while being online or using their mobile phones, they may be lured into giving personal […]

Read more
Children Computer Security Cybercrime Internet
Aircraft Solution Inc. Security Weaknesses Essay Example
55 words 1 page

A security weakness in the field of IT refers to a situation where a resource is susceptible to attacks, whether they come from internal or external sources. The level of vulnerability of a resource depends on how easily it can be rendered non-functional by an attack, leading to disruptions in business operations (Schellenberg, 1995).

Read more
Computer Network Cybercrime Information Age Security Weakness
Are computers good to us Essay Example
584 words 3 pages

The economy has been affected by the pollution resulting from electricity production and usage. However, computers and new technology continuously enhance life for everyone. Despite the freedom provided by these advancements, it is crucial that we assume greater responsibility for our well-being. The growing prevalence of computers and technology has resulted in a decrease in […]

Read more
Computer Cybercrime Health Internet Technology Therapy
Advantages and Disadvantages of Science and Technology in our Lives Essay Example
579 words 3 pages

Science – a systematic enterprise that builds and organizes knowledge in the form of testable explanation and prediction about the world. Technology – the making, usage and knowledge of tools, techniques, crafts, system or methods of organization in order to solve a problem or serve some purpose. Science and technology affects our daily life activities, […]

Read more
Cybercrime Nature Science Technology
Technology and Crime Essay Example
943 words 4 pages

Cybercrime, hacking, blackmailing, fraud, theft and extortion; these are the first few types of crimes come into my mind when we are presented with the words “technology” and “crime”. One of the reasons might be that we all have been prone to the nuisance caused by any of these crimes at least once, as almost […]

Read more
Crime Cybercrime Technology World Wide Web
Conventional Crimes and Computer Crimes Essay Example
2286 words 9 pages

Crimes have been existent throughout human history. In fact, some experts believe that crime is actually an important aspect of society, in which the balance of a society as a whole also depends upon the presence or occurrence of crimes (Henry 13). Actually, it is apparent that even though there are different measures to deter […]

Read more
Computer Crime Cybercrime
Cybercrime in Malaysia and US Essay Example
2120 words 8 pages

The role of computers and the internet has become significantly more important in our daily lives. They are now essential for quick communication, banking, public administration, social networking, data sharing, business activities, and other tasks. Many people would face significant difficulties without computers. However, despite the numerous advantages that information technology offers us, we must […]

Read more
Crime Cybercrime Internet Malaysia
Douse the Online Flamers Summary Essay Example
418 words 2 pages

In “Douse the Online Flamers” Andrew Keen writes about individuals who choose to hide behind a facade in cyber crime. He goes on to speak of the unlawful acts inflicted upon innocent individuals of cyber space. Keen reflects on three major cases where cyber criminals are protected under the freedom of speech act while the […]

Read more
Bullying Children Computer Network Crime Cybercrime Hardware Internet Wi-Fi
Personal Security and the Internet Essay Example
2485 words 10 pages

Computers rule the business world. Through interconnection of various networks, one can easily and readily access the information that he needs, that is, through the Internet. The American Heritage Dictionary defines the Internet as an interconnected system of networks that connects computers around the world via the TCP/IP protocol. It is one of the most […]

Read more
Computer Network Cybercrime Internet Security
Computer Misuse Act Analysis Essay Example
309 words 2 pages

The UK enacted the Computer Misuse Act in 1990 to outlaw certain activities, including hacking into others’ systems, software misuse, and assisting someone in accessing others’ protected files. The Act’s primary aim was to deter such actions in the future. It specifically highlights three misdemeanors: 1. Unauthorized entry into computer data. 2.Attempting to access a […]

Read more
Computer Cybercrime Information Technology Law
Is There Too Much of Commercialism in the Internet Essay Example
378 words 2 pages

As the world becomes technologically advanced, computer plays a significant role in various aspects, in terms of the business. Nowadays, we can see that there are many of commercial activities in the internet such as product advertising. This holds a considerable discussion amongst group people. Some people believe that this provides plenty benefits, while other […]

Read more
Cybercrime Information Age Internet
Difference between Cybercrime and Traditional Crime Essay Example
212 words 1 page

Before readers can understand the difference between cybercrimes and traditional crimes, they must know what a cybercrime is. Cybercrimes, also known as computer crimes can be described as any crime committed through the use of a computer or computer technology (Jones, 2007). Though definitions vary, cybercrimes can be placed in four broad categories-unauthorized accesses to […]

Read more
Crime Cybercrime
Acc205 Final Paper Essay Example
1243 words 5 pages

What makes a large organization look like Wal-Mart financially successful? One could say it is the result of outstanding personnel or perhaps a strong determination to succeed. These factors certainly contribute. However the key to financial success in organizations lies in good accounting. Since early civilization began, accounting has been an important part of our […]

Read more
Accounting Cybercrime Financial News
Cyber Security Policy Essay Example
4076 words 15 pages

The contents of Firion’s Cyber Security Policy and Implications on May 10, 2011 includes the following: – Security Policy Structure as it Relates to Humans – Cyber Crime and Cyber Warfare – Profile and Motivations of a Cyber Criminal – Attack Methods and Firion Vulnerabilities – Cyber Crime Trends – Laws and Regulations Driving Company […]

Read more
Computer Security Crime Cybercrime Policy Security
16 Mobile Devices and Social Networking Security Solution Essay Example
216 words 1 page

In our society, smart phones have become an essential tool for communication, internet access, email exchange, and document storage. Consequently, personal contact information and sensitive financial and business data are stored on these devices. Therefore, it is crucial to prioritize the privacy of this information in cases of device theft. The security of these devices […]

Read more
Computer Network Cybercrime Security
Ethical Hacking Narrative Essay Example
910 words 4 pages

Almost 90 percent of our society now depends on complex computer based system. With the increasingly use of computer and explosive growth of the Internet has brought many good things: electronic commerce, online banking, e-mail, video conferencing etc. The improvement of systems security to prevent criminal hacker has become an important concern to society. There […]

Read more
Cybercrime Ethics Information Age
computer viruses Essay Example
3269 words 12 pages

Analyzing the growth of wearable computing technology and its impact on electronic crime victimizations 3.Conclusion a.Summarizing the findings on computer viruses as a new form of threat b.Highlighting the role of wearable computing in increasing electronic crime victimizations.The text discusses the vulnerabilities and threats in computer and networking technology, including configuration errors and passwords as […]

Read more
Computer Computer Science Cybercrime Information Age Viruses
Hacks And Hackers On The Internet Essay Example
4064 words 15 pages

kaygusuz1 It is the weekend you have nothing to do so you decide to play around on your computer . You turn it and than start up , calling people with your modem , conneciting to another world with people. This is all fine but what happens when you start getting into other peoples computer […]

Read more
Computer Computer Security Cybercrime Hardware Information Age Information Technology Internet
The Vulnerability of Computerised Accounting Information Systems to Computer Crime Essay Example
1684 words 7 pages

The hot debated topic in the informative age is computer crime. These crimes are committed with the help of computers which wreak havoc and completely paralyse the economy. These crimes are with high intensity and more deadly and destructive than physical crimes. There are no precise, reliable statistics on the amount of computer crime and […]

Read more
Accounting Crime Cybercrime
Categories of Computer Crime Persuasive Essay Example
605 words 3 pages

Disgruntled employees who alter, damage, steal files, or engage in embezzlement contribute significantly to companies’ financial losses. Criminal activities involving computer systems also encompass unlawful access to government records, including manipulation of criminal history and want and warrant information, creation of fraudulent identification documents like driver’s licenses and passports, alteration of tax records, and unauthorized […]

Read more
Cybercrime Federal Bureau Of Investigation
Computer Crime Example Persuasive Essay Example
1034 words 4 pages

In today’s society, the value of information surpasses that of grain, steel, or technology. Thanks to computer networks, almost everyone now has the ability to access a vast amount of information. The Internet, which is predominantly used by the United States with an 80 percent usage rate, provides an immense wealth of free information on […]

Read more
Computer Copyright Infringement Cybercrime Identity Theft

Popular Questions About Cyber Bullying

What are the problems with cyber bullying?
Cyber bullying is related to short and long term problems for the victims and the bullies, such as depression, anxiety, poor school attendance and performance, and feeling fear and mistrust toward others.
What are the bad things about cyberbullying?
Cyberbullying is harmful for the following reasons: Cyberbullying behaviors are carried out from a distance and can be instantly broadcasted to a large number of people. Cyberbullying does not require physical strength or face-to-face contact. Messages are sometimes sent anonymously so those targeted have no idea who is responsible.
What are the 5 types of cyberbullying?
The Five Types of Cyberbullying. There are five different types of cyberbullying. They are harassing someone, impersonating someone, photo harassment, creating websites, blogs, and polls, and participating in “Happy Slapping” (Gordon). All of this makes cyberbullying a very dangerous form of bullying.
How can you deal with cyber bullying?
Other ways to help deal with cyber bullying is “blocking” a person, changing a phone number and/or email address. In cases where cyber bullying continues to occur, contact police and involve law enforcement.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New