Did you know that approximately 43 percent of young adults and teens have had experiences with bullying online? In fact, studies show that 1 in 4 young adults and teens has experienced it more than once and 81 percent of young people feel that bullies get away with bullying online because it is so much easier than doing it in person. Social media, such as Facebook, Twitter, and Instagram, has become the home of so many young adults and teens. It has grown popular worldwide with people of all ages using them. With the increase in popularity of social networking sites, online activity and messaging apps, online bullying is increasing every day and has tripled within the last year. Users do not realize how easy it has become for someone to get their information, and how easy it is to have that information used against them for bullying. Social media lacks when it comes to the privacy and security of its users, leaving its users to become easy targets for bullies to get away with verbally abusing and threatening other users.

The loss of privacy on social media over the years has led to an increase in online bullying. For example, all your personal information such as what city and state you live in, your phone number, what school you attend, and email addresses can be seen by people who aren’t even on your friend’s list. According to internetsafety101.org, statistics say 72 percent of teens have a profile on a social networking site or app, and roughly 47 percent have a profile on a social networking site or app that can be seen by anyone. This has made it easy for people to be able to use user information to bully social media network users. Social media network users do not realize how easy it is to be able to use their information. Not only is your information used as a weapon against you, but your information can even be used by bullies to be able to find you. Your information such as what school you attend, what city you live in, phone number, and email, are displayed to everyone, even those who aren’t on your friends list, and even strangers. Bullies can even copy all of your photos and information to make a fake profile of you. I myself, am a victim to a fake with all my information.

It seems unfair to become a victim of bullying, and no one suffering any kind of consequences for it. Social networking users have to go through being insulted, humiliated, and not be able to do anything about it. It is very easy for a bully to change their name and age on a social networking profile. They can open profiles with different photos too. Having a fake profile makes it easier for someone to bully you and go unpunished for it. Bullies can even tag a photo of you without your permission, and also tag others in the same photo who will also bully you, leaving you and your profile exposed for everyone to join in on the bullying by leaving mean comments about you on the photo.

Impacts of computer crimes in Businesses 41736 Essay Example
4131 words 16 pages

Introduction Nowadays, computer crimes have become a disappointment for businesses due to the advanced technology used by criminals to avoid being detected. In the 1950s, computer programs and data were stored on punched cards. If a criminal broke into an office and damaged or stole these cards, they could face severe punishment under breaking and […]

Read more
Business Computer Security Crime Cybercrime
Computer Crime 3403 Essay Example
233 words 1 page

If you don’t have any weekend plans, you can choose to enjoy yourself. To start a computer, one must make contact with people. With a simple button press, the modem instantly links you to a parallel world where individuals similar to yourself can be encountered. When you start exploring other things, what happens? Computer crime […]

Read more
Crime Cybercrime Information Age Telecommunications
Computer Crime 13829 Essay Example
1670 words 7 pages

The increase in computer crimes, which have grown in both quantity and variety, necessitates the implementation of laws. Over the past two decades, computers have become an essential part of society. They are extensively used in sectors such as airlines, banking, industry, and businesses. This widespread adoption is primarily due to people using computers at […]

Read more
Crime Criminal Law Cybercrime Justice
Online Scams and Hacking Essay Example
2413 words 9 pages

Overview Issues of online scams and hacking have been disturbing for quite long. A large number of those involved in such activities are majorly driven by the desire to acquire money easily. They take it as a kind of business in which a very minute efforts result into lots of profits. This analysis starts by […]

Read more
Cyber Crime Cybercrime V For Vendetta
New Media and New Crime Essay Example
1923 words 7 pages

The digital media is being celebrated as an innovative and exciting platform that represents global development. The utilization of cell phones, the internet, and other social technologies is helping to strengthen global communities by providing information and empowering the voiceless. While the internet and communication technologies can be utilized for positive social change, like any […]

Read more
Crime Prevention Cyber Crime Cybercrime Hate Crime
The Estonian Cyberwar Shamoon Essay Example
1481 words 6 pages

Cyber-attacks are the new tools of national power. The attacks provide a means of influence, coercion and attack. The use of cyber techniques does date back to the 1980s while cyber-attacks for militaries do date back to the 1990s. In the Gulf region, the use of cyber techniques and tools does serve as the instrument […]

Read more
Cyber Crime Cybercrime Nuclear Power
The Data Security Essay
722 words 3 pages

Introduction The significance of information technology in our everyday lives cannot be overstated. Nevertheless, the swift advancement of technology has led to numerous concerns, specifically regarding data security. These issues encompass cyber-attacks, hacking, and identity theft, which are universally acknowledged as calamitous and are also widespread within the United States. The purpose of this research […]

Read more
Cyber Crime Cybercrime Identity Theft
Cyber Crime and Cyberterrorism Essay
745 words 3 pages

Introduction Cybercrime involves all illegal activities through a computer or any telecommunication network. It includes hacking and other crimes conducted through the internet like identity theft and credit card account theft. Financial crimes involve misrepresentation of financial records with an intent of obtaining financial benefits. This includes unauthorized altering of financial data by entering of […]

Read more
Crime Cyber Crime Cybercrime Identity Theft
Cyber terrorism and Terrorist organizations Essay Example
756 words 3 pages

Cyber terrorism is the intentional use of computers, networks and internet to cause harm and destruction (Conway, 2014). It is done to intimidate a government in furtherance of social and political objectives. An attack should result in violence against people and property or at least cause enough harm to generate fear in order to qualify […]

Read more
Cyber Security Cybercrime Reign of Terror
Routine Activity Theory Essay Example
745 words 3 pages

Routine activity theory is a crime event theory which focuses on explaining why some people commit a crime. The theory, therefore, states that, for a crime to occur three elements must come together in any given space and time: an available target, a motivated offender, and absence of a capable guardian that could intervene. In […]

Read more
Activity Cyber Crime Cybercrime Identity Theft
Impact of Computer Hacking Essay Example
647 words 3 pages

Computer hacking is the practice of illegally creating a fake copy of the original software or accessing into unauthorized computer networks to achieve other intentions rather than the original purposes (Levy). Hacking may cause loss of vital documents, reduced privacy, and financial losses. Sensitive data such as Personally Identifiable Information that can be used in […]

Read more
Crime Cyber Crime Cybercrime Identity Theft
Business and Threats Essay
546 words 2 pages

Security in Businesses: Protecting Against Cybercrime Modern businesses heavily rely on technology to enhance productivity and cut costs. However, the widespread use of technology also puts them at risk of cybercrime. Malicious hackers can exploit vulnerabilities in a company’s systems to steal sensitive data, including competitive strategies. Cybercriminals can tarnish the reputation of a company […]

Read more
Business Cyber Crime Cybercrime Identity Theft
Cyber Security and Smart City Singapore Smart City Essay Example
3954 words 15 pages

Abstract Singapore is well recognized as a leading partner in Waste management, strategic security, and technological innovation. The development of Singapore Smart City introduces the country into the leadership of global smart cities in the history of the world. But, Smart Cities comes with their own package of challenges which Singapore Smart City concept must […]

Read more
Cyber Security Cybercrime
Smart City and Cyber Security: A Case Study on San Diego Essay Example
3117 words 12 pages

Introduction Cities all over the world are increasing growing smart. These include San Diego, Barcelona, New Yolk, and Dubai among many others. However, this has been posed them in the fatal risk of compromised cyber security and potential loss of their assets such as information system concerning the local department, general security, schools, power plants, […]

Read more
Cyber Security Cybercrime
Essay About Cyber Bullying
3245 words 12 pages

Cyber bulling refers to the act in which someone deliberately threatens to harm or makes an harassment by the use of the internet and other information technology avenues in a manner that is consistent. The act of cyber bulling can take different methods ranging from acts like spreading rumors to even performing acts of defamation […]

Read more
Cyber Crime Cybercrime
Information and Cyber Security Essay Example
2746 words 10 pages

Introduction The Internet has forever changed the way the world does business, communicates, and shares information. Because the Internet and computers provide a convenient, fast method to communicate, do business, and share information, there are a growing number of businesses, individuals, and governments that have shifted its functions and activities to the Internet. Like all […]

Read more
Cyber Security Cybercrime
Cyber Security and Victimization Essay Example
2906 words 11 pages

Introduction The internet is amongst the fastest-growing fields of technical infrastructure advancement. Currently, information and communication technologies (ITCs) are everywhere, and the world is becoming more digitized by the minute. The bidding for computer and internet connectivity has brought about a high degree of assimilation of computer technology into the field of production so that […]

Read more
Cyber Security Cybercrime
Benefits and Demerits of the Digital Space to the Society Essay Example
2227 words 9 pages

Technological developments have had a great impact on people’s day to day activities and more arguably ways of communication. Extensive research in the recent years has been done to study the current relationship between people and their phones and other technologies and also their face to face communication with other people. According to my general […]

Read more
Cyber Crime Cybercrime
The protection of the information system Essay Example
1318 words 5 pages

Introduction Cyber security, which refers to the protection of information systems from damage or theft (Glantz et al, 2014), involves measures aimed at preventing unauthorized physical access to hardware containing sensitive information (Glantz et al, 2014). Although these measures are in place, unauthorized individuals often attempt to breach data protection by hacking into the system […]

Read more
Cyber Security Cybercrime Law
Privacy Issues Related to Personal and Business-Related Cybersecurity Scenarios Essay Example
1529 words 6 pages

Individuals value their privacy as well as the protection of their personal areas in life. They do value some control over who does know anything about them. Most of the time they do not want their personal information being accessed by anybody at any time. Analyzing personal privacy issues that are related to various business-related […]

Read more
Cyber Security Cybercrime
Cyber criminals and security Essay Example
1046 words 4 pages

Introduction The concept of cybersecurity involves a range of technologies, practices, and processes that aim to protect computers, programs, networks, and data from harmful attacks or unauthorized intrusion (Von Solms & Van Niekerk, 2013). In the IT sector, the term security is generally used to refer to cybersecurity. To fully grasp the concept of cybersecurity, […]

Read more
Cyber Security Cybercrime
Cyber Security Issues Essay Example
924 words 4 pages

Introduction The internet has transformed the lives of individuals in the digital age, connecting people worldwide and continuously expanding its influence. Businesses have reaped advantages from the accessible internet, achieving greater effectiveness, while individuals can now effortlessly participate in global commerce. Despite the numerous security challenges, cyber security remains a persistent global issue that affects […]

Read more
Cyber Security Cybercrime

Popular Questions About Cyber Bullying

What are the problems with cyber bullying?
Cyber bullying is related to short and long term problems for the victims and the bullies, such as depression, anxiety, poor school attendance and performance, and feeling fear and mistrust toward others.
What are the bad things about cyberbullying?
Cyberbullying is harmful for the following reasons: Cyberbullying behaviors are carried out from a distance and can be instantly broadcasted to a large number of people. Cyberbullying does not require physical strength or face-to-face contact. Messages are sometimes sent anonymously so those targeted have no idea who is responsible.
What are the 5 types of cyberbullying?
The Five Types of Cyberbullying. There are five different types of cyberbullying. They are harassing someone, impersonating someone, photo harassment, creating websites, blogs, and polls, and participating in “Happy Slapping” (Gordon). All of this makes cyberbullying a very dangerous form of bullying.
How can you deal with cyber bullying?
Other ways to help deal with cyber bullying is “blocking” a person, changing a phone number and/or email address. In cases where cyber bullying continues to occur, contact police and involve law enforcement.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New