What is cyberbullying?

  ciberacoso
  Image left on victims of some Facebook profiles.

Cyberbullying is the use of the Internet and related technologies to harm or harass other people, in a deliberate, repeated, and hostile manner. As it has become more common in society, particularly among young people, legislation and awareness campaigns have arisen to combat it.

Definition

Legal definition

Cyberbullying is defined in legal glossaries as

  • actions that use information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm another or others.
  • use of communication technologies for the intention of harming another person
  • use of internet service and mobile technologies such as web pages and discussion groups as well as instant messaging or SMS text messaging with the intention of harming another person.

Examples of what constitutes cyberbullying include communications that seek to intimidate, control, manipulate, put down, falsely discredit, or humiliate the recipient. The actions are deliberate, repeated, and hostile behavior intended to harm another. Cyberbullying has been defined by The National Crime Prevention Council: “When the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person."

A cyberbully may be a person whom the target knows or an online stranger. A cyberbully may be anonymous and may solicit involvement of other people online who do not even know the target. This is known as a 'digital pile-on.'

Cyberbullying vs. cyberstalking

The practice of cyberbullying is not limited to children and, while the behavior is identified by the same definition when practiced by adults, the distinction in age groups sometimes refers to the abuse as cyberstalking or cyberharassment when perpetrated by adults toward adults. Common tactics used by cyberstalkers are performed in public forums, social media or online information sites and are intended to threaten a victim's earnings, employment, reputation, or safety. Behaviors may include encouraging others to harass the victim and trying to affect a victim's online participation. Many cyberstalkers try to damage the reputation of their victim and turn other people against them.

Cyberstalking may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass. A repeated pattern of such actions and harassment against a target by an adult constitutes cyberstalking. Cyberstalking often features linked patterns of online and offline behavior. There are consequences of law in offline stalking and online stalking, and cyber-stalkers can be put in jail. Cyberstalking is a form of cyberbullying.

Methods used

Manuals to educate the public, teachers and parents summarize, "Cyberbullying is being cruel to others by sending or posting harmful material using a cell phone or the internet." Research, legislation and education in the field are ongoing. Basic definitions and guidelines to help recognize and cope with what is regarded as abuse of electronic communications have been identified.

  • Cyberbullying involves repeated behavior with intent to harm and repeated nature
  • Cyberbullying is perpetrated through Harassment, Cyberstalking, Denigration (sending or posting cruel rumors and falsehoods to damage reputation and friendships), Impersonation, Exclusion (intentionally and cruelly excluding someone from an online group)

Cyberbullying can be as simple as continuing to send e-mails or text messages harassing someone who has said they want no further contact with the sender. It may also include public actions such as repeated threats, sexual remarks, pejorative labels (i.e., hate speech) or defamatory false accusations), ganging up on a victim by making the person the subject of ridicule in online forums, hacking into or vandalizing sites about a person, and posting false statements as fact aimed a discrediting or humiliating a targeted person. Cyberbullying could be limited to posting rumors about a person on the internet with the intention of bringing about hatred in others' minds or convincing others to dislike or participate in online denigration of a target. It may go to the extent of personally identifying victims of crime and publishing materials severely defaming or humiliating them.

Cyberbullies may disclose victims' personal data (e.g. real name, home address, or workplace/schools) at websites or forums or may use impersonation, creating fake accounts, comments or sites posing as their target for the purpose of publishing material in their name that defames, discredits or ridicules them. This can leave the cyberbully anonymous which can make it difficult for the offender to be caught or punished for their behavior. Though, not all cyberbullies use anonymity. Text or instant messages and emails between friends can also be cyberbullying if what is said or displayed is hurtful to the participants.

Some cyberbullies may also send threatening and harassing emails, instant messages or texts to the victims. Others post rumors or gossip and instigate others to dislike and gang up on the target.

Growing awareness

Cyberbullying has subsequently been defined as "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person". Other researchers use similar language to describe the phenomenon.

Law enforcement: cyberbullying, cyberstalking and electronic harassment

A majority of states have laws that explicitly include electronic forms of communication within stalking or harassment laws.

Most law enforcement agencies have cyber-crime units and often Internet stalking is treated with more seriousness than reports of physical stalking. Help and resources can be searched by State or area.

Schools

The safety of schools is increasingly becoming a focus of state legislative action. There was an increase in cyberbullying enacted legislation between 2006-2010. Initiatives and curriclulum requirements also exist in the UK (the Ofsted eSafety guidance) and Australia (Overarching Learning Outcome 13). In 2012, a group of teens in New Haven, Connecticut developed an app to help fight bullying. Called "Back Off Bully" (BOB), the web app is an anonymous resource for computer, smart phone or iPad. When someone witnesses or is the victim of bullying, they can immediately report the incident. The app asks questions about time, location and how the bullying is happening. As well as providing positive action and empowerment over an incident, the reported information helps by going to a data base where administrators study it. Common threads are spotted so others can intervene and break the bully's pattern. BOB, the brainchild of fourteen teens in a design class, is being considered as standard operating procedure at schools across the state.

Protection for victims of any age

There are laws that only address online harassment of children or focus on child predators as well as laws that protect adult cyberstalking victims, or victims of any age. Currently, there are 45 cyberstalking (and related) laws on the books.

While some sites specialize in laws that protect victims age 18 and under, Working to Halt Online Abuse is a help resource containing a list of current and pending cyberstalking-related United States federal and state laws. It also lists those states that do not have laws yet and related laws from other countries. The Global Cyber Law Database (GCLD) aims to become the most comprehensive and authoritative source of cyber laws for all countries.

BACK

  • 4 Users Found This Useful
Was this answer helpful?

Related Articles

What is the unsolicited email (spam)?

Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic...

What is a domain name?

A domain name is an identification string that defines a realm of administrative autonomy,...

What is Social Media?

Social media includes web-based and mobile technologies used to turn communication into...

Why am I getting spammed and how to prevent it?

Spam is an ongoing issue that costs business and individuals billions of dollars worth of lost...

What is DNS (Domain Name System)?

The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services,...

Powered by WHMCompleteSolution