The Notion Of Cyber Bullying, Types, Forms, And Ways To Reflect

Download PDF

What is Cyber Bullying

Bullying is a term is used for harassing or abusing people with strength (could be physical or verbal) to intimate that person. It is happening for a long time and now in the modern time people are doing this with technology. Bullying using any source of electronic media is called basically “Cyber Bullying”. According to AWAVA (Australian Women Against Violence Alliance) “First, despite varying research outcomes, most of the work in this area has shown the majority of victims are women.

Want to receive an original paper on this topic?

Just send us a “Write my paper” request. It’s quick and easy!

Second, while more males are exposed to cyberbullying entailing physical aggression, more females are victims of cyberbullying that includes non-consensual sharing of intimate images, unsolicited sending of sexual and pornographic images and other forms of cyberbullying entailing sexualised behaviour. Surely Cyberbullying is not something to be proud of. It makes a deep negative effect on their victims.

Various forms of Cyber bullying

Cyber bullying comes in so many forms. In bellow, some of them are given as an exampleAbusive texts, on-line posts and emails: This is one of the most common forms of cyber bullying. It is very easy these days to bully through text via E-mail or online post. Imitating others on line using fake profile and other methods: It does happen when a person tries to bully someone by hampering his/her reputation. It usually happens when the offender wants to take revenge one the victims. However, it is not necessary that the offender do know the person in real life.

Spreading rumours and telling lies on-line: It is easier to spread false rumours easily than spreading the truth in this generation where we are more addicted to rumours then the truth. “There’s actually extensive study in human communications in why certain news spreads faster, not just a common sense understanding of it, ” explained Deb Roy, the third co-author of the paper. “It’s well understood that there’s a bias to our sharing negative over positive news, and also a bias to sharing surprising over unsurprising news. ”

Making hurtful comments: Giving negative comments intentionally and trying to hurt the victim through texts.

Making threats or comments designed to intimidate on-line: This is same as before but in this process victims are threatened by the offenders more aggressively. Victims might feel unsafe during this kind of cyber bullying.

Repeated unwanted messages being sent to you: For anyone it is an unpleasant experience to have repeated unwanted aggressive messages via any source.

Excluding others on-line: This habit does not look like an offend but it is and the victim might feel insulted or humiliated for this practice. Removing some from a group chat might seems like a fun but it is cyber bully where victims feels offended.

Main Types of Cyber Bullying

Harassment: Threatening someone through web and making them embarrass in a public platform is called cyber harassment.

Cyberstalking: Cyberstalking is considered as cyber bully too. Because the offender do this without the consent of victims.

Denigration: When someone criticise other people in unfair way is called denigration. It is not a great practise to do. It is a very uncomfortable experience for most of od the people.

What action can you take

Block the person who is doing the bullying: Immediately block the person so that the victim can be safe from future attacks. It is one of the most effective way to tackle cyber bullying.

Keep a record of threatening or intimidating messages: For future keep information and proof of the bullying. It might be handy in future to take further action against the offenders. Many offenders get way easily for the lack of proofs.

Contact police about any threatening or intimidating messages: if the victim feel does not feel safe against cyber bullying they can always get help from police and authority. Australian law is designed to protect the victim of cyber bullying and the law enforcements are well equipped to find the offender and charge them accordingly.

Report the person to the social media platform: The easier it is to bully someone in social media form the easier it is to report them in social media platform. The authority has the right to block them from their platform temporary or permanently.

Don’t reply to bullies – that’s what they want: One of the main reason of cyber bullying to get attention from the victim and to establish a negative communication. If it is possible completely avoid these kinds of communication. This habit discourages the offenders to do future bully. Check your privacy settings: Privacy always matters. Check the privacy setting once in a while so that the offenders cannot take any of the unwanted information from the victim’s internet or social media profile. Most of the offenders attack those victims who have low privacy in their internet or social profile.

Talk to someone you trust about the situation: Last but not the least always try to talk with someone whom you feel comfortable to talk with. Talking always help to make better decisions. It can be anyone, your friend or family members. They will help you to feel better and take the appropriate action to feel you safe.

Laws regarding Cyber bullying and crimes

According to ARCON “Not all online bullying is criminal. There are Australian laws which apply to serious online harassment and online bullying behaviour. Under the Criminal Code Act 1995 (Cth) it is an offence to use the internet, social media or a telephone to menace, harass or cause offence. The maximum penalty for this offence is three years imprisonment or a fine of more than $30, 000. ”However, the Law, Crime and Community Safety Council also agreed to develop new action plan to fight against cybercrime and cyber bullies on 19 May 2017. According to “Australian Government Department of Home Affairs” the development should be finalised by 2018.

18 March 2020

⚠️ Remember: This essay was written and uploaded by an average student. It does not reflect the quality of papers completed by our expert essay writers. To get a custom and plagiarism-free essay click here.

Your Email

By clicking “Send”, you agree to our Terms of service and  Privacy statement. We will occasionally send you account related emails.

close thanks-icon

Your essay sample has been sent.

Order now
Still can’t find what you need?

Order custom paper and save your time
for priority classes!

Order paper now