Vous êtes sur la page 1sur 3

Subjetc Student’s data Date

Family, School and Surname: Alarcón Tapia


12/04/2019
Society
Name: José

Reading: New types of Internet violence


SUMMARY
Cyberbullying is as easy to do as having access to a computer or a
cell phone. It does not r equire presence and confronting, that is why it
may be likely to be done by some students who would not dare to bully in
a “face to face” r elation . Cyb erbullying is th e result of adolescence
agressiv e behav iour, together with the wide and uncontrolled electronic
use and facilities no wadays. At the same time, despite the effort of many
adults, the students hardly disclose th e fact of b eing bullied o r commiting
some typ e of cyberb ullying.

Cyberbullying is quite prevalent amo ng middle schoolers, b ut it


increases with age, and in th e adolescence ages it reaches its picks.
Teenagers use to hav e easy daily access to the thechno logies . They spend
long time with computers or cell phones and an importan number of them
may incur in this type of wrong practice. Cyberbullying may respond to
the “need” of gaining social recognitio n and a position of power among
the students. Also, with the influx of thechnology, th e kids may feel that
they h ave a condition of impuni ty due to the difficulty in tracing th e
internet activity. R easons for cyberbullying may be envy, anger, pride,
prejudice, into ler ance, rev enge, boredom feel better, etcetera. Often
cyberbullying emerges from r elationship problems.

Entit lement bullies fe el they are sup erior and have the right to
demean others. Targets of entitlement bullies seem to be picked on
because bullies feel s uperior to them. Retaliators are individuals who have
been bullied by others and ar e using the Internet to retaliate. Victim s of
retaliators usually h ave b een bullyed by others, but are now receiving th e
cruelty of b eing cyb erbullied. In other hand , bystanders are persons who
may encourage or support the bullies or who are prese nt as the audience
of the bullying pract ice. Also other type of bystanders may b e part of th e
solution, becaus e th ey may not support the bullies and may try to inform
or try to giv e support to the victim.

UNIT 2 – Activities ©Universidad Internacional de La Rioja (UNIR)


Subjetc Student’s data Date
Family, School and Surname: Alarcón Tapia
12/04/2019
Society
Name: José

Male victims are more often involved in physical t hreats and


aggression, video spr eading, while females, in contrast, are mo re likely to
be implicat ed in bullying experiences involving psychological harassment.

There seems to be a need to progress into a b etter action and


preventio n against cyberbullying from the educational community, as well
as a bett er support t o the victims or potencial victims of this practice. All
students must b e t aught ways to respond appropriately to cyberbullying
and potential bullies must recognize there are seriou s consequences. The
minor instances should be detected before they escalate into something
more serious. It is important to try to work in a emotional and relatio nal
sense to understand our students and try to provide for th em ways to
develop bett er and mo re harmo nious skills in the social and p ersonal
fields.

FORMS OF CYBERBULLYING
Cyberharassment: harassment by means of email, text (or online) messages or the
internet. It can take many forms.
Masquerading/Impersonation: any attack wherein the attackers acts as if he/she was
some other user or entity in the system.
Cyberrbullying or harassment by proxy: it often gets adults involved in the harassment
and people who don't know they are dealing with a kid or someone they know.
Online grooming: befriending children in order to take advantage of them for sexual
purposes.
Cyberstalking Outing Denigration (Dissing): the act of sending or posting cruel
information about a child online, to damage their reputation or friendships with others.
It can also include posting material online such as photos, screenshots or videos.
Plishing Exclusion/Gossip Groups.
Sexting: is sending, receiving, or forwarding sexually explicit messages, photographs, or
images, primarily between mobile phones, of oneself to others.
Falsify identity
Trickey Flaming: is the online act of posting insults, often laced with profanity or other
offensive language on social networking site.

UNIT 2 – Activities ©Universidad Internacional de La Rioja (UNIR)


Subjetc Student’s data Date
Family, School and Surname: Alarcón Tapia
12/04/2019
Society Name: José

The following table shows some the main differences between Cyberbullying and
traditional bullying:

CYBERBULLYING vs “FACE TO FACE” BULLYING


 Anonymity and the safety and
security of being behind a computer
screen. Freedom from the social
preassures of society. Evidence of who is the bullie
 False names or pseudonymous, or
user accounts makes it difficult for
victims to easily determine the
identity of offenders.
 Difficulty for the Law enforcement to
get involved in cyberbullying cases. More evidence for the Court to persecute
 The harassment of cyberbullying can
continue once the victim and the Physical or direct bullying is more limited by
bullie are back to their own homes, at time and space. At least the victim can have
any time of the day, since the some truce in the safety of his/her home.
cyberspace has no time and space
boundaries.
 Cyberbullying achieves a wide local
audience. And videos or messages in It is more confine to less audience who can
social networks or through instant witness the bullying.
communication can reach many
people.
.
To quote a source of study about the phenomenom, Cyberbullying, Prevention
and Response -Expert Perspectives, by Patchin & Hinduja (2012), extracted from the
following website link:

https://books.google.es/books?hl=es&lr=&id=br2sAgAAQBAJ&oi=fnd&pg=PR1&dq=Cyberbullying:+Ide
ntification,+Prevention+%26+Response+Reference+Guide&ots=45dKfQojtQ&sig=nPQrQX9gvjhDVxMxe
28t6Jmz89E#v=onepage&q=Cyberbullying%3A%20Identification%2C%20Prevention%20%26%20Respo
nse%20Reference%20Guide&f=false

Here the authors are granting a wide and excellent guide on how to understand
this phenomenon and work in ways to prevent it and deal with it. This is a really
interesting reference to have in consideration.

UNIT 2 – Activities ©Universidad Internacional de La Rioja (UNIR)

Vous aimerez peut-être aussi