ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

“THE STUDY ON USE OF INFORMATION AND COMMUNICATION TECHNOLOGIES TO SUPPORT DELIBERATE, REPEATED AND HOSTILE BEHAVIOR BY AN INDIVIDUAL OR GROUP THAT IS INTENDED TO HARM OTHERS”

Journal: IMPACT : International Journal of Research in Engineering & Technology ( IMPACT : IJRET ) (Vol.2, No. 5)

Publication Date:

Authors : ; ; ;

Page : 15-24

Keywords : Inseparability; Bullying; Cyber; Victims;

Source : Download Find it from : Google Scholarexternal

Abstract

Certain characteristics inherent in on-line technologies increase the likelihood that they will be exploited for deviant purposes. Unlike physical bullying, electronic bullies can remain virtually anonymous using temporary email accounts, pseudonyms in chat rooms, instant messaging programs, cell-phone text messaging, and other Internet venues to mask their identity; this perhaps frees them from normative and social constraints on their behavior. Additionally, electronic forums often lack supervision. While chat hosts regularly observe the dialog in some chat rooms in an effort to police conversations and evict offensive individuals, personal messages sent between users (such as electronic mail or text messages) are viewable only by the sender and the recipient, thereby outside the regulatory reach of such authorities. In addition, when teenagers know more about computers and cellular phones than their parents or guardians, they are therefore able to operate the technologies without concern that a parent will discover their experience with bullying (whether as a victim or offender). Another factor is the inseparability of a cellular phone from its owner, making that person a perpetual target for victimization. Users often need to keep their phone turned on for legitimate purposes, which provides the opportunity for those with malicious intentions to engage in persistent unwelcome behavior such as harassing telephone calls or threatening and insulting statements via the cellular phone’s text messaging capabilities. Cyber-bullying thus penetrates the walls of a home, traditionally a place where victims could seek refuge from other forms of bullying. Moreover, bullies can gang up on their victims on electronic pages more efficiently than they do in traditional bullying, since there is no limit to the number of people who can join in, following a bullying statement.

Last modified: 2014-06-10 21:08:27