Cyberbullying

Author(s):  
Gilberto Marzano

Cyberbullying represents a topical risk, especially for the online generation that is continuously connected and socializes through the internet. This chapter presents an overview of the research on cyberbullying, from the earliest studies to the most recent. It discusses the broad variety of definitions of cyberbullying that exist and highlights its essential differences from traditional bullying. The authors then go on to illustrate and discuss the multifarious facets of cyberbullying, including the (relative) anonymity of perpetrators and the repetition of bullying acts. Further research developments are explored in the light of criticisms of Olweus, who argued that inconsistent findings and exaggerated claims plague much of the research on cyberbullying. Finally, new emerging forms of harassment, such as revenge porn and virtual rape, are also introduced.

2021 ◽  
pp. 193-212
Author(s):  
Ian Ward

This chapter develops a number of themes introduced in the previous chapter, most obviously those which touch on contemporary expressions of child-abuse. The broader focus of the chapter is on the familiar, and contentious, issue of pornography and its legal regulation. More particularly, though, it is concerned with the challenges presented by the internet ‘age’. And more closely still with cultural and legal responses to what has become know, itself contentiously, as ‘revenge porn’. The play upon which the chapter focuses is Evan Placey’s Girls Like That. The fact that Placey wrote his play for a student audience reinvests the educative capacity of modern theatre, whilst also inviting his audience to contemplate, once again, the place of empathy and compassion in (legal) education.


Author(s):  
David S. Wall

Networked digital technologies have transformed crime to a point that ‘cybercrime’ is here to stay. In the future, society will be forced to respond to a broad variety of networked crimes that will increase both the complexity of crime investigation and prevention, whilst also deepening the regulative challenges. As cybercrime has become an inescapable feature of the Internet landscape, constructive management and system development to mitigate cybercrime threats and harms are imperatives. This chapter explores the changing cybersecurity threat landscape and its implications for regulation and policing. It considers how networked and digital technologies have affected society and crime; it identifies how the cybersecurity threat and crime landscape have changed and considers how digital technologies affect our ability to regulate them. It also suggests how we might understand cybercrime before outlining both the technological developments that will drive future cybercrime and also the consequences of failing to respond to those changes.


Author(s):  
Alyse Dickson

This article argues that the Australian Parliament should provide victims of revenge pornography with a victim focused response to enable the fast removal of intimate images from the internet and to mitigate the harm that the ongoing public access to the images can cause. Part I outlines the reasons why revenge pornography has created a new problem for the law. Part II addresses the existing legal remedies and Part III outlines the different approaches that the Australian Parliament could plausibly adopt. It argues that while criminal laws and civil remedies may assist, they do not provide efficient remedies for victims. The article concludes that the Australian Parliament should extend the powers of the Children’s e-Safety Commissioner to deal with adult victims as well as child victims and thereby facilitate the fast removal of revenge pornography from the internet.


Author(s):  
Iris Reychav ◽  
Shraga Sukenik

In the 21st century, thus far, we have seen a growing dependence on and usage of the Internet and communications technology. This has been especially true for youth who spend much of their time communicating in cyber space. This allows for developing and maintaining relationships. At the same time, an ugly and dangerous phenomenon called cyber bullying has reared its head. In this chapter, the authors discuss various aspects of this phenomenon, including, but not limited to, incidence rates, comparison to traditional bullying, risk factors for being involved either as a bully or a victim, how it affects its victims, relevant legal aspects, and most importantly, how to defend against it. The discussion of coping strategies is especially detailed and provide suggestions for schools, parents, bystanders, victims, and broader society.


Author(s):  
Gulmira Ukatayevna Utemissova ◽  
Summers Danna ◽  
Vasyagina Nataliya Nikolaevna

The Internet and advanced technology are increasingly dominating our lives. The number of researches regarding the aggressive behaviour of teenagers on the Internet is rapidly increasing. This study aims at revealing the features of cyberbullying in popular social networks and its negative psychological consequences. This article summarises the results of using Google Trends in the context of ‘bullying’ and ‘cyberbullying’ during the COVID-19 pandemic in Kazakhstan during the transition to distance learning. A total number of 32 adolescents participated in an online survey about cyberbullying. According to our results, all participants said that this is a terrifying fact to believe that they cannot rely on adults when it comes to cyberbullying unlike traditional bullying, where the aggressor is known to the face and can be avoided, but the pursuer is anonymous in cyberspace. Cyberbullying can be particularly dangerous for children and adolescents who have had traumatic experiences or who have experienced rejection within the family.   Keywords: Internet space, cyberbullying, victimisation, COVID-19, technology.


2017 ◽  
Vol 20 (7) ◽  
pp. 2333-2351 ◽  
Author(s):  
Alexander JAM Van Deursen ◽  
Ellen J Helsper

This article examines the extent to which economic, cultural, social, and personal types of engagement with the Internet result in a variety of economic, cultural, social, and personal outcomes. Data from a representative survey of the Dutch population are analyzed to test whether engagement with a certain type of activity is related to “collateral” benefits in different domains of activities, independent from the socioeconomic or sociocultural characteristics of the person. The results show that what people do online and the skills they have affect outcomes in other domains and that this is independent of the characteristics of the person. This means that policy and interventions could potentially overcome digital inequalities in outcomes through skills training and providing opportunities to engage online in a broad variety of ways. A semiologic rather than an economistic approach is more likely to be effective in thinking about and tackling digital inequalities.


The internet has become an inescapable part of our lives, and while it makes our lives easier, it also exposes us to online threats ranging from identity theft to denial of service to phony lottery/sweepstake scams. Among these online threats are those that are carried out with the direct intent of harming another person or group of individuals. This category of crimes is referred to as cyber aggression and includes cyberbullying, cyber-harassment, and cyberstalking. As technology expands, so does the opportunity for new forms of online aggression such as doxing and revenge porn. It is becoming difficult to keep up with new trends in acts of online aggression or distinguish between cybercrimes that appear to have similar definitions. This chapter acts as an introduction to online aggression by providing an overview of older and emerging forms of cyber aggression.


Author(s):  
Erica Morassutti

 The non-consensual sharing of intimate images on the Internet presents a uniquely invasive and perpetual kind of privacy invasion. It occurs when a photograph or video depicting nudity or sexual activity – often consensually taken and shared privately with one individual – is then distributed online without the victim’s knowledge or consent. Often intended by a spurned ex-partner to humiliate the victim, the practice is referred to colloquially as “revenge porn”. This paper analyzes recent legal responses to revenge pornography in Ontario.


2009 ◽  
Vol 217 (4) ◽  
pp. 197-204 ◽  
Author(s):  
Rosario Ortega ◽  
Paz Elipe ◽  
Joaquín A. Mora-Merchán ◽  
Juan Calmaestra ◽  
Esther Vega

We examine the emotional impact caused to victims of bullying in its traditional form, both directly and indirectly, as well as bullying inflicted by use of new technologies such as mobile phones and the Internet. A sample of 1,671 adolescents and young people responded to a questionnaire which asked if they had been victims of various forms of bullying, as well as the emotions this caused. The results show that although traditional bullying affected significantly more young people than cyberbullying, the latter affected one in ten adolescents. Analysis of the emotions caused showed that traditional bullying produced a wide variety of impacts, with the victims being divided into five different emotional categories, while indirect bullying and cyberbullying presented a narrower variety of results with the victims being classifiable into just two groups: Those who said that they had not been emotionally affected and those who simultaneously suffered from a wide variety of negative emotions. The influence of age, gender, and severity on each emotional category is also analyzed.


2014 ◽  
Vol 14 (2) ◽  
pp. 236-252 ◽  
Author(s):  
Casey Martinez

This note examines the intersection of law and technology as it relates to the issue of revenge porn.  Revenge porn comes in many forms but most commonly refers to the online posting of sexually explicit photos or videos of past lovers, without their consent, after the relationship has ended.  The author explains how the current legal framework has left many victims without legal recourse to punish those who have posted their intimate photos or videos without consent, and few options to have their images removed from the internet once they have been posted.  The note argues that in order to protect victims, states should make laws to criminalize the posting of revenge porn and the Communications Decency Act should be amended to give victims the power to have their images removed from websites.


Sign in / Sign up

Export Citation Format

Share Document