Developing Safer Online Environments for Children
Latest Publications


TOTAL DOCUMENTS

15
(FIVE YEARS 15)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781799816843, 9781799816867

Author(s):  
Geetika Sarna ◽  
M.P.S. Bhatia

Cyberbullying is a felonious act carried out against the victim by sending harassing/ embarrassing/ abusing information online. Normally offenders create fake profiles in order to hide their identity for unscrupulous activities. Assuming a fake identity is very harmful as the real picture of the offender is not visible, and also it can become difficult to entrap them. Sometimes, some trustworthy friends can also take advantage of the fake identity in order to harm the victim. Culprits can reveal victim's personal information like financial details, personal history, family, etc., and along with it, he can harass, threaten or blackmail the victim using fake profiles and permeates that information on the social network. So, it is necessary to resolve this issue. In this article, the authors used the concept of entropy and cross entropy to identify fake profiles as entropy works on the degree of uncertainty. Also, this article shows the comparison of proposed method with the existing classifiers.


Author(s):  
Michal E. Ptaszynski ◽  
Fumito Masui

In this chapter, the authors present a method for automatic detection of malicious internet contents, based on a combinatorial approach resembling brute force search algorithms, with application to language classification. The method automatically extracts sophisticated patterns from sentences and applies them in classification. The experiments performed on actual cyberbullying data showed advantage of this method to previous methods, including the one described in Chapter 4. Pros and cons of this method when compared to previous ones are also discussed in this chapter.


Author(s):  
Gilberto Marzano

This chapter intends to present the most common technological solutions that can be implemented to prevent and reduce cyberbullying. Three main questions will be addressed: How can children stay safe online? What can the information technology (IT) industry do to combat cyberbullying? How effective is automatic cyberbullying detection? The chapter will illustrate the progress that has been made to reduce cyberbullying through technological means and discuss the notion of industry self-regulation. Indeed, the IT industry has a responsibility to respect societal obligations towards users, especially when users are children. While many companies in the industry are working responsibly on solutions for the safer use of technology, some global internet service providers are involved in the illicit use of users' personal data. As a consequence, problems of online safety cannot be solved locally, but through concerted actions undertaken at an international level.


Author(s):  
Jiyoon Yoon ◽  
Katie Koo

Cyberbullying is an emerging issue in the context of higher education as information and communication technologies increasingly become part of daily life at universities. This article offers a review of the major literature regarding cyberbullying, its victims and perpetrators, and its implications that impact disadvantaged students in higher education, specifically those who are in lower socio-economic situations. Post-secondary education has been an important pathway to guide students out of poverty by helping them lead successful lives. However, as in higher education, cyberbullying incidents have increased in educational situations, the bullied victims are more likely to report feelings of depression that cause an obstacle to their academic achievements in post-secondary education. The anonymous environments associated in cyberbullying can cause immorality of the cyberbullying perpetrators. To prevent cyberbullying on campus, this article provides cyberbullying rules and policies and suggests specialized treatment and interventions for cyber-bullies as a solution.


Author(s):  
Michael Pittaro

The advent of the internet has revolutionized the way individuals conduct business, socialize, and search for information on any topic imaginable at any time. Nevertheless, with all its benefits, the internet also has a darker side for which new criminal opportunities have emerged and some traditional crimes have evolved and multiplied. One area of concern that has emerged since the advent of the internet is that of cyberbullying, a distinct type of deviant behavior that has attained worldwide attention from practitioners and scholars. This chapter examines cyberbullying as associated with the age, gender, race, and urbanicity of the victims versus the extent to which traditional face-to-face bullying took place within these same groups. Cyberbullying remains an elusive social problem for all because cyberbullying has been associated with school shootings, suicides, and other violence among adolescents. Discussion of the implications for practitioners and scholars will be included in that cyberbullying extends beyond the school grounds and well within the realm of public safety.


Author(s):  
Marilyn Anne Campbell ◽  
Chrystal Whiteford ◽  
Krystle Duncanson ◽  
Barbara Spears ◽  
Des Butler ◽  
...  

Cyberbullying is a relatively new and serious form of bullying with negative social and emotional effects on both victims and perpetrators. Like traditional bullying, cyberbullying is a social phenomenon and often unfolds in the context of a large network of bystanders. This study examined gender and age of cyberbullying bystanders out of 2109 upper primary and secondary school students in Australia. The actions the bystanders took when a peer was cybervictimised were analysed. The results of the study suggested bystanders to cyberbullying were most likely not to do anything or help the person cyberbullied at the time. Girls were more prosocial in helping students who were cyberbullied than boys. In addition, those students who knew someone who was bullied in both ways were more likely to tell their parents and friends about it than those who knew someone who was cyberbullied only. Implications for prevention and intervention in cyberbullying are discussed.


Author(s):  
Miftachul Huda ◽  
Aminudin Hehsan ◽  
Singgih Basuki ◽  
Budi Rismayadi ◽  
Kamarul Azmi Jasmi ◽  
...  

This chapter aims to explore the pattern to use technology as an attempt to promote virtual violence prevention. A literature review from referred journals and books was conducted. The findings reveal that technology use, in particular an effort to solve the emerging issues of violence promotes the solution with an innovative approach designed in HE. With technology use in attempting violence prevention insights, an innovative way to strengthen technology use wisely with underlying the compassionate skills to promote the preventive action of violent forms is needed. Attempts to promote virtual violence prevention in higher education should be combined with empowering technology use to focus comprehensively on encouraging diverse learners with personal and social awareness in digital interaction. This chapter is expected to contribute in dealing with exploring the systematic approach in nurturing the self-awareness and social concern in digital interaction to be potentially applied in HE.


Author(s):  
Lorayne P. Robertson ◽  
Heather Leatham ◽  
James Robertson ◽  
Bill Muirhead

This chapter examines digital privacy and key terminology associated with the protection of online personal information across two countries and through an education lens. The authors raise awareness of the identified risks for students as their online presence grows. The authors highlight some of the potential consequences of a lack of awareness of the risks associated with sharing information online. They outline the obligations of multiple parties (from the vendor to the end user) when students use online apps, including the teachers and parents who want to protect students' digital privacy. Employing policy analysis and a comparative approach, they examine federal, national, and local legislation, as well as curriculum responses to this issue in the USA and Canada. When the authors compare federal policy responses from these two countries, they find that they differ in instructive ways. The chapter concludes with a focus on risk abatement, including solutions and recommendations.


Author(s):  
Ramona S. McNeal ◽  
Susan M. Kunkle ◽  
Mary Schmeida

This chapter presents the federal and state-local legislative response to cyber aggression: stalking, harassment, and bullying. Along with other federal efforts, the federal Violence Against Women Act and its reauthorizations is identified as a cornerstone law in protecting the public on stalking and harassment. State-local laws have advanced in scope; yet, there are laggard states not yet entirely on board in passing legislation aligned with the advancement of technology used in cyber aggression. All three branches of government to some extent have had a voice in today's cyber policy. Judicial court cases have shaped policy decisions and several key cases are presented.


Author(s):  
Emıne Nılufer Pembecıoglu ◽  
Hatıce Irmaklı

Cyber bullying is a serious and newly arising problem of today's world due to the negative intentions in using the recent technological improvements. However, despite its being a relatively new area, a significant number of studies conducted on this issue can be found. This chapter provides a general overview of the current literature with exemplary research to present some insight into the global and local practices in relation to any possible solution of prevention/intervention program for the cyber bullying problem. The global scale involves many studies of various scholars from several countries with different focuses while the local scale concentrates on the case of Turkey and the same of Turkish students or teachers.


Sign in / Sign up

Export Citation Format

Share Document