Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Cyber bullying research paper introduction
Cyber Bullying a modern form of Bullying
Cyber Bullying a modern form of Bullying
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Cyber bullying research paper introduction
Trolling is the new title that has been given to harassment that takes place on the Internet. A common example of trolling would be sending provocative messages via a communications platform for the pure entertainment of the sender, which then has a harmful effect on the recipient. There are different types of trolling; messages sent to harm others for the sender’s gratification are called ‘flame trolls’, and those to entertain others for their gratification have been given the title ‘kudos trolls’ (Bishop 2012a, 2012b). Where these actions have the resource to legal remedies they are called ‘electronic message faults’ and where the message fails to constitute an offence ‘electronic message freedoms’, and there is quite rightly nothing to prevent those from expressing free speech online. Recently there has been widespread controversy on whether the Internet should be left to its own methods of self-regulation or whether an authoritative body should be put in place to protect Internet users. Statistics show that an increase in internet trolling and cyberbullying correlates with the increased interest in social networking and social media such as facebook and twitter. There has been a change in the way legislation has been used as a result of the increase in social media; the Malicious Communications Act 1988 has seen a sudden increase in usage since the invention of Facebook, which is being used to prosecute numerous individuals for eighteen weeks imprisonment when found guilty of the offence trolling (Bishop 2012b). The Police and Criminal Evidence Act 1984 introduced a provision which has made electronic documents that have been interfered with through wrongful use of communications systems admissible as evidence in court. Th... ... middle of paper ... ...Avatars and Characters.” In Social Networking Communities and Edating Services: Concepts and Implications, edited by C. Romm- Livermore and K. Setzekorn. Hershey, PA: IGI Global. Bishop, J. 2010. “Tough on Data Misuse, Tough on the Causes of Data Misuse: A Review of New Labour’s Approach to Information Security and Regulating the Misuse of Digital Information (1997–2010).” International Review of Law, Computers & Technology 24 (3): 299–303. Bishop, J. 2011. “All’s WELL that ends WELL: A Comparative Analysis of the Constitutional and Administrative Frameworks of Cyberspace and the United Kingdom.” In Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices, edited by A. Dudley-Sponaugle and J. Braman. Hershey, PA: IGI Global. Tan, L. M., and M. Newman. 1991. “Computer Misuse and the Law.” International Journal of Information Management 11 (4): 282–291.
The internet provides an opportunity for individuals all around the world to communicate with one another; although this privilege has created the major issue of cyber bullying. Cyber bullying is the use of social networking sites to harass, threaten or embarrass someone (Rouse, 2015 ). Well regarded author Richard Webster, asserts that over 80% of teenagers use social media regularly, (Webster, 2015 ) giving the notion that teenagers are major stakeholders. Queensland parliament offers a variety of laws in attempt to maintain order with cyber bullying, however Victoria offers fewer laws which are more specific to cyberbullying such as Brodie’s law. The following essay will analyse the strengths and limitations of both state’s laws to determine
Whitman, M., & Mattord, H. (2011). Reading & cases in information security: law & ethics. (2011 custom ed., p. 264). Boston, MA: Cengage Learning.
Australia is dependent on technology, everything from state security, economics and information collaboration is more accessible resulting in an increased reliance on digital networks. The rapid increase in cyber activity has a symbiotic relationship with cyber crime. The evolving nature of cyber crimes are constantly leaving counter measures obsolete in the face of these new technologies. Australia takes insufficient action against cyber crime, inaction is based on Australia’s previous focus on counter-terrorism. This study will use the Australia’s National Security Strategy 2013 to show the increasing trend towards cyber security. Unfortunately the Australia Government is lacking in the presence of this growing phenomenon. Recently cyber crimes including attacks from Anonymous and Wiki-leaks prove that no network is completely secure. This study will conclude that the exponential growth of the Internet has resulted in an inability to properly manage regardless of the governmental strategies being implemented.
Modern scholars have in the recent decades engaged in the controversial debate on the actual classification of the group Anonymous. Some scholars classify the group as trolls while other associates it with hackers groups. As defined, hackers are individuals or groups that search and exploit the computer system weakness (Messmer 65). In most instances, hackers engage in discouraging and unappealing activities for multiple reasons including challenging the existing systems, protesting against the prevailing rules and regulations, and for profit making. On the other hand, trolls are groups of individuals who engage in the process of sowing discord on the internet through instigating arguments that aim at upsetting community members and leaders (Keith 11). Trolls are also popular for posting off-topic, extraneous, and inflammatory information on the internet. Although hackers and trolls are the main actors in the current threatening cyber crimes, the two groups have varying reasons for abusing the existing technology. Moreover, despite the existence of detailed and intensive strategies to address the two groups of crime, the actors have been outshining the global policy implementers and formulators in numerous occasions (Messmer 65). However, based on the available evidence, the Anonymous group is more of a hacker group than a troll group.
To begin, consider how countries handle the privacy of individuals in general, not exclusively in the electronic environment. Most countries around the world protect an individual’s right to privacy in some respects, because “privacy is a fundamental human right that has become one of the most important human rights of the modern age”2. Definitions for privacy vary according to context and environment. For example, in the United States Justice Louis Brandeis defined privacy as the “right to be left alone”3. In the United Kingdom, privacy is “the right of an individual to be protected against intrusion into his personal life or affairs…by direct physical means or by publication of information”4. Australian legislation states that “privacy is a basic human right and the reasonable expectation of every person”5. Regardless of varying definitio...
Print Lazar, Wendi S. “Limitations to Workplace Privacy: Electronic Investigations and Monitoring” Computer and Internet Lawyer (2012): SIRS. Web. The Web. The Web.
Donath (1999) depicts trolling as an identity game whereby the troll themselves try to take on the identity of a legitimate user that possess commonalities with the group. With this assumed identity a troll’s activities can range from several things; spamming users or groups, spreading disinformation for their own enjoyment, making controversial statements to get an emotive reaction from other internet users, baiting others into arguments and sending offensive and abusive content to those they believe will respond badly. The word troll comes from the mythological Norse creature that hid under bridges for their unassuming prey. These modern-day trolls like their Norse counterparts lurk within the depths of the internet and social media waiting
“Internet Trolls” by Lisa Selin Davis explains that Internet Trolls are online commentators who write inflammatory or derisive things in public forums, hoping to provoke emotional responses from others. These people spend time and energy engaging in virtual hate. Even outside of internet trolling, discussions sometimes turn into arguments, that often turn personal. A troll can disrupt discussions on social media by broadcasting bad advice, and damaging the feeling of trust within the community. Trolls feed off the reactions of their victims because their agenda is to take pleasure in causing trouble.
This world as we know is heading towards a more virtual era, where everything we need to know is under the palm of our hands. We have many devices such as smart phones, tablets, computers, which gives us access to an infinite amount of information. This virtual life style we are becoming accustomed to introduced us to social media. An increase amount of interaction is being built between known and unknown users from all around the world. Social networks such as Facebook, MySpace, twitter, and even tumbler have become an everyday routine of our daily lives. In this modern society, all these social media websites have brought about a significant amount of impact in many of us. It has really influenced its users on how to conduct their lives.
Internet regulation is basically restricting or controlling access to certain aspects or information. Internet regulation consists of mainly two categories: Censorship of data, and controlling aspects of the Internet.
Although social media has become more prominent in people’s daily lives, that hasn’t decreased the frequency of bullying. Instead, the issue has grown substantially as people are able to bully others online even when they aren’t around them. The trend of online bullying, commonly referred to as trolling, occurs when someone uses the Internet to harass, bully, threaten, or annoy another individual. Trolling was previously thought of as the act of using the Internet to play harmless practical jokes or to trick others about the content they are viewing (click-bait). However, the act of trolling is now equated to cyber bullying where the goal is to elicit a negative emotional response.
Unknown Author. An Overview of the Communications Decency Act (CDA). Center for Democracy & Technology. Retrieved 26 April 2004.
Spinello, R., 2000, Cyber Ethics: Morality and Law in Cyberspace, eds., New York: Jones & Bartlett Publishers.
Many works on governing cybersecurity agree that privacy, security, and trust, though different concepts are intertwined in the online world. Articles such as Cyber Security and User Responsibility: Surprising Normative Differences (Strawser and Joy, 2015). As well as Abbas. J and Agosto. D's (2017) work Don’t be dumb—that’s the rule I try to live by: A closer look at older teens’ online privacy and safety attitudes, are just two examples that support this theory. Confidentiality online and security is a balancing act, yet if either is breached trust can be damaged, as highlighted by Wright, D and Kreissl, R’s (2013) work European responses to the Snowden revelations: A discussion paper. Simpkins, Yuan, Modi, Zhan and Yang’s, (2015) findings in ‘A Course Module on Web Tracking and Privacy’ supports the idea that everyone views the internet differently. Having priorities towards different aspects of their online experiences, some prefer conveyance while others value safety above all else. This divide of usage creates different challenges, how to protect users online without inhibiting their activities or breaching ethics, which regulations and policies should be implemented and while also educating individuals to self-regulate their protective systems
The Internet along with other technologies has opened channels of communication. Not only has the Internet played a great role in forming international public opinions regarding the United States throughout the Middle East, Asia, and Western Europe, but it has also helped to democratize the rest of the world by allowing them to voice their own opinions. However, sometimes the incited cyber public opinions would lead to some extremely negative behaviors and cause serious problems like cyber bullying, real life crimes, and even a long time social unrest.