We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Cyber Bullying Argumentative

The whole doc is available only for registered users
  • Pages: 3
  • Word count: 502
  • Category: Bullying

A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed

Order Now

Cyber bullying is the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner. As it has become more common in society, particularly among young people, legislation and awareness campaigns have arisen to combat it. Cyberbullying is said to be a significant problem that warrants serious attention within Communities.

For a long time, safety was only a matter of protection from dangers of the tangible world. However, at the end of the twentieth century ‘cyberspace’ emerged. Besides the fact that this new social structure is used for plenty of good purposes, such as gathering information and communicating with friends, the internet also poses significant dangers. The internet is for example used to commit fraud, to disseminate child pornography or to harass others. The internet has become an increasingly popular medium among youth. Therefore, not only the opportunities, but the dangers of cyberspace apply to youth as well. Youth in particular use the internet for communicative purposes and, in addition, research indicates that the potential to interact with others in harmful ways while being online exists. One of the emerging risks of communication on the internet for youth is cyber-bullying.

Definitions of cyberbullying find their origin in definitions of traditional bullying. Prior to the emergence of cyberspace, bullying also occurred. The Norwegian scientist Dan Olweus has conducted numerous studies on ‘traditional’ bullying. He developed a definition for bullying that still forms the basis for a multiplicity of definitions used in scientific literature. “A student is being bullied or victimized when he or she is exposed, repeatedly and over time, to negative actions on the part of one or more other students… It is a negative action when someone intentionally inflicts, or attempts to inflict, injury or discomfort upon another.” Types of Cyberbullying and It’s Example

Cyber Stalking – The transmission of messages to intimidate and or threaten the victim resulting in a child to have concerns about their personal safety and well being. Web Sites – The creation of web sites and/or pages filled with images, rumors, statements, and/or defamatory remarks to further humiliate and cause emotional distress for the victim. Images or Photos – The posting of photos or images that are found that might be embarrassing in nature or the creation or altering of images to depict the boy or girl and cause humiliation. Text Messaging – This is where they enlists friends to help send thousands of messages to the victim’s cell phone running up their phone bill and getting them into trouble with parents. Proxy Attack – It is not unusual for them to enlist their friends to assist them in the dirty work and to “join in on the fun” to further the humiliation and emotional damage caused the victim. PC Attack – Our children are very skilled in computer technology. Many can and have used to Cyber Bully another the sending of viruses, a Trojan and/or spyware to infect the boy’s or girl’s computer.

Related Topics

We can write a custom essay

According to Your Specific Requirements

Order an essay
Materials Daily
100,000+ Subjects
2000+ Topics
Free Plagiarism
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access

Your Answer Is Very Helpful For Us
Thank You A Lot!


Emma Taylor


Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59