- April 18, 2020
Cyber Bullying and Cyber Harassments
CyberBullying and Cyber Harassments
CyberBullying and Cyber Harassment
Cybercrimehas been defined as the threat that businesses, large organizations,and various internet users have been subjected to by online users whoseek to gain relevant and crucial information from them (INTERPOL,2016). The act may result in defamation or downfall of the targetedorganization. With the recent advancements in information technology,most businesses have adopted the use of systems that are aided byinternet access to ease communication and improve their business orinstitution performance. Cyber bullying is one form of cybercrime. Ithas been defined as the act of creating intimidation to otherinternet users by sending them cruel online photos, text messages,spam or even threats (Kowalski, Limber, & Agatston, 2012).Therefore, this paper will present a review of cyber bullying andcyber harassment and relatethe information to the lessons from the class.
Scholarshave regarded cyber bullying as embarrassment, cruel online posts,and digital pictures that are posted on one`s site to trigger socialdiscomfort to the users (Kowalski, Limber, & Agatston, 2012).They may also include negative comments that are sent through emailinform of spam and text messages to organizations and companies`websites and social networks. Experts argue that cyber bullying isvery familiar with the youth but vulnerability has been recordedamong teenagers and young adults (Kowalski, Limber, & Agatston,2012). Studies have also shown that cyber bullying has recently grownin schools and it is slowly moving to the private sector. Sinceinternet use is anonymous, experts have noted that this has led toincreased instances of cyber bullying due to the inability to tracethe persons that cause intimidation to others.
Vulnerabilityto cyber bullying and harassment
Sincegovernments have adopted the use of the internet, cyber bullying andcyber harassment are a major cyber security threat. As a result,nations have come up with laws that are aimed at fighting againstcyber harassment and bullying cases, which are very common amongschools and major institutions. Recent studies conducted on cyberbusinesses have indicated that over 80% of small and medium-sizedenterprises including government and non-governmental organizationshave embraced the use of the internet and cyber-aided systems intheir communication channels (Smith, 2016). This has increased theirvulnerability to cyber bullying since most of them have adoptedsocial media platforms as their medium of communication. Institutionsthat are using social media sites like Facebook, Twitter, LinkedIn,and emails as communication and marketing points have also had enoughof the cyber bullying and harassment experience and exposure.
Cyberbullying and harassment statistics
Severalcompanies and institutions report cyber harassment of up to 70% on anannual basis with the major one being site hacking and posting ofcruel and digital nude pictures that result in institutional imagedamage. Other companies have also reported cases of receiving spamemails, in particular through the firm`s email domain. The virtualcriminology report of the United States recently indicated thatalmost all U.S sectors of the economy have at one point dealt withcybercrimes such as cyber bullying and harassment (McAfeeVirtual Criminology Report, 2011).The report also noted that the financial sector is the mostvulnerable to cyber harassments. This has been partly contributed bythe sectors broad application of the internet and cyber system intheir service provisions and the cyber attackers` aim of transferringfinances illegally.
Cyberharassment examples and protection measures
Theexamples of cyber harassments that have been reported include theattempts by fraudsters to transfer money from one account to anotherthrough hacking of the institution`s internet system. The UnitedStates, for example, has developed laws that are aimed at fightingcybercrime. These include the cyber balance of power that has beencharged with the responsibility of monitoring the latest technologyadvancements. The state has also established a national policy foridentification and prioritization for the protection of criticalinfrastructure. The private sector has also set up collaboration withgovernment in a bid to fight against cyber security threat that hasbecome major especially to the financial sector. These measuresclearly indicate that cyber harassment and cyber bullying are slowlybecoming a significant threat not only to the business community butalso within the government institutions. Studies conducted on cyberthreats including cyber harassment and cyber bullying have indicatedthat most firms that have faced these attacks have been using theinternet as their communication system (Hill & Marion, 2016).
Cyberbullyingexamplesand protection measures
Theworst part of cyber bullying is that the rumors, threats, and photosthat are used to carry out the harassment spread so fast through theinternet. The range is supported by the reason that most people findit very easy to disseminate rumors and the social media has made thiseasier. For example, one only requires tagging several users on acruel photo on Facebook to spread. Other platforms like Twitter justneed one to tweet others or like their comments or photos for themessages to spread.
Therules that have been put in place to protect people and institutionsfrom cyber bullying include limiting the sites that people can accessat different cyber stations and organizations. Companies have alsorestricted the access of some social media sites like Facebookthrough their internet domain. To some extent, this has been able tocontrol and reduce cyber bullying in these institutions. Internetusers have also been advised to limit the kind of people they allowto access their personal information on the web. Security systemshave also advised internet users and institutions to control thosewho gain access to their contact details including their interests,habits, and employment details as posted on their personal internetor social media accounts.
Lawsand relation to class knowledge
Expertshave also indicated that whenever one is subjected to cyber bullying,he/she should avoid hostility and response as this may result in theescalation of the situation. Security experts have also pointed outthat Internet users need to keep records of online emails, socialmedia, and web pages they visit in the form of electronic versionsand printed copies to avoid cyber bullying from unknown internetusers (Hill & Marion, 2016). The laws also state that any personwho experiences cyber bullying should report to the appropriateauthorities. The freedom of speech holds that there is a distinctionbetween autonomy of expression and punishable offenses. Similar towhat was taught in class, the cyber use and management act stipulatesthat any person who involves in cyber bullying is committing a crimeand may be liable to prosecution. This law offers protection to thosewho are frequently exposed to cyber bullying and as a result,experience social damage. While cyber bullying has been considered asa small issue, studies indicate that several children andinstitutions suffer from it daily. The worst part is that most ofthese cases are never reported. As a result, cyber bullying hasincreased over the years (Shackelford, 2014). However, the laws leantin class and mentioned in this discussion have played a vital role inthe fight against cyber bullying and harassment.
Inconclusion, this paper reviewed cyber bullying and cyber harassmentand relatedthe information obtained to the lessons from the class.The discussion determined that majority of the literature availableon cyber bullying and harassment reflects the lessons we had inclass. The paper concludes that it is critical for internet users tobe informed about the cyber bullying instances and impacts. It willalso be important for internet users who involve in cyber bullyingand harassment to be punished by law to enhance proper and mature useof the web and social media platforms. Understanding cyber bullyingand harassment is critical because most companies will be protectedand other cybercrimes eliminated thereby boosting internet security.
Hill,J., & Marion, N. (2016). Introductionto cybercrime: Computer crimes, laws, and policing in the 21stcentury: computer crimes, laws, andpolicing in the 21st century.U.S.A: ABC-CLIO.
INTERPOL.(2016). Cybercrime.Retrieved fromhttps://www.interpol.int/Crime-areas/Cybercrime/Cybercrime
Kowalski,R., Limber,S., & Agatston, P. (2012). Cyberbullying:Bullying in the digital age.U.K: John Wiley & Sons.
McAfeeVirtual Criminology Report. (2011). Cybercrimeversus cyber law. Retrievedfrom https://resources2.secureforms.mcafee.com/LP=2980
Shackelford,S. (2014). Managingcyber-attacks in international law, business, and relations: Insearch of cyber peace.New York: Cambridge University Press.
Smith,M. (2016). Hugerise in hacks attacks as cyber-criminals target small businesses.Retrieved fromhttps://www.theguardian.com/small-business-network/2016/feb/08/huge-rise-hack-attacks-cyber-criminals-target-small-businesses