While bullying is not a new element of concern it is certainly changing with increase in diversities in the use of computers, smart phones, and network. The reason behind its popularity in the recent times is as a result of it happening in more places and more people than ever before. In the past, bullying only happened at schools or neighborhoods, and by children or teenagers. Currently, as the use of social media and internet increases, children, teenagers, and adults are bullied in all locations and time. Cyber bullying can be defined as “willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices”(Hinduja, and Patchin (2009) The effects of bullying in social media require a quick response if teenagers and children are to develop into fully-functional adults.
In some decades backmost people had no access to computers, and the internet was virtually unheard of to an average person. Computers are everywhere including homes where children have access to them. While it is useful to assist children with knowledge pertaining computers, internet, and technology, it is crucial to define measures that may limit their exposure to misuse or cyber bullying. Parents need to know the usage of these computers, and monitor how the children use them.
Cyber bullying in social media involves impersonation and flaming. “Impersonation occurs when the cyber bully gains the ability to impersonate the target and post material that reflected badly on the target or interferes with the target’s friendships. This may occur in the target’s personal web page, profile, blog, or through any form of communication” (Willard, 2007). Flaming is the use of offensive language or issuing threats to a target. “Flaming is a heated, short-lied argument that occurs between two or more protagonist. Flaming generally includes offensive, rude, and vulgar language, insults, and sometimes threats” (Willard, 2007).
Cyber bullying on social media involves posting or commenting on pictures negatively, posting insulting or abusive posts or comments on a user’s wall, or using videos or pictures to make others humiliated, creating false or manipulated profiles or websites designed for causing harm to another person, any online conduct with intentions to demean, embarrass, or scare. It also involves threats to post embarrassing videos, photos, or comments if the target fails to adhere to instructions. Many of these acts are similar to physical bullying only that they happen on digital media through online messages, websites, or voice mail messages.
In general cyber bullying is the use of technology to threaten, harass, or embarrass a person through social network. “Cyber bullying is a recent phenomenon and presents challenges for both researchers and schools. It has been described as a new type of bullying behavior with some different characteristics from off-line bullying” (Chadwick, 2014).
A new approach of cyber bullying is sex-ting that involves sending sexual messages or circulating sexually suggestive messages or pictures about a person. Bullies use existing pictures and photos of users and manipulate them to make them sexual, make nude photos, or even pornographic films. The most recent is the case for a popular actor posted while nude in the social media. Some competitors use such messages and photos in destroying one’s public image, self respect, and self esteem for their advantage.
Cyber bullying can be dangerous to adolescents and teenagers who form the most affected age group. It leads to anxiety, depression, and in extreme cases suicide. “There is no doubt the nature of adolescent aggression has evolved due to the proliferation of technology and their access to information 24/7. As technology has evolved, cyber bullying has increased. The impacts of cyber bullying cannot be underestimated. Some cyber bullying can lead a young person to take their own lives. The destructive nature about ‘words’ or images online are they are publicly announced and often can be changed or edited by the person who posted them” (Chadwick, 2014).Several suicide cases have been reported in the country that results from threats issued on social sites and internet. For example, students may threaten a fellow student making his/her life unbearable at school. Some of these students end up dropping school, and while the pressure from both school and at home increases they commit suicide.
Things that circulate on the internet are viewed by many people across the world. There is no possible ways that one can use to refute or challenge things that circulate to over one million viewers in a second. “The invisibility in computer usage gives people the courage to go places and do things that they otherwise wouldn’t. Although this power to be concealed overlaps with anonymity-because anonymity is the concealment of identity-there are some important differences” (Suler, 2004) Famous artists and musicians, for example, have fallen on the trick of invisibility and victimized on social media from uploaded compromising pictures. The victims try to explain to the media or through their blogs on being victims but most users may not lend them their understanding. The musicians end up being humiliated to the extent of losing their contracts and income.
Most bullies view their acts as amusing and interesting to viewers. They ignore or fail to realize the consequences of their acts. They ignore the fact that some pictures or posts they upload may be used against them in future, for example, while applying for jobs. If formal procedures on law requirements are considered the bullies may lose their phones or machines.
Recently, Massachusetts enacted extremely strict rules on anti-bullying in the country that require all schools to document their policies and intervention procedures on bullying. This mandate will provide a timely opportunity to study cyber bullying prevention policies in the region. If all the schools adhere to this requirement bullies will be caught minimizing the increased bullying instances in the region. They may also face legal charges adding up to costs on penalties of life imprisonments. Bullies may think that by not revealing their identity or using fake names they might never get caught. Most social sites require some information regarding users when registering. This information plus the machine used for registration may assist in tracking these bullies.
Statistics.
According to statistics reported by EU kids online (February 2013), most children worry about pornography, violence, phishing, and pop-up ads shared on social networks. Many children showed knowledge of understanding on cyber bullying, what it entails, and its consequences. A significant percentage of these children did not know if there existed ways of preventing or fighting the act. The study also indicated that a high percentage of children desire to remain survivors in the battle against cyber bullying while a few indicated signs on low self esteem on the desire to win against cyber bullying. The results of this survey also indicated that children rank pornography as the first threat in cyber bullying, and aggressive and violent content as the second online threat.
Statistics in 2014 indicate that out of ten internet users seven are cyber bullied. 37% of those cyber bullied are frequent internet users. 20% of young adults experience cyber bullying on daily basis: The research indicates that young females and males are at equal chances of threat. The study revealed that of all the youth polled, 75% of them used Face book, and 54% of the users have at one time experienced cyber bullying. You tube users followed with 21% out of the 66% surveyed face cyber bullying effects. Twitter, Ask.fm, Insta-gram, Tumblr, and MySpace followed respectively.
Another survey conducted in England by Slater and Gordon, legal experts, and the anti-bullying alliance, which incorporated views from 2200 families, revealed that 55% accept cyber bullying. Only 67% of the victims turn to their parents or teachers for help. 40% of the guardians or teachers do not know what measures to take or how to help these victims. 49% of parents interviewed indicated the time used by their children online as a threat to exposure as monitoring them may not be possible.
A study conducted in UK on 1000 families indicated that 63% of the children had cell phones, 45% of them were ion Face book, and 42% on Insta-gram. 11.5% indicated being targets of cyber bullying in the previous 30 days before the study. 3.9% revealed having cyber bullies others within thirty days prior to the study. At least 46% indicated that they have been bullied at some point while using the internet or social media.
With all these data and statistics available, it can be deduced that cyber bullying is in existence, and it affects users in all regions of the world. Most of the cyber bullying occurs in social media with consequences that range from emotional effects, psychological, or avoidance to using the internet. It can also be deduced that a most cases of cyber bullying are reported from Face book users probably from its ability to make posts, comments, or upload pictures with private messages. Other social media are also increasingly becoming breeding grounds for bullying; Ask.FM has reportedly caused problems among teenagers as a result of bullying behavior that is unstoppable for lack of identification policies. Twitter does not have as many reports as the rest perhaps as a result off its settings.
One may then ask why it is easy to bully along social media platforms as opposed to other websites. Even if users know everyone by their profile pictures or settings, the issue remains irresolvable as being online gives users powers live opening new accounts, and closing existing ones. Additionally, talking face to face creates less impact as compared to writing messages. Further, it is also difficult to portray written words and tones. These and other reasons explain why teenagers prefer expressing themselves through social media.
How it can be brought down to minimum.
Parents should ensure that users are at least thirteen years of age to have access and accounts on social sites. The children should be warned against cyber bullying, its signs and consequences. They should be advised on whom to report to in cases of signs of the act. To ensure protection, parents should offer guidance and support to their children in search of solutions. Once the bully has been identified, parents should share it with schools so that they can formulate policies or take necessary action against those involved.
Internet users need to keep their identities private by avoiding posting anything that reveals their names addresses, phone numbers, or schools that may allow strangers to contact them in real life. They should avid uploading anything that might be used against them in future. They should ensure that they log in only when using the machines, and log off when a session is completed.
Removing and blocking friends confirmed to be involved in cyber bullying also minimizes the behavior. All social sites have provisions for adding and removing friends on their settings. Closing an account also assists in solving the problem. Some users opt for this method as it inactivates the account so that bullies lack access in cases of leaked passwords and s, or may end up posting things that one will never see as the accounts are closed.
Minimizing the level of involvement on online arguments or posting material considered as offensive also acts as a means of solving the problem. Most social sites provide for this on their terms and conditions, and breaking the rules may imply being removed from the site or membership termination. Offensive messages and posts should also be deleted instead of responding to them. This minimizes the chances of arguments, humiliation, and embarrassment that may be the sole intentions of the bullies.
Of critical concern is the frequency of updates on bullying and disciplinary measures and policies of the social site in use. Employers should include instructions and guidance on the use of social sites. They should consider using these policies to identify bullying behavior, and the acceptable online behavior. Employers should also check on their electronic activities as emails, and sites. However, this must be done with the knowledge of the users as it may interfere with privacy.
In conclusion, it is undoubted that school is beneficial to American children. Each day children learn valuable lessons and skills from their teachers and interactions through peers. Some find their way out of frustration by bullying others. With technological advancements, some prefer to express their frustration using social sites. The reality is that bullying whether physical or through internet is a reality that will continue affecting users if proper measures are not implemented. However, it remains the responsibility of parents to keep their chidlern up-to-date with online events and changes in behavior that may affect their technological experiences.
REFERENCES
Chadwick, S. (2014). Introduction. In Impacts of Cyberbullying, Building Social and Emotional Resilience in Schools (pp. 1-10). Springer International Publishing.
Hinduja, S., & Patchin, J. W. (2009). Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Thousand Oaks, Calif: Corwin Press.
Suler, J. (2004). The online disinhibition effect. Cyberpsychology & behavior, 7(3), 321-326.
Willard, N. E. (2007). Cyberbullying and cyberthreats: Responding to the challenge of online social aggression, threats, and distress. Champaign, Ill: Research Press.