Cyber Criminology

Read Complete Research Material

CYBER CRIMINOLOGY

Cyber Bullying

Cyber Bullying

Introduction

Cyber bullying is the use of electronic information and media such as email, social networks, blogs, instant messaging, text messaging , mobile phones , and defamatory websites to harass an individual or group through personal attacks or other means. Cyber bullying is willful and involves recurring and repetitive damage inflicted through the medium of electronic text. According Sandler RB bullying intends to cause emotional distress, worry, and has no legitimate purpose for the choice of communications. Cyber bullying can be as simple as sending e-mails go to someone who has said he wants to stay in touch with the sender. Cyber bullying may also include threats, sexual connotations; pejorative labels (e.g., hate speech).

Discussion

Characteristics of Cyber Bullying

Requires skill and knowledge on Internet. This information is obtained primarily from computer forums.

False accusation: Most bullies try to damage the reputation of the victim manipulating people against him.

Publishing false information about the victims on websites. They can create their own websites, social networking sites (Face book pages), and blogs or footslogs for this purpose (Limber, 2006). While the forum is hosted is not removed, can perpetuate harassment for months or years. And while the web is removed, all that is published on the Internet stays on the network.

Gathering information about the victim: Cyber bullies can spy on the victim's friends, family and coworkers to obtain personal information. This way you know the result of defamatory emails, and find out what are the most credible rumors that do not create any jobs.

Often monitored the activities of the victim and try to trace your IP address in a bid to get more information about this.

Periodically sent defamatory emails to the environment to manipulate the victim.

Manipulate others to harass the victim. Most try to involve third parties in the harassment (Olweus, 2006). If you get this way, and get others to do the dirty work be harassed, making photos or videos involved, you may use the identity of these in the following slurs, thereby increasing the credibility of false accusations and manipulating the environment to create he deserves it. Often the victim is not aware of these facts, because of the silence of witnesses (Hart, 2005). Even the bully can say that the victim already knows these photos / videos, to try to prevent a witness to report, thereby increasing suspicions and creating a false paranoia in the victim.

The harasser can be transferred to their insults and threats Internet publicizing the identity of the victim in a given forum (blogs, websites), in some cases even providing his phone, so that strangers can adhere to aggression.

You may accuse the victim of having offended him or his family in some way, or maybe post your name and phone number to encourage others to persecution.

False victimization. The cyber bully can claim that the victim is harassing him.

Attacks on data and computers. They may try to harm the victim's computer by sending viruses.

No legitimate purpose: it means that harassment does not have a valid purpose, but to terrorize ...
Related Ads
  • Cyber Crime
    www.researchomatic.com...

    Global crimes include terrorism, cyber crime , ...

  • Cyber Crime
    www.researchomatic.com...

    Any crime that involves a computer and a network for ...

  • Cyber Crime Research
    www.researchomatic.com...

    Cyber crime has several definitions (Wall, 20 ...

  • Trends In Cyber Crime
    www.researchomatic.com...

    Trends In Cyber Crime , Trends In Cyber Cri ...

  • Cyber Crime
    www.researchomatic.com...

    The purpose of this study is to expand the boundarie ...