Cyberbullying is a
term that is widely used in adolescence which, as we
all know, is a time of constant change and evolution.
At this stage, it
is in which both mental and physical maturation occurs, adolescents begin to distance themselves
from their family and the main authority figures and then
begin to give greater importance to their peer group, people who as they are in
search of their own identity.
However, this
approach to those who are their peers does not always result in a very positive
interaction, but it is possible that on some occasions an abusive relationship.
The
violence that is invisible.
We will give you
an example of violence that is not seen:
« After a
total diffusion of that photo in which he appeared totally naked, Frank
found that they did not stop receiving messages about his physical
appearance. The situation is
not only due to the virtual level, but in his classes the teasing and
humiliation were already constant, even finding the image
hooked on the poles both inside and outside the school itself.
His parents
managed to file several complaints in order to stop the situation, but despite all the damage was already
done. One day, after three months of continuous teasing,
Frank never came home. It would be achieved a day later, hanged from a tree in a field that was
nearby, leaving only behind him a farewell letter.
The description of
all the above facts belongs to a case that is not real, but at the same time
bears a resemblance to the sad reality that many young people who are harassed
live today. In fact, its elaboration was based on several real spread
cases.
What
is cyber-harassment or cyberbullying?
Cyberbullying
or cyberbullying is a well-known subtype of bullying in an indirect way that is carried out through the use and through
social networks and new technologies.
As it is in all
types of bullying, this kind of interaction is based on the emission of behavior intentionally with the aim
of harassing or harming another person, thus establishing a
relationship of inequality between two or more subjects, that is, that is, the
predominance of the person who is the aggressor over the person who is attacked
and this being possibly stable over time.
However, the fact
of being able to apply new technologies makes all these characteristics of
bullying look a little more nuanced.
While the
existence of an unequal relationship does always occur, it must be taken into account that the stimulus that can be a trigger
can be as simple as a photo, a look, a comment or content that has been
broadcast or published without the intention It needs to harm no one, with
harassment being derived from a misuse of that publication, the intention to
cause harm being located here on this third person.
For example, if a
friend or the individual himself places or sends someone a photograph in which
a colleague has gone wrong, this may not imply that he wishes to humiliate
him, but a third
person may end up using it very differently from the one intended from the
start. the beginning and make the difference.
In the case of
cyberbullying, it must be taken into account that what is published on the
Internet can be seen by a large number of people , many of whom are unknown and at any time, so that only one
harassment situation can have repercussions at various time intervals.
In addition, the victim obviously has a greater feeling
of being defenseless than in other types of aggression ,
since due to the web and social networks, the attack can come anywhere and at
any time, and in addition to not knowing when it is going to be carried out nor
by whom it may take place.
Cyberbullying
classes.
Cyberbullying or
cyberbullying is not a unitary phenomenon that occurs in only one way ; There is a wide and great variety of different forms that
range from harassment of the victim and even their own social exclusion to the
manipulation of data in order to harm a person with their own name.
The Internet and
social networks are an environment that is known for the great and diverse
variety of technological possibilities that it can offer .
In the case of
cyberbullying or cyberbullying, the
different strategies to be able to harm someone can use all the potential that
the network has , from photographs that are stored and can be
easily disseminated to the use of voice recordings or text messages.
photomontages.
Very clear
examples are photographs and videos made and published without the consent of
the person with the sole purpose of blackmailing
or humiliating, making threats directly through different platforms or web
pages created with the sole purpose of being able to ridicule the victim.
In addition,
depending on the objective of the harassment, we can come across cases such as sextortion ,
in which the victim is blackmailed in exchange for not publishing or extending
photographs or some videos of a sexual nature.
We suggest you read: The well-known Sexting, or Sex By WhatsApp Interesting!
On the other hand,
we must take into account that the most common cyberbullying is the one
carried out by children and adolescents , it can exploit all the
resources of those little heads, even the least imaginable, given that people
who belong to the generation
of digital natives already learn to use all these tools
from their earliest years.