Type Here to Get Search Results !

Cyberbullying, Characteristics Of Virtual Harassment. Prevention And Alert!


Cyberbullying is a term that is widely used in adolescence which, as we all know, is a time of constant change and evolution.

At this stage, it is in which both mental and physical maturation occurs, adolescents begin to distance themselves from their family and the main authority figures and then begin to give greater importance to their peer group, people who as they are in search of their own identity.

However, this approach to those who are their peers does not always result in a very positive interaction, but it is possible that on some occasions an abusive relationship.

The violence that is invisible. 

We will give you an example of violence that is not seen:

« After a total diffusion of that photo in which he appeared totally naked, Frank found that they did not stop receiving messages about his physical appearance. The situation is not only due to the virtual level, but in his classes the teasing and humiliation were already constant, even finding the image hooked on the poles both inside and outside the school itself.

His parents managed to file several complaints in order to stop the situation, but despite all the damage was already done. One day, after three months of continuous teasing, Frank never came home. It would be achieved a day later, hanged from a tree in a field that was nearby, leaving only behind him a farewell letter.

The description of all the above facts belongs to a case that is not real, but at the same time bears a resemblance to the sad reality that many young people who are harassed live today. In fact, its elaboration was based on several real spread cases.

What is cyber-harassment or cyberbullying?

Cyberbullying or  cyberbullying is a well-known subtype of bullying in an indirect way that is carried out through the use and through social networks and new technologies.

As it is in all types of bullying, this kind of interaction is based on the emission of behavior intentionally with the aim of harassing or harming another person, thus establishing a relationship of inequality between two or more subjects, that is, that is, the predominance of the person who is the aggressor over the person who is attacked and this being possibly stable over time.

However, the fact of being able to apply new technologies makes all these characteristics of bullying look a little more nuanced.

While the existence of an unequal relationship does always occur, it must be taken into account that the stimulus that can be a trigger can be as simple as a photo, a look, a comment or content that has been broadcast or published without the intention It needs to harm no one, with harassment being derived from a misuse of that publication, the intention to cause harm being located here on this third person.

For example, if a friend or the individual himself places or sends someone a photograph in which a colleague has gone wrong, this may not imply that he wishes to humiliate him, but a third person may end up using it very differently from the one intended from the start. the beginning and make the difference.

In the case of cyberbullying, it must be taken into account that what is published on the Internet can be seen by a large number of people , many of whom are unknown and at any time, so that only one harassment situation can have repercussions at various time intervals.

In addition, the victim obviously has a greater feeling of being defenseless than in other types of aggression , since due to the web and social networks, the attack can come anywhere and at any time, and in addition to not knowing when it is going to be carried out nor by whom it may take place.

Cyberbullying classes.

Cyberbullying or cyberbullying is not a unitary phenomenon that occurs in only one way ; There is a wide and great variety of different forms that range from harassment of the victim and even their own social exclusion to the manipulation of data in order to harm a person with their own name.

The Internet and social networks are an environment that is known for the great and diverse variety of technological possibilities that it can offer .

In the case of cyberbullying or cyberbullying, the different strategies to be able to harm someone can use all the potential that the network has , from photographs that are stored and can be easily disseminated to the use of voice recordings or text messages. photomontages.

Very clear examples are photographs and videos made and published without the consent of the person with the sole purpose of blackmailing or humiliating, making threats directly through different platforms or web pages created with the sole purpose of being able to ridicule the victim.

In addition, depending on the objective of the harassment, we can come across cases such as sextortion , in which the victim is blackmailed in exchange for not publishing or extending photographs or some videos of a sexual nature.

We suggest you read:  The well-known Sexting, or Sex By WhatsApp Interesting!

On the other hand, we must take into account that the most common cyberbullying is the one carried out by children and adolescents , it can exploit all the resources of those little heads, even the least imaginable, given that people who belong to the  generation of digital natives already learn to use all these tools from their earliest years.

Tags

Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.

Top Post Ady

Below Post Ad