2015年3月28日星期六

Assignment 8.2

In model 8, I learnt the knowledge of cyber-bullying, and I think it becomes a very common phenomenon in our society that online harassment and intimidation increase quickly in kids and teenagers. Statistics shows that more than one-third of teenagers who used instant messaging and social networking sites had encountered bullying on the Internet in the United States, and it is often from their classmates. Bullies usually don't think online bullying can cause damage or a fault, they just think this is joking and play.
Cyber-bullying usually is anonymous. Bullies will use a false E-mail address and name to conceal. There is no doubt that cyber-bullying will cause moral hazard. For example, some bullies send instant messages one after another to harass or bullying other kids, such as "everyone hates you”, or "you're a freak ", etc. Some network bullies creating web sites to ridicule or insult the other children, such as the vote for "the 10 ugliest girl" for the university's online poll.
The motivation of cyber-bullying is complex, and it can range from boredom and the harasser seeking entertainment to personal vendettas, such as revenge, jealousy, righteousness, bigotry, fear, anger, or they want to get the attention of the target or others. (https://www.wiredsafety.org/subjects/cyberbullying.php).

I think cyber-bullying not only just occur in kids and teenagers, but also adults will be threatened. The infringement of public figure defamation cases increase quickly, such as insults, humiliation, threat, tracking, and sexual harassment, particularly women. Fortunately, although cyber-bullying can happen in the internet, but internet also has the ability to gather voice to against cyber-bullying. As long as people realize the existence of this problem and the seriousness of the threat, internet can give a perfect solution in the future, or it will be worthless.
It is gratifying to see people have started to refuse the cyber-bullying. Aftab and the US Justice Department recommend advising a target of cyber-stalking to take the following steps:
1. Tell the person not to make contact again.
2. Save all communications for evidence. Do not alter them in any way. Keep electronic copies, not just print-outs.
3. Save any information that suggests a violent threat and contact law enforcement.
4. If the harassment continues, contact the harasser's Internet service provider. The ISP is provided with instant messages. Most ISPs prohibit using their service for abusive purposes. An ISP can often intervene by directly contacting the stalker or closing his account.
5. Keep a record of your contacts with ISP officials or law enforcement officials.
6. When contacting police, provide specific details such as any tangible evidence you've collected. In cases of a serious threat, police can refer the matter to state or federal authorities for investigation. The stalker may be prosecuted in court.
7. If the target is afraid to act, find help through other resources, such as WiredSafety. 

没有评论:

发表评论