Methodology
Methodology
It is a repetitive act of harassing, attacking, and harming another person through means.
Telematics: internet, telephony, mobile, etc. In recent years, there has been significant progress.
of technology and digital media, and we are increasingly using the internet for a wider range
of activities, especially the relationships with communication.
In CYBERBULLYING, children and adolescents use the internet and its platforms to harass,
to psychologically aggress or attack other minors with an apparent freedom and little
control.
It is important to point out that when we talk about CYBERBULLYING we are referring to that
abuse that takes place among peers. That is: CYBERBULLYING is the act that a child or
teenager harassing another child or teenager of the same or similar age
Therefore, all those situations in which there are no minors are excluded from this term.
both extremes of harassment.
1. CYBERBULLYING can be carried out by any minor, without the need for...
be a schoolmate
2. Unlike normal bullying, when the harassment is carried out by a group of
minors, in CYBERBULLYING there is usually no clear leadership from anyone
of the components.
3. In normal bullying, harassment by children predominates in CYBERBULLYING.
in gender they are distributed more equitably.
4. CYBERBULLYING can be perpetrated by unsociable children with few friends.
the opposite of normal bullying that is usually carried out by children with high
popularity among their peer group.
Evidently, CYBERBULLYING can represent a form of school harassment in the
the moment that one or more minors begin to engage in acts of harassment or aggression towards a
classmate through the internet.
However, cyberbullying is not always carried out by a classmate from school. As we have said,
accessing the virtual world in a more or less autonomous way exposes the minor to a greater
number of people in the Real world.
This means that I can start receiving CYBERBULLYING from any child.
regardless of whether you know him or not
The statistics on CYBERBULLYING indicate that it is a phenomenon on the rise, and since
As new technologies emerged, more cases are being confirmed. In fact, the great
The prevalence of this problem has led to numerous studies being conducted recently.
However, the results obtained in each study are very disparate, and even today
an exact figure cannot be provided.
CAUSES:
This virtual world becomes especially important when it is used by children and adolescents, as
they access directly and independently many times without the supervision of their parents to a
a world difficult to control.
Parents and teachers are the authority figures for children and adolescents, and it is advisable
that have some control over the activities that their children/students do
internet. When there is a lack of control, these acts of violence are more likely to occur.
Lack of education in values
Obviously, when a child or teenager has values of respect and tolerance and ...
kindness, will not exhibit violent behaviors such as CYBERBULLYING towards friends or
known.
With the aim of better identifying possible cases of CYBERBULLYING and narrowing it down a bit
better this phenomenon that can often be ambiguous, I will comment on the 10
most common manifestations of CYBERBULLYING
1. Publish and share content that can be with public internet profiles.
to harm, embarrass, or humiliate the person. The content can be
real or formatted images, personal data, opinions, expressions, etc.
2. Impersonate the victim on websites or social media, creating a fake profile with the
name and photographs of the person. Profiles are usually edited with content
negative or humiliating to, as in the previous case, shame or insult the
victim.
3. Use profiles as previously described to add them to websites
intended for fashion or ridicule. A common example is usually to register
profiles of the victim on websites where people vote for the ugliest person,
silly, clumsy, etc. Later, the profile is disclosed with the aim of it
see the largest number of people possible.
4. Use the victim's fake profiles to write in the first person to
mode of confessions about certain events, always with a
humiliating speech. The themes are usually sexual, personal, anecdotes
satire, etc.
5. Posing as the victim in forums or chats, expressing oneself in a way
aggressive or provocative, with the aim of creating conflicts with people to
Later, they blame the victim for their behavior, not the ...
stalker who does not reveal his identity.
6.Hack the access keys of email or social media accounts
social media of the victim to read their messages, violate their privacy, create
conflicts with their contacts and change the password so that the victim does not
can regain access to their own accounts.
7. Provoking the victim in the web services they use that contain
moderator chats, forums, online games, to get this to respond to
violent form and subsequently report their reaction so that they are excluded
or expelled.
Register the victim's email address on websites
unpleasant or not to their liking so that they receive (spam) in their
email.
9. Spread rumors about behaviors or actions on the internet
reproachful of the victim, so that their social circle reads it, believes it, and exercises it
their own forms of retaliation or harassment. In this way, the harasser achieves
that other people unrelated to CYBERBULLYING also reproach or harass
the victim
10. Talk to the victim directly through chats or email applications
instantaneous like WhatsApp, sending threatening messages, repetitive and
frequent, with the aim of bothering or intimidating you
CONSEQUENCES
Be very careful with the data, photographs, and personal information you put online.
Try to make this information available only to your contacts. Be very careful with
those you expose in public chats or forums, never provide information about yourself, do not
Do you know who is on the other side of the screen.
Do not respond to provocations on the internet, especially if you do not know the provocateur.
When you are bullied, it is preferable to keep evidence of the CYBERBULLYING messages.
photos, etc. You should pay for the computer or mobile and consult an adult.
Investigate the issue at hand and pay attention to its severity. If the aggressor has
personal data such as address or school center and the violence of harassment is high, will not be
to go to the police.
If CYBERBULLYING is less serious, help your child delete their internet accounts and erase
all their data on the network so that the aggressor cannot contact them again.
If the cyberbully is a peer of the victim, seek out adults in your environment to help you.
help to resolve it (teachers from the school, parents of the aggressor's relatives, etc.)
Emphasizing this last point, we could find possible explanations for the
increase in the prevalence of CYBERBULLYING the following aspects
HARASSER.
LARGEST NUMBER OF VICTIMS (SINCE THE AGGRESSOR DOES NOT NEED TO EVEN KNOW THEIR
VICTIM TO START CYBERBULLYING) AND GREATER SENSE OF IMPUNITY (ALREADY
THAT THEY CAN KEEP THEIR ANONYMOUSNESS BEHIND THE SCREEN.
INCREASE OF SOCIAL NETWORKS, EASE OF COMMUNICATING WITH PEOPLE, CREATING
GROUPS,CONTACTS
ETC.
The percentage of students affected by CYBERBULLYING is very high, whether from
moderate (less than once a week) or severe more than once a week
week.
In the United States and Asia is where the highest prevalences are recorded (55%), Europe and
Canada (25%).
Between 20% and 50% claim to have been victims of CYBERBULLYING, although among them
only between 2% and 7% severe.
The more ICT is used, the greater the risk of being both an aggressor and
victim of CYBERBULLYING.