internet harassment
Recently Published Documents


TOTAL DOCUMENTS

11
(FIVE YEARS 0)

H-INDEX

5
(FIVE YEARS 0)

2020 ◽  
Vol 35 (2) ◽  
pp. 143-159 ◽  
Author(s):  
Heather A. Turner ◽  
Kimberly J. Mitchell ◽  
Lisa M. Jones

Using a nationally representative sample of 791 youth, ages 8–17 at baseline, this study identified patterns over a 2-year period in specific forms of peer victimization and examined differences in the mental health consequences of those patterns. Findings show that, among the victimized, physical assault had relatively high persistence compared to other forms, while physical intimidation and emotional bullying had relatively high rates of desistence. Emotional bullying at T1 was associated with increased risk of T2 Internet harassment and Internet harassment at T1 strongly predicted T2 dating violence. Patterns of victimization over time differed in their relationship with trauma symptoms. Findings emphasized the importance of recency and the distress of new victimization experiences, rather than the chronicity or repetition of victimization. Understanding variations in peer victimization patterns and outcomes over time can help to inform interventions that better target sources of risk across adolescence.


The main characteristics of Internet harassment (cyberbullying) are investigated in the research. The main features of this phenomenon are considered. The analysis of existing types of cyberbullying and their individual characteristics is made. The examples of legislative acts of different countries is concluded that there is deficiency of relevant rules of low. It is emphasized that anyone can become a victim of in the modern world. At the same time a risk of becoming a victim of cyberbullying does not depend on any factors (for example financial position of victim, his or her age, sex, social position etc.). It is noted that communications that are made in cyberspace provide an opportunity for users to choose information they want to make public carefully and in advance. In most cases it contributes to help people show theirs strengths (for example, when communicating in chats). In results there is often false sympathy between network interlocutors and they trust each other. So the idealization of the partner happens and any his or her information is perceived more sensitive than during direct communication. This effect is successfully used during cyberbullying, when first one person inspires the trust of another and then changes communication tactics, becoming faithless and aggressive. It is emphasized that the cyberbullying phenomenon is very underestimated and that`s why it is a serious problem. The brief overview of existing technologies and means of counteracting this phenomenon is made. The comparison of their effectiveness is made. The standards that modern and effective technology of cyberbullying resistance must meet are systematized. There are examples of successful realization of user protection in most popular social network. It is emphasized that for cyberbullying resistance nowadays in most cases the protection technologies of it is to localize undesirable content in terms of the existence of cyberbullying. Based on the results of this research it is confirmed that the cyberbullying will spread further. This is due to the constant increase in the number of users of new network services and online platforms for communication. For effective defense against cyberbullying it is required the introduction of organizational and technical measures. At the end it is proposed the general assessment of further development of cyberbullying and the ways to improve appropriate countermeasures.


Author(s):  
Tammy B. Pham ◽  
Nallammai Muthiah ◽  
Andrew Adesman

Abstract Objective Victims of peer aggression, categorized broadly as face-to-face aggression (FA) and/or cyber-aggression (CA), are themselves at elevated risk for perpetrating aggressive behavior against others. Studies to date have not formally examined whether experiencing multiple forms of FA or CA is associated with even further increased likelihood of aggressive behavior towards others. Methods Data from the 2014 National Survey of Children’s Exposure to Violence III were analyzed for youth aged 10–17. Based on self-report responses regarding past-year experience, two broad victimization categories were defined: FA (verbal/relational aggression and/or physical assault/intimidation and/or property victimization) and CA (Internet harassment and/or cell-phone harassment). Logistic regression adjusting for age, sex and race/ethnicity compared victim sub-groups against corresponding non-victims with respect to self-report of aggressive behaviors towards others. Results The sample (n = 1959) was 51.3% male and 77.5% White; 39.6% reported >1 form of FA and 7.9% reported >1 form of CA. Whereas victims of physical assault/intimidation or property damage were more likely than non-victims to perpetrate aggression [adjusted odds ratio (aOR) = 4.44 and 5.17, respectively), victims of both were strikingly at greatest risk (aOR = 20.29). Similarly, victims of Internet harassment or cell-phone harassment were more likely than non-victims to perpetrate aggression (aORs = 6.18 and 9.40, respectively), while victims of both were even more likely (aOR = 15.32). Students who experienced >1 form of both FA and CA were the most likely to engage in aggressive behaviors (aOR = 38.03). Conclusion Victims of multiple forms of FA or CA are more likely to perpetrate aggression compared to non-victims and those victimized in fewer ways.


2012 ◽  
pp. 960-975
Author(s):  
Yuriko Sasaki ◽  
Jon Hobbs

Internet safety has become a great concern in daily life. This entry provides information about Internet safety in terms of: (1) psychological well-being; (2) online privacy; (3) cyberbullying; and (4) exposure to sexual content. As part of the narrative, the authors discuss problematic Internet use, online communication and psychological factors, breaches of online privacy, privacy concerns, privacy protection behaviors (online privacy), cyberbullying (Internet harassment), online pornography, and sexual offenders. For each topic, the authords identify factors that are related to Internet safety and the potential for harm in online and offline contexts.


PEDIATRICS ◽  
2006 ◽  
Vol 118 (4) ◽  
pp. e1169-e1177 ◽  
Author(s):  
M. L. Ybarra ◽  
K. J. Mitchell ◽  
J. Wolak ◽  
D. Finkelhor

Sign in / Sign up

Export Citation Format

Share Document