Cyber Bullying

Cyber Bullying

ISBN13: 9781522574927|ISBN10: 1522574921|EISBN13: 9781522574934
DOI: 10.4018/978-1-5225-7492-7.ch010
Cite Chapter Cite Chapter

MLA

Oravec, Jo Ann. "Cyber Bullying." Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics, edited by Mehdi Khosrow-Pour, D.B.A., IGI Global, 2019, pp. 105-114. https://doi.org/10.4018/978-1-5225-7492-7.ch010

APA

Oravec, J. A. (2019). Cyber Bullying. In M. Khosrow-Pour, D.B.A. (Ed.), Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (pp. 105-114). IGI Global. https://doi.org/10.4018/978-1-5225-7492-7.ch010

Chicago

Oravec, Jo Ann. "Cyber Bullying." In Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics, edited by Mehdi Khosrow-Pour, D.B.A., 105-114. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7492-7.ch010

Export Reference

Mendeley
Favorite

Abstract

“Cyberbullying” comprises a wide spectrum of behaviors that have negative and often devastating impacts upon their targets (or “victims”). This chapter is intended to analyze research trends on cyberbullying as well as related concerns involving online harassment, online reputational damage, and cyberstalking. Its focuses are as follows: (1) analyze the conceptual work and research that have emerged on the technological and social aspects of the issues, with an emphasis on social media scenarios; (2) present insights as to how cyberbullying and reputational damage can best be mitigated, given current mental health insights and technological know-how; and (3) discuss why cyberbullying is of continuing importance to business, government, non-profit, and educational audiences. The chapter includes reflections about the moral and personal dimensions of cyberbullying. Cyberbullies can often combine anonymous interactions with personally identifiable ones to make it appear that more than one individual is participating, potentially intensifying the negative social impacts involved.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.