Web Hosting Articles

  Home arrow Web Hosting Articles arrow Page 2 - Cyber Woolly Bully
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING ARTICLES

Cyber Woolly Bully
By: Michael Lowry
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 4
    2007-12-19

    Table of Contents:
  • Cyber Woolly Bully
  • What Is It?
  • Examples
  • What Can Be Done?

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement

    Cyber Woolly Bully - What Is It?


    (Page 2 of 4 )

    If you read closely in the report from the Journal of Adolescent Health, you'll see that it's hard to put cyber-bullying in the same class as traditional bullying. They say one of the main qualities of a bullying experience is the “repetition” of aggressive behavior. But with the victim's ability to avoid or return to the electronic attack as often as he/she wants, it seems as though the victim might be willing it on themselves. But either way, the victim does experience some kind of trauma via external torment, and I think that puts them both in the same category.

    The online world simply has several inherent features that allow people to misuse it for errant purposes. The main advantage is something I've already mentioned, anonymity. A traditional bully is usually thought of as someone bigger, stronger, or older than the victim. This doesn't have to be the case with cyber-bullies. It can be anyone imaginable, even a seven year old girl...that happened to me once. Oh, the humiliation!

    The Internet also has little to no oversight, especially over private messages between users, although most chat forums do have moderators. Email and any kind of text messaging are pretty much like the Wild West. Add the fact that a lot of parents are less technically inclined than their kids and you have a situation where the victim has to tell their parents, which can be a difficult process.

    Another factor that can partially be blamed on the victims is society's metamorphosis into technical dependence. People, kids especially, can't do anything anymore without their cell phones, and they constantly check email and update their MySpace, making it hard for them to avoid cyber-bullying.

    The bullies themselves will never stop in their quest to find victims. They of course get personal satisfaction from provoking others and watching them resort to destructive behavior, because they need some way to quell their own inner distaste. They thirst for the victim's reaction because it gives them a feeling of control. And they are almost impossible to deal with.

    In the next section I will give some hilarious examples, so be on the lookout for something that may look familiar.

    More Web Hosting Articles Articles
    More By Michael Lowry

    WEB HOSTING ARTICLES ARTICLES

    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap