The increase in the world of technology comes with a horrific price. According to a non-profit organization for social revision, “eighty-one percent of adolescents think bullying online is easier to get away with than bullying in person.” (11 Facts About Cyber Bullying). Universally, there is controversy involving stronger laws for cyber bullying. Unfortunately, many individuals live by the motto “Sticks and stones may break my bones, but words will never hurt me.” People also believe that parents do not teach their children constructive criticism from hate. If cyber bullying was just constructive criticism, then it would not lead to death. Many people fail to realize how abusive comments can hurt a human being. With the increase in technology, cyber bullying is becoming more common. The government must create stronger laws against online bullying to prevent suicide and depression among teens.
To start off, what is cyber bullying? Cyber bullying is bullying that takes place over the internet or bullying that takes place using technology. A recent survey on cyber bullying found that “one in six parents reported having a child bullied on social media.” (American Osteopathic Association, 2011) Cyber bullies harass innocent individuals, usually on social media. As cyber bullying progresses, the victim’s self-esteem plummets. If the harassment continues, depression is more likely to occur. Yes, people have freedom of speech, but when rude comments begin to harm other individuals, you are using your freedom wrong. This is no longer freedom of speech, it is a weapon. Cyber bullying victims have the ability to experience more feelings of depression than other groups of bullying victims since their harasser can remain a...
... middle of paper ...
... Drug Rehab Treatment Centers. N.p., n.d. Web. 12 Jan. 2014.
"Father of Girl Arrested in Cyberbullying Death of 12-year-old Talks to Channel 9." Father of Girl Arrested in Cyberbullying Death of 12-year-old... N.p., n.d. Web. 12 Jan. 2014.
LePage, Joe. "Mom circulates petition to create anti-cyberbullying law in Indiana." WXIN-TV (Seattle, WA) 17 May 2012: Newspaper Source Plus. Web. 12 Jan. 2014.
PR, Newswire. "American Osteopathic Association Calls for Public Education on Cyberbullying." PR Newswire US 16 July 2011: Regional Business News. Web. 14 Jan. 2014.
"What Is Cyberbullying." Home. N.p., n.d. Web. 14 Jan. 2014.
"Web Users Shouldn't Have The Right To Remain Anonymous In Cyberspace." Engineering & Technology (17509637) 8.9 (2013): 33. Academic Search Premier. Web. 14 Jan. 2014.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Everyday millions of kids are bullied online; they are teased and called names that most people wouldn’t have the courage to say face to face. Cyber bullying is a very big deal, especially in our country considering how advanced we are in technology. Kids worldwide get cyber bullied every day, and can never escape it; it may affect you in ways unspeakable and actually is quite frightening. Cyber bullying can be hard to deal with, but it is even harder to prevent. “The use of electronic communication to bully a person typically by sending messages of an intimidating or threatening nature” (What is Cyber Bullying).... [tags: bullying, technology, deal, prevent]
535 words (1.5 pages)
- As the use of technology has increased drastically over the last two decades, so has our need for technology. Technology has become a part about our everyday life and we can find technology being used nearly everywhere. Most systems in today’s countries and societies rely on technological infrastructure; these systems include transport systems, factory systems, power plant systems and water sanitation systems. This brings on the question of to what extent have governments developed their cyber security departments, what evidence is there of governmental involvement in malware attacks and why should governments be concerned about cyber security.... [tags: Threats, Government, Technology]
1888 words (5.4 pages)
- In Greek mythology, the Theogony recalls the lineage of Greek deities. Part of the story contains information about a monster named Orthrus. The beast is a two headed dog that was responsible for guarding the island. However, Orthrus was eventually slaughtered by the epic hero, Heracles. Obviously, a two headed, monster dog has potential to bring about catastrophe. But trained in the correct way, Orthrus could have been a valiant watchdog and become an honorable hero in Greek legend. Technology in the present is very much like Orthrus in that progress and advances can lead to a positive or negative impact on the world.... [tags: Internet, technology, cyberspace, abuse, Orthus]
1532 words (4.4 pages)
- ... For example, over the Thanksgiving holiday season in 2013, Target, one of the biggest retailing company in the U.S. was found to be hacked. Over 360 million email accounts and 1.25 billion email addresses without passwords along with 40 million debit card and credit card information were stolen, also affecting about 500 other companies and organizations such as Google, Microsoft, and Yahoo. This massive size of cyber-attack alarmed the relaxed security system. Another big cyber-attack was on Adobe, an American multinational computer software company.... [tags: industrialization, advancements, security]
725 words (2.1 pages)
- The rise in technology has influenced our lives with the use of social networking sites and electronic devices predominant with today’s youth. What many adults are unaware of is bullying exists in many forms and is more common in the cyber world. In 2012, CBC news reporter Joan Leishman , aired “Cyber-bullying,” she describes a story about a student named David Knight’s unbearable life entering the Internet. Later in 2014, Rachel Simmons, a former Rhodes Scholar and the founding director of the Girls Leadership Institute, wrote an article titled “Cyberbullying Is a Growing Problem.” Simmons article addressed the impact of cyber bullying in the 21st century and actions school offici... [tags: Why we must stop cyberbullying]
1414 words (4 pages)
- Technology has impacted us all, whether socially, mentally or physically. We now depend on this technologic improvement to run our lives for us. But we are blinded by the positive things it brings us that we do not take notice of the hazardous or negative effects it also brings to our lives or the people around us. We must always be aware of the harmful effects of the overuse of electronics, technology pretty much runs our lives these days and has been for years without us taking notice. In our homes, our work places we have computers, phones, and all these different kinds of gadgets helping us get through the day.... [tags: Mobile phone, Internet, Technology]
1571 words (4.5 pages)
- Subject: Cyber Security and Surveillance: Bulk Data/Metadata Summary: The recent leaks, disclosures, and actions of government agencies – namely the National Security Administration (NSA) – have caught the public’s attention and focused it on the protection of privacy and civil liberties. The NSA participates in a bulk data collection program that has accumulated phone data over the past five years in order to track persons suspected of threat to the nation. This collection of mass data without issued warrants violates the Fourth Amendment and brings the potential abuses with this program into view.... [tags: nsa, collection, government]
848 words (2.4 pages)
- Information Technology has the potential to change societal structure and processes similar in scale to that of both the Agricultural Revolution and the Industrial Revolution. On this basis governments should ensure provision of Information Technology to all members of society as a matter of urgency. Discuss. Today, we are experiencing a technological revolution. There is nothing silent or stealthy about it – we are aware of new technology arriving every year. In-your-face advertising and attractive shop displays tempt buyers at every turn, and this year’s new model is next year’s dinosaur.... [tags: IT Technology Society Effect]
1099 words (3.1 pages)
Proposal in Criminal Protection of the Electronic Contracts in Saudi Arabia System A comparative Analytic Study
- Proposal in Criminal protection of the electronic contracts in Saudi Arabia System A comparative analytic study Presented by Introduction The use of modern technology in the Internet enable rapid information exchange among people, which never experienced by human before. This notion encouraged many individuals prefer to end their trade contracts and legal actions through online network trade. Although, electronic commerce mainly depend on the computer system and the use of this technique showed many problems in the scientific and legal levels of network transactions.... [tags: Cyber Crime]
2235 words (6.4 pages)
- The World of Writing According to Email The world is an ever changing place, and with the advancement of cyber culture technology, many times we are faced with new ideas and ways of life that we never dreamed would be possible. With these changes, we are also faced with the making personal decisions of whether we believe these new ways have helped or harmed the world of writing. I remember the moment e-mail entered my life. It was a week after my family had dropped my older brother, the first born, off to his freshman year at Bowling Green State University.... [tags: Internet Technology e-mail Essays]
1753 words (5 pages)