Cyberbullying Chapter Summary

1721 Words4 Pages

In Chapter 11 “Cyberbullying, Stereotypes, and Prejudice” of Communication and Prejudice:
Theories, effects, and intervention (2018), the author, Alexis Tan, explains the correlation that more children and teenagers using social media is linked to an increase in bullying directed at vulnerable out-groups due to their differences to the in-group. More specifically, messages used to bully in cyberbullying are expressions of prejudice which are based on negative stereotypes of the out-group (Tan, 2018. p. 201). The Chapter goes on to explain that cyberbullying has harmful consequences which are linked to mental and emotional distress (Tan, 2018. p. 201). Even leading to suicide in some cases where bullying has a severe effect on individuals. …show more content…

180). Pittaro (2007) defines cyberstalking as the use of the internet, email, or other electronic communication devices to create a criminal level of intimidation, harassment, and fear in victims (Pittaro, 2007, p. 180). In this definition, the cyberstalker is one who carries out these acts when targeting a victim. What causes cyberstalking is rage, power, control, anger, and the victim’s actions and inactions (Pittaro, 2007, p. 180). Cyberstalkers use the internet to hide and conceal their identity, known as a veil of anonymity (Pittaro, 2007, p. 180). The majority of cyberstalkers are middle upper-class Caucasian males and many cyberstalkers have a prior criminal record, a history of substance abuse, or a personality disorder (Pittaro, 2007, p. 181). Although, victims of cyberstalking are often complete strangers who were contacted by a cyberstalker through the internet which accounts for about 50% of all cyberstalking incidents (Pittaro, 2007, p. 181). The difference between cyberstalking and regular stalking is the physical contact element between victim and perpetrator (Pittaro, 2007, p. 182). Another difference, is that the geographic proximity between the victim and the perpetrator is closer in regular stalking and much larger in cyberstalking as it can literally happen anywhere (Pittaro, 2007, p. 182). The main method perpetrators of cyberstalking utilize is email over other electronic communication devices and their main motives for cyberstalking are revenge/retaliation (Pittaro, 2007, p. 183). A study done by McFarlane and Bocij (2005) (as cited in Pittaro, 2007, p. 184) found that there are four types of

Open Document