Cyberbullying: youth's perceptions in a Johannesburg school context (original) (raw)
Related papers
VIOLENCE AGAINST CHILDREN IN CYBERSPACE.docx
Abstract Violence is pervasive, and could cause deep and lasting physical and psychological damage to children. One of the ways in which children could be exposed to violence is through the use of the internet. Aspects of cyber interactions through which children could be exposed to violence are the production, distribution and use of materials depicting child sexual abuse (child pornography); online sexual solicitation, or “grooming”; exposure to illegal and harmful materials; and harassment, including cyber bullying. While acknowledging the various benefits of internet use to children, emphasis should be on maximizing potentials and minimizing risks, thus protecting the best interest of the child. This paper therefore examines the exposure of children to violence through the use of the internet as well as the need for parents, schools, government and all stake holders, through comprehensive education and child protection standards, among other means, to take both protective and preventive measures in order to guarantee the safety of children in cyberspace. Keywords: Violence, children, cyberspace, internet, ICT.
CYBERBULLYING HURTS: THE RISING THREAT TO YOUTH IN THE DIGITAL AGE
Digital Seige, 2021
Cyberbullying refers to the behaviour of inflicting harm upon a certain individual or group by using information or communication technologies. Although it originally became a topic of discussion in Europe and North America, it has now become a worldwide issue. Bullying is not a new phenomenon but 'conventional bullying' is now being replaced by cyberbullying. With the increasing use of the Internet, mobile devices and particularly the spread of social media, the number of individuals vulnerable to cyberbullying is on the rise. In this context, angry or offensive messages, those mocking, teasing, intimidating, acquiring private information by means of fake accounts or attempts to spread such information may all be considered as examples of cyberbullying. While conventional bullying may occur at a certain place or time, cyberbullying emerges anytime and anywhere people may have access to the Internet. Additionally, factors such as cyberbullying's capacity to spread more quickly and simultaneously to a larger number of people, its long-lasting effects and the perpetrator's perception of concealing his/her identity enhance the need for multidimensional scholarly studies on this subject.
The African journal of information and communication, 2015
The pervasive and open nature of the Internet in the everyday lives of South African children has facilitated benefits such as increased collaboration, learning opportunities and access to knowledge (A2K). However, the online environment's increased visibility has at the same time provided new ways for children to bully each other, and the evidence in the available literature suggests that online bullying-"cyberbullying"-may result in more harmful consequences than offline variants of such behaviour. This article provides findings from an online survey of cyberbullying experiences among a sample of high school students aged 15 to 21 years in the city of Cape Town. The survey found clear evidence of cyberbullying, as reported by both victims and perpetrators, and it was found that social networking sites (SNSs) were the online spaces most-used for cyberbullying, followed by short message service (SMS) platforms. Among perpetrators, 19% reported that they cyberbullied once or twice a week and 10% said they cyberbullied every day or almost every day. The survey also uncovered gender differences in the length of time it took for victims of cyberbullying to put the incidents behind them, with more females than males taking a long time (i.e., a few weeks, or a month or two or more) to stop feeling "bothered" by the incident. The authors conclude that the findings show a need for improved efforts, in schools and in student households, towards building learners', parents' and teachers' e-safety awareness and capacity for preventative action.
Electronic aggression among adolescents: An old house with a new facade (or even a number of houses)
2011
The chapter is focused on the problem of electronic aggression (conducted via the Internet or mobilephones) in the context of young people as potential victims and perpetrators of such aggression. The text addresses two main issues: the potential novelty of electronic aggression and its potential distinctive features and the diversity of electronic aggression acts (with a proposal of typology). The first aspect is analyzed through the new model – ABACUS that could be used to compare electronic and traditional aggression. The chapter presents also a typology of electronic aggression based on the victim’s identity and his/her relationship with a young person who is a perpetrator. The presented theories and discussions are illustrated with new data from two Polish projects on students and teachers experiences with electronic aggression.
A child in a web of threats -risky online behaviours of youth as a challenge for education
Education - Relationships - Play, 2020
The aim of the article is to present the complexity of the issues of threats related to the presence of children and young people in cyberspace. The authors attempt to systematize the problem, as well as identify the most dangerous phenomena. They also describe and classify the latest threats, stressing that as a result of the dynamic development of the internet, their catalogue is constantly growing, and thus requires regular updates. An important role in the process of monitoring threats, counteracting them and mitigating the effects should be played by media education, whose importance, although growing in education systems around the world, remains a trivial matter in education.
Journal of Children and Media, 2016
Young people's technology use has increased exponentially over the last few years. To gain a deeper understanding of young peoples' experiences of digital technology and cyber bullying, 4 focus groups were conducted with 29 11-to 15-year-olds recruited from 2 schools. Interpretative phenomenological analysis revealed three themes: Impact of technology, vulnerability, and cyber bullying. Technology was seen as a facilitator and a mechanism for maintaining social interactions. However, participants reported experiencing a conflict between the need to be sociable and the desire to maintain privacy. Cyber bullying was regarded as the actions of an anonymous coward who sought to disrupt social networks and acts should be distinguished from banter.
The internet gang of violence: Trend of cyberbullying on the internet
AIP Conference , 2022
In the era of the internet, which is increasingly fast and growing today, the delivery of information and feedback on that information is very fast. Every second the posts, both statuses, stories and news spread in cyberspace continue to grow. This is none other than because of the very large number of social media support and various content sharing models. Cyberbullying is someone using information and communication technology such as, internet, cellphone, computer, camera, audio/video recording to share SMS, pictures or videos with threats, hoaxes and terror. This activity makes the victim feel embarrassed, stressed or depressed because all their disgrace is published on social media, it is difficult to delete something that has already been posted. This crime continues to grow along with the rapid development of the use of information technology and the internet. This study aims to analyze the phenomenon of cyberbullying among teenagers in Indonesia.
Cyberbullying: a virtual menace
National Coalition against Bullying National …, 2007
School bullying attracted considerable attention worldwide as it became apparent that this widespread behavior was neither innocuous nor stamina-building but harmful and insidious. A considerable and growing body of research has examined the prevalence and consequences of bullying, and has evaluated the effectiveness of various strategies for reducing the behavior.