What is cyber-bullying and what technologies can be used to carry out cyber-bullying?


Application: Technology and Cyber-Bullying
Research indicates as many as 50% of
U.S. youths are victims of cyber-bullying. The majority of these victims seldom
report the cyber-bullying to parents or law enforcement (Hinduja & Patchin,
2008). While having similar characteristics of traditional face-to-face
bullying, cyber-bullying reaches beyond the playground. Cyber-bullies can enter
into unsuspecting victims homes across the country and the world. Once
cyber-bullies have access to victims, they can proceed to use coercion,
intimidation, harassment, and threats. This can result in short- and long-term
effects on the victims.
For this assignment, examine
technologies used for cyber-bullying and consider effects cyber-bullying might
have on victims. Then evaluate the effectiveness of tactics currently used by
law enforcement to combat cyber-bullying.
Reference: Hinduja,
S., & Patchin, J. W. (2008). Bullying beyond the schoolyard: Preventing
and responding to cyberbullying. Thousand Oaks, CA: Corwin Press.
The Assignment (23 pages)
Provide three examples of technologies and explain how each could
be used in cyber-bullying.
Explain at least two effects that cyber-bullying might have on
Describe at least two tactics that law enforcement might utilize
to address cyber-bullying and explain whether or not each tactic is
Two or three pages with
at least three references….
It is important that you cover all the topics identified in the
assignment. Covering the topic does not mean mentioning the topic BUT
presenting an explanation from the readings.
To get maximum points you need to follow the requirements listed for
thisassignments 1) look at the page limits 2) review and follow APA rules
3) createSUBHEADINGS to identify the key sections you are presenting and
4) Free from typographical and sentence construction errors.
Course Text:Taylor, R.
W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and
digital terrorism. (3rd ed.). Upper Saddle River, NJ: Pearson.
Chapter 8, “Sex
Crimes, Victimization, and Obscenity on the World Wide Web”
Article: Cooley, A. H.
(2011). Guarding against a radical redefinition of liability for Internet
misrepresentation: The United States v. Drew prosecution and the
Computer Fraud and Abuse Act. Journal of Internet Law, 14(8), 1,
Article: Drogin, E.
Y., & Young, K. (2008). Forensic mental health aspects of adolescent
“cyber bullying”: A jurisprudent science perspective. Journal
of Psychiatry & Law, 36(4), 679690.
Article: Gillespie, A.
A. (2006). Cyber-bullying and harassment of teenagers: The legal response.
Journal of Social Welfare & Family Law, 28(2), 123136.
Article: King, A. V.
(2010). Constitutionality of cyberbullying laws: Keeping the online
playground safe for both teens and free speech. Vanderbilt Law Review,
63(3), 845884.
Article: McCarthy, T.,
& Michels, S. (2009, July 2). Lori Drew MySpace suicide hoax
conviction thrown out. ABC News. Retrieved from http://abcnews.go.com/TheLaw/story?id=7977226&page=1
Article: Meredith, J.
P. (2010). Combating cyberbullying: Emphasizing education over
criminalization. Federal Communications Law Journal, 63(1),
Article: Belnap, A.
(2011). Tinker at a breaking point: Why the specter of cyberbullying
cannot excuse impermissible public school regulation of off-campus student
speech. Brigham Young University Law Review, 2011(2), 501533.
Article: Ford, A.
(2009). School liability: Holding middle schools liable for cyber-bullying
despite their implementation of Internet usage contracts. Journal of
Law and Education, 38(3), 535543.
Article: Li, Q.
(2010). Cyberbullying in high schools: A study of students’ behaviors and
beliefs about this new phenomenon. Journal of Aggression, Maltreatment
& Trauma, 19(4), 372392.

Application: Technology and Cyber-Bullying

Don't use plagiarized sources. Get Your Custom Essay on
What is cyber-bullying and what technologies can be used to carry out cyber-bullying?
Just from $13/Page
Order Essay

In the world of advanced technology, cyber-bullying is becoming one of the most pressing issues that parents, educators, and law enforcement agencies are grappling with. According to the research, cyber-bullying has affected a significant number of U.S. youths, many of whom have never reported the incidents to their parents or the authorities (Hinduja & Patchin, 2008). Although similar to traditional bullying, cyber-bullying transcends the schoolyards and can affect children and teenagers in their own homes. The perpetrators of cyber-bullying, often referred to as cyber-bullies, use technology to intimidate, coerce, and harass their victims. The effects of cyber-bullying can be devastating and long-lasting. In this assignment, the use of technology in cyber-bullying will be explored, as well as common tactics used by law enforcement to combat this harmful trend.

One of the most challenging aspects of cyber-bullying is the many technologies that can be used to perpetrate these crimes. In this assignment, students will examine three examples of technologies that are used for cyber-bullying, including social media, text messaging, and email. Students will explore how these technologies can be used to intimidate, harass, and exploit vulnerable individuals.

Additionally, students will consider the short and long-term effects that cyber-bullying can have on its victims. They will discuss at least two effects of cyber-bullying, including emotional distress, depression, anxiety, social isolation, and suicidal ideation. Moreover, students will evaluate the effectiveness of common tactics presently used by law enforcement agencies to address cyber-bullying. They will describe at least two tactics and explain whether or not these tactics are effective in combating this pervasive problem.

To complete this assignment, students will need to reference a minimum of three credible sources and adhere to APA formatting guidelines. By completing this assignment, students will not only delve deeper into the topic of cyber-bullying but also generate informed analyses that can help in addressing this issue.

– Technologies Used for Cyber-bullying
– Effects of Cyber-bullying on Victims
– Tactics Used by Law Enforcement to Combat Cyber-bullying


1. To identify the common technologies used in cyber-bullying.
2. To understand the effects of cyber-bullying on victims.
3. To evaluate the existing tactics used by law enforcement to combat cyber-bullying.

Learning Outcomes:

1. Application: Technology and Cyber-Bullying
– Examine the different technologies used for cyber-bullying and explain how they can be used to harass, intimidate and threaten victims.
– Analyze the effects of cyber-bullying on victims, including short-term and long-term emotional and psychological effects.
– Evaluate the effectiveness of tactics currently used by law enforcement to combat cyber-bullying.

2. Chapter 8: Sex Crimes, Victimization, and Obscenity on the World Wide Web (Digitial Crime and Digital Terrorism)
– Explain the relationship between cyber-bullying and sex crimes on the internet.
– Discuss the legal implications of cyber-bullying and the responsibility of internet service providers.

3. Article: Forensic Mental Health Aspects of Adolescent “Cyber Bullying”: A Jurisprudent Science Perspective
– Understand the psychological factors that contribute to cyber-bullying and the need for a mental health perspective in addressing cyber-bullying.

4. Article: Cyber-bullying and Harassment of Teenagers: The Legal Response
– Discuss the legal responses to cyber-bullying and the challenges in prosecuting cyber-bullying cases.

5. Article: Combating Cyberbullying: Emphasizing Education Over Criminalization
– Discuss the role of education in addressing cyber-bullying and the need to prioritize education over criminalization.

6. Article: Tinker at a Breaking Point: Why the Specter of Cyberbullying Cannot Excuse Impermissible Public School Regulation of Off-Campus Student Speech
– Explain the legal implications of off-campus cyber-bullying and the limitations of regulating speech outside of school grounds.

7. Article: School Liability: Holding Middle Schools Liable for Cyber-bullying
– Discuss the legal implications of school liability in addressing cyber-bullying and the potential impact on schools.

– Introduction
– Technologies Used for Cyber-Bullying
– Effects of Cyber-Bullying on Victims
– Tactics Utilized by Law Enforcement
– Relationship Between Cyber-Bullying and Sex Crimes
– Legal Implications of Cyber-Bullying
– Mental Health Aspects of Cyber-Bullying
– Education vs. Criminalization
– Off-Campus Cyber-Bullying and School Regulation
– School Liability for Cyber-Bullying

Solution 1: Technology-based Solutions to Prevent Cyber-Bullying

Cyber-bullying is a growing concern amongst parents and guardians of school-aged children. With access to many different technology platforms, bullies can harass and intimidate their victims 24/7, making it even harder to escape from the bullying. Here are three technologies that can be used in cyber-bullying and how they can be used.

1. Social media: Social media platforms such as Facebook, Twitter, and Instagram are common avenues for cyber-bullying. Cyber bullies use social media platforms to harass, intimidate and threaten their victims. To combat this, parents can install parental controls on their child’s device and limit the amount of time spent on social media platforms. Also, social media companies can implement algorithms and filters to detect and remove cyber-bullying comments and posts.

2. Chat applications: Chat applications such as WhatsApp, Messenger, and Snapchat have features that allow users to send texts, photos and videos that are deleted after a short period. Cyber-bullies use this feature to send abusive messages, photos or videos, knowing that they will be deleted soon after the message is sent. Parents can monitor their child’s chat application usage or disable these features altogether. Chat applications can also implement algorithms and filters to detect and remove abusive messages.

3. Anonymous messaging applications: Anonymous messaging applications such as Sarahah, Ask.fm, and Omegle allow users to send messages anonymously. Cyber-bullies use these applications to send hateful and harmful messages without the fear of being caught. These applications can be banned or blocked by parents or guardians to avoid their children getting involved in harmful situations.

Solution 2: Law Enforcement Tactics to Address Cyber-Bullying

As the number of cyber-bullying cases increases, it becomes more important to find effective ways to combat the practice. Law enforcement agencies are now more involved in the fight against cyber-bullying. Here are two tactics that law enforcement can use:

1. Education: Law enforcement agencies can educate parents, students and teachers on the effects of cyber-bullying and how to identify and report it. By educating people on the issue, it can become easier to identify and report bullying incidents, reduce the chances of it happening again and help the victims recover.

2. Investigation: Law enforcement agencies can investigate reported cases of cyber-bullying and prosecute bullies. The legal consequences of cyberbullying can be severe, with punishments ranging from fines to imprisonment. Prosecuting bullies serves as a deterrent to others and sends a message that cyber-bullying is not acceptable. However, the efficacy of this method is in question as cyber-bullying incidents that occur outside the jurisdiction of law enforcement are difficult to prosecute.

Suggested Resources/Books:
1. Bullying beyond the schoolyard: Preventing and responding to cyberbullying by Sameer Hinduja and Justin W. Patchin
2. Digital Crime and Digital Terrorism by R.W. Taylor, E.J. Fritsch, and J. Liederbach
3. Journal of Internet Law, 14(8) by Cooley, A.H.
4. Journal of Psychiatry & Law, 36(4) by Ellen Y. Drogin and Kimberly Young
5. Vanderbilt Law Review, 63(3) by Amanda V. King

Similar Asked Questions:
1. What are the effects of cyber-bullying on its victims?
2. What technologies can potentially be used in cyber-bullying?
3. Are law enforcement tactics effective in combating cyber-bullying?
4. Can cyber-bullying lead to long-term effects on its victims?
5. How can parents recognize and prevent cyber-bullying from affecting their children?

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
× How can I help you?