Learning about cyberbullying and cyberterrorism this week has felt like a trip back in time to the 9th grade. During that time for me in highschool, social media platforms were just beginning to get popular and people were experimenting. Due to... This resulted in many failed attempts by the school to control these events (silly reenactment plays, workshops, brochures for parents etc). What the school did not realise, was the enormity of this issue.
There are a couple of aspects that make cyberbullying such a difficult form of bullying to a tackle. Originally, people were able to capture and contain bullies fairly quickly because remarks came directly from an identifiable source. However for bullying that is conducted over the internet, it is almost impossible to contain because it is everywhere and anywhere. Cyberbullying is far more intrusive than it’s predecessor because it continues outside of the school yard or workplace, into the privacy of individual’s homes (F Mishna 2009 p. 1224). The other main difference is that cyberbullies are basically anonymous, they ‘hide behind their keyboards’ (F Mishna 2009 p. 1224). This provides them with a sense of security and power that they do not have in reality. However it should be noted that this is a perceived anonymity because there are certain technological methods of uncovering these individuals (F Mishna 2009 p. 1224).
I certainly remember many experiences of cyberbullying in my class, luckily it was never directed towards me and I never published any. Why? Because I don’t have that much hatred or jealousy for anybody!
The other main concern of cyberbullying is that it is, essentially, a lesser form of cyberterrorism. Terrorism is defined as ‘the use of violence and intimidation in the pursuit of political aims’ (Oxford Dictionaries 2014). When combined with cyberspace, it can result in violence against people or property or significant feelings of fear for individuals (Denning 2000).
Learning that fear is one of the qualifying effects of cyberterrorism, it reminded me of the final scene in Sherlock Season 3 (spoiler alert). In this scene the villain, Moriarty, hacks the entire digital television network in Britain to send a brief and scary message ‘Did you miss me?’ (Sherlock 2014). The tone, style and context of the message successfully strikes fear into the viewers. Thus, a perfect example of cyberterrorism.
Moriarty (Sherlock 2012) |
Media philosopher Howard Rheingold identified that virtual communities would bring democracy and equality through the impossibility of face-to-face prejudice when communicating online (Rheingold 2008 p. 03). Whilst there are many examples of the effects of this optimism, nothing can be totally perfect. There are always going to be saints and sinners, in reality, online and in a total hyperreality. Rheingold has the right idea - optimism is the best mindset to spread. Keep up the positivity people!
References
Denning, D. E. 2000. CYBERTERRORISM. [online] Available at: http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html [Accessed: 1 Feb 2014].
Mishna, F., Saini, M. and Solomon, S. 2009. Ongoing and online: Children and youth's perceptions of cyber bullying. Children and Youth Services Review, 31 (12), p. 1222–1228.
Moriarty. 2014. [image online] Available at: http://www.digitalspy.com/british-tv/s129/sherlock/news/a434725/sherlock-moriarty-actor-andrew-scott-rules-out-return.html [Accessed: 1 Feb 2014].
Oxford Dictionaries. 2014. Terrorism: Definition of Terrorism. [online] Available at: http://www.oxforddictionaries.com/us/definition/american_english/terrorism [Accessed: 1 Feb 2014].
Rheingold, H. 2008. Virtual communities - exchanging ideas through computer bulletin boards. Journal of Virtual Worlds Research, 1 Available at: http://jvwr-ojs-utexas.tdl.org/jvwr/index.php/jvwr/article/viewFile/293/247 [Accessed: 13 Nov 2013].Watts, M. (2003). Interlude: A Conversation with Howard Rheingold, Founder of the Well, an Online Community.New Directions For Teaching And Learning, (94), 69-74
Sherlock Holmes. 2012. [DVD] United Kingdom.