Cyberbullying and Cyberstalking. Pernicious Aspects of Social Media


Book Description

Essay from the year 2018 in the subject Communications - Public Relations, Advertising, Marketing, Social Media, grade: 1,7, Dublin City University, language: English, abstract: This paper discusses some of the most pernicious and dangerous aspects of social media. What can be done to control these? Technology and online communication nowadays play a major role in many aspects of our daily lives. Especially, when it comes to social media companies, including Facebook, Instagram, Twitter, Snapchat, Ask.fm or Kik. Many people, particularly young children, use various social media platforms to communicate with friends or their family, to get inspired, to grow personally, for international business purposes, to develop new relationships or for entertainment purposes. Along with the growth in usage of social media, however, there are increasing concerns over its benefits as well as safety. One of the pernicious concerns of social media is cyberbullying, as well as cyberstalking. Recent studies indicate that in 2009 and 2011 5 - 40 % of young users are victims of a cyberbullying incidents. The fact that many of these incidents end up with tragic suicide, constitutes cyberbullying as one of the most dangerous aspect of social media.




Cyberfeminism and Gender Violence in Social Media


Book Description

Cyberfeminism and Gender Violence in Social Media is a timely and essential book that addresses the increasing violence against women on social media platforms. With the rise of digitalization and the advent of social media, women have been subjected to various forms of violence such as cyberbullying, trolling, and body shaming. This volume compiles research works on the topic of how women fall prey to social networking sites and possible remedial actions to prevent such issues. The book provides an interdisciplinary approach, making it relevant to a wide range of fields such as social science, humanities, technology, and management. It creates awareness among people, especially women, about the prospects of cybersecurity and its impact on their wellness. This book enriches readers about the impact of social media on the general public and how cyber security education can make people more aware of their security and well-being while online. This book is ideal for researchers, academicians, and students who are interested in new and innovative techniques for the safety of people irrespective of their gender. It is a significant contribution to the ongoing conversation on women's rights and violence against them in the digital age.




Predictive Data Security using AI


Book Description

This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides the comparison of different security solutions in terms of experimental results with tables and charts. Besides, the book also provides the future directions for each chapter and novel alternative approaches, wherever applicable. Often the existing literature provides domain-specific knowledge such as the description of security aspects. However, the readers find it difficult to understand how to tackle the application-specific security issues. This book takes one step forward and offers the security issues, current trends, and technologies supported by alternate solutions. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. The book includes contributions from academicians, researchers, security experts, security architectures, and practitioners and provides an in-depth understanding of the mentioned issues.




Sport, Social Media, and Digital Technology


Book Description

This volume brings together a collection of essays from leading global scholars working in diverse areas as sport sociology, sport management, sport media, and sport communication to illustrate how sociological approaches are imperative to enhancing our understanding of sport and social media and digital technology.




Protecting Your Children Online


Book Description

As parents, our main job is to protect our children. These days, protection from includes not only the individuals we can see but, also, the individuals that we cannot see – yet who wish to harm our children. And with the growth of social networking and social media parents are often unaware of their child’s interactions on the internet. Protecting Your Children Online: What You Need to Know About Online Threats to Your Children introduces the crimes that can occur in cyberspace, as well as procedures for reporting and obtaining assistance in the event of victimization. Throughout Kimberly McCabe addresses several types of cyber crimes, ranging from child pornography and solicitation to cyberbullying, cyberstalking, and sexting, giving parents the necessary information they need to protect their children in cyberspace. This book builds on the historical efforts to reduce child abuse in the United States and looks at the limitations of these efforts when attempting to address child abuse in cyberspace. By identifying these different types of cybercrimes against children, and offering the definitions of terms and law enacted to prohibit these crimes, Kimberly McCabe gives possible responses for attempting to end internet crime on a national, international, and personal level. A definite must have for parents who want to be proactive in protecting their child in cyberspace, and those who wish to be better able to protect them from victimization.




Cyberbullying and Online Harms


Book Description

Cyberbullying and Online Harms identifies online harms and their impact on young people, from communities to campuses, exploring current and future interventions to reduce and prevent online harassment and aggression. This important resource brings together eminent international researchers whose work shines a light on social issues such as bullying/cyberbullying, racism, homophobia, hate crime, and social exclusion. The text collates into one volume current knowledge and evidence of cyberbullying and its effect on young people, facilitating action to protect victims, challenge perpetrators and develop policies and practices to change cultures that are discriminatory and divisive. It also provides a space where those who have suffered online harms and who have often been silenced in the past may have a voice in telling their experiences and recounting interventions and policies that helped them to create safer spaces in which to live in their community, study in their educational institutions and socialise with their peer group. This is essential reading for researchers, academics, undergraduates and postgraduates in sociology, psychology, criminology, media and communication studies, as well as practitioners and policymakers in psychology, education, sociology, criminology, psychiatry, counselling and psychotherapy, and anyone concerned with the issue of bullying, cyberbullying and online harms among young people in higher education.




Social Media Investigation for Law Enforcement


Book Description

Social media is becoming an increasingly important—and controversial—investigative source for law enforcement. Social Media Investigation for Law Enforcement provides an overview of the current state of digital forensic investigation of Facebook and other social media networks and the state of the law, touches on hacktivism, and discusses the implications for privacy and other controversial areas. The authors also point to future trends.




How to Deal With Difficult People: A Comprehensive Beginner’s Guide of Simple and Effective Strategies (Discover the Secret to Disarming and Dealing With Difficult People)


Book Description

Empower yourself with the ability to manage the difficult relationships in your life. Difficult people come in all shapes, shades, and sizes. They can be our direct or distant relatives, friends, co-workers, or even strangers. But one thing they all have in common is that they make our lives more problematic and stressful. They are typically the ones who are always angry, always complaining, or always trying to control or micromanage us. In this informative and easy-to-understand book, you will: · Understand the defining characteristics of difficult behavior. · Learn about what causes people to be difficult. · Find out the effects difficult people can have on you. · Discover how to protect your personal space and well-being. · Gain practical tips and strategies for dealing with complicated people in your life. The truth is, if you have always wanted to figure out ways to get along with those difficult people, you're not alone. Most people lack an effective strategy to learn what getting along with those strong personalities really takes. This book provides you with proven strategies to help you understand exactly how different personalities think, and exactly what you need to know to diffuse difficult situations and become known as the person that everyone can get along with!




Online Harassment


Book Description

Online Harassment is one of the most serious problems in social media. To address it requires understanding the forms harassment takes, how it impacts the targets, who harasses, and how technology that stands between users and social media can stop harassers and protect users. The field of Human-Computer Interaction provides a unique set of tools to address this challenge. This book brings together experts in theory, socio-technical systems, network analysis, text analysis, and machine learning to present a broad set of analyses and applications that improve our understanding of the harassment problem and how to address it. This book tackles the problem of harassment by addressing it in three major domains. First, chapters explore how harassment manifests, including extensive analysis of the Gamer Gate incident, stylistic features of different types of harassment, how gender differences affect misogynistic harassment. Then, we look at the results of harassment, including how it drives people offline and the impacts it has on targets. Finally, we address techniques for mitigating harassment, both through automated detection and filtering and interface options that users control. Together, many branches of HCI come together to provide a comprehensive look at the phenomenon of online harassment and to advance the field toward effective human-oriented solutions.




Cyber-Bullying


Book Description

This book looks in depth at the emerging issue of cyber-bullying. In this increasingly digital world cyber-bullying has emerged as an electronic form of bullying that is difficult to monitor or supervise because it often occurs outside the physical school setting and outside school hours on home computers and personal phones. These web-based and mobile technologies are providing young people with what has been described as: ‘an arsenal of weapons for social cruelty’. These emerging issues have created an urgent need for a practical book grounded in comprehensive scholarship that addresses the policy-vacuum and provides practical educational responses to cyber-bullying. Written by one of the few experts on the topic Cyber-Bullying develops guidelines for teachers, head teachers and administrators regarding the extent of their obligations to prevent and reduce cyber-bullying. The book also highlights ways in which schools can network with parents, police, technology providers and community organizations to provide support systems for victims (and perpetrators) of cyber-bullying.