Computer Science, asked by tas11, 11 months ago

what is cyber bullying and cyber stalking?

Answers

Answered by Anonymous
11

Explanation:

Keeping an eye on someone's activity on social media is simply getting insights into one's life without giving anything in return. Cyberstalking is way more serious as it involves nefarious intentions, ranging from false accusations and defamation to sexual harassment and even encouraging others to harass the victim.

mark me Brainlist ❤️

follow me

Answered by riya15955
2

Answer:

Cyberbullying

Our culture and probably most others have historically felt that bullies are bad news, but that being bullied is also a rite of passage. We often think that bullying tends to end with grammar school. Nothing is further from the truth.

As a culture, we tolerate and often reward adult bullies – especially bully managers in the workplace. We celebrate bullies in entertainment as warriors and winners (even as we also celebrate a bully getting his or her comeuppance), and although hazing in schools, the military, and fraternities are getting pushback from the culture, we otherwise do little to eradicate bullying. Our politicians are often famously bullying in nature. Unless there are dead bodies, it seems that we expect people to just put up with it (or fight back).

As harmful and heinous as bullying can be, cyberbullying takes things a step further.

Cyberbullying uses the Internet and other electronic forms of technology to post mean or embarrassing photos, messages, emails, or to make threats. However, the attacker is often anonymous – unknown – and there is no one to fight back against. As a result, the potential cyberbully is often emboldened to create as much havoc with their victim’s life as possible. The potentially viral nature of such posts – that is, the ability for these posts to be replicated widely, quickly, and endlessly – doesn’t happen in a face-to-face encounter.

A typical (non-cyber) bullying event happens at a moment in time and then is over (although another such event may occur). The bullying happens at a location in space – a street corner or the office, perhaps. A bullying is often witnessed, with the victimizer known to everyone present. A cyberbullying incident, on the other hand, can be spread to hundreds of people in seconds and millions of people in fairly short order, can persist for a lengthy period, can be distributed worldwide, and has no one to answer for their action.

As a result, damage from such an incident can recur and echo over and over. Sadistic sorts can take pleasure in repeating and reposting, and even create web sites to encourage their persistence. These sites cause a pile-on effect, with fellow nasty travelers putting in their own often excruciatingly foul insults, reposting the private images, and multiplying the harm. Some may not realize or care about the damage they cause; others delight in it.

Cyberstalking

Cyberstalking is a more specific form of cyberbullying, and like cyberbullying, is much enabled by the anonymity possible via the Internet. It is the use of the Internet and other technology to harrass someone, although some cyberstalking can be secret for a time. While a “traditional” stalker may shadow a victim’s movements, spying on them from hidden areas, or with binoculars or telescopes, the cyberstalker keeps an eye on their target(s) electronically.

Much of our social life is semi-public these days, on social media such as Twitter & FaceBook. The Internet makes it easy for a person to hide his or her identity, make a fake identity, or pose as someone else – as a false friend perhaps – making it simple to spy on a person’s activities via social networking. Like cyberbullying, the ease of anonymity on the Internet may embolden the cyberstalker, thinking (often correctly) that they will not be found out.

We regularly encounter cases where the stalker has managed to research and guess credentials for their victim’s email or other online accounts making it easy to discover the victim’s whereabouts, conversations and correspondence. In some of these cases, the perpetrator will even impersonate the victim, sending faked emails and messages, posting as the victim themseleves, or publishing embarrassing images as if the victim herself were the source of the statements, pictures, or videos.

Similar questions