Forestalling Cyber Bullying and Online Harassment

Forestalling Cyber Bullying and Online Harassment

DOI: 10.4018/979-8-3693-3406-5.ch010
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cyberbullying and online harassment have become pervasive issues, disproportionately affecting various demographics, with women being particularly vulnerable. This poses significant threats to individuals' well-being, mental health, and overall safety in the digital realm. AI tools offer a multifaceted approach with the use of advanced sentiment analysis algorithms, user behaviour analysis, and content moderation that can scan and interpret online content, identifying instances of harassment, explicit language, or threatening behavior with the help of natural language processing (NLP) to enable understand the content in a more nuanced manner.
Chapter Preview
Top

Introduction

Cyber Bullying

Cyber bullying(Chandrasekaran et al., 2022) is a deliberate and persistent use of digital technologies in virtual space transcending the physical borders and seeping into the fabric of everyday life to harass, threaten or intimidate people, providing a veil of anonymity that emboldens perpetrators, allowing them to target victims with a sense of detachment by means of hurtful messages, derogatory comments and malicious spread of rumors and the creation of fake profiles. The immense nature of cyber bullying has its widespread presence through public and private components like social media, internet streaming and many more. The widespread use of technology becoming a commonplace and affecting people from all walks of life has a magnifying effect and has become a ubiquitous problem from both personal and professional fronts making the omnipresent reach of internet a difficulty in combatting online abuse. Figure 1 represents the various forms of cyber bullying.

Forms of Cyber Bullying

  • Online Harassment: A prevalent form of cyberbullying in digital spaces driven by the anonymity and separation that encourage destructive behavior which includes derogatory comments, threats, hate speech and dissemination of misinformation causing severe consequences on victims and digital community (Chahal et al., 2019). It severe immense psychological and emotional effects on victims, leading to anxiety, depression, and a sense of helplessness, often condemning free speech, deterring individuals from expressing their opinions and stifling diversity in digital spaces. As it becomes more pervasive, trust in digital communities erodes, making individuals hesitate to engage in meaningful conversations or participate in online discussions due to fear of potential harassment.

  • Revenge Porn: A form of digital exploitation, is a rising concern in the digital era amplifying the scope and scale which involves sharing, distributing, or publishing intimate images or videos without explicit consent, often by disgruntled ex-partners or individuals seeking retaliation or control over others making it more pervasive issue with profound implications for personal privacy. The ease with which intimate content can be captured and disseminated, coupled with the accessibility of social media, messaging apps and online forums contributes to the proliferation under the veil of anonymity. In the digital era, it is a big problem as it violates people's privacy and have dire repercussions. It draws attention to the necessity of a comprehensive strategy to prevent cyber exploitation while incorporating technological advancements, social and cultural changes, strong support networks, and legal measures.

Figure 1.

Forms of cyber bullying

979-8-3693-3406-5.ch010.f01
  • Doxxing: Hacker culture refers to the act of publishing private or proprietary information without consent, often used as a form of technology-facilitated violence (TFV) against specific groups or forums. Motivations include extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxing (Anderson & Wood, 2021) in the public interest. Methods include social engineering, manipulating individuals, phishing schemes, accessing public records, hacking, and cross-platform tracking. These methods aim to gather information, access private information, and exploit vulnerabilities in the public domain.

  • Impersonation: Online impersonation, identity theft, or catfishing is a growing issue in the digital era. It involves assuming a false identity to trick, mislead, or hurt others through social media, chat applications, and online forums(Campobasso & Allodi, 2020). Cybercrime includes phishing assaults, email spoofing, and fake accounts. Fake accounts use fake personalities, biographical information, and pilfered photos. Email spoofing aims to trick users into disclosing personal information. Phishing attacks involve fraudsters sending false communications to trick users into downloading dangerous software or providing login credentials. AI-generated “deepfakes” can also be used to manipulate cues. Coordinated action from law enforcement, IT companies, and the public is needed to mitigate the effects of impersonation and create a safer digital environment.

  • Sexual harassment: The MeToo movement and Everyday Sexism project have highlighted the issue of sexual harassment, with the UK seeing high-profile cases of harassment in university students. This highlights the failure of the 'right to everyday life' for women and other feminized and gender diverse subjects. To address this issue, society must take collective action through legal, technological, and cultural initiatives, tightening legal protections, reporting systems, encouraging digital literacy, and cultivating an empathetic culture (Boyer, 2022). This will create digital spaces where people of all genders can express themselves freely and interact without fear of harassment.

  • Cyber Stalking: A form of harassment that involves the persistent and undesired pursuit of an individual through digital means, causing fear, anxiety, and distress, manifested through various online channels, such as emails, social media platforms, messaging applications, and other digital communication methods leveraging the obscurity provided by the internet to engage in relentless monitoring and pursuit of their targets. The growing issue requires a multifaceted approach involving legal, technological, and societal interventions to strengthen, severe penalties for offenders and establish robust reporting mechanisms to swiftly address cyber stalking incidents. Technological safeguards, such as advanced algorithms for detecting stalking behavior and privacy settings, are crucial for preventing and combating cyber stalking.

Complete Chapter List

Search this Book:
Reset