SCHOOL OF THE THAILAND
College of Mass Conversation
BULLYING SHOULD GO TWEETING: AN ASSESSMENT ON THE TOP FEATURES OF TWITTER WHICH MAKE IT A VENUE FOR WEB BULLIES
SOBRE GUZMAN, JORDAN CHARLES
MARQUEZ, NARILYN HAPPINESS
Submitted to: Prof. Aleth Gayosa
A. BACKGROUND IN THE STUDY
Intimidation is defined as a specific type of repeated aggression where the behavior is meant to harm or disturb and there is an imbalance of electric power (Nansel, et. al., 2001, as offered in Silvestre & Halterman 2007) or maybe a вЂвЂvictimвЂ“perpetrator'' dimension (Einarsen and Skogstad, 1996; Keashly, 1998, as cited in LaVan& Martin, 2008) and which can be unwanted by the victim, which may be done deliberately, or subconsciously, but evidently cause humiliation, offense, relax, may impact job performance, and/or trigger an unpleasant working environment (Einarsen, 1999, as mentioned in Heames& Harvey, 2006).
Most of the time, lovato can be grouped into 3: physical, mental, and verbal bullying. Physical bullying generally involves manners that intentionally inflict bodily harm like hitting, pushing, punching, and kicking (Wilson, 2011). The second type, mental bullying, identifies the situations where a person is made to feel isolated and ridiculed largely through mechanism such as bullying, shouting, mocking and neglecting; this is an instance where the bullying does not actually have an actual component and therefore it is sometimes harder to spot or fix (Anonymous, 2006). The last type, verbal intimidation, is name-calling, making unpleasant remarks, or joking about a person's religious beliefs, gender, racial, socioeconomic status, or the approach they look (Time for Tolerance, n. d. ).
Yet , because of the fast development of technology, a new kind of bullying offers risen, and it is in the form of cyber bullying. Considered as an extension of traditional bullying, this kind of intimidation is also intense and is commonly repetitive (Agatston, n. d. ). There may be still electricity imbalance, although cyber bullying's has more to do with the ability to reach such a large audience and humiliate, cause fear, or virtually ruin the reputation of another having a single just click of a mouse button or the give button on the mobile phone, in contrast to traditional lovato where the power imbalance may involve students who are older, larger, stronger, or even more popular finding on a junior who is young, weaker, or perhaps who has fewer friends (Agatston, n. d. ). Internet bullying can be achieved through email, instant messaging (IMing), chat room exchanges, Web site posts, or digital messages or images send out to a mobile phone or personal digital assistant (Kowalski ainsi que al. 08, as mentioned in Olweus, 2011). One of the used way of cyber intimidation is through social networking sites. Actually 32% of online young adults have experienced a few forms of on-line harassment like having received intimidating messages, becoming victims of spread rumors, and staying embarrassed as a result of someone publishing a picture of these online devoid of permission. Among the social networking sites this is a possible floor for this offense is Twitter. As NewsBlaze LLC (n. d. ) explains that, twitter can be described as social networking and microblogging service that allows you answer the question, " Precisely what are you carrying out? " by sending brief text messages 140 characters in length, called " tweets", to your friends, or perhaps " fans. " It probably is existent in 2006 and begun by Evan Williams, Jack port Dorsey, and Biz Natural stone. Since then, it may be a hit globally.
Cyber bullying acts can be linked to the features of the social networking site. Besides, there must be a reason on how come cyber bullies choose Myspace as the venue for people acts. The most basic of which is the " tweetвЂќ. It is the most fundamental unit of the internet site, these are revisions sent and read by Twitter users. Its 140-character allowable also makes it a type of " microbloggingвЂќ. Just like SMS phones, it also has the " messageвЂќ characteristic. The " mentionвЂќ feature allows you to...
Bibliography: Anonymous. (2006). Emotional intimidation. www.typesofbullying.com. Recovered September 13, 2011, by http://www.typesofbullying.com/emotional_bullying/emotional_bullying.html
Berarducci, L. (2009) Traditional intimidation victimization and new cyberbullying behaviors. Gathered September twenty-five, 2011 from http://etd.ohiolink.edu/send-pdf.cgi/Berarducci%20Lindsay%20R.pdf?dayton1239916629
Brodkin, J. (2010). Facebook or twitter: struggle for people intensifies because facebook fends offprivacy complaints. Network Community. Retrieved Sept. 2010 28, 2011, from Proquest database
Dark brown, K., Knutson, M., & Cassidy, Watts
Correa, N. (2011, August). Bullying connected to domestic physical violence, alcohol, medicines. Clinical Psychiatry News, 39. 8. Retrieved September 18, 2011, from Academic OneFile database
Discipline, E. (n. d. ). What is school bullying?. University Angels. Retrieved September 18, 2011, via http://schoolangels.com.au/bm/resources/bullying/what-is-school-bullying-100508.shtml
Jost, J. Sidanius, J. (2004). Political Mindset: Key Blood pressure measurements. 330
Li, Q. (2007). Bullying inside the new play ground: research into cyberbullying and cyber victimization. Australasian Diary of Educational Technology, twenty-three. Retrieved September 18, 2011, from http://www.ascilite.org.au/ajet/ajet23/li.html
Montes, G. & Halterman, J. (2007). Bullying amongst children with autism and the influence of comorbidity with adhd: a population-based study. Ambulatory Pediatrics, 7. Gathered September sixteen, 2011, by ProQuest database
Patchin, M. W. & Hinduja, H. (2006). В Bullies move further than the schoolyard: a preliminary take a look at cyberbullying. Junior Violence and Juvenile Rights, 4(2), 148-169.
Patricia, A. (n. m. ). Cyber bullying: what's the big package?. PureSight. Recovered September 17,
Olweus. (2011). What is Web Bullying?. Olweus Bullying Elimination Program. Recovered
September seventeen, 2011, fromhttp://www.olweus.org/public/cyber_bullying.page
Sanders, C., Phye, G. (2004). Intimidation: Implications intended for the Class room. 43-46.
Scroeder, S. (2009). Twitter's reliability meltdown. Mashable. Retrieved September 19, 2011,
Stagg, T., Sheridan, D., Jones, Ur., & Speroni, K. (2007). Evaluation of your workplace lovato
cognitive rehearsal program in a hospital placing
Nursing, 40. Retrieved Sept 16, 2011, from ProQuest database
Time for Tolerance. (n. m. )Types of bullying. Time for Tolerance. Recovered September 15, 2011,
Wilson, T. (2011). Classic bullying. Slide Share. Gathered September 13, 2011, from
Wolfe, D. (2011). Security watch. American Banker. Retrieved Sept 27, 2011, from
Academic OneFile data source
Ybarra, M. L. & Mitchell, K. J. (2004). Online aggressor/targets, aggressors, and targets: a
comparison of connected youth features