12.07.2015 Views

Detecting the Presence of Cyberbullying Using Computer Software

Detecting the Presence of Cyberbullying Using Computer Software

Detecting the Presence of Cyberbullying Using Computer Software

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Bayzick, <strong>Cyberbullying</strong> 13vii. Denigration (putdowns)Denigration involves “dissing” or gossiping about someone online. Writing vulgar,mean, or untrue rumors about someone to ano<strong>the</strong>r user or posting <strong>the</strong>m to apublic community or chat room or website falls under denigration. The purposeis to harm <strong>the</strong> victim in <strong>the</strong> eyes <strong>of</strong> o<strong>the</strong>rs; not only does <strong>the</strong> victim hear <strong>the</strong>insults, but so does <strong>the</strong> rest <strong>of</strong> <strong>the</strong> community. There are entire websites thatare devoted to denigration, particularly in <strong>the</strong> college setting, such asjuicycampus.com (shut down as <strong>of</strong> February 5, 2009) and collegeacb.com (stillactive). These sites are set up so users can post conversation topics in newthreads and o<strong>the</strong>r users can comment, all anonymously, and <strong>the</strong>y have becomeexcellent sources <strong>of</strong> examples for this project, though <strong>the</strong>y have not yet beenused as primary data [4].viii. OutingOuting is similar to denigration, but requires <strong>the</strong> bully and <strong>the</strong> victim to have aclose personal relationship, ei<strong>the</strong>r online or in-person. It involves posting private,personal or embarrassing information in a public chat room or forum. Thisinformation can include stories heard from <strong>the</strong> victim, or personal informationsuch as passwords, phone numbers, or addresses. Emotionally, this is usuallymore harmful to <strong>the</strong> victim because <strong>the</strong> victim confided information to <strong>the</strong> bullyand <strong>the</strong> bully betrayed that trust. That <strong>the</strong> personal relationship between <strong>the</strong>bully and victim gives credibility to <strong>the</strong> information <strong>the</strong> bully disseminates.Sometimes trickery can be involved; <strong>the</strong> bully pretends <strong>the</strong>y are alone whenhaving a “private” online conversation, when o<strong>the</strong>rs are reading <strong>the</strong> conversationas well, or saying <strong>the</strong> conversation is in confidence, <strong>the</strong>n forwarding or posting all

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!