Argumentative Essay - Cyberbullying Without Fear

Paper Type:  Essay
Pages:  7
Wordcount:  1771 Words
Date:  2022-09-12
Categories: 

Introduction

Web-based broadcast through technological connectivity on social media platforms has brought about some security concerns. The democratic ability to convey and publicize content on social media networks has in recent age compromised consumer safety from cyberbullying (Scott and Jacka 6). The democratization of content has attributed to fearless insult, bullying, and threatening of others without any concrete consequences (Stevenson and Waite 821). Therefore, this resume seeks to establish the justification for how social media users perpetrate different forms of cyberbullying without the fear of punishments from relevant authorities. It will show the different forms of social media democratization of content and anonymous identity among other factors that contribute to insults, bullying and or threatening others without being prosecuted or brought to book against such social vices and security threats.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

The democratizing nature of the social media sites gives users unique characteristics and rights to control information or content they sent or disseminate. Consumers and publishers enjoy the free will to distribute their perceptions, believes and ideologies whether abusive or not without the fear of punishment because of the account holder's secrecy features offered by social media sites. Global connectivity through social media has reached a wide scope all over the world. The high level of connectivity is attributed to the sophistication of the ability to access social media sites through any internet enabled gadget. Again, networking in the modern era through social media sites is a global affair because a great majority can access the internet from mobile phones among other gadgets widening the scope of social media connectivity (Brunty and Helenek 11 - 14). The accessibility ease has attributed to every age group to actively participate in social media forums increases the popularity of platform engagement. Furthermore, social media sites have eased the ability to chat, through sending and receiving photographs, instant messaging, video, document share, as well as conferencing. This popularity and open forum in the ability to send content from the publisher to the consumer directly have come in handy with numerous pros and cons because of the authenticity of content copyrights among other security and bullying concerns. In the different conferencing ad content share places consumers at the risk of insult, threats, or other forms of cyberbullying.

The nature of accessibility to different social media sites networks places consumers at the risk of different forms of bullies with the perpetrators conducting various insult, privacy violation, threatening, and bullying without fear of punishment because of the freedom of speech, or inaccuracy on personal identity in some social media accounts. Cyberbullies have no limited access to social media sites hence they open many false accounts without their real names or identity making them insult, bully, and threaten others with a surely they cannot get caught or held responsible for the crimes committed. Lack of information verification system when opening different social media accounts have increased the risks of cyberbullying among other social media related crimes without any fear of being punished (Graham, Dutton, and Castells 352). In this sense creation of false accounts with false information makes the majority of social media sites flooded with anonymous insulters, fraudsters, and bullies who are confident that even when they perpetrate criminal or insulting acts towards other consumers whether individuals or a group of people because the accounts lack their personal information.

Social media features to incorporate people into groups without their consent exposes them to insults, bullies or threats. The ability to add someone in groups for forums and other discussions only needs knowing their usernames and being connected to them. This strategy leads to bullying especially for teenagers that at times lead to suicide. In the modern age, many children have access to mobile phones which are internet enabled exposing them to social media sites that may lead to insults, bullies or threats where the perpetrators are not reported for fear of victimization by the others leading to the crimes not apprehended (Goldman 415). Again, some predatory, imposters, or pervert adults may pose as peers in social media sites to organize groups that threaten the safety and wellbeing of the young people exposed in such groups leading to unreported crimes of bullying, insult, or threats which goes unpunished for fear of exposing them or unknown identity (Manassis 103). Therefore, due to interactive forum engagement, many young people are exposed to insults, threats, and bullying incidences where the perpetrators do not fear any form of punishment to go their way because the peers are scared to expose the acts of bullying or the identity used in social media sites are fake with untrue personal information.

In the United States, the Department of Education postulates that bullying in schools is attributed to students and parents defamatory of personal information publically in social media sites which many schools have opened for interactive connectivity. The opening and joining of these groups is free increasing their availability as well as them lacking authentic joining procedure where one user is limited to only one account due to access personal information provided. This security weakness allows users to have multiple accounts with different false information making them publicize insults, threats and bullying content without the fear of punishment (1). At other instances, students are able to publically publish defamatory information about their peers or teachers easily in the common school's social media sites forums. Further, the same trend happens with adults especially when employees in the same company create social media groups without any limitation of false accounts leading to insults, threats or bullies where conflict exists. Lack of satisfactory information to link the conflicting parties with the social media threats, bullies and or insults gives the perpetrator at the liberty from fear of being punished (Washington 21-25).

A majority of social media sites are run and owned by private institutions, for instance, Facebook is a private entity. This characteristic of many social media sites limits the chance of authorities conducting inspections for content published for a public audience. Although upon joining these social media sites users are promised that their privacy will be protected, practically this protection does not take effect. Again, the privacy policies used by social media sites only allow the target audience to receive the information as deliberated by the publisher. However, the privacy policy instigates publishing of threats, insults or cases of bullying without fear of punishment because only the addressed individuals can access the information where in most cases the victims are pushed to suicide silently without sharing their ordeal with anyone. Without any inspection of regulation of users' security from any law enforcement agents making the perpetrators of threats, insults or bullies have no fear of facing punishment for their crimes (Tella and Issa 297).

Social media sites management is an effective method of protecting ones from insult, bullying or threatening. There are six main strategies when dealing with social media sites. Global incorporation of technological and international law enforcement agents requires strategic management in the most suitable and appropriate customer friendly manner. This ensures the company to pace up with other similar global companies. Strategizing an effective customer Social media sites award system is one of the basic processes that any international law enforcement agents and technological organization need to put in place with concrete management organization. Social media sites management total process include communication, control, approval, close monitory, and data recovery systems that are sequentially procedural in format and execution.

For any global company to offer social media sites facility to its customers, prior organization and planning of the connectivity requirements, security value, as well as authentic joining terms and conditions need to be effected so as to ensure that the republishing period is beneficial to both the publishers and the consumer. Therefore, a company offering social media sites facilitation for its customers should uphold strict measures when implementing publishing management putting into account on the risk and retuning disciplines.

For any social media sites, individual or group accounts to be issued the users and publishers need proper documentation in international trade. This documentation includes the authentic identification documents among other individual identification records to reduce the number of false accounts. These documents are set guideline to ensure that social media sites facility extended to customers are of secure and commercial value to the organization. It enlightens the client of the possible social media sites facility available at a certain group of users under the same bracket with individualized and authentic accounts that lack falsified information. The client application entails the customer's specifications on the social media sites and requirements designating the client's accreditation. Further, the personal identification policy depicts the social media sites accessibility regulations, whilst the authentic consent forms signed by users authorize measures to be effected in case of insults, threats, or bullying. Its, thus, possible with the aid of these documents for an international organization is able to extend Social media sites facilities with effective management to their customers from possible misuse from false publishers.

The first is Social media sites application. Under Social media sites application, the main thing to consider is to determine the company's social media sites. This enables the company to institute a suitable Social media sites limit and realistic publishing terms. This, therefore, implies that each company has to fill a Social media sites application form. Information given enables further analysis to be carried out. The main elements which enable effective Social media sites applications include; company information, bank information, commercial trade information, provisions that may protect one in the event of non-publishing and contract signature. The second strategy includes Social media sites assessment tools. There are several tools that can be used to carry out this assessment. These tools enable a company to determine whether the limit requested is suitable. The tools differ in terms of depth and breadth, the higher the limit requested the broader and deeper is the required analysis. Social media sites agency reports provide deeper and broader information. Therefore, their information is the most reliable and comprehensive. A clearly worded contract is the third strategy under Social media sites management. Such a contract allows a clear identification of the obligations of each party and minimizes the risk of conflict. In addition, reasonable publishing terms are required. This forms the fourth strategy. In order to do this, the company is required to establish publishing terms that are common for one's industry and that one's customer is able to manage.

Moreover, a company is required to update and reevaluate on a regular basis. Regular updating enables the company to ensure that the customer's authenticity has not declined. An update is considered most significant when one's customers want to increase their Social media sites lim...

Cite this page

Argumentative Essay - Cyberbullying Without Fear. (2022, Sep 12). Retrieved from https://midtermguru.com/essays/argumentative-essay-cyberbullying-without-fear

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the midtermguru.com website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience!

24/7 online support

NO plagiarism