SlideShare uma empresa Scribd logo
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
324
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN
EDUCATION
Ashwini Manish Brahme 1
, Dr. Shivaji Mundhe2
, Ashwini Chavan3
,
Sunil B Joshi4
, Poonam Sawant5
1
(Assistant Professor, Sinhgad Institute of Management and Computer Application
(SIMCA),Narhe, Pune )
2
(Director, Sinhgad Institute of Management and Computer Application (SIMCA),
Narhe, Pune )
3
(Assistant Professor, Sinhgad Institute of Management and Computer Application
(SIMCA),Narhe, Pune )
4
(Assistant Professor, Sinhgad Institute of Management and Computer Application
(SIMCA),Narhe, Pune )
5
(Assistant Professor, Sinhgad Institute of Management and Computer Application
(SIMCA),Narhe, Pune )
ABSTRACT
Cyberbullying is the use of ICT (Information and Communication Technologies) such
as Internet, mobile etc to give trouble to other by sending the message, email and many more.
In today’s Internet world people send email, create their own website, send text messages,
image via cell phone, do instant messaging, chatting, seek for new friends etc. Unfortunately
there are increasing reports of teenagers and their aggressive behavior and becoming victim
of Cyberbullying. This research paper describes about Cyber crime and Cyber bullying. The
research is intended to find out the Cyber threats in schools, students and community. Cyber
bullying is an emerging concern which is needed to more focus in education and the
teenagers/students.
KEYWORDS: ICT, Cyber Crime, Cyberbullying, Cyber threat, IM
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
& TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 3, May-June (2013), pp. 324-330
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
325
I. INTRODUCTION
Crime is a sociological problem that hasn’t been solved in 4000 years of recorded
history. Cybercrime is just the most recent vehicle of cold war. There was clearly vision (or
luck) when the following statements were made in the 1992 movie “Sneakers”:
• “The world isn’t run by weapons anymore, or energy or money. It’s run by ones and
zeroes, little bits of data. It’s all just electrons.”
• “There’s a war out there, old friend, a world war. And it’s not about who’s got the
most bullets. It’s about who controls the information: ...what we see and hear, how we
work, what we think. It’s all about the information.” — Universal City Studios, Inc
Cyberbullying: Cyberbullying is nothing but the use of ICT (Information and
Communication Technologies) such as Internet, mobile etc to give trouble to other by
sending the message, email and many more. Cyberbullying or Cyber threats material—text or
images—may be posted on personal Web sites or blogs or transmitted via e-mail, discussion
groups, message boards, chat, IM, or cell phones. To add to this we can say that Cyber
threats are either direct threats or “distressing material”—general statements that make it
sound like the writer is emotionally upset and may be considering harming someone else,
harming himself or herself, or committing suicide.
II. LITERATURE REVIEW
1. Cyber Crime & Cyber threat
Cyber crime is an unlawful act where in the computer is either a tool or a target which is used
for creation of Cyber threat and Cyber terrorism as a premeditated use of disruptive activities
or the threat in cyber space, with the intention to further social, ideological, religious,
political or similar objectives, or to intimidate any person in furtherance of such objectives.
The Cyber Criminals may be children and adolescents aged b/w 6-18 years, they may be
organized hackers, may be professional hackers or crackers, discontented employees,
cheaters or even psychic persons.
According to the ENSIA report on Cyber Threat Landscape Analysis of 2012 (The
EU’s cyber security agency ) the top ten threats in socially important technology areas such
as mobile, social media, critical infrastructure, cloud, and big data are Drive-by exploits
(malicious code injections that exploit web browser vulnerabilities), Worms/Trojans, Code
injection attacks, Exploit kits (ready to use software packages to automate cybercrime),
Botnets (hijacked computers that are remotely controlled), (Distributed) Denial of Service
attacks (DDoS/DoS), Phishing (fraud mails and websites), Compromising confidential
information (data breaches), Rogueware/ scareware and Spam.
2. Cyberbullying
Author Belsey(2006) highlighted that Cyberbullying has on normal school functioning,
educators, parents, policy makers, and researchers are quickly looking for the best way to
deal with this newest form of harassment.
According to the author Beran, T., & Li, Q. (2005) of Cyber-harassment: A study of a new
method for an old behavior in the Journal of Educational Computing Research, 32(3), 265-
277 described that the face to face bullying and Cyberbullying. Little research has been
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
326
performed that has adequately examined the relationship between bullying at school and
Cyberbullying, so its similarity to traditional bullying remains relatively unknown.
Hinduja and Patchin (2008) postulate that one main difference between the two forms of
harassment is that where physical power is an essential component of traditional bullying,
computer proficiency alone is enough to empower one to commit such acts online.
Educators Guide to Cyberbullying and Cyber threats – Nancy Willard, M.S.J.D.
April 2005- 2007 (Parent Guide to Cyberbullying and Cyber threats), this article discuss
about the types of cyber bullying and their impact on students and teenagers and legal issues
which should be considered with this. This article elaborates the problem that it is be
difficult to tell which type of threat will be there when school officials or law enforcement
are first appraised of an online threat.
In case of Cyberbullying may be it is in school or off school various things will occur
such as the student who is victimized at school is also being bullied online. But other times,
the person who is victimized at school becomes a cyberbully and retaliates online. Still other
times, the student who is victimized will share his or her anger or depression online as
distressing material. When school officials respond to a report of cyberbullying or a
cyberthreat, it is exceptionally important to take the time to fully investigate the situation—
through an analysis of online as well as Real World interactions. Students should be held
accountable for harmful material posted online, but punishing the student who is being
victimized at school for responding to this victimization online will only increase the
potential for additional harmful acts.
The Parent Guide to Cyberbullying and Cyberthreats (Chapter 1), there are
increasing reports of teenagers (and sometimes younger children) using these technologies to
post damaging text or images to bully their peers or engage in other aggressive behavior.
There are also increasing reports of teens posting material that raises concerns that they are
considering an act of violence toward others or themselves. This guide provides parents with
insight into these concerns and guidelines to prevent your child from being victimized by or
engaging in online harmful behavior.
According to the author Richard Doneganin of paper Bullying and Cyberbullying:
History, Statistics, Law, Prevention and Analysis in The Elon Journal of Undergraduate
Research in Communications • Vol. 3, No. 1 • Spring 2012 illustrated the bullying problems
like win-or-die-trying atmosphere, the competitive college acceptance process, and much of
the corporate world, contribute to many of the that we battle toady. The issues of bullying
and Cyberbullying can only be contained in the short term and not eliminated completely due
to how deep-seeded they have become in our competitive society. A successful program
needs to clearly identify the problem, establish recognition, and formulate consistent ways of
dealing with the issue across all platforms. The biggest struggle for Cyberbullying
prevention in the future is matching the fast pace of technological innovation with
effective preventative techniques.
The issue of Cyberbullying is difficult to fully understand because of how recently
this phenomenon has surfaced. It has become a hot topic for school administrators, parents,
and lawmakers, but the little data that has been collected thus far has mostly provided an
underdeveloped picture of the prevalence of the problem (Hinduja & Patchin, 2008).
Children today are born into a world where a variety of technological tools have been at their
dispersal since their earliest memories. They are being raised in an Internet dominant world
where digital interaction often is the primary means through which they interact with one
another (Hinduja & Patchin, 2009).
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
327
Wiseman, Brian, illustrated in Cyberbullying in schools: A research study on
school policies and procedures" (2011)" that Cyberbullying is still a relatively new
phenomenon, but the little data currently in existence indicate that the negative effects of
Cyberbullying are at least similar to those of more traditional forms of bullying (Ybarra &
Mitchell, 2004). Because of this, it is important to take a look at the effects of traditional
bullying in order to gain a better understanding of Cyberbullying. Despite the infancy of
Cyberbullying, traditional bullying has long been a deeply embedded problem in schools
throughout the world (Roland & Isdoe, 2001).
Cyberbullying and cyberthreats are just two of the concerns related to youth online
behavior. Nancy Willard’s new book, Cyber-Safe Kids, Cyber-Savvy Teens, provides
extensive insight and guidance on all issues related to the safe and responsible use of the
Internet by young people.
The article on Project Safekids - Cyber Bullying & Cyber Threat Information for Parents
& Educators tilted Cyberbullying and Cyberthreats: Responding to the Challenge of
Online Social Cruelty, Threats, and Distress provides in-depth insight and practical
strategies for school administrators, counselors/psychologists, resource officers, education
technology directors, teachers, and others to prevent and respond to Cyberbullying and cyber
threats and Effective Internet Usage management tips.
3. Rationale of Cyberbullying
It is widely known that face-to-face bullying can result in long-term psychological
harm to targets. This harm includes low self-esteem, depression, anger, school failure and
avoidance, and, in some cases, school violence or suicide. It is possible that the harm
caused by Cyberbullying may be greater than harm caused by traditional bullying. The
reasons behind the Cyberbullying are as:
- Cyberbullying and Cyberthreats may be related to in-school bullying.
- Cyberbullying may involve relationships. If a relationship breaks up, one person may
start to Cyberbullying the other person. Other times, teens may get into online fights
about relationships.
- Cyberbullying may be based on hate or bias—bullying others because of race,
religion, physical appearance (including obesity), or sexual orientation.
- Teens may think that Cyberbullying is entertaining—a game to hurt other people.
- Disclosing personal information to others.
- Addiction of Internet
- Violent gaming
- Angry and disconnected youth and many more
4. Face to face bullying and Cyber Bullying
Technology’s progression is often equated with the advancement of human societies.
Pivotal innovations, such as the Internet, have forever changed how people interact. Though
these developments have allowed the human race to make great strides in many fields, they
have also allowed forms of transgression to become more rampant and widespread. This is
evident when considering how traditional bullying has evolved into an issue today known as
Cyberbullying. While bullying and Cyberbullying are often similar in terms of form and
technique they also have many differences. Unlike traditional bullying, Cyberbullying allows
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
328
the offender to mask his or her identity behind a computer. This anonymity makes it easier
for the offender to strike blows against a victim without having to see the victim’s physical
response. The distancing effect that technological devices have on today’s youth often leads
them to say and do crueler things compared to what is typical in a traditional face-to-face
bullying situation.[9]
It is widely known that face-to-face bullying can result in long-term psychological harm to
targets. This harm includes low self-esteem, depression, anger, school failure and avoidance,
and, in some cases, school violence or suicide. It is possible that the harm caused by cyber
bullying may be greater than harm caused by traditional bullying because . . .
• Online communications can be extremely vicious.
• There is no escape for those who are being cyber bullied—victimization is ongoing,
24/7.
• Cyber bullying material can be distributed worldwide and is often irretrievable.
• Cyber bullies can be anonymous and can solicit the involvement of unknown
“friends.”
• Teens may be reluctant to tell adults what is happening online or through their cell
• phones because they are emotionally traumatized, think it is their fault, fear greater
• Retribution, or fear online activities or cell phone use will be restricted.
III. CYBER THREATS IN EDUCATION
The internet has become an increasingly popular medium among youth .Therefore,
not only the opportunities, but the dangers of cyberspace apply to youth as well. Youth in
particular use the internet for communicative purposes and, in addition, research indicates
that the potential to interact with others in harmful ways while being online exists. One of
the emerging risks of communication on the internet for youth is Cyberbullying.
In the age of technology, many children have easy access to technological devices
such as computers, Skype, cameras, the Internet, and cellular telephones. These technologies
can be used for productive reasons, but have recently become a means for children to become
bullies and use the technology to make threats against other children. Cyberbullying has
become a serious problem, inflicting psychological, emotional, and social harm to many
victims (Patchin & Hinduja, 2006).
Cyberbullying and cyberthreats may be related to in-school bullying. Sometimes, the
student who is victimized at school is also being bullied online. But other times, the person
who is victimized at school becomes a cyberbully and retaliates online. Still other times, the
student who is victimized will share his or her anger or depression online as distressing
material. When school officials respond to a report of Cyberbullying or a cyberthreat, it is
exceptionally important to take the time to fully investigate the situation—through an
analysis of online as well as Real World interactions. Students should be held accountable for
harmful material posted online, but punishing the student who is being victimized at school
for responding to this victimization online will only increase the potential for additional
harmful acts. [1]
IV. FUTURE DIRECTIONS
The purpose of this study is to review the literature about Cyberbullying and the
impact it is having on youth. The details about Cyberbullying will be compared to those of
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
329
traditional bullying. Literature about what warning signs adults can look for to recognize
Cyberbullying and factors that put children at risk is included along with the prevalence and
ramifications of Cyberbullying.
Each day school children learn valuable skills and lessons from their teachers as well
as through interactions with their peers. There are some experiences, such as bullying, that
may negatively affect and stick with these children for the rest of their lives. The literature
review talks about the traditional bullying and Cyberbullying along with the reasons behind
bullying. There is need for an effective Cyberbullying awareness program make awareness
and alert about the Cyberbullying, Internet usage to parents, schools and students which will
elaborate the impact of Cyberbullying and their day to day life. The biggest struggle for
Cyberbullying prevention in the future is matching the fast pace of technological innovation
with effective preventative techniques. Also the researcher found that there is need to design
a unified Tool to curb the Cyberbullying & threats to restrict the access of students to the
websites and effective internet usage management model.
V. CONCLUSION
Cyberbullying is an emerging concern which is needed to concentrate more and need
to be well studied in schools. Therefore the study is important to provide a way ahead for
emerging concern and find out the solution. From above various articles, report and research
papers about the cyber threat and the researcher found that it is concentrated on various types
of cyber threats, merging threats and how to defeat them. The Guidance for school officials
on the review and response to a report of an incident of Cyberbullying or a cyber threat is
available for the schools and parents. The issues of bullying and Cyberbullying can only be
contained in the short term and not eliminated completely due to how deep-seeded they have
become in our competitive society.
VI. BIBLIOGRAPHY & REFERENCES
[1] Educators Guide to Cyberbullying and Cyber threats – Nancy Willard, M.S.J.D.
http://csriu.org, http://cyberbully.org, and http://cyber-safe-kids.com
[2] www.researchpress.com - Cyberbullying and Cyber threats :Responding to the challenge
of online social aggression, Threats and Distress(Research Press)
[3] http://www.cyberbullying.us. Cyberbullying Research Center – Preventing Cyberbullying
- Sameer Hinduja and Justin W. Patchin , January 2012
[4] An investigation into cyberbullying, its forms, awareness and impact, and the relationship
between age and gender in cyberbullying A Report to the Anti-Bullying Alliance by Peter
Smith, Jess Mahdavi, Manuel Carvalho and Neil Tippett Unit for School and Family Studies,
Goldsmiths College, University of London
[5] International Journal of Computer Science & Information Security IJCSIS Vol. 10 No. 11,
November 2012 ISSN 1947-5500 Paper 31101227: Internet Fraud as one of the cyber threat
and its impact in India (pp. 38-41) Ashwini Manish Brahme, Assistant Professor, Indira
Institute of Management(MCA), Pune, University of Pune, Maharashtra, India
[6] Emerging Cyber Threats Report for 2009 Data, Mobility and Questions of Responsibility
will Drive Cyber Threats in 2009 and Beyond. The Georgia Tech Information Security
Center (GTISC)
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
330
[7]Macro-Economic Cyber Security Models Matt Kiely, Eric Kobe, Amanda MacArthur,
Matt Polk, Eric Rains, Eva Andrijcic, Jonathan Crawford, and Barry Horowitz
[8]http://www.projectsafekids.org/cyber/index.html Project Safekids - Cyber Bullying &
Cyber Threat Information for Parents & Educators
[9]Bullying and Cyberbullying: History, Statistics, Law, Prevention and Analysis
Richard Donegan*Strategic Communication Elon University — The Elon Journal of
Undergraduate Research in Communications • Vol. 3, No. 1 • Spring 2012
[10]Cyber Bullying: Overview and Strategies for School Counsellors, Guidance Officers, and
All School Personnel Christine Suniti Bhat Ohio University, United States of America
Australian Journal of Guidance & Counselling Volume 18 Number 1 2008 pp. 53–66
[11]Cyber-Safe Kids, Cyber-Savvy Teens: Helping Young People Learn to Use the Internet
Safely and Responsibly (Jossey-Bass)
Cyberbullying and cyberthreats are just two of the concerns related to youth online behavior.
Nancy Willard’s new book, Cyber-Safe Kids, Cyber-Savvy Teens, provides extensive insight
and guidance on all issues related to the safe and responsible use of the Internet by young
people. More information at http://cyber-safe-kids.com.
[12] Wiseman, Brian, "Cyberbullying in schools: A research study on school policies and
procedures" (2011). UNLV Theses/Dissertations/ Professional Papers/Capstones. Paper 911
[13] The EU’s cyber security agency ENISA has published its Cyber Threat Landscape
Analysis of 2012 which puts drive-by-exploits as the top web threat.
http://www.welivesecurity.com/2013/01/11/euro-cyber-security-agency-lists-top-ten-cyber-
threats/
[14] Emerging Cyber Threats Report for 2009 — Georgia Tech Information Security Center
http://securingourecity.org/resources/whitepapers/Securing_eCity_Cybersecurity_May2009.
pdf
[15] Goverdhan Reddy Jidiga and Dr. P Sammulal, “Machine Learning Approach to
Anomaly Detection in Cyber Security with a Case Study of Spamming Attack”, International
Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013,
pp. 113 - 122, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

Mais conteúdo relacionado

Semelhante a A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION

Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
Enow Eyong
 
P36132142
P36132142P36132142
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
IJNSA Journal
 
Senior Seminar Paper
Senior Seminar PaperSenior Seminar Paper
Senior Seminar Paper
Anthony Orton Jr
 
Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Capstone Project Final 7-19-13
Capstone Project Final 7-19-13
Megan Bednar
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGBINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
IRJET Journal
 
Cyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network security
IJICTJOURNAL
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
write31
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
write12
 
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY          .docxRunning Head CURRENT CHALLENGES FACING CYBER SECURITY          .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
healdkathaleen
 
IRJET- Social Network Mental Disoreders Detection
IRJET- Social Network Mental Disoreders DetectionIRJET- Social Network Mental Disoreders Detection
IRJET- Social Network Mental Disoreders Detection
IRJET Journal
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
Heather Dionne
 
10-1108_17505931211282418.pdf
10-1108_17505931211282418.pdf10-1108_17505931211282418.pdf
10-1108_17505931211282418.pdf
MaroofHamid1
 
Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...
Alexander Decker
 
ISSC451 Cybercrime.docx
ISSC451 Cybercrime.docxISSC451 Cybercrime.docx
ISSC451 Cybercrime.docx
stirlingvwriters
 
Trends_in_my_profession(revised)
Trends_in_my_profession(revised)Trends_in_my_profession(revised)
Trends_in_my_profession(revised)
Mantenso Skido-Achulo
 
In defence of the human factor
In defence of the human factorIn defence of the human factor
In defence of the human factor
Ciarán Mc Mahon
 

Semelhante a A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION (17)

Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
P36132142
P36132142P36132142
P36132142
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
Senior Seminar Paper
Senior Seminar PaperSenior Seminar Paper
Senior Seminar Paper
 
Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Capstone Project Final 7-19-13
Capstone Project Final 7-19-13
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGBINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
 
Cyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network security
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY          .docxRunning Head CURRENT CHALLENGES FACING CYBER SECURITY          .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
 
IRJET- Social Network Mental Disoreders Detection
IRJET- Social Network Mental Disoreders DetectionIRJET- Social Network Mental Disoreders Detection
IRJET- Social Network Mental Disoreders Detection
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
10-1108_17505931211282418.pdf
10-1108_17505931211282418.pdf10-1108_17505931211282418.pdf
10-1108_17505931211282418.pdf
 
Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...
 
ISSC451 Cybercrime.docx
ISSC451 Cybercrime.docxISSC451 Cybercrime.docx
ISSC451 Cybercrime.docx
 
Trends_in_my_profession(revised)
Trends_in_my_profession(revised)Trends_in_my_profession(revised)
Trends_in_my_profession(revised)
 
In defence of the human factor
In defence of the human factorIn defence of the human factor
In defence of the human factor
 

Mais de Claire Webber

How To Write Law Essays Exams By S.I. Strong (Engl
How To Write Law Essays Exams By S.I. Strong (EnglHow To Write Law Essays Exams By S.I. Strong (Engl
How To Write Law Essays Exams By S.I. Strong (Engl
Claire Webber
 
Give You Wedding A Hint Of Luxury. When You Plan, Us
Give You Wedding A Hint Of Luxury. When You Plan, UsGive You Wedding A Hint Of Luxury. When You Plan, Us
Give You Wedding A Hint Of Luxury. When You Plan, Us
Claire Webber
 
College Admission Essay Sample - Popular College
College Admission Essay Sample - Popular CollegeCollege Admission Essay Sample - Popular College
College Admission Essay Sample - Popular College
Claire Webber
 
Lined Paper, Writing Paper, Paper Texture, Free Printable
Lined Paper, Writing Paper, Paper Texture, Free PrintableLined Paper, Writing Paper, Paper Texture, Free Printable
Lined Paper, Writing Paper, Paper Texture, Free Printable
Claire Webber
 
How To Write A Research Paper Tips To Use Assig
How To Write A Research Paper Tips To Use AssigHow To Write A Research Paper Tips To Use Assig
How To Write A Research Paper Tips To Use Assig
Claire Webber
 
Writing Classroom Observations Classroom
Writing Classroom Observations ClassroomWriting Classroom Observations Classroom
Writing Classroom Observations Classroom
Claire Webber
 
Expository Essay How To Write, Struct
Expository Essay How To Write, StructExpository Essay How To Write, Struct
Expository Essay How To Write, Struct
Claire Webber
 
George Orwell Why I Write Essay, Writing, George Or
George Orwell Why I Write Essay, Writing, George OrGeorge Orwell Why I Write Essay, Writing, George Or
George Orwell Why I Write Essay, Writing, George Or
Claire Webber
 
Synthesis Essay A Helpful Writing Guide For Students
Synthesis Essay A Helpful Writing Guide For StudentsSynthesis Essay A Helpful Writing Guide For Students
Synthesis Essay A Helpful Writing Guide For Students
Claire Webber
 
Sentence Starters Coolguides In 2021 Sente
Sentence Starters Coolguides In 2021 SenteSentence Starters Coolguides In 2021 Sente
Sentence Starters Coolguides In 2021 Sente
Claire Webber
 
Critical Thinking Essay Examples. Critical Thinkin
Critical Thinking Essay Examples. Critical ThinkinCritical Thinking Essay Examples. Critical Thinkin
Critical Thinking Essay Examples. Critical Thinkin
Claire Webber
 
1763 Best Note Pages - Hojas Para Cartas Images
1763 Best Note Pages - Hojas Para Cartas Images1763 Best Note Pages - Hojas Para Cartas Images
1763 Best Note Pages - Hojas Para Cartas Images
Claire Webber
 
Pumpkin Writing Template Writing Template
Pumpkin Writing Template Writing TemplatePumpkin Writing Template Writing Template
Pumpkin Writing Template Writing Template
Claire Webber
 
How To Write An Essay On Global Warming. Global Warming And C
How To Write An Essay On Global Warming. Global Warming And CHow To Write An Essay On Global Warming. Global Warming And C
How To Write An Essay On Global Warming. Global Warming And C
Claire Webber
 
002 Essay Example Intro Paragraph How To Write An Introduction Lea
002 Essay Example Intro Paragraph How To Write An Introduction Lea002 Essay Example Intro Paragraph How To Write An Introduction Lea
002 Essay Example Intro Paragraph How To Write An Introduction Lea
Claire Webber
 
What Makes A Good Freelance Writer A
What Makes A Good Freelance Writer AWhat Makes A Good Freelance Writer A
What Makes A Good Freelance Writer A
Claire Webber
 
How To Write Introductions Ielts Writing, Ielts Writing Ac
How To Write Introductions Ielts Writing, Ielts Writing AcHow To Write Introductions Ielts Writing, Ielts Writing Ac
How To Write Introductions Ielts Writing, Ielts Writing Ac
Claire Webber
 
Step-By-Step Guide To Essay Writing
Step-By-Step Guide To Essay WritingStep-By-Step Guide To Essay Writing
Step-By-Step Guide To Essay Writing
Claire Webber
 
Writing Paper Template Format Template Writin
Writing Paper Template Format Template WritinWriting Paper Template Format Template Writin
Writing Paper Template Format Template Writin
Claire Webber
 
Free Printable Vintage Flower Stationery - Ausdruckbares
Free Printable Vintage Flower Stationery - AusdruckbaresFree Printable Vintage Flower Stationery - Ausdruckbares
Free Printable Vintage Flower Stationery - Ausdruckbares
Claire Webber
 

Mais de Claire Webber (20)

How To Write Law Essays Exams By S.I. Strong (Engl
How To Write Law Essays Exams By S.I. Strong (EnglHow To Write Law Essays Exams By S.I. Strong (Engl
How To Write Law Essays Exams By S.I. Strong (Engl
 
Give You Wedding A Hint Of Luxury. When You Plan, Us
Give You Wedding A Hint Of Luxury. When You Plan, UsGive You Wedding A Hint Of Luxury. When You Plan, Us
Give You Wedding A Hint Of Luxury. When You Plan, Us
 
College Admission Essay Sample - Popular College
College Admission Essay Sample - Popular CollegeCollege Admission Essay Sample - Popular College
College Admission Essay Sample - Popular College
 
Lined Paper, Writing Paper, Paper Texture, Free Printable
Lined Paper, Writing Paper, Paper Texture, Free PrintableLined Paper, Writing Paper, Paper Texture, Free Printable
Lined Paper, Writing Paper, Paper Texture, Free Printable
 
How To Write A Research Paper Tips To Use Assig
How To Write A Research Paper Tips To Use AssigHow To Write A Research Paper Tips To Use Assig
How To Write A Research Paper Tips To Use Assig
 
Writing Classroom Observations Classroom
Writing Classroom Observations ClassroomWriting Classroom Observations Classroom
Writing Classroom Observations Classroom
 
Expository Essay How To Write, Struct
Expository Essay How To Write, StructExpository Essay How To Write, Struct
Expository Essay How To Write, Struct
 
George Orwell Why I Write Essay, Writing, George Or
George Orwell Why I Write Essay, Writing, George OrGeorge Orwell Why I Write Essay, Writing, George Or
George Orwell Why I Write Essay, Writing, George Or
 
Synthesis Essay A Helpful Writing Guide For Students
Synthesis Essay A Helpful Writing Guide For StudentsSynthesis Essay A Helpful Writing Guide For Students
Synthesis Essay A Helpful Writing Guide For Students
 
Sentence Starters Coolguides In 2021 Sente
Sentence Starters Coolguides In 2021 SenteSentence Starters Coolguides In 2021 Sente
Sentence Starters Coolguides In 2021 Sente
 
Critical Thinking Essay Examples. Critical Thinkin
Critical Thinking Essay Examples. Critical ThinkinCritical Thinking Essay Examples. Critical Thinkin
Critical Thinking Essay Examples. Critical Thinkin
 
1763 Best Note Pages - Hojas Para Cartas Images
1763 Best Note Pages - Hojas Para Cartas Images1763 Best Note Pages - Hojas Para Cartas Images
1763 Best Note Pages - Hojas Para Cartas Images
 
Pumpkin Writing Template Writing Template
Pumpkin Writing Template Writing TemplatePumpkin Writing Template Writing Template
Pumpkin Writing Template Writing Template
 
How To Write An Essay On Global Warming. Global Warming And C
How To Write An Essay On Global Warming. Global Warming And CHow To Write An Essay On Global Warming. Global Warming And C
How To Write An Essay On Global Warming. Global Warming And C
 
002 Essay Example Intro Paragraph How To Write An Introduction Lea
002 Essay Example Intro Paragraph How To Write An Introduction Lea002 Essay Example Intro Paragraph How To Write An Introduction Lea
002 Essay Example Intro Paragraph How To Write An Introduction Lea
 
What Makes A Good Freelance Writer A
What Makes A Good Freelance Writer AWhat Makes A Good Freelance Writer A
What Makes A Good Freelance Writer A
 
How To Write Introductions Ielts Writing, Ielts Writing Ac
How To Write Introductions Ielts Writing, Ielts Writing AcHow To Write Introductions Ielts Writing, Ielts Writing Ac
How To Write Introductions Ielts Writing, Ielts Writing Ac
 
Step-By-Step Guide To Essay Writing
Step-By-Step Guide To Essay WritingStep-By-Step Guide To Essay Writing
Step-By-Step Guide To Essay Writing
 
Writing Paper Template Format Template Writin
Writing Paper Template Format Template WritinWriting Paper Template Format Template Writin
Writing Paper Template Format Template Writin
 
Free Printable Vintage Flower Stationery - Ausdruckbares
Free Printable Vintage Flower Stationery - AusdruckbaresFree Printable Vintage Flower Stationery - Ausdruckbares
Free Printable Vintage Flower Stationery - Ausdruckbares
 

Último

How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 

Último (20)

How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 

A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 324 A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION Ashwini Manish Brahme 1 , Dr. Shivaji Mundhe2 , Ashwini Chavan3 , Sunil B Joshi4 , Poonam Sawant5 1 (Assistant Professor, Sinhgad Institute of Management and Computer Application (SIMCA),Narhe, Pune ) 2 (Director, Sinhgad Institute of Management and Computer Application (SIMCA), Narhe, Pune ) 3 (Assistant Professor, Sinhgad Institute of Management and Computer Application (SIMCA),Narhe, Pune ) 4 (Assistant Professor, Sinhgad Institute of Management and Computer Application (SIMCA),Narhe, Pune ) 5 (Assistant Professor, Sinhgad Institute of Management and Computer Application (SIMCA),Narhe, Pune ) ABSTRACT Cyberbullying is the use of ICT (Information and Communication Technologies) such as Internet, mobile etc to give trouble to other by sending the message, email and many more. In today’s Internet world people send email, create their own website, send text messages, image via cell phone, do instant messaging, chatting, seek for new friends etc. Unfortunately there are increasing reports of teenagers and their aggressive behavior and becoming victim of Cyberbullying. This research paper describes about Cyber crime and Cyber bullying. The research is intended to find out the Cyber threats in schools, students and community. Cyber bullying is an emerging concern which is needed to more focus in education and the teenagers/students. KEYWORDS: ICT, Cyber Crime, Cyberbullying, Cyber threat, IM INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 3, May-June (2013), pp. 324-330 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 325 I. INTRODUCTION Crime is a sociological problem that hasn’t been solved in 4000 years of recorded history. Cybercrime is just the most recent vehicle of cold war. There was clearly vision (or luck) when the following statements were made in the 1992 movie “Sneakers”: • “The world isn’t run by weapons anymore, or energy or money. It’s run by ones and zeroes, little bits of data. It’s all just electrons.” • “There’s a war out there, old friend, a world war. And it’s not about who’s got the most bullets. It’s about who controls the information: ...what we see and hear, how we work, what we think. It’s all about the information.” — Universal City Studios, Inc Cyberbullying: Cyberbullying is nothing but the use of ICT (Information and Communication Technologies) such as Internet, mobile etc to give trouble to other by sending the message, email and many more. Cyberbullying or Cyber threats material—text or images—may be posted on personal Web sites or blogs or transmitted via e-mail, discussion groups, message boards, chat, IM, or cell phones. To add to this we can say that Cyber threats are either direct threats or “distressing material”—general statements that make it sound like the writer is emotionally upset and may be considering harming someone else, harming himself or herself, or committing suicide. II. LITERATURE REVIEW 1. Cyber Crime & Cyber threat Cyber crime is an unlawful act where in the computer is either a tool or a target which is used for creation of Cyber threat and Cyber terrorism as a premeditated use of disruptive activities or the threat in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives. The Cyber Criminals may be children and adolescents aged b/w 6-18 years, they may be organized hackers, may be professional hackers or crackers, discontented employees, cheaters or even psychic persons. According to the ENSIA report on Cyber Threat Landscape Analysis of 2012 (The EU’s cyber security agency ) the top ten threats in socially important technology areas such as mobile, social media, critical infrastructure, cloud, and big data are Drive-by exploits (malicious code injections that exploit web browser vulnerabilities), Worms/Trojans, Code injection attacks, Exploit kits (ready to use software packages to automate cybercrime), Botnets (hijacked computers that are remotely controlled), (Distributed) Denial of Service attacks (DDoS/DoS), Phishing (fraud mails and websites), Compromising confidential information (data breaches), Rogueware/ scareware and Spam. 2. Cyberbullying Author Belsey(2006) highlighted that Cyberbullying has on normal school functioning, educators, parents, policy makers, and researchers are quickly looking for the best way to deal with this newest form of harassment. According to the author Beran, T., & Li, Q. (2005) of Cyber-harassment: A study of a new method for an old behavior in the Journal of Educational Computing Research, 32(3), 265- 277 described that the face to face bullying and Cyberbullying. Little research has been
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 326 performed that has adequately examined the relationship between bullying at school and Cyberbullying, so its similarity to traditional bullying remains relatively unknown. Hinduja and Patchin (2008) postulate that one main difference between the two forms of harassment is that where physical power is an essential component of traditional bullying, computer proficiency alone is enough to empower one to commit such acts online. Educators Guide to Cyberbullying and Cyber threats – Nancy Willard, M.S.J.D. April 2005- 2007 (Parent Guide to Cyberbullying and Cyber threats), this article discuss about the types of cyber bullying and their impact on students and teenagers and legal issues which should be considered with this. This article elaborates the problem that it is be difficult to tell which type of threat will be there when school officials or law enforcement are first appraised of an online threat. In case of Cyberbullying may be it is in school or off school various things will occur such as the student who is victimized at school is also being bullied online. But other times, the person who is victimized at school becomes a cyberbully and retaliates online. Still other times, the student who is victimized will share his or her anger or depression online as distressing material. When school officials respond to a report of cyberbullying or a cyberthreat, it is exceptionally important to take the time to fully investigate the situation— through an analysis of online as well as Real World interactions. Students should be held accountable for harmful material posted online, but punishing the student who is being victimized at school for responding to this victimization online will only increase the potential for additional harmful acts. The Parent Guide to Cyberbullying and Cyberthreats (Chapter 1), there are increasing reports of teenagers (and sometimes younger children) using these technologies to post damaging text or images to bully their peers or engage in other aggressive behavior. There are also increasing reports of teens posting material that raises concerns that they are considering an act of violence toward others or themselves. This guide provides parents with insight into these concerns and guidelines to prevent your child from being victimized by or engaging in online harmful behavior. According to the author Richard Doneganin of paper Bullying and Cyberbullying: History, Statistics, Law, Prevention and Analysis in The Elon Journal of Undergraduate Research in Communications • Vol. 3, No. 1 • Spring 2012 illustrated the bullying problems like win-or-die-trying atmosphere, the competitive college acceptance process, and much of the corporate world, contribute to many of the that we battle toady. The issues of bullying and Cyberbullying can only be contained in the short term and not eliminated completely due to how deep-seeded they have become in our competitive society. A successful program needs to clearly identify the problem, establish recognition, and formulate consistent ways of dealing with the issue across all platforms. The biggest struggle for Cyberbullying prevention in the future is matching the fast pace of technological innovation with effective preventative techniques. The issue of Cyberbullying is difficult to fully understand because of how recently this phenomenon has surfaced. It has become a hot topic for school administrators, parents, and lawmakers, but the little data that has been collected thus far has mostly provided an underdeveloped picture of the prevalence of the problem (Hinduja & Patchin, 2008). Children today are born into a world where a variety of technological tools have been at their dispersal since their earliest memories. They are being raised in an Internet dominant world where digital interaction often is the primary means through which they interact with one another (Hinduja & Patchin, 2009).
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 327 Wiseman, Brian, illustrated in Cyberbullying in schools: A research study on school policies and procedures" (2011)" that Cyberbullying is still a relatively new phenomenon, but the little data currently in existence indicate that the negative effects of Cyberbullying are at least similar to those of more traditional forms of bullying (Ybarra & Mitchell, 2004). Because of this, it is important to take a look at the effects of traditional bullying in order to gain a better understanding of Cyberbullying. Despite the infancy of Cyberbullying, traditional bullying has long been a deeply embedded problem in schools throughout the world (Roland & Isdoe, 2001). Cyberbullying and cyberthreats are just two of the concerns related to youth online behavior. Nancy Willard’s new book, Cyber-Safe Kids, Cyber-Savvy Teens, provides extensive insight and guidance on all issues related to the safe and responsible use of the Internet by young people. The article on Project Safekids - Cyber Bullying & Cyber Threat Information for Parents & Educators tilted Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Cruelty, Threats, and Distress provides in-depth insight and practical strategies for school administrators, counselors/psychologists, resource officers, education technology directors, teachers, and others to prevent and respond to Cyberbullying and cyber threats and Effective Internet Usage management tips. 3. Rationale of Cyberbullying It is widely known that face-to-face bullying can result in long-term psychological harm to targets. This harm includes low self-esteem, depression, anger, school failure and avoidance, and, in some cases, school violence or suicide. It is possible that the harm caused by Cyberbullying may be greater than harm caused by traditional bullying. The reasons behind the Cyberbullying are as: - Cyberbullying and Cyberthreats may be related to in-school bullying. - Cyberbullying may involve relationships. If a relationship breaks up, one person may start to Cyberbullying the other person. Other times, teens may get into online fights about relationships. - Cyberbullying may be based on hate or bias—bullying others because of race, religion, physical appearance (including obesity), or sexual orientation. - Teens may think that Cyberbullying is entertaining—a game to hurt other people. - Disclosing personal information to others. - Addiction of Internet - Violent gaming - Angry and disconnected youth and many more 4. Face to face bullying and Cyber Bullying Technology’s progression is often equated with the advancement of human societies. Pivotal innovations, such as the Internet, have forever changed how people interact. Though these developments have allowed the human race to make great strides in many fields, they have also allowed forms of transgression to become more rampant and widespread. This is evident when considering how traditional bullying has evolved into an issue today known as Cyberbullying. While bullying and Cyberbullying are often similar in terms of form and technique they also have many differences. Unlike traditional bullying, Cyberbullying allows
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 328 the offender to mask his or her identity behind a computer. This anonymity makes it easier for the offender to strike blows against a victim without having to see the victim’s physical response. The distancing effect that technological devices have on today’s youth often leads them to say and do crueler things compared to what is typical in a traditional face-to-face bullying situation.[9] It is widely known that face-to-face bullying can result in long-term psychological harm to targets. This harm includes low self-esteem, depression, anger, school failure and avoidance, and, in some cases, school violence or suicide. It is possible that the harm caused by cyber bullying may be greater than harm caused by traditional bullying because . . . • Online communications can be extremely vicious. • There is no escape for those who are being cyber bullied—victimization is ongoing, 24/7. • Cyber bullying material can be distributed worldwide and is often irretrievable. • Cyber bullies can be anonymous and can solicit the involvement of unknown “friends.” • Teens may be reluctant to tell adults what is happening online or through their cell • phones because they are emotionally traumatized, think it is their fault, fear greater • Retribution, or fear online activities or cell phone use will be restricted. III. CYBER THREATS IN EDUCATION The internet has become an increasingly popular medium among youth .Therefore, not only the opportunities, but the dangers of cyberspace apply to youth as well. Youth in particular use the internet for communicative purposes and, in addition, research indicates that the potential to interact with others in harmful ways while being online exists. One of the emerging risks of communication on the internet for youth is Cyberbullying. In the age of technology, many children have easy access to technological devices such as computers, Skype, cameras, the Internet, and cellular telephones. These technologies can be used for productive reasons, but have recently become a means for children to become bullies and use the technology to make threats against other children. Cyberbullying has become a serious problem, inflicting psychological, emotional, and social harm to many victims (Patchin & Hinduja, 2006). Cyberbullying and cyberthreats may be related to in-school bullying. Sometimes, the student who is victimized at school is also being bullied online. But other times, the person who is victimized at school becomes a cyberbully and retaliates online. Still other times, the student who is victimized will share his or her anger or depression online as distressing material. When school officials respond to a report of Cyberbullying or a cyberthreat, it is exceptionally important to take the time to fully investigate the situation—through an analysis of online as well as Real World interactions. Students should be held accountable for harmful material posted online, but punishing the student who is being victimized at school for responding to this victimization online will only increase the potential for additional harmful acts. [1] IV. FUTURE DIRECTIONS The purpose of this study is to review the literature about Cyberbullying and the impact it is having on youth. The details about Cyberbullying will be compared to those of
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 329 traditional bullying. Literature about what warning signs adults can look for to recognize Cyberbullying and factors that put children at risk is included along with the prevalence and ramifications of Cyberbullying. Each day school children learn valuable skills and lessons from their teachers as well as through interactions with their peers. There are some experiences, such as bullying, that may negatively affect and stick with these children for the rest of their lives. The literature review talks about the traditional bullying and Cyberbullying along with the reasons behind bullying. There is need for an effective Cyberbullying awareness program make awareness and alert about the Cyberbullying, Internet usage to parents, schools and students which will elaborate the impact of Cyberbullying and their day to day life. The biggest struggle for Cyberbullying prevention in the future is matching the fast pace of technological innovation with effective preventative techniques. Also the researcher found that there is need to design a unified Tool to curb the Cyberbullying & threats to restrict the access of students to the websites and effective internet usage management model. V. CONCLUSION Cyberbullying is an emerging concern which is needed to concentrate more and need to be well studied in schools. Therefore the study is important to provide a way ahead for emerging concern and find out the solution. From above various articles, report and research papers about the cyber threat and the researcher found that it is concentrated on various types of cyber threats, merging threats and how to defeat them. The Guidance for school officials on the review and response to a report of an incident of Cyberbullying or a cyber threat is available for the schools and parents. The issues of bullying and Cyberbullying can only be contained in the short term and not eliminated completely due to how deep-seeded they have become in our competitive society. VI. BIBLIOGRAPHY & REFERENCES [1] Educators Guide to Cyberbullying and Cyber threats – Nancy Willard, M.S.J.D. http://csriu.org, http://cyberbully.org, and http://cyber-safe-kids.com [2] www.researchpress.com - Cyberbullying and Cyber threats :Responding to the challenge of online social aggression, Threats and Distress(Research Press) [3] http://www.cyberbullying.us. Cyberbullying Research Center – Preventing Cyberbullying - Sameer Hinduja and Justin W. Patchin , January 2012 [4] An investigation into cyberbullying, its forms, awareness and impact, and the relationship between age and gender in cyberbullying A Report to the Anti-Bullying Alliance by Peter Smith, Jess Mahdavi, Manuel Carvalho and Neil Tippett Unit for School and Family Studies, Goldsmiths College, University of London [5] International Journal of Computer Science & Information Security IJCSIS Vol. 10 No. 11, November 2012 ISSN 1947-5500 Paper 31101227: Internet Fraud as one of the cyber threat and its impact in India (pp. 38-41) Ashwini Manish Brahme, Assistant Professor, Indira Institute of Management(MCA), Pune, University of Pune, Maharashtra, India [6] Emerging Cyber Threats Report for 2009 Data, Mobility and Questions of Responsibility will Drive Cyber Threats in 2009 and Beyond. The Georgia Tech Information Security Center (GTISC)
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 330 [7]Macro-Economic Cyber Security Models Matt Kiely, Eric Kobe, Amanda MacArthur, Matt Polk, Eric Rains, Eva Andrijcic, Jonathan Crawford, and Barry Horowitz [8]http://www.projectsafekids.org/cyber/index.html Project Safekids - Cyber Bullying & Cyber Threat Information for Parents & Educators [9]Bullying and Cyberbullying: History, Statistics, Law, Prevention and Analysis Richard Donegan*Strategic Communication Elon University — The Elon Journal of Undergraduate Research in Communications • Vol. 3, No. 1 • Spring 2012 [10]Cyber Bullying: Overview and Strategies for School Counsellors, Guidance Officers, and All School Personnel Christine Suniti Bhat Ohio University, United States of America Australian Journal of Guidance & Counselling Volume 18 Number 1 2008 pp. 53–66 [11]Cyber-Safe Kids, Cyber-Savvy Teens: Helping Young People Learn to Use the Internet Safely and Responsibly (Jossey-Bass) Cyberbullying and cyberthreats are just two of the concerns related to youth online behavior. Nancy Willard’s new book, Cyber-Safe Kids, Cyber-Savvy Teens, provides extensive insight and guidance on all issues related to the safe and responsible use of the Internet by young people. More information at http://cyber-safe-kids.com. [12] Wiseman, Brian, "Cyberbullying in schools: A research study on school policies and procedures" (2011). UNLV Theses/Dissertations/ Professional Papers/Capstones. Paper 911 [13] The EU’s cyber security agency ENISA has published its Cyber Threat Landscape Analysis of 2012 which puts drive-by-exploits as the top web threat. http://www.welivesecurity.com/2013/01/11/euro-cyber-security-agency-lists-top-ten-cyber- threats/ [14] Emerging Cyber Threats Report for 2009 — Georgia Tech Information Security Center http://securingourecity.org/resources/whitepapers/Securing_eCity_Cybersecurity_May2009. pdf [15] Goverdhan Reddy Jidiga and Dr. P Sammulal, “Machine Learning Approach to Anomaly Detection in Cyber Security with a Case Study of Spamming Attack”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013, pp. 113 - 122, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.