Feeds

Technobullies on the rise in school yard stripping games

Exploiting anonymity

Secure remote control for conventional and virtual desktops

Canadian researchers studying online bullying have found that teenagers are happily exploiting emerging technologies, such as texting, emails, and social networking sites in their playground power struggles. The ease with which a bully can hide his or her identity is also changing the game.

According to Professor Faye Mishna, cyber bullies are "forcing" friends to strip for their webcams, and are then sending the images to all and sundry. This, she says, is particularly true between girls and their boyfriends, and even more so when a couple breaks up.

She told Reuters: "Girls might send [a topless picture] to their boyfriend and she is pressured to do it thinking he's just going to see it. So she gives in and the next thing you know it's all over [the place]."

Mishna is basing her research - which will be completed this summer and published in autumn - on focus group interviews with 47 students in grades five to 12 (roughly between the ages of 10 and 18).

She said the bullying was often going unreported because the students were scared their parents would restrict their access to the computer to keep them safe. The ability of bullies to remain anonymous was another factor, with some saying reporting the bullying was pointless if the culprits could not be tracked down.

Mishna says she sees a trend for the traditional victims of bullying - the computer geeks - to turn the tables in the online world.

"Traditional bullying is a power differential," she told the news agency. "The power before could have been age, size, smartness, popularity, ability. Now it's the perceived anonymous nature." ®

Build a business case: developing custom apps

More from The Register

next story
Detroit losing MILLIONS because it buys CHEAP BATTERIES – report
Man at hardware store was right: name brands DO last longer
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
Govt control? Hah! It's IMPOSSIBLE to have a successful command economy
Even Moore's Law can't help the architects of statism now
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
New voting rules leave innocent Brits at risk of SPAM TSUNAMI
Read the paperwork very carefully - or fall victim to marketing shysters
Rimini Street promises 'business as usual' after Oracle IP judgment
Rimini's wrong on Oracle database licence, says judge
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.