Introduction
Today, people all over the world have the capability to communicate with each other with a simple click of a button. With these technological advancements, society’s teens are appealed to the uses of computers, mobile phones and other electronic devices. Although many perceive social networking and technology as harmless amusement, the ones threatened by cyber bullying beg to differ. This recent craze of virtual harassment has inflicted agony and even suicides among teens ubiquitously. While we celebrate the advancing networking, we must confront the negatives they encompass. Cyber bullying should be recognized as a growing issue that cannot be ignored.
Background
Cyber bullying occurs when individuals use the internet or other electronic devices to transmit hostile messages or images to another person. It has various forms, including direct harassment or indirect activities that are intended to damage the reputation or interfere with the relationships of the student targeted, such as posting harmful material, impersonating the individual, disseminating personal information or images, or activities that result in exclusion. (Cite: http://www.cyberbully.org/cyberbully/docs/cblegislation.pdf) (CITE: Even though the word cyber bullying didn’t even exist a decade ago, the problem is pervasive in children’s lives today. (Shannon Brady 43)
Data
Although anyone can become a victim of cyber bullying, many teens become victims due to their desire to use modern technology and their failure to use safe internet practices. Cyber bullying is similar to other types of bullying, except it takes place online and through text messages sent to mobile phones. The harassers can be classmates, online acquaintances, or even anonymous users. One barrier that is difficult to overcome is determining who is responsible for the attacks online, because many counterfeit names are used in order to “hide behind the screen”. A