Blogs
Read the latest articles from MediaSmarts experts and parent bloggers.
Read the latest articles from MediaSmarts experts and parent bloggers.Blogs
It’s important to note that there is no single profile of a child who bullies. While some fit the traditional image of someone who is generally aggressive and has poor impulse control, others may be very sensitive to social nuances and are able to use that understanding against their targets. Others may be motivated simply by boredom.
For most youth, the internet is all about socializing, and while most of these social interactions are positive, some use the technology to intimidate and harass others – a phenomenon known as cyberbullying.
Cyberbullying can be addressed under civil law or criminal law, based on the situation.
"Given the opportunity, young people do care about issues relating to the harnessing and use of their information online. They want to know what information is being taken from them, and why. They want companies to be more open about how data is being used."
Online hate can have an impact in three interconnected ways:
Although many concerns remain about how gender represented in media, there are signs that things are changing. Roles for women on television, in particular, have become much more varied and complex in the last decade, ranging from the conflicted Star Wars hero Ahsoka to Marvel characters such as Echo and Ms. Marvel to more realistic characters like Never Have I Ever’s Devi, while a growing number of movies and TV shows are questioning narrow definitions of masculinity.
Contrary to stereotypes, youth do care about their privacy.
Contrary to popular belief, cyberbullying remains a problem in high school. Students in these grades should learn the ways that they can speak out and make a difference, both in cases of individual cyberbullying and in building more tolerant and respectful online spaces.
Thanks to the networked nature of the internet, in which information is always flowing both ways, there's no shortage of ways for apps, devices and websites to collect information about us.