Abstract

A list of the main generalizations and factors characteristic of various options and conditions for the implementation of actions of network bullying (cyberbullying) is presented. The argumentation of certain analogies and coincidences between the process of network bullying, as well as the conditions and goals of modern information operations is proposed. Attention drawn to the fact that the conditions of cyberbullying largely coincide with the paradigm of S. Milgram experiment. The argumentation of the essence of some analogies is offered between the manifestations of cyberbullying and the main concept of the experiment of S. Milgram's experiment. It is emphasized that the level of hierarchical importance of cyberbullying objects, determines the degree of integration of content administration functions and the main components of the resource support of information systems. It is noted that integration in one decision-making center all major technical resources and content administration functions, is a serious problem even for the level of individual states, not to mention the personal level of exposure. Attention is drawn to the fact that cyberbullying can be implemented, both by using the capabilities of individual information technologies, and embody the concept of integrated attack. It was emphasized that the phenomenon of cyberbullying is significantly underestimated and therefore, represents a serious problem of our time.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.