...Why is it important to work to delete cyberbullying? Because cyberbullying not only causes psychological damage, but it can cause physical damage as well. Kids today are growing up in our ever-changing world of growing technology. Many of us spend a lot of time online, we connect with others, and some people share their lives with others online. When I was growing up in the 90’s I did not have to worry about my mistakes being displayed for the whole world to see. The biggest thing I worried about was getting chat messages from online strangers trying to find out where I lived, or any other information they could get. Cyberbullying gives people the freedom to harass someone on a much larger scale. Before cyberbullying, bullying was localized...
Words: 413 - Pages: 2
...Social Media: Primary Source of Cyberbullying People are constantly hearing of teen suicides or suicide attempts because of bullying; however, when teachers or students at school are asked about these tragic situations, they claim to have never seen the bullying. In most cases, they haven’t. Teenagers have an easy out of escaping trouble now days through social media. They use fake accounts so that their identity is anonymous when embarrassing others. People believe that if they send or post something on social media it can be deleted and no one else will see it, but people can share what they’ve sent or posted and then everyone can see it. Finally, they have constant access to social media through computers, cellphones or tablets to insult others. The 2011 movie “Cyberbully” is a prime example of bullying over social media being one of the main causes of teen attempted suicides. In this movie Emily Osmet plays a girl named Taylor who is bullied by one of her friends through a fake profile. On this fake profile her friend fronts as being someone names James who spreads a rumor about Taylor that she slept with him. People begin calling Taylor vulgar names like “slut” and “whore”. She eventually tries to attempt suicide by overdosing on pills when her friend finds her. Taylor’s mother did what more parents should be doing, and fought to make cyberbullying illegal. The 2013 Youth Risk Behavior Surveillance Survey states “15% of high school students (grades 9-12) were...
Words: 1645 - Pages: 7
...bullying The social issue in Brevard that I am going to be talking about is cyberbulling. Cyberbullying is when a person, typically children 8-18, are harassed, threatened, humiliated, or targeted over the internet. This has become relatively common with the advances of technology. Cyberbullying probably commenced in the mid 90's when internet use became typical. Cyberbullying and face to face bullying are very contrastive. For instance when a cyberbully releases something slanderous into the world wide web, they have an audience possibly the whole world. In addition it is very difficult, if not impossible, to delete and completely remove anything from the internet. Another difference between a cyberbully and a face...
Words: 1023 - Pages: 5
..."Why is it important to work to delete cyberbullying?" The internet is a place for people of all ages to learn more information and communicate with people from all areas of the world. Cyberbullying takes away from that because it causes people to feel insecure and question who they are based off of insecure bullies who hide themselves behind computer screens. Cyber bullying can lead to self-harm to an extent of death. Fewer children are expressing feelings of low self-esteem and bigger percentages of them are expressing the desire to remain survivors and winners in the battle against bullying and cyberbullying. Internet bullying causes children to do many things besides self-harm, children who have been bullied on the internet have a tendency to stay away from social activities such as sports and social clubs and hanging out with friends. Parents have a hard time recognizes if their child is being bullied on the internet because of how difficult it is for children to open up to their parents about bullies and their personal lives. 7 in 10 young people are victims of cyberbullying. 37% of them are experiencing cyberbullying on a highly frequent basis. 20% of young people are experiencing extreme cyberbullying on a daily basis. New research suggests that young males and females are equally at risk of cyberbullying. Social networks are the main source for internet bullying, young people found to be twice as likely to be cyber bullied on Facebook as on any other social network...
Words: 344 - Pages: 2
...Cyber bullying Cyberbullying is the use of the Internet and other related technologies to harm or harass other people, in a deliberate, repeated and hostile manner. Nearly 43% of all the youth have been bullied online. 1 in 4 has had it happen more than once, which tells us that we have to do something about the problem. If kids can’t have fun on the Internet without people are making fun of them – that’s a problem. Some kids might even bully other kids so they can avoid being bullied themselves. Everyone knows what bullying means and most have had experiences with it. Either they have been bullies themselves, they have been victims of bullying, or they known someone who has been bullied. With the Internet bullying can be taken to the next level. It is now much harder to avoid the bullies because they can reach you everywhere. The Internet has also given the bullies an extra distance to their victims, which makes them capable of increasing the severity of their threats and negative messages, making it even harder to be the victim, and that’s why more than 65% of the older students thinks that cyberbullying is a big problem, because they have experienced it themselves and can give some advices to the next generation. Another thing why this problem is so “popular” might be because of the young people are using their cell phones nonstop – and over 80% of the teens uses a cell phone regularly, making it the most common medium of cyberbullying. In article 1 several solutions...
Words: 643 - Pages: 3
...Bullies Need Therapy Not Punishment Bullies are not born, circumstances make bullies. Therefore why can bullies not be helped to make them better adults and have a brighter future? Everyone needs to understand the causes of bullying and try to help prevent it from the underlying cause. By punishing a bully, does that end the problem of bullying or result in more hatred and aggressiveness on part of the bully? “Since bullies are made, not born, rehabilitation is an attainable and preferable alternative to resorting to harsh reprimands or turning a blind eye” (Hanson). Bullying is a form of youth violence. It is an unwanted aggressive behaviour by one or a group of young persons. It is normally repeated frequently and affects the person physically, psychologically, socially, or educationally. Bullying can be in the form of physical, verbal or social aggression. Another form of bullying is cyber-bullying, which involves bullying through e-mail, a chat room, instant messaging, a website, text messaging, or videos or pictures posted on websites or sent through cell phones (Understanding Bullying - Fact Sheet). The first response to deal with a bully is normally to punish them. They are regarded as a ruthless, emotionless and bad person, who hurt others and therefore they cannot be helped. But most of the time, those bullies do not even realise the impact their behaviours are having on the victims. There are times when they have actually been victims of bullying themselves...
Words: 1428 - Pages: 6
...Cyberbullying and How Internet Privacy is Involved Abstract This paper is going to be about how cyberbullying and internet privacy go hand-in-hand with each other. Cyberbullying is the use of electronic communication, like the internet and social media websites and cell phones, to bully a person, usually sending hurtful or embarrassing messages to them (Helen Cowie, 2013). Many of the articles that are going to be using for this paper talk about the different ways cyberbullying affects teens and young adults and also how internet privacy plays a role in cyberbullying. There is an article from Bob Sullivan (2013) that talks about how internet privacy is a complicated issue and there are criminals who break into websites to steal personal information. Since people can get someone else’s personal information, that makes it easier for a cyberbully to create a fake profile on a social media site, and make fun of and belittle someone else. Keywords: Cyberbullying, electronic communication, Cyberbullying and How Internet Privacy is Involved Traditional face-to-face bullying has been identified as a risk factor for the social and emotional adjustment of perpetrators, targets, and bully victims during childhood and adolescence. Bullies have now found a new way to reach their targets, by cyberbullying. They now can go on the internet and social media websites or use their cell phone. With the bully being able to do this they have the power to reach their targets at any time...
Words: 2676 - Pages: 11
...Samantha Chavez Professor Shannon Lujan English 104 2 May 2013 Social Networking Sites The use of social networking sites have increased dramatically in the past years because of the new technology that is being introduced (Kris Gowen 245). There is a wide variety of age groups that join social networking sites but the majority are teenagers. Every parent has a rule on what age their children should be able to join a social networking site. I know a lot of parents that have allowed their 12 year old children get a Facebook but then there are some parents who do not allow it until they are 15 or 16 years old. It really depends on how responsible the child is. There are also other things parents need to take into consideration when they let their children join sites like Facebook or Twitter. The big one that a lot of parents first think about is the safety and security of their personal lives. There are so many dangerous people who pretend to be someone their not (Kim 13). This becomes a big problem for insecure teenage girls who need someone to make them feel special. It puts them in danger when someone they do not know is trying to pry into their personal lives. This will also make parents have second thoughts about letting their children get one of these sites unless they monitor them closely. My parents let me get a Facebook when I was 14 years old but they checked it every week to make sure I knew all my friends and I was not talking to anybody I was not supposed to be...
Words: 2194 - Pages: 9
...Final Essay Frank Gscheidle Mid- America Christian University Foundations of Ethics: The Life and Teachings of Paul Professor Kier 2 November 2013 With all the ills of society it is difficult to choose one. As different generation flourish, new social issues arise. The teaching of Paul can encompass and relate to most, if not all issues in today's society. For this essay I will focus on the issue of bullying. This particular issue has received some much needed attention in recent times and has even developed into a school program in many states. However, this is not a new issue; and in fact can be traced backed to biblical times. "For God gave us a spirit not of fear but of power and love and self-control" (2 Timothy 1:7 ESV). So what exactly is a bully? "One who is habitually cruel to others who are weaker" (Merriam, 2013). Bullying can be either physical or emotional in nature. Within that definition there are numerous forms that bullying can manifest. Bullying can take place at work from a boss, from a preacher in church, a parent at home, or in school. The remainder of this essay will focus on bullying in school and the victims it affects. As I researched this topic I was astounded by some of the statistics that have been compiled on bullying in our schools....
Words: 3449 - Pages: 14
...cyber-stalking. This also includes harassment over the internet. Many times cyber-stalking is performed by a jealous ex-boyfriend/girlfriend who becomes obsessive and unable to move on from the relationship. Sometimes this can be an adult posing as a child in an attempt to lure them to their home. This is a particularly dangerous form of cyber-stalking that has very potentially dangers outcomes. Many times these people go years without being caught because they cause the victim to be in fear of telling what happened and they often times return to the abuse. Another form of cyber-stalking is where someone “for fun” repeatedly sends malicious content to the victim attempting to scare them or hurt them. These different types of cyber-stalking are important for a parent to attempt to recognize because they can cause the victim to become scared to use their social media accounts. Cyber-bullying is another danger that lurks around social media sites that our children often become a victim of or even take part in. This has seen many growing...
Words: 1060 - Pages: 5
...instance, we can think about televisions or mobile phones. But we all know that television is not the first technology used to spread messages. “Media are the result of technology.” (Avery and McCain, 1982.) Day by day, new technologies are emerging and the “old” ones are being forgotten. This is what our modern-day world looks like. It’s constantly changing, moving, evolving… The innovation and models for creating and conveying media substance are always advancing. (Croteau, David, Hoynes, and Milam, 2003.) Media are also socialization agents. You learn about yourself and about your culture thanks to media. Media have evolved really quickly. Moreover, researchers' idea on media changed throughout the years, especially that Media has an important impact on our modern-day society. I- History of Media: 1- Evolution of the Media In 2010, Americans could turn on their TV and discover 24-hour news channels...
Words: 2901 - Pages: 12
...1) A computer is unique compared to any other machine because of its ability to ________. process large amounts of information simultaneously process complex math functions change its programming use many different types of software Score: 1 2) Bits are used to measure ________. storage capacity data transfer and Internet connection rates the size of files the amount of time a user is connected to the Internet Score: 1 3) The smallest, most lightweight, and inexpensive computer is the ________. notebook laptop netbook client Score: 0 4) Distributed computing distributes ________. the processing of tasks across a group of computers power ability across all users Internet usage across the entire network disk storage for all computer users Score: 1 5) Smartphones use ________ technology, allowing users to perform several functions with one device. embedded design invisible computing convergence grid computing Score: 1 6) The intersection of a row and a column in a spreadsheet is called a ________. field text cell record Score: 1 7) Shaynia has been working with her colleagues on a Word...
Words: 2580 - Pages: 11
...boring/irrelevant” * Migration from Facebook where all the parents and the police are to a more instant gratification like Snapchat (where there’s instantaneity and impermanency) * Younger generations may migrate to things like Snapchat because of the instant gratification and the impermanency of it all * A lot of people freak out over the “once I put it on FB or Twitter, I can never take it off” but Snapchat gives that false sense of security (self-destruct feature) which is why it’s often used for sexting * Social media fatigue – getting tired of social media * Leads to you taking a vacation from the site * But it’s really hard to do so cause FB is integrated into everyday event planning, decision making and networking * People who love FB the most are of course, the ones who are forbidden from it (12 year olds) * What is so compelling about Facebook when you’re 12? * Want to be like older kids * Want to have lots of friends * Fear of missing out * Why is social media so compelling for all ages? * It’s all about friends * A social network is nothing without friends even though it seems like it’s only about advertisements * What do we do...
Words: 6223 - Pages: 25
...The 2nd Indonesia International Conference on Human Capital and Knowledge Management (IC-HCKM 2015) Transition of Malaysia towards Knowledge Society by 2020: Ethical Consideration on the Use of Electronic Gadget in Malaysia Schools Nalni Devi Subramainama, Amizah Mohd Taffy Ganb, Devakumaran Rajamohanc a,b,c Master in Engineering Business Management Razak School of Engineering and Advanced Technology Universiti Teknologi Malaysia International Campus Kuala Lumpur, Malaysia Abstract Due to demands to full fill necessity of K-economy towards Vision 2020, Malaysia is now on the race to create more Information Technology (IT) literate. Education sector has been targeted to be an introduction sector to implement Information and Communication Technology (ICT) tools to advance learning and teaching processes. As such, Government of Malaysia has been working on few strategies to introduce electronic gadget applications in Malaysian schools to improve quality of education inclusively. In this study, we have conducted a survey to study the needs and acceptability of electronic gadgets such as mobile phones in schools, then analyzed outcome of survey accordingly. The result of the survey shows level of acceptance on the use of electronic gadget in schools and ethical consideration has been considered to decide best decision to overcome its negative impacts. Based on ethical consideration, the use of electronic gadgets in schools should be permitted as it brings more...
Words: 4314 - Pages: 18
...The World of Cybercrimes Cybercrimes are one of the most dangerous threats to our Nation. There are no boundaries when it comes to cybercrimes. A cybercrime is one of the fastest growing crime types of the century and includes criminal activity involving computers and the internet. Hacking a computer is not the only thing considered a cybercrime. Downloading movies and music illegally is also a cybercrime. Once thought as something that only the military or other government officials had to worry about, it is now on the rise since everyone has a computer and it is easy to find out how to hack into computer systems. With the rise of internet usage among businesses and private users, the risk of being a victim of cybercrime is huge. The Security Tracking Study performed by the Pomemon Institute states that 83 percent of multinational companies feel that within the past 12 months they have been a target of a cybercrime. Price Water House Coopers states that the number of businesses having a security breach is more along the lines of 92 percent. Cybercrimes are attacks on computer hardware and software, downloading illegal movies and music, online fraud involving financial crimes and corruption with an organization, crimes against children and the elderly, cyber bullying and fraudulent telemarketing events for charitable donations. What was once something only “hackers” did is now something anyone can do. The term hacker was originally described as “any technical effort...
Words: 8856 - Pages: 36