Cyberbullying on Social Networks
Kathlene Shinn
February 7th, 2015
Abstract Social Networking is a very big part of children, teenagers, adolescents and young adult’s lives. Social Networks have become a large part of these young adults social interaction with each other. Social interactions online can be considered the use of many different social networking sites such as Facebook, MySpace, and Twitter; gaming sites and virtual worlds such as Club Penguin, Second Life, and the Sims; video sites such as YouTube; and blogs. A very large and potentially very damaging issue with social networking and young adults is cyberbullying on social networks. Cyberbullying can lead to potentially damaging actions that can affect children, teens, adolescents, and young adults in a very negative way, therefore parents should become very aware of the nature of social media sites, given that not all of them are healthy environments for children, teens, adolescents, and young adults. This paper will explain cyberbullying on social networks along with the ins and outs of cyberbullying including legalities. There will be techniques to use to help prevent cyberbullying and also techniques for children that have already been victims to cyberbullying.
“Cyberbullying on Social Networks”
Introduction
What is cyberbullying? According to oxforddictionaries.com cyberbullying is, “use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature,”(2015). There are many definitions describing cyberbullying but for it to be “true” cyberbullying, these practices must meet several criteria. First a perpetrator intends to hurt a victim and the victim should perceive it as being hurtful and that is part of a repetitive pattern of negative offline or online actions. This should be performed in a relationship characterized by a power imbalance. It should be based on a real power criteria which is physical strength or age and/or an ICT-related criteria such as a technological know-how and anonymity, (Vandebosch, Van Cleemput, 2008).
Bullying on Social Media Now that we have defined cyberbullying we can determine what constitutes bullying on Social Media. Children, teens, adolescents, and young adults as well as mature adults use social media websites as a type of socializing with friends, family, and strangers online. It is one of the most used types of websites by teenagers and young adults. These websites are commonly used for both bad purposes and good. To understand which type of behavior constitutes social media bullying than it can help a parent and child determine if they have become a victim so that they can handle it appropriately. Many of these acts are similar to real-life bullying such as negative comments, abusiveness, and making fun of another person, however cyberbullying will consist of posting negative comments on the victim’s pictures, posting abusive posts to the victim’s wall, and the use of pictures or videos to make fun of the victim. The result of cyberbullying on a social media is similar to real-life bullying, (2014).
More Social Media Bullying One very popular social network site is Facebook and according to a report by the Washington Post nine out of ten users of Facebook have witnessed bullying on this particular social media site. According to nobully.com, “a report by Ditch the Label also showed that 54 percent of those surveyed claimed to experience bullying on this same site.”(2014). Teaching your children to restrict access through their Facebook profile to those they know and are close to does not protect them from bullying. People that care about your children have the capacity to hurt them. Other social networking sites are becoming the breeding ground for bullies and bullying behavior. Ask.FM has had a difficult time controlling and stopping serious bullying behavior problems amongst teenagers on this site. Of course SnapChat creates
Research papers are a common type of paper for students to write, especially when they are attending college. These papers require students to perform research, such as utilizing primary and secondary sources to draw new conclusions. For students who have not written this type of paper before, it may seem daunting. There are many free sample research papers online for those who want to see how to structure their paper and other details.Diane Hacker, an author who writes manuals for students writing…
Research Paper 1 How safe are the government facilities? Rebecca Leon Empire State University Business Continuity Planning and Disaster Recovery Diane Delucia April 01, 2015 Research Paper 2 On March 9th 2015 an email was sent out to every Army…
MONIL PATEL Prof. Maria .V. Luna Eng-101 Research paper IS ETHICAL HACKING ETHICAL? Abstracts: This paper investigates the ethics behind ethical hacking and whether there are issues that lie with this new field of work. Since ethical hacking has been a disputable subject over the recent years, the inquiry stays of the genuine aims of ethical programmers. The paper likewise takes a gander at routes in which future exploration could be investigated to help keep ethical hacking, ethical. The keywords−…
you commit yourself to. This way of thinking really reflects on the type of writing process I endure. While writing I really focus on how I want to identify myself, what questions I wish to discover, and how this idea might change me. To begin my paper I use an outline. On this outline at the top of the page I write my main topic that I wish to write about. After I have created the topic, I then write a list of ideas that relate to what I want to talk about. Out of the ten ideas I create I choose…
Research Paper MELKIA WATERS Mwaters17@capellauniversity.edu IT3006 PROF. JULIA KRUMMEN Nov. 10, 2013 Identifying Improved Methodology to Procure HIT Software Benefits Users Introduction Researchers conducted a study conducted at The University of Utah Healthcare system (comprising of 3 major hospitals) on the usability of their health information technology (HIT) software. Evaluators found 60 usability problems and 233 heuristic violations (Guo et al., 2011). Heuristic is defined by Oxford Dictionaries…
25099373 CNF15_3 Research Methods Research Proposal Word Count: 1210 A look into the Memory Retention: Can stimulants increase a person’s memory? A quantitative research proposal. For this research proposal, memory will be looked into to see whether a person’s memory can be increased via the intake of stimulants. This quantitative research will then look into whether there are any future benefits in consuming stimulants if memory is found to be increased. There is already research similar in nature…
cannot think or act on its own. There is currently no treatment for MLD, and because of that, Anthony has become what many people would consider a “vegetable”, essentially brain dead but still functioning bodily. His auburn hair is now ash gray and paper thin, his blue eyes no longer hold any gleam, he can no longer smile and his freckles are invisible. Because of this, because I really just cannot bear to witness another beautiful kid be destroyed by his own genotype and because its happening far…
Research Paper EDUC 600 Pamela Noble Dr. Albright Liberty University Abstract Billions of dollars are spent every year on psychologist, psychiatrist, and counselors only to discover that one of the key elements missing in their child is resiliency. Resiliency for the purpose of this study is defined as the appropriate personality such as strength and positive adaptation that help a person or family cope with stress or life difficulties, increasing the likelihood of…
Daniela Lopez Angie Temple English Composition II Research Paper Women human’s rights are violated daily around the world. No matter, the race or age many women endure mistreatment. Women in many countries like Saudi Arabia are not allowed to drive or simply go out without a male chaperone, or in Afghanistan who are imprisoned for “cheating” on their husbands. Women are subjected to rape and sexual abuse by co-workers, police officers, soldiers and family members. Girls in countries like China…
doesn't penalize them for taking full advantage of what's offered, whether it's flexibility or programs. 2 Why is work-life critical? We now know that work-life initiatives actually produce desired results for both employees and employers. Research tells us that a supportive workplace culture, together with a variety of programs, policy changes and flexible work practices, work to ease employers' pain. Why is it critical for your organization? The answer to that question may depend on what's…