Saturday, December 7, 2019
Critically Analyze Non-Profile Story On Cyberbullying - Samples
Question: Discuss about the Critically Analyze Non-Profile Story On Cyberbullying. Answer: Introduction The purpose of this paper is to critically analyze non-profile story on cyberbullying. In this report, we will analyze six aspects so as to come up with a concrete report. The six aspects to be considered in this report include the history behind the story, the scopes covered, reasons, impacts in terms of consequences of development, countermoves in terms of gathering and action of contrary forces. Lastly, we will analyze future in terms of what could have happened if cyberbullying rolls along unchecked. These aspects will be supported by statistical data. Typically, it is also known as cyber harassment (Richard, 2013). It is a form of harassment using electronic means, especially via the internet. This type of harassment is extremely common among teenagers. It involves bullying through threats, posting rumors, sexual remarks, use of projective labels and stigmatizing victims personal information. The non-profile story will revolve around the above types of harassment in line with th e six aspects. History In this report, we consider a story where victims have been exposed to traumatic experiences. Generally, bullying can be traced from ancient times where people were being harassed by superior individuals. Later, innovation in technology was made where information could be decoded and encoded via the internet through an electronic form. Cyberbullying emerged since individuals were able to access information relating to other people via an electronic form. Thus, bullying has been occurring in the past. The story in this report relates to a victim whose personal information has been accessed without his consent (Grummit, 2007). Through this access, personal information and confidential data have landed into a stake of other individuals who have been doing cyberbullying. This victim is so worried about his confidential data that seem to be jeopardized. Consequently, the main theme, in this case, involves cases where confidential information and data of the victim have been compromised. This form of harassment can be identified by an intent to harm and repeated behavior. Many cases have been reported in the media and different authors have written articles on the same. Some of these cases include the Ryan and Halligan Case (1989-2003), the Megan Meier Case (1992-2006), the cases of Jessica Logan (1990-2008) and Hope Witsell (1996-2009). We can also consider the Tyler Clement Case (1991-2010) and the Amanda Todd Case (1996-2012). There are many cases that have not been recorded in the media. Scope In this section, we consider several factors that revolve around the story. These factors include a qualitative factor, locale factor, diversity factor and perspective factor. We focus on analyzing each factor so as to have a clear understanding of the story. Perspective factor This factor considers cyberbullying as an advanced form of bullying where parties involved do not meet face to face unlike the traditional form of bullying. In this perspective, it is performed via cyberspace. This involves the use of internet and phones to bully individuals. This factor can be drawn from the case of Amada Wood of 1996 to 2012 (Rothfuss, 2008). According to this case, Amanda started to use video chat so that she could meet new friends online. In this case, a stranger asked Amanda to post a photo of her breasts on camera. Later on, the stranger used this photo to blackmail Amanda. Finally, the photo started circulating in many social networks. Therefore, a different perspective has been applied by strangers to expose confidential details concerning people. Quantitative factor This factor indicates that majority of young teenagers all over the globe have their personal phone. This implies that many of these teens can access online services on daily basis. They can access social media and social networking online. There are many platforms of social networking that expose individuals. According to statistics, millions of people are able to connect to online social networking on daily basis. This is just a proportion of the number of victims exposed. In addition, quantitative factor provides numerical outcomes from a judgment that can be measured. Therefore, a quantitative study can be conducted so as to determine the level of bullying in the population. This form of bullying affect both genders. For example, in 2010, it was recorded among 4,400 students (Klosterboer, 2011). The quantitative data indicate the level of technology used by victims, the level of victimization, offending among other aspects that occurred in 2010. From quantitative data above, it is very clear that cyberbullying has brought victimization in both genders. Locale factor This is another scope that can be considered. The story developed in this report can apply this factor to demonstrate various aspects. In this case, we realize that there are a number of impacts on victimization (Latham, 2010). This has made many countries to enact laws so as to protect individuals from victimization. Locale factor considers law enforcement procedures. These factors are considered in teens and adult cyberbullying. Diversity factors This factor considers different aspects. This is highly diversified in different forms based on social networking. Internet trolling is among the different diversities over the internet via an online platform. Another diversity is cyberstalking that applies electronic communication to stalk a victim. This process poses threats to victims and can result in serious consequences (Harding, 2014). However, not all negative interaction on social networks are attributed to cyberbullying. Some may arise from peer pressure and can result in positive, negative or neutral impacts to parties involved. Reasons In this section, we consider the analysis of economic, social, political, legal and psychological aspects. Economic There are a number of economic aspects that can be considered. There has been a dramatic increase over the past few years. It is estimated that 10-40% of teens have experienced cyberbullying (Woods, 2014). The use of social network generate billions of dollar each year. In that connection, there are some groups of cybercriminals whose main focus is to use this platform so as to victimize people and in return demand for money. Many people have lost money from this action in order to protect their personal identity. This affects the country economically. The chart below demonstrates how social networks have used a tool to steal money from affected parties. Social Social aspects have also been affected. A lot of information has been leaked through social networks. In that connection, some of the exposed victims end up losing social status. Criminals use this platform to blackmail and victimize individuals. They also use this platform to demand money and other resources. Individuals who are unable to meet the demands are exposed (Bob Dismondy, 2010). This destroys their social life. Many families have been exposed to social networks and this brings stress to family members. It also makes them extremely overwhelmed and many feel embarrassed. Socially, cyberbullying can result in low self-esteem, withdrawal from family matters where victims spend much of their time alone. It can cause the disappearance of friends or be excluded from participating in social events. Political It has been used excessively in political aspects. It is estimated that over 70% of the information in social media is directly or indirectly connected to political aspects. This increases the possibility of political perspectives. It is known that politicians hold high profile and status. Thus, cyberbullying to a politician would result in high level of recognition from perspective factor within the scope of cyberbullying (Thomas Harker, 2009). However, some of our policy changers accept it. They argue that freedom of speech can correspond to freedom of harm. Politicians with ideological differences would accept it if used against their rivals in politics. Psychological Again, it affects victims psychologically due to stigmatization and victimization. Therefore, it is very important to educate people on effects. Many people have committed suicide. Majority of suicidal deaths occur in young teenagers who may not have the courage to face consequences (Kowalski, Limber Agatston, 2012). In order to reduce cases of psychological disorders associated with cyberbullying, the law should be enforced to limit this crime. Victims should be treated with that available psychotherapy and psychopathology. Impacts Consequences of developing this story are associated with strategies that can be applied to limit the crime. Typically, it affects people from different points of view. It can affect people socially, politically, economically, culturally and psychologically. Therefore, by developing various aspects, it is possible to identify what needs to be done so as to reduce victimization and other negative aspects (Raatma, 2013). This reduces the number of cases reported in the media. Again, development of these aspects will educate people on the importance of protecting their personal information from access by strangers who can use the information to victimize them. Countermoves Despite the increase in legal aspects enforced to inhibit cyberbullying, the number of cases reported is increasing. In this section, we analyze the gathering and action of contrary forces that as applicable in the story. The recent statistic indicates that 5% self-harm is reported. Again, 3% of victims attempt suicide and 28% of teenagers have reported cases on Twitter (Patchin Hinduja, 2012). Moreover, the statistics show that over 20% of children and teenagers indicate fear of cyber bullies thus affecting their education. Other forces that expose people should be considered so as to reduce cases that affect people of all ages. Futures This is the last aspects to be considered in the story. In this case, we consider what could happen if cyberbullying rolls along unchecked. If this development is not considered by relevant stakeholders, then evil-minded individuals will continue using social media networks to bully people (Patchin Hinduja, 2011). This will increase negative impacts. Cases on these aspects will continue to increase thus limiting confidentiality of data. It is important to design mitigation strategies that can be implemented to reduce the alarming cases. The relevant law should also be set to inhibit this crime. Relevant authorities need to be empowered so as to control what happens in social networks. There should be a reasonable limit on how to use electronic materials that encourage cyberbullying. References Bob, S. Dismondy, M. (2010). The Juice Box Bully: Empowering Kids to Stand Up for Others. Early Learning Foundation. Grummit, A. (2007). Capacity Management. Van Haren Publishing Harding, A. (2014). Urban Theory. A Critical Introduction to Power, Cities and Urbanism in the 21st Century. Sage Publication Ltd. Klosterboer, L. (2011). ITIL Capacity Management. IBM Press. Kowalski, R.M., Limber, S.P. Agatston, P.W. (2012). Cyberbullying: Bullying in the Digital Age. Wiley-Blackwell. Latham, J. (2010). Java. Just in Time. College Publication. Patchin, J.W. Hinduja, S. (2011). Cyberbullying Prevention and Response: Expert Perspective. Routledge. Patchin, J.W. Hinduja, S. (2012). School Climate 2.0: Preventing Cyberbullying and Sexting One Classroom at a Time. Corwin. Raatma, L. (2013). Cyberbullying (True Books: Guides to Life). Scholastic. Raatma, L. (2013). Stop Bullying (True Books). Children Pr. Richard, A. (2013). Job Satisfaction from Herzbergs Two Factor Theory Perspective. Grin publishing. Rothfuss, P. (2008). The Name of the Wind. DAW Books. Thomas, P. Harker, L. (2009). Stop Picking On Me (A First Look At Bullying). Barrons Education Series. Woods, C. (2014). Tales from the Bully Box. Elephants Bookshelf Press.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.