Module 7 Assignment 2 Pp On Review Paper

390 views

Published on

Published in: Health & Medicine, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
390
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
4
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Harassing someone in a chat-room, with E-mail, text messagingInstant Messaging: Stalking, sending inappropriate and aggressive messages from one computer to another through IM contactStealing another person’s password to sabotage their online accounts or send messages from their accountImpersonating another person or creating a fake account and pretending to be some one else to cyberbully another Create a blogging site or post talking negatively about some one or insisting harm is to be done to themSending a virus to another person’s computer Sending inappropriate or embarrassing pictures of a person without their consent
  • Module 7 Assignment 2 Pp On Review Paper

    1. 1. Cyberbullying <br />Modernization of bullying, with a more severe impact<br />Meghan Vargo<br />PSY 492<br />Advanced Psychology<br />August 15, 2011<br />Professor Marie Dube<br />
    2. 2. Was the creation of the internet, the creation of Cyberbullying?<br />Cyberbullying is commonly considered a recent occurrence due to the advancement of social networking and technology.<br />However, in 1999, it was discovered that “Eric Harris had created a website conspicuous threats against fellow students’ in which was brought to the attention of police in which he was questioned by police.” This incident is being as an ‘early example of cyber bullying’” (Keith, 2005). <br />Creating websites about “Who’s hot or not” or a list of whom a person doesn’t like are also forms of Cyberbullying<br />Cyberbullying is defined as the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group that is intended to harm others; noting the absence of a power imbalance, suggesting online power is not a necessary component,” (Keith, 2005). <br />
    3. 3. Bullying is a part of growing up<br />Normal part of childhood?<br />The effects that Cyberbullying has on its victim is more intense and has had detrimental results. Because it is not the normal face-to-face style of insulting or tease, the instigator has no set boundaries, limitations or tangible consequences<br />
    4. 4. Forms of Cyberbullying <br />Chat-rooms<br />Instant Messaging<br />E-mail<br />Text messages<br />Stealing passwords<br />Impersonating another person on the internet<br />Blogging negatively<br />Sending compromising pictures or virus <br />
    5. 5. Real life or cyber?<br />Face-to-face bullying<br />Name calling<br />Pushing, hitting, slapping etc<br />Yelling at, threatening<br />If heard or seen by adult, punishment is enforced immediately- repercussions of actions are felt by instigator<br />Cyberbullying<br />Threats, hate messages, emotional abusive words sent electronically<br />No physical harm caused but emotional abuse<br />No immediate punishment or tangible consequences to be dealt with by instigator<br />Goes unreported by victim due to fear of internet privileges being taken away or threat not being taken seriously<br />Likely to go on for months, on a consistent basis<br />Has lead to teen suicide<br />
    6. 6. Harsh Reality<br />57% of students saying someone had said hurtful or angry things to them online 13% say it happens quite often. <br />53% admit to saying mean or hurtful things to someone online<br />7% admit to doing so ‘quite often’ <br />35% admit to being threatened online<br />5% admit to having been ‘quite often.’ 58% have not told a parent or another adult about experience online. <br />How common is Cyberbullying?<br />(National i-Safe Survey, 2004)<br />
    7. 7. Reasons for engaging in the act of Cyberbullying:<br />Perceive hostile internet in actions of others<br />React quicker to anger that others<br />Use force sooner <br />Hold to rigid beliefs<br />View image as way to power<br />Use aggressive action to protect their image<br />Control others through verbal threats and physical actions <br />Tend to have little empathy for victims problems<br />Impulsivity in adolescents <br />Act without considering consequences<br />Lack of perseverance<br />Sensation seeking<br />
    8. 8. Mean Girls in real life<br />Child Abuse Prevention Services (CAPS) has concluded girls use relational aggression, use relationships as weapons (targeting one girl in a virtual attack of gossip and hate messages or using a potential interest from a guy to tease or torture another student), as a popular form of cyber bullying attack. “These manipulation acts lead to social isolation.” (Fagin, 2004) <br />
    9. 9. Warning Signs<br />Australian Government concluded warning signs that a student is being Cyber Bullied:<br />Spending a lot of time on a computer<br />Having trouble sleeping or nightmares<br />Feeling depressed or crying with no apparent reason<br />Mood swings<br />Feeling unwell <br />Becoming anti-social <br />Falling behind in homework <br />(Campbell, 2005)<br />
    10. 10. Parent involvement<br />How to help your child<br />There is a large gap in how parents and kids relate to technology. <br />Parents need to be involved.<br />Know what your child is doing on the computer and how they use their cell phones<br />Teach children electronic communication etiquette and ensure they understand what is acceptable behavior. <br />Talk to kids about danger versus forbidding the use of technology<br />
    11. 11. References:<br />Agatston, P. (2007). Students’ Perspectives on Cyber Bullying. Journal of Adolescent Health, 41(6), S59-S60. doi: 10.1016/j.jadohealth.2007.09.003.<br />Anderson-Butcher, D., & Lasseigne, A., & Ball, A., & Brzozowski, M., & Lehnert, M., & McCormick, L. (2010). Adolescent Weblog Use: Risky or Protective? Child Adolescent Social Work J, 27, 63-77. doi: 10.1007/s10560-010-0193-x.<br />Bhat, C. (2008). Cyber Bullying: Overview and Strategies for School Counselors, Guidance Officers, and All School Personnel. Australian Journal of Guidance & Counseling, 18(1), 53-66. doi:10.1375/ajgc.18.1.53.<br />Campbell, M. (2005) Cyber Bullying: An Old Problem in a New Guise? Australian Journal of Guidance & Counseling, 15 (1), 68-76 doi: 10.1375/ajgc.15.1.68.<br />Cornell, D., & Mehta, S. (2011) Counselor Confirmation of Middle School Students Self-Reports of Bullying Victimization. Profession School Counseling. 14(4) Retrieved from: http://cehs15.unl.edu/cms/uploads/2-527-Cornell%20&%20Mehta%202011%20self%20reports%20of%20bullying%20Professional%20School%20Counseling.pdf.<br />Dooley, J., & Pyzalski, J., & Cross, D. (2009) Cyber bullying Versus Face-to-Face Bullying. Journal of Psychology, 217(4) 182-188 .doi: 10.1027/0044-3409.217.4.182.<br />Froese-Germain, B. (2009) Bullying in the Digital Age: Using Technology to Harass Students and Teachers. ProQuest Central, 17(4) 45 Retrieved from: http://www.policyalternatives.ca.<br />Keith, S., & Martin, M. (2005) Cyber-Bullying: Creating a Culture of Respect in a Cyber World. Crisis Prevention. 13(4) 224-228 Retrieved from: http://www.crisisprevention.com/Web-Resources/Cyber-Bullying--Creating-a-Culture-of-Respect-in-a.<br />Slovak, K., & Singer, J. (2011) School Social Workers’ Perceptions of Cyber bullying. Children & Schools. 33(1) 5. Retrieved from: http://www.ingentaconnect.com/content/nasw/cs/2011/00000033/00000001/art00002.<br />Smith, P., & Mahdavi, J., & Carvalho, M., & Fisher, S., & Russell, S., & Tippett, N. (2008) Cyberbullying: It’s Nature and Impact in Secondary School Pupils. Journal of Child Psychology and Psychiatry. 49(4) 376-285 doi: 10.111/j.1469-7610.2007.01846.x.<br />Spears, B., & Slee, P., & Owens, L., & Johnson, B. (2009) Behind the Scenes and Screens: Insight into the Human Dimension of Covert and Cyberbullying. Journal of Psychology. 217(4) 189-196 doi: 10.1027/0044-3409.217.4.189.<br />Wang, J., & Iannotti, R., & Nansel, T. (2009) School Bullying Among Adolescents in the United States: Physical, Verbal, Relational, and Cyber. Journal of Adolescent Health. 45(4) 368-375 doi: 10.1016/j.jadohealth.2009.03.021.<br />

    ×