SlideShare a Scribd company logo
1 of 16
Parker 1
Nameo Parker
Professor Munro
English 102-102
26 October 2017
Mobile Tech: Cellular Stranger Danger
It’s probably safe to say that most people can be accused of,
more often than not, peering down towards their mobile phones
fairly often throughout the day; to check for emails or status
updates or simply, just pass the time. It would be an unusual
sight to be practically anywhere, and not see someone looking
down toward a mobile device. Not surprisingly, “[t]he average
American spends nearly half a day staring at a screen;” nearly
eleven hours each day is spent consuming media; astonishingly,
this number was calculated on media usage only and didn’t
include time spent texting or taking pictures (Howard). Perhaps
one could admit, through the constant use of mobile devices,
complacency is becoming the new norm. Personal contact, good
listening skills and our physical/mental health are all affected
by the incessant need to stay updated and connected.
In the 1800's, a railroad construction worker by the name of
Phineas Gage, permanently damaged the left half of his brain,
the frontal lobe, when a large iron rod pierced through his cheek
and out of his skull: "Gage not only survived the incident but
also apparently never fully lost consciousness" (Guidotti).
Before the accident he was known as being "reliable,
systematic, and hardworking;" after the incident and the damage
to his frontal lobe, Gage became "impulsive" and neurotic in his
behavior (Guidotti). At the time, physicians didn't realize that
the frontal lobe is the area of the brain that is "responsible for
decoding and comprehending social interactions;" it is through
this area of the brain that we learn how to read numerous facial
cues and personal flair that one exhibits when interacting with
others (Margalit). In the early 1900's a psychosurgical
procedure called the prefrontal lobotomy was first performed on
humans. This "surgical operation separat[ed] the frontal brain
lobes from the thalamus to relieve extreme anxiety" and was
proclaimed a miracle cure for those suffering from mental
disease (Shaffer). Some fifty years later the lobotomy became
unpopular because "the operation caused mental deterioration"
and would eventually be replaced with chemical versions of
treatment; i.e., antipsychotic drugs, tranquilizers (Shaffer).
Over time, scientist have begun to realize that when replacing
real-life contact with symbols and text through a screen, the
capabilities of the brains frontal lobe lose effectiveness;
empathetic abilities dwindle and engaged interactions with real
people become more and more difficult. Some addicted tech
users have issues with depression and anxiety when having to
interact with a real human being; through constant engagement
with a screen and habitually less real-world interactions and
relationships, we are losing our abilities to care, to understand,
to feel emotion.
Is our desire to stay in touch and be in the know diminishing
other aspects of our life? Are we missing out on things that, a
decade ago, would have seemed important or meaningful in our
lives, because our heads are titled downward towards a glowing
screen more often than not? According to David Shenk, an
award-winning author and contributor for the New York Times,
“[w]hen it comes to information, it turns out that one can have
too much of a good thing. At a certain level of input. . .the glut
of information no longer adds to our quality of life, but instead
begins to cultivate stress, confusion, and even ignorance.”
Reasonably, being constantly plugged in is tuning people out.
New technology within handheld devices is becoming more
stimulating, more penetrating. Our constant tech use is not only
beginning to affect our brain differently, but our psyches as
well.
Social-media addicted youth are learning and behaving in ways
that were unrecognizable just a decade ago. By actively using
mobile devices as a springboard for creating and maintaining
relationships critical social lessons are being lost-through lack
of personal contact. Facial expressions, body language and tone
of voice are just a few of the important things that humans need
to experience in order practice empathy, as well as learning how
to interact with others in a meaningful way. When teens use
social media platforms and texting as their main source for
communicating and being in relationships, they are losing out
on affection, intimacy and the courage to express themselves for
who they really are-when not hiding behind a screen.
According to Dr. Sylvia Frejd, a professor and life coach in
Lynchburg, Virginia, “Since 2000, empathy is down 40 percent
among college students; narcissism is up 30 percent” (qtd. in
Clay). Frejd and her team made posters that said "Look Up!
Start a conversation. Think about it" (Clay). The posters were
put on the ground around her campus; Frejd felt that the
students were always looking down towards their phones
anyway, and decided that the ground would be the ideal place to
put the posters so they would be seen (Clay). Perhaps our
addiction to social media and mobile phones is creating more
spaces that are becoming "phone-friendly" and less
opportunities for casual conversation; sensations and
experiences are being lost because our heads are buried and
absorbed in a screen.
Today's children are losing out on important social interactions
as well; situations that teach them valuable lessons on empathy,
communication and problem-solving skills are being lost to
fast-paced, stimulating and stationary electronic devices. Levels
of childhood diabetes, obesity, sleep disorders, developmental
delays, as well as behavioral and attention disorders are only
rising; as more parent's resort to “electronic baby-sitters” to
care for their children in lieu of active engagement. Caregivers
are teaching children that the child’s needs and desires aren’t
important when they themselves are reluctant to look away from
their screens when a child desperately calls for their attention.
Some parents may mistakenly believe that when a child is in
front of a TV or computer they are gaining a better sense of
concentration; but in reality, just the opposite is happening. In
early ages, the over-stimulation of a glowing screen creates
desensitization, which in turn creates a need for high levels of
stimulation, this can then lead to less focus in school and within
interactions with others. In a report by the Alliance of
Childhood, matters of interest were proposed concerning
children and technology, "[c]hildren's lives are increasingly
filled with screen time rather than real time with nature, caring
adults. . . and play. Yet only real relationships, not virtual ones,
will inspire and prepare them to protect the Earth and all that
lives on it" ("Digital Technologies"). Today’s children are
simply relying on technology for the majority of their play; they
are spending less time outdoors playing and interacting with
other children and more time being entertained through a
screen.
The effect mobile devices have on families is coming with a
high price tag. Cyberbullying has affected the lives of numerous
youth and teens. According to Ernie Allen, chief executive
officer of the National Center for Missing & Exploited
Children:
“Cyberbullying” is the online version of the schoolyard bully's
hostile and repeated attacks, and its consequences can go
beyond the virtual world. Investigations into the suicides of
many cyberbullying targets have shown that harassment and
public shame inflicted by way of the Internet and its SNSs
[Social Networking Sites] played a major role in . . . young
people's decision to commit suicide. Laws and public education
campaigns have been enacted to counter these activities. Indeed,
policies and laws struggle to keep pace with the offline
repercussions of online activities. (Voss)
When children are allowed unlimited access to their mobile
devices and social media accounts one shouldn't be surprised if
or when a situation arises when the child feels they are being
pressured or attacked by someone from behind the screen.
Technology has been in homes for decades, but mobile tech
comes with us everywhere we go, even the dinner-table.
Signaling the kids to dinner has resigned to families texting
each other to let them know that their food is getting cold.
Family suppers no longer consist of conversations around the
table on the days happenings but rather, children watching
YouTube videos, teens scrolling their Instagram feed and
parents matching colored sweets while advancing through
Candy Crush.
From the twenty-four-hour workday to teens’ perpetual
distractions in the classroom, constant use of mobile devices is
affecting our mental and physical health. Tech overload can
damage and negatively impact many parts of one's life;
"increased levels of anxiety, short-term memory problems, poor
concentration and a reduction in your decision-making skills"
all cast a shadow over one's ability to successfully manage day
to day life, as well as make proactive decisions that allow us to
function as mindful and considerate members of our
communities (Shenk). Society is becoming more stationary in
our attempts to multitask our way into bigger salaries; the
compulsive desire to acquire more "likes" and "shares" and the
seemingly unfulfilled need to be connected. It is hard for
“smartphone-addicted” teens to form new memories and grasp
new material when they are distracted so easily by the constant
plings, dings and rings alerting them of every new social media
update.
Certainly, we have come a long way in regards to mobile
technology. Today's cell phones have opened up an entirely new
world of access to information that, just a decade ago, would
have been unimaginable. The young and old have harnessed the
convenience mobile tech has to offer and have powerfully used
it to their advantage. Although the world is now, literally, at our
fingertips, caution should be used when introducing these
powerful tools to today's youth; adults as well, should be aware
of the disadvantages of tech-overload and proceed mindfully.
Cell phone addiction can turn into a real problem that could
have enormous effects on future generations. Through the
excessive amount of time that so many people in today’s society
devote to staring down at their illuminated screens; the never-
ending interruptions, distracted drivers, negative impact on
personal contact and not-so-surprising health effects are just
some of the few albeit very important reasons we should
consider limiting our dependence on mobile technology.
Works Cited
Clay, Gregory. "Digital Detox in College." Diverse: Issues in
Higher Education, vol. 34, no. 9, 6/1/2017, pp. 21-23.
EBSCOhost,
delgado.idm.oclc.org/login?url=http://search.ebscohost.com/logi
n.aspx?direct=true&db=a9h&AN=123278826&site=ehost-live.
Accessed 28 Oct 2017.
"Digital Technologies." SAGE Key Concepts series: Key
Concepts in Early Childhood Education and Care, Cathy
Nutbrown, Sage UK, 2nd edition,2011. Credo Reference,
delgado.idm.oclc.org/loginurl=http://search.credoreference.com/
content/entry/sageukecec/digital_technologies/0?institutionId=4
94. Accessed 28 Oct 2017.
Guidotti, Tee L. "Phineas Gage and His Frontal Lobe—The
“American Crowbar Case”." Archives of Environmental &
Occupational Health, vol. 67, no. 4, Oct. 2012, pp. 249-250.
EBSCOhost, doi:10.1080/19338244.2012.722469. Accessed 27
Oct 2017.
Howard, Jacqueline. “Americans Devote More Than 10 Hours A
Day to Screen Time, and Growing.” CNN, 29 July 2016,
cnn.com/2016/06/30/health/americans-screen-time-
nielsen/index.html. Accessed 26 Oct 2017.
Margalit, Liraz. "What Screen Time Can Really Do to Kids'
Brains." Psychology Today, 17April 2016,
psychologytoday.com/blog/behind-online-
behavior/201604/what-screen-time-can-really-do-kids-brains.
Accessed 27 Oct 2017.
Shaffer, Helen B. "Human Engineering." Editorial Research
Reports 1971, vol. I, CQ Press, 1971, pp. 367-86. CQ
Researcher, 2 Nov. 2017,
library.cqpress.com/cqresearcher/cqresrre1971051900. Accessed
27 Oct 2017.
Shenk, David. "Information Overload, Concept of."
Encyclopedia of International Media and Communications,
Donald Johnston, Elsevier Science & Technology, 1st edition,
2003. Credo Reference,
delgado.idm.oclc.org/login?url=http://search.credoreference.co
m/content/entry/estimc/information_overload_concept_of/0?inst
itutionId=494. Accessed 26 Oct 2017.
Voss, Tanya M. "Social Networking." Global Social Issues: An
Encyclopedia, edited by Christopher G. Bates, and James
Ciment, Routledge, 1st edition, 2013. Credo Reference,
https://delgado.idm.oclc.org/login?url=http://search.credorefere
nce.com/content/entry/sharpesi/social_networking/0?institutionI
d=494. Accessed 29 Oct 2017.
Group Project
Group Project: presented with a problem involving multiple
agencies, the student assumes the agency role of The Chief
Criminal Prosecutor from the Office of the District Attorney
whose name is Raymond Burr and must devise a plan to identify
a collaborative, optimal solution. Individually, you will present
the Office of the District Attorney’s description, it’s
perspective and role, and research the available resources.
Phase1 – Agency Description The student will be assigned one
of the following criminal justice components to represent and
for which to serve as advocate:
Courts - Office of the District Attorney Raymond Burr
The student will submit a 3 page paper describing the function
and purpose of the designated criminal justice component and
how it interrelates to other components.
The background information for this assignment is below:
The Virtual Criminal Justice Alliance
For the past 11 months, the Virtual Police Department has
applied a variety of investigative resources and strategies and is
prepared to bring a number of criminal charges against the
members of the Very Bad Bike Club. These started out as
investigations of individual calls-for-service, complaints and
criminal investigations. They merged into a collective effort as
the pattern of activities and participants began to form. Based
on the investigations, the department believes it has probable
cause to arrest and charge nearly every one of the 63 VBBC
members for conspiracy to manufacture illegal drugs,
conspiracy to sell illegal drugs, and participation in a criminal
enterprise. Additionally, numerous individual VBBC members
can be charged with combinations of individual criminal
violations, including possession of illegal drugs, illegal
possession of firearms, robbery, attempted robbery, aggravated
assault, and attempted murder. Despite the confidence the Chief
of the VPD has in these cases, no information has been
conveyed to the Office of the District Attorney nor has there
been any involvement with the Grand Jury. As far as the Chief
of the Police is concerned, this is the chance to destroy the
VBBC once and for all.
The VBBC has plagued Virtual for over a decade. Efforts to
stop criminal activity by members of the VBBC have been made
almost exclusively by the police department, with little or no
support from the rest of the Virtual criminal justice system. In
the past most criminal charges brought to the Virtual
prosecutor’s office by police detectives have resulted in
outright dismissal for lack of probable cause or plea bargained
agreements that reduce potential felony charges to
misdemeanors with payable fines. There have been however,
two prior instances of massive arrests of VBBC
members. Approximately 7 years ago raids resulted in the
confiscation of drugs and weapons and the ultimate conviction
of 12 VBBC members. Six of these members are on parole and
still reside in Virtual; two others are currently in the county
detention center awaiting trial for new criminal charges and
four others are confined to the State prison near Virtual. A
similar sweep three years ago produced nearly identical
results. These sweeps appear to have been ineffective. In short,
the VBBC has a network of members in jail, in prison, on parole
in the community and free on the street. The current police
investigation has affirmed that all of these VBBC members are
in near constant communications with each other.
Robert “Buddy” Pole is the “president” of the VBBC. While
currently on parole for manufacturing methamphetamine, Buddy
Pole continues to orchestrate the criminal enterprise that is
VBBC. Provisions of his parole agreement that prohibit
association with known criminals have gone unenforced. Robert
Pole, Jr, (a.k.a. “Little Buddy” or “Bud Lite”) is currently in the
Virtual Detention Center awaiting trial for carrying a concealed
weapon. He seems to be in no hurry to make the affordable
bail. Jail officials believe he is trying to organize a drug
network within the jail. Two Detention Center correctional
officers were recently disciplined for attempting to smuggle cell
phones into the lock-up. It is believed they were destined for
Little Buddy’s use. The youngest member of the Pole family is
Patricia (a.k.a. “Tripper”). A chronic truant and trouble maker
in school, Tripper was suspected of providing marijuana to her
junior high school classmates and has continued the practice in
high school. At age 19 and legally an adult, she is just about to
complete her senior year of high school. Tripper’s collections of
miscreant friends, most of whom are VBBC members or
“wannabes”, congregate regularly around the Virtual Mall and
commercial centers. Her boyfriend, John Henry Maxwell
applied for a job as a Dunbar Security Force officer but was
rejected because of his record.
In order to rid the city of Virtual of this criminal gang, Virtual
Police Department Chief Clayton Moore called upon his
criminal justice partners:
The head of the Virtual Police Department VBBC task force,
Captain Jay Silverheels
The chief criminal prosecutor from the Office of the District
Attorney, Raymond Burr
The Security Chief of the state correctional facility, Major
Allen Irongates
The District Supervisor for the state department of parole,
Martha Street
The Operations Director of the Virtual Security Force, James
Dunbar
The Virtual Security Force, a private security company hired by
the Virtual Commercial Merchants Association to provide
security personnel, equipment, etc. to supplement the resources
of the Virtual Police Department in designated business and
commercial areas of the city. VSF personnel hold special police
commissions, have arrest authority on the property of their
clients and may or may not be armed depending on their
assignment and qualifications.
At their initial meeting Chief Moore made it clear to these
partners that they had a single goal, to end the reign of terror
emanating from the VBBC and victimizing Virtual’s
citizens. Clearly if there was any hope of success, each criminal
justice partner has to do their part for the collective good of
all. The Chief’s remarks were met with wholesale agreement. It
was decided the Virtual Criminal Justice Alliance would attack
the VBBC on two levels (1) the pursuit of the current police
investigations and prosecutions, and (2) a strategic plan to work
collaboratively to reduce crime in Virtual. When the initial
meeting adjourned Chief Moore had designated Captain
Siverheels as his delegate. He was not sure, however, that every
agency representative in the room felt his level of commitment
or truly understood the consequences of failure. He was also
curious as to what resources each “partner” was willing to bring
to this operation and what would be held back.
Major Irongate has her own issues with VBBC. Their presence
in the state prison has settled down what had previously been a
powder keg of gang-related unrest. VBBC has become the
dominate force in the prison. John “Jacky” Pole has been able to
get the warring national/international gang members in the
prison to suspend their violence and focus on drug-related
profits. With tensions simmering just below the surface,
Irongate knows the self-serving truce may be short lived. Major
Irongate was also asked to represent the Virtual Detention
Center. This facility holds arrestees awaiting a bail hearing,
denied bail prior to trial or in transitional housing from the state
prison to attend court. The jail also holds offenders serving
short sentences for convictions on misdemeanor charges. Nearly
all of the prison’s inmate population came through the
Detention Center and may return there to be available for court
appearances. Major Irongate is convinced that these “traveling”
inmates are being used as “mules” for drugs and contraband cell
phones.
Of the persons assembled by Chief Moore, only Dunbar
represents a commercial, profit-driven agency. Simply put,
these profits are the difference between the costs for the
security provided and the fees Dunbar charges. Dunbar is eager
to demonstrate a successful partnership with VPD and the
Virtual Commercial Merchants’ Association as a stepping stone
to contracts with larger jurisdictions. In any case, Dunbar’s
primary motivation is to make money.
Raymond Burr would applaud Chief Moore’s plan if he could,
but as a pragmatist he feels that this is a waste of time. He
understands, if no one else at the table does, that plea
bargaining is to only way the criminal justice system can do
business. He has also warned the chief before that his detectives
need additional training on establishing probable cause, proper
interrogation procedures, appropriate charging, etc. If the VPD
could get its act together he would love to prosecute a good
solid case against the VBBC, but prosecuting a “looser” case
will not solve the problem or help his own political ambitions.
The student will submit a 3 page paper describing the function
and purpose of the designated criminal justice component and
how it interrelates to other components.
The paper should be done in APA format with references
No directly quoted material may be used in this project paper.
Resources should be summarized or paraphrased with
appropriate in-text and Resource page citations.
Carter 1
Catina Carter
Sean Munro
English 102-WMA
3 March 2018
Annotated Bibliography
Duplechain, Rosalind. & Morris, Robert. School violence:
Reported school shootings
and making schools safer. Education. 135(2): 145-150.
As a result of high number of shooting in schools in the
United States, Duplechain and Morris conducted this research to
specifically identify behaviors and risk factors of school
shooters and how to create safer schools. From their article, the
risk and behavior factors include bullying around the school,
the individual, family and societies, past relationships traumas
and brain development. In creating safer schools, the article
purports that entry points to schools should be limited and
controlled, availing wireless panic alarms, strategically placing
telephones, establishing relationship between school officials
and law enforcement and parents should advocate for school
safety.
In an aim to determine ways that school shooting can be
stopped, the authors have managed to capture the audience by
touching their feelings while discussing individuals, family and
society. They also used the ethical dimension of mentioning
bullying. A lot of logic has also been utilized through citing
facts on shooting and giving recommendations thereafter. This
resource will be helpful in my essay by providing
comprehensive points on diagnosing why school shootings take
place as well as providing solutions for these factors.
Chaddock, Gail Russel. A radical step for school safety (Cover
story). Christian Science
Monitor. 2000,92(36). p. 1.
The article talks about how districts have begun to use
students’ psychological profiles to prevent violence in
classrooms. However, this is criticized as it may undermine the
learning climate in an institution. But since the shooting in
1999 in Littleton, Colo, administrators have prioritized the
safety of children in schools and have adopted the psychological
profiling. In some institutions though, it has been associated
with racial bias while a growing number of school officials
believe that profiling is very appropriate and necessary.
The arguments of authors are influenced by the ethics
behind the use of psychological profiling by most law
enforcement agencies in terms of fairness. The argument also
takes into account the use of emotion in describing school
violence so as to inspire the audience in accepting the new
system. This resource will contribute to my research by
introducing the use of psychological profiling of students as a
way of preventing classroom violence.
Harris, Elizabeth. Changes to tracking of school violence. New
York Times. 2016,
166(57446):25.
This article examines the important aspects of school
safety panning on violence in schools in United States so as to
establish safer schools. The article describes the national
mandate for safe school planning by passing the Safe School
Act 1994, putting the safety of schools first priority of the
major strategic commitments and development of school safety
plans. The authors also recommended various safety school
options which include general preventive security measures to
reduce the chances of violence occurring. In addition, the
authors have discussed strategies for staff preparation in
handling violence incidences.
The views in the article have been influenced by the
changing educational climate that has resulted to many
challenges. As well, the authors in this resource have used a
language that is quite appropriate for both the topic and the
audience and lastly, dwelling on the history of school violence
has influenced the remedies described by the author. This
resource is very essential for the study since it will help
understand the need to prevent violence in schools as well as
providing the relevant remedies.
Glasner, Barry. School violence: The fears, the facts. New York
Times. 1999, 148(51613):
21.
The main purpose of this article is describing the school
violence in United States way back in the 90s and how it has
been improved. From the article, before 1990s, the rate of
school shooting and violence was exhibiting a gradual increase
from time to time. This increased into the 90s when America
still witnessed a number of school violence. However, the safety
of students in schools is reestablishing due to the fundamental
juvenile justice system of separating jailed juvenile offenders
from adult criminals. This bill was introduced by Representative
Bill McCollum who believed that juveniles are not bad
criminals; they are just kids who should be protected from being
turned into worse criminals by the more experienced inmates.
Ethically, the arguments in this article were made with
respect to expertise in law with the use of perfect grammar. The
author used the experience and suffering of Juveniles to argue
the above case. Logically, the author used statistics of school
violence in United States to express why violence should be
prevented. This resource will contribute to my topic of study
since it contains information on how violence in schools has
been prevented in the past.
Works Cited
Chaddock, Gail Russel. A radical step for school safety (Cover
story). Christian Science
Monitor. 2000,92(36). p. 1.
Duplechain, Rosalind. & Morris, Robert. School violence:
Reported school shootings and
making schools safer. Education. 135(2): 145-150.
Duplechain, Rosalind. & Morris, Robert. School violence:
Reported school shootings and
making schools safer. Education. 135(2): 145-150.
Glasner, Barry. School violence: The fears, the facts. New York
Times. 1999, 148(51613):
21.
Harris, Elizabeth. Changes to tracking of school violence. New
York Times. 2016,
166(57446):25.

More Related Content

Similar to Parker 1Nameo ParkerProfessor MunroEnglish 102-10226 Oct.docx

Child welfare, risk & technology
Child welfare, risk & technologyChild welfare, risk & technology
Child welfare, risk & technologyDenaé van Niekerk
 
Technology creates social isolation and neurosis
Technology creates social isolation and neurosisTechnology creates social isolation and neurosis
Technology creates social isolation and neurosisMelanieWente
 
Interpersonal Communication
Interpersonal CommunicationInterpersonal Communication
Interpersonal CommunicationSlink Dominguez
 
Comm 303 50 final alpha
Comm 303 50 final alphaComm 303 50 final alpha
Comm 303 50 final alphaabcapp01
 
What Do You Need To Know For Marketing To Digital, Mobile And Social Teens?
What Do You Need To Know For Marketing To Digital, Mobile And Social Teens?What Do You Need To Know For Marketing To Digital, Mobile And Social Teens?
What Do You Need To Know For Marketing To Digital, Mobile And Social Teens?Dr. William J. Ward
 
Media and the_brain
Media and the_brainMedia and the_brain
Media and the_brainCMoondog
 
Impacts Of Social Media.docx
Impacts Of Social Media.docxImpacts Of Social Media.docx
Impacts Of Social Media.docxAanshiSrivastava2
 

Similar to Parker 1Nameo ParkerProfessor MunroEnglish 102-10226 Oct.docx (9)

Social
SocialSocial
Social
 
Child welfare, risk & technology
Child welfare, risk & technologyChild welfare, risk & technology
Child welfare, risk & technology
 
Technology creates social isolation and neurosis
Technology creates social isolation and neurosisTechnology creates social isolation and neurosis
Technology creates social isolation and neurosis
 
Interpersonal Communication
Interpersonal CommunicationInterpersonal Communication
Interpersonal Communication
 
Comm 303 50 final alpha
Comm 303 50 final alphaComm 303 50 final alpha
Comm 303 50 final alpha
 
What Do You Need To Know For Marketing To Digital, Mobile And Social Teens?
What Do You Need To Know For Marketing To Digital, Mobile And Social Teens?What Do You Need To Know For Marketing To Digital, Mobile And Social Teens?
What Do You Need To Know For Marketing To Digital, Mobile And Social Teens?
 
Media and the_brain
Media and the_brainMedia and the_brain
Media and the_brain
 
Impacts Of Social Media.docx
Impacts Of Social Media.docxImpacts Of Social Media.docx
Impacts Of Social Media.docx
 
Connecting Kids to Nature in the Digital Age
Connecting Kids to Nature in the Digital AgeConnecting Kids to Nature in the Digital Age
Connecting Kids to Nature in the Digital Age
 

More from danhaley45372

Your initial post should be 2-3 paragraphs in length.Inclu.docx
Your initial post should be 2-3 paragraphs in length.Inclu.docxYour initial post should be 2-3 paragraphs in length.Inclu.docx
Your initial post should be 2-3 paragraphs in length.Inclu.docxdanhaley45372
 
Your initial post should be made during Unit 2,  January 21st at 4.docx
Your initial post should be made during Unit 2,  January 21st at 4.docxYour initial post should be made during Unit 2,  January 21st at 4.docx
Your initial post should be made during Unit 2,  January 21st at 4.docxdanhaley45372
 
Your initial post should be at least 450+ words and in APA forma.docx
Your initial post should be at least 450+ words and in APA forma.docxYour initial post should be at least 450+ words and in APA forma.docx
Your initial post should be at least 450+ words and in APA forma.docxdanhaley45372
 
Your initial post should be made during Unit 2, january 21st at 4.docx
Your initial post should be made during Unit 2, january 21st at 4.docxYour initial post should be made during Unit 2, january 21st at 4.docx
Your initial post should be made during Unit 2, january 21st at 4.docxdanhaley45372
 
Your initial post should be made during, Submissions after this time.docx
Your initial post should be made during, Submissions after this time.docxYour initial post should be made during, Submissions after this time.docx
Your initial post should be made during, Submissions after this time.docxdanhaley45372
 
Your essay should address the following.(a) How  is the biologic.docx
Your essay should address the following.(a) How  is the biologic.docxYour essay should address the following.(a) How  is the biologic.docx
Your essay should address the following.(a) How  is the biologic.docxdanhaley45372
 
Your initial post is due by midnight (1159 PM) on Thursday. You mus.docx
Your initial post is due by midnight (1159 PM) on Thursday. You mus.docxYour initial post is due by midnight (1159 PM) on Thursday. You mus.docx
Your initial post is due by midnight (1159 PM) on Thursday. You mus.docxdanhaley45372
 
Your individual sub-topic written (MIN of 1, MAX 3 pages)You.docx
Your individual sub-topic written (MIN of 1, MAX 3 pages)You.docxYour individual sub-topic written (MIN of 1, MAX 3 pages)You.docx
Your individual sub-topic written (MIN of 1, MAX 3 pages)You.docxdanhaley45372
 
Your HR project to develop a centralized model of deliveri.docx
Your HR project to develop a centralized model of deliveri.docxYour HR project to develop a centralized model of deliveri.docx
Your HR project to develop a centralized model of deliveri.docxdanhaley45372
 
Your Immersion Project for this course is essentially ethnographic r.docx
Your Immersion Project for this course is essentially ethnographic r.docxYour Immersion Project for this course is essentially ethnographic r.docx
Your Immersion Project for this course is essentially ethnographic r.docxdanhaley45372
 
Your country just overthrew its dictator, and you are the newly .docx
Your country just overthrew its dictator, and you are the newly .docxYour country just overthrew its dictator, and you are the newly .docx
Your country just overthrew its dictator, and you are the newly .docxdanhaley45372
 
Your have been contracted by HealthFirst Hospital Foundation (HHF),.docx
Your have been contracted by HealthFirst Hospital Foundation (HHF),.docxYour have been contracted by HealthFirst Hospital Foundation (HHF),.docx
Your have been contracted by HealthFirst Hospital Foundation (HHF),.docxdanhaley45372
 
Your group presentationWhat you need to do.docx
Your group presentationWhat you need to do.docxYour group presentationWhat you need to do.docx
Your group presentationWhat you need to do.docxdanhaley45372
 
Your contribution(s) must add significant information to the dis.docx
Your contribution(s) must add significant information to the dis.docxYour contribution(s) must add significant information to the dis.docx
Your contribution(s) must add significant information to the dis.docxdanhaley45372
 
Your good friends have just adopted a four-year-old child. At th.docx
Your good friends have just adopted a four-year-old child. At th.docxYour good friends have just adopted a four-year-old child. At th.docx
Your good friends have just adopted a four-year-old child. At th.docxdanhaley45372
 
Your good friends have just adopted a four-year-old child. At this p.docx
Your good friends have just adopted a four-year-old child. At this p.docxYour good friends have just adopted a four-year-old child. At this p.docx
Your good friends have just adopted a four-year-old child. At this p.docxdanhaley45372
 
Your goals as the IT architect and IT security specialist are to.docx
Your goals as the IT architect and IT security specialist are to.docxYour goals as the IT architect and IT security specialist are to.docx
Your goals as the IT architect and IT security specialist are to.docxdanhaley45372
 
Your essay should address the following problem.(a) What is .docx
Your essay should address the following problem.(a) What is .docxYour essay should address the following problem.(a) What is .docx
Your essay should address the following problem.(a) What is .docxdanhaley45372
 
Your future financial needs will be based on the income you can reas.docx
Your future financial needs will be based on the income you can reas.docxYour future financial needs will be based on the income you can reas.docx
Your future financial needs will be based on the income you can reas.docxdanhaley45372
 
Your friend Lydia is having difficulty taking in the informati.docx
Your friend Lydia is having difficulty taking in the informati.docxYour friend Lydia is having difficulty taking in the informati.docx
Your friend Lydia is having difficulty taking in the informati.docxdanhaley45372
 

More from danhaley45372 (20)

Your initial post should be 2-3 paragraphs in length.Inclu.docx
Your initial post should be 2-3 paragraphs in length.Inclu.docxYour initial post should be 2-3 paragraphs in length.Inclu.docx
Your initial post should be 2-3 paragraphs in length.Inclu.docx
 
Your initial post should be made during Unit 2,  January 21st at 4.docx
Your initial post should be made during Unit 2,  January 21st at 4.docxYour initial post should be made during Unit 2,  January 21st at 4.docx
Your initial post should be made during Unit 2,  January 21st at 4.docx
 
Your initial post should be at least 450+ words and in APA forma.docx
Your initial post should be at least 450+ words and in APA forma.docxYour initial post should be at least 450+ words and in APA forma.docx
Your initial post should be at least 450+ words and in APA forma.docx
 
Your initial post should be made during Unit 2, january 21st at 4.docx
Your initial post should be made during Unit 2, january 21st at 4.docxYour initial post should be made during Unit 2, january 21st at 4.docx
Your initial post should be made during Unit 2, january 21st at 4.docx
 
Your initial post should be made during, Submissions after this time.docx
Your initial post should be made during, Submissions after this time.docxYour initial post should be made during, Submissions after this time.docx
Your initial post should be made during, Submissions after this time.docx
 
Your essay should address the following.(a) How  is the biologic.docx
Your essay should address the following.(a) How  is the biologic.docxYour essay should address the following.(a) How  is the biologic.docx
Your essay should address the following.(a) How  is the biologic.docx
 
Your initial post is due by midnight (1159 PM) on Thursday. You mus.docx
Your initial post is due by midnight (1159 PM) on Thursday. You mus.docxYour initial post is due by midnight (1159 PM) on Thursday. You mus.docx
Your initial post is due by midnight (1159 PM) on Thursday. You mus.docx
 
Your individual sub-topic written (MIN of 1, MAX 3 pages)You.docx
Your individual sub-topic written (MIN of 1, MAX 3 pages)You.docxYour individual sub-topic written (MIN of 1, MAX 3 pages)You.docx
Your individual sub-topic written (MIN of 1, MAX 3 pages)You.docx
 
Your HR project to develop a centralized model of deliveri.docx
Your HR project to develop a centralized model of deliveri.docxYour HR project to develop a centralized model of deliveri.docx
Your HR project to develop a centralized model of deliveri.docx
 
Your Immersion Project for this course is essentially ethnographic r.docx
Your Immersion Project for this course is essentially ethnographic r.docxYour Immersion Project for this course is essentially ethnographic r.docx
Your Immersion Project for this course is essentially ethnographic r.docx
 
Your country just overthrew its dictator, and you are the newly .docx
Your country just overthrew its dictator, and you are the newly .docxYour country just overthrew its dictator, and you are the newly .docx
Your country just overthrew its dictator, and you are the newly .docx
 
Your have been contracted by HealthFirst Hospital Foundation (HHF),.docx
Your have been contracted by HealthFirst Hospital Foundation (HHF),.docxYour have been contracted by HealthFirst Hospital Foundation (HHF),.docx
Your have been contracted by HealthFirst Hospital Foundation (HHF),.docx
 
Your group presentationWhat you need to do.docx
Your group presentationWhat you need to do.docxYour group presentationWhat you need to do.docx
Your group presentationWhat you need to do.docx
 
Your contribution(s) must add significant information to the dis.docx
Your contribution(s) must add significant information to the dis.docxYour contribution(s) must add significant information to the dis.docx
Your contribution(s) must add significant information to the dis.docx
 
Your good friends have just adopted a four-year-old child. At th.docx
Your good friends have just adopted a four-year-old child. At th.docxYour good friends have just adopted a four-year-old child. At th.docx
Your good friends have just adopted a four-year-old child. At th.docx
 
Your good friends have just adopted a four-year-old child. At this p.docx
Your good friends have just adopted a four-year-old child. At this p.docxYour good friends have just adopted a four-year-old child. At this p.docx
Your good friends have just adopted a four-year-old child. At this p.docx
 
Your goals as the IT architect and IT security specialist are to.docx
Your goals as the IT architect and IT security specialist are to.docxYour goals as the IT architect and IT security specialist are to.docx
Your goals as the IT architect and IT security specialist are to.docx
 
Your essay should address the following problem.(a) What is .docx
Your essay should address the following problem.(a) What is .docxYour essay should address the following problem.(a) What is .docx
Your essay should address the following problem.(a) What is .docx
 
Your future financial needs will be based on the income you can reas.docx
Your future financial needs will be based on the income you can reas.docxYour future financial needs will be based on the income you can reas.docx
Your future financial needs will be based on the income you can reas.docx
 
Your friend Lydia is having difficulty taking in the informati.docx
Your friend Lydia is having difficulty taking in the informati.docxYour friend Lydia is having difficulty taking in the informati.docx
Your friend Lydia is having difficulty taking in the informati.docx
 

Recently uploaded

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

Parker 1Nameo ParkerProfessor MunroEnglish 102-10226 Oct.docx

  • 1. Parker 1 Nameo Parker Professor Munro English 102-102 26 October 2017 Mobile Tech: Cellular Stranger Danger It’s probably safe to say that most people can be accused of, more often than not, peering down towards their mobile phones fairly often throughout the day; to check for emails or status updates or simply, just pass the time. It would be an unusual sight to be practically anywhere, and not see someone looking down toward a mobile device. Not surprisingly, “[t]he average American spends nearly half a day staring at a screen;” nearly eleven hours each day is spent consuming media; astonishingly, this number was calculated on media usage only and didn’t include time spent texting or taking pictures (Howard). Perhaps one could admit, through the constant use of mobile devices, complacency is becoming the new norm. Personal contact, good listening skills and our physical/mental health are all affected by the incessant need to stay updated and connected. In the 1800's, a railroad construction worker by the name of Phineas Gage, permanently damaged the left half of his brain, the frontal lobe, when a large iron rod pierced through his cheek and out of his skull: "Gage not only survived the incident but also apparently never fully lost consciousness" (Guidotti). Before the accident he was known as being "reliable, systematic, and hardworking;" after the incident and the damage to his frontal lobe, Gage became "impulsive" and neurotic in his behavior (Guidotti). At the time, physicians didn't realize that the frontal lobe is the area of the brain that is "responsible for decoding and comprehending social interactions;" it is through this area of the brain that we learn how to read numerous facial cues and personal flair that one exhibits when interacting with
  • 2. others (Margalit). In the early 1900's a psychosurgical procedure called the prefrontal lobotomy was first performed on humans. This "surgical operation separat[ed] the frontal brain lobes from the thalamus to relieve extreme anxiety" and was proclaimed a miracle cure for those suffering from mental disease (Shaffer). Some fifty years later the lobotomy became unpopular because "the operation caused mental deterioration" and would eventually be replaced with chemical versions of treatment; i.e., antipsychotic drugs, tranquilizers (Shaffer). Over time, scientist have begun to realize that when replacing real-life contact with symbols and text through a screen, the capabilities of the brains frontal lobe lose effectiveness; empathetic abilities dwindle and engaged interactions with real people become more and more difficult. Some addicted tech users have issues with depression and anxiety when having to interact with a real human being; through constant engagement with a screen and habitually less real-world interactions and relationships, we are losing our abilities to care, to understand, to feel emotion. Is our desire to stay in touch and be in the know diminishing other aspects of our life? Are we missing out on things that, a decade ago, would have seemed important or meaningful in our lives, because our heads are titled downward towards a glowing screen more often than not? According to David Shenk, an award-winning author and contributor for the New York Times, “[w]hen it comes to information, it turns out that one can have too much of a good thing. At a certain level of input. . .the glut of information no longer adds to our quality of life, but instead begins to cultivate stress, confusion, and even ignorance.” Reasonably, being constantly plugged in is tuning people out. New technology within handheld devices is becoming more stimulating, more penetrating. Our constant tech use is not only beginning to affect our brain differently, but our psyches as well. Social-media addicted youth are learning and behaving in ways that were unrecognizable just a decade ago. By actively using
  • 3. mobile devices as a springboard for creating and maintaining relationships critical social lessons are being lost-through lack of personal contact. Facial expressions, body language and tone of voice are just a few of the important things that humans need to experience in order practice empathy, as well as learning how to interact with others in a meaningful way. When teens use social media platforms and texting as their main source for communicating and being in relationships, they are losing out on affection, intimacy and the courage to express themselves for who they really are-when not hiding behind a screen. According to Dr. Sylvia Frejd, a professor and life coach in Lynchburg, Virginia, “Since 2000, empathy is down 40 percent among college students; narcissism is up 30 percent” (qtd. in Clay). Frejd and her team made posters that said "Look Up! Start a conversation. Think about it" (Clay). The posters were put on the ground around her campus; Frejd felt that the students were always looking down towards their phones anyway, and decided that the ground would be the ideal place to put the posters so they would be seen (Clay). Perhaps our addiction to social media and mobile phones is creating more spaces that are becoming "phone-friendly" and less opportunities for casual conversation; sensations and experiences are being lost because our heads are buried and absorbed in a screen. Today's children are losing out on important social interactions as well; situations that teach them valuable lessons on empathy, communication and problem-solving skills are being lost to fast-paced, stimulating and stationary electronic devices. Levels of childhood diabetes, obesity, sleep disorders, developmental delays, as well as behavioral and attention disorders are only rising; as more parent's resort to “electronic baby-sitters” to care for their children in lieu of active engagement. Caregivers are teaching children that the child’s needs and desires aren’t important when they themselves are reluctant to look away from their screens when a child desperately calls for their attention. Some parents may mistakenly believe that when a child is in
  • 4. front of a TV or computer they are gaining a better sense of concentration; but in reality, just the opposite is happening. In early ages, the over-stimulation of a glowing screen creates desensitization, which in turn creates a need for high levels of stimulation, this can then lead to less focus in school and within interactions with others. In a report by the Alliance of Childhood, matters of interest were proposed concerning children and technology, "[c]hildren's lives are increasingly filled with screen time rather than real time with nature, caring adults. . . and play. Yet only real relationships, not virtual ones, will inspire and prepare them to protect the Earth and all that lives on it" ("Digital Technologies"). Today’s children are simply relying on technology for the majority of their play; they are spending less time outdoors playing and interacting with other children and more time being entertained through a screen. The effect mobile devices have on families is coming with a high price tag. Cyberbullying has affected the lives of numerous youth and teens. According to Ernie Allen, chief executive officer of the National Center for Missing & Exploited Children: “Cyberbullying” is the online version of the schoolyard bully's hostile and repeated attacks, and its consequences can go beyond the virtual world. Investigations into the suicides of many cyberbullying targets have shown that harassment and public shame inflicted by way of the Internet and its SNSs [Social Networking Sites] played a major role in . . . young people's decision to commit suicide. Laws and public education campaigns have been enacted to counter these activities. Indeed, policies and laws struggle to keep pace with the offline repercussions of online activities. (Voss) When children are allowed unlimited access to their mobile devices and social media accounts one shouldn't be surprised if or when a situation arises when the child feels they are being pressured or attacked by someone from behind the screen.
  • 5. Technology has been in homes for decades, but mobile tech comes with us everywhere we go, even the dinner-table. Signaling the kids to dinner has resigned to families texting each other to let them know that their food is getting cold. Family suppers no longer consist of conversations around the table on the days happenings but rather, children watching YouTube videos, teens scrolling their Instagram feed and parents matching colored sweets while advancing through Candy Crush. From the twenty-four-hour workday to teens’ perpetual distractions in the classroom, constant use of mobile devices is affecting our mental and physical health. Tech overload can damage and negatively impact many parts of one's life; "increased levels of anxiety, short-term memory problems, poor concentration and a reduction in your decision-making skills" all cast a shadow over one's ability to successfully manage day to day life, as well as make proactive decisions that allow us to function as mindful and considerate members of our communities (Shenk). Society is becoming more stationary in our attempts to multitask our way into bigger salaries; the compulsive desire to acquire more "likes" and "shares" and the seemingly unfulfilled need to be connected. It is hard for “smartphone-addicted” teens to form new memories and grasp new material when they are distracted so easily by the constant plings, dings and rings alerting them of every new social media update. Certainly, we have come a long way in regards to mobile technology. Today's cell phones have opened up an entirely new world of access to information that, just a decade ago, would have been unimaginable. The young and old have harnessed the convenience mobile tech has to offer and have powerfully used it to their advantage. Although the world is now, literally, at our fingertips, caution should be used when introducing these powerful tools to today's youth; adults as well, should be aware of the disadvantages of tech-overload and proceed mindfully. Cell phone addiction can turn into a real problem that could
  • 6. have enormous effects on future generations. Through the excessive amount of time that so many people in today’s society devote to staring down at their illuminated screens; the never- ending interruptions, distracted drivers, negative impact on personal contact and not-so-surprising health effects are just some of the few albeit very important reasons we should consider limiting our dependence on mobile technology. Works Cited Clay, Gregory. "Digital Detox in College." Diverse: Issues in Higher Education, vol. 34, no. 9, 6/1/2017, pp. 21-23. EBSCOhost, delgado.idm.oclc.org/login?url=http://search.ebscohost.com/logi n.aspx?direct=true&db=a9h&AN=123278826&site=ehost-live. Accessed 28 Oct 2017. "Digital Technologies." SAGE Key Concepts series: Key Concepts in Early Childhood Education and Care, Cathy Nutbrown, Sage UK, 2nd edition,2011. Credo Reference, delgado.idm.oclc.org/loginurl=http://search.credoreference.com/ content/entry/sageukecec/digital_technologies/0?institutionId=4 94. Accessed 28 Oct 2017. Guidotti, Tee L. "Phineas Gage and His Frontal Lobe—The “American Crowbar Case”." Archives of Environmental & Occupational Health, vol. 67, no. 4, Oct. 2012, pp. 249-250. EBSCOhost, doi:10.1080/19338244.2012.722469. Accessed 27
  • 7. Oct 2017. Howard, Jacqueline. “Americans Devote More Than 10 Hours A Day to Screen Time, and Growing.” CNN, 29 July 2016, cnn.com/2016/06/30/health/americans-screen-time- nielsen/index.html. Accessed 26 Oct 2017. Margalit, Liraz. "What Screen Time Can Really Do to Kids' Brains." Psychology Today, 17April 2016, psychologytoday.com/blog/behind-online- behavior/201604/what-screen-time-can-really-do-kids-brains. Accessed 27 Oct 2017. Shaffer, Helen B. "Human Engineering." Editorial Research Reports 1971, vol. I, CQ Press, 1971, pp. 367-86. CQ Researcher, 2 Nov. 2017, library.cqpress.com/cqresearcher/cqresrre1971051900. Accessed 27 Oct 2017. Shenk, David. "Information Overload, Concept of." Encyclopedia of International Media and Communications, Donald Johnston, Elsevier Science & Technology, 1st edition, 2003. Credo Reference, delgado.idm.oclc.org/login?url=http://search.credoreference.co m/content/entry/estimc/information_overload_concept_of/0?inst itutionId=494. Accessed 26 Oct 2017. Voss, Tanya M. "Social Networking." Global Social Issues: An Encyclopedia, edited by Christopher G. Bates, and James Ciment, Routledge, 1st edition, 2013. Credo Reference, https://delgado.idm.oclc.org/login?url=http://search.credorefere nce.com/content/entry/sharpesi/social_networking/0?institutionI d=494. Accessed 29 Oct 2017.
  • 8. Group Project Group Project: presented with a problem involving multiple agencies, the student assumes the agency role of The Chief Criminal Prosecutor from the Office of the District Attorney whose name is Raymond Burr and must devise a plan to identify a collaborative, optimal solution. Individually, you will present the Office of the District Attorney’s description, it’s perspective and role, and research the available resources. Phase1 – Agency Description The student will be assigned one of the following criminal justice components to represent and for which to serve as advocate: Courts - Office of the District Attorney Raymond Burr The student will submit a 3 page paper describing the function and purpose of the designated criminal justice component and how it interrelates to other components.
  • 9. The background information for this assignment is below: The Virtual Criminal Justice Alliance For the past 11 months, the Virtual Police Department has applied a variety of investigative resources and strategies and is prepared to bring a number of criminal charges against the members of the Very Bad Bike Club. These started out as investigations of individual calls-for-service, complaints and criminal investigations. They merged into a collective effort as the pattern of activities and participants began to form. Based on the investigations, the department believes it has probable cause to arrest and charge nearly every one of the 63 VBBC members for conspiracy to manufacture illegal drugs, conspiracy to sell illegal drugs, and participation in a criminal enterprise. Additionally, numerous individual VBBC members can be charged with combinations of individual criminal violations, including possession of illegal drugs, illegal possession of firearms, robbery, attempted robbery, aggravated assault, and attempted murder. Despite the confidence the Chief of the VPD has in these cases, no information has been conveyed to the Office of the District Attorney nor has there been any involvement with the Grand Jury. As far as the Chief of the Police is concerned, this is the chance to destroy the VBBC once and for all. The VBBC has plagued Virtual for over a decade. Efforts to stop criminal activity by members of the VBBC have been made almost exclusively by the police department, with little or no support from the rest of the Virtual criminal justice system. In the past most criminal charges brought to the Virtual prosecutor’s office by police detectives have resulted in outright dismissal for lack of probable cause or plea bargained agreements that reduce potential felony charges to misdemeanors with payable fines. There have been however, two prior instances of massive arrests of VBBC members. Approximately 7 years ago raids resulted in the confiscation of drugs and weapons and the ultimate conviction
  • 10. of 12 VBBC members. Six of these members are on parole and still reside in Virtual; two others are currently in the county detention center awaiting trial for new criminal charges and four others are confined to the State prison near Virtual. A similar sweep three years ago produced nearly identical results. These sweeps appear to have been ineffective. In short, the VBBC has a network of members in jail, in prison, on parole in the community and free on the street. The current police investigation has affirmed that all of these VBBC members are in near constant communications with each other. Robert “Buddy” Pole is the “president” of the VBBC. While currently on parole for manufacturing methamphetamine, Buddy Pole continues to orchestrate the criminal enterprise that is VBBC. Provisions of his parole agreement that prohibit association with known criminals have gone unenforced. Robert Pole, Jr, (a.k.a. “Little Buddy” or “Bud Lite”) is currently in the Virtual Detention Center awaiting trial for carrying a concealed weapon. He seems to be in no hurry to make the affordable bail. Jail officials believe he is trying to organize a drug network within the jail. Two Detention Center correctional officers were recently disciplined for attempting to smuggle cell phones into the lock-up. It is believed they were destined for Little Buddy’s use. The youngest member of the Pole family is Patricia (a.k.a. “Tripper”). A chronic truant and trouble maker in school, Tripper was suspected of providing marijuana to her junior high school classmates and has continued the practice in high school. At age 19 and legally an adult, she is just about to complete her senior year of high school. Tripper’s collections of miscreant friends, most of whom are VBBC members or “wannabes”, congregate regularly around the Virtual Mall and commercial centers. Her boyfriend, John Henry Maxwell applied for a job as a Dunbar Security Force officer but was rejected because of his record. In order to rid the city of Virtual of this criminal gang, Virtual Police Department Chief Clayton Moore called upon his criminal justice partners:
  • 11. The head of the Virtual Police Department VBBC task force, Captain Jay Silverheels The chief criminal prosecutor from the Office of the District Attorney, Raymond Burr The Security Chief of the state correctional facility, Major Allen Irongates The District Supervisor for the state department of parole, Martha Street The Operations Director of the Virtual Security Force, James Dunbar The Virtual Security Force, a private security company hired by the Virtual Commercial Merchants Association to provide security personnel, equipment, etc. to supplement the resources of the Virtual Police Department in designated business and commercial areas of the city. VSF personnel hold special police commissions, have arrest authority on the property of their clients and may or may not be armed depending on their assignment and qualifications. At their initial meeting Chief Moore made it clear to these partners that they had a single goal, to end the reign of terror emanating from the VBBC and victimizing Virtual’s citizens. Clearly if there was any hope of success, each criminal justice partner has to do their part for the collective good of all. The Chief’s remarks were met with wholesale agreement. It was decided the Virtual Criminal Justice Alliance would attack the VBBC on two levels (1) the pursuit of the current police investigations and prosecutions, and (2) a strategic plan to work collaboratively to reduce crime in Virtual. When the initial meeting adjourned Chief Moore had designated Captain Siverheels as his delegate. He was not sure, however, that every agency representative in the room felt his level of commitment or truly understood the consequences of failure. He was also curious as to what resources each “partner” was willing to bring to this operation and what would be held back. Major Irongate has her own issues with VBBC. Their presence in the state prison has settled down what had previously been a
  • 12. powder keg of gang-related unrest. VBBC has become the dominate force in the prison. John “Jacky” Pole has been able to get the warring national/international gang members in the prison to suspend their violence and focus on drug-related profits. With tensions simmering just below the surface, Irongate knows the self-serving truce may be short lived. Major Irongate was also asked to represent the Virtual Detention Center. This facility holds arrestees awaiting a bail hearing, denied bail prior to trial or in transitional housing from the state prison to attend court. The jail also holds offenders serving short sentences for convictions on misdemeanor charges. Nearly all of the prison’s inmate population came through the Detention Center and may return there to be available for court appearances. Major Irongate is convinced that these “traveling” inmates are being used as “mules” for drugs and contraband cell phones. Of the persons assembled by Chief Moore, only Dunbar represents a commercial, profit-driven agency. Simply put, these profits are the difference between the costs for the security provided and the fees Dunbar charges. Dunbar is eager to demonstrate a successful partnership with VPD and the Virtual Commercial Merchants’ Association as a stepping stone to contracts with larger jurisdictions. In any case, Dunbar’s primary motivation is to make money. Raymond Burr would applaud Chief Moore’s plan if he could, but as a pragmatist he feels that this is a waste of time. He understands, if no one else at the table does, that plea bargaining is to only way the criminal justice system can do business. He has also warned the chief before that his detectives need additional training on establishing probable cause, proper interrogation procedures, appropriate charging, etc. If the VPD could get its act together he would love to prosecute a good solid case against the VBBC, but prosecuting a “looser” case will not solve the problem or help his own political ambitions. The student will submit a 3 page paper describing the function and purpose of the designated criminal justice component and
  • 13. how it interrelates to other components. The paper should be done in APA format with references No directly quoted material may be used in this project paper. Resources should be summarized or paraphrased with appropriate in-text and Resource page citations. Carter 1 Catina Carter Sean Munro English 102-WMA 3 March 2018 Annotated Bibliography Duplechain, Rosalind. & Morris, Robert. School violence: Reported school shootings and making schools safer. Education. 135(2): 145-150. As a result of high number of shooting in schools in the United States, Duplechain and Morris conducted this research to specifically identify behaviors and risk factors of school shooters and how to create safer schools. From their article, the risk and behavior factors include bullying around the school, the individual, family and societies, past relationships traumas and brain development. In creating safer schools, the article purports that entry points to schools should be limited and controlled, availing wireless panic alarms, strategically placing telephones, establishing relationship between school officials and law enforcement and parents should advocate for school safety. In an aim to determine ways that school shooting can be stopped, the authors have managed to capture the audience by touching their feelings while discussing individuals, family and society. They also used the ethical dimension of mentioning bullying. A lot of logic has also been utilized through citing facts on shooting and giving recommendations thereafter. This
  • 14. resource will be helpful in my essay by providing comprehensive points on diagnosing why school shootings take place as well as providing solutions for these factors. Chaddock, Gail Russel. A radical step for school safety (Cover story). Christian Science Monitor. 2000,92(36). p. 1. The article talks about how districts have begun to use students’ psychological profiles to prevent violence in classrooms. However, this is criticized as it may undermine the learning climate in an institution. But since the shooting in 1999 in Littleton, Colo, administrators have prioritized the safety of children in schools and have adopted the psychological profiling. In some institutions though, it has been associated with racial bias while a growing number of school officials believe that profiling is very appropriate and necessary. The arguments of authors are influenced by the ethics behind the use of psychological profiling by most law enforcement agencies in terms of fairness. The argument also takes into account the use of emotion in describing school violence so as to inspire the audience in accepting the new system. This resource will contribute to my research by introducing the use of psychological profiling of students as a way of preventing classroom violence. Harris, Elizabeth. Changes to tracking of school violence. New York Times. 2016, 166(57446):25. This article examines the important aspects of school safety panning on violence in schools in United States so as to establish safer schools. The article describes the national mandate for safe school planning by passing the Safe School Act 1994, putting the safety of schools first priority of the major strategic commitments and development of school safety plans. The authors also recommended various safety school
  • 15. options which include general preventive security measures to reduce the chances of violence occurring. In addition, the authors have discussed strategies for staff preparation in handling violence incidences. The views in the article have been influenced by the changing educational climate that has resulted to many challenges. As well, the authors in this resource have used a language that is quite appropriate for both the topic and the audience and lastly, dwelling on the history of school violence has influenced the remedies described by the author. This resource is very essential for the study since it will help understand the need to prevent violence in schools as well as providing the relevant remedies. Glasner, Barry. School violence: The fears, the facts. New York Times. 1999, 148(51613): 21. The main purpose of this article is describing the school violence in United States way back in the 90s and how it has been improved. From the article, before 1990s, the rate of school shooting and violence was exhibiting a gradual increase from time to time. This increased into the 90s when America still witnessed a number of school violence. However, the safety of students in schools is reestablishing due to the fundamental juvenile justice system of separating jailed juvenile offenders from adult criminals. This bill was introduced by Representative Bill McCollum who believed that juveniles are not bad criminals; they are just kids who should be protected from being turned into worse criminals by the more experienced inmates. Ethically, the arguments in this article were made with respect to expertise in law with the use of perfect grammar. The author used the experience and suffering of Juveniles to argue the above case. Logically, the author used statistics of school violence in United States to express why violence should be prevented. This resource will contribute to my topic of study
  • 16. since it contains information on how violence in schools has been prevented in the past. Works Cited Chaddock, Gail Russel. A radical step for school safety (Cover story). Christian Science Monitor. 2000,92(36). p. 1. Duplechain, Rosalind. & Morris, Robert. School violence: Reported school shootings and making schools safer. Education. 135(2): 145-150. Duplechain, Rosalind. & Morris, Robert. School violence: Reported school shootings and making schools safer. Education. 135(2): 145-150. Glasner, Barry. School violence: The fears, the facts. New York Times. 1999, 148(51613): 21. Harris, Elizabeth. Changes to tracking of school violence. New York Times. 2016, 166(57446):25.