SlideShare a Scribd company logo
1 of 78
Download to read offline
Negative Effects Of Social Media Essay
The negative effects of social networking on youth and young adults are; cyber bullying, antisocial,
lack of independence, makes someone less patient, lack of confidence in their physical appearance,
identity theft, cyberstalking, sharing too much, decrease in productivity. Cyberbullying is when
someone is rude and disrespectful and bullies someone else online. Antisocial is when you are
unable or struggle to talk to someone in real life or face to face. The lack of independence is when
someone is unable to be independent and now relies on someone else. And impatient is when
someone is unable or struggle to tolerate delay or is quickly irritated. Cyber bullying is a negative
effect because they are putting people down and making them feel bad about themselves. This can
cause them to do terrible things such as committing suicide or cutting themselves and can make
them very depressed. Antisocial is a negative effect because they will be unable and struggle to talk
to people in real life. This happens when they are texting and aren't really talking to anyone for a
long period of time. Then when they do talk to someone in real life they struggle because they lost
all of their confidence in themselves. This is bad when they go for an interview or they are ordering
food, or even when they are meeting someone new. The lack of independence is a negative effect
because they will be more dependent on someone or something to get stuff done. They will struggle
to do anything by
... Get more on HelpWriting.net ...
Pros And Cons Of Cyber Warfare
3.1 Cyber Warfare
Richard A. Clark, an expert in security sector governance in his book Cyber War (May 2010),
defines Cyber War as an act of penetration of a country against other computer network with the
intent of causing damage and disruption. The Economist magazine explained that cyber war is the
fifth domain of warfare, after land, sea, air and space. Cyber warfare, (also known as cyber war and
Cyber warfare), is a war with the use of computer networks and the Internet in cyberspace (cyber
space) in the form of defense and attack information. Cyber warfare is also known as cyber warfare
refers to the use of the World Wide Web and computer to conduct warfare in cyberspace. Although
sometimes relatively minimal and lightweight, so far cyber warfare could potentially cause a serious
loss of data and information systems, military activity and other service disruptions, cyber warfare
means can pose as disaster risk worldwide.
3.1.1 The development of Cyber Warfare
In 1991, someone in the air force reported a computer virus named AF / 91, the virus was created
and has been installed on the printer chips and make his way to Iraq via Amman and Jordan. His job
is to create an anti–aircraft weapon damage Iraq.
In 1998, the US and NATO in order to successfully bombed Serbian targets in Kosovo, the United
States needs to deceive and disrupt air ... Show more content on Helpwriting.net ...
Perhaps the US can serve as a reference for developing capability. Latest test results of five large
super computer capable of extremely high with Rmax and Rpeak are judged by the size of Tera
Flops / 1012 Flops (Floating Point Operations Per Second), numbers 1 to 3 US computer occupied.
Power of data measured in KW for the entire
... Get more on HelpWriting.net ...
Taking a Look at Cyberbullying
In May 2013, Gabrielle Molina, a 12 year old excellent and outwardly positive student, took her life
after being called a "slut" and a "whore" online. Throughout the use of social media, teens are
potentially susceptible to become victims of cyber–bullying, and the drama that rises from it could
work as a catalyst in the development of psychological traumas. To help the prevention of bullying,
parents and schools must work hand in hand in this issue by incorporating anti–bullying education
in their curriculums, and establishing a channel of communication and trust between adults and
teens. The Centers for Disease Control and Prevention has identified cyber–bulling an "emerging
public–health problem," notes Thomas Billitteri from the CQ Researcher. Cyber–bullying is a
growing trend that has been blown out of proportion during recent years. Jaana Juyonen, a professor
of psychology at UCLA, asserts that "more than 70 percent of heavy Internet users ages 12 through
17 – mostly girls – said they had experienced at least one incident of online intimidation via e–mail,
cell phones, chat rooms and other electronic media in the previous years." This high amount of
energy teens spend on social media is making them susceptible to cyber–bullying. Alex Orozco, a 19
year old college student who also went to my same high school, recalled, "Just last week I was
going through my Twitter's news feed and I bumped into this horrible fight between two girls at my
school. Worst part of it was,
... Get more on HelpWriting.net ...
Cyber Security And Cloud Computing Essay
Cyber Security and Cloud Computing
ISCG – 8047
Cyber Security and Web Applications
ASSIGNMENT 1
Submitted To: Submitted By:
Prof. Bahman Sarrafpour Sojan Chandy Therakom: 1468736 Contents
Introduction 2
Why is it important 2
Cyber war 3
Major Threats 3
Viruses: 3
Worms: 3
Spyware/Adware: 3
Trojans: 3
Rootkit 3
Botnet 4
Hoaxes and Urban Legends: 4
Denial–of–service (DoS): 4
Various Security Standards 4
Spoofing identity: 4
Tampering with data. 4
Repudiation. 5
Information disclosure. 5
Denial of service. 5
Elevation of privilege. 5
(ISO/IEC 27001) 5
CPE: 5
CWE 5
CVE 5
CAPEC: 5
CCE: 5
Security Tools 6
Honeypots 6
Classification of honeypots 7
Honeypot Implementation 7
Honeyed 7
Service–specific honey pots 8
Web Application Firewall 8
ModSecurity for Web Applications 8
ModSecurity for IIS 9
Conclusion 11
Cyber Security and Web Applications
Introduction
Almost all kind of large and small organizations might face increasing number of attacks into their
network or intellectual property. This may lead to data disclosure, data destruction, and damage of
organization's reputation. There are numerous threats in the cyber space which might be capable of
stealing, destroying or making use of out sensitive data for financial and non–financial gains. As the
amount of computer, mobile and internet users increases, so does the number of exploiters.
Cybersecurity is the form of technologies, procedures and
... Get more on HelpWriting.net ...
Cyber-Bullying: A Brief Research Proposal Essay
Introduction Internet usage in children and adolescents has been increasing in a steadily fashion in
the past number of years and with the increase in internet usage, a new form of bullying has
developed – Cyber bullying. Cyber bullying can be defined as "the electronic posting of mean–
spirited messages about a person," (Merriam–Webster, 2012). This form of bullying can come
through various mediums including but not limited to text messages, emails, videos, and social
networking sites. There is an overwhelming amount of information that defines cyber bullying,
identifies the demographics of bullies and victims of cyber bullying, and identifies the outcomes of
cyber bullying on victims. More focus needs to be placed on who the perpetrators ... Show more
content on Helpwriting.net ...
Additionally, a large amount of cyber bullying tends to take place within social groups. Perpetrators
of need not be the traditional strong, powerful bully but could be the individual who is too shy to
intimidate others in the traditional sense so they turn to the cyber world where they may remain
somewhat anonymous (Juvonen & Gross, 2008; Mishna, Cook, Gadalla, Daciuk, & Solomon, 2010;
Mishna, Saini, & Solomon, 2009). One study showed that over half of the perpetrators of cyber
bullying are friends of the victim, and a further amount of perpetrations know the victim (Kowalski
& Fedina, 2011). It has been demonstrated in a number of studies that the more time an individual
spends on the computer and internet, the more likely they are to be cyber bully victims, perpetrators
or both the victim and bully (Mishna, Khourg–Kassabri, Gadalla, & Daciuk, 2012; Sengupta &
Chaudhuri, 2011). The most common mediums of cyber bullying are through email, instant
messages, or internet social networking sites; however, the medium with the greatest impact on its
victims is picture or video bullying (Beran & Li, 2005; Kowalski & Fedina, 2011; Slonje & Smoth,
2008). It has been suggested in the past that children who have access to social networking sites are
more likely to be perpetrators or victims of cyber bullying, however, results from one study
indicates this is not the case. Alternatively, it was suggested
... Get more on HelpWriting.net ...
Persuasive Essay On Cyber Bullying
A couple days adrive she cathe opponent crying to school. She replicated over and over again on
how ugly she was, and how he made her feel pretty. She threw up her sleeve that those were the
bruises he left her
"I met him online." The online world wasn't meant to be dangerous. It was intended to be a useful
source and to receive skills. It will also increase the ranking of competition in a variety of stuff . It
wasn't made for people to drive online and sexually harassed, and violate privacy. Never did the
creators of the online world think they had made a dangerous place for people. Adults should
concentrate on teenagers' tithe opponent online. Cyberbullying is different from schoolyard
bullying. Teachers can't intervene to the internet. Teens spend the preponderance of their day online
just scrolls down seeing stuff that may be harming other students, however, students refusal show
their relevance to this important title of cyber bullying. While the internet is an essential mechanism,
numerous people compose it a dilemma. The internet is a like a reward, once you recognize it you
are excited, however having the internet for a while, you tend to comprehend and bring tired of
doing the sathe opponent material so you start looking up different stuff to do on the internet. In the
article "Crossing the Line Online," teens did a survey on teenagers who have been called a nathe
opponent or even asked about their sexuality.12 percent of the boys answered that "they have
... Get more on HelpWriting.net ...
Hello
Bullying
Student's Name Here
XXXX University
Introduction
There are so many incidents on television where teenagers are being bullied via Facebook and other
online sources. Almost every adolescent has access to the internet nowadays and most of them have
a mobile phone. Therefor it is not surprising, that cyberbullying or bullying through these new
communication technologies is increasing. In order to put cyberbullies to a stop it is necessary to
know, who these teenagers are, what they do, and why they bully. This research will introduce
briefly the suicde of Megan Meier and the foundation what is set into effect today to prevent
children and teenagers from being victims like her. Another young victim of cyberbullying was a
local ... Show more content on Helpwriting.net ...
But the rewards could also be less tangible. Bullies often enjoy status and prestige because others
fear them. They also command a lot of attention for their behavior. Some children who bully others
don't want to lose their popularity status so they assume that by increasing their motive of bullying
they stay popular. To avoid losing social status, they deliberately selected victims who were
unpopular (Sognonvi, 2010). 3. Bullies lack empathy, and may even get pleasure out of other
people's pain
Bullies score low on tests of empathic reactivity, and have also found that bullies can be more likely
to develop anti–social personality disorder. This is a condition that causes people to ignore the rights
and feelings of those around them. One study scanned the brains of young people who had exhibited
bullying behaviors in the past, while they were watching videos that showed people experiencing
pain. The researchers noticed a great deal of activity in the areas of the brain devoted to reward and
pleasure. This suggests that it's not just a lack of empathy that's the problem. Some bullies may
actually derive pleasure out of seeing other people's pain (Sognonvi, 2010). 4. Bullies lack the
ability to self–regulate emotions
The same researchers who conducted the brain scan study made another surprising discovery: the
parts of the bullies' brains that allow them to self–regulate their emotions were inactive. This
suggests that bullies simply don't have a way to
... Get more on HelpWriting.net ...
Cyberbullying : The New Era Of Bullying And Violence
Cyberbullying: The New Era of bullying And Violence In School
Bullying has been a big problem in our school system for many years, but it has escalated over the
past decade due to the new era of modern technology. Unanimously, we can agree that our daily
lives greatly depend on technologies; the internet, cellphones, computers, tablets, IPad etc. Although
the uses of technology positively impacted our lives, there is also the downside when it uses have
negative connotations. For instance, modern technology made it very easy to engaged in
cyberbullying, perpetrators used cell phones or computers to conduct this hideous behavior, hiding
behind their keyboards to express negative feelings and or thoughts toward others. Using social
media ... Show more content on Helpwriting.net ...
If a teacher, parent, lawmaker, and even the child them self– put more effort into educating yourself
about cyber bullying it will not be in this situation.
Statistics have shown that everyone can be victims of cyberbullying but most incident occur
between the age of 11 to 15 years old, however, some report showed that children's as young as 10
years old also been a victim of cyberbullying. Cyberbullying can have long lasting effects on its '
victims that can lead to mental health issues like depression, anxiety, stress, and even suicide.
Increasing number of young kids and teenagers committing suicide because of cyber bullying and
sexting have coming to the public 's attention. As reported by the Centers for Disease Control and
Prevention (CDC), suicide is the third leading cause of death among young people with
approximately 4,400 deaths every year. The CDC estimates that there are at least 100 suicide
attempts for every suicide among young people. More than 14 percent of high school students have
considered suicide and nearly 7 percent have attempted it, that is why, sadly, there are increasing
coverages about cyberbullying cases in the media now more than ever. (NOBullying, n.d.)
Despite the physical contact or audible insults, cyberbullying can be even more traumatizing and
damage have life time effect on mental health than traditional forms of bullying. Through social
media and
... Get more on HelpWriting.net ...
Hiding One 's Identity Is Nothing New
Hiding one's identity is nothing new. Alexander Hamilton, James Madison, and John Jay authored
The Federalist Papers in 1787 under the pseudonym Publius. The ability to communicate
anonymously is viewed as part of our basic right to free speech . With the advent of computers and
ease of access to the internet, becoming anonymous as never been easier, and is far more reaching
than the colonial newspapers of 1787. For some this ease at which we can communicate
anonymously is cause for concern. Although we are no longer hiding our identities to promote the
ratification of the Constitution, being anonymous still plays a significant role in our society. Online
anonymity grants anyone with an internet connection an unbiased voice, regardless of gender, race,
or wealth. Without this freedom to online anonymity, many people would not feel free to express
themselves or share sensitive information about themselves. In the case of whistleblowing,
anonymity also promotes the release of information to help fight government corruption and
oppression. Anonymity can also be used as a security measure and prevent unauthorized mining of
personal information by not giving access to our real identities. While the ethics behind anonymity
can be foggy, multiple ethical frameworks, including duty–based and just–consequentialism, can be
used to add clarity to the topic. A duty–based framework stresses the role of duty and respect for
persons, including one's self. While a just–consequentialism
... Get more on HelpWriting.net ...
Bullying And The Cyber Bullying Essay
IDENTIFICATION PROBLEM STATEMENT
BACKGROUND
Cyber bullying refers to something when one uses their cell phone, computers or an electronic
device to access internet and technology for the purpose of harassment and providing harms to
others. Sending inappropriate messages, uploading disturbing images, threatening and posting
something without someone's' approval are the forms of cyber bullying. The main aim of this
research study is to look after the cyber bullying and the possible reasons of occurrence in teenagers.
With the reasons we will be also identifying the solutions to the problems. This study will be limited
to teenagers with the age group of 13–19. The importance of this research is that it will help to find
out the risk–related findings, so that one can know how and why teenagers are involved and
participated in the cyber bullying (Elisabeth Staksrud, 2007). With the reasons and occurrence
behind the cyber bullying, this will be also focusing on the preventive measures as well as
influencing factors which might be their parents, friends or the educators in the education academy.
Some of the results of the cyber bullying leads the victim to the anxiety, depression and even
suicide.
CONTEXT
The main context that is focused in the research study is the involvement of the teenagers in the
cyber bullying. These involvements occur while teenagers are living their normal life. We can say
that they are involve in these activities when they are in school with their
... Get more on HelpWriting.net ...
Persuasive Essay On Cybercrime
Imagine, one day you wake up and you're running late. On your way into work you stop at your
favorite coffee shop. You order your coffee and your muffin, and you go to swipe your card only to
find out it declines. What do you do? You call your bank and they tell you several accounts have
been hacked and yours was one of them. Now you have no money, no access to your savings.
Everything you've ever worked for is gone and it only took one click. This is a very real possibility,
and it doesn't stop at bank accounts. Cybercrime is at an all–time high, and no one is safe. Cyber
threats have vastly grown over the past decade, we need to better prepare ourselves and become
more aware in the event of future attacks. Cybercrime is not limited to bank fraud or identity theft, it
is any crime that is committed by use of an electronic device, such as a computer or cellphone. For
example, in August 2001 Rafael Nunez also known as RaFa successfully hacked into a NASA
employee's computer and obtained classified shuttle designs for future space crafts. While this attack
did not cause any real harm, he did leak the designs to a local reporter to prove his theory that
NASA isn't as secure as everyone may have thought. Another form of cybercrime would be internet
stalking, one out of twelve women experience some type of cyber stalking in their lifetime, and most
predators are men. This could lead to cyberbullying, which is something you see occur every day.
October 17th, 2006,
... Get more on HelpWriting.net ...
Cyberbullying : An Act Of Aggressive Act
Bullying can be define as an act of aggressive act that is intentional, Taking force upon someone
who cannot defend themselves from an individual or group. Cyberbullying is nearly the same thing
as bullying but is done online, using electronic devices such as phones, emails, and social networks.
Cyberbullying can happen in many different ways , through phone calls, text messages, blogs,
pictures and more. The availability of internet makes it easier for bullying to take place in the long
run this can cause numerous problems. The effects of bullying can cause suicides, depression and
isolation.
Daily around the world kids are getting bullied . Frightened and unable to say what is going on to
anyone. There has been novels , movies and ... Show more content on Helpwriting.net ...
Cyberbullying happen 24/7 on phones , laptops , tablets and many other technology things that
young people use today. Cyberbullying takes away your privacy, sharing it with others. Four in ten
teens have experienced online bullying; girls are twice as likely to be victims and criminals of
cyberbullying (Phillips). Girls are more likely to engage in social sabotage of other people (Phillips).
Girls have the mindset of trying to be better than others and are willing to do anything to advance
them. Boys are more likely to bully girls and other males who are not as confident (Phillips). Boys
whether bullying these type of people so things would not happen to them. Cyberbullying is mostly
done by 15 and 16 year olds (Phillips). This is age group when teens uses technology heavily. The
more people post on social sites and the more they share their information the easier it may be to get
attacked by a cyberbully. Cyberbullying is real and often more frightening than face to face bullying
(Phillips). Similar to stalking victims can often feel helpless and isolate and ashamed, and not
willing to share with friends or parents about what is going on (Shpantzer). The groups feared that
they will be restricted from electronic devices if they told parents or that they might overreact
(Phillips). This should not keep anybody from telling someone how someone is treating them.
Studies have indicated that the number of youth
... Get more on HelpWriting.net ...
Bullying Vs Cyber Bullying Essay
Bullying is a major problem that impacts many teens over generations, causing an endless cycle of
bullying. With the new age of technology, this leads to new issues that are affecting teens' lives. One
of these issues is that cyberbullying is quickly becoming more common than the traditional
playground bullying, as more social media are appealing to teens. Cyberbullying is a type of
bullying that happens using electronic devices such as phones, laptops, and tablets. This form of
bullying includes spreading rumours, sending mean and hurtful messages and sharing embarrassing
videos or photos. Cyberbullying over social media has become extremely easy for bullies to
victimize other teenagers affecting the victim's mental health. Therefore, ... Show more content on
Helpwriting.net ...
The day after, Meghan had come home from school where she was handing out invitations to her
fourteenth birthday party that was in a few weeks, but when she logs on to her MySpace account,
she sees all the negative and harsh words that others are posting on her page. Her mother and father
try to tell her to get offline and that everything is going to be okay, but later that night Meghan hangs
herself in her closet. The last comment is from Josh tells her that everybody hates her and that the
world would be a better place without her in it. Weeks later, Meghan's parents find out that Josh is
not actually Josh, that he is not even an actual person. Josh's page is a group of moms that live in the
same community. This mother was trying to see if Meghan was talking about her daughters behind
their backs and thought it was a joke (TEDx). MySpace gives Meghan's bullies the anonymity to
protect them from their true identities, letting these neighbours mess with Meghan in a way that is
non–imaginable. Without this protection Meghan and her parents would have known who the real
Josh Evans is and could have been able to stop the bullying faster, possibly saving Meghan from
taking her life. Facebook says that "8.7 percent of its 955 million monthly active users worldwide
are actually duplicate or false accounts" (Kelly). The fake accounts hide the bullies' true identity,
giving the bully or bullies protection to
... Get more on HelpWriting.net ...
Creating A New Cyber Force
1. Today, there is a new battlefield domain where a keyboard and mouse are the new weapons of
conflict. With land, sea, air and space in the background, warfare has entered a fifth domain: cyber.
In this position paper, using a pro and con format, the debate on whether or not the Department of
Defense (DoD) should create a new, independent branch for cyber will be discussed. To do this, the
following will examine both sides of debate by highlighting two main points: the elimination of
duplication of effort and the intensive resources required to make the transition. Finally, a look into
a larger talent pool will be explored to highlight the largest benefit of creating a new Cyber Force. It
is this paper's stance that the DoD should create a separate structure in order to meet the new
domain's unique demands.
2. To better understand this topic, a brief background on cyber warrants a closer look. President
Obama concluded as early as 2009 that the nation's digital infrastructure of networks and computers
that we depend on should be treated as a strategic national asset.1 With the former head of security
at Microsoft acting as the cybersecurity tsar for the White House and General Keith Alexander,
Director of the National Security Agency (NSA), leading Cyber Command (CYBERCOM), the
protection of the nation's infrastructure is finally being treated like a national security priority.2 This
shift brings with it a debate on how to structure the US assets to realize its
... Get more on HelpWriting.net ...
Disadvantages Of Cyber Space
Many of years, humans have admired cyber space as a magical world & talked about its contribution
to world from past Vs what we are today. I wouldn't be surprised to see the world still keep on
getting amused about its power and potential by further innovation. We started building intelligent
chips which can be embedded into "Car" system to navigate around the world OR transport system
which helps in monitoring the location of trains OR wireless devices which keeps on sending data to
earth from space etc. All of these which are more commonly used as term "Internet of thing" works
well in convergence of Cyber world or Internet. However, while we were growing towards next
generation using cyber space, there was a small community started incubating which sensed the
negative advantage of cyber space which can be taken for their own profit. This profit can be in
form of money, defamation of competitors, revealing secrets etc. this community were commonly
known as "Hackers". These hackers are constantly challenging & questioning the security of Cyber
Space. ... Show more content on Helpwriting.net ...
There could be various forms of exploitation. Viruses, Malwares, Botnets, spywares are few of the
forms with the help of which a vulnerability can be exploited to get financial gain. In the early age
of cyber space, finding a vulnerability and exploiting it was just a fun however, as cyber space
grown and humans and technology started becoming inseparable, the birth of good or bad hackers
evolved. The evolution even got accelerated when these "Hackers" were used as a "Cyber Weapon"
by big brands against their competitors. Now there is a "Black Market" where the information can
be sold & the highest price would be paid for vulnerability which can cause "Zero Day"
... Get more on HelpWriting.net ...
Social Media Addiction
For those who want to relax take a week long vacation, or how about putting down your distracted
devices. No matter if it's for business or personal use we can't go a day checking our social feed.
Social media was created for enjoyment, but humanity has destroyed the purpose. Social Media has
caused so much chaos over the last decade, and it is only getting worse. Lies, death, deceit, and
misery have all happened over the internet. Many people have lost their self– respect, and more
violence has occurred for the entire world to see. Our generation we are "social addicted", and that is
not always a good thing. Social Media is the root of all evil, I am convinced.
The use of social media is consuming most of lives on a daily. Every second we are constantly
consumed into our phones. Let's face it the world needs technology, and it makes it more convenient
to do things. A lot of negative things happen over the internet, and social media causes people harm.
Cyberbullying has increased over the last decade. People feel like they can say anything because
they are behind the screen. Cyberbullying can make people feel bad, and insecure about who they
are. Children especially are really sensitive to hurtful comments, and that can lead to dangerous
outcomes.
Children and adults of all ages have committed suicide because of being cyberbullied over the
internet. People social bully others by harassing them over the internet. Children and teenagers are
the main victims that attract
... Get more on HelpWriting.net ...
Analysis Of The Book ' Reena Patel ' Essay
The author of the book, Reena Patel is a feminist scholar and the theme of her book is specifically
on the mobility and inequality faced by women in the society due to their timings of employment at
the Call Center Industry. The study is the first in–depth research on the transnational call center
industry which has been written from the women worker's point of view. Reena Patel conducted an
Ethnographic study in the cities of Mumbai, Bangalore and Ahmedabad. The new challenges faced
by them with regard to the night shift employment alongside the opportunities to work in an upscale
globalised work environment, and the attraction towards a relatively high wage is a source of fast
access to money.
The Call center Industry with its globalised work environment and high wages has attracted many
women in liberating their lives. The main theme of the book around which the rich narratives are
woven for women is the Spatial–temporal conversion regarding their flexibility in the urban setup in
India. The repercussions experienced by women of exploring the night as a time and space of the
night time, belonging to men according to the traditional Indian society idea. There are patriarchal
notions attached to the idea of women getting out of the households at night to work in a public
space and is vulnerable to the rising violence in our country against women. The nocturnal space is
considered to be a man's domain and if invaded by a female figure becomes problematic for the
woman
... Get more on HelpWriting.net ...
Social Networking : The Causes And Dangers Of Social Media
Social media has become to be such a big platform over the years. You use it to interact with family
members that live far away, friends, or even complete strangers that you want to get to know. Social
media is known to create conflicts interacting and showing complete strangers what is going on in
your life on a daily basis and you not knowing their intentions. Social media even gives out false
information can be news or just blogs just posting about what they have heard around or seen. Social
media can take over a life with a touch of the button various ways, it is up to the person behind the
screen to control it. What I find to be a big problem with social media today is identify, people who
Portray being someone else behind screen. Social media has became such a big issue because it is
dangerous being on social media, say if you were interacting and chatting with others online that
you've never met in person you don't really know who is behind the screen. That person can be a
criminal, rapist, kidnapper, etc. Using social networks to maintain a relationship can be quite easy.
Online relationships, it can be tempting to hide the truth and easy to present a different side of
yourself that isn't really you just to get what you want online. For the most part everyone does this
to a certain extent, especially for those who feel uncomfortable with themselves. If anyone has any
distrust towards a friend or in a relationship, this tendency can be taken to the level of
... Get more on HelpWriting.net ...
Cyber-Bullying and Teen Suicide
Since Teen Suicide is the second leading cause of teenage death in the United States, there is a need
for legislation that promotes awareness and education about Cyber–Bullying.
by
R. Hassan
February 8, 2011
Fourth Period
Mr. Cicala
Robinson Secondary School
Since Teen suicide is the second leading cause of teenage death in the United States, there is a need
for legislation that promotes awareness and education about Cyber–Bullying. Due to the growth of
technology in the American society, the younger generations of adolescents are adapting to the
excessive use of computers, cell phones, and social–networking sites. According to a study done by
Amanda Lenhart, 87% of adolescents who are ... Show more content on Helpwriting.net ...
The most common is "Mean Girls" cyber bullying which has been seen in the case of Tina Meir who
committed suicide at age 13 (Billitteri 385). "Mean Girls" refers to the type of cyber bullying in
which is usually performed by a group of young girls looking to have fun in the act. The group girls
most often want others to know who they are and what they are doing in order to feel powerful.
Research has shown that females are almost twice as likely to be involved in cyber bullying either
being a victim or perpetrator. The second category would be "Inadvertent" cyber bullying which
consists of role–playing. The perpetrator may not realize they are cyber bullying, yet they interpret
their offensive and cruel remarks through a joking manner. The next category is somewhat similar in
the sense that the bully may not realize that they are virtually cyber bullying. "Vengeful Angel"
refers to an individual who is defending themselves or others from an attack, which ultimately leads
them to becoming a cyber bullying as well. The last category can be similar to the "school–yard"
bully, which is the "Power–Hungry" bully. This category refers to those who may be victims of
bullying themselves. A "Power–Hungry" bully wants to feel powerful and control others through
their cyber bullying. Overall experts say that it is most common for the perpetrators to be classified
as "popular" student with self–esteem who are trying to bring others down by placing
... Get more on HelpWriting.net ...
The Security Challenges Of The Cyber Space
UK CYBER ESSESTIALS SCHEME (UKCES):
To differentiate the security challenges of the cyber space, a security scheme was proposed by the
government of UK which majorly focuses on the policy followed by it. It concentrates on the
criticalness of a sheltered framework through a sensible approach and sets up structures that are
obliged to combine together for current effort to push towards a venture to see the key objective of
making a secured cyber space. (Cleveland, 2008). It accents on the requirements of the
administrations, proficient and the worldwide assistants to collaborate nearby individual in common
with the objective of enhancing so as to decrease the threat and abusing data in order to build up the
UK in worldwide web.
Cyber protection controls: Boundary firewalls and internet gateways. Safe configuration. Threat
protection. Management of patch. Access control. By utilizing the solid firewalls and Internet
gateways the information and the applications of the association must be secured from the
unapproved access. The framework must be legitimately configured to decrease the vulnerabilities
level that are acquired and correct capacity must be performed. Idiosyncratic access advantages
must be accommodated the approved clients. The framework can be constantly monitored so that it
can be prevented from any malwares and usage of the antimalware programs should be carried out.
(Curphey, 2006). Each framework has a product working on it and that product has to
... Get more on HelpWriting.net ...
Cyberbullying and Its Harmful Effects on Teens
Cyberbullying and Its Harmful Effects on Teens Teens have nowhere to hide. Cyberbullying is
increasing alongside of advances in technology. Most teens now have access to electronic
communications and the Internet, making them easy targets for cyberbullying. Cyberbullies are
using e–mail, cell phones and the Internet to cause emotional harm, harass, threaten, ridicule, and
exert control over their victims. Additionally, cyberbullied teens are committing suicide at an
alarming rate. Cyberbullying must be stopped; it poses psychological trauma and health risks,
affects social interpersonal skills, and can ultimately cause suicide. A Cyberbully is able to breach
every part of its victim's life, and keeping teens safe in cyberspace will be a ... Show more content
on Helpwriting.net ...
Dr. Karnik, a child and adolescent psychiatrist at the University of Chicago clinic, began noticing a
rise of complaints about online harassment from his patients, and stated: "We do see more of this
happening, [partly because] it's so simple to do, . . . It doesn't require you to stand in front of a
person to bully them" (Moyer). To identify potential victims and perpetrators of cyberbullying,
physicians need to ask all their patients who use the Internet what they do online, and to specifically
inquire whether they use social networking sites and ever felt as if they were harassed. Physicians
who encounter cyberbullying first should assure victims that they are not at fault, then should
determine their level of danger for self–harm and for acts inflicted by others and take appropriate
steps to alleviate the dangers. On the other hand, if patients admit to cyberbullying, physicians
should help them identify their actions as a problem, and then involve the parents or guardians in the
situation. If physicians can intervene early enough, teens can be protected from a great deal of harm
(Moyer). Cyberbully has devastating effects on teens' health as well as psychologically. Victims of
cyberbullying will skip school or hide in the bathroom all day, they do not know who they can trust
and so they trust no one, they lose their self–esteem, become anxious and are stressed, and feel
hopeless. Cyberbully must be monitored and controlled by
... Get more on HelpWriting.net ...
Making Cyberbullying a Criminal Offense
"Even in death, Phoebe Prince was bullied" (Kennedy). That was the headline when a FaceBook
page dedicated to Prince was hacked and filled with hurtful and derogatory comments about her.
Phoebe was a regular teen that was cyber bullied to the extent that she couldn't take it anymore. Her
body was found in a stairwell, and at 15 years old, Phoebe hanged herself. Although cyberbullying
is a vague concept to many, it should be made a criminal offense because it is causing suicides for
youth, government intervention is the only solution, and the bully should be punished instead of the
victim. Being a recent issue, cyberbullying has seriously been taken for granted by society. Not only
is it real and hurtful, but it is also leading to suicide as a result, especially for youth. From a survey
taken by the Cyberbullying Research Center, 20% of around 2000 respondents reported seriously
thinking about attempting suicide, and 19% did (Hinduja/Patchin). This means that one out of every
five kids has been cyber bullied to such an extreme that life is no longer considered livable, or even
bearable. One of these kids was Ryan Patrick Halligan, a regular teen living in Essex Junction,
Vermont (Halligan). Unfortunately, he was repeatedly sent instant messages from his classmates
accusing him of being gay, and was threatened, taunted, and insulted relentlessly. On October 7,
2003, at the age of 13, Ryan hanged himself while his family was asleep. The internet can humiliate
and tip a person
... Get more on HelpWriting.net ...
Mass Media Consumption Being Targeted For Sensitive...
Abstract
Are there laws in engraved stone that help tackle online abuse in this era of information? Are
governing bodies doing enough to highlight and make aware infrastructures that are widely
available for victims of abuse? This paper echo 's the voices for and against. This research found
naïve consumers of mass media consumption being targeted for sensitive information that in–turn
was used to abuse, cyber bully complaints of a sensitive age. Teenagers ignoring privacy policies
were to blame for side stepping their own well being, sharing personal information that could map
them to precise locations and endanger their wellbeing. On the contrary legislations have been in
print for decades that help filter out any abusive manner offline and online. This research paper
concludes that users are to blame for their laziness of sharing/leaking their live database of primary
information that may be used to cyber bully/target individuals. Consumers should not be blamed
entirely for their lack of knowledge as laws implemented in each country vary and entail some form
of study that may not be easily interpreted. Governing bodies should invest in more ways in which
user–friendly/simplified versions of legislations that may be easy to read and advertised on all new
forms of mediums online. That can increasingly help warn new consumer of the World Wide Web.
Introduction
With 60% of the United Kingdom population actively using social media and 92.6% having access
to the internet.
... Get more on HelpWriting.net ...
Argumentative Essay On Social Media
More often than not children are unaware of what is really going on, they just do what is told or
pressured to them in order to fit in or be considered "cool". There are many advantages and
disadvantages to social media when it comes down to peer pressure. With that being said, it all
depends on how the social media site is being used on a day–to–day basis. Unfortunately, it is not
difficult for young people to get their hands on some type of technology. "Ninety–four percent of
young people have access to the Internet in their homes, while 23% of young people have their own
cell phones, often equipped with text messaging capabilities and digital cameras" (Lawnow).
Majority of the kids that have made friends and met people online have had a good experience with
it, whereas just a few have not. The sites should only be used by finding new friends, setting a good
example online, and connecting with others, and most importantly avoiding the content you know is
bad for you. Today's world has changed so much, with the click of a mouse the younger generation
has access to the world. A positive to social media is that the rates are continuing to increase,
creating friendships and even relationships. Over the years, people have been recording the amount
of cyberbullying that has been happening to individuals. They have recorded that just in one year,
about forty–two percent of people with social media accounts are cyberbullied. Adults are starting to
realize that the teenagers are
... Get more on HelpWriting.net ...
Cyber Bullying Essay
Cyber bullying is a form of bullying that uses electronic technology as a 'weapon' to inflict
emotional distress to its victims. Electronic technology refers to equipment such as computers,
tablets and phones. Interactive communication networks such as Facebook and Twitter, texting,
websites and chat rooms are all included in this technological pool of cyber bullying tools.
Examples of cyber bullying can range from insulting texts from smart phones to derogatory postings
on social networking sites. According to the website stopcyberbullying.org (1) the methods used are
'limited only by the child's imagination and access to technology.' It is important to note that cyber
bullying by definition can only be instigated by a minor against another minor. Once adults become
involved, it is defined as cyber–harassment or cyber stalking (Huffingtonpost.com) (2). There are
two types of cyber bullying: direct attacks (messages sent to victims directly) or cyber bullying by
proxy (without the victim's knowledge).
Cyber bullying is considered different to traditional bullying. It can occur 24 hours a day and the
bully is often an anonymous person whose identity is hidden behind the security of a screen. The
other concern is that the bully can share their information with a potential audience of millions in a
matter of seconds and the victim can find it almost impossible to stop the information or delete it
from reaching such a vast audience. According to the anti–bullying site
... Get more on HelpWriting.net ...
Cyber Bullying Persuasive Essay
Inspirational speaker, writer, and community leader Anna Maria Chávez once said "Cyber Bullies
can hide behind a mask of anonymity online, and do not need direct physical access to their victims
to do unimaginable harm." Cyberbullying is negatively taking over technology and adults aren't
aware of the potential dangers it has on their children. To start, children and teens do not talk to their
parents about the acts of cyberbullying that occur on their technology. Over half of young teens do
not tell their parents when cyberbullying occurs. (Webstar, 2017) This is a big problem. This means
that children are hurting, the result of cyberbullying, and they are afraid to talk to their parents, or
any adult for that matter. They are keeping their emotions bottled up inside them, and parents have
no idea this is happening. In fact, only 1 in 10 teens tell an adult if they have been a cyberbully
victim. (Webstar, 2017) These numbers should not be the effect of cyberbullying. Children have to
seek help from adults and stop the cyber bullies hiding behind their screen. Might I add, it should
not be all on the children's shoulders. They are the victim, and they should stand up for themselves,
but why should it be all on them? Parents have to be on the lookout for cyber bullying these days.
Only 32% of parents actually monitor their children's social networking activities, while 28%
admitted they only occasionally, rarely or never monitor activity. (Anderson, 2016) This 28% of
... Get more on HelpWriting.net ...
Negative Effects Of Technology On Youth
Technology varies widely from one decade to the next. The invention of the television increased the
usage technology during the 80s. While the invention of computers rose the use of technology in the
90s. Once seen as an improvement to the society, technology has now become a problem. Numerous
versions of technology now exist to create technological distractions. Computers, cell phones, and
video games stand the leading distractions in today's society. Technology began small but, with great
advancements technology has gone too far. Youth remain greatly affected by technology. Since
technology has become a normal routine for youth, they fail to realize the problem occurring. Older
individuals who grew up without as much technology, can point out the issue easily. Technology
affects today's youth negatively because it distracts, promotes violence, and lowers independence.
Technology affects youth negatively because it creates distractions. Cell phones have become the
leading distraction involving injuries (Turkle 430). As stated by Sherry Turkle, Massachusetts
Institute of Technology professor, claims that "These young people live in a state of waiting for
connection. And they are willing to take risks, to put themselves on the line" (430). Texting and
driving have become a major problem causing many to crash and die. Technology also causes
distraction in classrooms. Michael Berry, a professor at the University of Colorado, states that
technology affects classrooms
... Get more on HelpWriting.net ...
Hiding One 's Identity Is Nothing New
Hiding one's identity Is nothing new. Alexander Hamilton, James Madison, and John Jay authored
The Federalist Papers in 1787 under pseudonym Publius. The ability to communicate anonymously
is viewed as part of our basic right to free speech . With the advent of computers and ease of access
to the internet, becoming anonymous as never been easier, and is far more reaching than the colonial
newspapers of 1787. For some this ease at which we can communicate anonymous is cause for
concern. Although we are no longer hiding our identities to promote the ratification of the
Constitution, being anonymous still plays a large role in our society. Online anonymity grants
anyone with an internet connection an unbiased voice, regardless of gender, race, or wealth. Without
this freedom to online anonymity many people would not feel free to express themselves or release
sensitive information about themselves or about corruption, in the case of whistleblowing.
Anonymity can also be used as a security measure and prevent unauthorized mining of personal
information. Although multiple ethical framework will be used and compared, using a consequence
based framework will be the main examining point throughout. The use of the term "anonymous"
can be confusing from an online perspective. When speaking of anonymity in such a sense it is not
related to the degree of traceability, but to the lack of aspects such as image, voice, and situation in
the online social environment . Those against online
... Get more on HelpWriting.net ...
Persuasive Essay On Cyberbullying
There is a growing crisis in the United States that is going unpunished. It affects "roughly a third of
teens who use the internet" (Dosomething.org). This crisis is known as cyberbullying. Today,
lawmakers are trying to establish a law that would make this form of hate–crime that terrorizes
teenagers illegal. Opponents speculate that there is no reason to make this crime punishable by law
because they think this act is just a form of joking or just being rude. "There's a big conflict in
knowing where to draw the line between things that are rude and things that are illegal," says Parry
Aftab, an executive director of an internet safety group. However, making this crime illegal is a
necessity for a plethora of reasons. Cyberbullying is larger problem than many may realize, it causes
suffering and even suicide, and it is a premeditated intent to harm.
With the growing numbers of children plugging into technology and surfing the World Wide Web on
the waves of cyberspace comes the emergent problem of cyberbullying. No longer are children
confined to the playground and hallways to spread their dissent. A study conducted by
Dosomething.org showed that forty–three percent of children confided that they had been bullied
online. With over eighty percent of teens using a cell phone with internet access and ninety percent
signing into social media accounts, the opportunity to bully behind the screen is without a doubt a
problem of epic proportions (Dosomething.org). These
... Get more on HelpWriting.net ...
Cyber Bully And What Do Cyber Bullies Look For A Target?
What factors are associated with an increased tendency to cyber bully and what do cyber bullies
look for in a target?
Aschah Williams
David Johnston
Emily Crawford
Jaime Skipper
Kiera Smith
BHCLR What factors are associated with an increased tendency to cyber bully and what do cyber
bullies look for in a target? Cyber Bullying is a relatively new method of harassing and intimidating
peers. It's difficult to target because as few as 1/10 parents realize that their children are participating
in the behavior. Children lack sufficient supervision online, on phones, and on other electronic
devices to deter them from such actions. They are safe from consequences and punishment in their
own "world". Examining individual factors and ... Show more content on Helpwriting.net ...
Symptoms include headaches, nausea, sleeping problems and isolation. Nurses must gain the
adolescent's trust in order to help the patients reveal all the issues that are occurring, and to do a full
psychological assessment of the child in order to be able to make an effective plan of care for the
individual.
Pediatric Population at Risk
In their study, Carter and Wilson (2015) state that out of 367 adolescent students, 337 of them have
computers, that 79.1% of the student body in question have their own personal cell phone and that
81% have a Facebook. Cyber–bullying is an easily utilized method of harassment, and used
throughout all age groups. Adolescents however, are the most likely to both participate and be a
victim of cyber bullying.
Studies show that adolescents are the most prevalent group of people affected by cyber–bullying,
they have also shown mixed findings about the correlation between age and cyberbullying. (Carter,
Wilson, 2015.) Wang, Lannotti, and Nansel (2009) "found no differences in the cyberbullying
among 9th and 8th graders, and fewer self–reports of cyberbullying among 9th and 10th graders."
Williams and Guerra (2007) found that "engagement in internet bullying increased from 5th to 8th
grade, and then declined slightly among high school
... Get more on HelpWriting.net ...
Cyber Bullying And Its Effects On Society Essay
Cyber–bullying
"The saying, if sticks and stones will break my bones, but words will never hurt me was ever true, it
sure isn 't true today" (Alexander, 2011). The survey of 9 years olds in 35 countries found that New
Zealand is the one most second highest rate of school bullying. (nzherald, 2012). Especially in this
case parents really need to take a stand against bullying to help prevent it and to stop it. We as
parents need to be a part of the solution, not the problem. Cyberbullying is harmful to society
because it encourages poor behaviour many harshly affect the victim and makes the internet an
unsafe environment for children.
"Children should be able to live a life free from bullying and harassment and it is time that we all
took a stand against this" (Katherine,2015). Of course cyber bullying has showed itself in popular
networking sites such as twitter, Facebook and Tumblr. Those websites are meant to be socializing
between friends and family. Cyber bullying is a big concern in New Zealand society. How are
children and young people affected?
Firstly cyberbullying in social media it has shown in the article "sudden loss of girl saddens
community" by Alicia bailey. Stephanie Garrett, age 15 committed suicide after being cyberbullied
on a website called ask. FM.(bailey,2013) Cyberbullying can happen to any age group even if you
are male or female. In this article, statistics shows that suicide has been a significant rise to is to 19
years, age group. (Bailey,
... Get more on HelpWriting.net ...
Essay Cyber Security Departments
As the use of technology has increased drastically over the last two decades, so has our need for
technology. Technology has become a part about our everyday life and we can find technology being
used nearly everywhere. Most systems in today's countries and societies rely on technological
infrastructure; these systems include transport systems, factory systems, power plant systems and
water sanitation systems. This brings on the question of to what extent have governments developed
their cyber security departments, what evidence is there of governmental involvement in malware
attacks and why should governments be concerned about cyber security. Since these systems rely
heavily on technology, governments have to consider them as high–risk ... Show more content on
Helpwriting.net ...
The slammer virus managed to disable the emergency call system, the air traffic control system at
some airports in the USA and the bank of America's ATM network among other things.
Cyber treats of the 21st century
Computer Viruses are increasingly becoming more common, currently 148,000 computers are
infected every day and the World Economic Forum predicts that there is a 10% chance for critical
infrastructure being damaged in the next 5 years . As mentioned earlier most of the critical
infrastructure like power plants and water treatment facilities rely on computer systems, but more
specifically PLC's (Programmable Logic Controllers) 2 and SCADA (Supervisory Control and Data
Acquisitions System) . These control systems have a major drawback, which is that they are
susceptible to attacks by hackers if they are not configured in the correct way. There have been
several examples of systems being compromised. The ICS–CERT (Industrial Control Systems
Cyber Emergency Response Team) responded to 198 cyber incidents reported by power plants,
water treatment plants and other critical infrastructure during 2012 . An experiment was conducted
at the Department of Energy's Lab in Ohio in 2007. The aim of the experiment was to prove that it is
possible to hack into the US power grid and shut down diesel generators. The experiment was called
Aurora, the group of computer experts managed to hack into the diesel generator and
... Get more on HelpWriting.net ...
What Are The Advantages And Disadvantages Of Cyber-Space?
Cyber–space can be a persuasive tool in restricted countries and areas
This section will analyze the advantages and disadvantages of the cyber mission, the theological
understanding of the cyber mission, and the need for a cyber–mission today in inaccessible countries
and areas. A positive aspect of cyber space is that the missionary working area becomes wider and
we are today living in the era of cyber space. With cyber space the borders of nations that restrict
oppress the Christian religion can be crossed. The cyber space becomes a new missionary work field
and it has many unique features to reach into un–reached nations and people groups living in
restricted areas.
Advantages of cyber mission in inaccessible countries
To reach the un–reached ... Show more content on Helpwriting.net ...
When asked how 10,000 people came together to protest in front of Zhongnanhai (the Chinese
leadership compound in Beijing) on 25 April 1999, he replied, "They learned it from the Internet."
(www.falundafa.org 2001)
There are many other variables that explain the tenacity and growth of Falun Gong practice, both
within the PRC and around the world. Nonetheless, a look around the Internet reveals that Falun
Gong has established a significant online presence.
It is cyber space that plays a significant role in maintaining and expanding it. Discussions of Falun
Gong are common on China–themed chat rooms and bulletin boards. Email news lists deliver daily
updates to interested subscribers around the world.11 Falun Gong's shortwave radio station,
launched in the summer of 2000, also broadcasts on the Internet in streaming audio. The most
important is Falun Gong's presence on the World Wide Web. Practitioners maintain hundreds of sites
around the world; most contain content in both Chinese and English, while others feature such
languages as German, French, Russian, and Portuguese. This case study can help us see how internet
is a vital persuasive tool in spreading the gospel in inaccessible
... Get more on HelpWriting.net ...
Cyber Terrorism
In 1999, Chinese hackers targeted United States government sites, after an accidental bombing of a
Chinese embassy in Belgrade. During this attack, government sites were hijacked and some sites
suffered a denial of service attack. Most recently, it was suspected that Bank of America was the
victim of a cyber terrorism attack; although no definitive evidence is available to substantiate that
claim. Cyber terror attacks pose a threat against the national security of the United States. In order to
fully comprehend the threat that cyber terrorism poses, it is essential to understand the background,
the effects, the reality of the threat and the future of cyber terrorism. This assessment examines the
reality of the cyber terrorism threat, and ... Show more content on Helpwriting.net ...
Likewise, terrorists will strive to improve their cyber terror attack capabilities by keeping pace with
the emerging technologies and overcoming countermeasures.
Many computer security experts question the possibility that the Internet could be used to inflict
death on a large scale. Some precautions have been made. Systems have been established in the last
five years, which aim at preventing a possible cyber terrorism attack. "Air gapping" has been
established on all nuclear weapons, meaning the weapons are not connected to the Internet or any
open computer network and cannot be accessed by intruders or terrorists. Still, other areas of
concern include subways, gas lines, power grids and communication systems; which are owned
primarily by the private sector and are managed by Internet enabled computer systems.
Reality of a Cyber Terror Attack
Malicious cyber activity is occurring more frequently and with unexpected complexity. In mid–
December of 2009, Google experienced a highly sophisticated and targeted attack which originated
in China on its search engine infrastructure and e–mail, as well as on at least 20 other companies.
Attacks are occurring within the United States, as well. Attacks on government networks are
omnipresent. In 2008, NASA and other departments of Defense, Homeland Security and Commerce
suffered major intrusions by "unknown foreign entities" which
... Get more on HelpWriting.net ...
Teenagers And Social Media
Now more than ever living in the age of technology, social media has impacted our lives greatly.
With a click of a button we have the ability to communicate with friends, family, and ev en those we
may never have the opportunity to meet face to face. Some Believe that the use of social media
allows us to practice freedom of speech and provide an outlet for free expression. Unfortunately in
some instances social media, also gives us the opportunity to engage in behavior that normally we
wouldn't do in a face to face setting. Teenagers often don't understand that they have no privacy in
internet usage, and that social media allows users to access people information and use to insult or
bully them. Once you have posted something online it is other in the internet world forever. Any
potential employer can access your information and use that information in deciding whether or not
to give you a job. Often whatever you post can haunt you in the future. While many social media
websites have maintained privacy restrictions there is still a lot of information that can be accessed
with a click of a button. Many people including teenagers, don't realize that whatever you may post
on line cannot be erased. Often users will post their issues and problems seeking and outlet whether
for attention or to have someone to talk to. Once something is posted it allows others to post their
comments and opinions which can be negative. Social media sites such as Facebook,
... Get more on HelpWriting.net ...
The Prosecution Of Child Pornography In Australia
"Prosecution of child pornography"
The law is already enforced against child pornography and it is implemented and enforced over the
internet.
5. Social behaviour
Further social study proves that "cyber porn" distributed psychological difficulties. This domain is
causing problem in our society. At present there are more teenage single mums then ever before. The
psychological effects of the increased needs of sexual drive cause STD (Sexually Transmitted
disease). Over all, the easy access to "cyber porn" leading to potential negative psychological
consequences.
Case Against
1. Censorship for child, who is the responsible?
After taking close look at the circumstances in relation to "cyber porn" and access to internet for a
child, it is ... Show more content on Helpwriting.net ...
One perspective is that the "Arab Spring" may refer as "Twitter Revolution" or "Facebook
revolution". Social media played a vital role to reshape the politics of "Middle East". The impact of
this change was very crucial for the governments. The lash back of this change was different in
different countries. In "Tunisia" and "Egypt" government regimes did not have any social media
base and they could not estimate the impact of social media in the society. In "Tunisia" and in
"Egypt" nine out ten people responded to a poll conducted by the "facebook" to organise the protest.
Finally its ended up with a regime change democracy won through social media
... Get more on HelpWriting.net ...
Social Media Should Be Used Responsibly
As technology advances, the amount of people online is also growing. Among these people, a great
amount of them are teens. These teens are accessing the Internet through various digital devices and
communicating with one another through methods such as texting and emailing. Today, teens and
young adults are the ones who make up one of the largest groups on social media outlets. According
to the Pew Report, "Teens, Social Media, and Privacy," 95% of teens are on the Internet and 81% of
them use social media sites. In the opinion piece "Social Media Should Be Used Responsibly" by
Katie Atkinson, social media outlets "were created for harmless networking and fun, but have
instead turned into some of the greatest tools to harm others with" and thus, cyber bullying came
into existence. Cyber bullying is "a modern form of bullying performed using electronic forms of
contact" (Fabio Sticca & Sonja Perren). It is where kids send hate messages, post embarrassing
pictures of others, and hide behind fake identities to harass others. With all the new interactive
features on these social media sites, posting a hateful comment or sending a cruel message has
become easier than ever. According to cyber bullying statistics provided by the i–SAFE foundation:
"Over half of adolescents and teens have been bullied online and about the same number have
engaged in cyber bullying." The worst part of it all is that more than half of these adolescent do not
tell their parents when cyber bullying
... Get more on HelpWriting.net ...
Cyber Warfare And Security Threats
Abstract
The innovations in information technology and increased amount of interconnected electronic
devices today create new economic and social prospects as well as improve the overall quality of
our lives. While these leading edge technologies create opportunities, some have become prey to
attackers and has given birth to a new era of Cyber warfare. Consequently, the Internet, computers
and networks have become targets and vehicles of cyber attacks and generate challenges to our
security privacy. Cyber Warfare presents an ever–increasing amount of security threats, which
continue to escalate with increasing harshness, and is now a critical issue in our technology realm
and a growing threat to the world. Cyber wars are generally ... Show more content on
Helpwriting.net ...
Singer, P., & Friedman, A. (2014)
Cyberspace is now a military dimension; the word "cyber is a very significant and probably one of
the most common term used in today's international security dialogues. The Internet and e–
commerce are crucial to the economic competitiveness of many nations, businesses and
organizations, however cyber criminal have cost users millions of dollars and valuable assets.
Achieving security on the Internet is a very daunting task; as criminals and hackers have become
plagues to critical IT infrastructures, online communication and e–commerce.
Cyber warfare is a very costly and complex reality; it compromises the privacy of web users and has
shaped great battles between domains. Governments and organizations are faced with significant
threats and challenges daily as advanced software programs are developed and used to exploit and
disrupt their computer networks. These increasing series of cyber conflicts between nations, corrupt
gangs and virtual terrorist groups; all raises critical economic and national security issues in
countries across the globe. In a recent article Clayton (2011) stated that "Tomorrow 's wars will be
fought not just with guns, but with the click of a mouse half a world away that will unleash
weaponized software that could take out everything from the power grid to a chemical plant."
(Clayton 2011). It is very appalling to think that the insertion
... Get more on HelpWriting.net ...
Bullying Has Been A Big Problem In Our School System For
Bullying has been a big problem in our school system for many years, but it has escalated over the
past decade due to the new era of modern technology. Unanimously, we can agree that our daily
lives greatly depend on technologies; the internet, cellphones, computers, tablets, IPad etc. Although
the uses of technology positively impacted our lives, there is also the downside when it uses have
negative connotations. For instance, modern technology made it very easy to engage in
cyberbullying, perpetrators used cell phones or computers to conduct this hideous behavior, hiding
behind their keyboards to express negative feelings and or thoughts toward others. Using social
media for senseless and unwarranted insults to intentionally cause harm ... Show more content on
Helpwriting.net ...
Statistics have shown that everyone can be victims of cyber bullying, but most incidents occur
between the age of 11 to 15 years old, however, some report showed that children's as young as 10
years old also been a victim of cyberbullying. Cyberbullying can have long lasting effects on its '
victims that can lead to mental health issues like depression, anxiety, stress, and even suicide.
Increasing number of young kids and teenagers committing suicide because of cyber bullying and
sexting have been coming to the public 's attention. As reported by the Centers for Disease Control
and Prevention (CDC), suicide is the third leading cause of death among young people with
approximately 4,400 deaths every year. The CDC estimates that there are at least 100 suicide
attempts for every suicide among young people. More than 14 percent of high school students has
considered suicide and nearly 7 percent have attempted it, that is why, sadly, there are increasing
coverages about cyberbullying case in the media now more than ever. (NOBullying, n.d.) Despite
the physical contact or audible insults, cyberbullying can be even more traumatizing and damage
have a life time effect on mental health than traditional forms of bullying. Through social media and
mobile communications, bullying can now potentially be viewed by all, a victim 's friends, family,
and
... Get more on HelpWriting.net ...

More Related Content

More from Tina Jordan

Pmi Charleston Scholarship Essay Templates At Allbu
Pmi Charleston Scholarship Essay Templates At AllbuPmi Charleston Scholarship Essay Templates At Allbu
Pmi Charleston Scholarship Essay Templates At AllbuTina Jordan
 
O-Level English Essays 1 Scholastic International
O-Level English Essays 1 Scholastic InternationalO-Level English Essays 1 Scholastic International
O-Level English Essays 1 Scholastic InternationalTina Jordan
 
🔥 How To Protect The Environment Essay. Protec
🔥 How To Protect The Environment Essay. Protec🔥 How To Protect The Environment Essay. Protec
🔥 How To Protect The Environment Essay. ProtecTina Jordan
 
Effective Speech Introductions. How To Write An Introduction For A
Effective Speech Introductions. How To Write An Introduction For AEffective Speech Introductions. How To Write An Introduction For A
Effective Speech Introductions. How To Write An Introduction For ATina Jordan
 
Cracking The Conclusion Wr
Cracking The Conclusion WrCracking The Conclusion Wr
Cracking The Conclusion WrTina Jordan
 
Reflective Essay For High School Templat
Reflective Essay For High School  TemplatReflective Essay For High School  Templat
Reflective Essay For High School TemplatTina Jordan
 
Discover How To Write A Term Paper And Find New Exampl
Discover How To Write A Term Paper And Find New ExamplDiscover How To Write A Term Paper And Find New Exampl
Discover How To Write A Term Paper And Find New ExamplTina Jordan
 
Essay Outline Blank Form - Blank Essay Outline Template
Essay Outline Blank Form - Blank Essay Outline TemplateEssay Outline Blank Form - Blank Essay Outline Template
Essay Outline Blank Form - Blank Essay Outline TemplateTina Jordan
 
The Best American Essays College Edition By Robert
The Best American Essays College Edition By RobertThe Best American Essays College Edition By Robert
The Best American Essays College Edition By RobertTina Jordan
 
Performance Related Pay- E
Performance Related Pay- EPerformance Related Pay- E
Performance Related Pay- ETina Jordan
 
English Creative Writing Essays
English Creative Writing EssaysEnglish Creative Writing Essays
English Creative Writing EssaysTina Jordan
 
Writing Papers High
Writing Papers HighWriting Papers High
Writing Papers HighTina Jordan
 
Best Website To Buy Essays
Best Website To Buy EssaysBest Website To Buy Essays
Best Website To Buy EssaysTina Jordan
 
College Applications Essays
College Applications EssaysCollege Applications Essays
College Applications EssaysTina Jordan
 
Cheap Essay Writing Service Us
Cheap Essay Writing Service UsCheap Essay Writing Service Us
Cheap Essay Writing Service UsTina Jordan
 
Cheapest Essay Writing Service
Cheapest Essay Writing ServiceCheapest Essay Writing Service
Cheapest Essay Writing ServiceTina Jordan
 
Guided Essay Writing
Guided Essay WritingGuided Essay Writing
Guided Essay WritingTina Jordan
 
Good College Essay Prompts
Good College Essay PromptsGood College Essay Prompts
Good College Essay PromptsTina Jordan
 
Writing Quotes In Essays
Writing Quotes In EssaysWriting Quotes In Essays
Writing Quotes In EssaysTina Jordan
 
How To Make Essay Writing
How To Make Essay WritingHow To Make Essay Writing
How To Make Essay WritingTina Jordan
 

More from Tina Jordan (20)

Pmi Charleston Scholarship Essay Templates At Allbu
Pmi Charleston Scholarship Essay Templates At AllbuPmi Charleston Scholarship Essay Templates At Allbu
Pmi Charleston Scholarship Essay Templates At Allbu
 
O-Level English Essays 1 Scholastic International
O-Level English Essays 1 Scholastic InternationalO-Level English Essays 1 Scholastic International
O-Level English Essays 1 Scholastic International
 
🔥 How To Protect The Environment Essay. Protec
🔥 How To Protect The Environment Essay. Protec🔥 How To Protect The Environment Essay. Protec
🔥 How To Protect The Environment Essay. Protec
 
Effective Speech Introductions. How To Write An Introduction For A
Effective Speech Introductions. How To Write An Introduction For AEffective Speech Introductions. How To Write An Introduction For A
Effective Speech Introductions. How To Write An Introduction For A
 
Cracking The Conclusion Wr
Cracking The Conclusion WrCracking The Conclusion Wr
Cracking The Conclusion Wr
 
Reflective Essay For High School Templat
Reflective Essay For High School  TemplatReflective Essay For High School  Templat
Reflective Essay For High School Templat
 
Discover How To Write A Term Paper And Find New Exampl
Discover How To Write A Term Paper And Find New ExamplDiscover How To Write A Term Paper And Find New Exampl
Discover How To Write A Term Paper And Find New Exampl
 
Essay Outline Blank Form - Blank Essay Outline Template
Essay Outline Blank Form - Blank Essay Outline TemplateEssay Outline Blank Form - Blank Essay Outline Template
Essay Outline Blank Form - Blank Essay Outline Template
 
The Best American Essays College Edition By Robert
The Best American Essays College Edition By RobertThe Best American Essays College Edition By Robert
The Best American Essays College Edition By Robert
 
Performance Related Pay- E
Performance Related Pay- EPerformance Related Pay- E
Performance Related Pay- E
 
English Creative Writing Essays
English Creative Writing EssaysEnglish Creative Writing Essays
English Creative Writing Essays
 
Writing Papers High
Writing Papers HighWriting Papers High
Writing Papers High
 
Best Website To Buy Essays
Best Website To Buy EssaysBest Website To Buy Essays
Best Website To Buy Essays
 
College Applications Essays
College Applications EssaysCollege Applications Essays
College Applications Essays
 
Cheap Essay Writing Service Us
Cheap Essay Writing Service UsCheap Essay Writing Service Us
Cheap Essay Writing Service Us
 
Cheapest Essay Writing Service
Cheapest Essay Writing ServiceCheapest Essay Writing Service
Cheapest Essay Writing Service
 
Guided Essay Writing
Guided Essay WritingGuided Essay Writing
Guided Essay Writing
 
Good College Essay Prompts
Good College Essay PromptsGood College Essay Prompts
Good College Essay Prompts
 
Writing Quotes In Essays
Writing Quotes In EssaysWriting Quotes In Essays
Writing Quotes In Essays
 
How To Make Essay Writing
How To Make Essay WritingHow To Make Essay Writing
How To Make Essay Writing
 

Recently uploaded

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 

Recently uploaded (20)

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 

Negative Effects Of Social Media Essay

  • 1. Negative Effects Of Social Media Essay The negative effects of social networking on youth and young adults are; cyber bullying, antisocial, lack of independence, makes someone less patient, lack of confidence in their physical appearance, identity theft, cyberstalking, sharing too much, decrease in productivity. Cyberbullying is when someone is rude and disrespectful and bullies someone else online. Antisocial is when you are unable or struggle to talk to someone in real life or face to face. The lack of independence is when someone is unable to be independent and now relies on someone else. And impatient is when someone is unable or struggle to tolerate delay or is quickly irritated. Cyber bullying is a negative effect because they are putting people down and making them feel bad about themselves. This can cause them to do terrible things such as committing suicide or cutting themselves and can make them very depressed. Antisocial is a negative effect because they will be unable and struggle to talk to people in real life. This happens when they are texting and aren't really talking to anyone for a long period of time. Then when they do talk to someone in real life they struggle because they lost all of their confidence in themselves. This is bad when they go for an interview or they are ordering food, or even when they are meeting someone new. The lack of independence is a negative effect because they will be more dependent on someone or something to get stuff done. They will struggle to do anything by ... Get more on HelpWriting.net ...
  • 2.
  • 3. Pros And Cons Of Cyber Warfare 3.1 Cyber Warfare Richard A. Clark, an expert in security sector governance in his book Cyber War (May 2010), defines Cyber War as an act of penetration of a country against other computer network with the intent of causing damage and disruption. The Economist magazine explained that cyber war is the fifth domain of warfare, after land, sea, air and space. Cyber warfare, (also known as cyber war and Cyber warfare), is a war with the use of computer networks and the Internet in cyberspace (cyber space) in the form of defense and attack information. Cyber warfare is also known as cyber warfare refers to the use of the World Wide Web and computer to conduct warfare in cyberspace. Although sometimes relatively minimal and lightweight, so far cyber warfare could potentially cause a serious loss of data and information systems, military activity and other service disruptions, cyber warfare means can pose as disaster risk worldwide. 3.1.1 The development of Cyber Warfare In 1991, someone in the air force reported a computer virus named AF / 91, the virus was created and has been installed on the printer chips and make his way to Iraq via Amman and Jordan. His job is to create an anti–aircraft weapon damage Iraq. In 1998, the US and NATO in order to successfully bombed Serbian targets in Kosovo, the United States needs to deceive and disrupt air ... Show more content on Helpwriting.net ... Perhaps the US can serve as a reference for developing capability. Latest test results of five large super computer capable of extremely high with Rmax and Rpeak are judged by the size of Tera Flops / 1012 Flops (Floating Point Operations Per Second), numbers 1 to 3 US computer occupied. Power of data measured in KW for the entire ... Get more on HelpWriting.net ...
  • 4.
  • 5. Taking a Look at Cyberbullying In May 2013, Gabrielle Molina, a 12 year old excellent and outwardly positive student, took her life after being called a "slut" and a "whore" online. Throughout the use of social media, teens are potentially susceptible to become victims of cyber–bullying, and the drama that rises from it could work as a catalyst in the development of psychological traumas. To help the prevention of bullying, parents and schools must work hand in hand in this issue by incorporating anti–bullying education in their curriculums, and establishing a channel of communication and trust between adults and teens. The Centers for Disease Control and Prevention has identified cyber–bulling an "emerging public–health problem," notes Thomas Billitteri from the CQ Researcher. Cyber–bullying is a growing trend that has been blown out of proportion during recent years. Jaana Juyonen, a professor of psychology at UCLA, asserts that "more than 70 percent of heavy Internet users ages 12 through 17 – mostly girls – said they had experienced at least one incident of online intimidation via e–mail, cell phones, chat rooms and other electronic media in the previous years." This high amount of energy teens spend on social media is making them susceptible to cyber–bullying. Alex Orozco, a 19 year old college student who also went to my same high school, recalled, "Just last week I was going through my Twitter's news feed and I bumped into this horrible fight between two girls at my school. Worst part of it was, ... Get more on HelpWriting.net ...
  • 6.
  • 7. Cyber Security And Cloud Computing Essay Cyber Security and Cloud Computing ISCG – 8047 Cyber Security and Web Applications ASSIGNMENT 1 Submitted To: Submitted By: Prof. Bahman Sarrafpour Sojan Chandy Therakom: 1468736 Contents Introduction 2 Why is it important 2 Cyber war 3 Major Threats 3 Viruses: 3 Worms: 3 Spyware/Adware: 3 Trojans: 3 Rootkit 3 Botnet 4 Hoaxes and Urban Legends: 4 Denial–of–service (DoS): 4 Various Security Standards 4 Spoofing identity: 4 Tampering with data. 4 Repudiation. 5 Information disclosure. 5 Denial of service. 5 Elevation of privilege. 5 (ISO/IEC 27001) 5 CPE: 5 CWE 5 CVE 5 CAPEC: 5 CCE: 5
  • 8. Security Tools 6 Honeypots 6 Classification of honeypots 7 Honeypot Implementation 7 Honeyed 7 Service–specific honey pots 8 Web Application Firewall 8 ModSecurity for Web Applications 8 ModSecurity for IIS 9 Conclusion 11 Cyber Security and Web Applications Introduction Almost all kind of large and small organizations might face increasing number of attacks into their network or intellectual property. This may lead to data disclosure, data destruction, and damage of organization's reputation. There are numerous threats in the cyber space which might be capable of stealing, destroying or making use of out sensitive data for financial and non–financial gains. As the amount of computer, mobile and internet users increases, so does the number of exploiters. Cybersecurity is the form of technologies, procedures and ... Get more on HelpWriting.net ...
  • 9.
  • 10. Cyber-Bullying: A Brief Research Proposal Essay Introduction Internet usage in children and adolescents has been increasing in a steadily fashion in the past number of years and with the increase in internet usage, a new form of bullying has developed – Cyber bullying. Cyber bullying can be defined as "the electronic posting of mean– spirited messages about a person," (Merriam–Webster, 2012). This form of bullying can come through various mediums including but not limited to text messages, emails, videos, and social networking sites. There is an overwhelming amount of information that defines cyber bullying, identifies the demographics of bullies and victims of cyber bullying, and identifies the outcomes of cyber bullying on victims. More focus needs to be placed on who the perpetrators ... Show more content on Helpwriting.net ... Additionally, a large amount of cyber bullying tends to take place within social groups. Perpetrators of need not be the traditional strong, powerful bully but could be the individual who is too shy to intimidate others in the traditional sense so they turn to the cyber world where they may remain somewhat anonymous (Juvonen & Gross, 2008; Mishna, Cook, Gadalla, Daciuk, & Solomon, 2010; Mishna, Saini, & Solomon, 2009). One study showed that over half of the perpetrators of cyber bullying are friends of the victim, and a further amount of perpetrations know the victim (Kowalski & Fedina, 2011). It has been demonstrated in a number of studies that the more time an individual spends on the computer and internet, the more likely they are to be cyber bully victims, perpetrators or both the victim and bully (Mishna, Khourg–Kassabri, Gadalla, & Daciuk, 2012; Sengupta & Chaudhuri, 2011). The most common mediums of cyber bullying are through email, instant messages, or internet social networking sites; however, the medium with the greatest impact on its victims is picture or video bullying (Beran & Li, 2005; Kowalski & Fedina, 2011; Slonje & Smoth, 2008). It has been suggested in the past that children who have access to social networking sites are more likely to be perpetrators or victims of cyber bullying, however, results from one study indicates this is not the case. Alternatively, it was suggested ... Get more on HelpWriting.net ...
  • 11.
  • 12. Persuasive Essay On Cyber Bullying A couple days adrive she cathe opponent crying to school. She replicated over and over again on how ugly she was, and how he made her feel pretty. She threw up her sleeve that those were the bruises he left her "I met him online." The online world wasn't meant to be dangerous. It was intended to be a useful source and to receive skills. It will also increase the ranking of competition in a variety of stuff . It wasn't made for people to drive online and sexually harassed, and violate privacy. Never did the creators of the online world think they had made a dangerous place for people. Adults should concentrate on teenagers' tithe opponent online. Cyberbullying is different from schoolyard bullying. Teachers can't intervene to the internet. Teens spend the preponderance of their day online just scrolls down seeing stuff that may be harming other students, however, students refusal show their relevance to this important title of cyber bullying. While the internet is an essential mechanism, numerous people compose it a dilemma. The internet is a like a reward, once you recognize it you are excited, however having the internet for a while, you tend to comprehend and bring tired of doing the sathe opponent material so you start looking up different stuff to do on the internet. In the article "Crossing the Line Online," teens did a survey on teenagers who have been called a nathe opponent or even asked about their sexuality.12 percent of the boys answered that "they have ... Get more on HelpWriting.net ...
  • 13.
  • 14. Hello Bullying Student's Name Here XXXX University Introduction There are so many incidents on television where teenagers are being bullied via Facebook and other online sources. Almost every adolescent has access to the internet nowadays and most of them have a mobile phone. Therefor it is not surprising, that cyberbullying or bullying through these new communication technologies is increasing. In order to put cyberbullies to a stop it is necessary to know, who these teenagers are, what they do, and why they bully. This research will introduce briefly the suicde of Megan Meier and the foundation what is set into effect today to prevent children and teenagers from being victims like her. Another young victim of cyberbullying was a local ... Show more content on Helpwriting.net ... But the rewards could also be less tangible. Bullies often enjoy status and prestige because others fear them. They also command a lot of attention for their behavior. Some children who bully others don't want to lose their popularity status so they assume that by increasing their motive of bullying they stay popular. To avoid losing social status, they deliberately selected victims who were unpopular (Sognonvi, 2010). 3. Bullies lack empathy, and may even get pleasure out of other people's pain Bullies score low on tests of empathic reactivity, and have also found that bullies can be more likely to develop anti–social personality disorder. This is a condition that causes people to ignore the rights and feelings of those around them. One study scanned the brains of young people who had exhibited bullying behaviors in the past, while they were watching videos that showed people experiencing pain. The researchers noticed a great deal of activity in the areas of the brain devoted to reward and pleasure. This suggests that it's not just a lack of empathy that's the problem. Some bullies may actually derive pleasure out of seeing other people's pain (Sognonvi, 2010). 4. Bullies lack the ability to self–regulate emotions The same researchers who conducted the brain scan study made another surprising discovery: the parts of the bullies' brains that allow them to self–regulate their emotions were inactive. This suggests that bullies simply don't have a way to ... Get more on HelpWriting.net ...
  • 15.
  • 16. Cyberbullying : The New Era Of Bullying And Violence Cyberbullying: The New Era of bullying And Violence In School Bullying has been a big problem in our school system for many years, but it has escalated over the past decade due to the new era of modern technology. Unanimously, we can agree that our daily lives greatly depend on technologies; the internet, cellphones, computers, tablets, IPad etc. Although the uses of technology positively impacted our lives, there is also the downside when it uses have negative connotations. For instance, modern technology made it very easy to engaged in cyberbullying, perpetrators used cell phones or computers to conduct this hideous behavior, hiding behind their keyboards to express negative feelings and or thoughts toward others. Using social media ... Show more content on Helpwriting.net ... If a teacher, parent, lawmaker, and even the child them self– put more effort into educating yourself about cyber bullying it will not be in this situation. Statistics have shown that everyone can be victims of cyberbullying but most incident occur between the age of 11 to 15 years old, however, some report showed that children's as young as 10 years old also been a victim of cyberbullying. Cyberbullying can have long lasting effects on its ' victims that can lead to mental health issues like depression, anxiety, stress, and even suicide. Increasing number of young kids and teenagers committing suicide because of cyber bullying and sexting have coming to the public 's attention. As reported by the Centers for Disease Control and Prevention (CDC), suicide is the third leading cause of death among young people with approximately 4,400 deaths every year. The CDC estimates that there are at least 100 suicide attempts for every suicide among young people. More than 14 percent of high school students have considered suicide and nearly 7 percent have attempted it, that is why, sadly, there are increasing coverages about cyberbullying cases in the media now more than ever. (NOBullying, n.d.) Despite the physical contact or audible insults, cyberbullying can be even more traumatizing and damage have life time effect on mental health than traditional forms of bullying. Through social media and ... Get more on HelpWriting.net ...
  • 17.
  • 18. Hiding One 's Identity Is Nothing New Hiding one's identity is nothing new. Alexander Hamilton, James Madison, and John Jay authored The Federalist Papers in 1787 under the pseudonym Publius. The ability to communicate anonymously is viewed as part of our basic right to free speech . With the advent of computers and ease of access to the internet, becoming anonymous as never been easier, and is far more reaching than the colonial newspapers of 1787. For some this ease at which we can communicate anonymously is cause for concern. Although we are no longer hiding our identities to promote the ratification of the Constitution, being anonymous still plays a significant role in our society. Online anonymity grants anyone with an internet connection an unbiased voice, regardless of gender, race, or wealth. Without this freedom to online anonymity, many people would not feel free to express themselves or share sensitive information about themselves. In the case of whistleblowing, anonymity also promotes the release of information to help fight government corruption and oppression. Anonymity can also be used as a security measure and prevent unauthorized mining of personal information by not giving access to our real identities. While the ethics behind anonymity can be foggy, multiple ethical frameworks, including duty–based and just–consequentialism, can be used to add clarity to the topic. A duty–based framework stresses the role of duty and respect for persons, including one's self. While a just–consequentialism ... Get more on HelpWriting.net ...
  • 19.
  • 20. Bullying And The Cyber Bullying Essay IDENTIFICATION PROBLEM STATEMENT BACKGROUND Cyber bullying refers to something when one uses their cell phone, computers or an electronic device to access internet and technology for the purpose of harassment and providing harms to others. Sending inappropriate messages, uploading disturbing images, threatening and posting something without someone's' approval are the forms of cyber bullying. The main aim of this research study is to look after the cyber bullying and the possible reasons of occurrence in teenagers. With the reasons we will be also identifying the solutions to the problems. This study will be limited to teenagers with the age group of 13–19. The importance of this research is that it will help to find out the risk–related findings, so that one can know how and why teenagers are involved and participated in the cyber bullying (Elisabeth Staksrud, 2007). With the reasons and occurrence behind the cyber bullying, this will be also focusing on the preventive measures as well as influencing factors which might be their parents, friends or the educators in the education academy. Some of the results of the cyber bullying leads the victim to the anxiety, depression and even suicide. CONTEXT The main context that is focused in the research study is the involvement of the teenagers in the cyber bullying. These involvements occur while teenagers are living their normal life. We can say that they are involve in these activities when they are in school with their ... Get more on HelpWriting.net ...
  • 21.
  • 22. Persuasive Essay On Cybercrime Imagine, one day you wake up and you're running late. On your way into work you stop at your favorite coffee shop. You order your coffee and your muffin, and you go to swipe your card only to find out it declines. What do you do? You call your bank and they tell you several accounts have been hacked and yours was one of them. Now you have no money, no access to your savings. Everything you've ever worked for is gone and it only took one click. This is a very real possibility, and it doesn't stop at bank accounts. Cybercrime is at an all–time high, and no one is safe. Cyber threats have vastly grown over the past decade, we need to better prepare ourselves and become more aware in the event of future attacks. Cybercrime is not limited to bank fraud or identity theft, it is any crime that is committed by use of an electronic device, such as a computer or cellphone. For example, in August 2001 Rafael Nunez also known as RaFa successfully hacked into a NASA employee's computer and obtained classified shuttle designs for future space crafts. While this attack did not cause any real harm, he did leak the designs to a local reporter to prove his theory that NASA isn't as secure as everyone may have thought. Another form of cybercrime would be internet stalking, one out of twelve women experience some type of cyber stalking in their lifetime, and most predators are men. This could lead to cyberbullying, which is something you see occur every day. October 17th, 2006, ... Get more on HelpWriting.net ...
  • 23.
  • 24. Cyberbullying : An Act Of Aggressive Act Bullying can be define as an act of aggressive act that is intentional, Taking force upon someone who cannot defend themselves from an individual or group. Cyberbullying is nearly the same thing as bullying but is done online, using electronic devices such as phones, emails, and social networks. Cyberbullying can happen in many different ways , through phone calls, text messages, blogs, pictures and more. The availability of internet makes it easier for bullying to take place in the long run this can cause numerous problems. The effects of bullying can cause suicides, depression and isolation. Daily around the world kids are getting bullied . Frightened and unable to say what is going on to anyone. There has been novels , movies and ... Show more content on Helpwriting.net ... Cyberbullying happen 24/7 on phones , laptops , tablets and many other technology things that young people use today. Cyberbullying takes away your privacy, sharing it with others. Four in ten teens have experienced online bullying; girls are twice as likely to be victims and criminals of cyberbullying (Phillips). Girls are more likely to engage in social sabotage of other people (Phillips). Girls have the mindset of trying to be better than others and are willing to do anything to advance them. Boys are more likely to bully girls and other males who are not as confident (Phillips). Boys whether bullying these type of people so things would not happen to them. Cyberbullying is mostly done by 15 and 16 year olds (Phillips). This is age group when teens uses technology heavily. The more people post on social sites and the more they share their information the easier it may be to get attacked by a cyberbully. Cyberbullying is real and often more frightening than face to face bullying (Phillips). Similar to stalking victims can often feel helpless and isolate and ashamed, and not willing to share with friends or parents about what is going on (Shpantzer). The groups feared that they will be restricted from electronic devices if they told parents or that they might overreact (Phillips). This should not keep anybody from telling someone how someone is treating them. Studies have indicated that the number of youth ... Get more on HelpWriting.net ...
  • 25.
  • 26. Bullying Vs Cyber Bullying Essay Bullying is a major problem that impacts many teens over generations, causing an endless cycle of bullying. With the new age of technology, this leads to new issues that are affecting teens' lives. One of these issues is that cyberbullying is quickly becoming more common than the traditional playground bullying, as more social media are appealing to teens. Cyberbullying is a type of bullying that happens using electronic devices such as phones, laptops, and tablets. This form of bullying includes spreading rumours, sending mean and hurtful messages and sharing embarrassing videos or photos. Cyberbullying over social media has become extremely easy for bullies to victimize other teenagers affecting the victim's mental health. Therefore, ... Show more content on Helpwriting.net ... The day after, Meghan had come home from school where she was handing out invitations to her fourteenth birthday party that was in a few weeks, but when she logs on to her MySpace account, she sees all the negative and harsh words that others are posting on her page. Her mother and father try to tell her to get offline and that everything is going to be okay, but later that night Meghan hangs herself in her closet. The last comment is from Josh tells her that everybody hates her and that the world would be a better place without her in it. Weeks later, Meghan's parents find out that Josh is not actually Josh, that he is not even an actual person. Josh's page is a group of moms that live in the same community. This mother was trying to see if Meghan was talking about her daughters behind their backs and thought it was a joke (TEDx). MySpace gives Meghan's bullies the anonymity to protect them from their true identities, letting these neighbours mess with Meghan in a way that is non–imaginable. Without this protection Meghan and her parents would have known who the real Josh Evans is and could have been able to stop the bullying faster, possibly saving Meghan from taking her life. Facebook says that "8.7 percent of its 955 million monthly active users worldwide are actually duplicate or false accounts" (Kelly). The fake accounts hide the bullies' true identity, giving the bully or bullies protection to ... Get more on HelpWriting.net ...
  • 27.
  • 28. Creating A New Cyber Force 1. Today, there is a new battlefield domain where a keyboard and mouse are the new weapons of conflict. With land, sea, air and space in the background, warfare has entered a fifth domain: cyber. In this position paper, using a pro and con format, the debate on whether or not the Department of Defense (DoD) should create a new, independent branch for cyber will be discussed. To do this, the following will examine both sides of debate by highlighting two main points: the elimination of duplication of effort and the intensive resources required to make the transition. Finally, a look into a larger talent pool will be explored to highlight the largest benefit of creating a new Cyber Force. It is this paper's stance that the DoD should create a separate structure in order to meet the new domain's unique demands. 2. To better understand this topic, a brief background on cyber warrants a closer look. President Obama concluded as early as 2009 that the nation's digital infrastructure of networks and computers that we depend on should be treated as a strategic national asset.1 With the former head of security at Microsoft acting as the cybersecurity tsar for the White House and General Keith Alexander, Director of the National Security Agency (NSA), leading Cyber Command (CYBERCOM), the protection of the nation's infrastructure is finally being treated like a national security priority.2 This shift brings with it a debate on how to structure the US assets to realize its ... Get more on HelpWriting.net ...
  • 29.
  • 30. Disadvantages Of Cyber Space Many of years, humans have admired cyber space as a magical world & talked about its contribution to world from past Vs what we are today. I wouldn't be surprised to see the world still keep on getting amused about its power and potential by further innovation. We started building intelligent chips which can be embedded into "Car" system to navigate around the world OR transport system which helps in monitoring the location of trains OR wireless devices which keeps on sending data to earth from space etc. All of these which are more commonly used as term "Internet of thing" works well in convergence of Cyber world or Internet. However, while we were growing towards next generation using cyber space, there was a small community started incubating which sensed the negative advantage of cyber space which can be taken for their own profit. This profit can be in form of money, defamation of competitors, revealing secrets etc. this community were commonly known as "Hackers". These hackers are constantly challenging & questioning the security of Cyber Space. ... Show more content on Helpwriting.net ... There could be various forms of exploitation. Viruses, Malwares, Botnets, spywares are few of the forms with the help of which a vulnerability can be exploited to get financial gain. In the early age of cyber space, finding a vulnerability and exploiting it was just a fun however, as cyber space grown and humans and technology started becoming inseparable, the birth of good or bad hackers evolved. The evolution even got accelerated when these "Hackers" were used as a "Cyber Weapon" by big brands against their competitors. Now there is a "Black Market" where the information can be sold & the highest price would be paid for vulnerability which can cause "Zero Day" ... Get more on HelpWriting.net ...
  • 31.
  • 32. Social Media Addiction For those who want to relax take a week long vacation, or how about putting down your distracted devices. No matter if it's for business or personal use we can't go a day checking our social feed. Social media was created for enjoyment, but humanity has destroyed the purpose. Social Media has caused so much chaos over the last decade, and it is only getting worse. Lies, death, deceit, and misery have all happened over the internet. Many people have lost their self– respect, and more violence has occurred for the entire world to see. Our generation we are "social addicted", and that is not always a good thing. Social Media is the root of all evil, I am convinced. The use of social media is consuming most of lives on a daily. Every second we are constantly consumed into our phones. Let's face it the world needs technology, and it makes it more convenient to do things. A lot of negative things happen over the internet, and social media causes people harm. Cyberbullying has increased over the last decade. People feel like they can say anything because they are behind the screen. Cyberbullying can make people feel bad, and insecure about who they are. Children especially are really sensitive to hurtful comments, and that can lead to dangerous outcomes. Children and adults of all ages have committed suicide because of being cyberbullied over the internet. People social bully others by harassing them over the internet. Children and teenagers are the main victims that attract ... Get more on HelpWriting.net ...
  • 33.
  • 34. Analysis Of The Book ' Reena Patel ' Essay The author of the book, Reena Patel is a feminist scholar and the theme of her book is specifically on the mobility and inequality faced by women in the society due to their timings of employment at the Call Center Industry. The study is the first in–depth research on the transnational call center industry which has been written from the women worker's point of view. Reena Patel conducted an Ethnographic study in the cities of Mumbai, Bangalore and Ahmedabad. The new challenges faced by them with regard to the night shift employment alongside the opportunities to work in an upscale globalised work environment, and the attraction towards a relatively high wage is a source of fast access to money. The Call center Industry with its globalised work environment and high wages has attracted many women in liberating their lives. The main theme of the book around which the rich narratives are woven for women is the Spatial–temporal conversion regarding their flexibility in the urban setup in India. The repercussions experienced by women of exploring the night as a time and space of the night time, belonging to men according to the traditional Indian society idea. There are patriarchal notions attached to the idea of women getting out of the households at night to work in a public space and is vulnerable to the rising violence in our country against women. The nocturnal space is considered to be a man's domain and if invaded by a female figure becomes problematic for the woman ... Get more on HelpWriting.net ...
  • 35.
  • 36. Social Networking : The Causes And Dangers Of Social Media Social media has become to be such a big platform over the years. You use it to interact with family members that live far away, friends, or even complete strangers that you want to get to know. Social media is known to create conflicts interacting and showing complete strangers what is going on in your life on a daily basis and you not knowing their intentions. Social media even gives out false information can be news or just blogs just posting about what they have heard around or seen. Social media can take over a life with a touch of the button various ways, it is up to the person behind the screen to control it. What I find to be a big problem with social media today is identify, people who Portray being someone else behind screen. Social media has became such a big issue because it is dangerous being on social media, say if you were interacting and chatting with others online that you've never met in person you don't really know who is behind the screen. That person can be a criminal, rapist, kidnapper, etc. Using social networks to maintain a relationship can be quite easy. Online relationships, it can be tempting to hide the truth and easy to present a different side of yourself that isn't really you just to get what you want online. For the most part everyone does this to a certain extent, especially for those who feel uncomfortable with themselves. If anyone has any distrust towards a friend or in a relationship, this tendency can be taken to the level of ... Get more on HelpWriting.net ...
  • 37.
  • 38. Cyber-Bullying and Teen Suicide Since Teen Suicide is the second leading cause of teenage death in the United States, there is a need for legislation that promotes awareness and education about Cyber–Bullying. by R. Hassan February 8, 2011 Fourth Period Mr. Cicala Robinson Secondary School Since Teen suicide is the second leading cause of teenage death in the United States, there is a need for legislation that promotes awareness and education about Cyber–Bullying. Due to the growth of technology in the American society, the younger generations of adolescents are adapting to the excessive use of computers, cell phones, and social–networking sites. According to a study done by Amanda Lenhart, 87% of adolescents who are ... Show more content on Helpwriting.net ... The most common is "Mean Girls" cyber bullying which has been seen in the case of Tina Meir who committed suicide at age 13 (Billitteri 385). "Mean Girls" refers to the type of cyber bullying in which is usually performed by a group of young girls looking to have fun in the act. The group girls most often want others to know who they are and what they are doing in order to feel powerful. Research has shown that females are almost twice as likely to be involved in cyber bullying either being a victim or perpetrator. The second category would be "Inadvertent" cyber bullying which consists of role–playing. The perpetrator may not realize they are cyber bullying, yet they interpret their offensive and cruel remarks through a joking manner. The next category is somewhat similar in the sense that the bully may not realize that they are virtually cyber bullying. "Vengeful Angel" refers to an individual who is defending themselves or others from an attack, which ultimately leads them to becoming a cyber bullying as well. The last category can be similar to the "school–yard" bully, which is the "Power–Hungry" bully. This category refers to those who may be victims of bullying themselves. A "Power–Hungry" bully wants to feel powerful and control others through their cyber bullying. Overall experts say that it is most common for the perpetrators to be classified as "popular" student with self–esteem who are trying to bring others down by placing ... Get more on HelpWriting.net ...
  • 39.
  • 40. The Security Challenges Of The Cyber Space UK CYBER ESSESTIALS SCHEME (UKCES): To differentiate the security challenges of the cyber space, a security scheme was proposed by the government of UK which majorly focuses on the policy followed by it. It concentrates on the criticalness of a sheltered framework through a sensible approach and sets up structures that are obliged to combine together for current effort to push towards a venture to see the key objective of making a secured cyber space. (Cleveland, 2008). It accents on the requirements of the administrations, proficient and the worldwide assistants to collaborate nearby individual in common with the objective of enhancing so as to decrease the threat and abusing data in order to build up the UK in worldwide web. Cyber protection controls: Boundary firewalls and internet gateways. Safe configuration. Threat protection. Management of patch. Access control. By utilizing the solid firewalls and Internet gateways the information and the applications of the association must be secured from the unapproved access. The framework must be legitimately configured to decrease the vulnerabilities level that are acquired and correct capacity must be performed. Idiosyncratic access advantages must be accommodated the approved clients. The framework can be constantly monitored so that it can be prevented from any malwares and usage of the antimalware programs should be carried out. (Curphey, 2006). Each framework has a product working on it and that product has to ... Get more on HelpWriting.net ...
  • 41.
  • 42. Cyberbullying and Its Harmful Effects on Teens Cyberbullying and Its Harmful Effects on Teens Teens have nowhere to hide. Cyberbullying is increasing alongside of advances in technology. Most teens now have access to electronic communications and the Internet, making them easy targets for cyberbullying. Cyberbullies are using e–mail, cell phones and the Internet to cause emotional harm, harass, threaten, ridicule, and exert control over their victims. Additionally, cyberbullied teens are committing suicide at an alarming rate. Cyberbullying must be stopped; it poses psychological trauma and health risks, affects social interpersonal skills, and can ultimately cause suicide. A Cyberbully is able to breach every part of its victim's life, and keeping teens safe in cyberspace will be a ... Show more content on Helpwriting.net ... Dr. Karnik, a child and adolescent psychiatrist at the University of Chicago clinic, began noticing a rise of complaints about online harassment from his patients, and stated: "We do see more of this happening, [partly because] it's so simple to do, . . . It doesn't require you to stand in front of a person to bully them" (Moyer). To identify potential victims and perpetrators of cyberbullying, physicians need to ask all their patients who use the Internet what they do online, and to specifically inquire whether they use social networking sites and ever felt as if they were harassed. Physicians who encounter cyberbullying first should assure victims that they are not at fault, then should determine their level of danger for self–harm and for acts inflicted by others and take appropriate steps to alleviate the dangers. On the other hand, if patients admit to cyberbullying, physicians should help them identify their actions as a problem, and then involve the parents or guardians in the situation. If physicians can intervene early enough, teens can be protected from a great deal of harm (Moyer). Cyberbully has devastating effects on teens' health as well as psychologically. Victims of cyberbullying will skip school or hide in the bathroom all day, they do not know who they can trust and so they trust no one, they lose their self–esteem, become anxious and are stressed, and feel hopeless. Cyberbully must be monitored and controlled by ... Get more on HelpWriting.net ...
  • 43.
  • 44. Making Cyberbullying a Criminal Offense "Even in death, Phoebe Prince was bullied" (Kennedy). That was the headline when a FaceBook page dedicated to Prince was hacked and filled with hurtful and derogatory comments about her. Phoebe was a regular teen that was cyber bullied to the extent that she couldn't take it anymore. Her body was found in a stairwell, and at 15 years old, Phoebe hanged herself. Although cyberbullying is a vague concept to many, it should be made a criminal offense because it is causing suicides for youth, government intervention is the only solution, and the bully should be punished instead of the victim. Being a recent issue, cyberbullying has seriously been taken for granted by society. Not only is it real and hurtful, but it is also leading to suicide as a result, especially for youth. From a survey taken by the Cyberbullying Research Center, 20% of around 2000 respondents reported seriously thinking about attempting suicide, and 19% did (Hinduja/Patchin). This means that one out of every five kids has been cyber bullied to such an extreme that life is no longer considered livable, or even bearable. One of these kids was Ryan Patrick Halligan, a regular teen living in Essex Junction, Vermont (Halligan). Unfortunately, he was repeatedly sent instant messages from his classmates accusing him of being gay, and was threatened, taunted, and insulted relentlessly. On October 7, 2003, at the age of 13, Ryan hanged himself while his family was asleep. The internet can humiliate and tip a person ... Get more on HelpWriting.net ...
  • 45.
  • 46. Mass Media Consumption Being Targeted For Sensitive... Abstract Are there laws in engraved stone that help tackle online abuse in this era of information? Are governing bodies doing enough to highlight and make aware infrastructures that are widely available for victims of abuse? This paper echo 's the voices for and against. This research found naïve consumers of mass media consumption being targeted for sensitive information that in–turn was used to abuse, cyber bully complaints of a sensitive age. Teenagers ignoring privacy policies were to blame for side stepping their own well being, sharing personal information that could map them to precise locations and endanger their wellbeing. On the contrary legislations have been in print for decades that help filter out any abusive manner offline and online. This research paper concludes that users are to blame for their laziness of sharing/leaking their live database of primary information that may be used to cyber bully/target individuals. Consumers should not be blamed entirely for their lack of knowledge as laws implemented in each country vary and entail some form of study that may not be easily interpreted. Governing bodies should invest in more ways in which user–friendly/simplified versions of legislations that may be easy to read and advertised on all new forms of mediums online. That can increasingly help warn new consumer of the World Wide Web. Introduction With 60% of the United Kingdom population actively using social media and 92.6% having access to the internet. ... Get more on HelpWriting.net ...
  • 47.
  • 48. Argumentative Essay On Social Media More often than not children are unaware of what is really going on, they just do what is told or pressured to them in order to fit in or be considered "cool". There are many advantages and disadvantages to social media when it comes down to peer pressure. With that being said, it all depends on how the social media site is being used on a day–to–day basis. Unfortunately, it is not difficult for young people to get their hands on some type of technology. "Ninety–four percent of young people have access to the Internet in their homes, while 23% of young people have their own cell phones, often equipped with text messaging capabilities and digital cameras" (Lawnow). Majority of the kids that have made friends and met people online have had a good experience with it, whereas just a few have not. The sites should only be used by finding new friends, setting a good example online, and connecting with others, and most importantly avoiding the content you know is bad for you. Today's world has changed so much, with the click of a mouse the younger generation has access to the world. A positive to social media is that the rates are continuing to increase, creating friendships and even relationships. Over the years, people have been recording the amount of cyberbullying that has been happening to individuals. They have recorded that just in one year, about forty–two percent of people with social media accounts are cyberbullied. Adults are starting to realize that the teenagers are ... Get more on HelpWriting.net ...
  • 49.
  • 50. Cyber Bullying Essay Cyber bullying is a form of bullying that uses electronic technology as a 'weapon' to inflict emotional distress to its victims. Electronic technology refers to equipment such as computers, tablets and phones. Interactive communication networks such as Facebook and Twitter, texting, websites and chat rooms are all included in this technological pool of cyber bullying tools. Examples of cyber bullying can range from insulting texts from smart phones to derogatory postings on social networking sites. According to the website stopcyberbullying.org (1) the methods used are 'limited only by the child's imagination and access to technology.' It is important to note that cyber bullying by definition can only be instigated by a minor against another minor. Once adults become involved, it is defined as cyber–harassment or cyber stalking (Huffingtonpost.com) (2). There are two types of cyber bullying: direct attacks (messages sent to victims directly) or cyber bullying by proxy (without the victim's knowledge). Cyber bullying is considered different to traditional bullying. It can occur 24 hours a day and the bully is often an anonymous person whose identity is hidden behind the security of a screen. The other concern is that the bully can share their information with a potential audience of millions in a matter of seconds and the victim can find it almost impossible to stop the information or delete it from reaching such a vast audience. According to the anti–bullying site ... Get more on HelpWriting.net ...
  • 51.
  • 52. Cyber Bullying Persuasive Essay Inspirational speaker, writer, and community leader Anna Maria Chávez once said "Cyber Bullies can hide behind a mask of anonymity online, and do not need direct physical access to their victims to do unimaginable harm." Cyberbullying is negatively taking over technology and adults aren't aware of the potential dangers it has on their children. To start, children and teens do not talk to their parents about the acts of cyberbullying that occur on their technology. Over half of young teens do not tell their parents when cyberbullying occurs. (Webstar, 2017) This is a big problem. This means that children are hurting, the result of cyberbullying, and they are afraid to talk to their parents, or any adult for that matter. They are keeping their emotions bottled up inside them, and parents have no idea this is happening. In fact, only 1 in 10 teens tell an adult if they have been a cyberbully victim. (Webstar, 2017) These numbers should not be the effect of cyberbullying. Children have to seek help from adults and stop the cyber bullies hiding behind their screen. Might I add, it should not be all on the children's shoulders. They are the victim, and they should stand up for themselves, but why should it be all on them? Parents have to be on the lookout for cyber bullying these days. Only 32% of parents actually monitor their children's social networking activities, while 28% admitted they only occasionally, rarely or never monitor activity. (Anderson, 2016) This 28% of ... Get more on HelpWriting.net ...
  • 53.
  • 54. Negative Effects Of Technology On Youth Technology varies widely from one decade to the next. The invention of the television increased the usage technology during the 80s. While the invention of computers rose the use of technology in the 90s. Once seen as an improvement to the society, technology has now become a problem. Numerous versions of technology now exist to create technological distractions. Computers, cell phones, and video games stand the leading distractions in today's society. Technology began small but, with great advancements technology has gone too far. Youth remain greatly affected by technology. Since technology has become a normal routine for youth, they fail to realize the problem occurring. Older individuals who grew up without as much technology, can point out the issue easily. Technology affects today's youth negatively because it distracts, promotes violence, and lowers independence. Technology affects youth negatively because it creates distractions. Cell phones have become the leading distraction involving injuries (Turkle 430). As stated by Sherry Turkle, Massachusetts Institute of Technology professor, claims that "These young people live in a state of waiting for connection. And they are willing to take risks, to put themselves on the line" (430). Texting and driving have become a major problem causing many to crash and die. Technology also causes distraction in classrooms. Michael Berry, a professor at the University of Colorado, states that technology affects classrooms ... Get more on HelpWriting.net ...
  • 55.
  • 56. Hiding One 's Identity Is Nothing New Hiding one's identity Is nothing new. Alexander Hamilton, James Madison, and John Jay authored The Federalist Papers in 1787 under pseudonym Publius. The ability to communicate anonymously is viewed as part of our basic right to free speech . With the advent of computers and ease of access to the internet, becoming anonymous as never been easier, and is far more reaching than the colonial newspapers of 1787. For some this ease at which we can communicate anonymous is cause for concern. Although we are no longer hiding our identities to promote the ratification of the Constitution, being anonymous still plays a large role in our society. Online anonymity grants anyone with an internet connection an unbiased voice, regardless of gender, race, or wealth. Without this freedom to online anonymity many people would not feel free to express themselves or release sensitive information about themselves or about corruption, in the case of whistleblowing. Anonymity can also be used as a security measure and prevent unauthorized mining of personal information. Although multiple ethical framework will be used and compared, using a consequence based framework will be the main examining point throughout. The use of the term "anonymous" can be confusing from an online perspective. When speaking of anonymity in such a sense it is not related to the degree of traceability, but to the lack of aspects such as image, voice, and situation in the online social environment . Those against online ... Get more on HelpWriting.net ...
  • 57.
  • 58. Persuasive Essay On Cyberbullying There is a growing crisis in the United States that is going unpunished. It affects "roughly a third of teens who use the internet" (Dosomething.org). This crisis is known as cyberbullying. Today, lawmakers are trying to establish a law that would make this form of hate–crime that terrorizes teenagers illegal. Opponents speculate that there is no reason to make this crime punishable by law because they think this act is just a form of joking or just being rude. "There's a big conflict in knowing where to draw the line between things that are rude and things that are illegal," says Parry Aftab, an executive director of an internet safety group. However, making this crime illegal is a necessity for a plethora of reasons. Cyberbullying is larger problem than many may realize, it causes suffering and even suicide, and it is a premeditated intent to harm. With the growing numbers of children plugging into technology and surfing the World Wide Web on the waves of cyberspace comes the emergent problem of cyberbullying. No longer are children confined to the playground and hallways to spread their dissent. A study conducted by Dosomething.org showed that forty–three percent of children confided that they had been bullied online. With over eighty percent of teens using a cell phone with internet access and ninety percent signing into social media accounts, the opportunity to bully behind the screen is without a doubt a problem of epic proportions (Dosomething.org). These ... Get more on HelpWriting.net ...
  • 59.
  • 60. Cyber Bully And What Do Cyber Bullies Look For A Target? What factors are associated with an increased tendency to cyber bully and what do cyber bullies look for in a target? Aschah Williams David Johnston Emily Crawford Jaime Skipper Kiera Smith BHCLR What factors are associated with an increased tendency to cyber bully and what do cyber bullies look for in a target? Cyber Bullying is a relatively new method of harassing and intimidating peers. It's difficult to target because as few as 1/10 parents realize that their children are participating in the behavior. Children lack sufficient supervision online, on phones, and on other electronic devices to deter them from such actions. They are safe from consequences and punishment in their own "world". Examining individual factors and ... Show more content on Helpwriting.net ... Symptoms include headaches, nausea, sleeping problems and isolation. Nurses must gain the adolescent's trust in order to help the patients reveal all the issues that are occurring, and to do a full psychological assessment of the child in order to be able to make an effective plan of care for the individual. Pediatric Population at Risk In their study, Carter and Wilson (2015) state that out of 367 adolescent students, 337 of them have computers, that 79.1% of the student body in question have their own personal cell phone and that 81% have a Facebook. Cyber–bullying is an easily utilized method of harassment, and used throughout all age groups. Adolescents however, are the most likely to both participate and be a victim of cyber bullying. Studies show that adolescents are the most prevalent group of people affected by cyber–bullying, they have also shown mixed findings about the correlation between age and cyberbullying. (Carter, Wilson, 2015.) Wang, Lannotti, and Nansel (2009) "found no differences in the cyberbullying among 9th and 8th graders, and fewer self–reports of cyberbullying among 9th and 10th graders." Williams and Guerra (2007) found that "engagement in internet bullying increased from 5th to 8th grade, and then declined slightly among high school ... Get more on HelpWriting.net ...
  • 61.
  • 62. Cyber Bullying And Its Effects On Society Essay Cyber–bullying "The saying, if sticks and stones will break my bones, but words will never hurt me was ever true, it sure isn 't true today" (Alexander, 2011). The survey of 9 years olds in 35 countries found that New Zealand is the one most second highest rate of school bullying. (nzherald, 2012). Especially in this case parents really need to take a stand against bullying to help prevent it and to stop it. We as parents need to be a part of the solution, not the problem. Cyberbullying is harmful to society because it encourages poor behaviour many harshly affect the victim and makes the internet an unsafe environment for children. "Children should be able to live a life free from bullying and harassment and it is time that we all took a stand against this" (Katherine,2015). Of course cyber bullying has showed itself in popular networking sites such as twitter, Facebook and Tumblr. Those websites are meant to be socializing between friends and family. Cyber bullying is a big concern in New Zealand society. How are children and young people affected? Firstly cyberbullying in social media it has shown in the article "sudden loss of girl saddens community" by Alicia bailey. Stephanie Garrett, age 15 committed suicide after being cyberbullied on a website called ask. FM.(bailey,2013) Cyberbullying can happen to any age group even if you are male or female. In this article, statistics shows that suicide has been a significant rise to is to 19 years, age group. (Bailey, ... Get more on HelpWriting.net ...
  • 63.
  • 64. Essay Cyber Security Departments As the use of technology has increased drastically over the last two decades, so has our need for technology. Technology has become a part about our everyday life and we can find technology being used nearly everywhere. Most systems in today's countries and societies rely on technological infrastructure; these systems include transport systems, factory systems, power plant systems and water sanitation systems. This brings on the question of to what extent have governments developed their cyber security departments, what evidence is there of governmental involvement in malware attacks and why should governments be concerned about cyber security. Since these systems rely heavily on technology, governments have to consider them as high–risk ... Show more content on Helpwriting.net ... The slammer virus managed to disable the emergency call system, the air traffic control system at some airports in the USA and the bank of America's ATM network among other things. Cyber treats of the 21st century Computer Viruses are increasingly becoming more common, currently 148,000 computers are infected every day and the World Economic Forum predicts that there is a 10% chance for critical infrastructure being damaged in the next 5 years . As mentioned earlier most of the critical infrastructure like power plants and water treatment facilities rely on computer systems, but more specifically PLC's (Programmable Logic Controllers) 2 and SCADA (Supervisory Control and Data Acquisitions System) . These control systems have a major drawback, which is that they are susceptible to attacks by hackers if they are not configured in the correct way. There have been several examples of systems being compromised. The ICS–CERT (Industrial Control Systems Cyber Emergency Response Team) responded to 198 cyber incidents reported by power plants, water treatment plants and other critical infrastructure during 2012 . An experiment was conducted at the Department of Energy's Lab in Ohio in 2007. The aim of the experiment was to prove that it is possible to hack into the US power grid and shut down diesel generators. The experiment was called Aurora, the group of computer experts managed to hack into the diesel generator and ... Get more on HelpWriting.net ...
  • 65.
  • 66. What Are The Advantages And Disadvantages Of Cyber-Space? Cyber–space can be a persuasive tool in restricted countries and areas This section will analyze the advantages and disadvantages of the cyber mission, the theological understanding of the cyber mission, and the need for a cyber–mission today in inaccessible countries and areas. A positive aspect of cyber space is that the missionary working area becomes wider and we are today living in the era of cyber space. With cyber space the borders of nations that restrict oppress the Christian religion can be crossed. The cyber space becomes a new missionary work field and it has many unique features to reach into un–reached nations and people groups living in restricted areas. Advantages of cyber mission in inaccessible countries To reach the un–reached ... Show more content on Helpwriting.net ... When asked how 10,000 people came together to protest in front of Zhongnanhai (the Chinese leadership compound in Beijing) on 25 April 1999, he replied, "They learned it from the Internet." (www.falundafa.org 2001) There are many other variables that explain the tenacity and growth of Falun Gong practice, both within the PRC and around the world. Nonetheless, a look around the Internet reveals that Falun Gong has established a significant online presence. It is cyber space that plays a significant role in maintaining and expanding it. Discussions of Falun Gong are common on China–themed chat rooms and bulletin boards. Email news lists deliver daily updates to interested subscribers around the world.11 Falun Gong's shortwave radio station, launched in the summer of 2000, also broadcasts on the Internet in streaming audio. The most important is Falun Gong's presence on the World Wide Web. Practitioners maintain hundreds of sites around the world; most contain content in both Chinese and English, while others feature such languages as German, French, Russian, and Portuguese. This case study can help us see how internet is a vital persuasive tool in spreading the gospel in inaccessible ... Get more on HelpWriting.net ...
  • 67.
  • 68. Cyber Terrorism In 1999, Chinese hackers targeted United States government sites, after an accidental bombing of a Chinese embassy in Belgrade. During this attack, government sites were hijacked and some sites suffered a denial of service attack. Most recently, it was suspected that Bank of America was the victim of a cyber terrorism attack; although no definitive evidence is available to substantiate that claim. Cyber terror attacks pose a threat against the national security of the United States. In order to fully comprehend the threat that cyber terrorism poses, it is essential to understand the background, the effects, the reality of the threat and the future of cyber terrorism. This assessment examines the reality of the cyber terrorism threat, and ... Show more content on Helpwriting.net ... Likewise, terrorists will strive to improve their cyber terror attack capabilities by keeping pace with the emerging technologies and overcoming countermeasures. Many computer security experts question the possibility that the Internet could be used to inflict death on a large scale. Some precautions have been made. Systems have been established in the last five years, which aim at preventing a possible cyber terrorism attack. "Air gapping" has been established on all nuclear weapons, meaning the weapons are not connected to the Internet or any open computer network and cannot be accessed by intruders or terrorists. Still, other areas of concern include subways, gas lines, power grids and communication systems; which are owned primarily by the private sector and are managed by Internet enabled computer systems. Reality of a Cyber Terror Attack Malicious cyber activity is occurring more frequently and with unexpected complexity. In mid– December of 2009, Google experienced a highly sophisticated and targeted attack which originated in China on its search engine infrastructure and e–mail, as well as on at least 20 other companies. Attacks are occurring within the United States, as well. Attacks on government networks are omnipresent. In 2008, NASA and other departments of Defense, Homeland Security and Commerce suffered major intrusions by "unknown foreign entities" which ... Get more on HelpWriting.net ...
  • 69.
  • 70. Teenagers And Social Media Now more than ever living in the age of technology, social media has impacted our lives greatly. With a click of a button we have the ability to communicate with friends, family, and ev en those we may never have the opportunity to meet face to face. Some Believe that the use of social media allows us to practice freedom of speech and provide an outlet for free expression. Unfortunately in some instances social media, also gives us the opportunity to engage in behavior that normally we wouldn't do in a face to face setting. Teenagers often don't understand that they have no privacy in internet usage, and that social media allows users to access people information and use to insult or bully them. Once you have posted something online it is other in the internet world forever. Any potential employer can access your information and use that information in deciding whether or not to give you a job. Often whatever you post can haunt you in the future. While many social media websites have maintained privacy restrictions there is still a lot of information that can be accessed with a click of a button. Many people including teenagers, don't realize that whatever you may post on line cannot be erased. Often users will post their issues and problems seeking and outlet whether for attention or to have someone to talk to. Once something is posted it allows others to post their comments and opinions which can be negative. Social media sites such as Facebook, ... Get more on HelpWriting.net ...
  • 71.
  • 72. The Prosecution Of Child Pornography In Australia "Prosecution of child pornography" The law is already enforced against child pornography and it is implemented and enforced over the internet. 5. Social behaviour Further social study proves that "cyber porn" distributed psychological difficulties. This domain is causing problem in our society. At present there are more teenage single mums then ever before. The psychological effects of the increased needs of sexual drive cause STD (Sexually Transmitted disease). Over all, the easy access to "cyber porn" leading to potential negative psychological consequences. Case Against 1. Censorship for child, who is the responsible? After taking close look at the circumstances in relation to "cyber porn" and access to internet for a child, it is ... Show more content on Helpwriting.net ... One perspective is that the "Arab Spring" may refer as "Twitter Revolution" or "Facebook revolution". Social media played a vital role to reshape the politics of "Middle East". The impact of this change was very crucial for the governments. The lash back of this change was different in different countries. In "Tunisia" and "Egypt" government regimes did not have any social media base and they could not estimate the impact of social media in the society. In "Tunisia" and in "Egypt" nine out ten people responded to a poll conducted by the "facebook" to organise the protest. Finally its ended up with a regime change democracy won through social media ... Get more on HelpWriting.net ...
  • 73.
  • 74. Social Media Should Be Used Responsibly As technology advances, the amount of people online is also growing. Among these people, a great amount of them are teens. These teens are accessing the Internet through various digital devices and communicating with one another through methods such as texting and emailing. Today, teens and young adults are the ones who make up one of the largest groups on social media outlets. According to the Pew Report, "Teens, Social Media, and Privacy," 95% of teens are on the Internet and 81% of them use social media sites. In the opinion piece "Social Media Should Be Used Responsibly" by Katie Atkinson, social media outlets "were created for harmless networking and fun, but have instead turned into some of the greatest tools to harm others with" and thus, cyber bullying came into existence. Cyber bullying is "a modern form of bullying performed using electronic forms of contact" (Fabio Sticca & Sonja Perren). It is where kids send hate messages, post embarrassing pictures of others, and hide behind fake identities to harass others. With all the new interactive features on these social media sites, posting a hateful comment or sending a cruel message has become easier than ever. According to cyber bullying statistics provided by the i–SAFE foundation: "Over half of adolescents and teens have been bullied online and about the same number have engaged in cyber bullying." The worst part of it all is that more than half of these adolescent do not tell their parents when cyber bullying ... Get more on HelpWriting.net ...
  • 75.
  • 76. Cyber Warfare And Security Threats Abstract The innovations in information technology and increased amount of interconnected electronic devices today create new economic and social prospects as well as improve the overall quality of our lives. While these leading edge technologies create opportunities, some have become prey to attackers and has given birth to a new era of Cyber warfare. Consequently, the Internet, computers and networks have become targets and vehicles of cyber attacks and generate challenges to our security privacy. Cyber Warfare presents an ever–increasing amount of security threats, which continue to escalate with increasing harshness, and is now a critical issue in our technology realm and a growing threat to the world. Cyber wars are generally ... Show more content on Helpwriting.net ... Singer, P., & Friedman, A. (2014) Cyberspace is now a military dimension; the word "cyber is a very significant and probably one of the most common term used in today's international security dialogues. The Internet and e– commerce are crucial to the economic competitiveness of many nations, businesses and organizations, however cyber criminal have cost users millions of dollars and valuable assets. Achieving security on the Internet is a very daunting task; as criminals and hackers have become plagues to critical IT infrastructures, online communication and e–commerce. Cyber warfare is a very costly and complex reality; it compromises the privacy of web users and has shaped great battles between domains. Governments and organizations are faced with significant threats and challenges daily as advanced software programs are developed and used to exploit and disrupt their computer networks. These increasing series of cyber conflicts between nations, corrupt gangs and virtual terrorist groups; all raises critical economic and national security issues in countries across the globe. In a recent article Clayton (2011) stated that "Tomorrow 's wars will be fought not just with guns, but with the click of a mouse half a world away that will unleash weaponized software that could take out everything from the power grid to a chemical plant." (Clayton 2011). It is very appalling to think that the insertion ... Get more on HelpWriting.net ...
  • 77.
  • 78. Bullying Has Been A Big Problem In Our School System For Bullying has been a big problem in our school system for many years, but it has escalated over the past decade due to the new era of modern technology. Unanimously, we can agree that our daily lives greatly depend on technologies; the internet, cellphones, computers, tablets, IPad etc. Although the uses of technology positively impacted our lives, there is also the downside when it uses have negative connotations. For instance, modern technology made it very easy to engage in cyberbullying, perpetrators used cell phones or computers to conduct this hideous behavior, hiding behind their keyboards to express negative feelings and or thoughts toward others. Using social media for senseless and unwarranted insults to intentionally cause harm ... Show more content on Helpwriting.net ... Statistics have shown that everyone can be victims of cyber bullying, but most incidents occur between the age of 11 to 15 years old, however, some report showed that children's as young as 10 years old also been a victim of cyberbullying. Cyberbullying can have long lasting effects on its ' victims that can lead to mental health issues like depression, anxiety, stress, and even suicide. Increasing number of young kids and teenagers committing suicide because of cyber bullying and sexting have been coming to the public 's attention. As reported by the Centers for Disease Control and Prevention (CDC), suicide is the third leading cause of death among young people with approximately 4,400 deaths every year. The CDC estimates that there are at least 100 suicide attempts for every suicide among young people. More than 14 percent of high school students has considered suicide and nearly 7 percent have attempted it, that is why, sadly, there are increasing coverages about cyberbullying case in the media now more than ever. (NOBullying, n.d.) Despite the physical contact or audible insults, cyberbullying can be even more traumatizing and damage have a life time effect on mental health than traditional forms of bullying. Through social media and mobile communications, bullying can now potentially be viewed by all, a victim 's friends, family, and ... Get more on HelpWriting.net ...