Cyber Bullying Essays (Examples)

Filter results by:


View Full Essay

Bullying Has Evolved Into a Growing Concern

Words: 1398 Length: 4 Pages Document Type: Essay Paper #: 2924068

Bullying has evolved into a growing concern among child development specialists. With an increase in teenage suicide and an explosion of reports of online harassment, bullying has changed the way that adolescents interact with each other. For decades the act of bullying has been accepted as being a part of life that children deal with and then grow out of. However, the case is that the gravity of these incidences has increased and is having dire consequences. To begin with, there are multiple types of bullying (Swearer, Espelage, & Napolitano, 2010). Bullying itself is the act of purposely intimidating another individual through verbal, physical, or emotional abuse that leads to further negative psychological implications (Cowie, Blades, & Smith, 2011). However, this act can be committed through a variety of mediums.

Physical bullying entails the causing of harm to one party from another through means that cause physical pain (Swearer, Espelage, & Napolitano, 2010). Examples of physical bullying include the constant shoving or pushing of other children who are deemed as belonging to a lower status at school. The stereotypical image of bullying is usually of physical bullying. This would be a type of direct bullying. Another type of bullying that…… [Read More]

Works Cited:
Boston Children's Hospital. (2013). Bullying. Boston Children's Hospital: Until every child is well. Retrieved April 1, 2013 from 2912P1.html

Cowie, H., Blades, M., & Smith, P. (2011). Understanding Children's Development. (5th ed.). United Kingdom: John Wiley & Sons.
View Full Essay

Bullying and Strategies for Prevention

Words: 5315 Length: 16 Pages Document Type: Essay Paper #: 89310391

More and more children are becoming victims of cyberbullying with an estimated range of between 19% and 42% being bullied online at least one time (Wolak, Mitchell & Finkelhor, 2006). Reports also indicate that children who participated in traditional bullying are becoming increasingly more involved in cyberbullying; reflecting very high percentages of those children acting as cyber bullies (Kowalski & Limber, 2007).

In a recent study of 177 seventh grade students, studies revealed that an estimated 54% were victims of traditional bullying and 17% were bullied online (Li, 2007). Of those 31% who acknowledged participating in traditional bullying, 30% had also bullied someone online and another 27% were victims of online bullying (Li, 2007). Research has also reflected that children who are victims of traditional or cyberbullying are more likely to retaliate virtually than in person (Willard, 2007).

Which is more harmful?

Twyman, Conway, Taylor & Comeaux (2010) posit that there are minimal differences between traditional and cyberbullying that would make cyberbullying a more serious issue (p. 196). Willard in his 2007 article "Cyberbullying and cyber-threats: responding to the challenge of online social aggression, threats, and distress" indicates that because cyberbullying can occur at any time, day or night, victims…… [Read More]

American Academy of Child and Adolescent Psychiatry. (2006). Bullying. Facts for Families Vol. 80. Retrieved from

Aricak, T., Siyahhan, S., Uzunhasanoglu, A., et al. (2008). Cyberbullying among Turkish adolescents. CyberPsychology & Behavior, 11, 253-261.
View Full Essay

Bullying Warning Signs Tips to Help Kids

Words: 559 Length: 2 Pages Document Type: Essay Paper #: 73577091


Warning Signs


Cool Down -- Try to be calm when resolving conflict!

Describe the conflict, try to be logical!

What caused the conflict -- what can be done about it?

Describe feelings during conflict!

Listen respectfully, wait until other person has finished before talking!

Brainstorm solutions TOGETHER

Comes home with torn, damaged, or missing pieces of clothing, books, or other belongings;

Has unexplained cuts, bruises, and scratches;

Has few, if any friends, with whom he or she spends time;

Seems afraid of going to school, walking to and from school, riding the school bus, or taking part in organized activities with peers (such as clubs);

Takes a long, "illogical" route when walking to or from school;

Has lost interest in school work or suddenly begins to do poorly in school;

Appears sad, moody, teary, or depressed when he or she comes home;

Complains frequently of headaches, stomachaches, or other physical ailments;

Has trouble sleeping or has frequent bad dreams;

Experiences a loss of appetite; or appears anxious and suffers from low self-esteem.

Do not let these signs go unanswered -- a bullied child is a child in pain and need!

Just Say "NO!"…… [Read More]

View Full Essay

School Bullying Was Never Considered as a

Words: 1113 Length: 3 Pages Document Type: Essay Paper #: 35460236

School bullying was never considered as a real social problem until 1980's. The recent escalation in School bullying has gained attention of the masses throughout the world. Several suicide and homicide cases were highlighted by media where bullying was found to be an important factor involved. Out of 37 shooting events in different schools, nearly two third of the shooters were found to be victims of bullying in their life but not particularly in schools. However, the cases where the shooters had been a victim of bullying in a school, the tormented experience was found to play an important role in motivation for the attack. (Dake, Price, & Telljohann, 2003)

Why do children bully?

In this research paper, an interview was conducted from a professional psychologist having expertise in this field. She herself was witness to several bullying cases in her early life. According to her, most of the teenagers who are involved in bullying have severe psychological problems. The type of parenting style they face in homes is punitive and they tend to take the frustration out on peers who are physically weaker than themselves. This gives the bullying children a sense of mental satisfaction that they do have…… [Read More]

Dake, A.J., Price, J.H., Telljohann, S.K. (2003). The Nature and Extent of Bullying at School. Journal of School Health, 73(5), 173-180.

Hinduja, S., Patchin, J.W. (2010) Cyberbullying Identification, Prevention, and Response. Cyberbullying Research Center, Retrieved on February 8, 2013 from t_Sheet.pdf
View Full Essay

Online Bullying What Is Bullying

Words: 2204 Length: 8 Pages Document Type: Essay Paper #: 47526354

Online bullying and online harassment typically happens through chat rooms, text messages, and emails, and it generally happens when teens aren't in school, the studies show.

The findings appear in a special edition of the Journal of Adolescent Health.

Internet Harassment: What to Do?

Focus on safe use of new technology, not banning the technology.

Today's kids and teens are major media users, but they need grown-up guidance about safe media use, note the CDC's Corinne David-Ferdon, PhD, and Marci Feldman Hertz, MS. They predict that "with the development of new cell phones that are small enough to fit into young children's hands and that are designed to be visually attractive to a younger audience, more and younger children will become competent and frequent users of this technology."

That means that research on preventing online harassment "must be rapid and flexible enough to keep up with the evolving nature of technology," write David-Ferdon and Hertz.

How to solve the problem

How to solve the problem if you are being bullied, tell a friend, tell a teacher and tell your parents. It won't stop unless you do. It can be hard to do this so if you don't feel you can…… [Read More]

Be Safe Bullying. (2002). Online Bullying. Retrieved on March 23, 2008 at

Belsey, Bill. (2004). Retrieved March 23, 2008, from Web site:
View Full Essay

Behavior Bullying the Merriam-Webster Online

Words: 1924 Length: 4 Pages Document Type: Essay Paper #: 34633373

Parents can team up with teachers and schools by asking for school conferences where they can address the issue of bullying, (Barreto). The parents can also keep a record of incidents of harassment and the ways in which the school handled these situations. They should also insist on the putting up of a bullying prevention committee if one is not already in place. In order for the committee to be effective, it needs to have representatives from administration, teachers, school mental health teams and parents.

2. Teachers should be encouraged to involve the students in creating rules for the classroom regarding bullying. They should have a serious talk with the bully and explain the unacceptability of the behavior as well as its negative consequences. Reports of bullying should not be left to deal with bullying on their own in the hope that the experience will make them stronger individuals, bullying only makes them more vulnerable. Parents should be taught how to tell the signs of bullying and harassment.

In conclusion, there is need of cooperation between those who witness bullying, the victims of bullying, parents and the institutions where the victims are to ensure that bullying is stopped or dealt…… [Read More]

Works Cited:
Barreto, Steven. Bullying and Harassment Stop When Parents Help Break the Silence. 2005.

23 May, 2010
View Full Essay

Clemmitt Marcia Cyber Socializing Are Internet Sites

Words: 618 Length: 2 Pages Document Type: Essay Paper #: 72837277

Clemmitt, Marcia. "Cyber Socializing: Are Internet sites like MySpace potentially dangerous?" Congressional Quarterly Researcher 16.27 (2006): 627-47. Web. 28 Jul 2006.

Marcia Clemmitt, a veteran social-policy reporter for CQ Researcher, explains the history and current popularity of online socializing. Clemmitt illustrates the gradual replacement of conventional live socializing with online socializing, especially among the nation's younger generation. She explains the many benefits and opportunities provided by online socializing. She also points out the new privacy risks and lifestyle consequences that arise as personal information becomes more accessible to a wider group of people. Regarding the access to online socializing sites at public libraries and schools, Clemmitt includes a short debate between a congressional representative and a scholar in order to show how policymakers see these problems. Overall, the article is for researchers for its rich historical background and its even-handed survey of the most publicized online socializing issues.

Billitteri, Thomas. "Cyberbullying: Are new laws needed to curb online aggression?" Congressional Quarterly Researcher 18.17 (2008): 307-407. Web. 2 May 2008.

Thomas Bolliterri, a CQ Researcher staff writer, summarizes the current debate surrounding cyber bullying. Bolliterri defines the term cyberbullying and emphasizes its significance by recounting a recent tragedy caused…… [Read More]

View Full Essay

Looking at Cyber Crimes

Words: 862 Length: 2 Pages Document Type: Essay Paper #: 23984062

Wide Web, an addition of online users resulted in both good and bad individuals. With increasing data online, the chances of it being misused increased as people got more technologically aware. Since the internet provides people with anonymity and complex ways of broaching personal privacy and data bounds, the legal ramifications had to be considered by regulators. Delineating the boundaries of cyber law became increasingly important in order to protect users online.

What is Cyberspace Law?

The Cyberspace law, also known as the cyber law, is a piece of legislation that regulates transactions and communications over the Internet or over other interconnected devices and technologies. This legislation protects members of the public, particularly internet users from illegal activities by hackers and other persons or entities with ill-intentions (LaMance, 2015). The law regulates several parts of the communications world including:

Privacy concerns

Freedom of expression

Intellectual property

Electronic and mobile commerce

Cyberspace crimes

Problems in Prosecuting Cyber-crimes

Many laws and sections within laws dealing with unauthorized access, spamming, unauthorized utilization of wireless networks, cyber-stalking and cyber-bullying did not exist over 3 decades ago. Federal and state governments had to come up with the legislations so as to tackle the issues that…… [Read More]

View Full Essay

Trustworthiness of Different Online Mediums

Words: 1002 Length: 3 Pages Document Type: Essay Paper #: 25106650

Cyber-Bullying Media

The author of this report has been asked to compare and contrast three different forms of media that all pertain to the same subject, that being cyber-bullying. The three types of media that will be singled out for analysis and research are podcasts, blogs and videos. For each source, the author will assess the source's use of bias, validity and applicability of information. Beyond the compare and contrast mentioned above, the author will examine the influence of web-based information on global citizenship and multi-cultural understanding. Lastly, there will be a listing of three factors that should be considered when evaluating Internet sources for use in researching information. While there is a lot of "good" when it comes to internet research and the data that is present, there is also a lot of "bad" that muddies up the proverbial waters.


The podcast media that was selected for this report was found on the National Crime Prevention Council website. They have an entire page dedicated to cyber-bullying, how to deal with it, how to report it and so forth. The solutions offered are comprehensive, detailed and there are a lot of other useful links on the same page tht…… [Read More]

View Full Essay

Relational Bullying Contextual Information the

Words: 4428 Length: 15 Pages Document Type: Essay Paper #: 27208689

2. Stonewalling, or what many people, referred to as "silent treatment" occurs when the bully or group simply ignores the victim completely. This can be extremely distressing to adolescents. This often occurs with group exclusion.

3. A common form of relational bullying is the spreading of rumors and gossip about the victim. This is a direct attempt to ruin the victim's relationships and exclude them from contact with their peers and even with adults.

4. Taunting occurs when the bully insults or verbally abuses the victim directly. Taunting often continues even when the victim physically breaks down.

5. Conditional friendships occur when the bully places demands on the victim in order for the victim to be allowed in the group were with peers.

The effects of relational bullying are often more psychologically damaging than the effects of more physical forms of bullying. In addition, relational and physical bullying are often carried out simultaneously on the victim (Dukes et al., 2010). A victim of relational bullying and the associated difficulty in the victim's relationships with their peers have been demonstrated to be linked to various other problems such as depression, decreased academic performance, poor social skills, issues with self-esteem, and even…… [Read More]

Beck, a.T., Brown, G., & Steer, R.A. (1996). Beck Depression Inventory II manual. San Antonio, TX: The Psychological Corporation.

Brown, B. (2004). Adolescent's relationships with peers. In Lerner, R. & Steinberg, L. (eds.),
View Full Essay

Sociology -- How Social Norms

Words: 1839 Length: 4 Pages Document Type: Essay Paper #: 18837880

Furthermore, there are genuine potential dangers and consequences from creating digital profiles and conducting personal business/interactions on the internet. The personal information can be misused and abused by others such as marketing companies, potential employers, current employers and cyber-bullies such as Lori Drew. Analyzing social media shows that it can and has been used to enhance, harm or even destroy people's lives.

Works Cited

Boyden, B.E. (2012, April 2). Can a prospective employer request Facebook login information? Retrieved on March 18, 2013 from Web site:

Eder, S. (2013, January 16). Hoax is revealed as Irish star says he was duped. Retrieved on March 18, 2013 from Web site:

Gummerus, J., Liljander, V., Weman, E., & Pihlstrom, M. (2012). Customer engagement in a Facebook brand community. Management Research Review, 35(9), 857-877.

Hamilton, J.R. (2012). The electronic lonely crowd - Patterns and effects of electronic media usage among contemporary adolescents. International Journal of Arts & Sciences, 5(3), 165-174.

Hamilton, K. (2009, August 31). Acquitted 'Cyber Bully' Lori Drew finds herself a victime of online tormenters. Retrieved on March 18, 2013 from Web site:

Keahey, R. (2010, July 3). Book review - the Facebook effect. Retrieved on…… [Read More]

Works Cited:
Boyden, B.E. (2012, April 2). Can a prospective employer request Facebook login information? Retrieved on March 18, 2013 from Web site: 

Eder, S. (2013, January 16). Hoax is revealed as Irish star says he was duped. Retrieved on March 18, 2013 from Web site:
View Full Essay

Negative Effects of Social Networking

Words: 1594 Length: 4 Pages Document Type: Essay Paper #: 56026791

Works cited

Boyd, Danah M., and Nicole B. Ellison. "Social Network Sites: Definition, History and Scholarship (Excerpt)." Everything's an Argument with Readings. Eds. Lunsford, a.A., J.J. Ruszkiewicz and K. Walters. Boston, MA: Bedford/St. Martin's, 2010. Print.

Calvo-Armengol, Antoni, Eleonora Patacchini, and Yves Zenou. "Peer Effects and Social Networks in Education." The Review of Economic Studies 76.4 (2009): 1239-67. Print.

Common Sense Media. Is Technology Networking Changing Childhood? A National Poll. San Francisco, CA: Common Sense Media, 2009. Print.

Conan, Neal, et al. "Is Creating a Fake Online Profile a Criminal Act?" Everything's an Argument with Readings. Eds. Lunsford, a.A., J.J. Ruszkiewicz and K. Walters. Boston, MA: Bedford/St. Martin's, 2010. Print.

Cyberbullying Research Center. "Research: Summary of Our Cyberbullying Research from 2004-2010." 2011. December 5th 2012. .

Giles, G., and R. Price. "Adolescent Computer Use: Approach, Avoidance, and Parental Control." Australian Journal of Psychology 60.1 (2008): 63-71. Print.

i-SAFE America. "Cyber Bullying: Statistics and Tips." 2012. December 5th 2012. .

Nath, Pamela S., et al. "Understanding Adolescent Parenting: The Dimensions and Functions of Social Support." Family Relations 40.4 (1991): 411-20. Print.

O'Keeffe, Gwenn Schurgin, and Kathleen Clarke-Pearson. "The Impact of Social Media on Children, Adolescents, and Families." Pediatrics 127.4 (2011): 800-04.…… [Read More]

Boyd, Danah M., and Nicole B. Ellison. "Social Network Sites: Definition, History and Scholarship (Excerpt)." Everything's an Argument with Readings. Eds. Lunsford, a.A., J.J. Ruszkiewicz and K. Walters. Boston, MA: Bedford/St. Martin's, 2010. Print.

Calvo-Armengol, Antoni, Eleonora Patacchini, and Yves Zenou. "Peer Effects and Social Networks in Education." The Review of Economic Studies 76.4 (2009): 1239-67. Print.
View Full Essay

Inferences and Conclusions

Words: 1395 Length: 4 Pages Document Type: Essay Paper #: 98418536

settle the (questions)?


How did the author reach the conclusion?

Is there another way to interpret the information? Concepts

What is the main idea?

What are we taking it for granted?

What assumptions have led the author to his/her conclusions?

If someone is accepting the author's position, what would be the implications?

If someone is not accepting the author's position, what would be the implications?


From what point-of-view is the author looking at the issue?

Is there another point-of-view that I should consider?

This paper is review of an article in various perspectives. The review highlights the aims and objectives of the article, the information collected and presented the likely inferences from the article and implications. The purpose of paper is to apply the concepts of article review and analysis on one or few articles.

Article Review

This paper is the review of article Cyber bullying: An old problem in a new guise? written by Marilyn A. Campbell. The paper highlights how the author has presented his views and what is his purpose behind publishing this piece of information.


What is the author trying to accomplish?

The author is trying to give the readers general information about…… [Read More]

BBC. 2013. "Understanding Cyber Bullying." Accessed January 30, 2013. 

National Crime Prevention Council. 2001. "Cyber bullying." Accessed January 30, 2013.
View Full Essay

Social Media and Suicide Social Media Internet

Words: 2737 Length: 8 Pages Document Type: Essay Paper #: 48826609

Social Media and Suicide

Social Media

Internet has become a gadget of everyday use for people of 21st century. As it is offering many benefits to the users in terms of information communcaition, interaction, entertainment, socialization and earning livelihhod, there are certain dark factors related to it. The dark factors are as severe as forcing people to commit suicide. It is no exaggeration to mention that Intenet is used as a medium to harass people and get undue benefits from them.

Social media today is playing major role in enabling people and organizations to communicate and share ideas, views and knowledge with other people. The traditional methods of communication have been modified through social media platforms like chat rooms, social networking sites (Facebook, My-Space, Twitter, Google+ etc.), video sites (YouTube), discussion forums, video chat, text messages, blogs etc. (Lexton et al., 2012). The most well-known social networking website Facebook had almost million users at the end of 2004 ("Facebook statistics," 2011). By the month of June 2011, the number raised to approximately 700 million users around the world ("Facebook statistics by country," n.d.). An average of 30 billion pieces of material in the form of web links, news reports, photo…… [Read More]

Biddle, L., Donovan, J., Hawton, K., Kapur, N., Gunnell, D., 2008. Suicide and the Internet. British Medical Journal, 336, 800-802.

"Cyberbullying Does Not 'Cause' Teen Suicide," 2012. Retrieved from 
View Full Essay

Law Enforcement and Cyberstalking

Words: 895 Length: 3 Pages Document Type: Essay Paper #: 16556885


Cyber-Crime in a New Age of Law Enforcement

With the new introduction of the online sphere, law enforcement today faces unique challenges those previous generations could never even imagined. The internet allows the ability to create an online presence that has virtually no relevance to the real world character of the user. People can now create an online presence with the ability to construct a range of pseudonymity that was never before possible (Gyorgy, 2002). Therefore the person that you think you are communicating with may be a different person altogether.

Furthermore, people can set up a range of different personalities and have multiple identities online that they can use for a range of malicious activities. For example, it is possible for an elderly man who has perverted tendencies to portray himself as a young school girl on online chat forums. In these arenas there is seldom any verification process to unsure the users are who they say they are. However, the use of such pseudonymity often leads people to quickly imagine all the negative and dangerous uses of these fake profiles. Although most of these profiles can be harmless, others can be used for ill intent.

The users…… [Read More]

Gyorgy, P. (2002). The Tale of Cookies (Dr. Jekyll and Mr. Hyde). Social Research, 239-245.

Jayakumar, A. (2014, March 13). Target looking into response to cybersecurity breach; retail sales rose in Feb. Retrieved from The Washington Post:
View Full Essay

People Left on This Planet

Words: 580 Length: 2 Pages Document Type: Essay Paper #: 62554988

" We have reached a critical point in our society where interpretation is needed from not only the parents, but also from our government officials. There are too many young adults that are choosing to end their life because of cyber bulling. Many people seem not to understand the harm the Internet can do, therefore, we must increase in educating our generations about the modern world of internet.

It's sad that it takes many tragedies before anything is done to correct the occurring situation. Following the suicide of Tyler Clementi New Jersey Senate released an anti-bulling law. "The bill would require training for most teachers and other school employees on how to recognize bulling, and would mandate all districts form a "school safety team" to review complaints. School administrators who do not investigate and reported-bullying incidents would be disciplined, while harassment, intimidation and bullying would be upgraded to conduct that could result in students being suspended or expelled. School employees would also be required to report all incidents they learn of, whether they took place in or outside of school." This could be a start to a much bigger problem then everyone suspected. I don't think this law should stop…… [Read More]

View Full Essay

Adolescent Development Socialization and the Internet

Words: 1070 Length: 3 Pages Document Type: Essay Paper #: 96344226

Social Networks

Adolescent Development, Socialization, and the Internet

Evaluate how social learning theory and strain theory could be used to explain adolescent development and behavior

Social learning theory suggests that adolescents learn from observing the behaviors of others, not simply in real life but also online. In fact, the mores and accepted behaviors for online interactions are often quite different from what is considered acceptable behavior offline. Teens may be emboldened by the anonymity conferred by an online avatar that enables them to hide their real names. Even if not anonymous, the distance between themselves and their online targets may encourage more meanness and cattiness than would ever take place in a face-to-face context.

As depicted in the Frontline documentary Growing Up Online, both adults and children will often not apply the same ethical standards to the behaviors in which they engage in online as they do to behaviors in the real world. It feels 'safe' to make a racist or offensive online comment, and somehow distanced from one's true self. The rules of behavior online seem more lax, as users can read the negative words of people all over the world, from a variety of backgrounds and can at…… [Read More]

What we learned. (2008). Growing up online. PBS. Retrieved:
View Full Essay

Critical Thinking and Its Importance in the Current Society

Words: 4423 Length: 12 Pages Document Type: Essay Paper #: 83048136

Responsibilities of a Critical Thinker in a Contemporary Society

Some thinkers consider critical thinking to be solely a type of mental skill, devoid of any moral value; it is often utilized to rationalize prejudice and to promote self-interest. While moral integrity is understood as good heartedness, it is also susceptible to manipulation to satisfy vested interests in the same way as responsible citizenship can be manipulated. The human mind, regardless of conscious goodwill, is subject to the more powerful and self-deceptive egocentricity of the unconscious part of the mind. The complete development of each and every characteristic, be it critical thought, responsible citizenship, and moral integrity - needs to include cultivation of each other characteristic, in a parallel strong sense (Paul, 1993). The three characteristics of higher thought can only be developed in an environment that promotes intellectual virtues such as integrity, intellectual courage, intellectual fair-mindedness, intellectual empathy, intellectual perseverance, and faith in reason. These virtues are interdependent. Our fundamental ways of knowing cannot be separated from our fundamental ways of being. How one thinks reflects who one is. Moral and intellectual virtues or lack of them are strongly correlated. To develop the level of intellectual independence advocated for within…… [Read More]

View Full Essay

Technology Has Corrupted Society as

Words: 1054 Length: 4 Pages Document Type: Essay Paper #: 98649038

Civil penalties, if pursued by an organization such as the RIAA, can range from a minimum of $750 per song to thousands of dollars per song. Due to the civil lawsuits filed by the RIAA, piracy awareness rose from 35% to 72%. The RIAA has since stopped its broad-based end user litigation program [RIAA 2010].

The Internet has also facilitated the disturbing trend of cyber-bullying and cyber-harassment. Attempts to curb cyber-harassment may prove difficult as "cyber-bullies" may be anonymous and therefore, difficult to identify. In "Cyber-Bullying in Schools: A Research for Gender Differences," Qing Li states that school violence is a serious social problem that is persistent and acute during middle school [LI 2006]. Cyber-bullying, as defined by Tanya Beran and Qing Li in "Cyber Harassment: A New Method for an Old Behavior," is defined as "the repeated and intentional use of various forms of technology such as cell-phones, pagers, emails, instant messaging, and Web sites by individuals or groups to harm others" [BERAN 2005]. Cyber-bullying includes flaming, harassment, stalking, denigration, masquerade, outing, trickery, and exclusion [LI 2006]. In many cases, cyber-bullying victims can experience depression, helplessness, social incompetence, anxiety, low self-esteem, and loneliness and may exhibit impulsive behaviors and…… [Read More]

RIAA 2010 Piracy: Online and on the Street Accessed 3 December 2010

View Full Essay

Myspace Over the Last Decade

Words: 5921 Length: 20 Pages Document Type: Essay Paper #: 9030918

They cannot escape their bully because he can now follow them home. This is the new reality (Keith & Martin, pg 224).

In the years since the advent of MySpace there have been several cases of cyber bullying. In one case of the cyber bullying Megan Meier committed suicide as a result of a negative MySpace page, she was only 13 years old. In this particular case Megan was engaging in an online relationship with who she thought was a 16-year-old boy through MySpace. Megan and "Josh" communicated through the internet for several weeks. Initially there communications were good but then these conversations turned nasty and "Josh" finally told Megan that the world would be better off without her (Maag). She hung herself after reading this comment while communicating through MySpace.

About six weeks following Megan's death, it was discovered that Josh did not exists and in fact the persona had been a hoax created by some of Megan's neighbors (Maag). These neighbors were adults who used to "Josh" hoax to see if Megan was "talking bad about their child. This case grew nationwide attention, but no charges were filed against the neighbors because they apparently broke no laws (Maag).…… [Read More]

Bangeman, E. June 20, 2006 MySpace sued in wake of sexual assault. Retrieved April 13 from,

Belzman J. Bands and fans singing a new tune on MySpace. Retrieved April 13 from,
View Full Essay

Social Networking Has in the Last Couple

Words: 3108 Length: 11 Pages Document Type: Essay Paper #: 28704254

social networking has in the last couple of years stirred a lot of debate among politician and scholars alike. The level of risks and benefits associated with social networking sites such as Facebook, Twitter and MySpace especially to children and teenagers has elicited a mixed reaction among the debating parties. In this paper we present a systematic analysis of the implications of social networking sites for both children and teenagers with a sharp focus on Facebook. We also focus on the benefits as well as the issue surrounding the use of social networking sites by use of relevant illustrations. Overall, we evaluate how the use of computer technology has impacted the society in general and education in particular.

Definition of Social Networking

Several scholars have attempted to define the concept of social networking and its components. Boyd & Ellison (2007) define social networking sites as special web-based services that are developed in order to allow the users to construct either a public or partially-public profile within a system that is bounded. The services are also to display the list of other site users with whom the individual shares a connection. The other element of a social networking site is that…… [Read More]

Works Cited:
Berkshire District Attorney. Sexting. Pittsfield, MA: Commonwealth of Massachusetts; 2010.

Availableonline at: berterminal&L_3&L0_Home&L1_Crime_Awareness_%26_Prevention&L2_Parents_
View Full Essay

Evaluating the Rise of Social Media

Words: 3217 Length: 7 Pages Document Type: Essay Paper #: 67215612

Social media involves online content that people use via highly accessible technologies. Basically, social media marks a change in the way people read, discover and share information, news and content. Therefore, social media fuses technology and sociology leading to a change in monologues into dialogues and also marks information democratization, making everyone an author instead of being a mere content reader. Social media has become very popular since it enables people interaction through the internet to create relations useful for different reasons including political, personal and business. Businesses consider social media to be an amalgamation of consumer-generated media. The social media takes different forms like, blogs, Internet forums, wikis, pictures, podcasts and video. Therefore, it is obvious that the Internet is a fundamental social medium (Customer Centric Business Strategies, n.d.). This may not change since people endeavor to engage with each other online; hence, social media is going to be available in a form that accommodates this need. This paper considers talking about how social media can be a good thing and also talks about how social media can be harmful (poor information, depression, lack of exercise, addiction, etc.).


One can no longer neglect the major phenomenon that is…… [Read More]

View Full Essay

Dark Figure of Crime Is a Term

Words: 2252 Length: 8 Pages Document Type: Essay Paper #: 68643143

Dark figure of crime is a term employed by criminologists and sociologists to describe the amount of unreported or undiscovered crime (Maguire & Reiner, 2007, p. 129). The notion of a dark figure undetected by standard crime reporting system casts doubt on the reliability of these systems. It also raises questions about the true magnitude of criminal activity in the United States.

The main source of crime data in the U.S. is the Uniform Crime Database, which is operated by the Federal Bureau of Investigation. The UCR records crimes which are identified through the observation of a law-enforcement officer or reported by a victim or witness to law enforcement authorities. The UCR is not an exhaustive source of crime data because many crimes are neither observed by law enforcement officials nor reported by victims or witnesses.

There are two sources of crime data in the U.S. that try to ascertain the dark figure of crime. The first source is the National Crime Victimization Survey, where victims are asked about the crimes they have suffered. It was started by the U.S. Census Bureau in 1974 and is compiled in an annual NCVS Survey. The NCVS distributes surveys to a national representative…… [Read More]

Lynch, J.P. & Addington, L.A. (2007). Understanding crime statistics: revisiting the divergence of the NCVS and UCR

Maguire, M., Morgan, R., & Reiner, R. (2007). The Oxford handbook of criminology. Oxford: Oxford University Press.
View Full Essay

Blame Do You Believe the

Words: 774 Length: 2 Pages Document Type: Essay Paper #: 60480798

Evidence of this can be seen with Krueger (2010), who found that the Internet is a place where many people will turn to for finding like-minded support. At which point, they will become more inclined to engage in these actions. (Krueger 147-150)

To corroborate these views, CBS News is reporting how the Internet is also leading to a new form of violence against others (cyber bullying). This is when students will gang up and harass someone online. The basic idea behind this kind of violence is to intimidate someone well beyond when they leave the school or the classroom. As a result, a shift has occurred in how these people are reacting to different situations with: some of the victims committing suicide. This is significant, because it is showing how the overall levels of violence on the Internet is now being directed outward. Where, someone can be influenced to engage in violence and they can use it as a weapon to attack someone verbally. ("Suicidal Teen was Cyber Bullied")

What these different facts are illustrating, is that television and the Internet are responsible for violence that is taking place. As, both forms of mediums will serve to: help introduce and…… [Read More]

Media Violence. Surgeon General, 2000. Web. 27 Jul. 2011

"Suicidal Teen was Cyber Bullied." CBS News, 2007. Web. 27 Jul. 2011
View Full Essay

Social Networking Is Not Safe for Children

Words: 712 Length: 3 Pages Document Type: Essay Paper #: 36080168

Social Networking Is Not Safe for Children

Social networking is ubiquitous in today's culture; even elementary school children operate blogs and join social networking sites such as Facebook. Millions of children place highly personal information on these sites, and spend hours a day interacting with people on social networking sites. While it is true that social networking can sometimes have a positive impact on children's growth and personal development, the time spent on the Internet in relation to social networking is often excessive and impedes children's development in myriad ways; this paper identifies negative effects of social marketing, manifesting in self-esteem problems, children with disabilities, and problems in education.

Social networking often has deleterious effects on children's self-esteem. Facebook, for example, can make children feel as though they have hundreds of "friends." This can create an over-reliance on attention from others, and make it so that children lose the ability to formulate genuine lasting friendships. Facebook may make people feel as though they have many friends, but all the time spent in physical isolation can result in feelings of loneliness, which is injurious to one's self-esteem. Through social networking sites like Facebook, people lose sight of the necessity for interpersonal…… [Read More]

Andrews, Michelle. (2006, September 10). Decoding MySpace. U.S. News and World Report.

Bailey, Diane. (2008). Cyber Ethics. New York: Rosen Central Publishing.
View Full Essay

A Case Study Billy

Words: 1343 Length: 4 Pages Document Type: Essay Paper #: 98448640

children go through. This is especially true for children that underwent something traumatic or continue to endure traumatic events. Billy, a 13-year-old Hispanic boy, deals with many stresses in life. From having dealt with physical abuse from his parents to enduring multiple foster care families, to living in a bad neighborhood where there are multiple gang related incidents a week, it makes sense Billy has rebelled and become a product of his environment. That is not to say however, he will continue to vandalize cars and shoplift, but it may help explain why he has done the things he has.

The first societal influence is abuse. When a child goes through physical abuse there a host of consequences. First and foremost, the child loses trust in people. When someone like a parent physically abuses their child, the child sees that the person meant to protect him instead hurts him, destroying any confidence, self-esteem, and trust the child had.

For a child to build back the ability to trust in others, it takes several solutions aimed at rebuilding a child's self-esteem, coping skills, and confidence in him or herself. The first is self-esteem. In order for a person to trust another…… [Read More]

View Full Essay

Heinous Disrespect In Whose Lead

Words: 3453 Length: 10 Pages Document Type: Essay Paper #: 99488354

Education in Japan

Background re: Respect in Japan

On behalf of Asian societies in general, not necessarily Japanese per se, Quynh Nguyen, noted in the Minnosota Daily newspaper, "In Asian society, students revere teachers for the simple fact that knowledge is power and that it is generous of teachers to share it" (Hoenig, 2008). In the United States, one can generally conclude that such a statement does not apply to the majority of students in America. However, in Japan, morals have always been a critical part of the school curriculum to reinforce the home's development of said morals (Id.). While this has made some difference, it is presently unclear as to the effect that Japan's moral education has had on the Japanese youth's recent outbursts of violent behavior.

Progress Toward a Culture of Respect and Learning in Japanese Schools

The current goal of the Japanese moral education is to provide for "the spirit of human respect" to "penetrate the life of family, school and society" (Takahashi, 1988). In fact, for most of Japan's educational history (except for the years wherein the United States advised it), Japan has taught moral education as a separate content-based curriculum and course. However, Japan did…… [Read More]

Anderson, F.E. (1993). The Enigma of the College Classroom: Nails that don't stick up.

In Wadden, P. (ed.) A Handbook for Teaching English at Japanese Colleges and Universities (pp. 101-110). Oxford: Oxford University Press.
View Full Essay

Managing Conflict at Central Florida

Words: 2775 Length: 10 Pages Document Type: Essay Paper #: 85026885

15. I see teachers tease students.

16. I tease other students.

17. I see students hurting others physically.

18. I hurt others physically.

19. I hurt others emotionally.

Academic Skills:

20. I am interested in coming to school.

21. I am a good listener.

22. I am involved in extra-curricular activities.

23. I do my homework.

24. I get good grades.

25. Adults listen to me.


26. I am lonely.

27. I feel lonely when I'm at school.

Emotional Expression:

28. I share my feelings easily.

Substance Avoidance:

29. I used tobacco within 2 weeks.

30. I used alcohol within 2 weeks.

31. I used drugs within 2 weeks.

(not at all) to 10 (a lot).

Low Substance Culture:

32. Students in this school use tobacco.

33. Students in this school use alcohol.

34. Students in this school use drugs.

What methods will be used to answer the evaluation questions? The 100 students selected for the initial administration of the Challenge Day program will be requested to complete the questionnaire above, which is provided with the Challenge Day coordinator packet, prior to their participation. Following completion of the program, students will again be requested to complete the questionnaire. Finally,…… [Read More]

Be the change action plan. (2008). Challenge Day. [Online]. Available:

Ferber, S., Robertson, B., Leigh, G., Fleuridas, C. & Marachi, R. (2007). Summary of Challenge Day student survey. Challenge Day. [Online]. Available:
View Full Essay

Cyberstalking the Rapid Changes Witnessed Over the

Words: 926 Length: 3 Pages Document Type: Essay Paper #: 84057058


The rapid changes witnessed over the course of the last two decades has demonstrated how technology and, more specifically, the internet, have expanded the rule of law and the accompanying challenges that lie in enforcing the law. The purpose of this essay is to describe the greatest challenge facing law enforcement agencies in investigating exploitation, cyber stalking and obscenity. This challenge is the mere scope of problems that this platform has created. This essay will also discuss how jurisdictional issues often interfere with the true and honest law enforcement in this area.

Subjectivity as the Leading Challenge

Living in a free society, where free speech is protected by federal law, subjective differences often arise when discussing what is obscene or not. This subjective quality of human behavior is the root of all these issues and should be respected as a problem that must be solved, yet individual liberty and freedom of expression also needs to be protected as well. This is the difficult framework law enforcement officials are presented with and creates the boundaries on which this investigation is conducted within.

Each locality has its each unique and individual set of behavioral standards that are very difficult to standardize…… [Read More]

Kumar, R. (2011). Cyberstalking: Crime and Challenge at the Cyberspace. International Journal of Computing and Business Research, 2 (1), 2011. Retrieved from 

Ramsey, G. (2013). The War on Cybercrime: How Far Can You Go? Corporate Counsel, 16 April 2013. Retrieved from _On_Cybercrime_How_Far_Can_You_Go&slreturn=20130715093530
View Full Essay

Education Administrator Standards National Educational Technology Standards

Words: 1503 Length: 5 Pages Document Type: Essay Paper #: 15190855

Education Administrator Standards

National Educational Technology Standards for Administrators (NETS*A)

The International Society for Technology in Education (ISTE) designed a set of standards by which they believe that students, teachers and administrators can better move forward in the digital age. The administrator standards provide a means for school and district executive staff to guide their progress as electronic technology becomes even more engrained in society and institutions of learning. The ISTE outlined five areas of need which will allow administrators to lead their specific programs during the digital revolution. These standards -- visionary leadership, digital age learning culture, excellence in professional practice, systemic improvement, digital citizenship -- all concern some aspect of how a digital age administrator can foster the continued understanding and proper use of the growing range of educationally available digital technology. This paper focuses on the standards and sub-standards associated with digital citizenship and provides a specific example of how these can be used by administrators going forward.

The present digital age is linked to new cultural imperatives which must be understood by school administrators so that they can lead effectively. The fifth standard of the NEST*A is that of:

"5. Digital Citizenship: Educational Administrators model and…… [Read More]

Banoglu, K. (2011). School principals' technology leadership competency and technology coordinatorship. Kuram ve Uygulamada Egitim Bilimleri, 11(1), 208- 221.

Eren, E.S., & Kurt, A.A. (2011). Technological leadership behavior of elementary school principals in the process of supply and use of educational technologies. Education, 131(3), 113-123.
View Full Essay

Networking in Business

Words: 1422 Length: 5 Pages Document Type: Essay Paper #: 66176619

Social Media on the Business World

Social media continues to be one of the most disruptive technology platforms there are today, driven by the rapid scalability of web applications coupled with the social dynamics of immediate sharing of data and experiences. The concepts of social media began with the introduction and widespread adoption of Web 2.0 technologies (O'Reilly, 2006). The foundational elements of these technologies led to the creation of more advanced social media platforms diverse as Facebook, LinkedIn, Twitter, Instagram and a myriad of other social media platforms. Their impact on personal communication is unprecedented, as is their potential to streamline and revitalize how enterprises communicate and collaborate (Kristien, Heene, 2003). The intent of this analysis is to evaluate the history of social media, its advantages and disadvantages, explore the myths of social media, dominant websites, the impact of social media on daily life, and also the potential future of these platforms overall.

History of Social Media

Social media's foundation is predicated on the fundamental concepts of Web 2.0, the aggregated view of online communication and collaboration as defined by O'Reilly and Associates (O'Reilly, 2006). It is common knowledge throughout Silicon Valley that Tim O'Reilly, founder and CEO of…… [Read More]

View Full Essay

Problems in the Classroom

Words: 658 Length: 2 Pages Document Type: Essay Paper #: 96878924

Student Learning

Language Barriers & Issues

ESL Students

Other cultures/languages iii. Issues specific to a given area/school

Slang/Improper Speech


Improper terms used

Classroom Decorum (or lack thereof)

Disrespectful/disorderly students

Gossiping/Cliquish behavior iii. Lack of Attentiveness

Students not staying on task

Sexual talk/banter/jokes


Mental intimidation

Insults b. Physical violence/injury


Groups cornering single victim


Social media

Text messages iii. Teasing/Taunting by Groups

Poorly Trained and/or Behaved Teachers

Use of unlicensed teachers

Teachers not adhering to curriculum

c. Teachers injecting personal/political/religious views

Overall inexperience of young teachers

Race/Cultural Issues

a. Racial minorities tend to be poorer

b. Racial minorities more likely to be in single parent household

c. Racial minorities more likely to be discriminated against

d. Racial minorities often perform more poorly on tests

e. Accusations of institutional bias against minorities in general

f. Racist/stereotyping behavior by students

g. Segregated schools/neighborhoods

VI. Student Pacing

a. Students able to push faster but being held back

b. Students being pushed but falling behind

c. Special education/learning disability situations

VII. Cost Constraints

a. Property tax shortfalls

i. Home values/tax base ailing

ii. Residents fleeing area (e.g. Detroit)

iii. Economic recession influence

b. Federal/State grants/funding

i. Budget cuts at state/federal level

ii.…… [Read More]

View Full Essay

Security Emerging Threats in 1997

Words: 630 Length: 2 Pages Document Type: Essay Paper #: 79170295

"Government representatives are responsive to and reliant upon feedback and suggestions from their constituents" and "the most direct way of impacting a legislator is through a letter-writing campaign. The more letters a legislator receives, the more important the issue becomes" (Keene State College Advocates, 2011).

One of the emerging threats that is now a more commonplace threat is that of cyber security. With technology advancing at a rapid rate, it seems that security is sometimes overlooked. Our society is well-versed in how hackers can hack into e-mail, social networking sites and bank accounts but it is absolutely something that the public needs to be more cautious of. A way to combat cyber threats would be to make sure that the computer is completely secure and use common sense when it comes to certain online transactions. People should band together and use one place to reveal the scams that they may have experienced as well as the successes that they have had online. There needs to be some type of barrier that only allows consumers to use the site or the database and not the merchant. Furthermore, the threat of cyber bullying is imminent and there should be a system created…… [Read More]

Garcia, Mary Lynn. (1997). Emerging threats. Retrieved from

Keene State College Advocates. (2011, March 09). Write to your legislator. Retrieved from
View Full Essay

Negative Impact of Social Networking

Words: 590 Length: 2 Pages Document Type: Essay Paper #: 17634692

The much-promised value of social networks is then an illusion, with benefits that could easily be attained through other means.

A second aspect of why social networks have such a negative social impact is because it creates a fertile environment for cyber bullying and abuse that many are too cowardly to do in person (Meredith, 2010). Cyber-bulling is often anonymous, concerted across multiple people in a group targeting an outsider, and faceless, yet vicious in its verbal attacks and threats of violence (Meredith, 2010). The point of cyberbuylling is to ostracize someone and also make them feel terrible so they will leave a school, university or workplace permanently. What is very troubling about this type of behavior is the fact that spreads and becomes commonplace across groups; in effect there is a proliferation of hate that occurs because everyone can stay anonymous (Meredith, 2010). Cyberbullying is reason enough to not have expanded social networks and promote their use. Finally, social networks do more to harm and hot help trust (Di Cagno, Sciubba, 2010). Anyone online can shield or mask their identity while attacking others or companies. Trust is undermined and not strengthened through social networks, which further underscore the fallacy…… [Read More]

James Bennett, Mark Owers, Michael Pitt, & Michael Tucker. (2010). Workplace impact of social networking. Property Management, 28(3), 138-148.

Bernoff, J., & Li, C.. (2008). Harnessing the Power of the Oh-So-Social Web. MIT Sloan Management Review, 49(3), 36-42.
View Full Essay

Teenage Sexting as Well as Its Consequences

Words: 1682 Length: 4 Pages Document Type: Essay Paper #: 23197680

Teenage Sexting and Its Consequences

Problem Description

In the last one decade, the advancement in technology has changed the mode of communication and interaction among teenagers; the increased reliance of teenagers on technology has been profusely documented. About 78% of teenagers own mobile phones and about one-third of them send out more than 3, 000 messages via their mobile phones per month. In several cases, sexting has been used as a form of communication. There are several vague definitions about sexting, but generally, it is seen as a social phenomenon that refers mainly to the habit of sending or receiving messages or images that are sexually suggestive to peers through cell phones. There are sparse researches with regards to the precursors and context to sexting in the existing literature (Martinez-Prather & Vandiver, 2014).

New electronic communication platforms (e.g., Facebook, texting, Twitter, etc.) have raised some serious concerns among today's parents, educators, law enforcement agencies and healthcare practitioners. These concerns include the negative behaviors youths may likely get involved in, with the domination of these forms of communication. Some of the very risky behaviors these youths are likely to engage in on the internet may include interacting with or being stalled…… [Read More]