top-rated free essay

Cyberbullying

By thisseever32 Apr 26, 2015 923 Words
Carolann Seever
Prof. Addi
ENG 102

The United States citizen has a lot more to worry about than stolen credit cards and HIPPA violations. Identity theft is not just stealing Social Security numbers and obtaining lines of credit anymore. When a person hides behind a computer screen portraying to be someone else or even a person who doesn’t actually exist, it is considered to be stealing identity. Not only are adults capable of this fraudulent behavior, children have taken over and even more have fallen victim. Cyberbullying has created a multitude of hardships for children and parents.

Parents are finding it to be almost impossible to prevent the type of bullying that their child receives from faceless harassment. Because they are used to being able to pick up a telephone and address the issue with the school, parents are finding it to be a drawn out process to halt this type of behavior. Children aren’t getting pushed off the monkey bars anymore. Facebook profiles and Twitter accounts are being created by classmates and used to cause great emotional harm to others alike. As Jan Hoffman explains it in her essay “As Bullies Go Digital, Parents Play Catch Up,” It is difficult enough to support ones child through a siege of schoolyard bullying. But the lawlessness of the internet, it’s potential for casual, breathtaking cruelty, and its capacity to cloak of bully’s identity all present slippery new challenges to this transitional generation of analog parents. Desperate to protect their children, parents are floundering even as they scramble to catch up with the technological sophistication of the next generation. (31) There are a couple different avenues to approach this behavior when a parent is the parent of a cyberbully. In cases, some parents do nothing to prevent or improve cyberbullying. They feel as though their child did no physical or emotional harm and refuse to accept responsibility for the damage caused to the other child. On the other hand, after overcoming the initial shock of acknowledging what their child is capable of, most parents choose to discipline their child by stripping them of their technology for a few months. Taking away iPhones and computers is not an effective method to correct the damage that has already been done. If cyberbullying was made more aware to families, the number of victims would reduce substantially. Not only do parents fear of their child being bullied while on the playground at school, they are extremely fearful of what actually goes on behind the computer screen. Technology has enabled a dark and vicious side of adolescence that has horrified parents. Jan Hoffman also explains that “The Internet erases inhibitions, with adolescence often going further with slights online than in person”. Children no longer have to feel the effects of the emotional distress they have caused by simply typing harsh words to another child. They are not being held accountable for their words or actions. Technology has parents baffled, leaving them feeling helpless to address the problems it induces. Bullying has taken on an entire new meaning with the uprising of the Internet, especially Facebook. Before technology, there were playground bullies. Names to go with faces. Since Facebook and the rest of the Internet, bullies remain faceless and cause far more harm. Children are wreaking havoc on others’ lives from behind a computer causing damage so much so as some children feel as if they have no way to escape it. Some have even committed suicide. Ponder that.

Table
[This Table Title Uses a Style Named “Table Title”, Available on the Home Tab, in the Styles Gallery] Column Heading
Additional
Column Heading
Additional
Column Heading
Additional
Column Heading
Row Heading

Row Heading

Row Heading

Source: [This source text uses a style named “Table Source”, available on the Home tab, in the Styles gallery.] a. [This note text uses a style named “Table Note”, available on the Home tab, in the Styles gallery. Table notes use a lowercase letter instead of Arabic numerals to differentiate them from the notes to body content.]

Fig. 1. [This figure caption uses the No Indent style, available on the Home tab, in the Styles gallery. Label figures with the abbreviated “Fig.” and a figure number.] [The sample Works Cited list that follows was created using the Bibliography feature available on the References tab. This feature offers the option to specify MLA style, so that your references are automatically formatted correctly. You can also use this feature to add in-text citations, such as the one shown at the end of this paragraph. To add page numbers to a citation after you insert it, right-click the citation and then click Edit Citation. Note also that MLA rules for citations and references are extensive. So it’s a good idea to refer to MLA 7th Edition for further information.] (AuthorLastName Pages) [To use this template when creating the outline for your paper, on the Home tab, in the Styles gallery, click No Indent. Then, on the same tab, in the Paragraph group, click the Multilevel List icon and then click the MLA Outline style that appears under List Styles. The first six levels of this list style correspond to the outline levels defined in MLA 7th Edition.] For additional guidance on formatting your research paper, consult MLA 7th Edition as well as your instructor. Works Cited

AuthorLastName, FirstName. Title of the Book Being Referenced. City Name: Name of Publisher, Year. Type of Medium (e.g. Print). LastName, First, Middle. "Article Title." Journal Title (Year): Pages From - To. Print.

Cite This Document

Related Documents

  • Cyberbullying

    ...For decades, physical bullying has been a consistent problem for young people attending school. Yet the rapid growth of the Internet has redefined how students pick on one another, giving the traditional bullying a new form. Cyberbullying is now the new era of bullying; where faces can be hidden and hurtful words can be stamped for the world ...

    Read More
  • Cyberbullying

    ...Wedner provides findings from reputable sources regarding the role of parents in on-campus and off-campus harassment cases. For example, she encourages parents whose children engage in cyberbullying “to limit his or her computer privileges to school assignments only” (Diane Wedner, 2013, p. 8). Furthermore, to reinforce her argument, Wedner ...

    Read More
  • Cyberbullying

    ...Cyberbullying Definitions Cyber-bullying: Cyber-bullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others. Cyber-bullying is bullying which uses e-technology as a means of victimizing others. It is the use of an Int...

    Read More
  • Cyberbullying

    ...asymmetric physical or psychological power relationship” (Williams & Guerra, 2007). Bullies prey on victims who are rejected or isolated by peers, show lack of social skills, have negative thoughts about themselves, difficulty in solving social problems, and bad environment such as family and school. Currently, with the advancement of techno...

    Read More
  • Cyberbullying

    ... Cyberbullying Younger generations cannot remember a time before technology. Technology is an every day necessity for both teens and adults that allow us to communicate with new and old friends. We can do this through social networking sites, sending quick texts saying we are “on the way”, an email, and much more. Technology has given u...

    Read More
  • Cyberbullying

    ...Essay Cyberbullying: The power of social networking Social networks are good for press freedom: Social networking sites have created an open space for cyberbullying to occur within the workplace, becoming a particularly vulnerable and often not addressed issue. Cyberbullying is a cruel weapon of bullying which is repeated psychological beh...

    Read More
  • Cyberbullying

    ...the blue from her MySpace boyfriend Josh. She had just began the eighth grade and she had also just broken off her friendship with her neighbor. Months later her parents found out that the boy Josh which was her boyfriend did not even exist. This means that somebody went on the internet just to make a fake account and ruin her life. They found...

    Read More
  • Cyberbullying

    ...Dawn Kropuenske Dr. Jim Reese English 104-01 Composition II 5 November 2013 Social Media and Cyber bullying: A Deadly Connection What is social media and how can the connection with cyber bullying be a deadly combination. A brief description I found on the internet at About.com states “the best way to define social media is to break it...

    Read More

Discover the Best Free Essays on StudyMode

Conquer writer's block once and for all.

High Quality Essays

Our library contains thousands of carefully selected free research papers and essays.

Popular Topics

No matter the topic you're researching, chances are we have it covered.