Annotated bibliography Cyber bullying

Annotatedbibliography: Cyber bullying

Author’sname

Annotatedbibliography: Cyber bullying

ABC-CLIO.(2016). &quotAmandaLenhart`s testimony on the deleting on-line predators Act of 2006&quot.RetrievedOctober 31, 2016, from ABC-CLIO Web site:https://issues.abc-clio.com/Search/Display/1141779

Thearticle seeks to determine the popularity of social networking Websites among the youth, through Amanda Lenhart’s testimony beforethe Subcommittee on Telecommunication and Technology (STT). Accordingto Amanda, there is a widespread of internet use among teenagers inthe United States. Parents believe that the use of internet haspositive impacts on their children. However, the internet has bothpositive and negative repercussions though parents overlook on theadverse effects. The article expounds on the term social networks inevaluating its significance among the teens. Various websites such asthe Live Journal, Facebook, and MySpace are aimed at connectingpeople. The primary purpose of teens’ use of the social sites is toshare content and communicate. The contemporary social and onlineplatforms have helped teens to explore their identities. However,these social sites could compromise privacy due to excessivedisclosure of information. The article addresses the issue of onlinepredators and how teens have fallen prey, posing a grave peril tosocial networking. Parents are less involved in technology and socialnetworking however, it is their responsibility to protect theirchildren from dangers associated with online and social websites.

Schwabach,A. (2006). &quotChildren`sInternet Protection Act.&quot ABC-CLIO.Retrieved November 4, 2016, from ABC-CLIO Web site:https://issues.abc-clio.com/Search/Display/1541311

Thearticle delves into the Children’s Internet Protection Act (CIPA)and other policies and regulation that have been implemented toensure teens are safe from online predators. The Child OnlineProtection Act (COPA) aims at restricting access to various materialson the internet, while the CIPA regulates the access of content fromcertain computers by ensuring schools install software meant tofilter and block dangerous content. According to the author, schoolsreceiving discounts from the federal government such as the E-rateand library programs have the task of enforcing internet safetymeasures such as monitoring of online activities that arepornographic, and harmful to teenagers. The author mentions that thelegislation was signed into law after concerns about the efficacy ofthe online content filtering software. Therefore, schools have beencharged with the responsibility to safeguard students from harmfulonline content by implementing respective policies. According to thearticle, blocked and filtered content include child pornography,images or visual depictions that are offensive and unsuitable forminors. However, the First Amendments supporters such as the AmericanCivil Liberties Union (ACLU) and the American Library Association(ALA) challenged CIPA citing a curtailment of the constitutionalprovisions.

ABC-CLIO.(2006). &quotCyberBashing.&quot RetrievedNovember 4, 2016, from ABC-CLIO:https://issues.abc-clio.com/Search/Display/1262854

Thearticle about cyber bashing states that posting of video clips on theinternet has a devastating implication on the social life ofteenagers. The article describes cyber bashing as recorded fightsthat are posted on the internet.it is a form of cyber bullying thathas been pervasive among the youth and popularized as a form ofentertainment. However, video clips have a high influence on theyoung people in engaging in violent behaviors. On the other hand,there are policies and regulations in pace that prohibit popularonline and social networks from depicting content with excessiveviolence or any form of harassment. For instance, the creation of Websites such as the PSFights.com has primarily been for the purpose ofevaluating cyber bashing clips on the internet. Youngsters perceivethese video clips as comical and entertaining on the contrary,violence depicted often acts as incitement for bullies. The articleemphasizes the need to monitor and employs measures against cyberbashing to prevent youth from copying the same acts and growing to beviolent. Therefore, the fight against cyber bashing should beenhanced to prevent the society from falling into the trap ofviolence. Cyber bullying officers, law enforcement agencies, andofficials ought to take stern actions against individuals postingcyber bashing videos.

ABC-CLIO.(2006). &quotCyberBullying: Timeline.&quot RetrievedOctober 31, 2016, from ABC-CLIO:https://issues.abc-clio.com/Search/Display/1075543

Thearticle about, “cyber bullying: timeline,” focuses on variousincidences of cyber bullying that spans from 1991 to 2015. Accordingto the article, the uses of online applications have raised concernsin the society with individuals taking advantage of these onlineplatforms to harass and bully other individuals. For instance, theYik Yak application allowed users to share messages into a post withan anonymous identity. In 2015, the application was used to makethreats and discriminatory remarks against black students hencecausing a stir. Additionally, Pennsylvania governor signed a law thatallowed cyber bullying and law enforcement agencies to intervene insuch cases. In 2013, cases of cyber bullying skyrocket as two girlswere arrested in connection with a 12-year-old girl suicide. The twowere apprehended for harassment, incitement, and aggravated stalkingof the deceased. Later that year, McAfee releases research findingsthat indicate an increase in cyber bullying incidences from 27percentto 87 percent. In 2012, North Carolina implemented a law thatprohibits cyber bullying of teachers and other school staff. Cyberbullying behaviors such as the creation of fake online profiles couldland students into 60 days imprisonment, under the 2012 SchoolViolence Prevention Act. The history of cyber bullying goes way backto 1990s when the cyber angel program was created to help counteractcyber stalking.

ABC-CLIO.(2002). &quotCyberSecurity Enhancement Act (2002).&quot RetrievedOctober 31, 2016, from ABC-CLIO Web site:https://issues.abc-clio.com/Search/Display/1141781

Thearticle is about, “Cyber Security Enhancement Act of 2002”. Thelegislation was aimed at improving national security by focusing oncyber-crime and cyber terrorism. The article delves into thestipulated guidelines and sections of the CSE Act so as to provide aclear meaning of the law. In this regards, the law seeks to determinewhether the cybercrime was intentional or accidental, the potentialloss or harm resulting from the crime, and the extent to which theoffense infringed others’ rights. The Act describes varioussections that provide measures to be taken under differentcircumstances. For instance, the use of the internet to advertiseillegal devices, or when the criminal offender causes direct orindirect harm to others the imprisonment term is no more than 20years.

Barlett,C., &amp Coyne, S. M. (2014). A Meta‐Analysisof Sex Differences in Cyber‐BullyingBehavior: The Moderating Role of Age. AggressiveBehavior, 40 ,474-488.

Thearticle examines cyber bullying behaviors by focusing on ameta-analysis of sex and age difference. The use of internet hashelped individuals in sharing of ideas, communication, and gatheringof information. However, the study focuses on exploring sexdifferences and its contribution towards cyber bullying practices.According to the author, physical aggression is more common amongmale compared to women. Therefore, males have a high tendency tocommit cybercrimes or harm others through social networks.Nevertheless, there is little or no evidence of sex differenceaggressive behaviors that directly or indirectly harm others such associal exclusion or gossip. Therefore, the authors seem to disagreeabout the issue of the gender gap on cyber bullying behaviors. Forinstance, some research studies have found males to be more engagedin cyber bullying than males while others have found no significantdifference between men and females. The article states that cyberbullying behaviors are far much different from the traditional formof bullying where an individual had to be physically present. Age isone of the major moderators of cyber bullying in the contemporarysociety. Children develop physical aggression that develops intoverbal aggression as they approach adolescence. Cyber bullyingbecomes inevitable after they amass technological savvy on how to usevarious online media platforms.

Banninket al, R. (2014). Cyber and Traditional Bullying Victimization as aRisk Factor for Mental Health Problems and Suicidal Ideation inAdolescents. PLSOne, 9 (4),1-7.

Thearticle focuses on cyber and traditional bullying practices as aparamount precipitator of suicide and mental health problems.According to the article, bullying is described as an aggressive actthat is directed towards a helpless individual by a person(s) over aparticular time. There are four forms of traditional bullying thatinclude physical, verbal, relational, and indirect. The newdevelopments in technology have led to the rise of cyber bullying,where aggressions are carried out through electronic forms. Thearticle exhibits a significant connection between cyber-bullying andpsychological problems and suicide. The article exemplifies thedifference in traditional bullying and cyber bullying through theirimpacts. For instance, traditional bullying has an intense impact onmental health and suicide among adults. On the other hand, cyberbullying practices can be dealt with by blocking bullying messages,thus ameliorate the effects of mental health. According to thearticle, there was a significant correlation between traditionalbullying victimization and mental health problems among girls. On theother hand, traditional bullying victimization was insignificantlyrelated to psychological problems among boys. Additionally, onlytraditional bullying victimization was correlated with suicidalideation. Therefore, the article infers that there is a significantdifference in the effects of bullying among boys and girls.

Bibliography

ABC-CLIO. (2002). &quotCyber Security Enhancement Act (2002).&quot Retrieved October 31, 2016, from ABC-CLIO Web site: https://issues.abc-clio.com/Search/Display/1141781

ABC-CLIO. (2006). &quotCyber Bashing.&quot Retrieved November 4, 2016, from ABC-CLIO: https://issues.abc-clio.com/Search/Display/1262854

ABC-CLIO. (2006). &quotCyber Bullying: Timeline.&quot Retrieved October 31, 2016, from ABC-CLIO: https://issues.abc-clio.com/Search/Display/1075543

ABC-CLIO. (2016). &quotAmanda Lenhart`s testimony on the deleting on-line predators Act of 2006&quot. Retrieved October 31, 2016, from ABC-CLIO Web site: https://issues.abc-clio.com/Search/Display/1141779

Bannink et al, R. (2014). Cyber and Traditional Bullying Victimization as a Risk Factor for Mental Health Problems and Suicidal Ideation in Adolescents. PLS One, 9 (4), 1-7.

Barlett, C., &amp Coyne, S. M. (2014). A Meta‐Analysis of Sex Differences in Cyber‐Bullying Behavior: The Moderating Role of Age. Aggressive Behavior, 40 , 474-488.

Schwabach, A. (2006). &quotChildren`s Internet Protection Act.&quot ABC-CLIO. Retrieved November 4, 2016, from ABC-CLIO Web site: https://issues.abc-clio.com/Search/Display/1541311