Wright and Li (2013) postulate that adolescents who have been victims of cyberbullying or even face-to-face bullying may suffer from tremendous “anger and frustration.” The experience may lead to their need for revenge that is ultimately expressed in their future victimizing behavior.
In this week’s Discussion, you explore cyber-victimization in your local area and examine how this experience may impact individuals, families, communities, and the workplace.
To Prepare for this Discussion:
Review this week’s Learning Resources and consider the impact of cyber-victimization on individuals, families, communities, and the workplace.
Next, consider an event when cyber-victimization has taken place.
Search the Internet to find an online newspaper article, or any other newsworthy information about the event that has taken place.
By Day 4
Post a description of the event supported by any other information from the article you found in your research. Next, provide an explanation of the effects of the cyber-victimization on the individual, the family, the community, and the workplace. Include at least one scholarly source. Use proper APA format and citations.
Readings for this week please view for reference:
Bannink, R., Broeren, S., van de Looij–Jansen, P. M., de Waart, F. G., & Raat, H. (2014). Cyber and traditional bullying victimization as a risk factor for mental health problems and suicidal ideation in adolescents. PLoS ONE, 9(4), e94026. DOI: 10.1371/journal.pone.0094026
Note: You will access this article from the Walden Library databases.
Elipe, P., Mora-Merchán, J. A., Ortega-Ruiz, R., & Casas, J. A. (2015). Perceived emotional intelligence as a moderator variable between cybervictimization and its emotional impact. Frontiers in Psychology, 61–11. DOI: 10.3389/fpsyg.2015.00486
Note: You will access this article from the Walden Library databases.
Jackson, C. L., & Cohen, R. (2012). Childhood victimization: Modeling the relation between classroom victimization, cyber victimization, and psychosocial functioning. Psychology of Popular Media Culture, 1(4), 254–269. DOI: 10.1037/a0029482
Note: You will access this article from the Walden Library databases.
Potts, S. K., & Weidler, D. J. (2015). The virtual destruction of self-compassion: Cyberbullying’s damage to young adults. Psi Chi Journal of Psychological Research, 20(4), 217–227.
Note: You will access this article from the Walden Library databases.
Wigderson, S., & Lynch, M. (2013). Cyber- and traditional peer victimization: Unique relationships with adolescent well-being. Psychology of Violence, 3(4), 297–309. DOI: 10.1037/a0033657
Note: You will access this article from the Walden Library databases.
Wright, M. F. (2015). Cyber victimization and adjustment difficulties: The mediation of Chinese and American adolescents’ digital technology usage. Cyberpsychology, 9(1), 76–90. DOI: 10.5817/CP2015-1-7
Note: You will access this article from the Walden Library databases.
Wright, M., & Li, Y. (2013). The Association between cyber victimization and subsequent cyber aggression: The moderating effect of peer rejection. Journal of Youth & Adolescence, 42(5), 662–674.
Note: You will access this article from the Walden Library databases.
Shimizu, A. (2013). Domestic Violence in the Digital Age: Towards the Creation of a Comprehensive Cyberstalking Statute. Berkeley Journal of Gender, Law & Justice, 28(1), 116–137.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more