f you have ever been harassed by frequent phone calls, visits, or being followed by someone, especially if you have asked this person not to do this, then you know the fear that this behavior can cause. What if this person sends constant emails to you or posts frequent messages about you on social media? What is the difference, between online and offline victimization, if any?
In this week’s Discussion, you examine specific types of offline victimization with similar acts of victimization that occur online. You then research and find articles that focus on how this type of victimization might impact a selected age group.
To Prepare for this Discussion:
Review this week’s Learning Resources related to different types of victimization.
Consider and select one of the following pairs of victimizations:
Cyberstalking vs. Conventional Stalking
Online Harassment vs. Off-line Harassment
Cyberbullying vs. Face-to-Face Bullying
Select one of the following age groups: children, adolescents, adults, or older adults.
Search the Internet and the Walden library for at least 2 articles regarding the potential negative impacts each of your selected victimizations has on your selected age group.
By Day 4
Post a summary of the article(s) you found in your research. Compare the online versus off-line victimization from the pair you selected by responding to the following questions:
What is the difference in prevalence between the two?
What difference is there in terms of effects on the victim in each?
Are there different long-term implications for the victim between the two forms of victimization? What are those implications?
readings for this week’s assignment:
Dake, J. A., Price, J. H., Maziarz, L., & Ward, B. (2012). Prevalence and correlates of sexting behavior in adolescents. American Journal of Sexuality Education, 7(1), 1–15. DOI: 10.1080/15546128.2012.650959
Note: You will access this article from the Walden Library databases.
Dreßing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014). Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior & Social Networking, 17(2), 61–67. DOI: 10.1089/cyber.2012.0231
Note: You will access this article from the Walden Library databases.
Jarvis, L & Macdonald, S. (2015). What Is Cyberterrorism? Findings From a Survey of Researchers. Terrorism and Political Violence, 27(4), 657–678. DOI: 10.1080/09546553.2013.847827
Note: You will access this article from the Walden Library databases.
Modecki, K. L., Barber, B. L., & Vernon, L. (2013). Erratum to: Mapping developmental precursors of cyber-aggression: Trajectories of risk predict perpetration and victimization. Journal of Youth and Adolescence, 42(9), 1493. DOI: 10.1007/s10964-013-9938-0
Note: You will access this article from the Walden Library databases.
Modecki, K. L., Barber, B. L., & Vernon, L. (2013). Mapping developmental precursors of cyber-aggression: Trajectories of risk predict perpetration and victimization. Journal of Youth and Adolescence, 42(5), 651–661. DOI: 10.1007/s10964-012-9887-z
Note: You will access this article from the Walden Library databases.
Pabian, S., & Vandebosch, H. (2014). Using the theory of planned behaviour to understand cyberbullying: The importance of beliefs for developing interventions. European Journal of Developmental Psychology, 11(4), 463–477. DOI: 10.1080/17405629.2013.858626
Note: You will access this article from the Walden Library databases.
Rice, E., Petering, R., Rhoades, H., Winetrobe, H., Goldbach, J., Plant, A., & … Kordic, T. (2015). Cyberbullying Perpetration and Victimization Among Middle-School Students. American Journal of Public Health, 105(3), pe66–e72. DOI: 10.2105/AJPH.2014.302393
Note: You will access this article from the Walden Library databases.
Wegge, D., Vandebosch, H., & Eggermont, S. (2014). Who bullies whom online: A social network analysis of cyberbullying in a school context. Communications: The European Journal of Communication Research, 39(4), 415–433.
Yang, S., Stewart, R., Kim, J., Kim, S., Shin, I., Dewey, M. E., & … Yoon, J. (2013). Differences in predictors of traditional and cyber-bullying: A 2-year longitudinal study in Korean school children. European Child & Adolescent Psychiatry, 22(5), 309–318. DOI: 10.1007/s00787-012-0374-6
Note: You will access this article from the Walden Library databases.
Microsoft (Author). (2016). PowerPoint 2013 Videos and Tutorials. Retrieved from https://support.office.com/en-us/article/PowerPoint-2013-videos-and-tutorials-bd93efc0-3582-49d1-b952-3871cde07d8a?ui=en-US&rs=en-US&ad=US
Document: Final Project Overview (Word document)
Required Media
Lewinsky, M. (2015). The price of shame. TED. Retrieved from http://www.ted.com/talks/monica_lewinsky_the_price_of_shame
Note: This media program is approximately 22 minutes.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more