When children under the age of 18 are continuously using social media daily, they may start to get bored and they seek another method of excitement to try to "spice" things up. This could eventually lead to cyberbullying, the use of technology to harass, threaten, embarrass, or target another person. Cyberbullying is becoming more prevalent as teenagers spend more time on the internet without supervision. 46% of middle school and high school students have been targeted online. "...most cyberbullying is done for the amusement of the bullies and because they think they won't get caught" (Ochavillo 1). This basically says that the bully is harassing others because of pure boredom and carelessness. They don't think that they can get caught, or even be punished because it's on the internet and not a physical thing....
... middle of paper ...
Hafner, Katie. “Texting May Be Taking a Toll.” The New York Times. NYTimes.com, 25 May 2009. Web. 10 December 2013.
Harding, Anne. “Sleep Deprivation Linked to Depression in Teens.” CNN Health. CNN.com, 9 June 2010. Web. 10 December 2013.
Tardanico, Susan. “Is Social Media Sabotaging Real Communication?” Forbes.com. Forbes.com, 30 April 2012. Web. 14 December 2013.
Ochavillo, Vanessa. “Dealing with Cyberbullying.” Pacific Daily News 6 July 2009: A16. ProQuest. Web. 4 December 2013.
Watling, Meranda. “Cyberbullying Has Real Consequences.” Journal & Courier 05 May 2008: A1. ProQuest. Web. 5 December 2013.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Cyberspace: Home, Sweet Home. There is no denying the ambivalence that surrounds modern technology. In a world where apathy is uncommon, people could debate for days about whether technology is a blessing or a curse. But their deliberations are futile. Even if they came to a consensus, would it matter. Humans will never stop using technology, even if it is discovered that it is detracting greatly from their lives; they are willing to accept both the negative and positive consequences that come along with using it.... [tags: technology, screens, time]
523 words (1.5 pages)
- Trapped in Cyberspace is an amazing novel extremely relevant to teens nowadays. It is a well-written story displaying the deadly clutches of the World Wide Web. Ayala Stimler masterfully gives over how just one time on a bad site can pull someone into an addiction that can last months on end. This novel opens everyone’s eyes to the awful dangers of the newest “necessity”, the internet. Michal Klein was the perfect girl-- popular and fun. Internet addiction was the last thing one would associate her with.... [tags: internet addiction, secrecy, adolecent]
820 words (2.3 pages)
- Sherry Turkle, author of the article “Cyberspace and Identity”, explains in her article that true identity is found through multiple personas and the internet helps the individual act out these personas which leads to self-actualization, in which every need is met and fulfilled. Whereas, Jeffery Rosen, author of the article and book “The Naked Crowd”, contends that the identity of the individual is being lost in the Omnipticon, where the many are watching the many, of the crowd. Rosen asserts that the internet is only speeding up the individual’s loss of identity.... [tags: true identity, internet, risks ]
979 words (2.8 pages)
- Experiencing Cyberspace 1. If a survey were being done on how people experience cyberspace, one would immediately notice that no two answers would be the same. Experiencing cyberspace is something that is different for every individual. I myself experience cyberspace psychologically, I experience it in my mind. There have been many attempts at trying to define the abstruse term, but up to date, no one has pinned the tail on the donkey. There cannot be one solid definition for a word that possesses so many meanings.... [tags: web internet]
1959 words (5.6 pages)
- ... Outfits offer a level of friendship and investment in the war effort that will keep you around for months or years to come. Now for the best part; joining the game is free and needs a 20GB download. All three empires are ready and waiting for you to sign up and join their forces, in exchange for being paid in certification points for your service. Certification points can be used to improve and modify your character classes and vehicles. You can elect to equip your Sunderer with the ability to dole out ammo to the allied tank line or fit it with plates of blockade armour and a ploy to allow it to slip through the gate shields of an enemy base so your squad can engage in a special ops mis... [tags: online games, cyberspace]
681 words (1.9 pages)
- The three most thought about aspects of a surveillance society, would be; from one side it protects and monitors, but on the other hand in order to achieve its protection functions, certain boundaries of privacy are crossed. Some would argue that it is governments demand for more power over people, a disciplinary technique; the fact that people are more likely to behave if they had known they had been under a certain amount of supervision. But not all of the time can this be beneficial to them; questions are asked of whether the success of it, rationalize for existence radical surveillance technologies.... [tags: Surveillance Behavior]
2488 words (7.1 pages)
- "Hi, my name is Jamal. I'm a tall, gorgeous black man with a bod made for sin. Talk to me!" "Hi, I'm India, an exotic prostitute with a fondness for short, Norwegian men." "Harry here . . . I'm handsome and shy, and looking for love. . ." "My name is Sophie, and my job as a songwriter has led me to the great city of Miami." "Hello, I'm Lila. I am a 24-year old Jazz singer with a preference for foreign men. If you qualify, definitely say hi." The people you see above are very interesting individuals, all unique and distinctive.... [tags: Internet Computer Essays]
2525 words (7.2 pages)
- The Impact of the Internet on Society The internet is a big impact on our society today. It has been around for quite some time. In fact, in 1973, the U.S. Defense Advanced Research Projects Agency initiated a research to develop communication protocols that would allow networked computers to communicate transparently across multiple, linked packet networks. In 1986, the U.S. National Science Foundation initiated the development of the NSFNET which provides a major backbone communication service for the internet.... [tags: Technology Cyberspace Essays]
691 words (2 pages)
- For people between the ages of ten and twenty-six years old, Internet addiction has become a mental health problem. Many studies have been designed to determine why the Internet is so addicting. Primary Issues One major factor to Internet addiction is anonymity; users have the ability to be anyone or anything they want to be. This identity could represent an ideal self or it could be the opposite of the real person. Having the resources to be able to change oneself over the Internet can lead to many problems along with addictiveness.... [tags: anonymity, cyberspace, communication, e-mail]
1403 words (4 pages)
- Snowcrash The day was finally here, the day to pick our novels to read for the semester. Being Nick I hadnt even looked at the reading list and the time was here to pick my novel. My friend in the class Maygan let me look at the reading list for a brief second. I skimmed through the list looking for an interesting book title and maybe a title that I could relate something in my life to. I picked the novel SnowCrash, by Neal Stephenson. SnowCrash, sounded like a fun snowboarding novel or winter novel that would be fun to read.... [tags: Technology Electronics Cyberspace Essays]
1580 words (4.5 pages)