StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Imminent Dangers of Internet Predators, Cyber Bullying, and Personal Privacy - Annotated Bibliography Example

Cite this document
Summary
This annotated bibliography "The Imminent Dangers of Internet Predators, Cyber Bullying, and Personal Privacy" refers to the research that will expound on the popularity of social media in a different section of the society, dangers brought about by internet predators…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.2% of users find it useful
The Imminent Dangers of Internet Predators, Cyber Bullying, and Personal Privacy
Read Text Preview

Extract of sample "The Imminent Dangers of Internet Predators, Cyber Bullying, and Personal Privacy"

Global Society Fails To Acknowledge the Imminent Dangers of Internet Predators, Cyber Bullying, and Personal Privacy Caused By Social Networking Sites Student’s name: Institution’s name: Course code: Instructor’s name: Date of submission: Thesis Statement Being one of the most recent developments in information technology, social networking sites poses tremendous dangers to social users. However, global society does not acknowledge the peril associated with using social media sites. The research will expound on the popularity of social media in different section of the society, dangers brought about by internet predators and how it has been neglected, problem of cyber bullying to social network users, and the negative impact of social networking sites to personal privacy. Barrientos, J. (2010). Officials highlight growing dangers of cyber bullying. McClatchy - Tribune Business News, 12, 4, 45-50 The journal presents a case study of a student who committed suicide for being teased in social site. In reference to this incidence, school official have embarked on analyzing the dangers associated with cyber bullying. In a study, conducted in USA in 2009, by center for social emotional education, more than 35% of students have experienced cyber bullying in their life time. There is very limited effort taken to rectify the problem (Barrientos, 2010). Barrientos holds a masters degree in education. He has written several journals on the problem affecting education fraternity and most specifically on students for the last twenty years. He has also worked with several experienced writers and his work has been cited for more than fifty times by different authors. He has a good reputation for his work. The content of the article purposed to produce a case study on cyber bullying incidence. This journal was published in 2010 and it entails recent case studies. The journal entails the original work of the author. I will use the article in providing a case study of bullying incidence. Cowie, H. (2011). Reducing cyber-bullying risk in looked-after children. Community Care, 18, 84, 18-18. According to the article, cyber-bullying come in different forms. Common cyber-bullying forms includes; physical violence, death threat, and name-calling, threat to end existing relationships, sexual demands, and threat to incorporate friends and families, and irritating chain of messages. In a survey conducted in December 2010 in Europe among youth and children, 5 % of the interviewed were bullied more than once in every week. There was no action taken after reporting (Cowie, 2011). Cowie is a prominent scholar in Europe. He has conducted and presented several studies concerning violence on children. He holds PhD degree in international crimes. For more than twenty years, Cowie have worked on children based organization and community care. His work has been cited by legislators when making and amending laws. The author have used interview in analyzing the article content. The purpose of the article in to define different methods used in bullying social media users the article and contains recent findings. The article includes the author original work and it’s very recent. The article will help me in understanding various methods used in cyber-bullying. Dowding, M. (2011). Interpreting privacy on campus: The freedom of information and personal privacy and Ontario universities. Canadian Journal of Communication, 36(1), 11-30 The journal talks about how social media expose customers’ personal information to other agencies. It also talks about legal issues that regulate personal information in social site. The article also presents a survey on how social media have violated individual personal rights. Security agencies work together with social media services in getting the social media users personal information (Dowding, 2011). The author of the article is law lecturer in Harvard University. He has a PhD degree in law. He has written more than one hundred journals over the last ten years. His work has been cited for more than five hundred times. The articles contain information on how social media services have violated individual privacy rights. The author relied on research findings in his work. The content findings are very recent and are relevant in modern study. The article will assist me in understanding the existing privacy laws and how they are violated by social network services. Hooper, T. (2010). The value congruence of social networking services - a New Zealand assessment of ethical information handling. Electronic Journal of Information Systems Evaluation, 13(2), 121-131 The journal explains how social network users are unaware of the dangers associated with exposing personal information in social sites. The article presents an analysis on how privacy regulation is underrated in six universal social networking sites. It also talks about contractual relationship between social media services and internet users as well as how the personal information is misused (Hooper, 2010) Hooper has a good reputation in his analysis and research survey. He holds PhD degree in information technology. He has also served as a lecture in different universities and colleges in USA for more than twenty five years. His work has been cited for over one hundred times by different authors. In his work, he has reviewed several authors. The contents of the articles is purposed to expound on danger posed by social networks on individual privacy. The article is very recent and relevant in my study. The content is based on research findings and expert experiences. The article will help me in analyzing the dangers of social site in personal privacy. James, k. (2010). Detected dangers of social networking. A case study in United States of America. Work force management Journals. 3, 34, 26-30 The journal expounds on a case on a youth who his privacy right was violated. His details were disclosed to security officers without his consent. In the article, several people reports violation of their basic rights every day. In reference to the case study, the youth was accused of murder crimes (James, 2010). James is hold masters degree in international laws and crimes. He has worked in criminal department for twelve years. He has also written more than one hundred on human right violation. His works have been cited severally by several authors. In this article he has reviewed several authors work in the definition of terms. The article produces a real case example of how people rights are violated. It is purposed to portray the real picture in social networks. The article is current as it present a case which occurred in 2010.This article will helps me in producing a case study in my research. John, S. (2007). Internet child-pornography peddlers, sex predators targeted by white house. Wall Street Journal, 23, 12, 13-16 The articles talks about high number of internet predators who uses social network in United States of America. The large number has raised concerns among the states administrators. As a result of this, they have come up with policies that are intended to zero rates internet predators’ activities in the country. In their initiative, they have incorporated leading law-enforcers and social service providers in the country (John, 2007). John Simon holds a master degree from Harvard University. John has also worked as a human rights advocate in various Non Governmental Organizations for more than twenty years. His work has been cited by more than fifty authors. The article contains the author’s original work. The article entails current policies in United States of America concerning internet predators. It also talks about current issues since it was published in 2007. I will use the source in understanding the available regulation in addressing the problem and how their importance. Marshall, N. (2011). Lawmakers, police react to cyber-bullying, online harassment trend. American Law articles and Journals, 2, 3, 4-9 The articles talks about the increased spread of cyber-bullying in social media sites and other common electronic media. Over the last few years, the number of cyber bullying cases has increased immensely. This has raised concern among legislators and law makers in United States of American and other international countries. Senators in America are in their verge of strengthening bullying prevention act to incorporate cyber-bullying (Marshall, 2011) Marshall is a PhD holder in international law and crimes. He has written several books and journal on internet crimes for more than ten years. He has also participated in drafting several legislations. In his writings, he has worked with several writers and his work has been cited severally. This article produces the actual data collected from criminal department in cyber-bullying and it’s purposed to expound on the real danger of cyber-bullying. These details will help me in getting the real picture of cyber-bullying in the world. In developing the article, the author interviewed some victims to understand their emotional feeling on their experience. The article is very current and talks about recent incidences. Penton, K. (2009). Forum advises parents to monitor child’s internet use: Predators target those who are depressed or need attention. McClatchy - Tribune Business News, 12, 2, 1-1 The article talks about the imperative of parents’ involvement in understanding the dangers of internet predators. Parents ought to understand the dangers of internet predators to their children. The children need to talk to their parents about internet use. Children must understand their online friends and the level of their interaction (Penton, 2009). Penton holds PhD degree in international law and crimes. He has lectured in different universities for more than sixteen years. He is also a member of Delaware county internet crimes against child task force. His work has been cited by several authors such as David Peifer in his article on international children crimes 2010. The article is based on life experiences of the interviewed. It contains the role of parent in addressing internet predators. It was intended to outline the important of parent in the war against internet predators. The article has been reviewed by several authors. It was published in 2009 thus relevance in modern study. Vascellaro, J. (2011). Social networking goes professional, doctors, salesman, executives’ turns to new site to consult. Wall Street Journals, 28, 4, 45-50 The article expounds on the popularity of the social media services in the society. In the recent past, social media have attracted a significant number of people. This exposes large number of population to the dangers associated with using social media services (Vascellaro, 2011). The article has suggested some measures relevant in regulating the use of social media among children and youths. The author holds several degrees on information technology. His work has been cited more than sixty times by different authors. The author has also worked in information technologies schools in American colleges for ten years. In this article, the author has reviewed several authors. The article entails how social network services are used differently in the society. It aims at expounding the dangers associated with overreliance on social media. The article was written in 2011 therefore it contains recent information. The article will helps me in understanding the dynamic of social media and the danger associated with using social media Wolk, D. (2010). Social media sites pique the interest of company recruiters. Workforce Management, 83, 8, 70-73 The article talks about different social media in the world. It also expound on the different uses of social media. According to the article, social media plays different roles ranging from business activities to personal interaction (Wolk, 2010). There are personal social site, professional sites, and sites that incorporate both personal and professional purpose. The author holds several degrees in information technology. He has spent more than twenty years lecturing in different university and in writing journal. In this article, he has cited several professionals. He has been cited for more than two hundred times. The article talks about different types of social media and how they are used. The purpose of the article is to categorize the existing social media services. The article contains recent occurrences. It will assist me in understanding the purpose of social media and how they overstep their mandates in their service delivery. . References Barrientos, J. (2010). Officials highlight growing dangers of cyber bullying. McClatchy - Tribune Business News, 12, 4, 45-50 Cowie, H. (2011). Reducing cyber-bullying risk in looked-after children. Community Care, 18, 84, 18-18. Dowding, M. (2011). Interpreting privacy on campus: The freedom of information and personal privacy and Ontario universities. Canadian Journal of Communication, 36(1), 11-30 Hooper, T. (2010). The value congruence of social networking services - a New Zealand assessment of ethical information handling. Electronic Journal of Information Systems Evaluation, 13(2), 121-131 James, K. (2010). Detected dangers of social networking. A case study in United States of America. Work force Management Journals. 3, 34, 26-30 John, S. (2007). Internet child-pornography peddlers, sex predators targeted by white house. Wall Street Journal, 23, 12, 13-16 Marshall, N. (2011). Lawmakers, police react to cyber-bullying, online harassment trend. American Law Articles and Journals, 2, 3, 4-9 Penton, K. (2009). Forum advises parents to monitor child’s internet use: Predators target those who are depressed or need attention. McClatchy - Tribune Business News, 12, 2, 1-1 Vascellaro, J. (2011). Social networking goes professional, doctors, salesman, executives’ turns to new site to consult. Wall Street Journals, 28, 4, 45-50 Wolk, D. (2010). Social media sites pique the interest of company recruiters. Workforce management, 83, 8, 70-73 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Imminent Dangers of Internet Predators, Cyber Bullying, and Personal Privacy Annotated Bibliography Example | Topics and Well Written Essays - 1750 words, n.d.)
The Imminent Dangers of Internet Predators, Cyber Bullying, and Personal Privacy Annotated Bibliography Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/information-technology/1775230-global-society-fails-to-acknowledge-the-imminent-dangers-of-internet-predators-cyber-bullying-and-personal-privacy-caused-by-social-networking-sites
(The Imminent Dangers of Internet Predators, Cyber Bullying, and Personal Privacy Annotated Bibliography Example | Topics and Well Written Essays - 1750 Words)
The Imminent Dangers of Internet Predators, Cyber Bullying, and Personal Privacy Annotated Bibliography Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1775230-global-society-fails-to-acknowledge-the-imminent-dangers-of-internet-predators-cyber-bullying-and-personal-privacy-caused-by-social-networking-sites.
“The Imminent Dangers of Internet Predators, Cyber Bullying, and Personal Privacy Annotated Bibliography Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/information-technology/1775230-global-society-fails-to-acknowledge-the-imminent-dangers-of-internet-predators-cyber-bullying-and-personal-privacy-caused-by-social-networking-sites.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Imminent Dangers of Internet Predators, Cyber Bullying, and Personal Privacy

Raising the school awarenessof the dangers of social networking to the teenagers

I believe that the school is the most basic instrumental and effective institution to counter these imminent dangers to the youth.... yber issues and offenses such as bullying, privacy and security breach, identity theft, anti-social and withdrawal to society behaviors, and online predators are very serious threats to the well-being of the adolescent person.... Therefore, it is their sworn obligation to equip their students with proper knowledge that will enable them to survive in society, be it in the real world or even in the cyber realm of the internet....
12 Pages (3000 words) Research Proposal

Children and the Internet

It is very strange that some parents, who are normally very protective of their children, supervise their behavior in public spaces and warn them against the dangers of the strangers with candy; are not aware that internet is also a public sphere full with dangerous people.... While some parents, whose children are probably better at using technology, are unaware the dangers of the internet; some people, including the educators, know its dangers but still advocate unmonitored internet usage in the name of “teen privacy”....
9 Pages (2250 words) Essay

Internet Privacy --private individual

3 Pages (750 words) Essay

9/11 and the Start of the War on Terror

This essay discusses that due to constant threats posed by malicious terrorists and the following 9/11 incidence, the United States embarked on devising effective measures, for instance, the Foreign Intelligence Surveillance Act (FISA).... hellip; On September 11, 2001, armed Islamic terrorists hijacked four U....
30 Pages (7500 words) Essay

Sexual Predators in Cyberspace

Most of the time they seek sexual abuse, bullying and divorce.... They make use of internet without regard of any precautions, exchange personal information of their co-pedophiles and potential child victims.... (Cheney) Children are particularly vulnerable in this regard and face a lot of cyber dangers.... Pedophiles and sexual predators are on the rise.... I t can be solved by sending police men in chat rooms to track down on predators and by promoting awareness among children ...
5 Pages (1250 words) Research Paper

Effects of social networks among youth

One might argue that virtual shopping place is the concept introduced by the internet and it is true to some extent.... It's key to success is it being one of the easiest and fastest way for the youth to communicate with each other and the world at large.... The… Social networking websites today doesnt only allow one to connect with their friends, it also helps in meeting new friends, sharing pictures, and keeping up with the latest updates in people's lives....
7 Pages (1750 words) Research Paper

Cyber Sex Crimes and the Law

People have a right to utilize today's Internet as a means to enhance living and expand personal knowledge.... The author of the "cyber Sex Crimes and the Law" paper identifies the different steps being taken to combat cyber sex crimes that include child pornography and youth exploitation, and provides several legal cases in which sexual, criminal behavior was involved in the Internet environment.... Complicated, modern societies and the invention of mass-communication tools, such as the mobile device and Internet technologies, are allowing cyber predators to invade a broader realm of the social population....
14 Pages (3500 words) Research Paper

The Effects of Social Networking among the Youth

One might argue that virtual shopping place is the concept introduced by the internet and it is true to some extent.... The paper "The Effects of Social Networking among the Youth" explains the reasons behind the positive and negative effects on the lives of the younger generations, how college students can avoid the negative effects of social media, and explore the studies conducted in this field of research....
17 Pages (4250 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us