Discussion: Cyber-Victimization

Discussion: Cyber-Victimization

If you have ever been harassed by frequent phone calls, visits, or being followed by someone, especially if you have asked this person not to do this, then you know the fear that this behavior can cause. What if this person sends constant emails to you or posts frequent messages about you on social media? What is the difference, between online and offline victimization, if any?

In this week’s Discussion, you examine specific types of offline victimization with similar acts of victimization that occur online. You then research and find articles that focus on how this type of victimization might impact a selected age group.

To Prepare for this Discussion:

· Review this week’s Learning Resources related to different types of victimization.

· Consider and select one of the following pairs of victimizations:

· Cyberstalking vs. Conventional Stalking

· Online Harassment vs. Off-line Harassment

· Cyberbullying vs. Face-to-Face Bullying

· Select one of the following age groups: children, adolescents, adults, or older adults.

· Search the Internet and the Walden library for at least 2 articles regarding the potential negative impacts each of your selected victimizations has on your selected age group.

Post a summary of the article(s) you found in your research. Compare the online versus off-line victimization from the pair you selected by responding to the following questions:

· What is the difference in prevalence between the two?

· What difference is there in terms of effects on the victim in each?

· Are there different long-term implications for the victim between the two forms of victimization? What are those implications?

Use proper APA format and citations

Required Readings

Dake, J. A., Price, J. H., Maziarz, L., & Ward, B. (2012). Prevalence and correlates of sexting behavior in adolescents. American Journal of Sexuality Education, 7(1), 1–15. DOI: 10.1080/15546128.2012.650959

Note: You will access this article from the Walden Library databases.

Dreßing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014). Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior & Social Networking, 17(2), 61–67. DOI: 10.1089/cyber.2012.0231

Note: You will access this article from the Walden Library databases.

Jarvis, L & Macdonald, S. (2015). What Is Cyberterrorism? Findings From a Survey of Researchers. Terrorism and Political Violence, 27(4), 657–678. DOI: 10.1080/09546553.2013.847827

Note: You will access this article from the Walden Library databases.

Modecki, K. L., Barber, B. L., & Vernon, L. (2013). Erratum to: Mapping developmental precursors of cyber-aggression: Trajectories of risk predict perpetration and victimization. Journal of Youth and Adolescence, 42(9), 1493. DOI: 10.1007/s10964-013-9938-0

Note: You will access this article from the Walden Library databases.

Modecki, K. L., Barber, B. L., & Vernon, L. (2013). Mapping developmental precursors of cyber-aggression: Trajectories of risk predict perpetration and victimization. Journal of Youth and Adolescence, 42(5), 651–661. DOI: 10.1007/s10964-012-9887-z

Note: You will access this article from the Walden Library databases.

Pabian, S., & Vandebosch, H. (2014). Using the theory of planned behaviour to understand cyberbullying: The importance of beliefs for developing interventions. European Journal of Developmental Psychology, 11(4), 463–477. DOI: 10.1080/17405629.2013.858626

Note: You will access this article from the Walden Library databases.

Rice, E., Petering, R., Rhoades, H., Winetrobe, H., Goldbach, J., Plant, A., & … Kordic, T. (2015). Cyberbullying Perpetration and Victimization Among Middle-School Students. American Journal of Public Health, 105(3), pe66–e72. DOI: 10.2105/AJPH.2014.302393

Note: You will access this article from the Walden Library databases.

Wegge, D., Vandebosch, H., & Eggermont, S. (2014). Who bullies whom online: A social network analysis of cyberbullying in a school context. Communications: The European Journal of Communication Research, 39(4), 415–433.

Yang, S., Stewart, R., Kim, J., Kim, S., Shin, I., Dewey, M. E., & … Yoon, J. (2013). Differences in predictors of traditional and cyber-bullying: A 2-year longitudinal study in Korean school children. European Child & Adolescent Psychiatry, 22(5), 309–318. DOI: 10.1007/s00787-012-0374-6

Note: You will access this article from the Walden Library databases.

Microsoft (Author). (2016). PowerPoint 2013 Videos and Tutorials. Retrieved from https://support.office.com/en-us/article/PowerPoint-2013-videos-and-tutorials-bd93efc0-3582-49d1-b952-3871cde07d8a?ui=en-US&rs=en-US&ad=US

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *