Wednesday, 26 March 2014

Essay Draft #3

 
The Rise of Cyberbullying on Social Media
In his TED talk, Goldin (2009) mentions a few negative and positive issues that the world is facing due to rapid globalisation. Social media has brought about new levels of global interconnectedness which often result in the rise of a new global consciousness. However, social media has led to several negative issues such as amplifying the incidence of cyberbullying. High usage of social media by teens has allowed cyberbullying to thrive over the recent years, which attracted more and more critical attention towards the role of social media bringing negative effects on the victims. According to Donegan (2012), in the past, bullying could be better controlled because they were limited to face-to-face interactions. However, in recent years, this age-old conflict has matched the pace of technological evolutions, making it more dangerous and harder to contain. Under these circumstances, several schools and parents have been adopting filtering or blocking software to control children from accessing social networking sites. However, utilizing the software is not effective enough to solve the cyberbullying problem. Instead, an educational approach will be a better alternative to solve the cyberbullying problem in the long run.
Pew Research Centre (2010) has done an extensive national study and shows that of teens who use social media, 88% report that they have witnessed someone being mean or cruel to another online, with 12% saying cyberbullying is a 'frequent' occurrence. Social media has provided more avenues for abusers to conduct cyberbullying. For instance, Facebook and Twitter has significantly allowed incidence of cyberbullying to thrive that negatively impact victims in the various aspects of their lives. While the "share" function in Facebook and Twitter allows abusers to share negative comments to the public, it is possible that many abusers can gather together and attack on a single victim through an interface. This form of bullying is commonly known as mass cyberbullying. In addition, social media allows users to act on their free will, insulting and harassing others online without bearing any consequences. Thus, due to anonymous bullying, victimization can be continuous and inescapable.
Many schools and parents have been utilizing the blocking software so as to prevent teens from accessing social networking sites. However, several researchers and administrators argue that the software may not be as effective as people thought. Microsoft, as cited by Wong (2006) warns parents that although filtering and monitoring tools are helpful, they can be disabled by a savvy computer user. In addition, Jesdanun (2003) also demonstrated how easy it was to defeat various filtering and blocking software. Although the software can be effective to younger and less IT savvy children, it may fail to achieve the same effective result for older and IT savvy teenagers. When teens are determined to circumvent the blocking software, they will find all means to defeat them in order to access the social networking sites. This often leaves parents with a false sense of security as teens may have already deactivated the software without being noticed.
The current model of mitigating cyberbullying by blocking access to social networking sites only controls the actions of students when they are at school or at home. This control model does not prepare students when faced with a potentially dangerous environment for when they leave the safety net provided to them. It is impossible for a student to know how to navigate through without danger when the protection is no longer around.
Thus, it is important to conceive that cyberbullying education is needed to provide students with the relevant skills when encountering any incident of cyberbullying. One such skill is the ability to filter and evaluate information found in social networking sites. This can be achieved through workshops and classroom discussions conducted by the educators during class time. Students will go through a process of reflecting, evaluating and making their own decisions regarding the sources they authenticate and information they choose to share about themselves to others. Another such skill is the ability to withstand critique by others. This can also be achieved through role playing scenarios practiced in the classroom. Students will learn how to recognize, react and control their emotions when dealing with negative comments from people on social media. All in all, with this cyberbullying education approach, students can still interact with different people through social media if they are acquiring skills that they feel are relevant to protect themselves.
In conclusion, the increasing usage of social media among teens has raise the need for eliminating cyberbullying. I believe that the existing solution to combat cyberbullying by solely relying on the blocking software is not effective. It will be better to manage them through cyberbullying education approach rather than just block them completely. Although it often feel that the problem of cyberbullying will never go away, the alternative of not solving the problem is not a viable option either.


Words: 806

 
References

Centre, P. R. (2010). Cyberbullying statistics. Retrieved from Pew Research Centre: http://www.pewresearch.org/

Donegan, R. (2012). Bullying and Cyberbullying: History, Statistics, Law, Prevention and Analysis. The Elon Journal of Undergraduate Research in Communications, 33.

Enough Is Enough. (2006). Youth and general internet use. Retrieved from Enough Is Enough: www.enough.org/inside.php?tag=statistics#7

Fight Crime: Invest in Kids Pennsylvania. (2006, August 17). 1 of 3 teens &1 of 6 preteens are victims of cyber bullying. [News release]. Retrieved from Fight Crime: Invest in Kids Pennsylvania: www.fightcrime.org/releases.php?id=234

Goldin, I. (2009). Navigating our global future [Motion Picture].

Gottesman, B. (2006) A hardware solution in the software-dominated world of parental control. Retrieved from PC Magazine: http://www.pcmag.com/article2/0,1759,1948981,00.asp?

Microsoft (2004) Are your kids addicted to the Internet? Retrieved from Microsoft: http://www.microsoft.com/athome/security/children/kidwebaddict.mspx

Riccardi, K. (2013). Cyber Bullying: Responsibilities and Solutions. Retrieved from Digital Learning Environment: http://www.guide2digitallearning.com/teaching_learning/cyber_bullying_responsibilities_and_solutions

Robey, T. F. (2008). Cyberbullying. Retrieved from National Association of Secondary School Principals: http://www.principals.org/tabid/3788/default.aspx?topic=58057

Sheppard, M. (2012). Cyberbullying Resource Centre. Retrieved from EdgeWave: http://cyberbullying.edgewave.com/

Wong, K. (2006). How Tech Savvy Teens Defeat Parental Control Software. Retrieved from Parent Support: http://www.pcmoderator.com/pcmoderator_021.htm

Monday, 10 March 2014

Reader Response Final Draft


In the article “Globalization of Culture through the Media”, Kraidy (2002) discusses the idea of the diametrical perspectives between cultural imperialism and globalization of culture. He states that at one end, cultural imperialism is the enlargement of the prevalent communication theories of media influence controlled by the government that often assume a movement toward homogenous culture and a disregard for the importance of understanding the local culture. On the other end, globalization is conveyed as a process of exchanging information freely among individuals who can create infinite meanings from the actual cultural product. With the use of existing theories and research results, Kraidy concludes that the middle ground between cultural imperialism and globalization recognizes the critical role that global media play in the process of hybridization, in terms of intensity and speed.

I agree with Kraidy when he suggests cultural globalization as hybridization that pays attention to the local audience preferences instead of cultural imperialism that promotes homogenous culture. Kraidy assumes that the audience-recipient of media messages have the power to interpret and assign meanings to the imported media message based on their own cultural beliefs and attitudes. Thus, the media eventually have to indigenize to meet the audience’s needs and wants.

This is evident in countries such as India, a country that inculcates strong national culture, and where the government has made the media to act in accordance to the Indians' needs and wants. For instance, the main foreign satellite channels such as Star TV are forced to adopt Hindi-language programming as Hindi is the most widely spoken language in India. The Indian market was estimated to account for 55 per cent of STAR TV’s revenues in Asia at the time (Jacob, 2002 cited by Chang, 2007). Another example is the globalization of the film Spiderman 3, which illustrates how mass media successfully have adapted to the Indian’s local culture. The reason Spiderman 3 became the biggest-ever Hollywood hit in India is due to the indigenization that dubbed the Hollywood film into four main Indian languages (Press, 2007). This shows that mass media hybridized but not completely homogenized the culture.

In conclusion, globalization through media should not be deemed as a process of complete homogenization. Depending on the circumstances, the driving forces behind globalization homogenization can be weak. Hence, I believe that cultural identity is not something that can be easily changed and destroyed by the globalized media. The way imported media works is by adding and mixing the cultural elements without eliminating the uniqueness and dominating the local culture.
 
Words: 421
 
References
Chang, Y.-l. (2007). The role of the nation-state: Evolution of STAR TV in China and India. Globa Media Journal, 2.
Kraidy, M. M. (2002). Globalization of Culture Through the Media. Retrieved from http://repository.upenn.edu/cgi/viewcontent.cgi?article=1333&context=asc_papers
Press, A. (28 May, 2007). 'Spider-Man 3' biggest-ever Hollywood hit in India, sinks 'Titanic'. Retrieved from Pravda.ru: http://english.pravda.ru/news/society

Essay Draft #2

In his TED talk, Goldin (2009) mentions a few negative issues that the world is facing due to rapid globalisation. One of the main issues face in many countries is the incidents of cyberbullying being amplified by social media. Social media has brought about new levels of global interconnectedness which often result in the rise of a new global consciousness. High usage of social media by teens has allowed cyberbullying to thrive over the recent years which attracted more and more critical attention towards the role of social media bringing negative effects on the victims. It has proven to be far more damaging and difficult to control as compared to traditional form of bullying. Thus, several schools and parents have been adopting filtering or blocking software to control children from accessing social networking sites. However, I believe that it is not effective enough to solve the cyberbullying problem in the long run by solely utilizing the software. Instead, I will recommend an educational approach to solve the cyberbullying problem.

Social media has provided more avenues for abuser to conduct cyberbullying. Incidents of cyberbullying has been increasing through social media such as Facebook and Twitter which negatively impact on victims in the various aspects of their life. For instance, the "share" function in Facebook and Twitter allows people to share comments to the public. It also facilitates mass cyberbullying where many abusers can gather together and attack on a single victim through an interface. In addition, social media allows users to act on their free will; insulting and harassing others online without bearing any consequences. Thus, due to anonymity bullying, victimization is deemed continuous and inescapable. Many schools and parents have been utilizing the blocking software so as to prevent teens from accessing social networking sites. However, Pew Research Center (2010) has done an extensive national study that shows 76 percent of teens are active on social networking sites, proving that Facebook and Twitter are ideal avenues for engagement among today’s youth. Based on this result, teens may find a way to circumvent the blocking software in order to access social networking sites.

Kenneth Wong (2006) discusses that from a web article "Are your kids addicted to the Internet?", Microsoft warns parents, "Although filtering and monitoring tools are helpful, keep in mind that they can be disabled by a savvy computer user". In addition, articles in the popular press such as "Kids will find Web controls easy to beat", Anick Jesdanun of the Associated Press demonstrated how easy it was to defeat various filtering and blocking software. Although the software can be effective to younger and less IT savvy children, it may failed to achieve the same effective result for older and IT savvy teenagers. When teens are determined to break through the limits that parents have set, they will find all means to defeat the controls. This often leaves parents with a false sense of security as teens may have already deactivate the software without being noticed.

The current model of mitigating cyberbullying by blocking access to social networking sites only controls the actions of students when they are at school or at home. This control model does not prepare students when faced with a potentially dangerous environment for when they leave the safety net provided to them. It is impossible for a student to know how to navigate through without danger when the protection is no longer around. Thus, it is important to conceive that cyberbullying education is needed to develop students with the relevant skills when encountering any incident of cyberbullying. One of such skill is the ability to filter and evaluate information found in social networking sites. This can be achieved through workshops and classroom discussions conducted by the educators during school curriculum. Students will then undergone a process of reflecting, evaluating and making their own decisions regarding the sources they authenticate and information they choose to share about themselves to others. Next, the ability to withstand critique by others is also the most critical skills that students should have. A strategic approach will be more effective compared to the informed educational approach to help teens recognize and control their emotions when engaging social media.  After all, with this cyberbullying education approach, students can still interact with different people through social media if they are acquiring skills that they feel is relevant to protect themselves.

In conclusion, the increasing usage of social media among teens and sharing more content than ever before has raises the need for eliminating cyberbullying. I believe that the existing solution to combat cyberbullying by solely relying on the blocking software is not effective. It will be better to manage them through cyberbullying education approach rather than just block them completely. Although it often feel that the problem of cyberbullying will never go away, the alternative of not solving the problem is not a viable option either.

 

 
References

Centre, P. R. (2010). Cyberbullying statistics. Retrieved from Pew Research Centre: http://www.pewresearch.org/

Enough Is Enough. (2006). Youth and general internet use. Retrieved from Enough Is Enough: www.enough.org/inside.php?tag=statistics#7

Fight Crime: Invest in Kids Pennsylvania. (2006, August 17). 1 of 3 teens &1 of 6 preteens are victims of cyber bullying. [News release]. Retrieved from Fight Crime: Invest in Kids Pennsylvania: www.fightcrime.org/releases.php?id=234

Gottesman, B. (2006) A hardware solution in the software-dominated world of parental control. Retrieved from PC Magazine: http://www.pcmag.com/article2/0,1759,1948981,00.asp

Microsoft (2004) Are your kids addicted to the Internet? Retrieved from Microsoft: http://www.microsoft.com/athome/security/children/kidwebaddict.mspx

Riccardi, K. (2013). Cyber Bullying: Responsibilities and Solutions . Retrieved from Digital Learning Environment: http://www.guide2digitallearning.com/teaching_learning/cyber_bullying_responsibilities_and_solutions

Robey, T. F. (2008). Cyberbullying. Retrieved from National Association of Secondary School Principals: http://www.principals.org/tabid/3788/default.aspx?topic=58057

Sheppard, M. (2012). Cyberbullying Resource Centre. Retrieved from EdgeWave: http://cyberbullying.edgewave.com/

Wong, K. (2006). How Tech Savvy Teens Defeat Parental Control Software . Retrieved from Parent Support: http://www.pcmoderator.com/pcmoderator_021.htm

Wednesday, 5 March 2014

Essay Draft #1


In his TED talk, Goldin (2009) mentions a few negative issues that the world is facing due to rapid globalisation. Over the past decade, the ability to connect across the world through social media has led to an increase in cyber-bullying making the connection between cyber-bullying and social media an important area of study. Social media provide a context where people can communicate and share ideas or knowledge with each other regardless of the distance that separates them. High usage of social media by teens has allowed cyberbullying to thrive over the recent years which attracted more and more critical attention towards the role of social media bringing negative effects on the social, emotional and academic functioning of the victims. It has proven that cyberbullying is far more damaging and difficult to control as compared to traditional form of bullying. Several schools and parents have been adopting filtering or blocking software to control children from accessing social networking sites. However, the effectiveness of this software is doubted in the long run.

Social media provides more avenues for abuser to conduct cyberbullying. Incidents of cyberbullying has been increasing through social media such as Facebook and Twitter which negatively impact on victims in the various aspects of their life. For instance, the "share" function in Facebook and Twitter allows people to share comments to the public. It also facilitates mass cyberbullying where many abusers can gather together and attack on a single victim through an interface. In addition, social media allow users to act on their free will; insulting and harassing others online without bearing any consequences. Thus, due to anonymity bullying, victimization is deemed continuous and inescapable. Many schools and parents have been utilizing the blocking software so as to prevent teens from accessing social networking sites. However, Pew Research Center (2010) has done an extensive national study that shows 76 percent of teens are active on social networking sites, proving that Facebook and Twitter are ideal avenues for engagement among today’s youth. Thus, teens may find a way to circumvent the blocking software in order to access social networking sites. Kenneth Wong (2006) discusses that from a web article "Are your kids addicted to the Internet?", Microsoft warns parents, "Although filtering and monitoring tools are helpful, keep in mind that they can be disabled by a savvy computer user". Furthermore, articles in the popular press such as "Kids will find Web controls easy to beat", Anick Jesdanun of the Associated Press demonstrated how easy it was to defeat various filtering and blocking software. Although the software can be effective to younger and less IT savvy children, it may failed to achieve the same effective result for older and IT savvy teenagers. When teens are determined to break through the limits that parents and schools have set, they will find all means to defeat the controls.Therefore, it would be difficult to keep the software fully updated which leaves parents with a false sense of security.

The current model of mitigating cyberbullying by blocking access to social networking sites only controls the actions of students when they are at school or at home. This control model does not prepare students when faced with a potentially dangerous environment for when they leave the safety net provided to them. It is impossible for a student to know how to navigate through without danger when the protection is no longer around. Thus, it is important to conceive that cyberbullying education is needed to develop students with the relevant skills when encountering any incident of cyberbullying. One of such skill is the ability to filter and evaluate information found in social networking sites. This can be achieved through workshops and classroom discussions conducted by the educators during school curriculum. Students will then undergone a process of reflecting, evaluating and making their own decisions regarding the sources they authenticate and information they choose to share about themselves to others. Next, the ability to withstand critique by others is also the most critical skills that students should have. However, the educational approach may not able to impart such skill that involves emotional control exhibited by students when engaging social media. Although installing filtering or blocking software may help protect children from inappropriate content and reduce the risk of their children being bullied on social media, it should not replace education and supervision. Students can still interact with different people through social media if they are acquiring skills that they feel is relevant to protect themselves.

The increasing usage of social media among teens and sharing more content than ever before has raises the need for eliminating cyberbullying. The existing solution to combat cyberbullying by solely relying on the blocking software has deemed to be not effective. It will be better to manage them through cyberbullying education approach rather than just block them completely. Although it often feel that the problem of cyber-bullying will never go away, the alternative of not solving the problem is not a viable option either.

 

References

Centre, P. R. (2010). Cyberbullying statistics. Retrieved from Pew Research Centre: http://www.pewresearch.org/

Enough Is Enough. (2006). Youth and general internet use. Retrieved from Enough Is Enough: www.enough.org/inside.php?tag=statistics#7

Fight Crime: Invest in Kids Pennsylvania. (2006, August 17). 1 of 3 teens &1 of 6 preteens are victims of cyber bullying. [News release]. Retrieved from Fight Crime: Invest in Kids Pennsylvania: www.fight crime.org/releases.php?id=234

Gottesman, B. (2006) A hardware solution in the software-dominated world of parental control. Retrieved from PC Magazine: http://www.pcmag.com/article2/0,1759,1948981,00.asp?

Microsoft (2004) Are your kids addicted to the Internet? Retrieved from Microsoft: http://www.microsoft.com/athome/security/children/kidwebaddict.mspx

Riccardi, K. (2013). Cyber Bullying: Responsibilities and Solutions . Retrieved from Digital Learning Environment: http://www.guide2digitallearning.com/teaching_learning/cyber_bullying_responsibilities_and_solutions

Robey, T. F. (2008). Cyberbullying. Retrieved from National Association of Secondary School Principals: http://www.principals.org/tabid/3788/default.aspx?topic=58057

Sheppard, M. (2012). Cyberbullying Resource Centre. Retrieved from EdgeWave: http://cyberbullying.edgewave.com/

Wong, K. (2006). How Tech Savvy Teens Defeat Parental Control Software . Retrieved from Parent Support: http://www.pcmoderator.com/pcmoderator_021.htm