Thursday, 17 April 2014

Critical Reflection


I am not disappointed at all after knowing that I have to do ES1102. I had expected that I would need to do this module before the results were announced to us. My English was not very good as I never got an "A" grade for any of my English assignments or exams. During the course of my study in Polytechnic, I had difficulty in writing a good report and would always need to seek assistance from my friends and teachers. I felt frustrated as it seems that no matter how hard I tried, I could never write a good report by myself.
 
Learning English is a process and it requires much time and effort to master it. I was glad that I was given the opportunity to do this module. This module has taught me many things that I found useful whenever I write a report or essay. For instance, I am taught how to write a proper and good thesis statement. I do not remember I have learned any of it before doing this module. I believe that writing a thesis statement is important as it guides the writer to keep the essay focused and aids the reader understanding. Furthermore, I am taught how to cite sources in my report properly. Citation is the basis of academics in which any person who is in pursuit of knowledge has to know how to do citation.
 
Blogging, one of the main activities in this module that I never enjoy doing it, has forced me to practice writing and commenting on other students' writings. However, as I started to blog more often, I felt that blogging is an effective form of self-expression. Blog is like my personal diary. It allows me to look back from where I began and evaluate how much I have changed to a better one.

All in all, I believe that the class has enjoyed the learning experience as much as I did. Through the entire semester in ES1102, I am glad that I have made friends who shared the same experience and difficulties while dealing with English as me. As mentioned earlier, learning English is a process. I will not stop learning and improving my English even if I am not doing any English module for my future semester.

Wednesday, 16 April 2014

Presentations in ES1102

I believe that presentation should be incorporated into ES1102 because it gives opportunity for us to practice our oral presentation skills and also get to receive immediate feedbacks from teachers and friends to further improve in both areas: essay content and oral presentation skills. By listening and observing how other classmates present their work, it made me to evaluate and reflect upon myself on how I can be like or better than them.
Presentation has always been my greatest fear even though I did several presentations in the course of my Poly. It never fails to made me nervous. However, I believe presentations are useful in helping me to fully understand which areas I have to improve and make changes. While I was preparing my presentation, I will keep reviewing my work so as to ensure my work is well-organised and evidently supported and relevant before I present to the class. I believe that others do the same way too. Thus, I felt that even though the presentation is not graded, it still benefits us in many ways. I admit that listening to how my classmates present in class has inspired me to become a more confident speaker or presenter.

Thursday, 10 April 2014

Final Essay Draft


The Rise of Cyberbullying on Social Media

In his TED talk, Goldin (2009) mentions a few negative and positive issues that the world is facing due to rapid globalisation. Advancement in technology and digital media have redefined how we interact with people across the world. Today, consumers are able to stay “connected” with the use of social media. Social media has brought about new levels of global interconnectedness, which often result in the rise of a new global consciousness. Needless to say, social media have an enormous implications for globalisation.

However, social media has led to several negative issues such as amplifying the incidence of cyberbullying. High usage of social media by teenagers has allowed cyberbullying to thrive over the recent years, which has attracted more and more critical attention towards the role of social media in bringing negative effects on the victims. According to Donegan (2012), in the past, bullying could be better controlled because they were limited to face-to-face interactions. However, in recent years, this age-old form of conflict has matched the pace of technological evolutions, making it more dangerous and harder to contain. Under these circumstances, several schools and parents in US have been adopting the blocking software to control teenagers from accessing social networking sites. However, utilizing the software is not an effective enough method to solve the cyberbullying problem. Instead, an educational approach will be a better alternative to solve the cyberbullying problem in the long run.

Pew Research Centre (2010) has done an extensive national study in US which shows that of teens who use social media, 88% report that they have witnessed someone being mean or cruel to another person online, with 12% saying cyberbullying is a 'frequent' occurrence. Social media has provided more avenues and convenience for abusers to conduct cyberbullying. For instance, Facebook and Twitter has allowed significant incident of cyberbullying to thrive. With the "share" function in Facebook and “retweet” function in Twitter, abusers can create and share negative comments to the public, easily and instantly. It also made it possible for the abusers to gather together and attack a single victim through an interface. This form of bullying is commonly known as mass cyberbullying. In addition, abusers may use faked identity to conduct cyberbullying. Abusers can act on their free will, insulting and harassing others online without bearing any immediate consequences. Thus, as cyberbullying continue to thrive, victimization can be continuous and inescapable.

Many schools and parents have been utilizing the blocking software so as to prevent teens from accessing social networking sites. However, the software can be disabled by the teenagers. Microsoft, as cited by Wong (2006), warns parents that although filtering and monitoring tools are helpful, they can be disabled by a savvy computer user. In addition, Jesdanun (2003) also demonstrated how easy it was to defeat various filtering and blocking software. Although the software can be effective when used with younger, less IT-savvy teenagers, it may fail to achieve the same effective result with teenagers who are IT-savvy. On the other hand, teenagers who are not or less IT-savvy may reach out to other alternatives. When teens are determined to circumvent the blocking software, they will find all means to defeat them in order to access the social networking sites. This often leaves parents with a false sense of security as teens may have already deactivated the software without being noticed.

The current model of mitigating cyberbullying by blocking access to social networking sites only controls the actions of the abusers and protects the victims when they are at school or at home. This control model does not prepare teenagers on how they should react when faced with a potentially dangerous environment when they leave the safety net provided to them. It may be impossible for a teenager to know how to navigate through without danger when the protection is no longer around.

Thus, the cyberbullying education is needed to provide teenagers with the relevant skills when encountering any incident of cyberbullying. One such skill is the ability to filter and evaluate information found in social networking sites. This can be achieved through workshops and classroom discussions conducted by the educators during class time. Students will go through a process of reflecting, evaluating and making their own decisions regarding the sources they authenticate and information they choose to share about themselves to others. Another such skill is the ability to withstand critique by others. This can also be achieved through role playing scenarios practiced in the workshop. Students will learn how to recognize, react and control their emotions when dealing with negative comments from people on social media. All in all, with this cyberbullying education approach, students can still interact with different people through social media if they are acquiring skills that they feel are relevant to protect themselves when engaging the social networking sites.

In conclusion, although social media improved the level of global interconnectedness, it has provided more avenues and convenience for abusers to conduct cyberbullying. I believe that the existing solution to combat cyberbullying by utilizing the blocking software is not effective enough. This is because protection does not always mean avoidance of danger. It will be better to adopt cyberbullying education approach rather than just blocking the social networking sites completely. Although it often seems that the problem of cyberbullying will never go away, the alternative of not solving the problem is not a viable option either.
 
 
References

Centre, P. R. (2010). Cyberbullying statistics. Retrieved from Pew Research Centre: http://www.pewresearch.org/
Donegan, R. (2012). Bullying and Cyberbullying: History, Statistics, Law, Prevention and Analysis. The Elon Journal of Undergraduate Research in Communications, 33.
Enough Is Enough. (2006). Youth and general internet use. Retrieved from Enough Is Enough: www.enough.org/inside.php?tag=statistics#7
Fight Crime: Invest in Kids Pennsylvania. (2006, August 17). 1 of 3 teens &1 of 6 preteens are victims of cyber bullying. [News release]. Retrieved from Fight Crime: Invest in Kids Pennsylvania: www.fightcrime.org/releases.php?id=234
Goldin, I. (2009). Navigating our global future [Motion Picture].
Gottesman, B. (2006) A hardware solution in the software-dominated world of parental control. Retrieved from PC Magazine: http://www.pcmag.com/article2/0,1759,1948981,00.asp?
Microsoft (2004) Are your kids addicted to the Internet? Retrieved from Microsoft: http://www.microsoft.com/athome/security/children/kidwebaddict.mspx
Riccardi, K. (2013). Cyber Bullying: Responsibilities and Solutions. Retrieved from Digital Learning Environment: http://www.guide2digitallearning.com/teaching_learning/cyber_bullying_responsibilities_and_solutions
Robey, T. F. (2008). Cyberbullying. Retrieved from National Association of Secondary School Principals: http://www.principals.org/tabid/3788/default.aspx?topic=58057
Sheppard, M. (2012). Cyberbullying Resource Centre. Retrieved from EdgeWave: http://cyberbullying.edgewave.com/
Wong, K. (2006). How Tech Savvy Teens Defeat Parental Control Software. Retrieved from Parent Support: http://www.pcmoderator.com/pcmoderator_021.htm

 

Wednesday, 26 March 2014

Essay Draft #3

 
The Rise of Cyberbullying on Social Media
In his TED talk, Goldin (2009) mentions a few negative and positive issues that the world is facing due to rapid globalisation. Social media has brought about new levels of global interconnectedness which often result in the rise of a new global consciousness. However, social media has led to several negative issues such as amplifying the incidence of cyberbullying. High usage of social media by teens has allowed cyberbullying to thrive over the recent years, which attracted more and more critical attention towards the role of social media bringing negative effects on the victims. According to Donegan (2012), in the past, bullying could be better controlled because they were limited to face-to-face interactions. However, in recent years, this age-old conflict has matched the pace of technological evolutions, making it more dangerous and harder to contain. Under these circumstances, several schools and parents have been adopting filtering or blocking software to control children from accessing social networking sites. However, utilizing the software is not effective enough to solve the cyberbullying problem. Instead, an educational approach will be a better alternative to solve the cyberbullying problem in the long run.
Pew Research Centre (2010) has done an extensive national study and shows that of teens who use social media, 88% report that they have witnessed someone being mean or cruel to another online, with 12% saying cyberbullying is a 'frequent' occurrence. Social media has provided more avenues for abusers to conduct cyberbullying. For instance, Facebook and Twitter has significantly allowed incidence of cyberbullying to thrive that negatively impact victims in the various aspects of their lives. While the "share" function in Facebook and Twitter allows abusers to share negative comments to the public, it is possible that many abusers can gather together and attack on a single victim through an interface. This form of bullying is commonly known as mass cyberbullying. In addition, social media allows users to act on their free will, insulting and harassing others online without bearing any consequences. Thus, due to anonymous bullying, victimization can be continuous and inescapable.
Many schools and parents have been utilizing the blocking software so as to prevent teens from accessing social networking sites. However, several researchers and administrators argue that the software may not be as effective as people thought. Microsoft, as cited by Wong (2006) warns parents that although filtering and monitoring tools are helpful, they can be disabled by a savvy computer user. In addition, Jesdanun (2003) also demonstrated how easy it was to defeat various filtering and blocking software. Although the software can be effective to younger and less IT savvy children, it may fail to achieve the same effective result for older and IT savvy teenagers. When teens are determined to circumvent the blocking software, they will find all means to defeat them in order to access the social networking sites. This often leaves parents with a false sense of security as teens may have already deactivated the software without being noticed.
The current model of mitigating cyberbullying by blocking access to social networking sites only controls the actions of students when they are at school or at home. This control model does not prepare students when faced with a potentially dangerous environment for when they leave the safety net provided to them. It is impossible for a student to know how to navigate through without danger when the protection is no longer around.
Thus, it is important to conceive that cyberbullying education is needed to provide students with the relevant skills when encountering any incident of cyberbullying. One such skill is the ability to filter and evaluate information found in social networking sites. This can be achieved through workshops and classroom discussions conducted by the educators during class time. Students will go through a process of reflecting, evaluating and making their own decisions regarding the sources they authenticate and information they choose to share about themselves to others. Another such skill is the ability to withstand critique by others. This can also be achieved through role playing scenarios practiced in the classroom. Students will learn how to recognize, react and control their emotions when dealing with negative comments from people on social media. All in all, with this cyberbullying education approach, students can still interact with different people through social media if they are acquiring skills that they feel are relevant to protect themselves.
In conclusion, the increasing usage of social media among teens has raise the need for eliminating cyberbullying. I believe that the existing solution to combat cyberbullying by solely relying on the blocking software is not effective. It will be better to manage them through cyberbullying education approach rather than just block them completely. Although it often feel that the problem of cyberbullying will never go away, the alternative of not solving the problem is not a viable option either.


Words: 806

 
References

Centre, P. R. (2010). Cyberbullying statistics. Retrieved from Pew Research Centre: http://www.pewresearch.org/

Donegan, R. (2012). Bullying and Cyberbullying: History, Statistics, Law, Prevention and Analysis. The Elon Journal of Undergraduate Research in Communications, 33.

Enough Is Enough. (2006). Youth and general internet use. Retrieved from Enough Is Enough: www.enough.org/inside.php?tag=statistics#7

Fight Crime: Invest in Kids Pennsylvania. (2006, August 17). 1 of 3 teens &1 of 6 preteens are victims of cyber bullying. [News release]. Retrieved from Fight Crime: Invest in Kids Pennsylvania: www.fightcrime.org/releases.php?id=234

Goldin, I. (2009). Navigating our global future [Motion Picture].

Gottesman, B. (2006) A hardware solution in the software-dominated world of parental control. Retrieved from PC Magazine: http://www.pcmag.com/article2/0,1759,1948981,00.asp?

Microsoft (2004) Are your kids addicted to the Internet? Retrieved from Microsoft: http://www.microsoft.com/athome/security/children/kidwebaddict.mspx

Riccardi, K. (2013). Cyber Bullying: Responsibilities and Solutions. Retrieved from Digital Learning Environment: http://www.guide2digitallearning.com/teaching_learning/cyber_bullying_responsibilities_and_solutions

Robey, T. F. (2008). Cyberbullying. Retrieved from National Association of Secondary School Principals: http://www.principals.org/tabid/3788/default.aspx?topic=58057

Sheppard, M. (2012). Cyberbullying Resource Centre. Retrieved from EdgeWave: http://cyberbullying.edgewave.com/

Wong, K. (2006). How Tech Savvy Teens Defeat Parental Control Software. Retrieved from Parent Support: http://www.pcmoderator.com/pcmoderator_021.htm

Monday, 10 March 2014

Reader Response Final Draft


In the article “Globalization of Culture through the Media”, Kraidy (2002) discusses the idea of the diametrical perspectives between cultural imperialism and globalization of culture. He states that at one end, cultural imperialism is the enlargement of the prevalent communication theories of media influence controlled by the government that often assume a movement toward homogenous culture and a disregard for the importance of understanding the local culture. On the other end, globalization is conveyed as a process of exchanging information freely among individuals who can create infinite meanings from the actual cultural product. With the use of existing theories and research results, Kraidy concludes that the middle ground between cultural imperialism and globalization recognizes the critical role that global media play in the process of hybridization, in terms of intensity and speed.

I agree with Kraidy when he suggests cultural globalization as hybridization that pays attention to the local audience preferences instead of cultural imperialism that promotes homogenous culture. Kraidy assumes that the audience-recipient of media messages have the power to interpret and assign meanings to the imported media message based on their own cultural beliefs and attitudes. Thus, the media eventually have to indigenize to meet the audience’s needs and wants.

This is evident in countries such as India, a country that inculcates strong national culture, and where the government has made the media to act in accordance to the Indians' needs and wants. For instance, the main foreign satellite channels such as Star TV are forced to adopt Hindi-language programming as Hindi is the most widely spoken language in India. The Indian market was estimated to account for 55 per cent of STAR TV’s revenues in Asia at the time (Jacob, 2002 cited by Chang, 2007). Another example is the globalization of the film Spiderman 3, which illustrates how mass media successfully have adapted to the Indian’s local culture. The reason Spiderman 3 became the biggest-ever Hollywood hit in India is due to the indigenization that dubbed the Hollywood film into four main Indian languages (Press, 2007). This shows that mass media hybridized but not completely homogenized the culture.

In conclusion, globalization through media should not be deemed as a process of complete homogenization. Depending on the circumstances, the driving forces behind globalization homogenization can be weak. Hence, I believe that cultural identity is not something that can be easily changed and destroyed by the globalized media. The way imported media works is by adding and mixing the cultural elements without eliminating the uniqueness and dominating the local culture.
 
Words: 421
 
References
Chang, Y.-l. (2007). The role of the nation-state: Evolution of STAR TV in China and India. Globa Media Journal, 2.
Kraidy, M. M. (2002). Globalization of Culture Through the Media. Retrieved from http://repository.upenn.edu/cgi/viewcontent.cgi?article=1333&context=asc_papers
Press, A. (28 May, 2007). 'Spider-Man 3' biggest-ever Hollywood hit in India, sinks 'Titanic'. Retrieved from Pravda.ru: http://english.pravda.ru/news/society

Essay Draft #2

In his TED talk, Goldin (2009) mentions a few negative issues that the world is facing due to rapid globalisation. One of the main issues face in many countries is the incidents of cyberbullying being amplified by social media. Social media has brought about new levels of global interconnectedness which often result in the rise of a new global consciousness. High usage of social media by teens has allowed cyberbullying to thrive over the recent years which attracted more and more critical attention towards the role of social media bringing negative effects on the victims. It has proven to be far more damaging and difficult to control as compared to traditional form of bullying. Thus, several schools and parents have been adopting filtering or blocking software to control children from accessing social networking sites. However, I believe that it is not effective enough to solve the cyberbullying problem in the long run by solely utilizing the software. Instead, I will recommend an educational approach to solve the cyberbullying problem.

Social media has provided more avenues for abuser to conduct cyberbullying. Incidents of cyberbullying has been increasing through social media such as Facebook and Twitter which negatively impact on victims in the various aspects of their life. For instance, the "share" function in Facebook and Twitter allows people to share comments to the public. It also facilitates mass cyberbullying where many abusers can gather together and attack on a single victim through an interface. In addition, social media allows users to act on their free will; insulting and harassing others online without bearing any consequences. Thus, due to anonymity bullying, victimization is deemed continuous and inescapable. Many schools and parents have been utilizing the blocking software so as to prevent teens from accessing social networking sites. However, Pew Research Center (2010) has done an extensive national study that shows 76 percent of teens are active on social networking sites, proving that Facebook and Twitter are ideal avenues for engagement among today’s youth. Based on this result, teens may find a way to circumvent the blocking software in order to access social networking sites.

Kenneth Wong (2006) discusses that from a web article "Are your kids addicted to the Internet?", Microsoft warns parents, "Although filtering and monitoring tools are helpful, keep in mind that they can be disabled by a savvy computer user". In addition, articles in the popular press such as "Kids will find Web controls easy to beat", Anick Jesdanun of the Associated Press demonstrated how easy it was to defeat various filtering and blocking software. Although the software can be effective to younger and less IT savvy children, it may failed to achieve the same effective result for older and IT savvy teenagers. When teens are determined to break through the limits that parents have set, they will find all means to defeat the controls. This often leaves parents with a false sense of security as teens may have already deactivate the software without being noticed.

The current model of mitigating cyberbullying by blocking access to social networking sites only controls the actions of students when they are at school or at home. This control model does not prepare students when faced with a potentially dangerous environment for when they leave the safety net provided to them. It is impossible for a student to know how to navigate through without danger when the protection is no longer around. Thus, it is important to conceive that cyberbullying education is needed to develop students with the relevant skills when encountering any incident of cyberbullying. One of such skill is the ability to filter and evaluate information found in social networking sites. This can be achieved through workshops and classroom discussions conducted by the educators during school curriculum. Students will then undergone a process of reflecting, evaluating and making their own decisions regarding the sources they authenticate and information they choose to share about themselves to others. Next, the ability to withstand critique by others is also the most critical skills that students should have. A strategic approach will be more effective compared to the informed educational approach to help teens recognize and control their emotions when engaging social media.  After all, with this cyberbullying education approach, students can still interact with different people through social media if they are acquiring skills that they feel is relevant to protect themselves.

In conclusion, the increasing usage of social media among teens and sharing more content than ever before has raises the need for eliminating cyberbullying. I believe that the existing solution to combat cyberbullying by solely relying on the blocking software is not effective. It will be better to manage them through cyberbullying education approach rather than just block them completely. Although it often feel that the problem of cyberbullying will never go away, the alternative of not solving the problem is not a viable option either.

 

 
References

Centre, P. R. (2010). Cyberbullying statistics. Retrieved from Pew Research Centre: http://www.pewresearch.org/

Enough Is Enough. (2006). Youth and general internet use. Retrieved from Enough Is Enough: www.enough.org/inside.php?tag=statistics#7

Fight Crime: Invest in Kids Pennsylvania. (2006, August 17). 1 of 3 teens &1 of 6 preteens are victims of cyber bullying. [News release]. Retrieved from Fight Crime: Invest in Kids Pennsylvania: www.fightcrime.org/releases.php?id=234

Gottesman, B. (2006) A hardware solution in the software-dominated world of parental control. Retrieved from PC Magazine: http://www.pcmag.com/article2/0,1759,1948981,00.asp

Microsoft (2004) Are your kids addicted to the Internet? Retrieved from Microsoft: http://www.microsoft.com/athome/security/children/kidwebaddict.mspx

Riccardi, K. (2013). Cyber Bullying: Responsibilities and Solutions . Retrieved from Digital Learning Environment: http://www.guide2digitallearning.com/teaching_learning/cyber_bullying_responsibilities_and_solutions

Robey, T. F. (2008). Cyberbullying. Retrieved from National Association of Secondary School Principals: http://www.principals.org/tabid/3788/default.aspx?topic=58057

Sheppard, M. (2012). Cyberbullying Resource Centre. Retrieved from EdgeWave: http://cyberbullying.edgewave.com/

Wong, K. (2006). How Tech Savvy Teens Defeat Parental Control Software . Retrieved from Parent Support: http://www.pcmoderator.com/pcmoderator_021.htm

Wednesday, 5 March 2014

Essay Draft #1


In his TED talk, Goldin (2009) mentions a few negative issues that the world is facing due to rapid globalisation. Over the past decade, the ability to connect across the world through social media has led to an increase in cyber-bullying making the connection between cyber-bullying and social media an important area of study. Social media provide a context where people can communicate and share ideas or knowledge with each other regardless of the distance that separates them. High usage of social media by teens has allowed cyberbullying to thrive over the recent years which attracted more and more critical attention towards the role of social media bringing negative effects on the social, emotional and academic functioning of the victims. It has proven that cyberbullying is far more damaging and difficult to control as compared to traditional form of bullying. Several schools and parents have been adopting filtering or blocking software to control children from accessing social networking sites. However, the effectiveness of this software is doubted in the long run.

Social media provides more avenues for abuser to conduct cyberbullying. Incidents of cyberbullying has been increasing through social media such as Facebook and Twitter which negatively impact on victims in the various aspects of their life. For instance, the "share" function in Facebook and Twitter allows people to share comments to the public. It also facilitates mass cyberbullying where many abusers can gather together and attack on a single victim through an interface. In addition, social media allow users to act on their free will; insulting and harassing others online without bearing any consequences. Thus, due to anonymity bullying, victimization is deemed continuous and inescapable. Many schools and parents have been utilizing the blocking software so as to prevent teens from accessing social networking sites. However, Pew Research Center (2010) has done an extensive national study that shows 76 percent of teens are active on social networking sites, proving that Facebook and Twitter are ideal avenues for engagement among today’s youth. Thus, teens may find a way to circumvent the blocking software in order to access social networking sites. Kenneth Wong (2006) discusses that from a web article "Are your kids addicted to the Internet?", Microsoft warns parents, "Although filtering and monitoring tools are helpful, keep in mind that they can be disabled by a savvy computer user". Furthermore, articles in the popular press such as "Kids will find Web controls easy to beat", Anick Jesdanun of the Associated Press demonstrated how easy it was to defeat various filtering and blocking software. Although the software can be effective to younger and less IT savvy children, it may failed to achieve the same effective result for older and IT savvy teenagers. When teens are determined to break through the limits that parents and schools have set, they will find all means to defeat the controls.Therefore, it would be difficult to keep the software fully updated which leaves parents with a false sense of security.

The current model of mitigating cyberbullying by blocking access to social networking sites only controls the actions of students when they are at school or at home. This control model does not prepare students when faced with a potentially dangerous environment for when they leave the safety net provided to them. It is impossible for a student to know how to navigate through without danger when the protection is no longer around. Thus, it is important to conceive that cyberbullying education is needed to develop students with the relevant skills when encountering any incident of cyberbullying. One of such skill is the ability to filter and evaluate information found in social networking sites. This can be achieved through workshops and classroom discussions conducted by the educators during school curriculum. Students will then undergone a process of reflecting, evaluating and making their own decisions regarding the sources they authenticate and information they choose to share about themselves to others. Next, the ability to withstand critique by others is also the most critical skills that students should have. However, the educational approach may not able to impart such skill that involves emotional control exhibited by students when engaging social media. Although installing filtering or blocking software may help protect children from inappropriate content and reduce the risk of their children being bullied on social media, it should not replace education and supervision. Students can still interact with different people through social media if they are acquiring skills that they feel is relevant to protect themselves.

The increasing usage of social media among teens and sharing more content than ever before has raises the need for eliminating cyberbullying. The existing solution to combat cyberbullying by solely relying on the blocking software has deemed to be not effective. It will be better to manage them through cyberbullying education approach rather than just block them completely. Although it often feel that the problem of cyber-bullying will never go away, the alternative of not solving the problem is not a viable option either.

 

References

Centre, P. R. (2010). Cyberbullying statistics. Retrieved from Pew Research Centre: http://www.pewresearch.org/

Enough Is Enough. (2006). Youth and general internet use. Retrieved from Enough Is Enough: www.enough.org/inside.php?tag=statistics#7

Fight Crime: Invest in Kids Pennsylvania. (2006, August 17). 1 of 3 teens &1 of 6 preteens are victims of cyber bullying. [News release]. Retrieved from Fight Crime: Invest in Kids Pennsylvania: www.fight crime.org/releases.php?id=234

Gottesman, B. (2006) A hardware solution in the software-dominated world of parental control. Retrieved from PC Magazine: http://www.pcmag.com/article2/0,1759,1948981,00.asp?

Microsoft (2004) Are your kids addicted to the Internet? Retrieved from Microsoft: http://www.microsoft.com/athome/security/children/kidwebaddict.mspx

Riccardi, K. (2013). Cyber Bullying: Responsibilities and Solutions . Retrieved from Digital Learning Environment: http://www.guide2digitallearning.com/teaching_learning/cyber_bullying_responsibilities_and_solutions

Robey, T. F. (2008). Cyberbullying. Retrieved from National Association of Secondary School Principals: http://www.principals.org/tabid/3788/default.aspx?topic=58057

Sheppard, M. (2012). Cyberbullying Resource Centre. Retrieved from EdgeWave: http://cyberbullying.edgewave.com/

Wong, K. (2006). How Tech Savvy Teens Defeat Parental Control Software . Retrieved from Parent Support: http://www.pcmoderator.com/pcmoderator_021.htm