Cyberbullying Presentation Prior to beginning work on this interactive assignment,

  Cyberbullying Presentation

Prior to beginning work on this interactive assignment, please read all of the required resources for this week. Review the instructions below and research a minimum of five additional peer-reviewed and/or scholarly sources in the UAGC Library that were published within the last 10 years to help support your statements.

For this week’s interactive assignment, you will be creating a 5-7 minute video speech presentation related to the topic of cyberbullying. (You may use any video capture software of your choice. A Screencast-O-Matic quick-start guideLinks to an external site. including the ability to capture your webcam is provided for your convenience.) For your video presentation, prepare talking points that respond to each of the following topics.

  • Explain at least one of the basic legal rights of individuals who are impacted by cyberbullying.
  • Discuss one technique individuals, parents, or businesses can use to protect themselves or their children from cyberbullying.
  • Evaluate at least one ethical issue that parents, schools, or workplaces must consider when implementing a new technique to protect their children, students, and/or staff from cyber bullies.

Once you have created your talking points, be sure to practice your presentation to ensure that it will meet the time requirements. (This is meant to mirror the more informal presentations that occur in on-ground masters programs. No official PowerPoint or other type of presentation should be created. The ability to speak candidly to these points is what will be evaluated.) Please review the Best Practices for Video Creation document prior recording your video.

Once you have created your video, copy and paste the URL into your initial post. In a separate document, prepare a reference list for your sources in APA format as outlined by the UAGC Writing CenterLinks to an external site., and attach the document to your initial post prior to submission.

 

Required Resources

Articles

Barlett, C. P. (2015). Anonymously hurting others online: The effect of anonymity on cyberbullying frequencyLinks to an external site.. Psychology of Popular Media Culture, 4(2), 70-79.

  • The full-text version of this article can be accessed through the PsycARTICLES database in the UAGC Library. This article describes a study that examined whether anonymity was related to the frequency of cyberbullying and the severity of its impact.

Bauman, S. (2013). Cyberbullying: What does research tell us?Links to an external site. Theory Into Practice, 52(4), 249-256. http://dx.doi.org/ 10.1080/00405841.2013.829727

  • The full-text version of this article can be accessed through the Business Source Elite database in the UAGC Library. This article reviews some of the research on cyberbullying, with a particular focus on gender, age, risk factors, and outcomes.

Coburn, P. I., Connolly, D. A., & Roesch, R. (2015). Cyberbullying: Is federal criminal legislation the solution? Links to an external site. Canadian Journal of Crimonology & Criminal Justice, 57(4), 566-579. http://dx.doi.org/10.3138/cjccj.2014.E43

  • The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article explores whether increased federal criminal legislation would have a positive impact in the overall reduction of cyberbullying incidents.

Davison, C. B. & Stein, C. H. (2014). The dangers of cyberbullyingLinks to an external site.. North American Journal of Psychology, 16(3), 595-606.

  • The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article discusses the research literature on cyberbullying.  The author also makes recommendations to help individuals identify and protect against cyberbullying.

Korenis, P. & Billick, S. B. (2014). Forensic Implications: Adolescent Sexting and CyberbullyingLinks to an external site.. Psychiatric Quarterly, 85(1), 97-101. http://dx.doi.org/10.1007/s11126-013-9277-z

  • The full-text version of this article can be accessed through the PsycINFO database in the UAGC Library. This paper reviews the literature on the forensic implications of sexting and cyberbullying, particularly in adolescence.

Washington, E. T. (2015). An overview of cyberbullying in higher educationLinks to an external site.. Adult Learning, 26(1), 21-27. http://dx.doi.org/10.1177/1045159514558412

  • The full-text version of this article can be accessed through the Corporate ResourceNet database in the UAGC Library. This article provides an overview of cyberbullying among adults in higher education, as well as an examination of current laws designed to help prevent cyberbullying.

Recommended Resources

Website

MSCJ Professional SourcesLinks to an external site.. (http://ashford-mscj.weebly.com/)

  • This resource site will provide assistance in researching additional sources for the assessments within this course.

Supplemental Material

University of Arizona Global Campus. (n.d.). Screencast-O-Matic quick-start guideLinks to an external site. [PDF]. [email protected] https://student.uagc.edu

  • This guide will aid you in the use of Screencast-O-Matic.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

patient file

Your final project for this course will be a patient record analysis. You will apply the knowledge of anatomy, physiology, and pharmacology that you have developed during this course in a thorough review of existing patient information in the Final Project Patient File. Specifically, you will review a patient’s history

610 6-1 Discussion: Improve, Part Two—Mitigating Unwanted Consequences

 The Essential Workplace Conflict Handbook. Including the IMPROVE Supplementary Document. Next, in your initial post, address the following: • In what ways do you perceive the Improve phase as being informed by the other phases of DMAIC that you have worked with in the course thus far? • How can

Code of conduct

 For this assignment, Write a paper about employee codes of conduct using information from your textbook and at least two other scholarly sources. First, research employee codes of ethics, especially for the medical field. Next, find some examples of employee codes of ethics from medical facilities and choose the one

Human Growth and Development

Scenario: Simon Whitaker is 42 years old and has suffered from mental illness since his late teens. He lives in a flat in a large housing estate. He lost his job as a warehouse cleaner after he was admitted to hospital the last time he became ill, two years ago.

Exporting Security

Write a 2 page argumentative essay on the links provided below. Link 1: https://www.airuniversity.af.edu/SSQ/Book-Reviews/Article/1292320/exporting-security-international-engagement-security-cooperation-and-the-changi/ Link 2:https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1049&context=nwc-review Link 3: https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1049&context=nwc-review #Exporting #Security

Organizational culture and values

 Details: Prepare a 10-minute presentation (10-15 slides, not including title or reference slide) on organizational culture and values. Describe how alignment between the values of an organization and the values of the nurse impact nurse engagement and patient outcomes. Discuss how an individual can use effective communication techniques to overcome

Document Analysis

Document Analysis (5% – c. 500 words) Primary sources are writings that were produced by individuals or groups at the time of the historical events or issues that they deal with. A number of such documents have been placed on Blackboard, organized by course unit. This assignment requires you to

M3D1: Big Data

The discussion will examine the social interaction of participants regarding an issue or situation and its impact on research data. This discussion addresses the following module outcomes: •MO1: Become familiar with the process of conducting marketing research methods and research tools •MO2: Review the process marketers use for identifying and

Case Study 1 and 2 Pneumonia and Addison diseases

Review the case study and answer all questions with a scholarly response using APA and include 2 scholarly references. Answer both case studies on the same document and upload 1 document to Moodle. Case Studies will be uploaded to Moodle and put through TURN-It-In (anti-Plagiarism program) Turn it in Score

Should schools ban unhealthy snack machines?

 Your outline should include: An explanation of the controversial issue, why is it controversial? Identify which position or side you will take in your paper, and explain why. If you don’t agree with the position you are taking discuss how this could affect your argument on the topic. If you

The Outcome of Inequality of Wealth and Income

Research Topic: Submit an idea for a research study based on a business/economic problem. • Write the title of the study. • Explain your overarching aim for the study. • What is the problem? • What is the significance of it? • Draft at least two research questions. Due 1/27

“practice of professional engineering”

1. “practice of professional engineering” means any act of planning, designing, composing, evaluating, advising, reporting, directing or supervising that requires the application of engineering principles and concerns the safeguarding of life, health, property, economic interests, the public welfare or the environment, or the managing of any such act; (“exercice de

Curriculum Development and Evaluation

 Learning Materials: Keating, S. B. (2011). Curriculum development and evaluation in nursing (2nd ed.). New York: Springer. (Chapter 13) Books are on website Vital Source user name is sred9196@yahoo.com, the password is Bungalow9@ • Exercise #1: Address an educational need among nursing staff at a health care agency. In the

Epidemiology and Surveillance

Research the public health agency in Chicago, IL and develop a presentation on its structure, response capabilities, surveillance tools, and role in emergency management. In your response, include a description of the community served by the department (Chicago), its emergency response structure, surveillance systems that are used at hospitals, biohazard

General Psychology Application

 General Psychology Application Essay Over the course of the class, we have discussed a number of different psychological concepts and theories. For your paper you will be asked to connect a real life experience or observation with a concept or theory from lecture and/or your textbook. Your assignment should include

Issues and Trends in Curriculum Development

 Learning Materials: • Iwasiw, C., Goldenberg, D., & Andrusyszyn, M. (2009). Curriculum development in nursing education (2nd ed.). Boston: Jones & Bartlett. (Chapters 13 and 14) • Keating, S. B. (2011). Curriculum development and evaluation in nursing (2nd ed.). New York: Springer. (Chapters 16 and 17) PowerPoint • Chapter 13

Foundation of Nursing Module 2.1 ( Discussion)

Module 2.1 – Discussion Nursing Theories and Theorists Instructions: After reading the assigned chapters, please post two discussion questions based on the readings along with your answers to the following questions: Did any of the theories or theorist influence your own personal theory of nursing; and consequently, your own view