Psychology assignment 2180

  f you have ever been harassed by frequent phone calls, visits, or being followed by someone, especially if you have asked this person not to do this, then you know the fear that this behavior can cause. What if this person sends constant emails to you or posts frequent messages about you on social media? What is the difference, between online and offline victimization, if any? In this week’s Discussion, you examine specific types of offline victimization with similar acts of victimization that occur online. You then research and find articles that focus on how this type of victimization might impact a selected age group. To Prepare for this Discussion: Review this week’s Learning Resources related to different types of victimization. Consider and select one of the following pairs of victimizations: Cyberstalking vs. Conventional Stalking Online Harassment vs. Off-line Harassment Cyberbullying vs. Face-to-Face Bullying Select one of the following age groups: children, adolescents, adults, or older adults. Search the Internet and the Walden library for at least 2 articles regarding the potential negative impacts each of your selected victimizations has on your selected age group. By Day 4 Post a summary of the article(s) you found in your research. Compare the online versus off-line victimization from the pair you selected by responding to the following questions: What is the difference in prevalence between the two? What difference is there in terms of effects on the victim in each? Are there different long-term implications for the victim between the two forms of victimization? What are those implications? readings for this week’s assignment:  Dake, J. A., Price, J. H., Maziarz, L., & Ward, B. (2012). Prevalence and correlates of sexting behavior in adolescents. American Journal of Sexuality Education, 7(1), 1–15. DOI: 10.1080/15546128.2012.650959 Note: You will access this article from the Walden Library databases. DreĂźing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014). Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior & Social Networking, 17(2), 61–67. DOI: 10.1089/cyber.2012.0231 Note: You will access this article from the Walden Library databases. Jarvis, L & Macdonald, S. (2015). What Is Cyberterrorism? Findings From a Survey of Researchers. Terrorism and Political Violence, 27(4), 657–678. DOI: 10.1080/09546553.2013.847827 Note: You will access this article from the Walden Library databases. Modecki, K. L., Barber, B. L., & Vernon, L. (2013). Erratum to: Mapping developmental precursors of cyber-aggression: Trajectories of risk predict perpetration and victimization. Journal of Youth and Adolescence, 42(9), 1493. DOI: 10.1007/s10964-013-9938-0 Note: You will access this article from the Walden Library databases. Modecki, K. L., Barber, B. L., & Vernon, L. (2013). Mapping developmental precursors of cyber-aggression: Trajectories of risk predict perpetration and victimization. Journal of Youth and Adolescence, 42(5), 651–661. DOI: 10.1007/s10964-012-9887-z Note: You will access this article from the Walden Library databases. Pabian, S., & Vandebosch, H. (2014). Using the theory of planned behaviour to understand cyberbullying: The importance of beliefs for developing interventions. European Journal of Developmental Psychology, 11(4), 463–477. DOI: 10.1080/17405629.2013.858626 Note: You will access this article from the Walden Library databases. Rice, E., Petering, R., Rhoades, H., Winetrobe, H., Goldbach, J., Plant, A., & … Kordic, T. (2015). Cyberbullying Perpetration and Victimization Among Middle-School Students. American Journal of Public Health, 105(3), pe66–e72. DOI: 10.2105/AJPH.2014.302393 Note: You will access this article from the Walden Library databases. Wegge, D., Vandebosch, H., & Eggermont, S. (2014). Who bullies whom online: A social network analysis of cyberbullying in a school context. Communications: The European Journal of Communication Research, 39(4), 415–433. Yang, S., Stewart, R., Kim, J., Kim, S., Shin, I., Dewey, M. E., & … Yoon, J. (2013). Differences in predictors of traditional and cyber-bullying: A 2-year longitudinal study in Korean school children. European Child & Adolescent Psychiatry, 22(5), 309–318. DOI: 10.1007/s00787-012-0374-6 Note: You will access this article from the Walden Library databases. Microsoft (Author). (2016). PowerPoint 2013 Videos and Tutorials. Retrieved from https://support.office.com/en-us/article/PowerPoint-2013-videos-and-tutorials-bd93efc0-3582-49d1-b952-3871cde07d8a?ui=en-US&rs=en-US&ad=US Document: Final Project Overview (Word document) Required Media Lewinsky, M. (2015). The price of shame. TED. Retrieved from http://www.ted.com/talks/monica_lewinsky_the_price_of_shame Note: This media program is approximately 22 minutes.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"