Cyber Bullying and Cyber Stalking

User Generated

Xvena234

Writing

Description

Some of the questions to consider are:

1. What is the business problem/issue formulated by the author?

2. Is it clearly defined?

3. Could the problem have been approached more effectively or from another perspective?

4. Has the author also evaluated the literature relevant to this problem/issue?

5. Does the author agree or disagree with the relevant literature?

6. How does the article contribute to your understanding of the problem or topic?

Literature Review Expectations:

1. At least 10 peer-reviewed articles are to be included in the literature review.

2. It should be organized by theme or subject of the article.

3. A minimum of one paragraph is required per article is required.

4. The review must be synthesized, and the articles analyzed for content as it relates to the content of the case study above.

5. Free of grammatical errors.

6. No

Unformatted Attachment Preview

Case Study: Lab – Cyberstalking or Cyberbullying and Laws to Protect Individuals Please ensure at least 2 real-world examples are discussed and integrated in the literature review. In this lab you will conduct a review of the literature on this topic and complete a literature review on this topic. There are many sites that can assist in the formatting and content of a literature review. Here is an example: http://guides.lib.ua.edu/c.php?g=39963&p=253698 Some of the questions to consider are: 1. What is the business problem/issue formulated by the author? 2. Is it clearly defined? 3. Could the problem have been approached more effectively or from another perspective? 4. Has the author also evaluated the literature relevant to this problem/issue? 5. Does the author agree or disagree with the relevant literature? 6. How does the article contribute to your understanding of the problem or topic? Literature Review Expectations: 1. At least 10 peer-reviewed articles are to be included in the literature review. 2. It should be organized by theme or subject of the article. 3. A minimum of one paragraph is required per article is required. 4. The review must be synthesized, and the articles analyzed for content as it relates to the content of the case study above. 5. Free of grammatical errors. 6. No evidence of plagiarism. 7. Since this is Information Technology related the articles cannot be greater than 5-years old unless it considered a seminal article. 8. The literature review must be run through the plagiarism detector and no more than 25% of the articles should be used by another student. If there is a greater than 25% match in the paper it will receive a point deduction of 50%. If greater than 50% is a match the submission will receive a 0 without an option for resubmission. If there is a match in articles the synthetization and analyzation of the material MUST be original for content. Written Requirements Be sure to use appropriate APA format and cite your Reading or other sources that you used in your literature review. The literature review should contain enough information to adequately answer the business problem provided in the case study and contain no spelling, grammar, or APA errors. Points deducted from grade for each writing, spelling, or grammar error are at your instructor’s discretion. Also review the university policy on plagiarism. If you have any questions, please contact your professor. Directions for Submitting Your Lab Place your literature review in the drobox for the Unit 3 Lab.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: CYBERBULLYING AND CYBERSTALKING

CYBERBULLYING AND CYBERSTALKING
Name:
Institution affiliation:
Date:

1

CYBERBULLYING AND CYBERSTALKING

2

CYBERBULLYING AND CYBERSTALKING
According to Chandrashekhar, Muktha and Anjana (2016), cyberbullying is defined as
“activity that uses information and communication technologies to support deliberate,
continuous, and aggressive conduct by an individual or a group of people, that is intended to
harm someone, physically or emotionally;” while cyberstalking is defined as “the convergence of
stalking and cyberspace wherein over a period of time the stalker gains access and control to a
victim.” Cyberbullying and cyberstalking are legal crimes that can lead to prison terms for the
perpetrators whose length depends on the gravity of the crime.
Chandrashekhar, Muktha and Anjana (2016) examined the nature and extent of
cyberbullying and cyberstalking and some of the ways that it can be prevented. They clearly
described the types of cyberbullying that exist, the hurtful implications on the victims and
explored some ways of controlling the online abuse. The article has been well expressed from the
angle the authors chose. The authors may not have explored any literature about the issue, but
their thoughts are elucidated. The article provides great insights into what drives online bullies
and stalkers and helps one get a better idea of the root cause of the problem.
Kircaburun, Jonason & Griffiths (2018) examined the mediation role cyberbullying and
cyberstalking plays in individuals who engage in the dark tetrad traits of Machiavellianism,
psychopathy, narcissism, and sadism. They clearly defined the relationship between online
bullying and stalking and dark tetrad traits. From the perspective that...


Anonymous
Really helped me to better understand my coursework. Super recommended.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags