Solved by verified expert:The Research Argument Assignment is an expansion of your Position Essay (the first essay). In the Position Essay, you collected and presented your own thoughts and opinions on an issue (with some light research where appropriate). Here, you are expected to take your initial argument and reasoning and further develop those ideas through—you guessed it—research. This process involves familiarizing yourself with the works of experts (on the page, in cyberspace, and/or in the flesh through personal interviews) to build upon what you already know. It also involves being open to having your position shift as you encounter new information.Regardless whether your position remains the same (the broader topic should remain the same), the idea is to use relevant information—facts and/or opinions—from these expert sources to support your own argument. The research should provide academic context and credibility to the insightsgenerated from your own experience, observation, and/or logic. It’s not amatter of what published experts say—it’s how effectively you use what the experts have to say to advance your own purposes. Ultimately, you must use a minimum of 5-6 sources to help produce an extended argumentbetween 2500 and 3000 words.I already have a rough draft in the works and it has been looked over. I need this assignment to be a follow on to that paper using some of the sources I have already provided.
Unformatted Attachment Preview
Running Header: Position Essay
Cyberbullying: Punishment for the Hidden Attacker
University of the Incarnate Word
Nearly 43% of kids have been bullied online. One in four has been bullied more than
once. Bullying victims are two to nine times more likely to consider committing suicide. About
75% of students admit they have visited a website bashing another student (11 Facts, n.d.). These
numbers should be alarming to us. Parents, school districts, and even our government need to
take action to stop and prevent cyberbullying. How many more children do we have to lose to
suicide before preventative measures are taken? Our government and schools should take
preventative measures to stop cyber bullying. The most common places where cyber bullying
occurs are: Social Media, such as (Facebook, Instagram, Snap chat, )and Twitter, SMS (Short
Message Service) also known as Text Message sent through devices, Instant Message (via
devices, email provider services, apps, and social media messaging features)and through email
One way our government prevent cyberbullying is establishing legislation on social media and
these different attacks on our youth. “If you’re going to do it, just do it,” those were the last
words heard by Gabriella Green before she took her own life. Gabby was just 12 years old.
Gabby was a young girl whom on January 10, 2018 took her own life because of cyberbullying.
Rumors were spread about Gabby having sexually transmitted diseases, she endured vulgar
name-calling and threats to expose personal and sensitive details of her life (Lynch, 2018). The
untimely death of Gabby could have been prevented. Someone could have intervened. The
school district had been made aware of the attacks made on Gabby over social media. Not only
should the students and teachers who bullied her be prosecuted. Most parents send their children
to school expecting them to be protected while not under the supervision, not left behind. Most
of cyberbullying is done on a social networking platform (i.e. Facebook, Instagram, Snapchat,
etc.). Many of these platforms are monitored or could be monitored if legislation was put in
Reporting cyber bullying is not enough anymore. The old school ways of notice, talk, document,
report, and support are not enough to stop these acts. We need to make it illegal for such acts to
take place. Our government must establish clear rules for use on computers. Cyberbullying
should be clearly defined by schools and a no-tolerance policy needs to be instated, advertised,
and enforced. Too many computer users get away with cyberbullying. It’s easy to sit behind a
computer and attack innocent people when these cyber bullies know there is no consequence to
Bullying has become such a pervasive issue in recent years that there are initiatives and
laws at multiple levels of government to prevent it. There are no federal laws that specifically
address bullying. Cyber stalking is a notable exception to this rule. Though there are no federal
laws regarding cyber stalking specifically, it is a criminal action under other anti-stalking and
harassment laws. Bullying may overlap with discrimination, harassment, or hate crimes if it is
based on race, national origin, color, sex, age, disability, or religion. If that overlap occurs,
federally-funded schools at all levels must address and resolve the harassment. The U.S.
Department of Justice’s Community Relation Service offers resources to help communities
resolve conflicts, prevent violence, and respond to hate crimes and discrimination. It is a free,
confidential service that offers everything from counseling to technical assistance. If harassment
persists, victims should consider filing a formal complaint with both the U.S. Department of
Education and the U.S. Department of Justice.
All fifty states have anti-bullying laws in place. Most states, though not all, also have
laws meant to prevent cyber bullying. Some states also have policies in place to help guide
schools and their districts respond to bullying. Familiarize yourself with the laws and policies in
your state. You can find more information at the Cyber bullying Research
Center or stopbullying.gov .There may also be local laws in place at the regional, county, or city
level. If nothing else, most school districts or school codes of conduct contain anti-bullying
language or rules. Be sure to research the various policies and laws at the local level in your area.
Computers should have a monitoring system that scrubs for keywords in order to find
where the cyberbullying has/is taking place. Just by utilizing five minutes of my own time I was
able to find ten different types of software that can be added to computers in order to track
cyberbullying. From there, the computer should be locked, the account shut down, and the user
punished for their actions. How harsh should the punishment be? That is up to the school
districts and the government to decide. If the government could implement a legislation requiring
all computers to have cyberbullying anti-software, then the schools can decide on the
punishment. If a student is to commit the cyberbullying then they should be suspended, expelled,
and possible even legal action if their attack led to a death of the victim. The point is, if you can
prevent it, then we can stop it all together. No child should have to endure online bullying that
causes them to take their own life.However, maybe it isn’t enough to just go after the online
bully. We should also start pointing the finger at big online social media outlets like Facebook
and Twitter. These creators know exactly what is going on. They even have a “report” function.
We should be holding them accountable as well for giving cyberbullies these kinds of platforms.
A monitoring system is going to come with backlash from the general public. Many
people like their privacy and that is understandable. However, the protection of our sons,
daughters, brothers, and sisters is more important than what we are looking at on the internet.
The software could be regulated and would only cue in on keywords; words and phrases such as
“go die”, “kill yourself”, etc. Not all computer usage would be used against someone, just the
usage that constitutes cyberbullying.
Even before they are old enough to use the internet, initiate conversations about internet
safety. Be sure to keep this an open dialogue with your teen. You will likely need to have new
discussions as their online activities change and new safety concerns arise.
Some important topics to discuss before your teen goes online include: Privacy: Teach your
young adult about the importance of maintaining privacy online. Make sure they know to never
share personal information, such as physical addresses and phone numbers, with strangers
online. Ensure they know to never share any of the passwords to their accounts, even with their
close friends. Strangers: Let them know that the same rules apply to strangers online as they do
in-person. Make sure they know they should be careful about, or avoid altogether, talking to
strangers online. Tell them that you don’t always know what someone’s intentions are, and some
people may try to befriend you in order to hurt you. Permanence: Remind your teen that once
something is put online, it cannot ever be truly deleted — even if the post is removed. Let them
know that they cannot anticipate or control who may eventually see that content, so they must
think very carefully before sharing things online.
Set clear guidelines about how you expect your young adult to behave on the internet. Let them
know that you expect them to behave as ethically online as you would expect in-person.
Consider having your teen sign a Youth Pledge and signing a Parent Pledge yourself.
Remind them that there may be consequences if they violate the pledge and ask them to help
hold you accountable as well. Encourage them to ask you questions if anything is unclear when
they are online.
Cyberbullying is a leading cause in death among adolescent teens (11 Facts, n.d.). Our
country needs legislation put in place that would allow for our computer usage to be monitored
for certain verbiage that would constitute cyberbullying. From there, our school districts should
have the power to punish the perpetrator as they deem necessary depending on the
circumstances. However, progress has been made over time. According to stopbullying.gov in
December 2010, the U.S. Department of Education developed a framework of common
components found in state laws, policies, and regulations focused on bullying at the time. The
framework was used to describe how schools were taking action to prevent and respond to
bullying incidents. The common components found in state laws, policies, and regulations –
which have evolved over time – include definitions of bullying, defining characteristics that are
commonly targeted for bullying behaviors, and detailed requirements for school district policies
(Laws, Policies, n.d.). It’s important for anti-bullying campaigns and websites like these to exist
to spread the word about cyberbullying. Let us speak for those who can no longer speak for
Gower, A. L., McMorris, B. J., & Eisenberg, M. E. (2015). School-level contextual predictors of
bullying and harassment experiences among adolescents. Social Science & Medicine,
Bellmore, A., Calvin, A. J., Xu, J. M., & Zhu, X. (2015). The five W’s of “bullying” on Twitter:
Who, What, Why, Where, and When. Computers in Human Behavior, 44, 305-314.
(2015). The five W’s of “bullying” on Twitter: Who, What, Why, Where, and When.
Computers in Human Behavior, 44, 305-314.
Mitchell, K. J., & Jones, L. M. (2015). Cyberbullying and bullying must be studied within a
broader peer victimization framework. Journal of Adolescent Health, 56(5), 473-474
Barboza, G. E. (2015). The association between school exclusion, delinquency and subtypes of
cyber-and F2F-victimizations: Identifying and predicting risk profiles and subtypes using
latent class analysis. Child abuse & neglect, 39, 109-122.
Dianne L. Hoff, Sidney N. Mitchell, (2009) “Cyberbullying: causes, effects, and remedies”,
Journal of Educational Administration, Vol. 47 Issue: 5, pp.652-665,
Purchase answer to see full
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more