Cyber Bullying Essay Outline Examples
ESL 408 SAMPLE RESEARCH PAPER OUTLINE An example of a possible outline could look something like this: I. Introduction A. Hook – share several examples from my articles on traditional bullying 1.Use Farber para 2 on beating up a kid with classes 2.Use Negato para 10 on kid from Japan being picked on for his accent B. Background on bullying in general including definition, leading to focus on cyber bullying for research paper. C. Thesis statement: While the tradition of bullying has a long history, cyberbullying and its effects are relatively new and the solutions and ways for teachers and parents to handle it are difficult to find. Some solutions, such as changing the laws to reflect the technology and teaching kids how to ignore and block the bullies, will be explored for feasibility. II. Define Cyber Bullying A. Denigration -- the first major kind of cyberbullying is denigration, which is about humiliating the victim by making them look and feel bad. 1.
Show MoreLegal definition
Cyberbullying is defined in legal glossaries as
• actions that use information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm another or others.
• use of communication technologies for the intention of harming another person
• use of internet service and mobile technologies such as web pages and discussion groups as well as instant messaging or SMStext messaging with the intention of harming another person.
Examples of what constitutes cyberbullying include communications that seek to intimidate, control, manipulate, put down, falsely discredit, or humiliate the recipient. The actions are deliberate, repeated, and hostile…show more content…
Cyberstalking often features linked patterns of online and offline behavior. There are consequences of law in offline stalking and online stalking, and cyber-stalkers can be put in jail. Cyberstalking is a form of cyberbullying.
Comparison to Traditional Bullying
Certain characteristics inherent in online technologies increase the likelihood that they will be exploited for deviant purposes. Unlike physical bullying, electronic bullies can remain virtually anonymous using temporary email accounts, pseudonyms in chat rooms, instant messaging programs, cell-phone text messaging, and other Internet venues to mask their identity; this perhaps frees them from normative and social constraints on their behavior.
Additionally, electronic forums often lack supervision. While chat hosts regularly observe the dialog in some chat rooms in an effort to police conversations and evict offensive individuals, personal messages sent between users (such as electronic mail or text messages) are viewable only by the sender and the recipient, thereby outside the regulatory reach of such authorities. In addition, when teenagers know more about computers and cellular phones than their parents or guardians, they are therefore able to operate the technologies without concern that a parent