According to Bullystatistics.org (n.d.), “about half of young people have experienced some form of cyber bullying.” This number may seem incredible, but what makes this possible? Why is this type of victimization so prevalent?In this Discussion, you explore potential characteristics of those who become victims of cyber bullying. You also examine how an individual’s level of cognitive development might make them more or less prone to cyber victimization.To Prepare for this Discussion:Select one form of cyber victimizationReview this week’s Learning Resources and consider the possible characteristics of a potential target of that cyber victimizationAlso, consider the level of cognitive development of a potential target of the selected form of cyber victimization.Search the Internet and the Walden library for two scholarly article(s) related to the characteristics and cognitive development of potential cyber victims.By Day 4Post an analysis of the characteristics of the potential cyber victims or vulnerable population, including the population’s age range and level of cognitive development relative to the form of cyber victimization you selected. Explain how society might be responsible for protecting the potential victim. Suggest a strategy to educate and empower individuals against online predators to mitigate their risk. Include at least one scholarly source. Use proper APA format and citations.Readings for this week, please in use articles as reference for answer.Davis, V. (2012). Interconnected but underprotected? Parents’ methods and motivations for information seeking on digital safety issues. Cyberpsychology, Behavior, and Social Networking, 15(12), 669–674. DOI: 10.1089/cyber.2012.0179Note: You will access this article from the Walden Library databases.Moreno, M. A., Egan, K. G., Bare, K., Young, H. N., & Cox, E. D. (2013). Internet safety education for youth: stakeholder perspectives. BMC Public Health, 13(1), 1–6. DOI: 10.1186/1471-2458-13-543Note: You will access this article from the Walden Library databases.Rose, I., & Waite, L. (2012). Editorial and commentary: Mediating disability in the digital era: Disability, technology and equality. Journal of Research in Special Educational Needs, 12(4), 189–191. DOI: 10.111/j.1471-3802-2012-01259.xNote: You will access this article from the Walden Library databases.Goodman, N. (2015). This is what happened when we posted Monica Lewinsky’s TED Talk. Ideas.Ted.Com. Retrieved from J., Kupczynski, L., & Mundy, M. (2015). The Impact of Training on Faculty and Student Perceptions of Cyberbullying in an Urban South Central Texas Middle School. Research in Higher Education Journal, 27. Retrieved from S. (2013). Online risk, harm and vulnerability: Reflections on the evidence base for child Internet safety policy. Zer: Revista De Estudios De Comunicacion, 18(35), 13–28.Note: You will access this article from the Walden Library databases.Livingstone, S., Mascheroni, G., Dreier, M., Chaudron, S. and Lagae, K. (2015). How parents of young children manage digital devices at home: The role of income, education and parental style. London: EU Kids Online, LSE. Retrieved from Kids Online. (n.d.). Findings, methods, recommendations. Retrieved from
“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”
The post wk 10 appeared first on nursing writers.