Wk 7 | Psychology homework help

 

f you have ever been harassed by frequent phone calls, visits, or being followed by someone, especially if you have asked this person not to do this, then you know the fear that this behavior can cause. What if this person sends constant emails to you or posts frequent messages about you on social media? What is the difference, between online and offline victimization, if any?

In this week’s Discussion, you examine specific types of offline victimization with similar acts of victimization that occur online. You then research and find articles that focus on how this type of victimization might impact a selected age group.

To Prepare for this Discussion:

  • Review this week’s Learning Resources related to different types of victimization.
  • Consider and select one of the following pairs of victimizations:
    • Cyberstalking vs. Conventional Stalking
    • Online Harassment vs. Off-line Harassment
    • Cyberbullying vs. Face-to-Face Bullying
  • Select one of the following age groups: children, adolescents, adults, or older adults.
  • Search the Internet and the Walden library for at least 2 articles regarding the potential negative impacts each of your selected victimizations has on your selected age group.

By Day 4

Post a summary of the article(s) you found in your research. Compare the online versus off-line victimization from the pair you selected by responding to the following questions:

  • What is the difference in prevalence between the two?
  • What difference is there in terms of effects on the victim in each?
  • Are there different long-term implications for the victim between the two forms of victimization? What are those implications?
  • readings for this week’s assignment: 

Dake, J. A., Price, J. H., Maziarz, L., & Ward, B. (2012). Prevalence and correlates of sexting behavior in adolescents. American Journal of Sexuality Education, 7(1), 1–15. DOI: 10.1080/15546128.2012.650959
Note: You will access this article from the Walden Library databases.

Dreßing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014). Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior & Social Networking, 17(2), 61–67. DOI: 10.1089/cyber.2012.0231
Note: You will access this article from the Walden Library databases.

Jarvis, L & Macdonald, S. (2015). What Is Cyberterrorism? Findings From a Survey of Researchers. Terrorism and Political Violence, 27(4), 657–678. DOI: 10.1080/09546553.2013.847827
Note: You will access this article from the Walden Library databases.

Modecki, K. L., Barber, B. L., & Vernon, L. (2013). Erratum to: Mapping developmental precursors of cyber-aggression: Trajectories of risk predict perpetration and victimization. Journal of Youth and Adolescence, 42(9), 1493. DOI: 10.1007/s10964-013-9938-0
Note: You will access this article from the Walden Library databases.

Modecki, K. L., Barber, B. L., & Vernon, L. (2013). Mapping developmental precursors of cyber-aggression: Trajectories of risk predict perpetration and victimization. Journal of Youth and Adolescence, 42(5), 651–661. DOI: 10.1007/s10964-012-9887-z
Note: You will access this article from the Walden Library databases.

Pabian, S., & Vandebosch, H. (2014). Using the theory of planned behaviour to understand cyberbullying: The importance of beliefs for developing interventions. European Journal of Developmental Psychology, 11(4), 463–477. DOI: 10.1080/17405629.2013.858626
Note: You will access this article from the Walden Library databases.

Rice, E., Petering, R., Rhoades, H., Winetrobe, H., Goldbach, J., Plant, A., & … Kordic, T. (2015). Cyberbullying Perpetration and Victimization Among Middle-School Students. American Journal of Public Health, 105(3), pe66–e72. DOI: 10.2105/AJPH.2014.302393
Note: You will access this article from the Walden Library databases.

Wegge, D., Vandebosch, H., & Eggermont, S. (2014). Who bullies whom online: A social network analysis of cyberbullying in a school context. Communications: The European Journal of Communication Research, 39(4), 415–433.

Yang, S., Stewart, R., Kim, J., Kim, S., Shin, I., Dewey, M. E., & … Yoon, J. (2013). Differences in predictors of traditional and cyber-bullying: A 2-year longitudinal study in Korean school children. European Child & Adolescent Psychiatry, 22(5), 309–318. DOI: 10.1007/s00787-012-0374-6
Note: You will access this article from the Walden Library databases.

Microsoft (Author). (2016). PowerPoint 2013 Videos and Tutorials. Retrieved from https://support.office.com/en-us/article/PowerPoint-2013-videos-and-tutorials-bd93efc0-3582-49d1-b952-3871cde07d8a?ui=en-US&rs=en-US&ad=US

Document: Final Project Overview (Word document)

Required Media

Lewinsky, M. (2015). The price of shame. TED. Retrieved from http://www.ted.com/talks/monica_lewinsky_the_price_of_shame

Note: This media program is approximately 22 minutes.







Calculate Your Essay Price
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 10% with the coupon code: best10