Sign In
Not register? Register Now!
You are here: HomeEssayCommunications & Media
Pages:
3 pages/≈825 words
Sources:
3 Sources
Level:
MLA
Subject:
Communications & Media
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 11.88
Topic:

Research Paper on Cyber Bullying and Internet Protection System (Essay Sample)

Instructions:

basically the paper is talking on the various forms of cyber bullying among kids and teens.

source..
Content:

Name:
Professor:
Course:
Date:
Research paper on Cyber bullying and internet protection system
Cyberbullying refers to a situation where a kid or teen is harassed, threatened, humiliated, tormented and embarrassed or targeted by fellow child or teen using mobile phones, the internet, social and digital technologies (Tokunaga, 281).Increased use of computers characterizes the modern-day where the internet has become available to everyone in the whole world. Though the internet has brought about many advantages in the day to activities of various people, organizations, and states in the world, it also has increased problem-related to cyber bullying and security. Cyber security can be referred to the effort of people to protect personal information and digital machines from internet attacks. Therefore, actions should be put in place to safeguard children from malicious software and individuals on the internet; it is important to come up with cyber security systems so as to curb cyber bullying (Patchin, Justin, and Sameer, 152). Hence, this paper is going to highlight and discuss some forms of cyberbullying and whether there should be a cyber protection system that can help to reduce this growing internet attacks..
The most prevalent form of cyber bullying is through mail and text messages. In this situation, culprits send threatening, harassing, and tormenting messages to children and teenagers. On receiving such messages, the children feel insecure which may make them skip school as they fear to face consequences. In this case, a security system should be developed by the Internet service providers to ensure that such messages are detected to prevent them from reaching kids. The security system is a significant milestone since this has been considered the easiest way to send threatening and tormenting messages to children. This can be the most efficient way to curb rampant cyberbullying since innocent children and teens become psychologically disturbed when they receive such texts.
Another form of cyber bullying is through the use of social networks such as Facebook, Twitter, Instagram. Here kids get bullied when there is the spread of negative messages; picture or video publicly displayed for everyone on the site. Usually, this incidence humiliates and embarrasses individuals, and they develop poor self-esteem as they feel so ashamed and betrayed (Patchin, Justin, and Sameer, 152). Also, in this sites, kids can be able to access nude pictures and videos and evil influence that may lead them to engagement in dangerous early sex, alcohol, and drugs. This can highly affect the academic performance of the school going kids and teenagers as they may be devoting a lot of time on the internet (Tokunaga, 282). Therefore, it is important for the social network service providers to develop mechanisms that will ensure that individuals who are under the age of eighteen years do not pass rumors, abusive and fun videos via their network. The cyber security measure can be possible by setting a simpler forum for kids and set up security requirement like a national identity card for those who intend to join such network.
Most importantly, cyber security starts with an individual understanding the various forms of cyber attacks that they are likely to face. After having sufficient knowledge about this, it is the responsibility of one to put simple security measures like passwords and privacy. There are diverse forms of threats, and this may be regarded to be of different levels and risks to individuals and more specifically to personal information of kids and their high-tech machines like computers, laptops, and mobile phones. Therefore, when there is a higher likelihood of an attack, it is important to come up with a more sophisticated security system that can minimize internet threats (Keith, Susan, and Michelle, 226).
Internet protection system should deal with threats ranging from malicious codes that are well-known as spyware, malware, and computer viruses. Computer viruses have the ability to delete the complete operating system of a person’s computer. Also, these viruses pose a risk as hackers can be able to get access to all personal data kept the infected computers for personal benefit.Therefore, it is important for people to avoid intrusions into their technological systems at all cost by use of cyber security systems. Cyber protection can be achieved when one acquires an antivirus software that ensures frequents checks so as to ...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

Need a Custom Essay Written?
First time 15% Discount!