Download file to see previous pages...
depends on reciprocal expectations concerning what the other agents will do in a situation where a decision whether or not to conform is at stake” (3).
“Gimalda and Sacconi’s model in particular sees compliance as the consequence both of agents’ participation in choosing the norm in a social contract setting under a veil of ignorance and of the existence of expectations about reciprocal willingness to conform” (5).
“Proposed the “sense of justice” as a solution for the stability problem of a well-ordered society-i.e. a society whose institutions are arranged according to the principles of justice chosen under a veil of ignorance” (8).
Statements: Sources two, four and seven work to prove the opposite argument that it is an uncanny proposition to regularly observe and impose restriction on the internet and mobile use of teenagers to control issues like cyber-bullying and sexting. The claims by Bristow and Paton will argue that restrictions on the internet use of children are offering an unrealistic preparation to face the society in which they will have to function independently. The claim will be that as children are encouraged to be self-dependent in the real world, restricting the same opportunity in the cyber-world is a bizarre idea with no visible benefits.
However, using sources, I will prove how the activities of children remain under constant observation in the real society though they perceive themselves to be free and how social conformity and family influence the way they behave. The briefing by the American Psychological Association will show that people under the age of 20 do not have a brain that is mature enough to take wise decisions. The work by Cialdini and Goldstein will show how the society influences the behavior of adolescents, and Mahalihali’s work is used to describe how the influence of family members, especially parents, decides a child’s
...Download file to see next pagesRead More
Cyber bullying is mostly common activity among teenagers who strengthens this practice within social groups in schools and colleges. There are many types of cyber bullying like student making fun of another classmate or school fellow by making a webpage links and then spreading it so that he or she can be embarrassed in front of the whole school or college.
It has become a virtually indispensable tool in education, entertainment, government, and business world (Willard, 2007). While it has become critical in the daily lives of adults, the internet has also become a major part of the children’s lives. Children use the internet for education purposes, online communication and social networking.
About half of all teenagers report they have experienced cyber-bullying to some extent driving some to contemplate suicide. It is a concerning issue for young persons and their parents who may not know how to effectively address this new phenomenon if they are aware it occurring to their child at all.
Moreover, both children at the age of eight and teenagers up to the age of eighteen spend more than seven hours or half of their day with electronic devices (Tamar, 1). This has shown an increase in the number of hours spend by the same young Americans five years ago, in fact this number excludes time spent in texting and conversations over their mobile phone.
However, at the same time they have introduced a wide variety of threats and crimes. In this scenario, cyberbullying is one of the latest emerging crimes that are performed with the support of digital media. Basically, cyberbullying is the latest form of digital media or electronic (by means of computers and mobile phones) harassment or blackmailing that is repeated eventually and entails a power inequality.
According to studies, cyber crimes have the potential of harming a nation’s security system and its financial well-being if these criminal levels escalate. In many cases, these cyber crimes include copyright infringement, underage pornography, government cracking, and child grooming.