StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Pledge to Action against Cyber-bullying - Essay Example

Cite this document
Summary
This paper 'Pledge to Action against Cyber-bullying' tells that The internet has provided us with various advantages, cantered mainly on making both our academic and social life more comfortable. Indeed, there are a lot of things we have to be thankful about with the coming of the Internet…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Pledge to Action against Cyber-bullying
Read Text Preview

Extract of sample "Pledge to Action against Cyber-bullying"

?Pledge to Action against Cyber-bullying The internet has provided us with various advantages, centered mainly on making both our academic and sociallife more comfortable. Indeed, there are a lot of things we have to be thankful about with the coming of the Internet. Imagine, say, passing a ten-pager paper on the effects of social media on the academic performance of young teens without having given enough time for research. While going to the library is the classical, and not to mention, the ‘academic’ way of doing it, the case is surely different when we are given only an hour to work on it. Internet has truly made our school life easier. Aside from this, the Internet also keeps us close with our peers, including the long-lost ones. Through instant messaging and social media, conversations are truly easy with just a click of a mouse. It, thus, draws us closer to our loved ones, and connects us to those whom we share our interests with. Along with the good sides of the Internet are its downsides as well. With the increasing popularity of Facebook and Youtube, people sometimes make use of the strong reach of such websites to spread bad rumors about other people. This, we all know, is cyber-bullying. As pointed out by Erick Fisher in his article entitled Blah Blah Blah Blog, cyber-bullying is a phenomenon that children and adolescents seem to be increasingly using to harm others. In addition to this, Childnet International claimed in its article entitled Safe to Learn: Embedding Anti-bullying Work in School that cyber-bullying is a common feature in the lives of many young people. This is also reinforced in the online research of Robert Bamford on Cyber-bullying which stated that the significant and substantial changes in youth society are a result of new information and communication technologies. Therefore, the ease of creating and communicating in cyber space has led to changing patterns of participation. In this light, we have become active shapers of the nature of cyber world due to our capacity to develop and refine cyber communication devices. Unfortunately, it has turned out to be a bad thing. As teens, we surely want to protect our identity, be it in the real or in the cyber world. Thus, there is a need for us to come together and put an end to cyber-bullying, or at least lessen the incidences related to this negative online phenomenon. While the oldies may point at promiscuity and decadent morals of teens as the primary culprits behind cyber-bullying, we can surely prove to them that we can make an act against cyber-bullying, an act that is not only substantial, but also cool. Appeal to the Youth: Act against Cyber-bullying We believe that we are shapers the shapers of tomorrow. The future lies in our hands. With the immensity of the opportunities that lie ahead of us, it is crucial for us to ensure that we always uphold human values which will protect the dignity of human person. We always need to side with the good. Therefore, as we recognize the convergence of the media—which creates a more convenient venue for inter-personal communication, we need to remain stable in our values. Although we believe that the ultimate key to solving cyber-bullying is through the education of our will to always respect other people, we think that we can further concretize our actions by drafting specific measures that are relevant to us youth today. With this, let us all join hands in tightening our campaign against cyber-bullying. Let us act now! Project PTAC: Pledge to Action against Cyber-bullying According to two great advertising gurus David Ogilvy and Leo Burnett, a great idea is useless unless there is solid execution. Thus, to ensure that our vision is turned into a reality, we would need to get the help of each one. Execution I: PTAC Website As what most people say, ‘keep your friends close, and your enemies closer’. Obviously, if we want to help lessen cases of cyber-bullying, we have to attack it not only in the right manner, but more importantly in the right venue. Thus, the first step is to create a website where teens like us can regularly visit. The goal of this website is to spread awareness on cyber-bullying. But, of course, as teens we would not want to see that usual here’s-what-you-can-do-to-help kind of website. Forget about the seriousness of Unicef, or the highly text-heavy look of the World Health Organization website. We want to make our website cool and unique, but still keeping within its goal of information dissemination. This is the reason why we are having this site, which can be seen in the next page. The PTAC website shall capitalize on the PLEDGE WALL. Running across the entire webpage, shared thoughts on how cyber-bullying can be ended can be freely posted by the site viewers. Pledges are a way of shouting out to the cyber world how dead serious we are in ending cyber-bullying. Aside from the PLEDGE WALL, the following tabs are also present in the site: firstly, the chat page where viewers can exchange personal experiences on cyber-bullying and get feedbacks from each one. The goal of this page is to provide support to probable victims of cyber-bullying and get perspectives from other viewers. Secondly, there is also a tab that provides links to certain websites that render professional support on the matter. Execution II: Photo Pledge Since we aim for awareness, we have to make sure that our campaign gets heard. And how do we do that? By creating some ‘fad’. We all know the power of social media, and on how it can turn ordinary things into world-renowned topics. 9gag, for one, is continuing to gain popularity because of its unique comicality. As for PTAC, we realize the importance of getting noticed in social media like Facebook. That is why we would broadcast to the whole Facebook crowd our commitment to end cyber-bullying through a Photo Pledge. Here’s the peg: This will be furnished in the PTAC site. Once we have made our individual pledges, a new box will appear which will generate our Photo Pledge. What we do is upload our personal photo and allow the program to put our testimonial alongside it. And there, we now have our personalized PTAC photo which we can post in Facebook, Twitter, or in whatever online account we have. Execution III: “Tag-able Wall Photos” Harnessing again the power of social media, another option we have is a wall photo that spells out our pledge. Similar to the Photo Pledge, the Tag-able Wall Photo is generated once we have typed in our individual pledge. We can also post this in our personal blogs, in whatever form they may be. The goal of the wall photo is to tag more people and lead them to the PTAC website. Here is the peg. Execution IV: Print-ready Leaflets Aside from all these cyber-focused initiatives, we also recognize the significance of real-time information campaign. With this, we will have print-ready leaflets available in the website. Of course, we may ask, for what? Say I print these leaflets and give them to my friends in high school, what do I get in return? As such, we think that it is important to present some tangible benefits of driving this campaign. Included as a standard operating procedure in the downloading these print-ready leaflets, the viewer must indicate the number of copies he or she will create. Tangible rewards such as PTAC wrist bands, shirts, and flash disks await the viewers who are able to print 100, 200, and 300 copies of the leaflets respectively. Now that is cool! Execution V: PTAC Cyber-bullying survey In line with PTAC’s goal of extending professional help to victims of cyber-bullying, we believe that we can help dig insights on the reasons why cyber-bullying occurs among the teens through an in-depth survey. Through this, a study can be made which can add scholastic value to the program: Age? Gender? __ M ___ F 1. How often do you engage in the following online activities? Everyday Twice/ Thrice a Week Once a week Once a month Never a. Communicating through Social Networking Sites b. Communicating through Yahoo Messenger c. Communicating through E-mail . d. Playing Computer Games while chatting e. Researching and doing in homework through search engine 2. How often have you encountered the following? A lot of times Few times Sometimes Never a. I have received mean or nasty messages from someone I don't know. b. Someone has pretended to be me and sent and posted material that damaged my reputation. c. I have been put down by somebody online by who sent or posted a cruel gossip, rumors or other hurtful material about me. d. Someone has shared my personal secrets and private photos/videos without my permission. 3. How did you respond when you encountered the following? Check the form of negative communication that you encountered, then mark your corresponding feeling. Indifferent Slightly Irritated Irritated Angry ___I have received mean or nasty messages from someone I don't know. ___Someone has pretended to be me and sent and posted material that damaged my reputation. ___I have been put down by somebody online by who sent or posted a cruel gossip, rumors or other hurtful material about me. ___Someone has shared my personal secrets and private photos/videos without my permission. 4. Based on your opinion, rank the following forms of negative communication according to their harmful impacts, 1 having the highest negative impact; 3 having the lowest. ____ Sending nasty messages using my account. ____ Receiving verbally abusive message. ____ Seeing my private pictures/videos/secrets posted on the Internet without my permission Execution VI: Official PTAC Group We believe that the strength of this campaign lies strongly on its commitment to solve a widespread problem among teens today. Therefore, we think that more people should get involved in this awareness campaign. To manage the viewing public, it is also necessary to create an official PTAC group. With this group, viewers can become official members that give them the privilege of enjoying an exclusive list PTAC benefits. In line with the aim of ending cyber-bullying, certain programs for the group are to be planned which involve an outreach activity which seeks to uplift teen consciousness on cyber-bullying by visiting various schools in the country. Also, through online voting, official PTAC committee members are to be elected in order to concretize monthly plans for the organization. This does not only include meeting with similar organizations, but also cool parties and events meant to keep the message both meaningful and interesting. Looking into the future, PTAC is confident that it will grow into a well-respected group formed by the youth for the youth. Since we do not deny the fact that the school has plays a crucial role in ensuring the attainment of our specific objectives, we also wish to help them in their own anti-cyber-bullying programs in their respective schools by having this interview guide for victims of cyber bullying: Interview Questions: 1. Have you experienced being disrespected online? 2. Where and when did that happen, if you can still remember? 3. What were you doing online before the incident happened? 4. What was the disrespectful message delivered? 5. What medium was used to deliver such disrespectful message? (through ym, social networking site etc.) 6. Were there added elements in the message (like an upsetting icon, or a slang word)? 7. If there were such, how do you think did it contribute to the impact of the message, or did it have any impact at all? 8. Was the message directed only to you, or was it done publicly (meaning a lot of people were able to know it)? 9. If it was directed only to you, how did you react upon seeing the message? 10. If it was done publicly, what was you initial reaction? Did you consult help from other people? 11. If you were to rate your feelings regarding the incident from 1 to 10, 10 having the highest emotional burden, what would your rate be? 12. Do you think the feelings you had would change if it was delivered in a different medium (like through social networking sites instead of ym)? Why or why not? 13. Is there a difference in the impact of an actual encounter to that of online as regards receiving disrespectful messages? Why or why not? 14. In your opinion, if we are to base from the impact that it created, can negative form of communication be regarded as a crime? 15. Under what conditions can you say it can be a crime? References National Crime Prevention Council. Cyber-bullying. NCPC Online, 2009. Web. 16 Nov 2011. Fisher, Erik. Blah Blah Blog. Storknet, 2009. Web. 16 Nov 2011. Childnet International. Safe to Learn: Embedding Anti-bullying work in Schools. Digizen, 2009. Web. 16 Nov 2011. Bamford, Robert. Cyber-bullying. Coc.edu, 2010. Web 16 Nov 2011. Hinduja, Sameer. State Cyber-bullying Laws. Cyber-bullying Research Center. 2011. Web 16 Nov 2011. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Pledge to Action against Cyber-bullying Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved de https://studentshare.org/information-technology/1392725-see-the-attachment
(Pledge to Action Against Cyber-Bullying Essay Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/information-technology/1392725-see-the-attachment.
“Pledge to Action Against Cyber-Bullying Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1392725-see-the-attachment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Pledge to Action against Cyber-bullying

Friends on the Other End

The research tries to determine whether or not the woman did the cyber-bullying should be prosecuted or imprisoned.... Objectives; Main objective - to determine whether or not the woman who did cyber-bullying should be prosecuted Other objectives; To identify reasons as to why the principal offenders should be prosecuted and imprisoned for their ‘crimes' To indentify the influence of the offenders on the girl's death To identify the laws and policies available and responsible for regulating use of internet and social media, governing the users' privacy....
9 Pages (2250 words) Essay

Policy Analysis Project

edophilia Pedophilia is one of the most heinous crimes against children.... Since the conception of the computer after the World War II, new digital technology has provided fundamental changes in our conceptions and behavior.... In fact, most of our professional and spare time activity implies the use of digital technology on which new uses have cropped up, e....
17 Pages (4250 words) Essay

Commercial Property - Capital Roofing Company

In consideration of a premium of $10,000 payable in full before the stated inception date, ABC Insurance Company (hereafter referred to as the insurer) agrees to insure Capital Roofing Company (hereafter referred to as the insured against all risks of direct physical loss or… Policy Conditions- The requirements with which the insured must comply.... The insured's failure to do so could result in the insurers' COMMERCIAL PROPERTY POLICY DD1234 General ment of Coverage In consideration of a premium of $10,000 payable in full before the stated inception date, ABC Insurance Company (hereafter referred to as the insurer) agrees to insure Capital Roofing Company (hereafter referred to as the insured against all risks of direct physical loss or damage to their property of every description at the premises described below subject to the exclusions and policy conditions detailed below....
4 Pages (1000 words) Essay

The Positive Benefits and Negative Drawbacks of the Dawn of the Facebook and Twitter Era

This paper "The Positive Benefits and Negative Drawbacks of the Dawn of the Facebook and Twitter Era" considers many of the positive and negative attributes that the introduction and widespread use of social networking sites similar to Facebook and Twitter have had on society as a whole.... nbsp; … This analysis is far too short to be considered an exhaustive study of all positive and negative attributes, it can still be seen as an appropriate tool to engage the reader and begin the discussion with relation to how this ever-present increasingly relevant forms of social media impact on our daily lives....
10 Pages (2500 words) Assignment

The Progress of the Department of Homeland Security

Other than that, a number of governmental, commercial, and private organizations provide warning signals, updates, and databases to the officials of homeland security to strengthen the action-taking efforts.... The author explains how the DHS has changed from its inception in 2001 to what it has become today, describes how the relationships between the DHS and other law enforcement and intelligence agencies have transformed over the years, and analyzes the current structure of the DHS....
9 Pages (2250 words) Assignment

Analysis of the Friend Game Article by Collin

The fraudsters are reportedly known for their convincing ability on social media as friends, business partners or pretend to be… The fraudsters are close friends and unknown people who befriend their targets over the social media.... In search of friends but with hidden agenda and disguised in fake In the Collin's article ‘Friend Game', we identify the abuse of internet services by teenagers who commit suicidal behavior leading to the death of one teenager by the name Megan Meier....
6 Pages (1500 words) Essay

The Cyber Threats in Saint Louis County

The paper "The Cyber Threats in Saint Louis County" discusses that the development of information technology has been driving the world towards becoming more digitalization.... The digitalization of the world has led towards the emergence of the new and potential threat of cyber-war.... hellip; Computer Fraud and Abuse Act (CFAA) must be systematically reviewed by the county officials and accordingly, new provisions must be framed....
9 Pages (2250 words) Case Study

Public Policy of Homelessness Issue

olicies refer to the programs that are action-oriented that are normally promoted and implemented by public authorities.... econdly, there is the concept of regulation that identifies and describes the process that collective action will be promoted, coordinated, and guided in a bid to ensure goals are in line with the expectations.... hellip; In conclusion, the pledge by the Seattle mayor, Schell, to eradicate homelessness in the city was a noble cause....
7 Pages (1750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us