100% (1)
page:
6 pages/β‰ˆ1650 words
Sources:
-1
Style:
MLA
Subject:
Social Sciences
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 31.1
Topic:

Strategies for Dealing with Cyberbullying. Research Paper

Research Paper Instructions:

The research paper must be six pages minimum, eight pages maximum in length, typed, MLA (essay) format. The page count requirement includes the Works Cited section. The completed research paper must use and cite a minimum of eight separate online scholarly sources. An author and complete date (dd/mm/yyyy) must be cited for at least six of the sources. Click here to see the model essay for an example of MLA formatting.

IMPORTANT NOTE: I must have unfettered access to every source (no registration, no login).

The Bible counts as one source no matter how many times it is used in the paper. Thirty-two separate issues of the Armed Forces Journal count as one source. Citations (works cited sources) in the research paper must be current (within five years). Ask the instructor about exceptions. Since I am not located on campus, “on campus only” sources may not be used.

Avoid using sources that have already done the research for you. These sources include encyclopedias, quotation Websites, Yahoo Answers, Ask.com, About.com, Wikipedia and other Wiki sources, social publications such as People Magazine, Jet Magazine, other social and “Give-Me-an-Answer” Websites, and Weblogs (blogs). Instead, do some serious research.

Dictionaries, The Holy Bible, and other reference sources may be used only in connection with other credible sources. Do not use the dictionary as a source unless you are providing an unusual definition of a word. Assume that your audience possesses a vocabulary. Since this is not a course in law, do not use the JSL databases.

In addition to the above source guidance, do not use other research papers as a source.

At least one direct quotation (no fewer than two complete lines of text) must be provided from each source; however, do not submit essays or a research paper in which a large part is quoted material. I want your writing based on your research. Short quotations (two to four lines of text) are permissible, but only one long direct quotation (between 5 and 10 lines) are permitted in the research paper.

An in-text citation is required each time that a source is used. Guidance: If you use two of the same sources in the same paragraph, only one in-text citation for those sources is needed at the end of the paragraph.

When you review the model formal essay handout, notice that there is one short quote (from research) in the paper. Most of the writing in the paper is done by the student, not quoted from another source.

Quotations are not permitted in the first paragraph or the last paragraph of the research paper.

Similar to the essays, the research paper needs a title on Page 1 above the first paragraph, but do not include a title page or an abstract. The heading, title, and body of the research paper must be formatted in MLA style like all essay assignments. Refer to the model essay for formatting guidance. The research paper must also conform to the “English Composition Checklist.”

Subtitles are not necessary or assigned in the research paper.

The citations on the Works Cited page must include the complete URL of the Website researched. For example, if I were writing a paper on whether God created us with a desire to sin, I might develop the following citation that includes the full URL.

Notice that the complete URL is cited, not just apologeticspress.org

https://faulkner(dot)blackboard(dot)com/bbcswebdav/pid-712062-dt-content-rid-5242705_1/xid-5242705_1

Use the information in the course “How To” folder to help construct citations.

While conducting research on your topic, make notes and save (bookmark) everything. Frustration is normal when compiling research. Frustration is a bully. My advice is to look frustration in the eye.

http://www(dot)youtube(dot)com/watch?v=taLflM4Zrg8

Any image used must be set at the left or right one-inch margin.

Students who use a current version of MS Word often take advantage of using the "References" tab on Word to help build citations and to save research. If you use that feature, understand that MS Word does not format exactly like the examples that I provide; however, adjustments to conform to that format are easy.

Research Paper Sample Content Preview:
Name
Instructor
Course
Date
Strategies for Dealing with Cyberbullying
Cyberbullying is a form of harassment and bullying using electronic methods. In modern society, cyberbullying has become very common among the youths. Today people can use the internet to harass other people. Harmful bullying behaviors include threats, posting rumors, sexual remarks, and pejorative labels. Bullying can also be referred to as intent to harm. Victims who have been cyberbullied experience low self-esteem, have different emotional responses and have suicidal reactions. Some might even be depressed, angry, and frustrated. Although cyberbullying cannot be found on the scripture, some synonyms are associated with such behaviors. They include savage beasts, thieves, and assassins (Isaiah 19.11, Psalms 49: 10). In the Bible, there are biblical principles that apply to the case of cyberbullying. Christians should use these principles to deal with those people who intimidate and threaten them.
The term cyberbullying is a derivative of the bullying that traditionally meant the use of abusive words, verbal teasing, and physical aggression directed towards individuals who are not able to defend themselves. These bullying behaviors are usually committed systematically and repeatedly toward the victim. Unlike traditional bullying, cyberbullying uses electronic media with a motive of harming and causing humiliation, despair, and fear for the individual being targeted. Cyberbullies can use social media, email, cell phones, and direct messages to commit their actions. Besides, cyberbullying has a more comprehensive audience coverage compared to its traditional counterpart since it takes place in a pragmatic space and time where freedom of expression is allowed without any social restrictions. Because of this broader coverage, it has more damage to the victims. A study conducted by Hawker & Boulton indicates that 35% of youth are cyberbullied at least once in their teens (Bottino et al., 469). For any action to be classified as cyberbullying, it has to meet three conditions; it must have been intentionally committed, it has to occur repeatedly and cause psychological harm to the targeted individuals. Cyberbullying majorly harms the reputation of victims involved.
There are other outstanding characteristics of cyberbullies. Apart from intentionally commuting their actions, the cyberbullies will always try to cause distress and harm to the victims. They repeatedly act on their identified victims. Cyberbullying can be physical, verbal, and social. With the increased use of mobile phones and computers, cyberbullying has become a prevalent issue today. The Bible does not mention or define cyberbully, but it commands people to love their neighbors as they love themselves (Mark 12.31). Believers are not allowed to abuse or belittle their fellow Christians. Regardless of an individual's actions, or looks, everyone was created in the image and likeness of God (Gen 1:26). Therefore everyone deserves and is worthy of dignity. People are supposed to honor God with their words and actions. People should always examine their actions and motives and ensure they are lined up with the standards God has set for them (Psalms 139: 23).
To more effectively deal with cyberbullying, it is necessary to understand the root cause of the problem or the motive behind such actions. According to Aricak et al., most cyberbullying usually starts with relationship issues, which include jealousy, break-ups, ganging up or forceful relationships, and infatuation. The cyberbullies generally want to humiliate or ruin reputation as an act of revenge and an expression of anger. The majority of the cyberbullies are male; however, cyber victimization is common amongst both males and females (Aricak et ai 282). The results of cyber victimization, on the other hand, is more distressing to females than in males. Identifying the root cause of bullying can help the victims to remain in control of their emotions. Besides, the logical reason may help in reducing overreactions, which is a source of entertainment for the cyberbullies. Overreaction gives the kind of feedback they expect.
A person should not respond immediately. One of the main aims of cyberbullying is to annoy and confuse a person who is targeted. When a person is cyberbullied, they tend to be emotional. Thus the victims must remain calm. In case one is threatened or tagged in a photo that makes them uncomfortable, it is good not to react. One should have some emotional distance and think before responding. According to the Bible, Christians are asked to be courageous and strong. They should not be terrified or afraid because God is with them. The Bible asserts that "he will never leave you nor forsake you" (Deuteronomy 31.6). Therefore, it is advisable not to respond immediately when cyberbullied. Psychologists argue that remaining calm gives the brain more time to produce logical responses (Piesch et al. 125). Besides, the immediate response provides an emotional response, which may sometimes be irrational, leading to more confusion. In the process, the results of cyberbully become more intense.
Cases of cyberbullying should also be reported to the authorities. Today, various social media sites like Facebook, Twitter, Instagram, email want their users to feel safe online. They do not want their users to experience cyberbullying, and that is why they have numerous built-in tools to keep their customers safe. If one is tired of reporting and blocking cyberbullies within the social media platforms, it is vital...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!