Thursday, February 27, 2020

Onsite Bullying Vs. Cyberbullying Research Paper

Onsite Bullying Vs. Cyberbullying - Research Paper Example In this regard, process involving such violent or unethical acts that cause harm or embarrassment to other person is referred as bullying (Macfarlane & McPherson, pp.10-15). It has been an observation that gender, religion, social background, physical appearance, and culture are some of the common aspects that become the reason of bullying for strong individuals resulting in usage of verbal and non-verbal pressures by such individuals. Bullying is not a very simple phenomenon, as it exists in different types and forms that make it easier to handle and prevent. Some of the most common types and forms of bullying are physical bullying, verbal bullying, on-site bullying, and cyber-bullying. For instance, any bullying that results in a physical injury or harm is considered as physical bullying, whereas, any act of bullying that involves passing of verbal comments that cause embarrassment and/or harassment comes under verbal bullying. This form usually involves comments related to physica l appearances, color, creed, or race of a person, as well as socio-economic status of the individuals. Although bullying occurs in almost all the social settings where individuals interact with one another, however, schools are the most common places where bullying occurs in all its forms, and thus, students are the easiest preys that become the targets for bullies in the schools while other students witness the incidents as bystanders (McGraw, pp. 9-12). Particularly, this paper will include discussion on two types of bullying that are on-site bullying and cyber bullying. Discussion Analysis of studies has identified bullying as a very devastating issue that affects thousands of students every year globally. For instance, in the year 2009, bullying affected approximately six hundred thousand students in different parts of the world, and â€Å"American schools alone have approximately 2.1 million bullies and 2.7 million students, who are their victims† (Rooney, pp. 171). Acco rding to Mattern (pg. 165), 56% of students in schools admit that they have observed someone bullying an individual in their schools. Moreover, studies have indicated that bullying has become so common that in every eight minutes, a child suffers from the acts of bullying at elementary level that results in adverse effects on his/her life (Lines, pp. 19-20). Unfortunately, these statistics include only those children and/or students that report the acts of bullying to their parents, siblings, or school management, and educators believe that a large number is still missing due to non-reporting of bullying in schools (McGraw, pp. 39-43). All these statistics include all forms of bullying; however, on-site bullying dominates in these reports. Particularly, â€Å"on-site bullying usually happens in classrooms, hallways, playground, bathrooms, and school buses. The bullies start with verbal harassment such as teasing before they get physical with their target, and peer abuse is another term given to bullying when it occurs in school† (Sanders & Phye, pp. 159-161). On the other hand, the other form is cyber-bullying, which has become very common after expansion and introduction of internet at every home, and especially after involvement of children in social networking websites, such as Facebook that allows anyone

Tuesday, February 11, 2020

Identity Theft Research Paper Example | Topics and Well Written Essays - 1750 words

Identity Theft - Research Paper Example As it is, people whose identity are compromised and have been assumed by another can suffer tremendous loses. Once the important information of a certain person is exposed to unscrupulous persons, such information can be used against that person. If the financial information of a certain person is compromised and the identity theft gain access to the person’s bank accounts, credit cards and others, the theft may be able to easily steal the money of that person (Abagnale, 2007). Aside from taking money from their victims, some identity thieves may use the signature or the accounts of their victim to commit crimes either online or offline (Cullen, 2007). A good example of this is when an identity theft uses the signature of another person to perpetuate fraudulent transactions either online or offline. By use the identity of the victim, the identity thief may be able to get away with the crime and his or her victim gets into trouble with the authorities. II. How Identity Theft Ca n be Committed Over the years, techno savvy thieves have developed a number of ways to steal important information by breaking into the information security system of companies and individuals. ... tity thief’s operation depends on the kind of strategies and mechanisms that he or she employs to get the necessary information to usurp the identity of another. In recent years, social engineering have become one of the most potent tools used by identity thieves to gain access to buildings, databases and computer systems across the country (Hadnagy, 2010). In this era of social networking when millions of people meet online to make friends or transact business, social engineering becomes one of the easiest methods of defrauding unsuspecting internet users. How does an identity theft make use of social networks to defraud his or her victims? Social engineering employs human psychology so instead of using software and programs to attack the database or the security system of a certain company or individual, the identity theft target the people who have access to the database or the security system (Hadnagy, 2010). The common strategy here is to study the work patterns of the ta rget individual or group of individuals and find strategies to trick these people into divulging passwords and access codes to their system. Social networking sites are often used by these people to befriend their targets and learn whatever they can from these people through trickery and guile. In a sense, social engineering is like stalking a prey and punching when the prey is at its most vulnerable moment. As it is, this method of retrieving information from human sources is a long process so it may take days, weeks or even months before the identity thief actually gets the information that he or she needs. Given this situation most of those people who employ this strategy to gain access to database may need to invest a lot of time on their targets (Hadnagy, 2010; Wilhelm, 2010). Note that