Cyber Bullying and Information Technology Revised With Speaker Notes

Description

This assignment is a combination of text, visuals, and speaker notes. It includes a power point presentation with approximately 4-5 presentation slides with 2-3 pages of speaker notes. The speaker notes are to be submitted in a separate word document. The plan will be recommendations to improve my issue identified in the previous assignment: Cyberbullying and Technology. I have attached the specific guidelines and rubric, as well as the previous assignments for this class.

IDS 403 Milestone Three Guidelines and Rubric
Overview: For this milestone, due in Module Five, you will submit a draft of the Plan section of your presentation. In this section, you will create the visual facet
of your final project presentation. Keep in mind that in Module Six you will be submitting Milestone Four, which is the oral narration component, and your voice
will be the primary carrier of your message and that visuals play a supporting role. You want your voice and visuals to work together and not compete for
attention, so you should minimize the number of words on each slide and maximize the use of visual elements like photographs, illustrations, and graphs. You
will submit this milestone as two documents: a presentation draft in PowerPoint that will include visuals and a Word document with your speaker notes.
Milestone Three provides you with an opportunity to obtain valuable feedback from your instructor that you can incorporate into your final project submission.
Prompt: In this milestone, you will start assembling your multimedia presentation. Create a multimedia presentation draft using visuals* to articulate your plan
to address the issue you described in Milestone Two. Specifically, the following critical elements must be addressed:
III.
Plan: For this part of the project, you will offer recommendations, a plan to improve your chosen issue, and strategies for implementing your plan.
A. Make recommendations for how the current issue could be addressed in order to minimize its impact on the target population.
B. Explain how current technology could be used to address the chosen issue.
i. Is there new or updated technology that could be used to address an issue associated with older or outdated technology?
ii. Could the technology associated with the chosen issue be used in different ways to address the issue?
C. Imagine you are in charge of addressing your chosen issue. What challenges would you face when implementing your plan? How would you
address those challenges? Support your answer with relevant research or diverse perspectives.
D. Explain the strengths of your plan and why it is likely it would be successful. Be sure to support your justification with relevant research.
PowerPoint: You are required to include a combination of text, visuals, and speaker notes in order to support your PowerPoint presentation. Use the Check File
Compatibility With Earlier Versions and Are You Having Video or Audio Playback Issues? resources to help you check compatibility between versions of Office.
Also, follow the instructions on the Microsoft Support page to compress your presentation as a zipped file. Upload the zipped file when submitting Milestone
Three. Reducing the size of the presentation file by compressing it will make it easier for your instructor to download and grade your presentation.
*Note: The final presentation requires the use of both visuals and audio. In Module Four, you practiced adding audio to a PowerPoint slide to prepare for
Milestone Four’s oral narration of your presentation.
Rubric
Guidelines for Submission: Final Project Milestone Three should be approximately 4 to 5 presentation slides in length with 2 to 3 pages of speaker notes. The
speaker notes should be submitted in a separate Word document with 12-point Times New Roman font, double spacing, and one-inch margins. You are required
to include a combination of text and visuals in order to support your work. Cite your supporting sources in APA or MLA format. If you require alternative
accommodations for completing this assignment, reach out to your instructor directly for more information.
Note that the grading rubric for this milestone submission is not identical to that of the final project. The Final Project Rubric will include an additional
“Exemplary” category that provides guidance as to how you can go above and beyond “Proficient” in your final submission.
Critical Elements
Plan:
Recommendations
Plan: Current
Technology
Proficient (100%)
Makes recommendations for how the current
issue could be addressed in order to
minimize its impact on the target population
Explains how current technology could be
used to address the chosen issue
Plan: Challenges
Explains what challenges will be faced when
implementing the plan and uses relevant
research or diverse perspectives
Plan: Strengths
Explains the strengths of the plan and why it
is likely to be successful and uses relevant
research
Articulation of
Response
Submission has no major errors related to
citations, grammar, spelling, syntax, or
organization
Needs Improvement (85%)
Makes recommendations for how the current
issue could be addressed in order to
minimize its impact on the target population,
but recommendations made are cursory
Explains how current technology could be
used to address the chosen issue, but
explanation is cursory
Explains what challenges will be faced when
implementing the plan and uses research or
diverse perspectives, but explanation is
cursory or use of research or diverse
perspectives is inappropriate
Explains the strengths of the plan and why it
is likely to be successful, and uses research,
but explanation is cursory or use of research
is inappropriate
Submission has major errors related to
citations, grammar, spelling, syntax, or
organization that negatively impact
readability and articulation of main ideas
Not Evident (0%)
Does not make recommendations for how
the current issue could be addressed in order
to minimize its impact on the target
population
Does not explain how current technology
could be used to address the chosen issue
Value
25
25
Does not explain what challenges will be
faced when implementing the plan
20
Does not explain the strengths of the plan
and why it is likely to be successful
20
Submission has critical errors related to
citations, grammar, spelling, syntax, or
organization that prevent understanding of
ideas
Total
10
100%
Introduction.
-Harassment that takes place in platforms like face book,
Twitter, whatsapp etc.
Origin of Cyber Bullying
 Emanated from the introduction of computers and the




whole notion of information Technology.
Introduction of computers has brought both positive and
negative impact.
Cyber bullying is one of the negative effect of computers
and Information Technology parse
Anonymity encourages cyber bullying and harassment.
Smart phones also contributed to online harassment. and
other digital devices have ( O’Keeffe & ClarkePearson,2011).
Target population of Cyber Bullying
 Mainly targets young adult and teenagers, where older
teenagers are more likely harassed compared to the
young ones.
 Most of them are likely to commit suicide due to the
harassment.
 Mature adult can also fall victim of the harassment.
Statistics of Cyber Bullying
 9-34% of young people have been target of cyber bullying.
 Teen victims are very upset and afraid.
 The young victims ranges from 10-12 years of age.
 Average age of cyber bullying is 15 years. (Whittaker &
Kowalski, 2015).
Cyber bullying Prevention
 Talk- let young people open up and share their
tribulation/Problems.
 Monitor internet/online activities of youngsters
 Block your teens phone to control their conversation
and prevent them from accessing dangerous sites
( O’Keeffe & Clarke-Pearson,2011).
Cont. Cyber Bullying Prevention
 Engage parents/ Youth-come out with innovative
policies in school.
 Engage teachers, parents and students in a way to
identify and stop cyber bulling.
 Volunteer in the community- This will help prevent
cyber bullying in that people will scared.
 Restore self respect- ensure young teenagers are
engaged and know their rights. (Whittaker &
Kowalski, 2015).
Relationship of cyber bullying to information
technology
 Cyber bullying can be blamed on the growth of
information technology, basically the connection of
computers to the internet where the
perpetrators/victim could be anywhere in the world.
 Young people are the most affected where their self
esteem and academic performance is adversely
affected (Mesch, 2016).
References
 Whittaker, E., & Kowalski, R. M. (2015). Cyberbullying
via social media. Journal of School Violence, 14(1), 1129.
 O’Keeffe, G. S., & Clarke-Pearson, K. (2011). The
impact of social media on children, adolescents, and
families. Pediatrics, 127(4), 800-804.
 Mesch, G. S. (2016). Parental mediation, online
activities, and cyberbullying. CyberPsychology &
Behavior, 12(4), 387-393.
DIGITAL IDENTITY ANALYSIS
•Olawunmi
Odusanya
IDS- 403 Dr. Duval
March 30, 2019
➢I
subscribe to social network sites like Facebook and LinkedIn
➢I
use passwords and profile picture for identification purposes
➢All
➢I
my social media accounts are connected to my Gmail account
INTRODUCTION
use the facebook account for the general portrayal of my social side
➢LinkedIn
➢Use
is meant for more professional communications
of email and general contact information is shared with
individuals online

THE DIFFERENCE OF DIGITAL IDENTITY
FROM MY REAL-WORLD ?
There are opportunities to connect with people
on the web
 The Internet makes it possible for people to
fake their identities
 Unlike the real world, blunders in social
networks can be detrimental to one’s life
 In real life interaction, there are cordial
relationships which are basically interpersonal
and face to face(Carty & Barron ,2019)

THE SIMILARITY OF DIGITAL IDENTITY FROM MY
REAL-WORLD
My real life habits are aligned with my digital
habits
 The interactions I engage in social platforms
like Facebook and linked are a real reflection of
the ‘real me’
 In a nutshell, digital platforms like internet
accessibility go a long way in making my life
easier

OWN EXPERIENCE
HOW TECHNOLOGY ENABLES ME TO FULLY EXPRESS A
SPECIFIC DIMENSION OF MY IDENTITY?
Use of cell phones and other gadgets to record
information of whatever is happening and
sharing the information with others online
 Sending important messages to friends online
 Connecting home electronics like TV and cell
phone to be in a position to share
information(McNeal & Schmeida,2019)

Technology and
My Identity
HOW MY DIGITAL IDENTITY AFFECT THE SENSE
OF WHO IAM AS A PERSON?
Caution especially when sharing vital
information in social networks.
 Ensuring vital information like social security
numbers and credit card information is
accessed on a secure encrypted environment
 Ensure whatever information and/or pictures I
post online can stand the test of time(Carty &
Barron, 2019)

THE BEHAVIORS ASSOCIATED WITH MY DIGITAL
IDENTITY.
Messaging and constant texting on social
media networks
 Watching movies on Netflix and YouTube
 Accessing news on channels like CNN and
MSNBC

HOW TECHNOLOGY GOVERN, INFLUENCE, OR
SHAPE MY IDENTITY?
By utilization of social network like facebook, I
could build a profile and boost my image
 I am also in a position to interact with other
professionals all over the world over the
internet
 I can also market products online and shop
online sites like Amazon and eBay(McNeal &
Schmeida,2019)

HOW MY BEHAVIOR IS DIFFERENT WHEN I
KNOW IT IS PUBLIC?
In public, I will exercise caution as opposed to
social network platforms where I can freely
express my opinions.
 The language one uses in general public will be
unique and different as opposed to a relaxed
social network chat
 Even when writing an article for a public entity the
register will be more official (McNeal & Schmeida,
2019)

References

Carty, V., & Barron, F. G. R. (2019). Social Movements and New
Technology: The Dynamics of Cyber Activism in the Digital Age.
In The Palgrave Handbook of Social Movements, Revolution,
and Social Transformation (pp. 373-397). Palgrave Macmillan,
Cham.
McNeal, R. S., & Schmeida, M. (2019). Digital Paranoia:
Unfriendly Social Media Climate Affecting Social Networking
Activities. In Censorship, Surveillance, and Privacy: Concepts,
Methodologies, Tools, and Applications (pp. 1968-1985). IGI
Global.

Purchase answer to see full
attachment

We offer the bestcustom writing paper services. We have done this question before, we can also do it for you.

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.