Cyber Violence: Structures and Effectiveness

Recently, social media has become a platform for cyber violence. This issue primarily concerns public health and is associated with adverse mental or physical outcomes. As a result, cyberbullying is one of the top contemporary problems that needs to be approached from different angles to be resolved entirely. The purpose of this paper is to review several articles concerning cyber violence and draw a conclusion about their structures and effectiveness.

The first article is named Cyber violencitsat do we know and where do we go from here? and written by J. Peterson and J. Densley. The report is published in a journal called Aggression and Violent Behaviour in May 2017. The primary method the authors use is the selection and analysis of the already extant materials and sources related to the topic. It denotes that the authors resorted to the second type of research, which represents utilizing the existing articles and library sources to provide evidence-based theory. The material is well structured and has all the organizational components (introduction, main body, and conclusion). The authors introduce the acuteness of cyber violence to the reader, represent individual, group, and environmental explanations of the phenomenon, and investigate different approaches towards the issue (Peterson & Densley, 2017). Therefore, to my mind, this article is wisely structured, and all the elements are interrelated. I find it appealing due to the authors’ ability to apply theoretical material to ground their standpoint.

The second article is named Adolescent cyberbullying: A review of characteristics, prevention, and intervention strategies. It was posted in the journal Aggression and Violent Behavior in 2015 by R. Ang. The methods used in the text include firm reliance on secondary scientific research. The article has a logical organization of paragraphs, and it is easy to navigate throughout the whole paper. The author investigates adolescent cyber violence and thinks of it in terms of adults’ tendency to be involved in high-risk behaviors (Ang, 2015). While explaining the point of view, the author uses different variables associated with cyberbullying and parent-adult behavior to establish the relation between them. In the climax part of the article, the author suggests the strategies for better protection of adolescents online. I found this article quite convincing due to the strong scientific base, the author’s ability to analyze the dependence between the variables, and present the guidelines for the issue which were presented in an understandable manner.

The third article is entitled Cyberbullying prevention and intervention efforts: current knowledge and future direction and was issued in the Canadian Journal of Psychiatry in 2016 by D. Espelageand J. Hong. The methodology comprises the implementation of scientific articles that include results of surveys and experiments and theoretical underpinnings. The structure of the material seems well organized as it contains the main elements. Though the introduction and the conclusion are missing, the reader can clearly understand that other paragraphs substitute these parts. The authors described the present situation concerning the spread of cyber harassment, explained the extant preventive methods, exemplified the efficacy of school-based cyberbulextentinterventions, and expressed their attitude towards future prevention programs. According to Espelageand and Hong (2016), future researches must attract health care workers to prevent long-term health consequences. Thus, I consider this article relevant as it gives much information to reflect upon and has strong scientific underpinnings.

The fourth article stands under the title Out of the beta phase: Obstacles, challenges, and promising paths in the study of cyber criminology. The paper was issued in 2015 in the International Journal of Cyber Criminology by B. Diamond and M. Bachmann. The article’s organization follows the standards of a scientific article outline; therefore, one may orientate well throughout the paper. The methodology implemented relates to the second type of research, which is based on using extant scientific evidence. The article provides an overview of the present state of cyber criminology and views it from the aspects of teaching, research, and theory. The author suggested that there are still not enough pieces of evidence concerning the behavioral side behind cyber violence. In my opinion, this article is decent as it vividly discloses the study of cyber criminology and significantly explained why cyberbullying will be the main focus of it.

The fifth article is called the Effects of the cyberbullying prevention program media heroes (Medienhelden) on traditional bullying. The paper was published in the journal named Aggressive Behavior in 2016 by several authors: E. Chaux, A. Velásque, A. Schultze-Krumbholz, and H. Scheithauer. The authors used the methods of pretest–post-test quantitative experimental evaluation of the program, and to underpin the results, they use the theoretical base. The paper’s structure is well organized and comprises additional elements for the experiment part. The study focuses on analyzing the spillover effects of the cyber violence preventive programs named Media Heroes on conventional bullying. This prevention program aims to promote empathy, awareness of risks and their repercussions, and strategies that would help to defend the victims. In my opinion, this article may be an excellent example of a research work that other researchers may use to support their evidence.

References

Ang, R. P. (2015). Adolescent cyberbullying: A review of characteristics, prevention, and intervention strategies. Aggression and Violent Behavior, 25, 35–42. doi:10.1016/j.avb.2015.07.011

Espelage, D. L., & Hong, J. S. (2016). Cyberbullying Prevention and Intervention Efforts: Current Knowledge and Future Directions. The Canadian Journal of Psychiatry, 62, 6, 374–380. doi:10.1177/0706743716684793

Chaux, E., Velásquez, A. M., Schultze-Krumbholz, A., & Scheithauer, H. (2016). Effects of the cyberbullying prevention program media heroes (Medienhelden) on traditional bullying. Aggressive Behavior, 42(2), 157–165. doi:10.1002/ab.21637

Diamond, B., & Bachmann, M. (2015). Out of the beta phase: obstacles, challenges, and promising paths in the study of cyber criminology. International Journal of Cyber Criminology, 9, 1, 24–34.

Peterson, J., & Densley, J. (2017). Cyber violence: What do we know and where do we go from here? Aggression and Violent Behavior, 34, 193-200.

Cite this paper

Select style

Reference

StudyCorgi. (2022, February 2). Cyber Violence: Structures and Effectiveness. https://studycorgi.com/cyber-violence-structures-and-effectiveness/

Work Cited

"Cyber Violence: Structures and Effectiveness." StudyCorgi, 2 Feb. 2022, studycorgi.com/cyber-violence-structures-and-effectiveness/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2022) 'Cyber Violence: Structures and Effectiveness'. 2 February.

1. StudyCorgi. "Cyber Violence: Structures and Effectiveness." February 2, 2022. https://studycorgi.com/cyber-violence-structures-and-effectiveness/.


Bibliography


StudyCorgi. "Cyber Violence: Structures and Effectiveness." February 2, 2022. https://studycorgi.com/cyber-violence-structures-and-effectiveness/.

References

StudyCorgi. 2022. "Cyber Violence: Structures and Effectiveness." February 2, 2022. https://studycorgi.com/cyber-violence-structures-and-effectiveness/.

This paper, “Cyber Violence: Structures and Effectiveness”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.