NTR 100 COMPLETE Syllabus and Academic Integrity Acknowledgement Arizona State University
NTR 100 COMPLETE Syllabus and Academic Integrity Acknowledgement Question 1 1 / 1 pts I have read the ASU ā¦
BUS600 Week 2 Discussion Forum 2
Inappropriate Use of Communication Technology
Example of a violation of communication technology
Technology ethics involves the appliance of ethical thinking to practical concerns of technology. Cyber-bullying is an example of inappropriate use of communication technology. Cyber-bullying is making fun of another person online by posting rumors, framing, posing threats, using hate speech, or even sexual comments. It can occur in the organization’s chat rooms and online forums, direct messaging, or even hacking a colleague’s system. (MladenoviÄ & StankoviÄ, 2021).
How to prevent Cyber-bullying
Cyber-bullying has become so common, and it may lead to suicide cases or emotional damage from the victims and should be prevented. Firstly, monitoring of online activities in chat rooms and online forums may reduce unethical acts. When individuals realize that there is monitoring from an above body, they tend to avoid bullying others. One of the reasons monitoring online activities helps is that individuals who engage in bullying can be traced and educated on ways to relate well with others. Other than the fear of being caught during monitoring, bullies, when educated, tend to stop the unethical acts. (McGuckin & Corcoran, 2013).
Secondly, Jurisdiction is another best way to prevent Cyber-bullying. If an individual is subjected to the law as a result of bullying others, there are consequences. One can be charged or fined heavily for harassing others, leading to low self-esteem on different instances and grounds. For example, in Florida, Rebecca Sedwick committed suicide, and Guadalupe Shaw was charged for bullying her through Facebook. She even made a post agreeing to the act of torment, including the statement that she did not care. The court enforced the law and charged Guadalupe with the criminal act (Almasy & Couwels, 2013).
References
MladenoviÄ, M., OÅ”mjanski, V., & StankoviÄ, S. V. (2021). Cyber-aggression, Cyberbullying, and cyber-grooming: a survey and research challenges. ACM Computing Surveys (CSUR), 54(1), 1-42. from https://dl.acm.org/doi/abs/10.1145/3424246
Almasy, S., Segal, K., & Couwels, J. (2013). Sheriff: Taunting post leads to arrests in Rebecca Sedwick bullying death. CNN. com. From https://www.cnn.com/2013/10/15/justice/rebecca-sedwick-bullying-death-arrests/index.html
McGuckin, C., Perren, S., & Corcoran, L. (2013). Coping with Cyberbullying: How can we prevent Cyberbullying and how victims can cope with it. In Cyberbullying through the new media (pp. 139-153). Psychology Press. From https://cyberpsychology.eu/article/view/4294/3339
NTR 100 COMPLETE Syllabus and Academic Integrity Acknowledgement Question 1 1 / 1 pts I have read the ASU ā¦
HEP 456 Module 5 Section 12 and 13 Planning for Analysis and Interpretation and Gantt chartĀ Name HEP 456: ā¦
HEP 456 Module 6 Section 14 Communication and Dissemination of The Findings HEP 456: Health Promotion Program ā¦