Wednesday, December 4, 2019

Uses Electronic Devices Such As Computers †Myassignmenthelp.Com

Question: Discuss About The Uses Electronic Devices Such As Computers? Answer: Introduction Cyber bullying is one of the most recent social evils which public relations can help eradicate it. It is the act of harassment that uses electronic devices such as computers and mobile phones (Shariff 2008). The crime is common among teenagers and can take various forms such as posting rumors about a person, use of photos and videos with wrong intentions, sending humiliating messages online, among many other types (Wang, Iannotti, Nansel, 2009). Victims usually suffer depression and may also develop low self-esteem. There have been cases where victims have gone to the extent of committing suicide (Smith 2008). The magnitude of the effects caused by this evil has caused the government, corporations and NGOs take measures in trying to eradicate the problem in Malaysian society. Efforts Were Made To Curb the Problem Data from Cyber Security Malaysia, an agency under the Science, Technology, and Innovations Ministry, show that a total of 2,428 cyber-crime incidences were reported between January and April this year (Susan 2009). The government, therefore, established a regulation through the national cyber securitygency (NCSA). The company was charged with a responsibility of punishing the perpetrators. Such a reactive measure is not the best; instead, the measure should be proactive, that is before the crime occurs. Another effort that the government has shown is by establishing foundations and funds that will help in the prevention of such offenses example of such a body is Malaysia Crime Prevention Foundation. The major responsibility of such institutions is to educate the public especially students who are majorly affected (Mishna, Khoury-Kassabri, Gadalla, Daciuk, 2012). The move is proactive and such foundations need support from even the NGOs and civil societies. Incorporation of cyber bullying, violence, and pornography into the children modules and system of education has helped reduce the risk of vulnerable children becoming the victims. The chief executive officer of Cyber security Malaysia, Dr. Abdul while speaking with The Star notes that individual parents also should access such modules for them to learn how to keep safe their children (Hindujah 2009). The Role of PR in Cyber Bullying Public relation as a discipline has got a major responsibility in the abolition of this crime. Firstly the subject should evolve to incorporate emerging disciplinary issues such as those of online harassment. Ways of avoiding them should be part of the curriculum and even the social evils that will subsequently follow. Emphasis on the methods in which one can continuously find themselves getting deeper into this moral decay should also be part of the module. The aim here is to ensure the society is aware of the dangers resulting from these acts. Another way in which Public Relations can help is by creating awareness of the existence and forms of cyber bullying. When people are aware of these issues, they can avoid them since some of themindhemselves in them unaware. According to a recent study by Malaysia National cyber security agency, many unsuspecting persons engage in cybercrimes unaware. An example is when someone constantly keeps on sending a humiliating text message, they may be ignorant of the effects it has to the recipient (Mitchell 2007). The objective, in this case, is to ensure no one is caught oblivious in furtherance of this moral issue. Educating the public on the responsible use of internet and electronic devices is also very important in helping deal with cyber bullying. When children are introduced to the web responsibly, they will eventually grow using it well and eventually be responsible users. People should be discouraged from vandalism and with time and constant reminder, they will stop the crime. PESTEL and Cyber Bullying The environmental factors have to lead to the development of cyber harassment in some ways. Politically people are more aware of their rights, and this means that you cannot deny them access of certain recourses such as the internet. They will demand them and technicalities that can be involved in regulating such scenarios are nearly impossible. The crimes are also used by the political class to advance their political ambitions. Politicians use propagandas to ensure their opponents fail and thus the notion of preaching water and taking wine applies. They cannot discourage what they are practicing lest they are contradictory. Economically today, people have become empowered and thus can access expensive devices which initially they would not have afforded. Statistics show that on average a Malaysian citizen earns MYR 52 353 (Government 2013). Such a salary allows parents to buy devices for their children which if misused leads to this crime. Internet services have also become cheap and easily accessible. The risk of its abuse increases with constant access and its ease of use. There has been a massive growth of technology in the recent past, and this has made cyber harassment easy to commit. Sophisticated devices such as i-pads and smart phones have been introduced in the market, and people can access them since they are not very expensive. These gadgets can perform tasks that promote cyber-crimes, for example, sending annoying videos via WhatsApp, Facebook, and other social media platforms. This can be dealt with through proper education by sellers and manufacturers to their buyers. Manufacturers can also establish internal measures that will inhibit users of their products from accessing some of these sites. Conclusion Finally, I would like to recommend the actions taken by the United States government in eradicating the problem through the establishment of guidelines that requires all stakeholders in a child development, plays a role in discouraging the behavior (Shariff 2008). For example, it is mandatory for all the schools in the US to have anti-bullying rules. Children will, therefore, grow knowing the evils associated with this crime. Such policies will also work for Malaysia since they are proactive and will be inbuilt. The success of this method depends on the right application of mass communication concept of interpretative. The concept implies that once a person interprets information, they will believe in it then act in accordance with it. References Commissioner of law, 2013. Laws of Malysia Act 601. Maaysia: commissioner of law Revsion. Government, M., 2013. Growing Awareness amonf malaysian schools. Malaysia: Government printer. Hinduja, S. . J. W., 2009. Bullying beyond the schools: preventing and responding to cyber bullying. California: Corwin Press . Michell, K. . F. D., 2007. Examing characteristic and distress caused by cyber bullying. New York: Pediatrics. Mishna, F., Khoury-Kassabri, M., Gadalla, T., Daciuk, J., 2012. Risk factors for involvement in cyber bullying: Victims, bullies and bullyvictims. Children and Youth Services Review,, Volume 34(1), pp. 63-70.. Sharrif, F., 2008. Cyber bullying;. London: Routledge. Smith, P. . F. M., 2008. Cyberbullying; its nature and effects in secondary pupils. The journal of Child Psychology, pp. 346-382. Susan, R. . P. W. . A. P., 2009. Cyber bullying; a pevention curriculum for grade 3. Centre City: Hezelden Foundation. T, W. F. . N., 2007. Cyber Bullying and cyber Threats. Champhain: Research Press. Wang, J., Iannotti, R. J., Nansel, T. R. , 2009. School bullying among adolescents in the United States: Physical, verbal, relational, and cyber.. Journal of Adolescent health, Volume 45(4), pp. 368-375.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Compare and Contrast Melody and Structure in the Brahms, Debussy and Poulenc Essay Example for Free

Investigate Melody and Structure in the Brahms, Debussy and Poulenc Essay Brahms is a writer where tune isn't the key center, yet at ...