Solved by verified expert:Feedback to Learner.Remenber that this class is advance writing class. Your outline is providing a great deal of information about cyberbullying… However, it is not clear how they support your thesis. Remember, a thesis statement is not a fact. It is an assertion/observation you have made on the topic. I think you should try to narrow the scope of your research… Your topic is Cyberbullying… What aspect of cyberbullying are you addressing? For example, are you looking at the cyberbully? What causes someone to become a cyberbully? Or are you looking at prevention? If so…then what are effective strategies in preventing cyberbullying? It will be easier for you if you come up with a research question.
Based on your research, your answer can help you form your thesis
statement. Remember, the paper is only 2 to 3 pages. You cannot write a whole book on the topic as you can write a book on it.Log on to LIRN (FNU Library database). you may go to fnu.edu and then look for the library. User name: 24439 Password: fnulibrary39 Use ProQuest….You will find a great deal of research on the topic of your choice.(The paper must be 2 to 3 pages, not including the Works Cited page). It MUST also be in MLA format. You will need to read the following chapters from your course textbook to prepare for your paper: Chapter 14: Preparing for a Research Project Chapter 15: Doing Research Chapter 16: Evaluating Sources and Taking Notes Chapter 17: Integrating Sources and Avoiding Plagiarism Chapter 18: Writing a Research Project It is important that you read these chapters carefully as they will help you with writing your research paper. I dont want the outline, I just submited that because you can see the mistakes that I made and dont do it again and you may have a base for the essay. I apreciate so much your help guys.
Unformatted Attachment Preview
Advanced Writing and Research-DL-B1
THESIS: The constantly increasing scope of the cyberbullying issues makes it evident that
more effective strategies and actions are needed to cope with their consequences
and provide more secure defense mechanisms to stop the malicious activities
Network devices provide people with a number of benefits, enabling to get in
touch, communicating and finding interests in any part of the globe.
A. Digital world does not only provide the users with benefits, but also poses a
substantial threat and may cause harm.
B. Some people use digital communication to harm others.
C. Cyberbullying is referred to as a malicious activity that aims at harming
people by means of digital communication (Donegan).
Cyberbullying deals with the messages that are threatening or intimidating in
A. Cyberbullying may be initiated through any device that enables digital
B. There are different types of cyberbullying, including cyberstalking,
masquerade, online harassment, denigration, exclusion, and others (Slonje,
Smith, and Frisén 27).
C. A cyber bullying activities may be performed through the use of a single or
multiple means simultaneously.
Cyberbullying victims are people who are the focus of the anonymous attackers
and cannot escape these attacks.
A. Anonymous attackers tend to create a website or websites that contain
private photos of or any other information about a victim.
B. One of the greatest problems is that the photographs can be endlessly copied
by others, strengthening cyberbullying (Hinduja and Patchin).
C. Password stealing is one more common cyberbullying act as it enables the
attacker to get the private information of a victim and use it for insulting
IV. The greater number of cyberbullying victims are children and teenagers.
A. Children and teenagers are most vulnerable due to their immaturity and
psychological characteristics of their age (Donegan).
B. The most vulnerable population cannot cope with the issue alone and
experience a variety of negative consequences.
V. The most threatening cyberbullying outcomes among children and teenagers are
depression, shame, anxiety, frustration, fear, low self-esteem, and even suicide
(Slonje, Smith, and Frisén 27).
A. Many children and teenagers are afraid to share their worries with the parents
B. Negative emotions affect the life of children and teenagers and make it
C. The inability to cope with the negative emotions of the cyberbullying victims
substantially increases the suicide probability (Doane, Boothe, Pearson, and
VI. The reasons and underpinning of cyberbullying are varied.
A. Cyberbullying may be an attempt of some individual to place themselves over
B. The nature of a person and personal characteristics impacted by such factors
as background, environment, and others.
C. Cyberbullying is often associated with the desire of some people to entertain
(Doane, Boothe, Pearson, and Kelley).
VII. Cyberbullying is present in every society.
A. Proper understating of cyberbullying requires a thorough analysis of the
B. Investigation of the main cyberbullying causes is vital.
C. The development of technologies, increased access to the Internet and social
media of the most vulnerable groups of individuals requires constant
improvement of the existing protection strategies and policies, as well as the
development of new ones.
VIII. The cyberbullying victims make different attempts to secure themselves.
A. The development of individual self-defending strategies is considered to be
helpful (Slonje, Smith, and Frisén 27).
B. Reporting is also effective as it provides an opportunity to get professional
help and assistance.
IX. Cyberbullying should be eliminated as it poses threat to the society.
A. Cyberbullying results in psychological trauma.
B. Proper understanding of the cyberbullying causes may help to contribute to
the effective solution of the problem.
C. The current policies require improvements to protect the most vulnerable
groups of individuals.
Doane, Ashley, Boothe, Laura, Pearson, Mattew, and Michelle Kelley. “Risky Electronic
Communication Behaviors and Cyberbullying Victimization: An Application of
Protection Motivation Theory.” Computers in Human Behavior, vol. 60, 2016, pp.
Donegan, Richard. “Bullying and Cyberbullying: History, Statistics, Law, Prevention and
Analysis.” The Elon Journal of Undergraduate Research in Communications, vol. 3, no.
1, 2012, pp. 33-42.
Hinduja, Sameer, and Justin Patchin. “Cyberbullying: A Review of the Legal Issues Facing
Educators. ” Preventing School Failure: Alternative Education for Children and Youth,
vol. 55, no. 2, 2011, pp. 71-78.
Slonje, Robert, Smith, Peter, and Ann Frisén. “The Nature of Cyberbullying, and Strategies for
Prevention.” Computers in Human Behavior, vol. 29, no. 1, 2013, pp. 26-32.
Our essay writing service fulfills every request with the highest level of urgency.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more