Bibliography—therealmoana

1. O’Donnell, Andy. “Know the Dangers of Oversharing on Facebook.” Lifewire. N.p., n.d.   Web. 27 Feb. 2017.

Background: How much information is too much information when it comes to sharing information on Facebook? Sharing becomes a personal risk when you cross the line of sharing about personal information such as location and schedules. Stalkers attract to people that overshare because it provides easy guidelines about their life.

How I Used It: I used this source to provide readers about stalkers taking advantage of easy access to Facebook timelines and limitless information about your life based on your privacy settings.

2. Manning, Allee. “Is Using Facebook A Free Speech Right? Supreme Court Weighs Case.” Vocativ. Vocativ, 01 Mar. 2017. Web. 06 Mar. 2017.

Background: The U.S Supreme Court considers whether social media is a privilege or a right in modern society. The court reviewed a case of a convict from a incident that occurred in college eight years ago. The question is whether the law infringes on freedom of speech rights and if social media is a medium of communication protected under the First Amendment.

How I Used It: I used this source as an example explaining what connection the law has to predators being on social media and what are the consequences if being caught in the act violating a sexual predators guidelines.

3. Amedie, Jacob, ” e Impact of Social Media on Society” (2015). Advanced Writing: Pop Culture Intersections. Paper 2. hp://scholarcommons.scu.edu/engl_176/2

Background: This article presents the negative impact of social media in three categories being: social media presents several false identities and connections leading to emotional and psychological problems. Second being very addictive and third being it has become a tool for criminals, predators and terrors to commit illegal acts. This article shows the connection between the psychological problems caused by social media and criminal activities committed.

How I Used It: I used this source to show how online “friendships” can lead to dangers in aspects of kidnapping, sexual abuse, and psychological damages.

4. Kotenko, Jam. “Scary Statistics Show That Sex Offenders Are Taking over Social Media.” Digital Trends. N.p., 02 Apr. 2013. Web. 06 Mar. 2017.

Background: Facebook and Twitter are so overpopulated that prevents, pedophiles, and rapists using the platforms are growing in numbers. The number of sexual assaults cases related to both social media sites has reached incredible heights. Facebook has over a billion users, making it nearly impossible to control who joins which is what sex offenders are counting on. The FBI has released a guide to Internet safety.

How I Used It: I used this source for statistics on the number of people using Facebook and the number of followers each person has.

5. Writer, Leaf Group. “Dangers of MySpace and Facebook With Sexual Predators.” Our Everyday Life. Our Everyday Life, 16 Feb. 2013. Web. 06 Mar. 2017.

Background: Sexual predators have found ways to victimize users from online. They do this by hiding behind fake profiles to lure victims, using profile information to stalk their victims in real life or hacking into accounts to blackmail victims, sexual predators pose very real dangers for users on social media sites.

How I Used It: I used this source to explain how predators locate and imitate contact with potential victims. And how this can lead to real life stalking. I also used this source to talk about what privacy settings to use and what precautions to take.

6. “The mass media and American adolescents’ health“. Brown, Jane D et al. Journal of Adolescent Health , Volume 31 , Issue 6 , 153 – 170

Background: American teens today grow up in a world surrounded by mass media. The media depict a world in which unhealthy behaviors such as physical aggression, unprotected sex, smoking, and drinking are glamorous and risk free. Americans always have the worries about the harmful effects of the mass media on children and adolescents.

How I Used It: I used this source to explain the media effects on adolescents’ health.

7. “Online Predators – Statistics.” Online Predators – Statistics | PureSight | Pedophiles/Online Predators. N.p., n.d. Web. 19 Apr. 2017.

Background: One in five teenagers who regularly log on to the Internet says they have received an unwanted sexual solicitation via the Web. Internet sexual predators fall in-between the ages of 18 and 55, their targets tent to be between the ages of 11 and 15. Teens are willing to meet with strangers. 75% of children are willing to share personal information online.

How I Used It: I used this mainly for statistics.

8.” Risky Disclosures on Facebook“. Emily Christofides, Amy Muise, Serge Desmarais, Journal of Adolescent Research, Vol 27, Issue 6, pp. 714 – 731, First published date: January-17-2012

Background: Social network websites are widely used by adolescents, but disclosing in this environment has inherent risks. The authors explore the relationship between having a negative relationship between having a negative experience,privy knowledge, and behavior.

How I Used It: I used this source for examples about protecting privacy and the risks of online disclosure.

9. “Facebook Is Dangerous for Teens. Protect Kids from Facebook Porn, Stalkers, Sexting and Bad Influences.” Facebook Is Dangerous for Teens. Protect Kids from Facebook Porn, Stalkers, Sexting and Bad Influences. N.p., n.d. Web. 27 Mar. 2017.

Background: The fastest growing segment of new users are pre teens and teens. Facebook’s age limit is 13 but it is very easy for kids to lie about their age. Social networking also makes children that target of cruel jokes from their peers. The average Facebook user has 135 friends and each of those friends has an average of 135 friends. The greatest danger to teens on social media is not what they do online but what others do and say about them.

How I Used It: I used this source to explain how parents can watch over their children’s social media profiles.

10. “Hackers and Predators – The Dangers of Social Networking.” CYBER ARMS – Computer Security. N.p., 30 Oct. 2012. Web. 27 Mar. 2017.

Background: People are way to trusting on social media sites. Do not friend people that you do not know. And be careful on how much information you put on social media. Hackers gain access to systems by targeting teens.

How I Used It: I used this article to use as an example of a real life story on how hackers and sexual predators pose as young teens to draw teenagers in and get them to meet them at a location and kidnap them.

11. “Pew: 94% Of Teenagers Use Facebook, Have 425 Facebook Friends, But Twitter & Instagram Adoption Way Up.” Marketing Land. N.p., 22 July 2014. Web. 28 Mar. 2017.

Background: facebook is the most used social media website. 95% of teens use the internet, and 81% of them use social media sites. Teen sharing and visits to social media sites have hit a high with heavy users. Teens on Facebook are good with using privacy settings, with 60 percent saying their profiles and updates are “private”. In general, girls are more likely than boys to have private profiles.

How I Used It: I used this document for statistics, it was very helping displaying charts and average number of how many followers men compared to women have. A report explains social media profiles and what teens post in 2006 compared to 2012.

12. Wolak, Janis, David Finkelhor, Kimberly J. Mitchell, and Michele L. Ybarra. “Myths, Realities, and Implications for Prevention and Treatment.” Online “Predators” and Their Victims 63.2 (2008): 111-28. Apa.org. University of New Hampshire Internet Solutions for Kids,Inc., Feb. 2008. Web. 24 Apr. 2017.

Background: The Internet is becoming a dangerous place for children and teenagers whose online profiles often attract aggressive sexual predators. Internet sex crimes involving adults and juveniles more often fit a model of statutory rape. With prevention strategies it will provide adolescents with awareness skills while educating older youths about the pitfalls of sexual relationships with adults and their criminal nature.

How I Used It: I used this source to explain how internet sex offenders operate. I also used this article to explain how youths can make themselves vulnerable to online child molesters.

13. “The Characteristics of Online Sex Offenders: A Meta-Analysis” Kelly M. BabchishinR. Karl HansonChantal A. Hermann. Sexual Abuse. Vol 23, Issue 1, pp. 92 – 123. First published date: July-26-2010

Background: Online offenders are a distinct group of sex offenders or if they are just sexual offenders using new technology. Online and offline offenders reported greater rates of childhood physical and sexual abuse than the general population. Online offenders are more likely to be Caucasian, single, and unemployed.

How I Used It: I used this article to demonstrate the differences and similarities between online and offline offenders.

14. Ybarra, Michele L., and Kimberly J. Mitchell. “How Risky Are Social Networking Sites? A Comparison of Places Online Where Youth Sexual Solicitation and Harassment Occurs.” Pediatrics. American Academy of Pediatrics, 01 Feb. 2008. Web. 24 Apr. 2017.

Background: The public has focused on the possibility that social networking sites are being used to sexually solicit underage youth. Prevention efforts may have a big impact if they focus on the psychosocial problems of youth instead of a specific Internet application, including funding for online youth outreach programs, school anti bullying programs and online mental health services.

How I Used It: I used this source to explain outcomes were unwanted sexual solicitation on the Internet and provide statistics of how many unwanted sexual solicitation online in the last year.

15. Mitchell, Kimberly J., David Finkelhor, and Janis Wolak. “Youth Internet Users at Risk for the Most Serious Online Sexual Solicitations.” American Journal of Preventive Medicine. University of New Hampshire Internet Solutions for Kids,Inc., n.d. Web.

Background: This article explores changes in the prevalence of youth Internet users reporting unwanted sexual solicitations between 2000 and 2005, as well as the risk factors related to reports of the most serious solicitations, aggressive solicitations, in which solicitors attempted or made offline contact with youth.

How I Used It: I used this article to state the dangers for women because they are the most at risk. Risk factors include using chat rooms, using the Internet with a cell phone, talking with people met online and sending personal information to people met online.

This entry was posted in A11: Annotated Bibliography, therealmoana, therealmoana Portfolio. Bookmark the permalink.

2 Responses to Bibliography—therealmoana

  1. davidbdale says:

    Moana, in this digital publishing age, authors have a responsibility to link readers to their online sources whenever possible. You haven’t done that here, but I will demonstrate the simple technique in class tomorrow. As an example, I linked your first title to its url.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s