Thursday, November 21, 2019
Annotated Bibliography Example | Topics and Well Written Essays - 1000 words
Annotated Bibliography Example As the writer has been the director of a Center that provides training and technical assistance to professionals, he has succeeded to pen such a genuine work that enhances the awareness of common people. For instance, according to Armagh (2), parentsââ¬â¢ awareness and active involvement is the most effective protection against child victimization. He also reminds that ââ¬Å"if parents are to protect their children against cyber predators, they must understand the rational and methodology in using the internet to approach potential victimsâ⬠(Armagh, 2). Finally, the author puts forward an array of protective measures which parents can implement to ensure the safety of their children from the threat of sexual predators. The article tends to discuss the concept of internet safety in educational environment assessing the risky situations that children often confront with on the internet. It also illustrates certain safety measures like ââ¬Å"avoidance techniques, de-escalation skills, and protection strategiesâ⬠(370) that would avert problematic situations. The writers insist on the necessity of developing appropriate use policies and procedures that ensure the safety of children. The writersââ¬â¢ perception on internet safety is based on building childrenââ¬â¢s defense which involves ââ¬Å"gradual and periodic interaction and discussions of their web experiencesâ⬠(369). Regardless of the relevance of the issue, the article flaws as it does not dig deeper into the subject to provide the readers with dependable advice on cyberspace pornography and violence. The article explores the alarming societal issues associated with the use of internet as the technology has opened up new business opportunities for sexual predators and obsessional harassers. According to the writers McGrath and Casey, these two groups have chosen internet as the best vehicle for attaining their business objectives. The major focus of the article is to make the forensic
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.