Monday, December 13, 2010
Portfolio Analysis
From: Michelle Chiodi
To: UN 2001 Program Assessment Group
Date: December 12, 2010
Re: Portfolio Analysis
Composition is a course designed to help students with the writing done in their respective majors. This course taught many different techniques from MLA and APA citation styles, to the main components of rhetoric. Different aspects of developing an argument were discussed along with the basics of creating a visual argument. Throughout this course we completed several different projects, which were an annotated bibliography, a rhetorical analysis, a presentation on rhetoric, a research paper, a visual argument, and finally this portfolio analysis.
The first project was an annotated bibliography, which served as a practice and discovery of the citation style in our major. For this project we had to interview a professor in our major about the citation style used in our major. After the interview, we wrote an annotated bibliography using the citation style described by the professor. Overall, this project was very interesting. I had never interviewed a professor before and I thought that it was a fun and interesting experience. In the end, I learned a lot about the writings done within Chemical Engineering and how the style of the citation is dictated by the journal it will be published in. Because there was no set style for citation it was difficult for me to write the annotated bibliography that went along with the interview. Luckily I got some pieces of writing that a professor wrote and the citations were shown. I used those citations as an example to base my citation on.
The next project was a change in pace from the first that was more technical. Our second project was a rhetorical analysis in which we had to choose an article and analyze the effectiveness of the author’s argument. For this project, I found an article from the New York Times about alternative medicine. After reading through this article I began to analyze the rhetorical techniques used by the author in creating her argument. After creating an initial draft it was peer reviewed and I found the feedback to be very helpful. One thing the reviewer said was that I needed to define my audience better. I worked on this and for the second draft I had defined my audience to be middle-aged readers 35-55 of the New York Times who are interested in medical topics. This allowed me to focus my analysis more toward my audience. If I had more time to work on it, I would have talked about the converse to the argument more. Alternative medicine is a controversial subject and the article I read only discussed its pros. I would have discussed how the author of the New York Times article should have incorporated more about the cons into her article.
Along with the idea of rhetoric we had a group project where we had to analyze the ethos, pathos, and logos of an argument. My group chose to analyze a Doritos commercial that aired during the Super Bowl. Because of this airtime it was easy to identify the audience as predominantly male football lovers ages 16-35 as the target audience for this commercial. In the end, we found that the argument was made using mostly pathos and ethos as the rhetorical appeals. We put together a presentation using Prezi to present our ideas to the class. Because our audience for this presentation was our class we decided to present it in a more interesting way than Power Point so we decided to use Prezi. This was effective as it seemed to keep the attention of the audience.
Our third project was a research paper that had to be on a topic within the theme of new digital media and student life. This was a very broad theme, and at the beginning I was unsure of what to use for my topic. Initially I thought I wanted to write about the detriments the new digital media has on interpersonal communication. However after beginning research on that topic, I began to lose interest on that and was not finding any excellent sources. Eventually I decided that I wanted to look into the topic of cyber bullying. I was interested in this topic because it had been in the news quite a bit lately so I wanted to learn more about it. I decided to make my argument that cyber bullying is creating a new breed of bully that is more severe than traditional bullies. With this I also looked into what is being done to prevent cyber bullying and what still needs to be done. After searching the online database resources provided by the library, I found many useful sources that provided great substance for my argument. After crafting a first draft we had a peer review in class. The feedback that I got was useful and let me know that I needed to work on the organization and clear up a couple section. For my final paper I worked on the organization so that my argument flowed better and was more logical. Additionally, I made sure that everything was clear and nothing was overly word or ambiguous.
The last project for this class was a visual argument. For this project we had the option to use our project three topic for our visual argument. This is what I decided to do so I created a visual argument about cyber bullying. From the beginning I was not sure what media I wanted to use to create my visual, I began by trying to create a computer drawing then turned to creating a Windows Movie Make video. I quickly realized that I was not familiar enough with the software to do either of those. After running into this problem I decided to revert back to what I know how to do: drawing. At the beginning I knew that my I wanted my audience to be teens, specifically younger teens ages 13-16 because they are often targets for cyber bullying. Because my audience was teenagers I decided to make something that looked slightly funny so it would draw their attention. I think this effective because their attention will be grabbed by the drawing and at the same time they will be able to understand the argument. Then when they read the text will be able to fully understand the main argument of the drawing.
Overall I think I performed well in this class. I tried to participate in class discussions when I had a good idea to add and I think I gave good feedback when I was peer reviewing. One thing I think could enhance this class would be a more formal verbal project. Something like a debate could be used to give students practice incorporating ethos, pathos, and logos into a verbal argument. I think something verbal is needed in this class because it is something all students are going to need to use in the future when trying to present their ideas in industry and even when interviewing for jobs in the future.
To: UN 2001 Program Assessment Group
Date: December 12, 2010
Re: Portfolio Analysis
Composition is a course designed to help students with the writing done in their respective majors. This course taught many different techniques from MLA and APA citation styles, to the main components of rhetoric. Different aspects of developing an argument were discussed along with the basics of creating a visual argument. Throughout this course we completed several different projects, which were an annotated bibliography, a rhetorical analysis, a presentation on rhetoric, a research paper, a visual argument, and finally this portfolio analysis.
The first project was an annotated bibliography, which served as a practice and discovery of the citation style in our major. For this project we had to interview a professor in our major about the citation style used in our major. After the interview, we wrote an annotated bibliography using the citation style described by the professor. Overall, this project was very interesting. I had never interviewed a professor before and I thought that it was a fun and interesting experience. In the end, I learned a lot about the writings done within Chemical Engineering and how the style of the citation is dictated by the journal it will be published in. Because there was no set style for citation it was difficult for me to write the annotated bibliography that went along with the interview. Luckily I got some pieces of writing that a professor wrote and the citations were shown. I used those citations as an example to base my citation on.
The next project was a change in pace from the first that was more technical. Our second project was a rhetorical analysis in which we had to choose an article and analyze the effectiveness of the author’s argument. For this project, I found an article from the New York Times about alternative medicine. After reading through this article I began to analyze the rhetorical techniques used by the author in creating her argument. After creating an initial draft it was peer reviewed and I found the feedback to be very helpful. One thing the reviewer said was that I needed to define my audience better. I worked on this and for the second draft I had defined my audience to be middle-aged readers 35-55 of the New York Times who are interested in medical topics. This allowed me to focus my analysis more toward my audience. If I had more time to work on it, I would have talked about the converse to the argument more. Alternative medicine is a controversial subject and the article I read only discussed its pros. I would have discussed how the author of the New York Times article should have incorporated more about the cons into her article.
Along with the idea of rhetoric we had a group project where we had to analyze the ethos, pathos, and logos of an argument. My group chose to analyze a Doritos commercial that aired during the Super Bowl. Because of this airtime it was easy to identify the audience as predominantly male football lovers ages 16-35 as the target audience for this commercial. In the end, we found that the argument was made using mostly pathos and ethos as the rhetorical appeals. We put together a presentation using Prezi to present our ideas to the class. Because our audience for this presentation was our class we decided to present it in a more interesting way than Power Point so we decided to use Prezi. This was effective as it seemed to keep the attention of the audience.
Our third project was a research paper that had to be on a topic within the theme of new digital media and student life. This was a very broad theme, and at the beginning I was unsure of what to use for my topic. Initially I thought I wanted to write about the detriments the new digital media has on interpersonal communication. However after beginning research on that topic, I began to lose interest on that and was not finding any excellent sources. Eventually I decided that I wanted to look into the topic of cyber bullying. I was interested in this topic because it had been in the news quite a bit lately so I wanted to learn more about it. I decided to make my argument that cyber bullying is creating a new breed of bully that is more severe than traditional bullies. With this I also looked into what is being done to prevent cyber bullying and what still needs to be done. After searching the online database resources provided by the library, I found many useful sources that provided great substance for my argument. After crafting a first draft we had a peer review in class. The feedback that I got was useful and let me know that I needed to work on the organization and clear up a couple section. For my final paper I worked on the organization so that my argument flowed better and was more logical. Additionally, I made sure that everything was clear and nothing was overly word or ambiguous.
The last project for this class was a visual argument. For this project we had the option to use our project three topic for our visual argument. This is what I decided to do so I created a visual argument about cyber bullying. From the beginning I was not sure what media I wanted to use to create my visual, I began by trying to create a computer drawing then turned to creating a Windows Movie Make video. I quickly realized that I was not familiar enough with the software to do either of those. After running into this problem I decided to revert back to what I know how to do: drawing. At the beginning I knew that my I wanted my audience to be teens, specifically younger teens ages 13-16 because they are often targets for cyber bullying. Because my audience was teenagers I decided to make something that looked slightly funny so it would draw their attention. I think this effective because their attention will be grabbed by the drawing and at the same time they will be able to understand the argument. Then when they read the text will be able to fully understand the main argument of the drawing.
Overall I think I performed well in this class. I tried to participate in class discussions when I had a good idea to add and I think I gave good feedback when I was peer reviewing. One thing I think could enhance this class would be a more formal verbal project. Something like a debate could be used to give students practice incorporating ethos, pathos, and logos into a verbal argument. I think something verbal is needed in this class because it is something all students are going to need to use in the future when trying to present their ideas in industry and even when interviewing for jobs in the future.
Visual Argument Reflection
Michelle Chiodi
Shampa
UN 2001
12/7/2010
Visual Argument Reflection
As soon as this project was introduced, I was eager to begin. This project sounded fun, and from the beginning, I was very excited to see everyone’s final products and the different media everyone would use. With the option to use our project three topic or another topic, initially I was not sure what to choose for a topic. However, it did not take me long to decide that I would stick with my project three topic of cyber bullying.
Of all the projects in this class, the visual argument project was my favorite to create. There was so much room for creativity and I love a chance to use my artistic ability. At the beginning, I was unsure what media I wanted to use to create my visual argument. For our research project, we had to create a visual to go along with that to show in class. Initially, I thought that I wanted to transform this drawing to a drawing on the computer. After working on that for a while, I decided that was not the best option as I am not familiar with the software to do this. Next I thought I might try to create a video about the dangers of cyber bullying. I began using Windows Movie Make and initially imported pictures that worked well for my argument. Next, I added text to enhance the argument. It came to add sound so I downloaded a song from iTunes that I thought would add to my argument. When it came time to import the audio into Windows Movie Maker, I found that audio from iTunes is not compatible with Windows Movie Maker. Being very frustrated at this point, I decided to revert back to something I know how to do: drawing.
I really liked the drawing that I had done to go along with my research paper, but I knew I had to change it up for my visual argument. Many of the same concepts were used for my visual argument. Like I had previously, I portrayed the computer and the cell phone as the villains. One main thing I changed for my visual argument project was that I created the text on the computer. I did this to make the text more precise and look neater. When I created this drawing I kept the C.R.A.P. principles in mind. The C stands for contrast. This principle came into play with the text. I decided to use a contrasting color scheme of blue and orange. We had learned that scheme stands out so that seemed like a good option for the text so it would be noticeable and easy to read. The R in the acronym stands for repetition. I used this in a couple different ways. I repeated the color scheme throughout by only using blue and orange for the text. This connected the text and made it simple so it would not distract from the action of the drawing. Additionally, I created two schemes of the electronic devices to add repetition. This made the point stronger by letting the audience see various different media that can be used to cyber bully. For the A which stands for alignment this came into play with the text. The title of the picture was centered on the page to draw the eye across that page. The informational text was centered in the box to make it look fuller. The P stand for proximity. This principle is shown with both the text and the drawing. The text and drawings are in close proximity to one another to let the reader see the connection. Since all of the text us close together, they will see that they are connected. Both of the pictures are also closer together to show the viewer that they are connected and show the same idea.
While I was creating this drawing I had to keep my audience in mind. Since cyber bullying mainly affects teens, that was my target audience for this project. Specifically the age range from 13-16. Because this was my audience I wanted to create a drawing that would appeal to them. To do this I used the bright colors of the text to first catch their attention. Once I had their attention, I wanted them next to look at the picture. The intent of the picture was to be slightly comical due to the unrealistic nature of what was happening. Of course a cell phone is not going to sprout an arm from the screen and you will never see a computer gobbling up a student, but I wanted it to be interesting for my audience to look at. I thought that teenagers would find this illustration funny but still see the connection it has with the actual argument that cyber bullying is very harmful.
When it came time for the class presentations, I was excited to see what everyone else had done for their project. In the end, I was disappointed; I had set my expectations too high since the presentations were only showing the works in progress. I expected there to be more diversity in the types of visuals created. In the end the visuals were predominantly pictures and posters. I would have liked to see some videos. If I were to do this project again, I would have created a video to add more diversity to what was created in the class. Additionally, the feedback I got in class was very helpful in creating a finalized version of my visual argument. When I presented in class the clarity of my image was not excellent. For the final product I enhanced the clarity by taking a picture of my drawing instead of scanning it.
While this project was frustrating at the beginning, in the end it was enjoyable to create. My decision to create a drawing allowed me to create a visually pleasing, effective visual argument. When creating this drawing I had my audience in mind and that allowed me to create something that would catch a teen’s attention and still get my message across to them. I incorporated the C.R.A.P. principles into my design to create something that is easy to look at and make sense to the viewer. In the end, I got good feedback about my argument and learned that I needed to enhance the clarity of my image. For my final product the clarity was enhanced to make every element clear and easy to see. In the end I wish there would have been more diversity in the projects throughout the class, but it was still interesting to see how everyone turned an argument into a visual argument.
Shampa
UN 2001
12/7/2010
Visual Argument Reflection
As soon as this project was introduced, I was eager to begin. This project sounded fun, and from the beginning, I was very excited to see everyone’s final products and the different media everyone would use. With the option to use our project three topic or another topic, initially I was not sure what to choose for a topic. However, it did not take me long to decide that I would stick with my project three topic of cyber bullying.
Of all the projects in this class, the visual argument project was my favorite to create. There was so much room for creativity and I love a chance to use my artistic ability. At the beginning, I was unsure what media I wanted to use to create my visual argument. For our research project, we had to create a visual to go along with that to show in class. Initially, I thought that I wanted to transform this drawing to a drawing on the computer. After working on that for a while, I decided that was not the best option as I am not familiar with the software to do this. Next I thought I might try to create a video about the dangers of cyber bullying. I began using Windows Movie Make and initially imported pictures that worked well for my argument. Next, I added text to enhance the argument. It came to add sound so I downloaded a song from iTunes that I thought would add to my argument. When it came time to import the audio into Windows Movie Maker, I found that audio from iTunes is not compatible with Windows Movie Maker. Being very frustrated at this point, I decided to revert back to something I know how to do: drawing.
I really liked the drawing that I had done to go along with my research paper, but I knew I had to change it up for my visual argument. Many of the same concepts were used for my visual argument. Like I had previously, I portrayed the computer and the cell phone as the villains. One main thing I changed for my visual argument project was that I created the text on the computer. I did this to make the text more precise and look neater. When I created this drawing I kept the C.R.A.P. principles in mind. The C stands for contrast. This principle came into play with the text. I decided to use a contrasting color scheme of blue and orange. We had learned that scheme stands out so that seemed like a good option for the text so it would be noticeable and easy to read. The R in the acronym stands for repetition. I used this in a couple different ways. I repeated the color scheme throughout by only using blue and orange for the text. This connected the text and made it simple so it would not distract from the action of the drawing. Additionally, I created two schemes of the electronic devices to add repetition. This made the point stronger by letting the audience see various different media that can be used to cyber bully. For the A which stands for alignment this came into play with the text. The title of the picture was centered on the page to draw the eye across that page. The informational text was centered in the box to make it look fuller. The P stand for proximity. This principle is shown with both the text and the drawing. The text and drawings are in close proximity to one another to let the reader see the connection. Since all of the text us close together, they will see that they are connected. Both of the pictures are also closer together to show the viewer that they are connected and show the same idea.
While I was creating this drawing I had to keep my audience in mind. Since cyber bullying mainly affects teens, that was my target audience for this project. Specifically the age range from 13-16. Because this was my audience I wanted to create a drawing that would appeal to them. To do this I used the bright colors of the text to first catch their attention. Once I had their attention, I wanted them next to look at the picture. The intent of the picture was to be slightly comical due to the unrealistic nature of what was happening. Of course a cell phone is not going to sprout an arm from the screen and you will never see a computer gobbling up a student, but I wanted it to be interesting for my audience to look at. I thought that teenagers would find this illustration funny but still see the connection it has with the actual argument that cyber bullying is very harmful.
When it came time for the class presentations, I was excited to see what everyone else had done for their project. In the end, I was disappointed; I had set my expectations too high since the presentations were only showing the works in progress. I expected there to be more diversity in the types of visuals created. In the end the visuals were predominantly pictures and posters. I would have liked to see some videos. If I were to do this project again, I would have created a video to add more diversity to what was created in the class. Additionally, the feedback I got in class was very helpful in creating a finalized version of my visual argument. When I presented in class the clarity of my image was not excellent. For the final product I enhanced the clarity by taking a picture of my drawing instead of scanning it.
While this project was frustrating at the beginning, in the end it was enjoyable to create. My decision to create a drawing allowed me to create a visually pleasing, effective visual argument. When creating this drawing I had my audience in mind and that allowed me to create something that would catch a teen’s attention and still get my message across to them. I incorporated the C.R.A.P. principles into my design to create something that is easy to look at and make sense to the viewer. In the end, I got good feedback about my argument and learned that I needed to enhance the clarity of my image. For my final product the clarity was enhanced to make every element clear and easy to see. In the end I wish there would have been more diversity in the projects throughout the class, but it was still interesting to see how everyone turned an argument into a visual argument.
project 1 for portfolio
Michelle Chiodi
Major: Chemical Engineering
Citation style: varies based on journal
(1) Love, C.J. Integrated Process Design for Single Cell Analytical Technologies. AIChE Journal. 2010; 56: 2496-2501.
The articles from the AIChE journal appear to contain a lot of jargon. Someone from outside of the chemical engineering field might not be able to understand some terms. Certainly someone from outside of the science world would be lost trying to read one of these articles. I read an article titled Integrated Process Design for Single-Cell Analytical Technologies. This article was difficult for me to understand let alone someone outside of the field. From this I can gather that the audience for this article would be an upper level professional in chemical engineering or a related field. Within this article there are many citations that follow a format the looks similar to APA. This article contains a couple pictures to enhance and clarify the author’s points. Each picture contains a caption to explain what the picture is illustrating.
(2) Calloway, T.B. Energy Research: Following the Money. Chemical Engineering Progress. 2010; 106: 53-55.
The article in the Chemical Engineering Progress journal was far easier to read than those appearing in the AIChE journal. Jargon was not common throughout the text therefore making this article more accessible and relevant to the average person. This would lead me to believe that this journal has a broader audience which likely reaches from graduate students to professionals and professors. Included in this article are charts and graphs which are used to give supplemental information to further the author’s points. Like the AIChE journal, this journal also follows a citation style similar to APA. Numbers are used within the text to refer to a reference listed at the end. In this journal, the references at the end show the author’s name and volume number in bold. This article discusses many aspects of energy research. It explores where the funding for this research comes from and what aspects of energy research are being conducted.
(3) Zei, D. and Rogers, T. personal interview, September 16, 2010.
I conducted an interview with David Zei, a professor in chemical engineering, to gather more information about the writings in our field. Professor Zei invited another professor, Dr. Rogers, to join this interview. Dr. Rogers has published many works in chemical engineering journals so he gave me incredible information about the writing style, formatting, and citation commonly used. Something I found to be very interesting is that the citation style used depends on which journal you are publishing your work to. Some journals use a long reference style while others use a shorter style. In either style all of the references are assigned numbers and the number appears in the text as a superscript after the information cited from that source. Dr. Rogers gave me two of his articles that have been published in journals and tables, figures, and equations are numerous throughout. During the interview Professor Zei and Dr. Rogers said that visuals are very common in chemical engineer’s writing. The articles I received from Dr. Rogers were published in the Journal of Chemical & Engineering Data and a journal called Fluid Phase Equilibria. These are two common journals in chemical engineering. Professor Zei also said that the AIChE journal is very commonly read. Dr. Rogers said that it would be very hard for someone outside of chemical engineering to understand the articles commonly published. They are very dense and contain terms specific to our field. For this reason there is a specific audience for the journals. It is mainly professors and researchers who would read these articles. David Zei’s email is zei@mtu.edu and Dr. Roger’s email is tnrogers@mtu.edu.
Michelle Chiodi
Shampa Bhattacharyya
UN 2001
24 September 2010
Annotated Bibliography Reflection
When this project was first introduced I really didn’t think I would learn that much or that it would be very interesting. I thought the journal articles would all be above my head and not particularly interesting to me. The interview seemed to promise to be boring and to the point. However, working through this project my expectations were shattered; the journals were hard to read but still interesting and the interview was far from boring or ordinary.
I started off by setting up an interview with my Fundamentals of Chemical Engineering teacher, David Zei. He said he thought he had some good perspective that he could offer for this project and he did not disappoint with that statement. When I arrived at the interview, Professor Zei had invited another professor, Dr. Rogers to share his insight as well. Both Professor Zei and Dr. Rogers have published various works in chemical engineering journals so they had a lot of good information to offer. I was surprised when they told me that there is no set citation style for chemical engineering; it simply depends on the journal you are writing for. While there is no definite style, most of the citations you see in journals are similar to APA style. Prior to the interview I had read a couple journal articles so I was not surprised to find out that it is very typical for the articles to be dense and sometimes hard to understand. Another thing that I expected to hear was that visuals are often used in writings. This came as no surprise to me because I had seen some journal articles and done writing for engineering classes were charts, graphs, and equations were expected.
Working through this project helped me accomplish some of the goals of this class. This project gave me experience with the most basic goals of this class: to understand the process of creating written communication and to practice revising work. I got practice with the process of written communication by first submitting a proposal, then creating a rough draft and proofreading that draft myself, then submitting that draft for peer review, and then finally submitting it for a graded review by the teacher. That graded draft was returned with comments to help me improve my final paper. While understanding and practicing the process of creating written communication, I also got practice revising my work. After I created my very first draft, I revised this draft myself before it was peer reviewed. When I got the paper back from the peer review I revised the paper once more before submitting it as my final paper. Another goal that I accomplished by writing this paper was to understand how the target audience can shape a writer’s work. When talking with Dr. Rogers and Professor Zei they talked about how they have a target audience and they write for that audience. Their purpose is to convey the findings of their research to their audience in a clear, concise manner.
The style of the writing in chemical engineering is on a high level. For those outside of my major they might perceive the style and conventions to be above their level depending on their field. The writings in chemical engineering are academic and technical so someone outside of my major my feel like the writing is not for them. Chemical engineers have a specific audience and the writings are not intended for the general public. By creating an annotated bibliography the reader can better understand the style and the content of the information contained in the full source. This can be helpful to sense if the source is something that is on your level and that you would like to read.
Overall this project was enjoyable and I thought it was a good first project to start off with since it was not too strenuous. The interview was very enjoyable and allowed me to get to know my professor better and even meet a new professor that I will have in the future. I enjoyed reading the journal articles as well. It gave me a glimpse of what I may be doing in the future and exposed me to a style of writing that I am not that familiar with. In the end, this project proved my initial expectations to be incorrect and I enjoyed learning more about the writing style in chemical engineering.
Major: Chemical Engineering
Citation style: varies based on journal
(1) Love, C.J. Integrated Process Design for Single Cell Analytical Technologies. AIChE Journal. 2010; 56: 2496-2501.
The articles from the AIChE journal appear to contain a lot of jargon. Someone from outside of the chemical engineering field might not be able to understand some terms. Certainly someone from outside of the science world would be lost trying to read one of these articles. I read an article titled Integrated Process Design for Single-Cell Analytical Technologies. This article was difficult for me to understand let alone someone outside of the field. From this I can gather that the audience for this article would be an upper level professional in chemical engineering or a related field. Within this article there are many citations that follow a format the looks similar to APA. This article contains a couple pictures to enhance and clarify the author’s points. Each picture contains a caption to explain what the picture is illustrating.
(2) Calloway, T.B. Energy Research: Following the Money. Chemical Engineering Progress. 2010; 106: 53-55.
The article in the Chemical Engineering Progress journal was far easier to read than those appearing in the AIChE journal. Jargon was not common throughout the text therefore making this article more accessible and relevant to the average person. This would lead me to believe that this journal has a broader audience which likely reaches from graduate students to professionals and professors. Included in this article are charts and graphs which are used to give supplemental information to further the author’s points. Like the AIChE journal, this journal also follows a citation style similar to APA. Numbers are used within the text to refer to a reference listed at the end. In this journal, the references at the end show the author’s name and volume number in bold. This article discusses many aspects of energy research. It explores where the funding for this research comes from and what aspects of energy research are being conducted.
(3) Zei, D. and Rogers, T. personal interview, September 16, 2010.
I conducted an interview with David Zei, a professor in chemical engineering, to gather more information about the writings in our field. Professor Zei invited another professor, Dr. Rogers, to join this interview. Dr. Rogers has published many works in chemical engineering journals so he gave me incredible information about the writing style, formatting, and citation commonly used. Something I found to be very interesting is that the citation style used depends on which journal you are publishing your work to. Some journals use a long reference style while others use a shorter style. In either style all of the references are assigned numbers and the number appears in the text as a superscript after the information cited from that source. Dr. Rogers gave me two of his articles that have been published in journals and tables, figures, and equations are numerous throughout. During the interview Professor Zei and Dr. Rogers said that visuals are very common in chemical engineer’s writing. The articles I received from Dr. Rogers were published in the Journal of Chemical & Engineering Data and a journal called Fluid Phase Equilibria. These are two common journals in chemical engineering. Professor Zei also said that the AIChE journal is very commonly read. Dr. Rogers said that it would be very hard for someone outside of chemical engineering to understand the articles commonly published. They are very dense and contain terms specific to our field. For this reason there is a specific audience for the journals. It is mainly professors and researchers who would read these articles. David Zei’s email is zei@mtu.edu and Dr. Roger’s email is tnrogers@mtu.edu.
Michelle Chiodi
Shampa Bhattacharyya
UN 2001
24 September 2010
Annotated Bibliography Reflection
When this project was first introduced I really didn’t think I would learn that much or that it would be very interesting. I thought the journal articles would all be above my head and not particularly interesting to me. The interview seemed to promise to be boring and to the point. However, working through this project my expectations were shattered; the journals were hard to read but still interesting and the interview was far from boring or ordinary.
I started off by setting up an interview with my Fundamentals of Chemical Engineering teacher, David Zei. He said he thought he had some good perspective that he could offer for this project and he did not disappoint with that statement. When I arrived at the interview, Professor Zei had invited another professor, Dr. Rogers to share his insight as well. Both Professor Zei and Dr. Rogers have published various works in chemical engineering journals so they had a lot of good information to offer. I was surprised when they told me that there is no set citation style for chemical engineering; it simply depends on the journal you are writing for. While there is no definite style, most of the citations you see in journals are similar to APA style. Prior to the interview I had read a couple journal articles so I was not surprised to find out that it is very typical for the articles to be dense and sometimes hard to understand. Another thing that I expected to hear was that visuals are often used in writings. This came as no surprise to me because I had seen some journal articles and done writing for engineering classes were charts, graphs, and equations were expected.
Working through this project helped me accomplish some of the goals of this class. This project gave me experience with the most basic goals of this class: to understand the process of creating written communication and to practice revising work. I got practice with the process of written communication by first submitting a proposal, then creating a rough draft and proofreading that draft myself, then submitting that draft for peer review, and then finally submitting it for a graded review by the teacher. That graded draft was returned with comments to help me improve my final paper. While understanding and practicing the process of creating written communication, I also got practice revising my work. After I created my very first draft, I revised this draft myself before it was peer reviewed. When I got the paper back from the peer review I revised the paper once more before submitting it as my final paper. Another goal that I accomplished by writing this paper was to understand how the target audience can shape a writer’s work. When talking with Dr. Rogers and Professor Zei they talked about how they have a target audience and they write for that audience. Their purpose is to convey the findings of their research to their audience in a clear, concise manner.
The style of the writing in chemical engineering is on a high level. For those outside of my major they might perceive the style and conventions to be above their level depending on their field. The writings in chemical engineering are academic and technical so someone outside of my major my feel like the writing is not for them. Chemical engineers have a specific audience and the writings are not intended for the general public. By creating an annotated bibliography the reader can better understand the style and the content of the information contained in the full source. This can be helpful to sense if the source is something that is on your level and that you would like to read.
Overall this project was enjoyable and I thought it was a good first project to start off with since it was not too strenuous. The interview was very enjoyable and allowed me to get to know my professor better and even meet a new professor that I will have in the future. I enjoyed reading the journal articles as well. It gave me a glimpse of what I may be doing in the future and exposed me to a style of writing that I am not that familiar with. In the end, this project proved my initial expectations to be incorrect and I enjoyed learning more about the writing style in chemical engineering.
project 2 reflection for Portfolio
Michelle Chiodi
UN 2001
Shampa
10/29/10
Rhetorical Analysis Reflection
When this project was introduced I was excited to begin because I really liked the rhetorical analyses I had read. I thought that this would be a pretty easy project because I had many resources and I planned to use the Everything’s an Argument book extensively. However, once I began I quickly realized it would not be as easy as I initially predicted. I struggled to find an article that was argumentative rather than simply informative like many I read. Eventually I was able to find an article in the New York Times that allowed me to adequately analyze the content and the argument.
Overall I thought the process used for this project was very effective. I began by creating a design plan which made me think through the content of my paper before I began writing it. Laying out my purpose, argument, and rhetorical techniques to analyze proved to be effective. After creating the design plan I commenced writing the paper and again I found myself thinking this process was more difficult than I had expected. I was so stuck in a descriptive mode that I struggled to analyze the content effectively. After submitting the first draft for peer review, the main critique that I got was that I needed to perform more analysis on the content of the article rather than just describe it.
For the second draft we were given question to think about for each of the sections of our essay. This helped my greatly in making the analysis more prevalent. I really enjoyed that our second peer review was done using out class blogs. Since everyone posted their second drafts to their blogs, I took some time to read classmate’s work and see what they had done with their essays. This was very helpful for me to see how others analyzed their articles and this gave me a better idea of how to analyze my article. In the previous draft I had elaborated about the ethos, pathos, and logos the author used and for my second draft I tried to include a better analysis of these aspects. I discussed how these rhetorical techniques add to the overall argument of the author. Because we were given questions to be answered within our essay I was sure to include the answers to those questions in my second draft.
In the end, I think my essay did a good job of analyzing the article I read while still being descriptive enough for the reader to get a sense of the author’s points. The process used for this project was helpful for me. The design plan gave me a foundation on which to build my essay followed by the first draft which gave me an initial sense of what I needed to improve. Next came the second draft where I worked hard to add more analysis to my essay. The feedback I got on my second draft was helpful to let me know that I had enough analysis, but I was lacking context. Because of this I added more background and context to make my final paper well rounded and a good analysis of the article I read for this project.
Without the revision and pre-writing process we used, my paper would not have been as successful as it was. This process allowed me to think though my essay logically and gave me enough time to make the required revisions to my work. While this project was not as easy as I expected, I found it to be enjoyable. It certainly taught me the value of peer reviewing since I got some great advice from my peer reviewers that allowed me to improve my essay greatly. In the end, the process was very effective and it allowed me to create what I think is a great paper.
UN 2001
Shampa
10/29/10
Rhetorical Analysis Reflection
When this project was introduced I was excited to begin because I really liked the rhetorical analyses I had read. I thought that this would be a pretty easy project because I had many resources and I planned to use the Everything’s an Argument book extensively. However, once I began I quickly realized it would not be as easy as I initially predicted. I struggled to find an article that was argumentative rather than simply informative like many I read. Eventually I was able to find an article in the New York Times that allowed me to adequately analyze the content and the argument.
Overall I thought the process used for this project was very effective. I began by creating a design plan which made me think through the content of my paper before I began writing it. Laying out my purpose, argument, and rhetorical techniques to analyze proved to be effective. After creating the design plan I commenced writing the paper and again I found myself thinking this process was more difficult than I had expected. I was so stuck in a descriptive mode that I struggled to analyze the content effectively. After submitting the first draft for peer review, the main critique that I got was that I needed to perform more analysis on the content of the article rather than just describe it.
For the second draft we were given question to think about for each of the sections of our essay. This helped my greatly in making the analysis more prevalent. I really enjoyed that our second peer review was done using out class blogs. Since everyone posted their second drafts to their blogs, I took some time to read classmate’s work and see what they had done with their essays. This was very helpful for me to see how others analyzed their articles and this gave me a better idea of how to analyze my article. In the previous draft I had elaborated about the ethos, pathos, and logos the author used and for my second draft I tried to include a better analysis of these aspects. I discussed how these rhetorical techniques add to the overall argument of the author. Because we were given questions to be answered within our essay I was sure to include the answers to those questions in my second draft.
In the end, I think my essay did a good job of analyzing the article I read while still being descriptive enough for the reader to get a sense of the author’s points. The process used for this project was helpful for me. The design plan gave me a foundation on which to build my essay followed by the first draft which gave me an initial sense of what I needed to improve. Next came the second draft where I worked hard to add more analysis to my essay. The feedback I got on my second draft was helpful to let me know that I had enough analysis, but I was lacking context. Because of this I added more background and context to make my final paper well rounded and a good analysis of the article I read for this project.
Without the revision and pre-writing process we used, my paper would not have been as successful as it was. This process allowed me to think though my essay logically and gave me enough time to make the required revisions to my work. While this project was not as easy as I expected, I found it to be enjoyable. It certainly taught me the value of peer reviewing since I got some great advice from my peer reviewers that allowed me to improve my essay greatly. In the end, the process was very effective and it allowed me to create what I think is a great paper.
Friday, December 3, 2010
reflection rough draft for portfolio
intro
discussion of projects
-rhetorical analysis
-research project
-presentation
-visual argument
conclusion
Composition is a course designed to help students with the writing done in their respective majors. This course taught many different techniques from MLA and APA citation styles, to the main components of rhetoric. Different aspects of developing an argument was discussed and...
The first project was a practice and discovery of the citation style in our major. For this project we had to interview a professor in our major about the citation style used in our major. After the interview, we wrote an annotated bibliography using the citation style described by the professor. Overall, this project was very interesting. I had never interview a professor before and I thought that it was a fun and interesting experience. In the end, I learned a lot about the writings done within Chemical Engineering and how the style of the citation is dictated by the journal it will be published in. Because there was no set style for citation it was difficult for me to write the annotated bibliography that went along with the interview. Luckily I got some pieces of writing that a professor wrote and the citations were shown. I used those citation as an example to base my citation on.
The next project was a change in pace from the first which was more technical. Our second project was a rhetorical analysis in which we had to choose and article and analyze the effectiveness of the authors argument. For this project, I found an article from the New York Times about alternative medicine.
discussion of projects
-rhetorical analysis
-research project
-presentation
-visual argument
conclusion
Composition is a course designed to help students with the writing done in their respective majors. This course taught many different techniques from MLA and APA citation styles, to the main components of rhetoric. Different aspects of developing an argument was discussed and...
The first project was a practice and discovery of the citation style in our major. For this project we had to interview a professor in our major about the citation style used in our major. After the interview, we wrote an annotated bibliography using the citation style described by the professor. Overall, this project was very interesting. I had never interview a professor before and I thought that it was a fun and interesting experience. In the end, I learned a lot about the writings done within Chemical Engineering and how the style of the citation is dictated by the journal it will be published in. Because there was no set style for citation it was difficult for me to write the annotated bibliography that went along with the interview. Luckily I got some pieces of writing that a professor wrote and the citations were shown. I used those citation as an example to base my citation on.
The next project was a change in pace from the first which was more technical. Our second project was a rhetorical analysis in which we had to choose and article and analyze the effectiveness of the authors argument. For this project, I found an article from the New York Times about alternative medicine.
Wednesday, December 1, 2010
project 2 revision for portfolio
Michelle Chiodi
Shampa Bhattacharyya
UN 2001
October 23, 2010
Rhetorical analysis
“In Month of Giving, a Healthy Reward” is an article published in the Health section of the New York Times on November 30, 2009. The article was written by Tara Parker-Pope who claims that alternative medicine can be used to reduce, or even eliminate, the need for conventional medicine. Overall, this article educates the reader about alternative medicine and argues its benefits. Alternative medicine is a controversial issue so Parker-Pope aims to persuade readers by describing a case where alternative medicine was effective and providing statistics to prove a trend of effectiveness. The intended audience of this article is those suffering from an illness who would like to explore alternative medicine, however, the addressed audience for this article is readers of the New York Times, specifically, the Health section where this article appears. This includes educated adult readers, most likely over thirty who are interested in health topics. Through this article Parker-Pope aims at persuading her audience to give alternative medicine a try because, she argues, it can be very beneficial.
Dictionary.com defines alternative medicine as, “healthcare and treatment practices, including traditional Chinese medicine, chiropractic, folk medicine, and naturopathy, that minimize or eschew the use of surgery and drugs” (Alternative Medicine). This is a broad definition of alternative medicine and the specific type examined in this article is the use of gift giving as alternative medicine. The definition given is helpful because it relates closely with the argument that Parker-Pope makes.
To understand the argument that the author makes, it is important to understand the background and context. Upon visiting Parker-Pope’s website it is apparent that she is an avid writer who writes about living a healthy lifestyle and often gives readers tips on how to improve their life (Tara Parker-Pope). If a reader knew this, they would be able to predict that Parker-Pope would argue the health benefits of alternative medicine. Not much background knowledge is needed to understand the context of this article since Parker-Pope describes the type of alternative medicine used. For the reader to fully understand the context of the article, they should know that the use of alternative medicine is controversial. Like Parker-Pope, many believe that alternative medicine can be used as a supplement to conventional medicine in order to make a patient feel better about their situation. Others believe that alternative medicine is downright dangerous. As Daniel Marshman states on the Institute of Idea’s Culture Wars website, “The lack of scientific research means alternative medicine is harmful” (Marshman).
Throughout the article, word choice is used as an emotional appeal. In general, the topic evokes a lot of emotion because this is a controversial topic and alternative medicine is often recommended for sufferers of severe illnesses. Cami Walker is the main subject of the article and words like “pain”, “preoccupation”, and “plummeted” are used in the beginning of the article to describe her struggle with multiple sclerosis (Parker-Pope). These words evoke sadness and sometimes even fear. The author then goes on to describe how a 29 day project of gift giving has turned Walker’s outlook and symptoms around. In the latter part of the article, words like “positive”, “greater meaning”, and “benefit” are used to convey a change for the better within Cami (Parker-Pope). These words are used as pathos to make the reader feel good about what has happened to Cami. The transition from negative words to positive words is very effective. This triggers a correlation in the readers mind between the positive words and the effectiveness of alternative medicine. Readers will relate the happy, positive emotions with the use of alternative medicine.
While Parker-Pope uses pathos effectively she adds depth to her argument with logos. After she has made the appeal to the reader’s emotions, Parker-Pope proceeds to make various logical appeals. She calls to reference many studies that have been done showing the effectiveness of alternative medicine on improving morale and lessening symptoms. One such study used volunteering as the alternate form of medicine. This study showed that during the span of examination, those involved in the study were 44% less likely to die. A correlation was also found in a study mentioned in this article between self-centeredness and heart disease severity. Subjects who talked about themselves more, performed worse on treadmill test and showed more severe heart symptoms (Parker-Pope). By pointing these studies out, the author is showing the reader that others believe her point of view as well. She is giving her audience the solid evidence on which her argument is based. Readers will see these statistics and want to experience that favorable outcome seen in the studies.
While the content of the studies was convincing they can be backed up with credibility as well. Many of the studies were performed at recognizable, highly acclaimed universities. A study was conducted at Boston College which is seen as a credible conductor of studies and a widely known university. Other studies referenced in this article appeared in various academic journals like Psychology Today and Psychosomatic Medicine (Parker-Pope). Studies published in academic journals like these have to be convincing to be published. The fact that all of the studies referenced in this article come from credible sources show that there is trustworthy, factual basis for the argument and it is not just an appeal to the emotions. Not only do the articles come from reliable sources but all of the sources are linked within the article. While reading this article, one can click on the links within the text to see for themselves the facts that are presented. This shows that the author is not trying to skew any of the studies or statistics presented in the article.
While the author develops the ethos, pathos, and logos of the argument well, she lacks reference to the opposition. There are a lot of people who believe alternative medicine is not useful and even harmful and it would have made a more convincing argument to refute the opposition. A rebuttal to the opposition is not wholly lacking, however. There is a quote from Walker that addresses the opposition, “My first reaction was that I thought it was an insane idea. But it has given me a more positive outlook on life. It’s about stepping outside of your own story long enough to make a connection with someone else” (Parker-Pope). By having Walker admit that the idea of alternative medicine was “an insane idea,” Parker-Pope is addressing the fact that there are many skeptics of non-conventional medicine. There are many opposing view to alternative medicine so for a negation of the opposition to be nearly nonexistent is inexcusable.
Overall, ethos, pathos, and logos are present in good proportion in this article. The author does a great job of backing up the emotional appeals she makes with solid facts from trustworthy sources. All of the studies presented in this article are from credible and even impressive sources. While the author lacks a refute to the opposition, she still managed to craft a well balanced argument that is very convincing and shows many benefits to alternative medicine. In the end, many readers will be convinced that alternative medicine can reduce or eliminate the need for conventional medicine.
Works Cited
Alternative Medicine. Dictionary.com, 2010. Web. 19 Oct. 2010.
Marshman, Daniel. Culture Wars. Institute of Ideas, 2002. Web. 10 Oct. 2010.
Parker-Pope, Tara. “In Month of Giving, a Healthy Reward.” New York Times. New York Times, 30 Nov. 2009. Web. 6 Oct. 2010.
Parker-Pope, Tara. Tara Parker-Pope. Personal website. 2010. Web. 23 Oct. 2010.
Shampa Bhattacharyya
UN 2001
October 23, 2010
Rhetorical analysis
“In Month of Giving, a Healthy Reward” is an article published in the Health section of the New York Times on November 30, 2009. The article was written by Tara Parker-Pope who claims that alternative medicine can be used to reduce, or even eliminate, the need for conventional medicine. Overall, this article educates the reader about alternative medicine and argues its benefits. Alternative medicine is a controversial issue so Parker-Pope aims to persuade readers by describing a case where alternative medicine was effective and providing statistics to prove a trend of effectiveness. The intended audience of this article is those suffering from an illness who would like to explore alternative medicine, however, the addressed audience for this article is readers of the New York Times, specifically, the Health section where this article appears. This includes educated adult readers, most likely over thirty who are interested in health topics. Through this article Parker-Pope aims at persuading her audience to give alternative medicine a try because, she argues, it can be very beneficial.
Dictionary.com defines alternative medicine as, “healthcare and treatment practices, including traditional Chinese medicine, chiropractic, folk medicine, and naturopathy, that minimize or eschew the use of surgery and drugs” (Alternative Medicine). This is a broad definition of alternative medicine and the specific type examined in this article is the use of gift giving as alternative medicine. The definition given is helpful because it relates closely with the argument that Parker-Pope makes.
To understand the argument that the author makes, it is important to understand the background and context. Upon visiting Parker-Pope’s website it is apparent that she is an avid writer who writes about living a healthy lifestyle and often gives readers tips on how to improve their life (Tara Parker-Pope). If a reader knew this, they would be able to predict that Parker-Pope would argue the health benefits of alternative medicine. Not much background knowledge is needed to understand the context of this article since Parker-Pope describes the type of alternative medicine used. For the reader to fully understand the context of the article, they should know that the use of alternative medicine is controversial. Like Parker-Pope, many believe that alternative medicine can be used as a supplement to conventional medicine in order to make a patient feel better about their situation. Others believe that alternative medicine is downright dangerous. As Daniel Marshman states on the Institute of Idea’s Culture Wars website, “The lack of scientific research means alternative medicine is harmful” (Marshman).
Throughout the article, word choice is used as an emotional appeal. In general, the topic evokes a lot of emotion because this is a controversial topic and alternative medicine is often recommended for sufferers of severe illnesses. Cami Walker is the main subject of the article and words like “pain”, “preoccupation”, and “plummeted” are used in the beginning of the article to describe her struggle with multiple sclerosis (Parker-Pope). These words evoke sadness and sometimes even fear. The author then goes on to describe how a 29 day project of gift giving has turned Walker’s outlook and symptoms around. In the latter part of the article, words like “positive”, “greater meaning”, and “benefit” are used to convey a change for the better within Cami (Parker-Pope). These words are used as pathos to make the reader feel good about what has happened to Cami. The transition from negative words to positive words is very effective. This triggers a correlation in the readers mind between the positive words and the effectiveness of alternative medicine. Readers will relate the happy, positive emotions with the use of alternative medicine.
While Parker-Pope uses pathos effectively she adds depth to her argument with logos. After she has made the appeal to the reader’s emotions, Parker-Pope proceeds to make various logical appeals. She calls to reference many studies that have been done showing the effectiveness of alternative medicine on improving morale and lessening symptoms. One such study used volunteering as the alternate form of medicine. This study showed that during the span of examination, those involved in the study were 44% less likely to die. A correlation was also found in a study mentioned in this article between self-centeredness and heart disease severity. Subjects who talked about themselves more, performed worse on treadmill test and showed more severe heart symptoms (Parker-Pope). By pointing these studies out, the author is showing the reader that others believe her point of view as well. She is giving her audience the solid evidence on which her argument is based. Readers will see these statistics and want to experience that favorable outcome seen in the studies.
While the content of the studies was convincing they can be backed up with credibility as well. Many of the studies were performed at recognizable, highly acclaimed universities. A study was conducted at Boston College which is seen as a credible conductor of studies and a widely known university. Other studies referenced in this article appeared in various academic journals like Psychology Today and Psychosomatic Medicine (Parker-Pope). Studies published in academic journals like these have to be convincing to be published. The fact that all of the studies referenced in this article come from credible sources show that there is trustworthy, factual basis for the argument and it is not just an appeal to the emotions. Not only do the articles come from reliable sources but all of the sources are linked within the article. While reading this article, one can click on the links within the text to see for themselves the facts that are presented. This shows that the author is not trying to skew any of the studies or statistics presented in the article.
While the author develops the ethos, pathos, and logos of the argument well, she lacks reference to the opposition. There are a lot of people who believe alternative medicine is not useful and even harmful and it would have made a more convincing argument to refute the opposition. A rebuttal to the opposition is not wholly lacking, however. There is a quote from Walker that addresses the opposition, “My first reaction was that I thought it was an insane idea. But it has given me a more positive outlook on life. It’s about stepping outside of your own story long enough to make a connection with someone else” (Parker-Pope). By having Walker admit that the idea of alternative medicine was “an insane idea,” Parker-Pope is addressing the fact that there are many skeptics of non-conventional medicine. There are many opposing view to alternative medicine so for a negation of the opposition to be nearly nonexistent is inexcusable.
Overall, ethos, pathos, and logos are present in good proportion in this article. The author does a great job of backing up the emotional appeals she makes with solid facts from trustworthy sources. All of the studies presented in this article are from credible and even impressive sources. While the author lacks a refute to the opposition, she still managed to craft a well balanced argument that is very convincing and shows many benefits to alternative medicine. In the end, many readers will be convinced that alternative medicine can reduce or eliminate the need for conventional medicine.
Works Cited
Alternative Medicine. Dictionary.com, 2010. Web. 19 Oct. 2010.
Marshman, Daniel. Culture Wars. Institute of Ideas, 2002. Web. 10 Oct. 2010.
Parker-Pope, Tara. “In Month of Giving, a Healthy Reward.” New York Times. New York Times, 30 Nov. 2009. Web. 6 Oct. 2010.
Parker-Pope, Tara. Tara Parker-Pope. Personal website. 2010. Web. 23 Oct. 2010.
revisions to Project 3 for portfolio
Michelle Chiodi
Shampa
UN 2001
November 21, 2010
Cyber Bullying: A New Breed of Bullies?
“Lisa is ugly, everyone hates her,” “Johnny has no friends, what a loser,” “Look at Natalie’s outfit, what was she thinking?” Do these phrases sound familiar? They do to the many students who are bullied. About a decade ago, bullying was one of the largest forms of violence in our country. These days however, those insults might be considered “old school.” It seems that in the digital boom of the 21st century everything is making a transition from the real, tangible world to a virtual world. Bullying is not excluded from this. With the transition to a digital social network comes a new mentality for users, one where they may feel as if there are no consequences for their actions. This report will show how the digital media has created a new breed of bully and help the reader understand what is being done and what still needs to be done to combat the threat of cyber bullying.
Before the technology boom at the turn of the 21st century, most bullying took place on school grounds. In 2003, it was found that bullying was the most common type of violence in the US, with up to 30% of students being victims of bullies (Canter). This survey was conducted at a time before cyber bullying was prevalent, and before Myspace and Facebook were even created. No matter how severe these facts sound, the reality is that it has gotten worse. With the coming of the technology age that we are living in, the opportunity for bullies to attack is ever-present and expanding. Bullyingstatistics.org shows statistics from the i-SAFE foundation that say, “Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying” (Cyber). This evidence is staggering; this means that nearly 100% of students are affected by cyber bullying. This is a drastic increase from the 30% who reported being affected by traditional bullying. Because of this, it is apparent that cyber bullying is more widespread than traditional bullying and is a cause in the creation of an even harsher bully.
Not only has the occurrence of bullying greatly increased, but the demographic of the bullies and victims has changed. Unlike today, there was no standout in gender for victims of traditional bullying. Girls and boys were about equally bullied (Kusel). Different from traditional bullying, it has been found that females are more likely to be bullied and to bully in cyberspace (Li). This means that the content of the threats or violence will differ from previous incidents. Most girls know that other girls can be vicious; they talk behind each others’ backs, gossip, and spread rumors. With the addition of technology, these rumors and gossip can be spread much faster and this is a contributing factor to a more cruel style of bullying.
In recent years, the venue for bullies has expanded from school and the playground to the web. Technology has created various new forms of bullying which creates more danger for more people. Bullies are turning to e-mail, instant messaging, Web sites, online voting sites, and chat rooms to harass their victims (Beale). For victims, this makes escaping the torment increasingly difficult because technology and social networking is now seen as an integral part of teenage life. Unlike schoolyard bullying, cyber bullying can be conducted through various types of media which presents a new set of concerns for the targets (Li). Young victims are being exposed to media far too grotesque for their age (Li). Nowadays, victims are sometimes plagued with pornographic images or provocative photos of themselves, real or fake, seen by many. These are things that were not even possible in the age of traditional bullying and are undoubtedly far more embarrassing and degrading.
New digital media allows the humiliation created by bullying to be more widespread. Many schools across the country are seeing the adverse affects that the integration of the Internet into daily lives is having on bullying. In a school in California, students posted scathing rumors and racist comments to the website www.schoolscandals.com (Li). This was so rampant that nearly the entire school of almost 2000 students was affected (School). This is certainly not an isolated case where the bullying reached a large audience. A middle-school boy, Will, from Kansas knows just how tormenting a large audience can be. After he and his girlfriend broke up, the girl created a website to smear Will. She made various threats and vividly described what it would be like if his body were to be ripped apart (Li). Compared to face-to-face bullying, the scale that cyber bullying has reached is outrageous. While traditional bullies may have the lunchroom crowd as their audience, cyber bullies have a limitless audience. For this reason, cyber bullying is much more severe than traditional bullying.
While the occurrence of bullying has increased with the addition of technology, that is not the only factor leading to a harsher style of bullying. Bullies feel safe when they are attacking on the Internet. They feel that they are anonymous; therefore, no one will know what they say in a cyber world (Beale). Not only do internet users feel a sense of anonymity, but they can also pose as other users. It is simple for a user to log on as someone else or use a non-identifying screen name. Even if the owner of a screen name is identified, that user can simply blame someone else for using their screen name (Beale). This makes it exceedingly difficult to identify the tormenter solely based on their screen name. Because cyber bullies can pose as others and feel anonymous, this causes the bully to be more mean-spirited and say things they would never say to a person face-to-face (Beale). With schoolyard bullying, bullies were deterred by teachers or other supervisors in fear of being caught. Today, however, the Internet does not have those teacher or supervisor figures, so bullies feel like they have free rein. On a prevention website stopcyberbullying.org it states that, “Cyberbullying is limited only by the imaginations and bandwidths of kids” (STOP). This means that today’s bullies essentially have no limits, no inhibitions, and the power to severely terrorize their victims.
While the level of fear decreases for the bullies themselves, the level of fear for the victim increases. In the cyber world, the attacks are more vicious and the victim could have no idea who the attacker is, leading to great trepidation (Beale). Unlike traditional bullying where a teacher or other student could see an incident, if the victim doesn’t stand up for them self or doesn’t report the aggressor, no one will know it is going on. A victim can be cyber bullied while a parent, for example, is sitting in the room right next to the victim and the bystander can remain completely unaware of what is happening. As Beale and Hall state, “A tormentor can get into a victims’ home, harassing him or her while parents sit comfortable in the next room” (Beale 9). Obviously, something like this could never happen with traditional bullying because the bystander would be able to see or hear the violence or threat. Since the new breed of bullies feels safer hiding in cyberspace, they are more brazen in their attacks.
Because cyber bullying is so much more widespread and severe than traditional bullying, new preventative measures and punishments are being sought by social networking sites and school officials alike. Facebook is one of the most common social networking sites in use today. Many teens use this site and, of course, this presents the threat of cyber bullying. Facebook takes this issue seriously. There is a section in their Help Center that addresses cyber bullying and provides tips to prevent it and ways to respond to and report it (Safety). Many good tips are given for safe use of Facebook, which includes using privacy settings to restrict viewers, accepting friend requests only from people you know, and blocking and/or reporting abusive users (Safety). It is policies and preventative measures like these that can make users safer.
However, a problem lies in the fact that these measures may not be sought out by the users who need them. They may not even be aware of the existence of such measures. To find these tips, users must first realize that they need to search in the Help Center. Once in the Help Center it is not obvious where to go from there since there are many different links to choose from. The process to get to the information about teens and cyber bullying can be confusing and requires the user to click many different links before finally arriving at the desired information. Some users may get fed up with this and abort their search before they find any useful information. If Facebook truly is committed to making their site free from cyber bullying, they need to make preventative information more accessible and make it know that the information exists.
The way Facebook handles reports may be disappointing to the victim as well. It is safe to guess that the victim would want the abuser to be removed from the site so they can’t bully them or anyone else again. If the victim reports the bully, Facebook administrators will look at the report and determine what to do. In all cases, the reported content is removed, but in some cases, the bully is actually banned from the site. Sadly, there seems to be very few cases where the abuse is deemed bad enough to warrant the bully actually being banned from the site (Safety). For Facebook to be seen as a site that is committed to stopping cyber bullying, they need to be harsher with their response to reports. Facebook should give the reported user one warning after an initial report, and then if abusive behavior continues, the user’s account should be terminated. This would show that Facebook is taking a strong stance against cyber bullies and wants to protect its users.
Facebook is surely not the only entity taking precautions. Many schools and other websites are taking measures to prevent and prosecute offenders. Schools are developing policies for dealing with reports of cyber bullies and trying to be more proactive in the prevention. It can be seen on the socialsafety.org website that many states are passing legislation to protect students from cyber bullying. The bills that these states are passing require local school districts within the state to add cyber bullying policies to their acceptable use document (Laws). Most of the legislation documented on this site was enacted in 2006 or 2007, and only applies to incidents occurring on campus. More recently, however, a standard has been set that applies to off campus issues (Trager).
While schools are developing cyber bullying prevention and punishment policies they still face a Catch-22 in dealing with cyber bullying. On one hand, those prosecuted argue that their First Amendment rights are being violated. However, on the other hand, if schools don’t prosecute the offenders, they can be held liable for the damages to the victims, even for cases occurring off-campus (Trager). Due to this tricky situation, schools are beginning to apply what is known as the Tinker Standard to cyber bullying. As Trager states in his article New Tricks for Old Dogs: The Tinker Standard Applied to Cyber-Bullying, the Tinker Standard states that students have a right, “to be free from a substantial disruption,” and when this right is violated, schools are permitted intervene in the situation (Trager). By applying the Tinker Standard, schools can punish cyber bullies if it is found that the act, whether performed on or off campus, created significant disruption within the school and its grounds. This standard protects the schools from being accused of violating students First Amendment rights and allows schools to punish incidents that occurred off campus (Trager).
While it is a step in the right direction that schools are creating cyber bullying policies, something more appealing to students needs to be done. Schools’ cyber bullying policies are stated in their Acceptable Use statements. However, it is very unlikely that a student would read this or any section of their handbook. Even if they did read it, they would most likely soon forget and disregard it. For this reason, more sites like athinline.org need to be created and promoted. This site is dedicated to teens, and challenges them to draw the line between digital use and digital abuse (A Thin Line). Because teens have such a large presence online, fighting cyber bullying online makes sense. This website provides interactive activities, quizzes, and videos. A Thin Line has even partnered with MTV to offer incentives to users like a trip to the 2011 Video Music Awards. It even has stars from MTV shows appearing in videos aiming to prevent and educate students on cyber bullying (A Thin Line). More of this is needed. We are living in a digital revolution, therefore it makes sense to create prevention sites that teens are eager to log onto and are interactive, as opposed to reading about cyber bullying from their school.
By examining the techniques and occurrences of cyber bullying, traditional bullying begins to look almost innocent. New media provides a much larger scale for which cyber bullies can torment and harass. The number of ways bullying may be carried out has increased dramatically since the introduction of new media. Bullies use e-mail, social networking sites, broadcasting sites, and instant messaging to intimidate on a whole new level. Because digital media is now being used, the audience for bullying is limitless; the Internet is a vast resource. The level of secrecy that comes with the Internet allows bullies to be more brazen and less fearful of being caught. At the same time, this creates a greater fear for victims since they may feel isolated. If they do not know the identity of the bully, the victim may feel hopeless in any punishment being given. In the end, the creation of a new breed of bully is demanding the development of new preventative and disciplinary measures. While some things have been done, more still needs to be done to keep students out of harm’s way.
.
Works Cited
A Thin Line. athinline.org. 7 October 2009. Web. 14 November 2010.
Beale, Andrew V., and Kimberly R. Hall. “Cyberbullying: What School Administrators (and Parents) Can Do.” Wilson Web. Web. 3 November 2010.
Canter, Andrea and Andrea Cohn. Bullying: Facts for Schools and Parents. National Association of School Psychologists, 7 October 2003. Web. 3 November 2010.
Cyber Bullying Statistics. Bullyingstatistics.org, 2009. Web. 20 November 2010.
Kusel, Sara J., David G. Perry , and Louise C. Perry. “Victims of Peer Aggression.” Wilson Web. Web. 3 November 2010.
Laws Against Cyberbullying. Socialsafety.org, 2008. Web. 14 November 2010.
Li, Qing. “New bottle but old wine: A research of cyberbullying in schools.” Academic OneFile. Web. 3 November 2010.
Safety for Teens. Facebook, 2010. Web. 4 November 2010.
School Profile 2010-2011. Calabasas High School, 2010. Web 4 November 2010.
STOP cyberbullying: Cyberbullying-what it is, how it works and how to understand and deal with cyberbullies.stopcyberbullying.org. Web. 4 November 2010.
Trager, Guffy B. “New Tricks for Old Dogs: The Tinker Standard Applied to Cyber-Bullying.” Wilson Web. Web. 14 November 2010.
Wednesday, November 17, 2010
Understanding Multimodality
This articles brings up many good points about modality. Living in a society that demands the use of technology, I think that multi modal composition is something that should be taught in all composition classes. We are surrounded by multi modal composition each day so why not learn how to be an effective producer of it and not just a consumer. Teaching this in classrooms will give students the benefit of learning what communication is like in the real world. Throughout a day we come in contact with so many different forms of communication like TV, email, cell phones, magazines, billboards, etc, that not teaching about these things in a class is limiting to students. While it is important to learn about how one can make an argument perhaps more clearly and effectively using media other than text, it is important that students don't get lost in technology. Students need to learn about the different media available for their use, but at the same time realize that they can't hide behind that media and loose their sense of self. It is difficult to be a productive member of society without interpersonal skills.
Monday, November 15, 2010
Project 3- Draft 2
Michelle Chiodi
Shampa
UN 2001
November 15, 2010
Cyber Bullying: A New Breed of Bullies?
“Lisa is ugly, everyone hates her,” “Johnny has no friends, what a loser,” “Look at Natalie’s outfit, what was she thinking?” Sound familiar? They do to the many students who are bullied. About a decade ago bullying was one of the largest forms of violence in our country. These days however, those insults might be considered “old school.” It seems that in the digital boom of the 21st century everything is making a transition from the real, tangible world to a virtual world. Bullying is not excluded from this. With the transition to a digital social network comes a new mentality for users, one where they may feel as if there are no consequences for their actions. This report will show that the digital media has created a new breed of bully and help the reader understand what is being done and what still needs to be done to combat the threat of cyber bullying.
Before the technology boom of the mid 21st century most bullying took place on school grounds. In 2003 it was found that bullying was the most common type of violence in the US with 15%-30% of students being victims or bullies (Canter). On the National Association of School Psychologists website it states that, “A [2003] report from the American Medical Association on a study of over 15,000 6th-10th graders estimates that approximately 3.7 million youths engage in, and more than 3.2 million are victims of, moderate or serious bullying each year (Canter).” Often the victims are insecure, passive, won’t retaliate, and are physically weaker than the aggressor (Canter). While these characteristics are not exclusive to traditional bullies, the bullies of today go far beyond traditional bullies.
Tradition school yard bullying is often described as systematic physical or verbal persecution. It has been found that bullying in schools is less likely when more teachers or supervisor are present. Unlike today, there was no standout in gender which was more likely to be bullied before the technology boom, girls were bullied about equally as much as boys (Kusel). These facts serve as good standards to compare the bullying of the cyber age to.
With the addition of digital media the realm of bullying goes far beyond physical and verbal harassment. Visual harassment such as posting defamatory, embarrassing videos or photo shopped pictures is becoming increasingly common. Unlike spoken words, text exchanged in a virtual world does not disappear. Once something is created in the internet, it is there to stay. Not only has the venue for bullies greatly increased but the demographic of the bullies and victims has changed. Unlike traditional bullying, it has been found that females are more likely to be bullied and to bully in cyberspace (Li). This means that the content of the threats or violence with be different than previous.
In the recent years the venue for bullies has expanded from school and the playground to the web. Technology has created various new forms of bullying which creates more danger for more people. Bullies are turning to e-mail, instant messaging, Web sites, voting booths, and chat rooms to harass their victims (Beale). For victims this makes escaping the tormenting increasingly difficult because technology and social networking is an integral part of teenage life. Unlike school yard bullying, cyber bullying can be conducted through various types of media which presents a new set of concerns for the (Li). Young victims are being exposed to media far too grotesque for their age (Li). Nowadays victims are sometimes plagued with pornographic images or provocative photos of themselves, real or fake, seen by many. These are things that were not even possible in the age of traditional bullying and are undoubtedly far more embarrassing.
Since bullies now have a greater means to bully, the occurrence of bullying has increased greatly since the age of school yard bullying. A study conducted among middle school students showed that 25 percent of females and 11 percent of males reported being cyber bullied at least once in the preceding two months (Beale). This adds to be 36 percent of the population studied that is reporting being bullied. When compared to the previous study mentioned that found at most 30% of students reporting to be bullied or bullies it can be see that the new estimate far higher. This new figure only report those who have been bullied while the old data reported bullies and those bullied. The 36% of those bullied today translate into a far higher estimate when those who are bullies are added in. Because of this it is apparent that cyber bullying is more widespread than traditional bullying and is a cause in the creation of a new, harsher bully.
Beale and Hall’s Cyberbullying: What School Administrators (and Parents) Can Do says, “According to the results of the first national survey on school bullying, 74 percent of eight- to eleven-year-old students reported that bullying and teasing occurred at their schools (Beale).” This survey was conducted at a time before cyber bullying was prevalent, before Myspace and Facebook were even created. Thinking about this fact is daunting. If the digital boom has increased the prevalence of bullying then it is safe to assume that students seeing bullying and teasing at school is nearing 100 percent.
New digital media allows the humiliation of bullying to be more widespread. In a school in California students posted scathing rumors and racist comments to the website www.schoolscandals.com (Li). This was so rampant that nearly the entire school of almost 2000 students was affected (School). This is certainly not an isolated case where the bullying reached a large audience. A middle-school boy, Will, from Kansas knows just how tormenting a large audience can be. After he and his girlfriend broke up, the girl created a website to smear Will. She made various threats and vividly described what it would be like if his body were to be ripped apart (Li). Compared to face-to-face bullying the scale that cyber bullying has reached is outrageous. While traditional bullies may have the lunchroom crowd as their audience, cyber bullies have a limitless audience. For this reason cyber bullying is much more severe than traditional bullying.
While the occurrence of bullying has increased with the addition of technology, that is not the only factor leading to a harsher style of bullying. Bullies feel safe when they are attacking on the internet. They feel that they can be anonymous therefore no one will know what they say in a cyber world (Beale). Not only do internet users feel a sense of anonymity but they can also pose as other users. It is so simple for a user to log on as someone else or use a non identifying screen name. Even if the owner of a screen name is identified that user can simply blame someone else for using their screen name (Beale). Because cyber bullies can pose as others and feel anonymous this causes the bully to be more mean-spirited and say things they would never say in the face-to-face world (Beale). Cyber bullies hide behind their screen names with little fear of being caught; this leads to more brazen attacks (Beale). With school yard bullying bullies were deterred by teachers or other supersiors in fear of being caught. Today however the internet does not have those teacher or supervisor figures so bullies feel like they have free rein. On a prevention website stopcyberbullying.org it states that, “Cyberbullying is limited only by the imaginations and bandwidths of kids.” This means that today’s bullies essentially have no limits, no inhibitions, and the power to severely torment their victims.
While the level of fear decreases for the bullies themselves, the level of fear for the victim increases. In the cyber world the attacks are more vicious and the victim could have no idea who the attacker is, leading to great trepidation (Beale). Unlike traditional bullying where a teacher or other student could see an incident, if the victim doesn’t stand up for them self or doesn’t report the aggressor, no one will know it is going on. A student can be cyber bullied while someone is sitting right next to the victim and the bystander can remain completely unaware of what is happening. As Beale and Hall state, “A tormentor can get into a victims’ home, harassing him or her while parents sit comfortable in the next room (Beale).”
In the news recently there have been an increasing number of reports of cyber bullying even some cases where the bullying has been so extreme it leads the victim to suicide. Most recent is the story of Tyler Clementi, a Rutgers freshman who was tormented to an extreme. Tyler was a reserved student who was victimized by his roommate. The roommate video taped an intimate encounter between Tyler and another student and streamed this video to the internet for the whole world to see. Understandably, Tyler was extremely humiliated by this. Just days after the video was posted, Clementi jumped off the George Washington Bridge to his death (Tyler). This is an extreme and horrifying example of cyber bullying but the reality of the situation is that cyber bullying is becoming more brutal and more widespread. Stories like Tyler’s are becoming all too common and this call into question what measures are being taken to prevent cyber bullying.
Because cyber bullying is so much more widespread and severe than traditional bullying, new preventative measures and punishments are being sought by many. Facebook is one of the most common social networking sites in use today. Many teens use this site and of course, this presents the threat of cyber bullying. Facebook takes this issue seriously. There is a section in their help center that addresses cyber bullying and provides tips to prevent it and ways to respond to and report it (Safety). Many good tips are given for safe use of Facebook which includes using privacy settings to restrict viewers, accepting friend requests only from people you know, blocking abusive users, and reporting abusive users (Safety). It is policies and preventative measures like these that can make users safer.
However, a problem lies in the fact that these measures may not be sought out by the users who need them, they might not know they exist. To find these tips, users must first realize that they need to search in the Help Center. Once in the Help Center it is not obvious where to go from there since there are many different links to choose from. The process to get to the information about teens and cyber bullying can be confusing and requires the user to click many different links before finally arriving at the desired information. Some users may get fed up with this and abort their search before they find any useful information. If Facebook truly is committed to making their site free from cyber bullying they need to make preventative information more accessible and make it know that the information exists.
The way Facebook handles reports may be disappointing to the victim as well. It is safe to guess that the victim would want the abuser to be removed from the site so they can’t bully them or anyone else again. If the victim reports the bully Facebook administrators will look at the report and determine what to do. In all cases the reported content is removed but in some the bully is actually banned from the site. Sadly, there seems to be very few cases where the abuse is deemed bad enough to warrant the bully actually being banned from the site (Safety). For Facebook to be seen as a site that is committed to stopping cyber bullying, they need to be harsher with their response to reports. Facebook should give the reported user one warning after an initial report and then if abusive behavior continues, the user should be banned. This would show that Facebook is taking a strong stance against cyber bullies and wants to protect its users.
Facebook is surely not the only site taking preventative measures. Many schools and other websites are taking measures to prevent and prosecute offences. Schools are developing policies for how to deal with reports of cyber bullies and trying to be more proactive in the prevention. It can be seen on the social safety.org website that many states are passing legislation to protect students from cyber bullying. The bills that these states are passing require local school districts within the state to add cyber bullying policies to their acceptable use document (Laws). Most of the legislation documented on this site was enacted in 2006 or 2007 and only applies to incidents occurring on campus. More recently, however, a standard has been set for which to apply to off campus issues (Trager).
While schools are developing cyber bullying prevention and punishment policies they still face a Catch-22 in dealing with cyber bullying. On one hand students First Amendment rights are in question of being violated but on the other hand, schools can be held liable for not intervening in cases of cyber bullying, even those occurring off campus (Trager). Because of this tricky situation, schools are beginning to apply what is known as the Tinker Standard to cyber bullying. As Trager states in his article New Tricks for Old Dogs: The Tinker Standard Applied to Cyber-Bullying, the Tinker Standard states that students have a right, “to be free from a substantial disruption” and when this right is violated, schools can intervene in the situation (Trager). By applying the Tinker Standard, schools can punish cyber bullies if it is found that the act, whether performed on or off campus, created significant disruption in school. This standard protects the schools from being accused of violating students First Amendment rights and allows schools to punish incidents that occurred off campus (Trager).
While it is a step in the right direction that schools are creating cyber bullying policies, something more appealing to students needs to be done. School’s cyber bullying policies are stated in their acceptable use statements which are likely not read by students and if they are read are probably soon disregarded. For this reason more site like athinline.org need to be created and prometed. This site is dedicated to teens and challenges them to draw the line between digital use and digital abuse (A Thin Line). Because teens have such a large presence online fighting cyber bullying online makes sense. This website provides interactive activities, quizzes, and videos. A Thin Line has even partnered with MTV to offer incentives to users like a trip to the 2011 Video Music Awards and has stars from MTV show appear in videos aiming to prevent and educate students on cyber bullying (A Thin Line). More of this is needed. We are living a digital revolution so teens are going to be more eager to log onto a site that is interactive as opposed to read about cyber bullying from their school.
By examining the techniques and occurrence of cyber bullying, traditional bullying begins to look almost innocent. New media provides a much larger scale for which cyber bullies can torment and harass. There are so many more ways to bully now than there ever have been. Bullies use email, social networking sites, broadcasting sites, and instant messaging to intimidate on a whole new level. Because digital media is now being used, the audience for bullying is limitless; the internet is a vast resource. The level of secrecy that comes with the internet allows bullies to be more brazen and less fearful of being caught. At the same time this creates a greater fear for victims because they may feel isolated because they do not know the identity of the bully and may feel hopeless in any punishment being given.
Works Cited
A Thin Line. athinline.org. 7 October 2009. Web. 14 November 2010.
Beale, Andrew V., and Kimberly R. Hall. “Cyberbullying: What School Administrators (and Parents) Can Do.” Wilson Web. Web. 3 November 2010.
Canter, Andrea and Andrea Cohn. Bullying: Facts for Schools and Parents. National Association of School Psychologists, 7 October 2003. 3 November 2010.
Kusel, Sara J., David G. Perry , and Louise C. Perry. “Victims of Peer Aggression.” Wilson Web. Web. 3 November 2010.
Laws Against Cyberbullying. Socialsafety.org, 2008. Web. 14 November 2010.
Li, Qing. “New bottle but old wine: A research of cyberbullying in schools.” Academic OneFile. Web. 3 November 2010.
Safety for Teens. Facebook, 2010. Web. 4 November 2010.
School Profile 2010-2011. Calabasas High School, 2010. Web 4 November 2010.
Trager, Guffy B. “New Tricks for Old Dogs: The Tinker Standard Applied to Cyber-Bullying.” Wilson Web. Web. 14 November 2010.
“Tyler Clementi.” New York Times. New York Times, 1 October 2010. Web. 3 November 2010.
Wednesday, November 10, 2010
Project 3 Draft 1
Michelle Chiodi
Shampa
UN 2001
November 5, 2010
Cyber Bullying: A New Breed of Bullies?
“Stupid,” “jerk,” “Look at Natalie’s outfit, what was she thinking?” Sound familiar? They do to the approximately 15 percent of students who are bullied. These days however, those insults might be considered “old school.” It seems that in the digital boom of the 21st century everything is making a transition from the real, tangible world to a virtual world. Bullying is not excluded from this. With the transition to a digital social network comes a new mentality for users, one where they may feel as if there are no consequences for their actions. This report will show that the digital media has created a new breed of bully and help the reader understand what is being done to combat the threat of cyber bullying.
Before the technology boom of the mid 21st century most bullying took place on school grounds. In 2003 it was found that bullying is the most common type of violence in the US with 15%-30% of students being victims or bullies. On the National Association of School Psychologists website it states that, “A [2003] report from the American Medical Association on a study of over 15,000 6th-10th graders estimates that approximately 3.7 million youths engage in, and more than 3.2 million are victims of, moderate or serious bullying each year (Canter).” Often the victims are insecure, passive, won’t retaliate, and are physically weaker than the aggressor (Canter).
Tradition school yard bullying is often described as systematic physical or verbal persecution. It has been found that bullying in schools is less likely when more teachers or supervisor are present. Unlike today, there was no standout in gender which was more likely to bullied before the technology boom. Girls were bullied about equally as much as boys (Kusel). These facts serve as good standards to compare the bullying of the cyber age to.
With the addition of digital media the realm of bullying goes far beyond physical and verbal harassment. Visual harassment such as posting defamatory, embarrassing videos or photo shopped pictures are becoming increasingly common. Unlike spoken words, text exchanged in a virtual world does not disappear. Once something is created in the internet, it is there to stay. It has also been found that females are more likely to be bullied and to bully in cyberspace (Li).
In the recent years the venue for bullies has expanded to the web. Technology has created various new forms of bullying which creates more danger for more people. Bullies are turning to e-mail, instant messaging, Web sites, voting booths, and chat rooms to harass their victims (Beale). For victims this makes escaping the tormenting increasingly difficult because technology and social networking is an integral part of teenage life. Unlike school yard bullying, cyber bullying can be conducted through various types of media. This presents a new set of concerns for victims. Young victims are being exposed to media far too grotesque for their age (Li).
Since bullies now have a greater means to bully, the occurrence of bullying has increased greatly since the age of school yard bullying. A study conducted among middle school students showed that 25 percent of females and 11 percent of males reported being cyber bullied at least once in the preceding two months (Beale 8). This adds to be 36 percent of the population studied that is reporting being bullied. Compare this to the study previously mention that was conducted less than a decade prior and it can be see that the new estimate is 6 percent higher than the previous high estimate for occurrence.
Beale and Hall’s Cyberbullying: What School Administrators (and Parents) Can Do says, “According to the results of the first national survey on school bullying, 74 percent of eight- to eleven-year-old students reported that bullying and teasing occurred at their schools (Beale).” This survey was conducted at a time before cyber bullying was created, before Myspace and Facebook were even created. Thinking about this fact is daunting. If the digital boom has increased the prevalence of bullying then it is safe to assume that students seeing bullying and teasing at school is nearing 100 percent.
New digital media allows humiliation to be more widespread. In a school in California students posted scathing rumors and racist comments to the website www.schoolscandals.com (Li). This was so rampant that nearly the entire school of almost 2000 students was affected (School). This is certainly not an isolated case where the bullying reached a large audience. A middle-school boy, Will, from Kansas knows just how tormenting a large audience can be. After he and his girlfriend broke up, the girl created a website to smear Will. She made various threats and vividly described what it would be like if his body were to be ripped apart (Li). Compared to face-to-face bullying the scale that cyber bullying has reached is outrageous. While traditional bullies may have the lunchroom crowd as their audience, cyber bullies can potentially have the entire world as theirs. For this reason cyber bullying is much more severe than traditional bullying.
While the occurrence of bullying has increased with the addition of technology, that is not the only factor leading to a harsher style of bullying. Bullies feel safe when they are attacking on the internet. They feel that they can be anonymous therefore no one will know what they say in a cyber world (Beale). Not only do internet users feel a sense of anonymity but they can also pose as other users. It is so simple for a user to log on as someone else or use a non identifying screen name. Even if the owner of a screen name is identified that user can simply blame someone else for using their screen name (Beale). Because cyber bullies can pose as others and feel anonymous this causes the bully to be more mean-spirited and say things they would never say in the face-to-face world (Beale). Cyber bullies hide behind their screen names with little fear of being caught; this leads to more brazen attacks (Beale).
While the level of fear decreases for the bullies themselves, the level of fear for the victim increases. In the cyber world the attacks are more vicious and the victim could have no idea who the attacker is, leading to great trepidation (Beale). Unlike traditional bullying where a teacher or other student could see an incident, if the victim doesn’t stand up for them self or doesn’t report the aggressor, no one will know it is going on. A student can be cyber bullied while someone is sitting right next to the victim and the bystander can remain completely unaware of what is happening. As Beale and Hall state, “A tormentor can get into a victims’ home, harassing him or her while parents sit comfortable in the next room (Beale).”
In the news recently there have been an increasing number of reports of cyber bullying even some cases where the bullying has been so extreme it leads the victim to suicide. Most recent is the story of Tyler Clementi, a Rutgers freshman who was tormented to an extreme. Tyler was a reserved student who was victimized by his roommate. The roommate video taped an intimate encounter between Tyler and another student and streamed this video to the internet for the whole world to see. Understandably, Tyler was extremely humiliated by this. Just days after the video was posted, Clementi jumped off the George Washington Bridge to his death (Tyler). This is an extreme and horrifying example of cyber bullying but the reality of the situation is that cyber bullying is becoming more brutal and more widespread. Stories like Tyler’s are becoming all too common and this call into question what measures are being taken to prevent cyber bullying.
Because cyber bullying is so much more widespread and severe than traditional bullying, new preventative measures and punishments are being sought by many. Facebook is one of the most common social networking sites in use today. Many teens use this site and of course, this prevents the threat of cyber bullying. Facebook takes this issue seriously as they have a section in their help section that addresses cyber bullying and provides tips to prevent it and ways to respond and report it (Safety). It is steps like these that can make users safer. The problem however is that some users may not seek this resource. To be more proactive on preventing cyber bullying, Facebook should advertise their policy and make users more aware of the resources available to them. This certainly is possible seeing as Facebook makes so many other things so visible.
Facebook is surely not the only site taking preventative measures. Many schools, websites, and even state governments are taking measures to prevent and prosecute offences. Schools are developing policies for how to deal with reports of cyber bullies and trying to be more proactive in the prevention. While to prosecution for cyber bullies is tricky because of the first amendment right governments are enacting laws that will give cyber bullies more severe punishment (Beale).
By examining the techniques and occurrence of cyber bullying, traditional bullying begins to look almost innocent. New media provides a much larger scale for which cyber bullies can torment and harass. There are so many more ways to bully now than there ever have been. Bullies use email, social networking sites, broadcasting sites, and instant messaging to intimidate on a whole new level. Because digital media is now being used, the audience for bullying is limitless; the internet is a vast resource. The level of secrecy that comes with the internet allows bullies to be more brazen and less fearful of being caught. At the same time this creates a greater fear for victims because they may feel isolated because they do not know the identity of the bully and may feel hopeless in any punishment being given.
Works Cited
Beale, Andrew V., and Kimberly R. Hall. “Cyberbullying: What School Administrators (and Parents) Can Do.” Wilson Web. Web. 3 November 2010.
Canter, Andrea and Andrea Cohn. Bullying: Facts for Schools and Parents. National Association of School Psychologists, 7 October 2003. 3 November 2010.
Kusel, Sara J., David G. Perry , and Louise C. Perry. “Victims of Peer Aggression.” Wilson Web. Web. 3 November 2010.
Li, Qing. “New bottle but old wine: A research of cyberbullying in schools.” Academic OneFile. Web. 3 November 2010.
Safety for Teens. Facebook, 2010. Web. 4 November 2010.
School Profile 2010-2011. Calabasas High School, 2010. Web 4 November 2010.
“Tyler Clementi.” New York Times. New York Times, 1 October 2010. Web. 3 November 2010.
Subscribe to:
Comments (Atom)