Respond a colleagues by offering an additional development theory and

 Respond a colleagues by offering an additional development theory and explaining its connection to the act of bullying. Please use the Learning Resources to support your response. 

Social learning theory is a moral development theory that suggests that behavior can be learned (Zastrow et al., 2019). While thinking of the social learning theory, you can use an example of bullying to illustrate the definition. Children can be brought up in a home where parents use positive reinforcement and manners and respect, but a child can still become a bully. Even though the “right” behavior is taught in the home, the influence of peers can cause a child to learn how to behave negatively in their social environment (Zastrow et al., 2019).  Also, if a child is being treated poorly at home, they could harbor those emotions and take them out on other children. We see in mass media that most times that bullies have a poor home life which affects their mood and causes them to lash out at their peers. Sometimes it is to seek attention from anyone. Bullies can also learn from other bullies. Meaning, that they will see a peer treat another peer poorly and begin to chime in on the negativity.

Cyberbullying has taken over in modern times due to social media (Brown et al., 2017). Social media allows people that are essentially strangers to comment on your life and say negative things. People you know are also able to make anonymous accounts where they can say negative things as well. This is often done during adolescent stages and between school-aged children. There have been many cases where cyber bullying has had a negative result on the victim sometimes causing them to end their life.

According to Brown et al., traditional bullying and cyberbullying differ in many ways (2017). Before social media, victims of bullying could go home and have some hours where they are not being harassed or taunted. However, with cyberbullying, the victim can be reached 24/7. As I previously stated, these bullies can make numerous accounts and continue to be negative towards the victim. Now bullies can technically follow someone home, distract them from their school and other activities. Even though the activities of bullying may differ, it still has the effects of psychological, emotional, and possible physical harm.

Brown, C. F., Demaray, M. K., Tennant, J. E., & Jenkins, L. N. (2017). Cyber victimization in high school: Measurement, overlap with face-to-face victimization, and associations with social–emotional outcomes. School Psychology Review46(3), 288-303. doi:10.17105/spr-2016-0004.v46-3

Zastrow, C., Kirst-Ashman, K. K., & Hessenauer, S. L. (2019). Understanding human behavior and the social environment (11th ed.). Cengage Learning.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Salvation – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

Assessment Description In nursing practice, accurate identification and application of

Assessment Description In nursing practice, accurate identification and application of research is essential to achieving successful outcomes. The ability to articulate research data and summarize relevant content supports the student’s ability to further develop and synthesize the assignments that constitute the components of the capstone project. The  will be used

Sensory Response – When analyzing the viewer’s sensory response to

  Sensory Response – When analyzing the viewer’s sensory response to a particular visual, it is important to consider the visual elements that attract the eyes. Close your eyes when considering a visual. When you open your eyes, what are the first visual elements that you see? When analyzing a viewer’s

Is Batman really a superhero, or simply a rich man with expensive

This is a paper for a synthesis essay, As The Allyn and Bacon Guide to Writing (2015) explains, “A successful synthesis essay incorporates ideas from your texts and yet represents your own independent, creative thinking” (297). This means that, for this paper, you need to show a clear understanding of

Your New Business -Business Plan Like so many others before

Your New Business -Business Plan Like so many others before you, you have decided to set up yourown business. Having investigated various options, you have concluded thatyour ‘idea’ is viable, it suits you and can be developed to be an interesting enterprise with rewarding financial results. Your project can be

1. Explain the adaptive value of rough-and-tumble play and dominance

  1. Explain the adaptive value of rough-and-tumble play and dominance hierarchies. 2. Cite examples of how language awareness fosters school-age children’s language progress 3. How does level of self-esteem change in middle childhood, and what accounts for these changes?  4. How does emotional self-regulation improve in middle childhood? What

Smartphones, the Internet, and rapid advancement of technology have come

  Smartphones, the Internet, and rapid advancement of technology have come to influence all aspects of people’s daily lives. However, as with any advancement in technology, there are always those who will misuse this technology for their own purposes—criminal and abusive. In fact, the developer of the ILOVEYOU worm, one

Write a 4–6-page term paper on a topic of your

  Write a 4–6-page term paper on a topic of your choice related to Cyber Security   In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page. APA Style TOPIC (WHAT STRATEGIES HAVE BEEN PROVEN EFFECTIVE IN PREVENTING CYBER ATTACKS?) Paper Outlines:

The memo will be to an imaginary policy decision maker

The memo will be to an imaginary policy decision maker based on the topic of Housing Discrimination[1] or Gentrification.[2] Housing Discrimination can take place, but not limited to, those holding housing vouchers, same-sex couples and transgender people, families with small children, racial and ethnic minorities, and people with disabilities. Gentrification is a form of neighborhood

Directions: Students will watch a Customer Service video and then

  Directions: Students will watch a Customer Service video and  then answer questions: Questions: 1) Professionalism – How could Lee have been more helpful to the customer, Karen Tom? 2) Communication – What did the supervisor, Christine, do to calm the customer? 3) Critical Thinking – What might SunTel do company-wide

Faculty Comments: Faculty Comments: Points Description Subjective 5 Chief complaint

 Faculty Comments:  Faculty Comments: Points DescriptionSubjective5 Chief complaint stated in patient’s own words.10 HPI, PMH, PSH, Family History, Social Habits,10 Contains all systems relevant information to make assessment with normal and abnormal findings.20 Objective present and contains all pertinent objective information available (drug allergies, physical findings, drug list, etc)20 Assessment

Reply to: Both early and late selection refer to when

Reply to:   Both early and late selection refer to when in the perception process a stimulus is chosen to be processed, analyzed, and consequently understood. These selection models both follow a process of registering the information, perceptually analyzing it, semantically analyzing and encoding the information, then producing a response

Please have a look at these articles and let me

Please have a look at these articles and let me know whether you can summarize them. To make sure i am not dealing with bots, please tell me where this phrase is appearing in one these articles “how do I know ginger is ready for harvesting”. Tell me the sub-topic

The Vigenère Cipher

Create a message of four or five words, and then choose three passwords of varying lengths (at least one should be shorter than the message itself). Then, using the substitution table below, perform simple encryption on the message.   Plaintext Message: Password Ciphertext             Compare

Write a brief reflection on Cloud computing and on how

 Write a brief reflection on Cloud computing and on how it will aid your professional career and development. How will this course impact your professional objectives? What were the major work-related lessons that you learned? How will this course prepare you for further studies related to your chosen professional career? Write 250 words

Understanding Education

Description *We’ve seen in the texts of this course a variety of ways for an author to approach the topic of education. In this paper, you will examine and assess the definitions of education that at least two of our authors have articulated in their writings. The questions, areas of