Assignment on protecting children from media

Assignment Help Basic Computer Science
Reference no: EM13789718

Protecting Children From Media

For his 10th birthday, Greg was given a handheld videogame system. His parents allowed him to pick any two games. They knew the games might contain violence, because there was a violence rating sign posted on the games, but rationalized that they were only games and other kids play them. Greg would quickly finish dinner and run up to his room to play his games.

His parents were pleased to observe that Greg enjoyed their present so much. After a week, his parents noticed that he wasn't turning off the videogames at bedtime, and had begun turning homework in late. He was up so late playing that he would not get up for school without argument. His parents decided that enough was enough and took the video games away. Greg threw temper tantrums and persuaded his parents to buy him a computer after convincing them that it was necessary to keep up at school. Greg soon returned to the same pattern of behavior where he spent long hours and late nights at the computer. This time, his parents felt a false sense of security that he was doing his homework. One day, his curious parents decided to scan the computer history to see what Web sites Greg was browsing. To their horror, they discovered that Greg was spending many hours online playing interactive, sometimes violently graphic, games on the Internet. He was also chatting with other "gamers". Before confronting Greg about his behavior, his mother and father agreed to investigate what types of intervention strategies might be available within their community. They have come to you, a behavioral consultant, for advice.

Describe the issue of exposure to videogame violence in today's society as related to Greg's situation. Explore issues such as:

Prevalence (e.g., age, gender, racial diversity, etc.)

Given Greg's developmental level, what are possible dangers of exposure to media violence? Be sure to address this in the context of his cognitive and socioemotional development.

Risk and protective factors, including predisposition to violence (e.g., are all children who play violent videogames likely to become more aggressive? What protective factors might mitigate the possible outcomes for Greg?

Discuss the possible outcomes if Greg's behavior continues unchecked.

Discuss types of intervention strategies you would expect his parents to find at a community level, such as in community centers, schools, and social service agencies, to assist children like Greg who are at risk due to ongoing exposure to media violence.

What would be a good plan to recommend to Greg's parents?

Compare the dangers of exposure to videogame violence with other forms of violence. What are similarities and differences between videogame violence exposure and the other type of violence you chose to compare?

What are the costs of videogame violence to the family and the community and society at large and the other form of violence you chose for comparison?

Reference no: EM13789718

Questions Cloud

What year will the worlds population be 12.6 billion : Suppose the world's population in 2000 is 6.3 billion and is projected to grow at a rate of 1.2% per year. In approximately what year will the world's population be 12.6 billion?
Identify violation of ground rules that manifested situation : Identify any violations of ground rules that manifested the situation. What ethical change, deficiency, or conflict brought it about?
Making risk- and quality-management decisions : Describe appropriate tools for making risk- and quality-management decisions
Calculate the values for the following four formulas : Calculate the values for the following four formulas:Total Variable Cost = (Number of Workers x Worker's Daily Wage) + Other Variable Costs
Assignment on protecting children from media : Protecting Children From Media
Which respect does iraq have very shallow roots as a nation : How were Saddam Hussein and the men around him able to create and sustain such a powerful regime, especially after all the setbacks during the two decades before the 2003 war?
Relative risk/odds ratio, hazard ration, nnt issues : What were the groups in the trial (Treatment group, placebo group, control group, or other standard of care group)?
How can erp software be used to facilitate data integration : How can ERP software be used to facilitate data integration? A key high-profile enterprise software system that has emerged in the HMIS landscape is
Define and discuss the open shop movement : Define and discuss the open shop movement. Include a specific example and analyze its success or failure, and why. Write a 2-3 page paper using APA format.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describes how a honey pot was used

Describes how a honey pot was used

  Explain the importance of unix

Explain the importance of UNIX® to the Internet. Support your position using examples.

  Examine the following pseudocode module

Examine the following pseudocode module header and then write a statement that calls the module, passing 8 as an argument. Module showValue Integer values

  Tools or tactics used by risk assessment team

In your new position at XYZ Corporation, you have been asked to lead risk assessment team. How can you bring everyone to agreement an what are there any tools or tactics you might use to help?

  Provide a sql statement that displays the isbn

Provide a SQL statement that displays the ISBN, TITLE and PROFIT for all books where the COST is greater than or equal to $10.00 and less than or equal to $40.00. (The PROFIT is the difference between RETAIL and COST.) Include only those book..

  Write a program that prompts the user to enter the accounts

The program should pass these values to a function that returns the future value of the account after the specified number of months. The program should display the accounts future value.

  How to understand the code perfectly without unclear steps

Finish the following hangman C++ program and make it run well as well as comment the program through to help me understand the code perfectly without unclear steps.

  Calculate the difference between two numbers

Create a template function that can be used to calculate the difference between two numbers. Make it able to use two integers, two floats, and an integer and a float.

  Explaining project manager-s role in project management

Describe in scholarly detail project manager's role in project management and job responsibilities related with position.

  Cryptographic tunneling and the osi model

Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model.

  Steps for company browse the site using this url

The static IP address of the server is 192.168.45.200. What steps do you take so that each computer in  company can browse site by using this URL?

  Determine size of one minute mono audio file

Digital audio transducer samples real sound at the rate of 40 kHz and assigns 8 bits to each sample. Determine the size of one minute mono audio file?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd