The way feedback can portray details overlooked is undeniable. As a result …show more content…
Focus primarily revolved around credible sources from academic journals. As previously mentioned, I used Dana’s feedback to expand how to educate thus introduce safe internet practices. Investigation of each of my key points showed that safe internet practices could clearly guard children from incidents against them. In choosing to incorporate this, it gives a clearer view of how inappropriate online content, cyberbullying, and cyber predator incidents can occur without teaching and or practicing internet …show more content…
This is an effective way of imparting information as well as an objective, unbiased view of the topic to present a logical means connecting with my audience. The following is an example of this rational presentation of evidence. A peer-reviewed article published in Child Abuse Review examined how internet sex offenders pursue children online together with their seeming disregard for the surveillance risk through identity protection practices (Balfe, M., Gallagher, Masson, Balfe, S., Brugha & Hackett, 2015). The authors observed Holt’s study about how offenders will use disposable technologies such as prepaid cell phones, separate from their regular phones, to dispose of quickly if they receive attention from police for their online activities (Balfe et al., 2015). Balfe et al. (2015) further researched the Holt study which proposes offenders can easily create false identities by “employing pseudonyms in chat rooms or on forums/social network sites, or sometimes even pretending to be children themselves” (pp. 432-433). This implementation shows my audience of children under 18 and their parents/guardians how important it is to be aware of dangerous offender behaviors thus, further emphasizing my argument. This compelling display of data will urge my readers to believe my point of