{"id":3214,"date":"2019-06-10T02:00:57","date_gmt":"2019-06-09T23:00:57","guid":{"rendered":"http:\/\/worldessays.com\/blog\/?p=3214"},"modified":"2019-07-01T13:56:53","modified_gmt":"2019-07-01T10:56:53","slug":"cyber-bullying-annotated-bibliography","status":"publish","type":"post","link":"https:\/\/worldessays.com\/blog\/cyber-bullying-annotated-bibliography.html","title":{"rendered":"Cyber Bullying Annotated Bibliography"},"content":{"rendered":"<p>An annotated bibliography is a list of sources such as books, scholarly articles, websites, videos on a given topic. Each citation from the list is followed by a brief paragraph describing the content of the source. For instance, if the assignment is to create a cyber bullying annotated bibliography, a required number of relevant works on the subject should be found and arranged according to a specific order, and one of the citation styles. After reviewing the sources, one has to add a summary of the author\u2019s ideas in about 150 words.<\/p>\n<p>Common citation styles are as follows:<\/p>\n<ul>\n<li>American Psychological Association style (APA);<\/li>\n<li>Modern Language Association (MLA);<\/li>\n<li>Chicago or Turabian;<\/li>\n<li>Associated Press (AP);<\/li>\n<li>Council of Science Editors (CSE).<\/li>\n<\/ul>\n<p>Depending on the researcher\u2019s purpose, there are three main types of annotations: descriptive, informative, and critical. Descriptive annotation defines the main purpose of the work, the intended audience, and its research methods. Besides, it summarizes the content of the source and gives a brief overview of the author\u2019s conclusions. Informative annotation is quite similar to the descriptive one as it also summarizes the work. Also, it provides the reader with the author\u2019s hypothesis, key points, and message. On the contrary, critical annotation aims to evaluate the source; it comments on the objectiveness of the work, the value of the author\u2019s contribution to the study of the subject, and the accuracy of the content. Critical annotation should also compare the paper with similar works in the analyzed field. However, most of the annotated bibliographies combine the characteristic features of all these three types.<br \/>\nSample cyber bullying annotated bibliography entry for a journal article (APA).<\/p>\n<p>The joint research of the scholars from the US and South Korea aims to analyze the current status of cyberbullying prevention and intervention, particularly regarding adolescents. The article discusses the alarming rates of cyberbullying among school children in Canada which are constantly increasing due to the ubiquity of social media and various communication platforms. The authors emphasize the necessity of informing school personnel, youth, and parents on the phenomenon of cyberbullying and the ways to avoid it. Moreover, the article touches upon the role of health care providers in preventing cyberbullying and the efficacy of school-based cyberbullying interventions. The authors talk about the activity and main principles of such anti-bullying programs as Medienhelden in Germany, Noncadiamointrappola in Italy, KiVa in Finland, and provide the statistics which reflect their high effectiveness. Also, the scholars, once again, rightfully insist that health care providers must engage in preventing cyberbullying, for instance, by including the corresponding questions in their intake forms.<\/p>\n<p>Sample cyber bullying annotated bibliography entry for a journal article (MLA).<br \/>\nBonanno, Rina A., and Shelley Hymel. \u201cCyber Bullying and Internalizing Difficulties: Above and Beyond the Impact of Traditional Forms of Bullying.\u201d Journal of Youth and Adolescence, vol. 42, 2013, pp. 685\u2013697.<\/p>\n<p>Bonanno and Hymel study the correlation between the exposure to cyberbullying and various internalizing difficulties such as depressive symptomatology and suicidal thoughts. Through the analysis of the collected data, the authors note that due to the accessibility of technology the rates of cyber victimization and cyberbullying are increasing; they affect those exposed to it even more than the traditional forms of bullying. One of the most novel points of the article is the discussion of the impact of bullying on the bullies themselves. Apparently, even though victims demonstrate the highest rates of suicidal ideation, suicides among bullies are still more frequent than among children not involved at all. Bonanno and Hymel have conducted a testing session for high school students and present the statistics on depression symptomatology and suicidal ideation among physical, verbal, social and cyber victims as well as bullies. The results of the research verify the scholars\u2019 hypothesis. The article does not suggest any means of eliminating cyberbullying but rather provides demonstrative evidence of its menace.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An annotated bibliography is a list of sources such as books, scholarly articles, websites, videos on a given topic. Each citation from the list is followed by a brief paragraph describing the content of the source. For instance, if the assignment is to create a cyber bullying annotated bibliography, a required number of relevant works&#8230; <span class=\"continue-reading\"> <a href=\"https:\/\/worldessays.com\/blog\/cyber-bullying-annotated-bibliography.html\" class=\"btn-content btn-more\">Read More&nbsp;&rarr;<\/a><\/span><\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-3214","post","type-post","status-publish","format-standard","hentry","category-useful-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Easy Ways to Prepare Cyber Bullying Annotated Bibliography<\/title>\n<meta name=\"description\" content=\"Do you know how to deal with cyber bullying annotated bibliography? Read our article to get a guidance in this process.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/worldessays.com\/blog\/cyber-bullying-annotated-bibliography.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Easy Ways to Prepare Cyber Bullying Annotated Bibliography\" \/>\n<meta property=\"og:description\" content=\"Do you know how to deal with cyber bullying annotated bibliography? Read our article to get a guidance in this process.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/worldessays.com\/blog\/cyber-bullying-annotated-bibliography.html\" \/>\n<meta property=\"og:site_name\" content=\"WorldEssays.com\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-09T23:00:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-07-01T10:56:53+00:00\" \/>\n<meta name=\"author\" content=\"Cristian Dorsey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cristian Dorsey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/worldessays.com\/blog\/cyber-bullying-annotated-bibliography.html\",\"url\":\"https:\/\/worldessays.com\/blog\/cyber-bullying-annotated-bibliography.html\",\"name\":\"Easy Ways to Prepare Cyber Bullying Annotated Bibliography\",\"isPartOf\":{\"@id\":\"https:\/\/worldessays.com\/blog\/#website\"},\"datePublished\":\"2019-06-09T23:00:57+00:00\",\"dateModified\":\"2019-07-01T10:56:53+00:00\",\"author\":{\"@id\":\"https:\/\/worldessays.com\/blog\/#\/schema\/person\/96451eb24fc7527c83f7276884101552\"},\"description\":\"Do you know how to deal with cyber bullying annotated bibliography? Read our article to get a guidance in this process.\",\"breadcrumb\":{\"@id\":\"https:\/\/worldessays.com\/blog\/cyber-bullying-annotated-bibliography.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/worldessays.com\/blog\/cyber-bullying-annotated-bibliography.html\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/worldessays.com\/blog\/cyber-bullying-annotated-bibliography.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/worldessays.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Bullying Annotated Bibliography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/worldessays.com\/blog\/#website\",\"url\":\"https:\/\/worldessays.com\/blog\/\",\"name\":\"WorldEssays.com\",\"description\":\"Essay Writing Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/worldessays.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/worldessays.com\/blog\/#\/schema\/person\/96451eb24fc7527c83f7276884101552\",\"name\":\"Cristian Dorsey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/worldessays.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/94a29da73ccfd65fd50a9b006dbf74b8f4058501f00ef0c6cb7d74bed2524221?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/94a29da73ccfd65fd50a9b006dbf74b8f4058501f00ef0c6cb7d74bed2524221?s=96&d=mm&r=g\",\"caption\":\"Cristian Dorsey\"},\"description\":\"Cristian Dorsey is an IT geek willing to discover a self-writing machine that would deliver custom essays per his request. In his attempt to develop such a machine, he followed the need to know the subject matter inside out. That\u2019s how the idea of running his WorldEssays blog appeared. Read his regular reports and stay tuned on his progress. Cristian Dorsey is an IT geek willing to discover a self-writing machine that would deliver custom essays per his request. In his attempt to develop such a machine, he followed the need to know the subject matter inside out. That\u2019s how the idea of running his WorldEssays blog appeared. Read his regular reports and stay tuned on his progress.\",\"sameAs\":[\"http:\/\/worldessays.com\/blog\/\"],\"url\":\"https:\/\/worldessays.com\/blog\/author\/cristian-dorsey\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Easy Ways to Prepare Cyber Bullying Annotated Bibliography","description":"Do you know how to deal with cyber bullying annotated bibliography? Read our article to get a guidance in this process.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/worldessays.com\/blog\/cyber-bullying-annotated-bibliography.html","og_locale":"en_US","og_type":"article","og_title":"Easy Ways to Prepare Cyber Bullying Annotated Bibliography","og_description":"Do you know how to deal with cyber bullying annotated bibliography? Read our article to get a guidance in this process.","og_url":"https:\/\/worldessays.com\/blog\/cyber-bullying-annotated-bibliography.html","og_site_name":"WorldEssays.com","article_published_time":"2019-06-09T23:00:57+00:00","article_modified_time":"2019-07-01T10:56:53+00:00","author":"Cristian Dorsey","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cristian Dorsey","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/worldessays.com\/blog\/cyber-bullying-annotated-bibliography.html","url":"https:\/\/worldessays.com\/blog\/cyber-bullying-annotated-bibliography.html","name":"Easy Ways to Prepare Cyber Bullying Annotated Bibliography","isPartOf":{"@id":"https:\/\/worldessays.com\/blog\/#website"},"datePublished":"2019-06-09T23:00:57+00:00","dateModified":"2019-07-01T10:56:53+00:00","author":{"@id":"https:\/\/worldessays.com\/blog\/#\/schema\/person\/96451eb24fc7527c83f7276884101552"},"description":"Do you know how to deal with cyber bullying annotated bibliography? Read our article to get a guidance in this process.","breadcrumb":{"@id":"https:\/\/worldessays.com\/blog\/cyber-bullying-annotated-bibliography.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/worldessays.com\/blog\/cyber-bullying-annotated-bibliography.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/worldessays.com\/blog\/cyber-bullying-annotated-bibliography.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/worldessays.com\/blog"},{"@type":"ListItem","position":2,"name":"Cyber Bullying Annotated Bibliography"}]},{"@type":"WebSite","@id":"https:\/\/worldessays.com\/blog\/#website","url":"https:\/\/worldessays.com\/blog\/","name":"WorldEssays.com","description":"Essay Writing Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/worldessays.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/worldessays.com\/blog\/#\/schema\/person\/96451eb24fc7527c83f7276884101552","name":"Cristian Dorsey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/worldessays.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/94a29da73ccfd65fd50a9b006dbf74b8f4058501f00ef0c6cb7d74bed2524221?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/94a29da73ccfd65fd50a9b006dbf74b8f4058501f00ef0c6cb7d74bed2524221?s=96&d=mm&r=g","caption":"Cristian Dorsey"},"description":"Cristian Dorsey is an IT geek willing to discover a self-writing machine that would deliver custom essays per his request. In his attempt to develop such a machine, he followed the need to know the subject matter inside out. That\u2019s how the idea of running his WorldEssays blog appeared. Read his regular reports and stay tuned on his progress. Cristian Dorsey is an IT geek willing to discover a self-writing machine that would deliver custom essays per his request. In his attempt to develop such a machine, he followed the need to know the subject matter inside out. That\u2019s how the idea of running his WorldEssays blog appeared. Read his regular reports and stay tuned on his progress.","sameAs":["http:\/\/worldessays.com\/blog\/"],"url":"https:\/\/worldessays.com\/blog\/author\/cristian-dorsey"}]}},"_links":{"self":[{"href":"https:\/\/worldessays.com\/blog\/wp-json\/wp\/v2\/posts\/3214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/worldessays.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/worldessays.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/worldessays.com\/blog\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/worldessays.com\/blog\/wp-json\/wp\/v2\/comments?post=3214"}],"version-history":[{"count":0,"href":"https:\/\/worldessays.com\/blog\/wp-json\/wp\/v2\/posts\/3214\/revisions"}],"wp:attachment":[{"href":"https:\/\/worldessays.com\/blog\/wp-json\/wp\/v2\/media?parent=3214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/worldessays.com\/blog\/wp-json\/wp\/v2\/categories?post=3214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/worldessays.com\/blog\/wp-json\/wp\/v2\/tags?post=3214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}