Essay on Discuss the Role of Psychological and Physical Disorders From the Perspective of Cognitive Psychology, and Mitigative Measures To Address Issues Such As Sports Injuries, Cyber-Bullying and Media Addiction
Number of words: 1484
NFL is an incredibly exciting sport, but studies of former NFL players and the high rates of memory and cognitive loss years after retiring, potentially due to repeated hits to the head, are indeed a cause for concern. In my opinion, while NFL should not be discontinued on the basis of such risks, there is a significant number of policy measures that can be implemented to ensure lower rates of risk and injury that can lead NFL players to suffer from head injuries, concussions, blackouts and permanent damage that may lead them to experience long-term memory and cognitive problems. Foremost, the rules of the game should be changed to heavily penalize hard hitting, physical assault and aggressive tackles, similar to the red card system in British football. Secondly, players should be subjected to regular awareness, education and training to make them understand the consequences of aggressive play and hard hitting on the long-term health of their teams and colleagues. Furthermore, the NFL should encourage a culture of fair and safe play, and conduct regular audits to ensure that players are abiding by safe play rules.
The risk of permanent cognitive disability is distinct from the risk of permanent physical disability for a number of reasons. Foremost, general awareness, treatment and understanding of cognitive disability is far lower than those of physical disability, which may lead individuals with cognitive disabilities to suffer from stigma and poor treatment for years after the initial incident. Secondly, cognitive disabilities tend to be highly debilitating on a psychological level, and can permanently impair the cognitive function of the individual with the disability.
In my opinion, sports with similar risks of cognitive disability, such as wrestling, boxing and soccer, need not be banned but should generally be subjected to the same strict regulation and penalties suggested above. This would ensure that players are safe from long-term cognitive disability. The information in this unit has been helpful in understanding how physical injuries to specific parts of the brain and nervous system can map to long-term cognitive and psychological conditions, and show the importance of understanding this relationship.
There is a need for there to be active regulation and compliance measures to ensure that this is effectively executed. Furthermore, while it is true that individuals should have freedom to choose what they play, it is also equally important, in my opinion, that they have the freedom to participate in such sports without the risk of long-term cognitive and psychological conditions, or the risk of memory loss and cognitive impairment. We owe it to our NFL and wrestling heroes to ensure safe working conditions as far as possible, and to ensure that they are aware of how to mitigate inherent risks.
Furthermore, watching violence on television has a small but non-negligible impact on increasing violence and aggression in viewers. Children and teenagers may be influenced by media violence to accept the normalization of violence as a valid mechanism to solve problems, or may identify with certain narratives and characters to begin imitating the violence witnessed on television. This may be particularly acute in impact for children with behavioral, impulse control or learning conditions, and may lead to children acting out in the classroom or the schoolhouse environment. While empirical evidence continues to be mixed, studies have shown that fictional television and film violence caused a small short and long term increase in violence in young media viewers. Hence, parents, educators and regulators have a key role to play in limiting the exposure of viewers to such media violence.
Cyberbullying alludes to the demonstration of uncovering an individual’s private data or reexamining their public depiction without their communicated assent or control (IAPP, 2018). Cyberbullying is an especially risky type of online exploitation and abuse, given the general obscurity of the culprit and the trouble in recognizing and halting the culprit’s activities. This has been connected with lower confidence, expanded self destruction hazard and more noteworthy nervousness among its casualties, and cyberbullying as an issue has accordingly been the objective of intercessions by instructive media crusades, school programs, parental oversight and inclusion, Congressional enactment and screening and proof based mediations by medical care suppliers (Aboujaoude et al, 2015).
The media has highlighted various disturbing cyberbullying cases emerging from an absence of authority over online protection of key shopper stages, for example, web-based media organizations. For instance, in 2016, the New York Times distributed a story on how Kim Kardashian distributed classified accounts of discussions between Kanye West and Taylor Swift, and Khloe Kardashian posted photographs of a close to bare lady and outlined entertainer Chloe Grace Moretz for them (IAPP, 2016). These cyberbullying strategies were the outcome of vindictive purpose, yet in addition the endeavors by high profile famous people to take advantage of critical holes in the online protection guards of their designated casualties (IAPP, 2016).
IAPP confirmations would thus be able to be a significant apparatus in fighting the dire issue of cyberbullying. As talked about by the IAPP’s Introduction to Privacy for Technology Professionals, it is significant for online protection experts to viably oversee dangers, for example, cyberbullies by consolidating protection into their danger examination, and guaranteeing adequate secrecy, encryption and protection interfaces for their clients to shield client security and security. This would help potential cyberbullying casualties battle off the dangers related with information breaks and openness of their classified data.
IAPP confirmations like the Certified Information Privacy Professional (CIPP), Certified Information Privacy Manager (CIPM) and the Certified Information Privacy Technologist (CIPT) can likewise assist people with bettering oversee dangers for cyberbullying. For instance, a recent report by Rosa et al (2019) found that IAPP innovations, for example, mechanized cyberbullying identification and danger investigation frameworks might be viable at fighting the weaknesses utilized by cyberbullies to take advantage of their casualties, albeit this may not matter completely to all genuine circumstances as datasets used to prepare these recognition frameworks is deficient (Rosa et al, 2019). In any case, the review exhibits that IAPP affirmations, for example, the CIPP and CIPM can outfit network safety experts with valuable toolboxs and abilities to fabricate vigorous data assurance and online protection frameworks that assistance to avert cyberbullying. As one potential use case, CIPP and CIPM certificates might be utilized by online protection experts to naturally banner and eliminate cyberbullying content, like bare pictures or libelous posts, worked on school networks in state funded instruction establishments.
Moreover, CIPP and CIPM accreditations could be utilized to improve security and information insurance of buyer data sets utilized by schools, organizations and working environments, to keep the information in such data sets from being taken advantage of by unscrupulous cyberbullies. These practices would likewise help associations focused on by cyberbullies from experiencing helpless consistence and hazard moderation rehearses, and would guarantee that these associations are consistent with jurisdictional laws, guidelines and authorization in battling the dangers presented by cyberbullies.
Furthermore, IAPP affirmations can likewise prepare CIPP, CIPM and CIPT holders to all the more successfully distinguish the wellsprings of cyberbullying. For instance, in a review led by Lee and Shin (2016), it was discovered that young men had a high extent of cyberbullying execution that young ladies, and young ladies would in general execute cyberbullying through talk administrations. CIPP, CIPM and CIPT holders can be prepared to adjust their methodologies to focus on the principle channels and stages for cyberbullying as needs be. For instance, these IAPP certificate holders can execute web convention following devices to follow dubious movement back to a particular start point, which might work with measures that consider cyberbullies responsible for their activities.
Aboujaoude, E., Savage, M. W., Starcevic, V., and Salame, W. O. (2015). Cyberbullying: Review of an old issue turned into a web sensation. Diary of young adult wellbeing, 57(1), 10-18.
Ahn, A. J., Kim, B. S., and Park, Y. S. (2008). Adams, Helen. “Long range interpersonal communication and Privacy: A Law Enforcement Per-spective.” School Library Media Activities Monthly 23 (2007): 33. Ahmad, Farah, Angela Shik, Reena Vanza, Angela Cheung, Usha George, and Donna E. Stewart.”Popular Health Promotion Strategies Among Chinese and East Indian Immigrant Women.” Women and Health 40. Brain research, 14(4), 38-41. jstor.org/stable/pdf/j.ctt15nmj7f.22.pdf. Gotten to 1 September 2020.
Barlett, C. P., Gentile, D. A., and Chew, C. (2016). Anticipating cyberbullying from namelessness. Brain research of Popular Media Culture, 5(2), 171.
IAPP. Famous people use cyberbullying to help their brands, 2016, https://iapp.org/news/a/VIPs use-cyberbullying-to-support their-brands/. Gotten to 2 September 2020.
IAPP. Assets on cyberbullying, 2018, https://iapp.org/assets/article/cyberbullying/. Gotten to 2 September 2020.
Kamberg, Mary-Lane. Network safety: Protecting Your Identity and Data. The Rosen Publishing Group, Inc, 2017.
Lee, C., and Shin, N. (2017). Pervasiveness of cyberbullying and indicators of cyberbullying execution among Korean youths. PCs in human conduct, 68, 352-358. doi.org/10.1016/j.chb.2016.11.047
Rosa, H., Pereira, N., Ribeiro, R., Ferreira, P. C., Carvalho, J. P., Oliveira, S., and Trancoso, I. (2019). Programmed cyberbullying identification: A deliberate survey. PCs in Human Behavior, 93, 333-345.