Persuasive Essay Facts

Helpfulness: +1
Set Details Share
created 3 years ago by HP3013
289 views
Should Parents have access to the child's social media accounts?
updated 3 years ago by HP3013
Grade levels:
8th grade
show moreless
Page to share:
Embed this setcancel
COPY
code changes based on your size selection
Size:
X
Show:
1

If parents found something you were posting on the internet and they didn't punish you, the teenager or child(ren) may never know right from wrong decisions.

Source #1

2

Until you are 18 every parent should read everything you post, every message you write, and know everything you are doing online and the day your parents made you, they became responsible for everything you do until you are the age of maturity.

Source #1

3

If children tell their parents their passwords with respect, when they are done they could possibly go back to their room and change it immediately so their parents can't get back on your device and if your parents found out you changed your password without them knowing, they could punish you and possibly even take your device away if you won't tell them your new password.

Source #1

4

Most children earn their trust by responsibility and behavior but the more social media accounts the teenager has, the faster their behavior changes and they could get their social media accounts taken away.

Source #1

5

A mom found on Facebook that their kid is cutting themselves mom has the right to search their rooms and remove cutting devices and to physically examine their child for cuts, and to make sure old ones heal.

Source #1

6

Some kids end up using drugs and buying it from other kids in school.

Source #1

7

If the parents don't snoop, they may not have known the child could get terrible life threatening infections or they could kill themselves.

Source #1

8

For younger children, having their password and access to any sites they use is critical.

Source #2

9

Most uses of the Internet and social networking sites provide a positive atmosphere in which people can make new friends and have fun but with each beneficial aspect of these technologies comes the greater risk that criminal predators can take advantage of our children.

Source #2

10

For teens using social media networking sites, perhaps you could insist they add you as a friend so that you can monitor their activity on your own time.

Source #2

11

If you don't get access to your child's social media accounts, they could be doind harmful things to themselves or even other people.

Source #2

12

Some of the images that children post on social media accounts are sexually related and may include violent content that are very disturbing which need to be viewed and discussed with a mature parent/guardian.

Source #3

13

When illegal activities or criminally improper profiles are found to be in violation of the service agreement, the social networking site will terminate service of that profile but monitoring of every profile would be next to impossible.

Source #3

14

Without parental blocks (or filters) on inappropriate sites, young children can be exposed to material they do not need to be seeing and even when parents set up blocks to lock out inappropriate sites, some sites may still contain materials considered appropriate for mature audiences.

Source #3

15

The child may spend this unsupervised time on social networks in chats talking to friends and post that they are home alone not realizing that others could see that information who may be in danger to their safety.

Source #3

16

Cyberbullying, Cyberstalking, and stranger danger are very real threats to children on social networks and while there have been schoolyard bullies, it was easier to intervene because bullies were known and appropriate steps taken to end the bullying or harassment.

Source #3

17

Myspace, Facebook, and similar social networking sites are also used by criminals ready to prey on naive and incorrigible children, teens and young adults.

Source #3

18

If parents do not have their childrens passwords to their social networking sites, they may not know that the greater risk that criminal predators can take advantage of our children.

Source #3

19

Teenagers especially hat it when parents invade their "privacy" and then many heated arguments result angst and "trust" issues involving parental involvement in their personal lives.

Source #3

20

There are people out there who create fake accounts and say fake facts about themselves and they say they are nice and really they could be a child molester or a sexual predator. Would you want your 12-year old daughter talking to, what shes thinks is, a 12-year old boy when really he is really in his 50's?

Source #3

21

When illegal activities or criminally improper profiles are found to be in violation of the service agreement, the social networking site will terminate service of that profile.

Source #3

22

Regulations set by Myspace.com and other social networking websites specify in their terms and service agreements that persons under a certain age should not be creating a profile or accessing the site.

Source #3

23

Maintain an open dialog with your children, and monitor the use of their cell phones. Positive parental involvement can prevent their children from being victims of crime

Source #3

24

If parents didn't snoop at least once a week, their children could be getting arrested or doing crimes that could get them in juvenile detention.

Source #3

25

The teen has a history of, or is suspected of making poor choices, such as drug use, involvement in gang activity, underage drinking, failing grades in school, unexcused absences, or skipping of school classes

Source #3

26

Aside from the previously discussed risk from Internet predators, prospective employers and those evaluating a student’s worth for college admittance might not be impressed.

Source #3

27

Sometimes teens have accessed and created web communication accounts using a computer not available to the parent.

Source #3

28

The parent may be the last, or the only barrier that stops a child from being victimized by a sexual predator.

Source #3

29

It is a parent's duty to watch over and protect their children- sometimes that means being the parent, and no necessarily the child's best friend.

Source #3

30

Teens should not be posting details like their date of birth, hair color and style, favorite hobbies or after-school activities, where they attend school, names of their best friends, etc. and if so parents need to tell them not to.

Source #3

31

Your children may be getting followers that they do not know and they follow them anyways, allowing the stranger to see your childs posts and the stranger may be sexually interested in your child and could do anything to get to you which would lead to harm.

Source #3

32

The content that some children may post on their social media accounts often contains talk about drinking alcohol and using illegal drugs and it might use sexual overtones, use dark undertones related to suicidal thoughts or suggest violent deeds.

Source #3

33

Two most common incidents reported to police are:

1.) Children that have been victimized by sexual predators.

2.) Bad Behavior of teenagers harassing others through text-messaging, and verbal threats of harm.

Source #3

34

In evaluating a person’s readiness to enter the professional world, many businesses and schools check what kind of Internet social sites a person visits, the content of blog conversations, and with whom that person associates.

Source #3

35

Although on some phones aren't smartphones and can only text and call, people can still send dirty texts and sext and that's one reason why parents should especially check their children's phones even though your children act nice about it.

Source #3

36

Maintain an open dialog with your children, and monitor the use of their cell phones and have positive parental involvement can prevent their children from being victims of crime.

Source #3

37

Not only can inappropriate use of a cellular phone be reason for school suspension or expulsion, in certain circumstances threatening text-messages, sharing of sexually explicit digital images, or those containing evidence of a crime may be grounds for a criminal investigation and subsequent arrest.

Source #3

38

Internet concerns it is highly recommended that parents discuss use of internet technologies, impressing upon their children the dangers involved in using websites such as Myspace or Facebook.

Source #3

39

It is suggested that if parents allow their children to create a Myspace or other account, that the parents have full access to monitor the content and conduct within that account.

Source #3

40

The child may be naively continuing contact with someone intent on sexually abusing him/her at a later date and most incidents of non-family related abuse is by a sexual predator that spends an enormous amount of time grooming a child for future suxual abuse.

Source #3

41

Social approval is especially craved by teens because they are beginning to shift focus from family to peers.

Source #4

42

One important way to make this guidance more effective would be if parents chose to monitor their children’s digital behavior by acquiring their passwords and paying close attention to their social network activity such as Facebook and chat rooms, even if it means skimming through their private messages.

Source #4

43

One important way to make this guideline more effective would be if parents chose to monitor their children's digital behavior by acquiring their passwords and paying close attention to their social network activity such as Facebook and chat rooms, even if it means skimming through their private messages.

Source #4

44

While cyberbullying is indeed a danger to children, it is not an excuse to invade their personal life-world.

Source #4

45

As online spaces are not inherently more dangerous than those offline, it seems reasonable to suggest that similar limitations and restrictions on invasions of privacy that apply online should also apply offline.

Source #4

46

Moreover in less traditional ‘offline’ spaces children have far greater ability to choose which information they share with their parents and what they do not.

Source #4

47

Responsible parents need to be one step ahead because at these relevant stages, cognitive abilities are advancing, but morals are lagging behind, meaning children are morally unequipped in making informed decisions in cyberspace.

Source #4

48

They should also spend time surfing the Internet together with them to discuss their issues and problems. But the child should always also have the opportunity to have his or her own protected and private space that is outside the every watchful surveilant eye of the parent.

Source #4

49

The UNCRC clearly states that “No child shall be subjected to arbitrary or unlawful interference with his or her privacy, family, home or correspondence, nor to unlawful attacks on his or her honour and reputation."

Source #4

50

Also if the parents searched their stuff, they could be trying to send a message to the people out in the open that somebody is threatening them or hurting them and maybe they didn't want to tell anybody in person because possibly the person hurting them could be stalking them or watching over them to make sure they don't tell on them.

Source #4


Related pages


expiration during quiet breathingcampbell biology 9th edition chapter 9the ________ supported the ratification of the constitutionsuperficial blood vesselsstrong and weak acidsthe somatosensory systemthe function of centriolesthe somatic nervous system primarily innervates thesynovial joint injury7.4 hemoglobinwhat is the adenohypophysisinduced fit hypothesis of enzyme catalysismeichenbaum cognitive behavior modificationwhat gland has both endocrine and exocrine functionsnormal expiratory reserve volumeincidental nabothian cystsphylum chlorophyta characteristicstaste receptors are distributed in which of the following placesfunction pharynxparasympathetic postganglionic neuronswhat is a baroreceptor reflex300mm equals many cmdarwin auxin experimentreactions that require energystrong acids and bases listplasma without clotting factor is calledanatomy and physiology chapter 17ap biology chapter 18 testfold mountain rangespulmonary semilunara hormone synthesized in the hypothalamuswhat are two pathways that might follow glycolysisexamples of multipennate musclescarbon 14 protons neutrons electronshow many cells does mitosis producepharmacology flash cards for nursingdescribe the second portion of photosynthesisthe most commonly used developer in hair color ismedulla oblongata strokegallbladder role in digestive systemmicrobiology lab midtermdefine hepatic portal veindefine chaparral biomegerm discwhat must happen before mitosis can beginsample size toothpastegoniometric assessmentlocation of the centriolesafman 23-110 vol 2 part 2polymer of lipidsplant cell rough erchapter 12 section 1 dna the genetic materialjava exercise programscampbell reece biology 7th edition test bankdeep fibular nerveanatomy and physiology of blood vesselsright atrium through the tricuspid valve to thenano3 name4 excretory organsultrastructure of cell membranesensory division of nervous systemfemale climactericprimary function of the uterushenri iv receiving the portrait of marie de medicigametes containdefinition of medical asepsischromosomes stop moving toward the polesthe lymphatic system and immunityhormone that increases blood sugarapush chapter 1 testmitochondria differ from chloroplasts in that mitochondriafetal pig mouthwhat is a folkwaywhat is bleeding from capillary beds calledweather flash cardsdefine choroid coatcell membrane protein synthesischemotaxis refers to the ability to