Research Cyberbullying

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

MacArthur National High School

MacArthur, Leyte
Senior High School Department

Part one, “Prevalence & Forms of Cyber-bullying” discusses about forms of cyber-bullying or the
different ways to bully people through electronic devices.
Part two, “Cyber-bullying Among Teenagers” discuss about the profile of teenagers that involves in
cyber-bullying.
Part three, “Effects of Cyber-bullying” discuss about the effects of cyber-bullying and the people
involves
Part four syntheses, summarizes of literature reviewed which serve as basic for the present today.
-----------------
Part four, definition of terms, conceptually and operationally defines the important terms in the study.
Part five, scope and delimitation of the study. States the scope of the study including the setting, the
time frome, the research instrument, and the respondents of the study.
outing, exclusion, cyber-stalking and cyber-treats. Flaming in online fights using electronic message
with angry and vulgar language. Harassment is another form in which the cyber-bully repeatedly
sends insulting messages via the internet. Conigration is “dissing” someone online which can include
sending or posting gossip or rumors about a person that could damage their reputation or friendships.
Impersonation is pretending to be someone else in order to gut that person in trouble with other people
or to damage their reputation and friendships. Outing is sharing someone’s secrets, embarrasing
information, or photos online without his/her permission. Exclusion is intentionally exluding someone
from an online group. Cyber-stalking is repeated, intense harassment and denigration that include
threats or creates a significant amount of fear in the victim. Lastly, cyber-threates are defined as either
threats or “dintreaning material” general statements that make it sound like the writer is
The main purpose of this study is to find out how students perceived the effects of cyber-
bullying in MacArthur National High School for Arts and Trades.
The research chose this study because cyber-bullying is a serious problem among teenagers
today which greatly affects online reputation. It has big effects on the life of the people involved,
especially the bullied. The researchers wanted to measure the effects of cyber-bullying and the
offensive discourages in cyberspace, as well as to find out ways to prevent cyber-bullying.

Independent Variable Dependent Variable

Figure 1: Conceptual Paradigm showing the relationship of variables.


Communication protocol (retrioved from
Cyber-bullying Grade 10 Students
http://www.thefreedictionary.com/interheton 08-21-2018).
As used in this study, “internet” refers to a tool being used by netizenato communicate and socialize
with other people.
SCOPE AND DELIMITATION OF THE STUDY
The scope and delimitation of the study includes the setting, the time frame and the number of the
respondents.
MacArthur National High School for Arts and Trades in MacArthur, Leyte was the setting in
which the study was conducted. The time frame for the conduct of the study lasted for almost seven
(7) months, from August to March 2019. The respondents or subjects for the study were the Grade 10
students of MacArthur National High School for Arts
STATEMENT OF THE PROBLEM
Generally, this research paper would provide information about the effects of cyber bullying.
Specially, it seeks to answer the following questions:
1. What is the profile of the respondents in terms of sex, age, and specialization?
2. What are the effects of cyber-bullying as perceived by Grade 10 students?
Significance of the Study
The results of this study provided beneficial to the following:
Cyber-bullies. This study will let the cyber-bullies know what are the effects of cyber-bullying to
people they bullied and how it can greatly affect their self-esteem. Bullied as Victims. The study will
give information to the victims for them to know what the possible consequences when they are being
bullied and how they can overcome these.
=====
Teenagers. This study will provide ideas to teenagers on how they can help their fears to overcome
from the situation of being a victim of cyber-bullying.
Netizens. This study will give information to netizens to become aware that cyber-bullying is very
rampant in the society, and what would be the proper action to solve or minimize such problem.
Researchers. This will help the researchers to gain knowledge on how to use technology and social
media in a right manner to avoid becoming cyber bullies or even victims thereof.
Future Researchers. This study will give information to future researchers for them to use it as a basis
or reference for their future studies related to this.
pppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppp z

Frame, the research instrument, and the respondents of the study.


Background of the Study
Cyber-bullying is a serious concern for any teenager that has become a growing problem today
because of the influence of digital or electronic media. It is also a unique form of bullying that has
gained a significant amount of attention in recent years. According to Smith 4 Tippet (2006), cyber-
bullying can be penetrated over a large number of technological mediums, including: Social
networking media (e.g. Facebook, Twitter), email, instant messaging, text messaging, pictures or
videos taken via mobile phones or webcams, chat rooms, or forums, and may other types of websites.
In addition, cyber-bullying is not limited to simply sending hurtful or insulting messages, it
encompasses a
----------------------------------
Affairs that are produced by a cause (retrieved from http://www. Thefreedictionary.com/effects on 8-
21-2017).
As used in this study, “effects” refers to the results or consequences of cyber-bullying.
Perception referes to the way you think about or understand someone or something: the ability to
understand someone or something: the ability to understand or notice something easily (retrieved
from http://www.thefreedirctionary.com/perception on 8-21-2018).
As used in this study, “perception” refers to the opinion of students on the effects of cyber-
bullying.
Cyber-bullying refers to a form of bullying that takes place using electronic technology (retrieved
from http://www.thefreedictionary.com/cyberbullyingon08-21-2018).
As used in this study, “cyber-bullying” refers to
And Trades. Survey questionnaires were used as the data gathering instrument with a maximum of 10
questions to assure clear data being gathered. The main purpose of this study was to find out how
student percieved the effects of cyber-bullying.
Chapter 2
Review of Related Literature
Chapter 2 is systemized into four parts namely: (1) Prevvalence 4 forms of cyber-bullying (2) Cyber-
bullying and Self-esteem (3) Recommended Prevention, Interventions, and (4) Synthesis.
Part One, “Prevalence 4 forms of Cyber-bullying”
Emotionally upset and may be considering harming someone else, themselves, or committing suicide
(Willard, 2006).
According to Willard, there are three related concerns in addition to the nine forms of cyber-
bullying. These are
Students disclosing massive amounts of personal information via the internet, becoming addicted to
the internet to the point where their lives are highly dependent on their time spent online, and the
prevalence of suicide and self-harm communities in which depressed youth will sometimes access to
gain information on suicide and self-harm methods (Willard, 2006).
In confronting cyber-bullying (2009), Shariff overviews additional concerns related to cyber-bullying.
These are anonymity, an infinite audience, prevalent sexual and homophobic harassment, and
permanence of expression. Anonymity refers to the anonymous nature of cyberspace in which people
are able to hide behind screen names that protect their identity, which was mentioned earlier in this
chapter. The online audience is described as being infinite due to the large number of people that are
able to see what in written by the bully and the tendency of onlookers to support the perpetrators
rather than the victim (cited in Shariff, 2009). Shariff’s third concern is the emergence of sexual and
homophobic harassment on the internet, which she feels may be related to gender differences in the
way that males and females use communication technology. The internet has a permanence aspect that
is difficult to erase because once anything is posted online, millions of people can download and save
it immediately, and share it with others.
The private nature of the internet refers to people having private e-mail and social networking
accounts secured with passwords and therefore are difficult to

========
Forms of cyber-bullying go beyond name calling and enter a world of impersonation and cyber-
threats. According to Willard (2006), there are eight main forms of cybery-bullying: flaming,
harassment, denigration, impersonation,
============
Prevalence & Forms of Cyber-bullying
Cyber-bullying involves the use of information and communication technologies to cause
harm to other (Belsey, 2004). According to the National Crime Prevention Council and Harris
Interactive, Inc.’s study in 2006, 43 of the students surveyed had been cyber-bullied within the last
year (cited in Moessner, 2007). That same year, the Few Internet and American Life Project found
that one out of three teens have experienced online harassment (Lenhart, 2007).
According to an article in the NASP Communiqué (2007), a poll conducted by the Fight
Crime: Invest in Kids group found that more than 13 million children in the United States aged 6 to
17 were victims of cyber-bullying. The poll also found that one-third of teens and one-sixth of
primary school-aged children had reported being cyber-bullied (cook, Williams, Guerra,
Tuthill,2007).
=====================
DEFINITION OF TERMS
To have a better understanding of this study, terms are conceptually and operationally
defined.
Effects – refers to a change that result when something is done or happened: an event,
condition or, state of affairs that is produced by a cause (retrieved from
http://www.thefreedictionary.com/effects on 8-21-2018).
As used in this study, “effects” refers to the results or consequences of cyber-bullying.
Perception – refers to the way you think about or understand someone or something: the
ability to understand-----------
As used in this study, “cyber-bullying” refers to the activities or attitudes of cyber-users
which could be considered as offensive and harmful to others.
Students – refers to a learner or someone who attends and educational institution (retrieved
from http://www.thefreedictionary.com/student on 8-21-2018).
As used in this study, “students” refer to the Grade 10 students in MacArthur National High
School for Arts and Trades for S.Y. 2018 – 2019.
Netizens – refers to a user of the internet, often one who is actively engaged in uncensored
online discussion of political and social issues (retrieved from
http://www.thefreedictionary.com/netizen on 8-21-2018.
As used in this study, “netizens” refers to the people who actively use and are involved in
social media.
Electronic Technology – refers to a growing industry that is expanding rapidly into many
areas within telecommunication, or biotechnology (retrieved from
http://www.thefreedictionary.com/electronictechnology on 08-21-2018).
As used in this study, “electronic technology” refers to the areas in telecommunication which
become an avenue for cyber-bullying.
Internet-refers to a global computer network providing a variety of information and
communication facilities, consisting of interconnected networks using standardized.
======
Range of behaviours, from publicly revealing personal information or humiliate a victim. Cyber-
bullying can be thought of an online reputation which may be accessible to schools, employers, clubs,
and other who may be searching a individual now or in the future. It can harm the online reputation of
everyone involved-not just the person being bullied, but those doing cyber-bullying or participating in
it.
Furthermore, the most visible difference between cyber-bullying and traditional bullying in the format
in which is occurs. According to Juvonen and Gross (2008), tradditional bullying typically occurs
face to face but cyber-bullying takes place using an electronic forms of contact.
Moreover, Cyber-bullying can affect the self-esteem of a person so it may also affect the self-
confidence and satisfaction of the victims. Cyber-bullying also has affects on the bullies. Bullies can
experience a negative impact on their behavior while growing up. According to Tettegah (2006), the
effects include criminal behaviour, abusive behaviours, a stronger inclination to drinking, smoking
and commiting suicide.

Random sampling is a part of the sampling technique in which each sample has an equal probability
of being chosen. A sample chosen randomely is meant to be an unbiased representation of the total
population. If for some reasons, the sample does not represent the population, the variation is called a
sampling error. Random sampling is one of the simplest forms of collecting data from the total
population. Under random sampling, each member of the subset carries an equal opportunity of being
chosen as a part of the sampling process (retrieved from https://eco-ind-times.com/def/random-
sampling on 08-26-18).
The Grade 10 Students in MacArthur National High School for Arts and Trades were the
participants of the study.
Table 1 presents the profile of the participants in terms of age, sex and specialization

Table 1
Profile of the Respondents
Category F

Entire Group 178100.0

Age

15 years old 54 30.34%

16 years old 9151.12%

17 years old 31 17.42%


18 years old 2 2.12%

Sex

Male 78 43.82%

Female 100 56.18%

Specialization

Servicing

Garments 17 7.86%

Food Trades 51 28.65%

Cosmetology 21 11.79%

EIMIS 8.43%

Carpentry 2212.36%

Automotive 14 7.8%

Technical Drafting 22 12.36%

Machining 4 2.25%

Electronics15 8.43%

======
This study was conducted to find out how students perceived the effects of cyber-bullying.
According to Jahoda, Deutchs Cook (n.d). a research design is the arrangement of conditions
for the collection and analysis of data in manner that aims to combine relevance to research purpose
with economy and procedure.
The research design of this study was descriptive. Descriptive research is defined as a
research method that describes characteristics of the population or phenomenon that is being studied
(retrieved form research design/descriptive-evaluative.pdf on 08-25-2015).

============
Perpetrating cyber bully behavior and at least one incident where they were a victim of cyberbullying
(Pettalia, Levin & Dickinson, 2013).
EFFECTS OF CYBER-BULLYING
Sometimes it may be difficult for adults to recognize if child is being cyber-bullied if the
child does not report the attacks to them. Smith et al. (2008) found that out of 71 students who had
been cyberbullied, 43.7% did to report the cyber attacks to anybody. The 53.3% of victims who did
tell somebody about the cyberbullying reported that they told friends (25.8%). Only 15.5% of victims
told

================
Increased the chances that a student would be a victim of cyber-bullying. Repeated cyber-bullying
was defined by seven or more experiences of intimdation in the past year. Also, if a student was using
instant messaging or webcam, they were about 2.5-2.8 times more likely to experience
=============
Differences between teens who cyberbully is often controversial, but it has been found that teens who
cyberbully are more often males (Walrave&Heriman, 2011). Adolescents who have reported recent
problems at school, assaultive behaviors, or report using illegal substances were more lieky to
cyberbully (Hinduja&Patchin, 2008).
Another study found that the teens who cyberbully are in need of social support, have
unhappy feelings, and are eager to use drugs (Sahin, 2012). Both male and female teens who
cyberbully scored a lower affective empathy score than victims of cyberbullying, teens who both
cyberbullied and were victims of cyberbullying, and those who were not involved in cyberbullying at
all (Pettalia, Levin & Dickinson, 2013). This suggest that teens who cyberbully often are not affected
by the emotions that others feel. Cyberbully or victim. A cyberbully-victim is someone who reports at
least one incident where they have been
==========

screen names and therefore still be able to contact the victim. Chat rooms or bash boards are a lot like
instant messaging, however, instead of one-on-one real time communication, there is a group of
people who are alla talking together at the same time (Beale & Hall, 2007).

CYBERBULLYING AMONT TEENAGERS


Studies have examined reasons why cyberbullies feel the need to bully others and whether or
not there are common characteristics between teens who cyberbully. Walrave and Heriman (2011)
found that the three most common motives behind cyberbullying, reported by teens who cyberbully,
are that it was revenge to the victim, that the victim deserved it, or just because it was fun. Gender
=========
2009). Children who are victims of cyber-bullying may become nervous or jumpy when they receive
an instant message, text message, or e-mail, and may avoid telling adults about what they are doing
when they are online (Minduja&Patchin, 2009).
Victims of cyber-bullying are more likely to be internet risk-takers (vandebosch&Van
Cleemput, 2009). Students who are cyber-bullying may rapidly switch the computer screens when an
adult enters the room (National Center for Mental Health Promotion and Youth Violence Protection,
2009). Children who are cyber-bullying others online may consistently be on the internet at all hours
of the night an become unusually upset if they cannot use the computer.
Another warning sign that a child may be engaging in cyberbullying is if they use more than
one e-mail acount or instant message screen name. sometimes, offenders use screen names that are not
their own (Hinduja&Patchin,
==========

Chapter 3
Research Design and Methodology
This chapter 3 is categorized into three parts, namely: (1) Purpose of the Study and Research
Design (2) Methods, and (3) Data Analysis Procedure.
Part one, purpose of the Study and Research Design, restates the purpose of the study and
describes the research design used in the study.
Part two, Method, describe the participants, the date gathering instruments, and the research
procedure employed in the study.
Part three, Data Analysis Procedure, discusses the manner how to validate the answer in the
method.

Purpose of the Study and Research Design

============
Secured with passwords and therefore are difficult to monitor. In the school yard, bullies would often
be noticed by teachers and other faculty if they were taunting or hurting another student. However,
online, there are not any teachers watching over what is going on. Parents often do not know what
their children are doing online and therefore the child could be being bullied or a bully themselves and
there is nothing anyone can do about it unless the victim tells their parents what is going on. This does
not happen often, due to victims often feeling that if they tell an adult about it, the problem will get
worse. The absence of non-verbal communication cues when it comes to the internet is another factor
that Heirman & Walrave find concerning. The absence of these cues may lead to people sharing their
most intimate stories with people without realizing what they are doing. With the absence of someone
sitting there listening to the other person share their story, non-verbal cues such as body language and
facial expression are missed. This can lead to the story teller divulging more information than they
normally would with a particular individual or on or the other taking a statement the wrong way and
becoming upset easier than they would if they were face to face (Heirman&Walrave, 2008).
There are numerous ways in which cyber-bullies reach their online victims. According to
Willard (2006) there ways include sending cruel, vicious and sometime threatening messages,
creating web sites with content about the victim without the victim knowing, or posting pictures
online asking other people to rate things such as who is the biggest loser in the school. Other cyber-
bullies may break into the victim’s e-mail account to send e-mails posing to be the victim, engage the
victim in a conversation via instant messaging and send the information
=============

=========
2009). Another risk factor can be attributed to the parents and guardians of children. Children who
live in homes where their parents or guardians are involved with monitoring their child’s internet use
have a high chance of becoming a cyberbully offender. Being very computer literate and
understanding the high functioning of computers did not increase the chances that somebody would
become a cyberbully offender. Unlike high internet use, the increased use of cellular telephones was
not a predictor for a child becoming a cyberbully (Candebosch& Van Cleeput, 2009). That could be
because it is easier to trade a cell phone attack than an online message. 15 it is also important to pay
attention to traditional bullying.
===========
which is more observable for adults than cyber-bullying. Traditional bullies are more likely to be
cyber-bullies as well and the victims of traditional bullying are also more likely to be victims of
cyber-bullying.
Paying attention to traditional bullying is important as it could be an indicator that cyber-
bullying may be going on as well (Patchin&Minduja, 2006) Ybarra (2004) found that students who
reported being a victim of cyber-bullying may also be – themselves. Some students find themselves
harassing their own attackers in retaliation. Students may be actively engaging each other in
aggressive interactions. Age is also associated with the likelihood that a child will be associated with
cyber-bullying.

==========
their parents or guardians and only 8.5% told an adult at their school. 14 there are some warning signs
adults should be alert to recognize. Some victims of cyberbullying are reluctant to use the computer
(Feinberg &Robey, 2009).
Other students have a general change in attitude about school or become reluctant to attend
school. Some students start to fall behind in their homework when they become victims of cyber-
bullying (National Center for Mental Health Promotion and Youth Violence Protection, 2009). A
change in a child’s behavior or mood can also be indicator that cyber-bullying may be occurring
(Feinberg & Robey, 2009). Children may also exhibit signs of sleeping problems, acting sad, and
withdrawing from others (National Center for Mental Health Promotion and Youth Violence
Protection,
==========

Repeated cyber-bullying compared to those students who did not use instant messaging or webcams,
Meach (2009) found that children who have an active social network have an increased chance of
being bullied. Children are also more likely to be bullied if they use chat rooms than those who do
not. It is important to watch for signs of cyber-bullying and limit the amount of time spend having
internet access.
Synthesis
Cyber-bullying is on the rise with the advanced and availability of technology in our
fingertips. Cyber-bullying is becoming more prevalent as students spend on increasing amount of time
using technology that keeps them connected at all hours of the day. They developed and utilized
survey more middle and high school students about cyber-bullying could assist in keeping track of the
prevalence.
When it comes to the effects of cyber-bullying, students have a general change in attitude
about school or become reluctant to attend school. They are more likely to
========
Data Gathering Instruments
This study collected the data by means of a survey questionnaire.

Survey Questionnaire
A survey questionnaire is defined as documents containing questions and other types of items
designed to solicit information appropriate to analysis. Questionnaire is equally used in survey
research, experiments and other modes of observation. These apply to all types of research and
generally an ethics application will be required with human subjects. In designing survey
questionnaire
========
collected to other people, or take pictures of the victims without them knowing, such as in the locker
room (Willard, 2006).
According to Beale and Hall (2007), the six main ways are e-mail, instant messaging, chat
rooms, bash boards, small text messaging, web sites, and voting booths. E-mail is used to send
harassing and threatening messages to the victims and although it is possible to trace where the e-mail
was sent from, it is often difficult to prove exactly who sent the e-mail. Instant messaging (IM) allows
for “real time” communication. Although most IM programs allow users to create a list of screen
names that they do not want to contact them, it is easy for bullies to create new
===========
Attackers and victims are both more likely to be in high school rather than middle school (Ybarra &
Mitchel, 2004). Race and gender are not associated with the likelihood that someone will be involved
in cyber-bullying. Victims of cyber-bullying and – offenders are both more likely to engage in a
variety of online activities, experience school problems, enage in substance abuse, and assult their
peers (Hinduja&Patchin, 2008). Ybarra and Mitchell (2004) found that 20-25% of offenders and
victims reported that they used cigarettes or alcohol, and 50% of the victims or offenders reported that
their parents poorly monitored their online activities. Also, when students reported confidence in
internet use, 16 they were 2.5 times more likely to be a cyber-bullying offender. Juvanen and Gross
(2008) defined heavy internet use as being logged on to the internet more than 3 hours the day
previous to taking their survey. They found that heavy internet use significantly

You might also like