Recap: Talkie Time: Research Facts
Recap: Talkie Time: Research Facts
Recap: Talkie Time: Research Facts
3
REVIEW OF LITERATURE
6
What is the purpose of the Review of Literature?
PURPOSES:
9
Why Use Citation?
• Allows readers to cross-reference
your sources easily
• Provides consistent format within
a discipline
• Gives you credibility as a writer
• Protects you from plagiarism
Avoiding Plagiarism
• Academic honesty and integrity!
–Proper citation of your sources can help you
avoid plagiarism, which is a serious offense. It
may result in anything from failure of the
assignment to expulsion from school.
•You are academically dishonest if:
•Someone writes your paper for you
•You purchase a paper
•You copy a paper from online
•You fail to cite your sources
•Your present someone else’s ideas as your
own
12
Academic Paper Formats
MLA (Modern Language Association) - used in literature, arts management,
business and the humanities
CMS (Chicago Manual Style) -The Chicago Manual of Style, also often called
“Turabian Style”. Used in Social sciences and natural & physical sciences, but
most commonly in the humanities—literature, history, and the arts.
Citation Locations
• If you have done your citing correctly, you should have mentioned
each reference work at least once in your paper and each cited
resource should have a reference citation.
23
Application
Source: STEC. STEC SHS Code. Lapu-Lapu City: DepEd Publishing. 2016. Print. (p 99)
“The STEC strictly adhere to its commitment as explained in the STEC SHS Code: We are the STEC
Senior High Students. Independent and self-reliant. We are committed to develop ourselves the
21st century skills: critical thinking, creativity, communication and collaboration. We are the
future, We are the leaders of STEC Senior High School. “
Paraphrase
MLA:
APA:
CMS
Quote (incorporation in text)
MLA:
APA:
CMS
Quote (non incorporation in text)
MLA:
APA:
CMS 24
Application
Source: STEC. STEC SHS Code. Lapu-Lapu City: DepEd Publishing. 2016. Print. (p 99)
“The STEC strictly adheres to its commitment as explained in the STEC SHS Code: We are the STEC
Senior High Students. Independent and self-reliant. We are committed to develop ourselves the
21st century skills: critical thinking, creativity, communication and collaboration. We are the
future, We are the leaders of STEC Senior High School. “
Paraphrase
MLA: As stated by STEC, the statement on the STEC adheres…
APA: As stated by STEC (2016), statement on the STEC strictly adheres…
CMS : As stated by STEC, the statement on the STEC adheres…
Quote (incorporation in text)
MLA: As explained by STEC in STEC SHS Code, “The STEC… School” (99).
APA: As explained by STEC (2016) in STEC SHS Code, “The STEC… School” (p. 99).
CMS : As explained by STEC in STEC SHS Code, “The STEC… School” 99.
Quote (non incorporation in text)
MLA: “The STEC…School” (STEC 99).
APA: “The STEC…School” (STEC, 2016, p. 99).
CMS: “The STEC…School” (STEC 2016, 99). 25
Cyberbullying: How Physical Intimidation
Influences the Way People are Bullied
Tyler Maxwell
University of West Florida
26
Cyberbullying: How Physical Intimidation Influences the
Way People are Bullied
27
Review of Literature
28
This statistic is interesting however because when compared to studies
that were done amongst younger age students you see that the numbers
are drastically different. Wegge, Vandebosch, and Eggermont(2014) found
that among 1,458 13-14 year old students that considerably less students
reported being cyberbullied. This is very similar to what Vanderbosch and
Van Cleemput (2009) found among 2052 students in the 12-18 ranges
which concluded that 11.1 percent of students had been victims of
cyberbullying. This research concludes that cyberbullying appears to be
more prevelant in students as they get older. Wegge et al. (2014) also
noted that 30.8 percent had been victims of traditional bullying.
29
The Types of People Who Bully. An important factor when analyzing
cyberbullying is trying to understand the types of people who are the
aggressors. The first thing that needs to be discussed when analyzing this is the
simple matter of gender when it comes to who is generally the aggressor. Slonje
and Smith (2008) found that when it comes to cyberbullying males are more
often than not the aggressors with males being reported as the cyberbully far
more often than females. Slonje et al (2008) also found that 36.2 percent of
students were unaware of the gender of their aggressors. This is intriguing
because for one its is the same percentage as the number of males who bullied,
but most importantly because it shows that over 1 in 3 students don’t actually
know who is bullying them, which adds to the fear and stigma that is related to
cyberbullying and not being able to escape the perpetrators.
30
The Types of People Who are Victims. Researchers have also
conducted various studies on the types of people who are
cyberbullied, or what is often referred to as “cybervictomology”.
Abeele and Cock (2013) conducted a study, which concluded that
the gender of victims varied greatly depending on the form of
cyberbullying. Abeele et al. (2013) found that males are more likely
to be on the receiving end of direct cyberbullying while females are
more likely to be the victims of indirect cyberbullying such as online
gossip among peers. These findings appear to remain true to social
social norms where males are viewed as more confrontational and
females are often stereotyped as gossipers.
31
The Relationship Between Bully and Victim. The relationship between
aggressor and victim is also something that has been heavily research among
professionals. Beran and Li (2007) conducted a study that involved 432 middle
school students and concluded that just under half of the studnets had been
victims of cyberbullying as well as traditional bullying. This is true across
multiple studies. Wegge et al. (2014) also concluded that people who were
bullied in traditional manners had a much higher likelihood to become victims
of cyberbullying. Another interesting relationship between bully and victim is
that studies have also shown that people who are victims are likely to become
aggressors in the online world. Beran et al. (2007) confirms this by stating,
“students who are bullied through technology are likely to us technology to
bully others”.
32
Effects of Cyberbullying. The first part of this literature review
focused on the demographics of the bullies and their victims,
but now we will focus on the lasting effects and the trauma it
brings to the victims as well as the different forms of
cyberbullying. While the platforms used are different the
lasting effects that the bullying has on the victims are very
similar. Faucher et al. (2014) concluded that one of the main
effects that cyberbullies had on university students was that
they were unable to accomplish some of their school
assignments.
33
APPLICATION: Write the required citation.
MLA
APA
CMS 34
ANSWERS
Paraphrase
MLA: As stated by Acar, IQ and EQ are predominantly related…
APA: As stated by Acar (2016), IQ and EQ are predominantly related…
35
ANSWERS
36
Groupings: Minimum Required Citations & References
1. Theory (1)
2. Sub-Theory (1)
3. Related studies (International 3)
4. Local studies (5)
37
STEC SENIOR HIGHSCHOOL DEPARTMENT
4 3 2 1 Weights Score
CRITERIA Very Good Good Fair Poor
TOTAL
38