2CYBERBULLYING AMONGST YOUNG ADULTS RESEARCH PAPER OUTLINE I. Introduction A. “children using social media for the longest time.” B. Why cyberbullying has become so common among young adults? C.History of cyberbullying D.Thesis II. Body section 1 (Quantitative approach) A. Hypothetical study explanation B. Research question and answer i. What is the mental state of the victim? ii. What are the actions of victims when they face the bullying? iii. Why don’t the victims report to their parents or elders? iv.Why does bullying take place? C. Independent variable i. Cyberbullying D. Dependent variable i.Thoughts of victims ii. Beliefs of victims E. Planned analysis i. Survey a. Interviews b. Questionnaires
3CYBERBULLYING AMONGST YOUNG ADULTS III. Body section 2 (Qualitative analysis) A. Hypothetical study B. Research questions i. Is the use of cell phone more often? ii. What is the frequency of cyberbullying? iii. What was the reaction of the elderly person when the cyberbullying incident was shared? C. Types of qualitative techniques i. Close observation of the victim and change of behavioral pattern. ii. Personal interviews and questionnaires IV. Conclusion A.“children should not be allowed to be on social media” B.Impact of cyberbullying on young adults.
4CYBERBULLYING AMONGST YOUNG ADULTS References Beran, T., & Li, Q. (2005). Cyber-harassment: A new method for an old behaviour. Journal of Educational Computing Research, 32(3), 265–277. Li, Q. (2010). Cyberbullying in high schools: A study of students' behaviors and beliefs about this new phenomenon.Journal of Aggression, Maltreatment & Trauma,19(4), 372- 392. Nelson,M.(2003).Schoolbulliesgoinghightech.Retrievedfromhttp://www. canoe.ca/NewsStand/LondonFreePress/News/2003/09/02/174030.html Thorp, D. (2004). Cyberbullies on the prowl in the schoolyard. Retrieved from http:// australianit.news.com.au/articles/0,7204,9980900^15322^^nbv^15306,00.html Vandebosch, H., & Van Cleemput, K. (2008). Defining cyberbullying: A qualitative research into the perceptions of youngsters.CyberPsychology & Behavior,11(4), 499-503.