Regulating Cyber Violence: Social Media's Impact on Females and Girls
VerifiedAdded on 2023/04/24
|62
|16096
|397
AI Summary
The document you provided is a research paper on the impact of social media in growing cyber violence for females and girls. The research focuses on cyber harassment done on females through social media platforms such as Facebook, Twitter, Instagram, and Snapchat. The aim of the research is to analyze the impact of social media in regulating cyber violence against girls and adolescent females. The paper is divided into five sections: Introduction, Literature survey, Research Methodology, Data collection and analysis, and Conclusion and suggestions. The introduction provides an overview of cyber violence on social media towards adolescent girls and females, while the literature review discusses various studies related to the impact of social media on adolescent girls and females. The research methodology section describes the tools and techniques used to complete the research, while the data collection and analysis section presents the findings of the study. The conclusion and recommendations section provides a summary of the research and suggestions for future improvements.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CYBER HARRASSMENT WITH FEMALES
How social media regulates cyber violence against girls and adolescent females
Name of the Student
Name of the University
How social media regulates cyber violence against girls and adolescent females
Name of the Student
Name of the University
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2
CYBER HARRASSMENT WITH FEMALES
Abstract
This research has been done analyzing impact of social media in growing cyber violence
for females and girls. The research has been focused on the cyber harassment done on females
through social media including Facebook, Twitter, Instagram and Snap Chat. The aim of the
research has been focused on analyzing the impact of social media regulating cyber violence
against girls and adolescent females. There are all out five parts in the research. These sections
incorporate Introduction, Literature survey, Research Methodology, Data collection and analysis
and Conclusion and suggestions. The principal section is Introduction that bargains with the
essential foundation of the research. This part incorporate diagram of the digital viciousness over
internet based life to pre-adult young ladies and females. The point, goals and research questions
have been talked about in the part.
The second part manages the writing survey of different written works identified with
effect of online networking on immature young ladies and females. Different examines on this
point have been concentrated in this part. The components improving digital harassing over the
internet-based social networking to females have been examined. The third section manages the
research procedure. This part centers around what apparatuses and methods have been utilized to
finish the research. This part has concentrated on information accumulation strategy and test size
of the instrument. Every single moral thought have been legitimately followed in the research.
The fourth chapter deals with the findings and analysis of the data collected in the data collection
process. A primary method of data collection has been selected for the collecting data and
information about online cyber harassment to females.The last chapter deals with the conclusion
and recommendations. A conclusion has been drawn from studying the research and some of the
recommendations to improve the research study in future have been provided.
CYBER HARRASSMENT WITH FEMALES
Abstract
This research has been done analyzing impact of social media in growing cyber violence
for females and girls. The research has been focused on the cyber harassment done on females
through social media including Facebook, Twitter, Instagram and Snap Chat. The aim of the
research has been focused on analyzing the impact of social media regulating cyber violence
against girls and adolescent females. There are all out five parts in the research. These sections
incorporate Introduction, Literature survey, Research Methodology, Data collection and analysis
and Conclusion and suggestions. The principal section is Introduction that bargains with the
essential foundation of the research. This part incorporate diagram of the digital viciousness over
internet based life to pre-adult young ladies and females. The point, goals and research questions
have been talked about in the part.
The second part manages the writing survey of different written works identified with
effect of online networking on immature young ladies and females. Different examines on this
point have been concentrated in this part. The components improving digital harassing over the
internet-based social networking to females have been examined. The third section manages the
research procedure. This part centers around what apparatuses and methods have been utilized to
finish the research. This part has concentrated on information accumulation strategy and test size
of the instrument. Every single moral thought have been legitimately followed in the research.
The fourth chapter deals with the findings and analysis of the data collected in the data collection
process. A primary method of data collection has been selected for the collecting data and
information about online cyber harassment to females.The last chapter deals with the conclusion
and recommendations. A conclusion has been drawn from studying the research and some of the
recommendations to improve the research study in future have been provided.
3
CYBER HARRASSMENT WITH FEMALES
Table of Contents
Chapter 1: Introduction....................................................................................................................5
1.1 Background.......................................................................................................................5
1.2 Problem statement.................................................................................................................5
1.3 Rationale................................................................................................................................6
1.4 Aim, Objectives and Research Questions..............................................................................8
1.5 Research Structure.................................................................................................................8
Chapter 2: Literature review..........................................................................................................11
2.1 Introduction..........................................................................................................................11
2.2 Cyber Bullying.....................................................................................................................11
2.3 Types of cyberbullying........................................................................................................15
2.4 Impact of social media on the cyberbullying of females.....................................................17
2.5 Gaps in Literature................................................................................................................19
2.6 Summary..............................................................................................................................20
Chapter 3: Research Methodology................................................................................................21
3.1 Introduction..........................................................................................................................21
3.2 Research Method Outline....................................................................................................21
3.3 Research Philosophy............................................................................................................22
3.3.1 Justification for selecting positivism philosophy.........................................................23
3.4 Research Approach..............................................................................................................23
CYBER HARRASSMENT WITH FEMALES
Table of Contents
Chapter 1: Introduction....................................................................................................................5
1.1 Background.......................................................................................................................5
1.2 Problem statement.................................................................................................................5
1.3 Rationale................................................................................................................................6
1.4 Aim, Objectives and Research Questions..............................................................................8
1.5 Research Structure.................................................................................................................8
Chapter 2: Literature review..........................................................................................................11
2.1 Introduction..........................................................................................................................11
2.2 Cyber Bullying.....................................................................................................................11
2.3 Types of cyberbullying........................................................................................................15
2.4 Impact of social media on the cyberbullying of females.....................................................17
2.5 Gaps in Literature................................................................................................................19
2.6 Summary..............................................................................................................................20
Chapter 3: Research Methodology................................................................................................21
3.1 Introduction..........................................................................................................................21
3.2 Research Method Outline....................................................................................................21
3.3 Research Philosophy............................................................................................................22
3.3.1 Justification for selecting positivism philosophy.........................................................23
3.4 Research Approach..............................................................................................................23
4
CYBER HARRASSMENT WITH FEMALES
3.4.1 Justification for selecting inductive approach..............................................................25
3.5 Research Design..................................................................................................................25
3.5.1 Justification for selecting descriptive research design..................................................26
3.6 Data Collection method.......................................................................................................26
3.6.1 Types of Data Collection method.................................................................................26
3.6.2 Justification for selected data collection method..........................................................27
3.7 Sampling Method and Size..................................................................................................27
3.8 Data Analysis Method.........................................................................................................28
3.9 Ethical Consideration...........................................................................................................29
3.10 Timeline.............................................................................................................................29
3.10 Summary............................................................................................................................31
Chapter 4: Findings and Analysis..................................................................................................32
4.1 Introduction..........................................................................................................................32
4.2 Quantitative Data analysis...................................................................................................32
Chapter 5: Conclusion and recommendations...............................................................................51
5.1 Conclusion...........................................................................................................................51
5.2 Recommendations................................................................................................................52
References......................................................................................................................................54
CYBER HARRASSMENT WITH FEMALES
3.4.1 Justification for selecting inductive approach..............................................................25
3.5 Research Design..................................................................................................................25
3.5.1 Justification for selecting descriptive research design..................................................26
3.6 Data Collection method.......................................................................................................26
3.6.1 Types of Data Collection method.................................................................................26
3.6.2 Justification for selected data collection method..........................................................27
3.7 Sampling Method and Size..................................................................................................27
3.8 Data Analysis Method.........................................................................................................28
3.9 Ethical Consideration...........................................................................................................29
3.10 Timeline.............................................................................................................................29
3.10 Summary............................................................................................................................31
Chapter 4: Findings and Analysis..................................................................................................32
4.1 Introduction..........................................................................................................................32
4.2 Quantitative Data analysis...................................................................................................32
Chapter 5: Conclusion and recommendations...............................................................................51
5.1 Conclusion...........................................................................................................................51
5.2 Recommendations................................................................................................................52
References......................................................................................................................................54
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
5
CYBER HARRASSMENT WITH FEMALES
Chapter 1: Introduction
1.1 Background
The internet has been increasing its importance in the 21st century. Social media has been
capitalizing the market by use of youngsters. It has been targeting both sex within the young
generation of the world. In the UK, there has been a sharp increase in the use of social media
among a young generation of both genders (Pereira, Spitzberg and Matos 2016). However, there
have been also increasing in cybercrimes in the country. The increase in the online crimes for the
women and girls over social media including Facebook, Twitter, Online dating websites and
other social media websites have creating alarming situation for the country. Many crime reports
have been reported in the UK in recent past years (Marganski and Melander 2018).
This research has been done in order to analyze the impact of social media on cyber violence
against girls and adolescent females. This research will focus on various factors causing cyber
violence against women.
1.2 Problem statement
Cyber harassment and online bullying have been taking several forms that have been
affecting adults and children. The Stop Online Abuse internetsite has been providing several
advice to the individual who is affected by offensive online content and harassment.
The National Society for the Prevention of Cruelty to Children (NSPCC) has been
explaining that cyberbullying has increased among children and adolescent females (Van Royen
et al. 2017). There have been various types of cyber harassment including abusive messages,
sharing porn videos and images, sending upset messages, encouraging people for self-harm,
making fake accounts and sending nude pictures and sexting (Van Royen et al. 2017). These
CYBER HARRASSMENT WITH FEMALES
Chapter 1: Introduction
1.1 Background
The internet has been increasing its importance in the 21st century. Social media has been
capitalizing the market by use of youngsters. It has been targeting both sex within the young
generation of the world. In the UK, there has been a sharp increase in the use of social media
among a young generation of both genders (Pereira, Spitzberg and Matos 2016). However, there
have been also increasing in cybercrimes in the country. The increase in the online crimes for the
women and girls over social media including Facebook, Twitter, Online dating websites and
other social media websites have creating alarming situation for the country. Many crime reports
have been reported in the UK in recent past years (Marganski and Melander 2018).
This research has been done in order to analyze the impact of social media on cyber violence
against girls and adolescent females. This research will focus on various factors causing cyber
violence against women.
1.2 Problem statement
Cyber harassment and online bullying have been taking several forms that have been
affecting adults and children. The Stop Online Abuse internetsite has been providing several
advice to the individual who is affected by offensive online content and harassment.
The National Society for the Prevention of Cruelty to Children (NSPCC) has been
explaining that cyberbullying has increased among children and adolescent females (Van Royen
et al. 2017). There have been various types of cyber harassment including abusive messages,
sharing porn videos and images, sending upset messages, encouraging people for self-harm,
making fake accounts and sending nude pictures and sexting (Van Royen et al. 2017). These
6
CYBER HARRASSMENT WITH FEMALES
people have been encouraging other individuals to do self-harm and harm others. Therefore, this
has been becoming a vital pressure over children and females.
1.3 Rationale
The use of the internet has been helping in connecting with different people all over the
world. Social media has been an important part of communication in the virtual world (Mohanty
and Samantaray 2016). The use of social media has been helping in connecting different people
in different part of the world. However, there is both positive and negative part of social media.
The positive part is that it makes easier for people for connecting with the different type of
people all over the world. However, the negative part is that various fake accounts have been
increasing cyber harassment and bullying over social media (Winkelman et al. 2015). Therefore,
social media has been affecting these adolescent girls and females who are school going. They
used to speak to their parents about cyber harassment so that they can they can take steps against
it. However, only 15% of the participants approach to police. This percentage has been very low.
This need to be improved so that hackers can be traced by the police (Van Royen et al. 2017).
Female victims need to approach directly to police related to cyber harassment cases. This help
in mitigating these issues in a proper manner.
The European Women’s Lobby has noticed a keen interest among activists and
researchers in coining a feminist lexicon of online Violence against women and girls VAWG
(Nova et al. 2018). Within various researchers and activists regarding online bullying and cyber
harassment. Therefore, various researches have been done in this field identifying various factors
for cyberbullying. The use of social media including Facebook, Twitter and Snap chat have been
creating various nuisance in the society for the females. Young girls and females have been
tortured over social media networks. Many adolescent girls and females have been feeling
CYBER HARRASSMENT WITH FEMALES
people have been encouraging other individuals to do self-harm and harm others. Therefore, this
has been becoming a vital pressure over children and females.
1.3 Rationale
The use of the internet has been helping in connecting with different people all over the
world. Social media has been an important part of communication in the virtual world (Mohanty
and Samantaray 2016). The use of social media has been helping in connecting different people
in different part of the world. However, there is both positive and negative part of social media.
The positive part is that it makes easier for people for connecting with the different type of
people all over the world. However, the negative part is that various fake accounts have been
increasing cyber harassment and bullying over social media (Winkelman et al. 2015). Therefore,
social media has been affecting these adolescent girls and females who are school going. They
used to speak to their parents about cyber harassment so that they can they can take steps against
it. However, only 15% of the participants approach to police. This percentage has been very low.
This need to be improved so that hackers can be traced by the police (Van Royen et al. 2017).
Female victims need to approach directly to police related to cyber harassment cases. This help
in mitigating these issues in a proper manner.
The European Women’s Lobby has noticed a keen interest among activists and
researchers in coining a feminist lexicon of online Violence against women and girls VAWG
(Nova et al. 2018). Within various researchers and activists regarding online bullying and cyber
harassment. Therefore, various researches have been done in this field identifying various factors
for cyberbullying. The use of social media including Facebook, Twitter and Snap chat have been
creating various nuisance in the society for the females. Young girls and females have been
tortured over social media networks. Many adolescent girls and females have been feeling
7
CYBER HARRASSMENT WITH FEMALES
depression with unappropriated images and videos over the social media (Mohanty and
Samantaray 2016). Internet innovation has been expanding its significance in the 21st century.
There has been an increment in the utilization of internet innovation in the market. Internet-based
life has been encountering bigger methodology in the market by the adolescents. It has been
focusing on both sex and sex inside the youthful age of the world. In the UK, there has been a
sharp increment in the utilization of social media among the youthful age of both sexual
orientations. However, there has been an increment in the cybercrimes in the nation. The use of
social media has been now changing with a period of time. Various fake accounts have been
created over Facebook, which is used for doing illegal activities over the internet (Felmlee, Rodis
and Francisco 2018).
This research has helped in throwing light upon the statistics of women and girls who are
affected by the negative part of the social media. Various online violence and harassment have
been faced by adolescent girls and females over social media (Mohanty and Samantaray 2016).
The lack of knowledge and awareness has been the main reason for this activity over social
media. These risk factors have been prevailing in the common society where females and girls
are feeling unsafe. There has been a rapid increase in the traffic of porn websites over time. This
has been increasing the rate of rape and other crimes on females over time. Various individuals
have been affected by watching porn and sex videos in society. These videos are sent to females
and adolescent girls over social media. These make them harass and feel depressed. There are
various trending messages for encouraging to self-harm through social media platforms.
The lack of awareness about various terminology and technology related to digital tools
have been causing a shift in the contemporary character of individuals over the internet. The
Women's Media Center Speech Project has been providing a list of forms of cyber violence
CYBER HARRASSMENT WITH FEMALES
depression with unappropriated images and videos over the social media (Mohanty and
Samantaray 2016). Internet innovation has been expanding its significance in the 21st century.
There has been an increment in the utilization of internet innovation in the market. Internet-based
life has been encountering bigger methodology in the market by the adolescents. It has been
focusing on both sex and sex inside the youthful age of the world. In the UK, there has been a
sharp increment in the utilization of social media among the youthful age of both sexual
orientations. However, there has been an increment in the cybercrimes in the nation. The use of
social media has been now changing with a period of time. Various fake accounts have been
created over Facebook, which is used for doing illegal activities over the internet (Felmlee, Rodis
and Francisco 2018).
This research has helped in throwing light upon the statistics of women and girls who are
affected by the negative part of the social media. Various online violence and harassment have
been faced by adolescent girls and females over social media (Mohanty and Samantaray 2016).
The lack of knowledge and awareness has been the main reason for this activity over social
media. These risk factors have been prevailing in the common society where females and girls
are feeling unsafe. There has been a rapid increase in the traffic of porn websites over time. This
has been increasing the rate of rape and other crimes on females over time. Various individuals
have been affected by watching porn and sex videos in society. These videos are sent to females
and adolescent girls over social media. These make them harass and feel depressed. There are
various trending messages for encouraging to self-harm through social media platforms.
The lack of awareness about various terminology and technology related to digital tools
have been causing a shift in the contemporary character of individuals over the internet. The
Women's Media Center Speech Project has been providing a list of forms of cyber violence
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
8
CYBER HARRASSMENT WITH FEMALES
against girls and females (Manaf et al. 2018). This approach has been helping in creating a
strategic approach in the development of awareness among women and females related to online
harassment and cyberbullying (Nova et al. 2019). This approach has been summarized in a reply
to a Parliamentary Question in 2013 by Lord Gardiner of Kimble.
1.4 Aim, Objectives and Research Questions
The aim of research has been focused on analyzing the impact of social media regulating
cyber violence against girls and adolescent females.
Following are the objectives of the research:
To identify reasons behind issues faced by adolescent girls and females due to addiction
over social media
To analyze impact of social media on the cyberbullying of females
To recommend strategies for mitigating these issues related to cyber bullying over social
media
Following are the list of research questions:
What are reasons behind issues faced by adolescent girls and females due to addiction
over social media?
How social media has been affecting females due to cyberbullying?
How these issues can be mitigated related to cyber bullying over social media?
1.5 Research Structure
There are total five chapters in the research. These chapters include introduction,
Literature review, Research Methodology, Data findings and analysis and Conclusion and
CYBER HARRASSMENT WITH FEMALES
against girls and females (Manaf et al. 2018). This approach has been helping in creating a
strategic approach in the development of awareness among women and females related to online
harassment and cyberbullying (Nova et al. 2019). This approach has been summarized in a reply
to a Parliamentary Question in 2013 by Lord Gardiner of Kimble.
1.4 Aim, Objectives and Research Questions
The aim of research has been focused on analyzing the impact of social media regulating
cyber violence against girls and adolescent females.
Following are the objectives of the research:
To identify reasons behind issues faced by adolescent girls and females due to addiction
over social media
To analyze impact of social media on the cyberbullying of females
To recommend strategies for mitigating these issues related to cyber bullying over social
media
Following are the list of research questions:
What are reasons behind issues faced by adolescent girls and females due to addiction
over social media?
How social media has been affecting females due to cyberbullying?
How these issues can be mitigated related to cyber bullying over social media?
1.5 Research Structure
There are total five chapters in the research. These chapters include introduction,
Literature review, Research Methodology, Data findings and analysis and Conclusion and
9
CYBER HARRASSMENT WITH FEMALES
recommendations. The first chapter is Introduction that deals with the basic background of the
research. This chapter include overview of the cyber violence over social media to adolescent
girls and females. The aim, objectives and research questions have been discussed in the chapter.
The second chapter deals with the literature review of various literatures related to impact
of social media on adolescent girls and females. Various researches on this topic have been
studied in this chapter. The factors enhancing cyber bullying over the social media to females
have been discussed.
The third chapter deals with the research methodology. This chapter focuses on what
tools and techniques have been used to complete the research. This chapter has focused on data
collection method and sample size of the instrument. All ethical considerations have been
properly followed in the research.
Figure 1: Research Structure
Chapter 1: Introduction
Chapter 2: Literature Review
Chapter 3: Research Methodology
Chapter 4: Findings and Analysis
Chapter 5: Conclusions and Recommendations
CYBER HARRASSMENT WITH FEMALES
recommendations. The first chapter is Introduction that deals with the basic background of the
research. This chapter include overview of the cyber violence over social media to adolescent
girls and females. The aim, objectives and research questions have been discussed in the chapter.
The second chapter deals with the literature review of various literatures related to impact
of social media on adolescent girls and females. Various researches on this topic have been
studied in this chapter. The factors enhancing cyber bullying over the social media to females
have been discussed.
The third chapter deals with the research methodology. This chapter focuses on what
tools and techniques have been used to complete the research. This chapter has focused on data
collection method and sample size of the instrument. All ethical considerations have been
properly followed in the research.
Figure 1: Research Structure
Chapter 1: Introduction
Chapter 2: Literature Review
Chapter 3: Research Methodology
Chapter 4: Findings and Analysis
Chapter 5: Conclusions and Recommendations
10
CYBER HARRASSMENT WITH FEMALES
(Source: Created by Author)
The fourth chapter deals with the findings and analysis of the data collected in the data
collection process. A primary method of data collection has been selected for the collecting data
and information about online cyber harassment to females.
The last chapter deals with the conclusion and recommendations. A conclusion has been
drawn from studying the research and some of the recommendations to improve the research
study in future have been provided.
CYBER HARRASSMENT WITH FEMALES
(Source: Created by Author)
The fourth chapter deals with the findings and analysis of the data collected in the data
collection process. A primary method of data collection has been selected for the collecting data
and information about online cyber harassment to females.
The last chapter deals with the conclusion and recommendations. A conclusion has been
drawn from studying the research and some of the recommendations to improve the research
study in future have been provided.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
11
CYBER HARRASSMENT WITH FEMALES
Chapter 2: Literature review
2.1 Introduction
This chapter discusses about several factors in the cyber bullying to women and girls.
The literature review has been done using qualitative method. There have been various research
papers and journals have been refereed for collection information about cyber bullying cases
with adolescent girls and females. This chapter has been helping in guiding to the methodology
of the research. The need of data collection and type of method have been guided in this chapter.
This chapter helps in identifying different factors that affect the cyberbullying to females and
girls over the social media. The impact of social media in increasing cyber violence to females
and girls have been discussed in the chapter.
2.2 Cyber Bullying
The advances in the internet technology has been given rise to the utilization of social
media over the internet. Various individuals have been using social media at a large extent. Most
of the females have been using Facebook as a social media platform. The use of Facebook has
been increased in recent years (Moafa et al. 2018). There has been an increase in the abusive of
new technology that has been included in the cyber violence and cyber harassment. The use of
different spyware and malware have been affecting different social media networks (Vitis and
Gilmour 2017). The use of Facebook has been helping in breaching into a various personal
profile. Sexist hate speech has been defined by the Council of Europe as expressions which
spread, incite, promote or justify hatred based on sex (bullying.co.uk, 2018). The UK has been
leading the way for approaching issues from self-regulation instead of legislation (Moafa et al.
2018). There has been an example of the Internet Watch Foundation that has been the first
CYBER HARRASSMENT WITH FEMALES
Chapter 2: Literature review
2.1 Introduction
This chapter discusses about several factors in the cyber bullying to women and girls.
The literature review has been done using qualitative method. There have been various research
papers and journals have been refereed for collection information about cyber bullying cases
with adolescent girls and females. This chapter has been helping in guiding to the methodology
of the research. The need of data collection and type of method have been guided in this chapter.
This chapter helps in identifying different factors that affect the cyberbullying to females and
girls over the social media. The impact of social media in increasing cyber violence to females
and girls have been discussed in the chapter.
2.2 Cyber Bullying
The advances in the internet technology has been given rise to the utilization of social
media over the internet. Various individuals have been using social media at a large extent. Most
of the females have been using Facebook as a social media platform. The use of Facebook has
been increased in recent years (Moafa et al. 2018). There has been an increase in the abusive of
new technology that has been included in the cyber violence and cyber harassment. The use of
different spyware and malware have been affecting different social media networks (Vitis and
Gilmour 2017). The use of Facebook has been helping in breaching into a various personal
profile. Sexist hate speech has been defined by the Council of Europe as expressions which
spread, incite, promote or justify hatred based on sex (bullying.co.uk, 2018). The UK has been
leading the way for approaching issues from self-regulation instead of legislation (Moafa et al.
2018). There has been an example of the Internet Watch Foundation that has been the first
12
CYBER HARRASSMENT WITH FEMALES
charity that helps in focusing on dealing with images for sexual child abuse (Van Royen et al.
2017). This has been a model that helped in driving forward with recent work with various
search engines including Google for discovering various images of child and females. However,
Kabir (2018) argued that there have been various usage of social media and besides
cyberbullying to females and adolescent girls. According to the research done by McCusker and
Gunaydin (2015), many foundation have been working towards checking these cyber bullying
activities over the internet. Various works have been done with the Internet Watch Foundation
for ensuring internet service providers for funding for increasing their capacity of working with
technology providers for the use of the technology for enabling images to be imaged and traced.
Figure 2: Function of women in news stories
(Source: Europe, Global Media Monitoring Project, 2015)
. As suggested by Mishna et al. (2018), cyberbullying contain various behaviors
including messages, rumors and creating fake images over the social media. This has been
creating depression and suicidal attacks in society. Cyber harassment has been considered to
CYBER HARRASSMENT WITH FEMALES
charity that helps in focusing on dealing with images for sexual child abuse (Van Royen et al.
2017). This has been a model that helped in driving forward with recent work with various
search engines including Google for discovering various images of child and females. However,
Kabir (2018) argued that there have been various usage of social media and besides
cyberbullying to females and adolescent girls. According to the research done by McCusker and
Gunaydin (2015), many foundation have been working towards checking these cyber bullying
activities over the internet. Various works have been done with the Internet Watch Foundation
for ensuring internet service providers for funding for increasing their capacity of working with
technology providers for the use of the technology for enabling images to be imaged and traced.
Figure 2: Function of women in news stories
(Source: Europe, Global Media Monitoring Project, 2015)
. As suggested by Mishna et al. (2018), cyberbullying contain various behaviors
including messages, rumors and creating fake images over the social media. This has been
creating depression and suicidal attacks in society. Cyber harassment has been considered to
13
CYBER HARRASSMENT WITH FEMALES
utilize digital means to interact with a non-concerning person. Cyberbullying used to humiliate
the mental condition of females and adolescent girls over social media. As research done by
Mishna et al. (2018), online sexual harassment has been taking various forms of videos,
comments, photos and sexually graphic images shared over the social media and personal
messages. There have been various offensive texts and messages including whore, slut, cunt and
bitch are used to send messages to females and girls over the social media. These messages and
words are based on the physical appearances of the females and girls over social media.
Therefore, it is summarized that adolescent females and girls have been facing a lot of
adult chats and sexual harassment over the social media. These conditions have led to start this
research over a serious topic of cyber bullying of females and girls over social media. However,
Wick et al. (2017) contended that there have been many fake news of sexual harassment have
been trolling over the social media that never happened to any girl.
Figure 3: Prevalence of some forms of intimidation and threats against women
(Source: global survey, 2014)
CYBER HARRASSMENT WITH FEMALES
utilize digital means to interact with a non-concerning person. Cyberbullying used to humiliate
the mental condition of females and adolescent girls over social media. As research done by
Mishna et al. (2018), online sexual harassment has been taking various forms of videos,
comments, photos and sexually graphic images shared over the social media and personal
messages. There have been various offensive texts and messages including whore, slut, cunt and
bitch are used to send messages to females and girls over the social media. These messages and
words are based on the physical appearances of the females and girls over social media.
Therefore, it is summarized that adolescent females and girls have been facing a lot of
adult chats and sexual harassment over the social media. These conditions have led to start this
research over a serious topic of cyber bullying of females and girls over social media. However,
Wick et al. (2017) contended that there have been many fake news of sexual harassment have
been trolling over the social media that never happened to any girl.
Figure 3: Prevalence of some forms of intimidation and threats against women
(Source: global survey, 2014)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
14
CYBER HARRASSMENT WITH FEMALES
As research done by Mohanty and Samantaray (2016), Pornography and sexual content
have been another form of cyber harassment to females over social media. Various abusers have
been using sexual voice clips to send to females and adolescent girls. As argued by Manaf et al.
(2018), recent advances in the social media platforms including Facebook has been reporting for
sending or uploading nay porn video or image. There have been many Facebook accounts being
blocked due to uploading any porn video or image over the Facebook. However, Marganski and
Melander (2018) explained that the number of uploaded porn video and image over Facebook
and other social media websites have been huge in number. Therefore, there is a need of
updating the algorithm used for blocking such illegal posts over the Facebook. Hacking of social
media accounts of females has been commonly used by the abusers over the internet. Kabir
(2018) explains that up to 90 % of porn victims have been female and that the number of cases
has been increasing. There has been an increase in the number of internet sites that have been
related to porn and sexual content. The image-based pornography has been explicitly common
in social media. The use of various content over social media have been violating females.
Hacking has been an act of stealing out information and data of females and girls in the form of
webcam hacking. There has been an increase in the number of hacking cases of personal images
of the females and girls over social media. However, as contended by McCusker and Gunaydin
(2015), hacking can be used for safety purpose also. There have been many social media
accounts hacked for good cause and later in those accounts are returned to its owner. As
commented by Mishna et al. (2018), ethical hacking has been also creating issues with the safety
and security of females and girls over the social media. Social media platforms including
Facebook, Snap chat, WhatsApp and Instagram have been used for transferring sexual images
and texts to females in order to harass them. Therefore, this has been a serious issue of the
CYBER HARRASSMENT WITH FEMALES
As research done by Mohanty and Samantaray (2016), Pornography and sexual content
have been another form of cyber harassment to females over social media. Various abusers have
been using sexual voice clips to send to females and adolescent girls. As argued by Manaf et al.
(2018), recent advances in the social media platforms including Facebook has been reporting for
sending or uploading nay porn video or image. There have been many Facebook accounts being
blocked due to uploading any porn video or image over the Facebook. However, Marganski and
Melander (2018) explained that the number of uploaded porn video and image over Facebook
and other social media websites have been huge in number. Therefore, there is a need of
updating the algorithm used for blocking such illegal posts over the Facebook. Hacking of social
media accounts of females has been commonly used by the abusers over the internet. Kabir
(2018) explains that up to 90 % of porn victims have been female and that the number of cases
has been increasing. There has been an increase in the number of internet sites that have been
related to porn and sexual content. The image-based pornography has been explicitly common
in social media. The use of various content over social media have been violating females.
Hacking has been an act of stealing out information and data of females and girls in the form of
webcam hacking. There has been an increase in the number of hacking cases of personal images
of the females and girls over social media. However, as contended by McCusker and Gunaydin
(2015), hacking can be used for safety purpose also. There have been many social media
accounts hacked for good cause and later in those accounts are returned to its owner. As
commented by Mishna et al. (2018), ethical hacking has been also creating issues with the safety
and security of females and girls over the social media. Social media platforms including
Facebook, Snap chat, WhatsApp and Instagram have been used for transferring sexual images
and texts to females in order to harass them. Therefore, this has been a serious issue of the
15
CYBER HARRASSMENT WITH FEMALES
government of the UK in recent years. There has been the using of harmful distribution of
technical tools and techniques for increasing cyber harassment and bullying over social media
and other internet sites over the internet. According to McCusker and Gunaydin (2015), there
has been an increasing in the number of porn websites over the internet. Researchers have found
that most of the porn companies have been located in the UK. There have been an increase in
the number of fake calls to females at night and disturbing them continuously.
2.3 Types of cyberbullying
There have been various types of cyberbullying over the internet. The abusers have been
using various platforms for increasing online abusement in society. Nowadays, most of the
young people are available over social media (Marganski and Melander 2018). Therefore,
attacking their personal image over social media has been the most important technique used by
these abusers. They used to attack females who are very much active on social media platforms.
Data and information can be obtained from the social media platforms as they used to share
everything over these platforms (Vitis and Gilmour 2017). The use of social media platforms
has been helping in connecting to different types of people in the world. In between these
abusers used to take a sharp look at these females and young girls who have little knowledge
about online social media. They used to talk gently with these adolescent girls and take all the
information and data from them. This type of cyber abusing has been increased in recent years.
Sexting and sending nudes of people has been becoming common on social media (Mishna et al.
2018). The number of nude pictures uploaded to social media platforms has been increasing in
recent years. Adolescent females and girls have been feeling safe over those social media
platforms due to cyberbullying. Several hackers and abusers used to blackmail some females
with nude photos and videos and create depression among them (Vitis and Gilmour 2017).
CYBER HARRASSMENT WITH FEMALES
government of the UK in recent years. There has been the using of harmful distribution of
technical tools and techniques for increasing cyber harassment and bullying over social media
and other internet sites over the internet. According to McCusker and Gunaydin (2015), there
has been an increasing in the number of porn websites over the internet. Researchers have found
that most of the porn companies have been located in the UK. There have been an increase in
the number of fake calls to females at night and disturbing them continuously.
2.3 Types of cyberbullying
There have been various types of cyberbullying over the internet. The abusers have been
using various platforms for increasing online abusement in society. Nowadays, most of the
young people are available over social media (Marganski and Melander 2018). Therefore,
attacking their personal image over social media has been the most important technique used by
these abusers. They used to attack females who are very much active on social media platforms.
Data and information can be obtained from the social media platforms as they used to share
everything over these platforms (Vitis and Gilmour 2017). The use of social media platforms
has been helping in connecting to different types of people in the world. In between these
abusers used to take a sharp look at these females and young girls who have little knowledge
about online social media. They used to talk gently with these adolescent girls and take all the
information and data from them. This type of cyber abusing has been increased in recent years.
Sexting and sending nudes of people has been becoming common on social media (Mishna et al.
2018). The number of nude pictures uploaded to social media platforms has been increasing in
recent years. Adolescent females and girls have been feeling safe over those social media
platforms due to cyberbullying. Several hackers and abusers used to blackmail some females
with nude photos and videos and create depression among them (Vitis and Gilmour 2017).
16
CYBER HARRASSMENT WITH FEMALES
There have been various cases on social media due to blackmailing and cyberbullying. The use
of social media has been going wrong both the increase in the security protocols over social
media. The abusers can easily hide on the internet by using various security patches including
VPN (Charmaraman et al. 018).
Online Violence Against Women and Girls (VAWG) has been the mostly inactive mode
with the implementation of an online troll. There have been various videos and photos that are
viral over several social media platforms. This tone-policing, victim-blaming, slut-shaming,
sexist, racist, classist and homophobic hate speech, gas lighting, the use of alt-facts and doing
(Becker and Pepiak 2017). This has been creating hate for people in society. As commented by
Navarro et al. (2017), Females are being seen with bad character and these threatening have been
facilitating fin the society. Ladies are assaulted in view of their personalities and their status:
among them are self-recognized young ladies and ladies, female individuals from LGBTQ+
people group, Women and Girls Of Color, ladies with financial vulnerabilities, ladies with
handicaps, rustic ladies or ladies from little networks, vagrant ladies, ladies with various injuries,
ladies with emotional wellness issues, and so forth. Nova et al. (2019) argued that those
personalities as well as vulnerabilities or explicit deceivability, when they meet, enhance the
dangers of brutality. The amount of nude pictures uploaded to social media platforms have been
increasing in recent years. Adolescent females and girls have been feeling in safe over those
social media platforms due to cyber bullying.
Adolescent females and girls have been affected by this cyber harassing problem, all over
the world. Therefore, most of the females have reported as not safe over social media (Navarro
et al. 2017). There is various cyber violence faced by females that cannot be avoided in the
CYBER HARRASSMENT WITH FEMALES
There have been various cases on social media due to blackmailing and cyberbullying. The use
of social media has been going wrong both the increase in the security protocols over social
media. The abusers can easily hide on the internet by using various security patches including
VPN (Charmaraman et al. 018).
Online Violence Against Women and Girls (VAWG) has been the mostly inactive mode
with the implementation of an online troll. There have been various videos and photos that are
viral over several social media platforms. This tone-policing, victim-blaming, slut-shaming,
sexist, racist, classist and homophobic hate speech, gas lighting, the use of alt-facts and doing
(Becker and Pepiak 2017). This has been creating hate for people in society. As commented by
Navarro et al. (2017), Females are being seen with bad character and these threatening have been
facilitating fin the society. Ladies are assaulted in view of their personalities and their status:
among them are self-recognized young ladies and ladies, female individuals from LGBTQ+
people group, Women and Girls Of Color, ladies with financial vulnerabilities, ladies with
handicaps, rustic ladies or ladies from little networks, vagrant ladies, ladies with various injuries,
ladies with emotional wellness issues, and so forth. Nova et al. (2019) argued that those
personalities as well as vulnerabilities or explicit deceivability, when they meet, enhance the
dangers of brutality. The amount of nude pictures uploaded to social media platforms have been
increasing in recent years. Adolescent females and girls have been feeling in safe over those
social media platforms due to cyber bullying.
Adolescent females and girls have been affected by this cyber harassing problem, all over
the world. Therefore, most of the females have reported as not safe over social media (Navarro
et al. 2017). There is various cyber violence faced by females that cannot be avoided in the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
17
CYBER HARRASSMENT WITH FEMALES
market. Social media has been creating an opportunity for the abusers to hampers prestige of a
female and girls in society over the internet and social media.
2.4 Impact of social media on the cyberbullying of females
There have been various issues that are faced by females over social media. As research
done by Ghazali and Ghani (2018), social media has been maintaining a keen approach in the
development of communication in society. Nowadays, most of the youngster has been online
over social media platforms. Therefore, the use of different social media platforms has been
helping in connecting with different people all over the world. Therefore, social media has been
becoming an addiction to young people over the internet. Social media platforms including
Facebook, Instagram, Twitter and Snap chat have been popular platforms for young females to
chat with unknown people. Therefore, various fake profiles have been active over the internet.
The reason behind this has been lack of security and knowledge over the social media accounts.
As per research done by Vitis and Gilmour (2017), Facebook has been one of the most preferred
social media network used by users. Snap chat has been responsible for providing nude pictures
of females over the network. Therefore, due to lack in awareness among users of social media,
cybercrimes has been increasing in the digital age. As per the research done by Marganski and
Melander (2018), Sexting is a form of sexual harassment over social media. There has been an
increase in the number of sexting roles in recent years. Sexting relates to the use of abusive
language related to sex through messages. The use of sexting has been continuously used by the
abusers over the incline social media platforms (Marganski and Melander 2018). Various
teenage girls have been facing such challenges over social media. There has been an increasing
in the number of fake profiles over the social media platforms and sexting has been done through
it. Therefore, social media has been affecting these adolescent girls and females who are school
CYBER HARRASSMENT WITH FEMALES
market. Social media has been creating an opportunity for the abusers to hampers prestige of a
female and girls in society over the internet and social media.
2.4 Impact of social media on the cyberbullying of females
There have been various issues that are faced by females over social media. As research
done by Ghazali and Ghani (2018), social media has been maintaining a keen approach in the
development of communication in society. Nowadays, most of the youngster has been online
over social media platforms. Therefore, the use of different social media platforms has been
helping in connecting with different people all over the world. Therefore, social media has been
becoming an addiction to young people over the internet. Social media platforms including
Facebook, Instagram, Twitter and Snap chat have been popular platforms for young females to
chat with unknown people. Therefore, various fake profiles have been active over the internet.
The reason behind this has been lack of security and knowledge over the social media accounts.
As per research done by Vitis and Gilmour (2017), Facebook has been one of the most preferred
social media network used by users. Snap chat has been responsible for providing nude pictures
of females over the network. Therefore, due to lack in awareness among users of social media,
cybercrimes has been increasing in the digital age. As per the research done by Marganski and
Melander (2018), Sexting is a form of sexual harassment over social media. There has been an
increase in the number of sexting roles in recent years. Sexting relates to the use of abusive
language related to sex through messages. The use of sexting has been continuously used by the
abusers over the incline social media platforms (Marganski and Melander 2018). Various
teenage girls have been facing such challenges over social media. There has been an increasing
in the number of fake profiles over the social media platforms and sexting has been done through
it. Therefore, social media has been affecting these adolescent girls and females who are school
18
CYBER HARRASSMENT WITH FEMALES
going. They used to speak to their parents about cyber harassment so that they can take steps
against it. However, only 15% of the participants approach to police (Moafa et al. 2018). This
percentage has been very low. This need to be improved so that hackers can be traced by the
police. Female victims need to approach directly to police related to cyber harassment cases.
This help in mitigating these issues in a proper manner. Abusers do not use their personal
account for sex to a girl. Instead of that they used to create a fake account and starts sexting with
a girl (Vitis and Gilmour 2017). The use of social media has been increasing all over the world.
However, along with this cyberbullying has been also increasing all over the world. There has
been an increment in the utilization of internet innovation in the market. Internet-based life has
been encountering bigger methodology in the market by the adolescents. It has been focusing on
both sex and sex inside the youthful age of the world. In the UK, there has been a sharp
increment in the utilization of online life among the youthful age of both sexual orientations.
However, there has been an increment in the cybercrimes in the nation (Mishna et al. 2018).
There has been an increment in the online violations for the ladies and young ladies over the
internet-based life including Facebook, Twitter, Online dating sites and other internet-based
porn sites (Vitis and Gilmour 2017). Facebook has been one of the most popular social media
platforms all over the world. It has been easy to make an account over Facebook using a mail id
(McCusker and Gunaydin 2015). Therefore, most of the people are available over Facebook.
According to McCusker and Gunaydin (2015), there are many fake profiles over Facebook
through which cyberbullying is done to females. The major reason for this kind of illegal attack
has been lack of knowledge of using social media. Many females used to share their personal
details, photos and videos to an unknown person over Facebook. As mentioned by Nova et al.
(2018), 23% of the participants have been using Instagram where pictures and videos are
CYBER HARRASSMENT WITH FEMALES
going. They used to speak to their parents about cyber harassment so that they can take steps
against it. However, only 15% of the participants approach to police (Moafa et al. 2018). This
percentage has been very low. This need to be improved so that hackers can be traced by the
police. Female victims need to approach directly to police related to cyber harassment cases.
This help in mitigating these issues in a proper manner. Abusers do not use their personal
account for sex to a girl. Instead of that they used to create a fake account and starts sexting with
a girl (Vitis and Gilmour 2017). The use of social media has been increasing all over the world.
However, along with this cyberbullying has been also increasing all over the world. There has
been an increment in the utilization of internet innovation in the market. Internet-based life has
been encountering bigger methodology in the market by the adolescents. It has been focusing on
both sex and sex inside the youthful age of the world. In the UK, there has been a sharp
increment in the utilization of online life among the youthful age of both sexual orientations.
However, there has been an increment in the cybercrimes in the nation (Mishna et al. 2018).
There has been an increment in the online violations for the ladies and young ladies over the
internet-based life including Facebook, Twitter, Online dating sites and other internet-based
porn sites (Vitis and Gilmour 2017). Facebook has been one of the most popular social media
platforms all over the world. It has been easy to make an account over Facebook using a mail id
(McCusker and Gunaydin 2015). Therefore, most of the people are available over Facebook.
According to McCusker and Gunaydin (2015), there are many fake profiles over Facebook
through which cyberbullying is done to females. The major reason for this kind of illegal attack
has been lack of knowledge of using social media. Many females used to share their personal
details, photos and videos to an unknown person over Facebook. As mentioned by Nova et al.
(2018), 23% of the participants have been using Instagram where pictures and videos are
19
CYBER HARRASSMENT WITH FEMALES
uploaded. Therefore, the wrong use of social media has been creating cyber issues for females
over the internet.
According to Vitis and Gilmour (2017), various form of online Violence Against Women
and Girls (VAWG) has been directly connected with sex trafficking and prostitution. The
internet has been helping in providing anonymity to users by using VPN and other security tools.
Therefore, the use of these security patches has been helping abusers to hide behind them. The
abusers have been using their social media profiles and other new technologies that help in
allowing clients to “shop” for women and girls (Behm-Morawitz and Schipper 2016). Van
Royen, Poels and Vandebosch (2016) contended that the practical world has been facing a lot of
problems in which on-line abuser have been stalking female profiles. There has been an increase
in the sexting from unknown profiles over Facebook and other social media. Fake profiles used
to post nude photos and video on anyone profile. The security of female accounts over social
media has been low due to lack of knowledge. Hackers used to collect data from profiles of
adolescent females and girls and get access to their account.
2.5 Gaps in Literature
The above discussion done with several existing literatures has been related to
cyberbullying with adolescent females and girls over social media. The reason behind
cyberbullying has been not yet concluded by the existing literatures. A concrete reason behind
harassing adolescent females and girls over social media has not been derived from existing
literatures. The existing literatures have focused on various forms of cyber harassment and
bullying of females and girls over different social media platforms. Therefore, for filling up
these gaps in the literature, this research has been done to focus on reasons behind cyberbullying
of adolescent females and girls over social media. Therefore, for identifying the reasons of cyber
CYBER HARRASSMENT WITH FEMALES
uploaded. Therefore, the wrong use of social media has been creating cyber issues for females
over the internet.
According to Vitis and Gilmour (2017), various form of online Violence Against Women
and Girls (VAWG) has been directly connected with sex trafficking and prostitution. The
internet has been helping in providing anonymity to users by using VPN and other security tools.
Therefore, the use of these security patches has been helping abusers to hide behind them. The
abusers have been using their social media profiles and other new technologies that help in
allowing clients to “shop” for women and girls (Behm-Morawitz and Schipper 2016). Van
Royen, Poels and Vandebosch (2016) contended that the practical world has been facing a lot of
problems in which on-line abuser have been stalking female profiles. There has been an increase
in the sexting from unknown profiles over Facebook and other social media. Fake profiles used
to post nude photos and video on anyone profile. The security of female accounts over social
media has been low due to lack of knowledge. Hackers used to collect data from profiles of
adolescent females and girls and get access to their account.
2.5 Gaps in Literature
The above discussion done with several existing literatures has been related to
cyberbullying with adolescent females and girls over social media. The reason behind
cyberbullying has been not yet concluded by the existing literatures. A concrete reason behind
harassing adolescent females and girls over social media has not been derived from existing
literatures. The existing literatures have focused on various forms of cyber harassment and
bullying of females and girls over different social media platforms. Therefore, for filling up
these gaps in the literature, this research has been done to focus on reasons behind cyberbullying
of adolescent females and girls over social media. Therefore, for identifying the reasons of cyber
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
20
CYBER HARRASSMENT WITH FEMALES
bullying of females over social media platforms, a hypothesis has been created for further
analysis on the study.
Hypothesis: There are some reasons behind cyberbullying of adolescent females and girls over
social media.
The further impact of the social media has been done in the next section of research
methodology. Data collection has been done in order to gain more knowledge and skills
regarding the cyber harassment with females over social media. The research methodology have
guided to the procedure of the research and analysis of data and information collected related to
the cyber harassment of females. In order to analyze the hypothesis, quantitative method has
been selected in the research. Therefore, the research has targeted social media users who are
above 18 years of age. Various quantitative close ended questions have been asked to them for
gathering data and information related to cyberbullying and reasons behind this,
2.6 Summary
This section has focused over different aspects of cyberbullying and cyber violence over
social media with adolescent girls and females. There have been descriptive analysis of different
aspect of cyberbullying with females. Different ways of cyberbullying to females over social
media has been explained in the chapter. Sex message, pornography, Nude pictures and videos
and hacking have been various form of cyberbullying done to females over social media.
CYBER HARRASSMENT WITH FEMALES
bullying of females over social media platforms, a hypothesis has been created for further
analysis on the study.
Hypothesis: There are some reasons behind cyberbullying of adolescent females and girls over
social media.
The further impact of the social media has been done in the next section of research
methodology. Data collection has been done in order to gain more knowledge and skills
regarding the cyber harassment with females over social media. The research methodology have
guided to the procedure of the research and analysis of data and information collected related to
the cyber harassment of females. In order to analyze the hypothesis, quantitative method has
been selected in the research. Therefore, the research has targeted social media users who are
above 18 years of age. Various quantitative close ended questions have been asked to them for
gathering data and information related to cyberbullying and reasons behind this,
2.6 Summary
This section has focused over different aspects of cyberbullying and cyber violence over
social media with adolescent girls and females. There have been descriptive analysis of different
aspect of cyberbullying with females. Different ways of cyberbullying to females over social
media has been explained in the chapter. Sex message, pornography, Nude pictures and videos
and hacking have been various form of cyberbullying done to females over social media.
21
CYBER HARRASSMENT WITH FEMALES
Chapter 3: Research Methodology
3.1 Introduction
This chapter discusses various tools and techniques that might help in conducting the
research study. Research methodology deals with the identification of techniques and processes
that are used for the data collection methods. This chapter focuses on the method used in the
research for analyzing data and information gathered. The goal of the chapter is to provide detail
approach of theories based on which the researcher will be able to maintain a keen approach in
the research study. This research needs to follow a proper methodology to complete the study
within the deadline. The use of specific theories and techniques have helped in establishing a
complete research proposal in the study. This chapter has focused on the data collection methods
used in the research for identifying the factors that create cyber violence to females over social
media. In addition, research methodology has been helping in finding out various research
techniques in order to identify various methods and approaches by which the research can be
approached. The use of research methodology has helped in understanding the approaches in the
dependency of several approaches in the proper direction. The dependency of the methods used
in the data collection has been properly justified. Various subsections included in research
methodologies such as research philosophy, approach, outline, design, data collection method,
sampling, data analysis and ethical consideration.
3.2 Research Method Outline
There are various methodological tools used in each step of research study. The research
has used positivism research along with inductive approach. The research design used for this
particular research has been descriptive research design (Neuman 2013). The data collection
CYBER HARRASSMENT WITH FEMALES
Chapter 3: Research Methodology
3.1 Introduction
This chapter discusses various tools and techniques that might help in conducting the
research study. Research methodology deals with the identification of techniques and processes
that are used for the data collection methods. This chapter focuses on the method used in the
research for analyzing data and information gathered. The goal of the chapter is to provide detail
approach of theories based on which the researcher will be able to maintain a keen approach in
the research study. This research needs to follow a proper methodology to complete the study
within the deadline. The use of specific theories and techniques have helped in establishing a
complete research proposal in the study. This chapter has focused on the data collection methods
used in the research for identifying the factors that create cyber violence to females over social
media. In addition, research methodology has been helping in finding out various research
techniques in order to identify various methods and approaches by which the research can be
approached. The use of research methodology has helped in understanding the approaches in the
dependency of several approaches in the proper direction. The dependency of the methods used
in the data collection has been properly justified. Various subsections included in research
methodologies such as research philosophy, approach, outline, design, data collection method,
sampling, data analysis and ethical consideration.
3.2 Research Method Outline
There are various methodological tools used in each step of research study. The research
has used positivism research along with inductive approach. The research design used for this
particular research has been descriptive research design (Neuman 2013). The data collection
22
CYBER HARRASSMENT WITH FEMALES
method chosen for the research has been primary data collection method. The literature review
has been collected from secondary sources using journals and articles. The quantitative data
analysis method has been selection for as data analysis method. The below table provides chosen
methods for this research:
Methodical Tools Selected Tools
Research Philosophy Positivism Research Philosophy
Research Approach Inductive Research Approach
Research Design Descriptive Research Design
Data Collection Method Primary Data Collection
Data Analysis Method Quantitative data Analysis
Table: Representing the Selected tools for this research
3.3 Research Philosophy
Research philosophy focuses on an idea that deals with the way of data collection, analysis and
used. Therefore, research philosophy has been a source of information development as
identification of processes by which data can be associated with the research. It has been a
critical part of the research. Evaluation of research philosophy has been essential as it helps in
deciding by which approach it has helped in answering the research questions (Taylor, Bogdan
and DeVault 2015). There are three main research philosophies including positivism, realism and
interpretivism research philosophies. However, the concept of the research philosophies has been
developed form the epistemology. The positivism research philosophy has been focused on the
work based on the observable social entity (Marczyk, DeMatteo and Festinger 2017). The
research strategy can be used for the development of the research. In addition to this, positivism
CYBER HARRASSMENT WITH FEMALES
method chosen for the research has been primary data collection method. The literature review
has been collected from secondary sources using journals and articles. The quantitative data
analysis method has been selection for as data analysis method. The below table provides chosen
methods for this research:
Methodical Tools Selected Tools
Research Philosophy Positivism Research Philosophy
Research Approach Inductive Research Approach
Research Design Descriptive Research Design
Data Collection Method Primary Data Collection
Data Analysis Method Quantitative data Analysis
Table: Representing the Selected tools for this research
3.3 Research Philosophy
Research philosophy focuses on an idea that deals with the way of data collection, analysis and
used. Therefore, research philosophy has been a source of information development as
identification of processes by which data can be associated with the research. It has been a
critical part of the research. Evaluation of research philosophy has been essential as it helps in
deciding by which approach it has helped in answering the research questions (Taylor, Bogdan
and DeVault 2015). There are three main research philosophies including positivism, realism and
interpretivism research philosophies. However, the concept of the research philosophies has been
developed form the epistemology. The positivism research philosophy has been focused on the
work based on the observable social entity (Marczyk, DeMatteo and Festinger 2017). The
research strategy can be used for the development of the research. In addition to this, positivism
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
23
CYBER HARRASSMENT WITH FEMALES
research philosophy has been developed with scientific and quantifiable data. There has been a
statistical analysis done in the positivism research philosophy for gathering data and information
for this research.
Realism has been another research philosophy that has been depended on the scientific
approach. However, the main attributes of realism have been depended on finding and disclosing
the truth of the existence of various data and information based on the research topic
(Panneerselvam 2014). There have been increase in the sexting from unknown profiles over the
Facebook and other social media. Fake profiles used to post nude photos and video on anyone
profile. The security of female accounts over social media has been low due to lack of
knowledge. Hackers used to collect data from profiles of adolescent females and girls and get
access to their account.
However, realism can be distributed in two subsets including direct realism and critical realism.
However, both of them focuses on identifying the truth behind the existence of data.
Another type of research philosophy has been interpretivism research philosophy. This branch of
epistemology has been focused on the difference between social and human factors. The use of
interpretivism philosophy has been depended on social factors and life.
3.3.1 Justification for selecting positivism philosophy
The researcher has selected positivism philosophy as it is beneficial for the research study. The
selection of positivism has focused on the required data to be used in identifying factors
responsible for cyberbullying for females. The research has not chosen realism and
interpretivism approach as research has been limited to analysis of collected data and not
CYBER HARRASSMENT WITH FEMALES
research philosophy has been developed with scientific and quantifiable data. There has been a
statistical analysis done in the positivism research philosophy for gathering data and information
for this research.
Realism has been another research philosophy that has been depended on the scientific
approach. However, the main attributes of realism have been depended on finding and disclosing
the truth of the existence of various data and information based on the research topic
(Panneerselvam 2014). There have been increase in the sexting from unknown profiles over the
Facebook and other social media. Fake profiles used to post nude photos and video on anyone
profile. The security of female accounts over social media has been low due to lack of
knowledge. Hackers used to collect data from profiles of adolescent females and girls and get
access to their account.
However, realism can be distributed in two subsets including direct realism and critical realism.
However, both of them focuses on identifying the truth behind the existence of data.
Another type of research philosophy has been interpretivism research philosophy. This branch of
epistemology has been focused on the difference between social and human factors. The use of
interpretivism philosophy has been depended on social factors and life.
3.3.1 Justification for selecting positivism philosophy
The researcher has selected positivism philosophy as it is beneficial for the research study. The
selection of positivism has focused on the required data to be used in identifying factors
responsible for cyberbullying for females. The research has not chosen realism and
interpretivism approach as research has been limited to analysis of collected data and not
24
CYBER HARRASSMENT WITH FEMALES
delivering a new concept or data set. Therefore, the selection of positivism has been appropriate
for the research.
3.4 Research Approach
In order to maintain a proper plan, an appropriate approach is required. Research
approach helps in providing a descriptive approach in the development of the hypothesis in the
research. It helps in providing broad assumptions in the detailed data collection approach (Choy
2014). There are mainly three types of research approach including deductive, inductive and
adductive approach. The deductive approach has been focused on the dissection of set of
hypothesis required for confirmation or rejection in the dissertation (Silverman 2016). The
selection of deductive approach has been encouraging researcher for directing the research in a
legitimate manner. The research has been based on the factors affecting females by cyber
bullying over the social media has been analyzed. The use of the proper research approach has
helped in gathering data and information regarding the research topic (McCusker and Gunaydin
2015). Therefore, this research has been based on the deductive approach as main hypothesis,
observation and confirmation has been main part of the idea.
Alternative to deductive approach, inductive approach do not involve formulation of
hypothesis. Therefore, in deductive approach, hypothesis has been set in the study while in
inductive approach there is no requirement of hypothesis in the research. Therefore, inductive
approach has been selected in the research study. The use of inductive approach has been based
on objectives of the research (Al 2013). Therefore, this step include consideration of different
theories and concept related to the research topic. Abductive research approach helps in
explaining incomplete observations and surprising facts in research (Noble and Smith 2015). The
amount of nude pictures uploaded to social media platforms have been increasing in recent years.
CYBER HARRASSMENT WITH FEMALES
delivering a new concept or data set. Therefore, the selection of positivism has been appropriate
for the research.
3.4 Research Approach
In order to maintain a proper plan, an appropriate approach is required. Research
approach helps in providing a descriptive approach in the development of the hypothesis in the
research. It helps in providing broad assumptions in the detailed data collection approach (Choy
2014). There are mainly three types of research approach including deductive, inductive and
adductive approach. The deductive approach has been focused on the dissection of set of
hypothesis required for confirmation or rejection in the dissertation (Silverman 2016). The
selection of deductive approach has been encouraging researcher for directing the research in a
legitimate manner. The research has been based on the factors affecting females by cyber
bullying over the social media has been analyzed. The use of the proper research approach has
helped in gathering data and information regarding the research topic (McCusker and Gunaydin
2015). Therefore, this research has been based on the deductive approach as main hypothesis,
observation and confirmation has been main part of the idea.
Alternative to deductive approach, inductive approach do not involve formulation of
hypothesis. Therefore, in deductive approach, hypothesis has been set in the study while in
inductive approach there is no requirement of hypothesis in the research. Therefore, inductive
approach has been selected in the research study. The use of inductive approach has been based
on objectives of the research (Al 2013). Therefore, this step include consideration of different
theories and concept related to the research topic. Abductive research approach helps in
explaining incomplete observations and surprising facts in research (Noble and Smith 2015). The
amount of nude pictures uploaded to social media platforms have been increasing in recent years.
25
CYBER HARRASSMENT WITH FEMALES
Adolescent females and girls have been feeling in safe over those social media platforms due to
cyber bullying. Several hackers and abusers used to blackmail some females with nude photos
and videos and create depression among them. There have been various cases on social media
due to blackmailing and cyber bullying. The use of the social media has been going wrong both
the increase in the security protocols over social media. This type of approach has been focused
on finding solutions to the various research questions included in the study. Therefore, this
research has selected inductive research approach.
3.4.1 Justification for selecting inductive approach
The research has selected inductive approach for this research for analyzing factors of
cyber bullying for females over social media. The topic has been related to the quantitative
approach in the data collection method. The research has been based on identifying answers for a
set of research questions and therefore, selection of inductive research approach has been
properly justified.
3.5 Research Design
Research design has been an important element of the research as it focuses on
identification of set of methods and techniques put together for use of tools and instruments. It
has been defined as systematic approach utilized by researcher for examining a specific research
study (Neuman 2013). The research design for this research need to be appropriate for providing
proper guide to the researcher in data collection and analysis method.
There are three types of research design including explanatory, exploratory and
descriptive research design. The exploratory research design focuses on various aspects of a
research study that has been based on this research topic. This type of research design refers to
CYBER HARRASSMENT WITH FEMALES
Adolescent females and girls have been feeling in safe over those social media platforms due to
cyber bullying. Several hackers and abusers used to blackmail some females with nude photos
and videos and create depression among them. There have been various cases on social media
due to blackmailing and cyber bullying. The use of the social media has been going wrong both
the increase in the security protocols over social media. This type of approach has been focused
on finding solutions to the various research questions included in the study. Therefore, this
research has selected inductive research approach.
3.4.1 Justification for selecting inductive approach
The research has selected inductive approach for this research for analyzing factors of
cyber bullying for females over social media. The topic has been related to the quantitative
approach in the data collection method. The research has been based on identifying answers for a
set of research questions and therefore, selection of inductive research approach has been
properly justified.
3.5 Research Design
Research design has been an important element of the research as it focuses on
identification of set of methods and techniques put together for use of tools and instruments. It
has been defined as systematic approach utilized by researcher for examining a specific research
study (Neuman 2013). The research design for this research need to be appropriate for providing
proper guide to the researcher in data collection and analysis method.
There are three types of research design including explanatory, exploratory and
descriptive research design. The exploratory research design focuses on various aspects of a
research study that has been based on this research topic. This type of research design refers to
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
26
CYBER HARRASSMENT WITH FEMALES
exploring various aspects of the research (Brown and Stowers 2013). However, this does not
provide any explanation and conclusion to the attributes of the research study. The use of
exploratory research design has been helping in providing a proper priorities in the research. The
explanatory research design focuses on explaining different aspects of the research study
(Uprichard 2013). This type of research design does not provide any conclusion to these aspects
of the research. Descriptive research design has been focused on about what of the research
project. Therefore, the researcher has selected descriptive research design.
3.5.1 Justification for selecting descriptive research design
The use of descriptive research design has been selected ion this research study. This
research design has helped in analyzing the factors causing cyber bullying of females over the
social media. It has been providing proper tools and techniques for analyzing the research
problem. Several issues over social media related to cyber violence for females have been
identified using this research design. The research has been able to collect data and information
regarding research topic.
3.6 Data Collection method
Data collection method has been an important section of the research. It helps in
identifying the research questions and formulate proper analysis method. This research has been
focused on the collecting data regarding impact of social media on cyber violence of females.
The following section discusses about various data collection method followed in the research.
CYBER HARRASSMENT WITH FEMALES
exploring various aspects of the research (Brown and Stowers 2013). However, this does not
provide any explanation and conclusion to the attributes of the research study. The use of
exploratory research design has been helping in providing a proper priorities in the research. The
explanatory research design focuses on explaining different aspects of the research study
(Uprichard 2013). This type of research design does not provide any conclusion to these aspects
of the research. Descriptive research design has been focused on about what of the research
project. Therefore, the researcher has selected descriptive research design.
3.5.1 Justification for selecting descriptive research design
The use of descriptive research design has been selected ion this research study. This
research design has helped in analyzing the factors causing cyber bullying of females over the
social media. It has been providing proper tools and techniques for analyzing the research
problem. Several issues over social media related to cyber violence for females have been
identified using this research design. The research has been able to collect data and information
regarding research topic.
3.6 Data Collection method
Data collection method has been an important section of the research. It helps in
identifying the research questions and formulate proper analysis method. This research has been
focused on the collecting data regarding impact of social media on cyber violence of females.
The following section discusses about various data collection method followed in the research.
27
CYBER HARRASSMENT WITH FEMALES
3.6.1 Types of Data Collection method
The data collection method include two categories including primary data collection
method and secondary data collection method. Both data collection method have been discussed
below:
Primary Data Collection method: Primary data collection method focuses on raw data
collection related to the research topic. There have been various approaches by which primary
data collection method can be implemented including online survey, observations and interviews
(Chandra and Sharma 2013). The use of the primary data collection method mainly depend on
the statistical data collection required for research. The creation of questionnaires have been an
important part of the primary data collection method. The most commonly used primary data
collection method is survey questionnaires.
Secondary Data collection method: This method of data collection deals with data
collection from secondary sources including online journals, articles, books and government
databases. However, data and information collection from the secondary sources can be reliable
but not valid. Therefore, there is a requirement of validation in case of secondary data collection
method (Leedy and Ormrod 2013). The use of secondary data collection method has been
helping in collecting huge number of data at a time. In some cases, there has been requirement of
both type data collection method and named as mixed data collection method (Brannen 2017).
However, in this case, the researcher has selected primary data collection method for collecting
data related to the impact of social media on cyber violence of females.
3.6.2 Justification for selected data collection method
The data collection method selected for this research has been primary data collection
method. This research require statistical data for understanding the impact of social media
CYBER HARRASSMENT WITH FEMALES
3.6.1 Types of Data Collection method
The data collection method include two categories including primary data collection
method and secondary data collection method. Both data collection method have been discussed
below:
Primary Data Collection method: Primary data collection method focuses on raw data
collection related to the research topic. There have been various approaches by which primary
data collection method can be implemented including online survey, observations and interviews
(Chandra and Sharma 2013). The use of the primary data collection method mainly depend on
the statistical data collection required for research. The creation of questionnaires have been an
important part of the primary data collection method. The most commonly used primary data
collection method is survey questionnaires.
Secondary Data collection method: This method of data collection deals with data
collection from secondary sources including online journals, articles, books and government
databases. However, data and information collection from the secondary sources can be reliable
but not valid. Therefore, there is a requirement of validation in case of secondary data collection
method (Leedy and Ormrod 2013). The use of secondary data collection method has been
helping in collecting huge number of data at a time. In some cases, there has been requirement of
both type data collection method and named as mixed data collection method (Brannen 2017).
However, in this case, the researcher has selected primary data collection method for collecting
data related to the impact of social media on cyber violence of females.
3.6.2 Justification for selected data collection method
The data collection method selected for this research has been primary data collection
method. This research require statistical data for understanding the impact of social media
28
CYBER HARRASSMENT WITH FEMALES
related to cyber violence over females. Therefore, online survey has been selected as primary
data collection method. An online survey has been conducted with several participants to gather
data and information.
3.7 Sampling Method and Size
The sampling method discusses about the techniques used for selecting participants for
the research. The two types of sampling method have been probability sampling and non-
probability sampling method (Mitchell and Jolley 2013). The population selected for the online
survey has been 220 social media users. However, the sample size selected for the online survey
has been 100 social media users. The sampling has been done using non-probability random
sampling method. The sampling has been done as most of participants have not properly
answered questionnaires. There have been 10 close ended questions included in the survey
questionnaire. This questionnaire has been prepared using Google Forms and uploaded over the
internet using several social media platforms including Facebook, Instagram, Twitter and
LinkedIn. Various answers have been collected from the form against those survey
questionnaires. These answers have been considered as data and information for the research
study.
3.8 Data Analysis Method
Data Analysis has been of two types including qualitative and quantitative data analysis.
Qualitative data analysis include a range of processes that have been based on classification of
elements on various attributes and properties. In qualitative data analysis, data has been collected
from secondary sources including online journals, books, articles and governmental databases
(Novikov and Novikov 2013). Therefore, qualitative data analysis focuses on exploratory
CYBER HARRASSMENT WITH FEMALES
related to cyber violence over females. Therefore, online survey has been selected as primary
data collection method. An online survey has been conducted with several participants to gather
data and information.
3.7 Sampling Method and Size
The sampling method discusses about the techniques used for selecting participants for
the research. The two types of sampling method have been probability sampling and non-
probability sampling method (Mitchell and Jolley 2013). The population selected for the online
survey has been 220 social media users. However, the sample size selected for the online survey
has been 100 social media users. The sampling has been done using non-probability random
sampling method. The sampling has been done as most of participants have not properly
answered questionnaires. There have been 10 close ended questions included in the survey
questionnaire. This questionnaire has been prepared using Google Forms and uploaded over the
internet using several social media platforms including Facebook, Instagram, Twitter and
LinkedIn. Various answers have been collected from the form against those survey
questionnaires. These answers have been considered as data and information for the research
study.
3.8 Data Analysis Method
Data Analysis has been of two types including qualitative and quantitative data analysis.
Qualitative data analysis include a range of processes that have been based on classification of
elements on various attributes and properties. In qualitative data analysis, data has been collected
from secondary sources including online journals, books, articles and governmental databases
(Novikov and Novikov 2013). Therefore, qualitative data analysis focuses on exploratory
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
29
CYBER HARRASSMENT WITH FEMALES
research design in an unstructured way. For data collection method in qualitative analysis,
researchers need to ask open ended questions. However, in this research, close ended questions
have been asked to the participants (Salaberry and Comajoan 2013). Therefore, quantitative data
analysis method has been used in this research. The qualitative data analysis method deals with
the non-statistical data. This category of data analysis has been mainly undertaken in the case of
secondary data collection method. The sample size for this type of data analysis used to be small.
Quantitative Data Analysis has been focused on the primary data collection method. The
general overview of the quantitative data analysis is about the use of statistical data related to the
research topic (Flick 2015). In this case, there has been requirement of statistical data and
information and primary data collection has been selected (Brannen 2017). Therefore, the
research has selected quantitative data analysis method. The presentation of data and results have
been done using graphs, tables and charts. The analysis has been done using Likert Scale ranging
from 1 to 5.
3.9 Ethical Consideration
Every scientific research has been associated with various set of rules and ethics of
academic councils. Therefore, this research has been following all the ethical considerations
included. Data and information has been secured under the Data Protection method 1998
(Bernard 2017). It has been necessary to keep confidentiality and privacy of participants of the
research during conducting research. It has been responsibility of the members of the research
and participants to keep privacy during the conduction of the research study (Walter and
Andersen 2013). Results and outcomes have been not been shared and published before the
completion of the research (Punch 2013). It has been an essential point to take permission from
participants to collect data from them. They have not been forced to remain in the research till its
CYBER HARRASSMENT WITH FEMALES
research design in an unstructured way. For data collection method in qualitative analysis,
researchers need to ask open ended questions. However, in this research, close ended questions
have been asked to the participants (Salaberry and Comajoan 2013). Therefore, quantitative data
analysis method has been used in this research. The qualitative data analysis method deals with
the non-statistical data. This category of data analysis has been mainly undertaken in the case of
secondary data collection method. The sample size for this type of data analysis used to be small.
Quantitative Data Analysis has been focused on the primary data collection method. The
general overview of the quantitative data analysis is about the use of statistical data related to the
research topic (Flick 2015). In this case, there has been requirement of statistical data and
information and primary data collection has been selected (Brannen 2017). Therefore, the
research has selected quantitative data analysis method. The presentation of data and results have
been done using graphs, tables and charts. The analysis has been done using Likert Scale ranging
from 1 to 5.
3.9 Ethical Consideration
Every scientific research has been associated with various set of rules and ethics of
academic councils. Therefore, this research has been following all the ethical considerations
included. Data and information has been secured under the Data Protection method 1998
(Bernard 2017). It has been necessary to keep confidentiality and privacy of participants of the
research during conducting research. It has been responsibility of the members of the research
and participants to keep privacy during the conduction of the research study (Walter and
Andersen 2013). Results and outcomes have been not been shared and published before the
completion of the research (Punch 2013). It has been an essential point to take permission from
participants to collect data from them. They have not been forced to remain in the research till its
30
CYBER HARRASSMENT WITH FEMALES
completion. Participants have been kept free to leave the research at any time and place. Data
and information have not been tampered during data analysis method. There have been
transparency maintained in the data collection process with proper ethical consideration during
the research.
3.10 Timeline
Task Name Duration Start Finish Predecessors
Schedule for Conducting
Research Work 180 days Mon 9/3/18 Fri 2/1/19
Research Proposal and
Approval 29 days Mon 9/3/18 Thu 10/18/18
Get Instructions Regarding
Research Work 5 days Mon 9/3/18 Fri 9/7/18
Selection of an
Appropriate Topic for
Research
2 days Mon 9/10/18 Tue 9/18/18 2
Verification of Topic by
Research Supervisor 5 days Wed 9/12/18 Tue 9/18/18 3
Proceed to Research 1 day Wed 9/19/18 Wed 9/19/18 4
Develop Research
Proposal 10 days Thu 9/20/18 Wed 10/3/18 5
Submit Research Proposal 1 day Thu 10/4/18 Thu 10/4/18 6
Get Approval to Proceed 5 days Fri 10/5/18 Thu 10/18/18 7
Research Planning 12 days Fri 10/12/18 Mon 10/29/18
Analyze Research Topic 4 days Fri 10/12/18 Wed 10/17/18 8
Prepare Research Roadmap 4 days Thu 10/18/18 Tue 10/23/18 10
Determine Research
Objectives 1 day Wed 10/24/18 Wed 10/24/18 18
Define Research Questions 1 day Thu 10/25/18 Thu 10/25/18 12
Select Appropriate 2 days Fri 10/26/18 Mon 10/29/18 13
CYBER HARRASSMENT WITH FEMALES
completion. Participants have been kept free to leave the research at any time and place. Data
and information have not been tampered during data analysis method. There have been
transparency maintained in the data collection process with proper ethical consideration during
the research.
3.10 Timeline
Task Name Duration Start Finish Predecessors
Schedule for Conducting
Research Work 180 days Mon 9/3/18 Fri 2/1/19
Research Proposal and
Approval 29 days Mon 9/3/18 Thu 10/18/18
Get Instructions Regarding
Research Work 5 days Mon 9/3/18 Fri 9/7/18
Selection of an
Appropriate Topic for
Research
2 days Mon 9/10/18 Tue 9/18/18 2
Verification of Topic by
Research Supervisor 5 days Wed 9/12/18 Tue 9/18/18 3
Proceed to Research 1 day Wed 9/19/18 Wed 9/19/18 4
Develop Research
Proposal 10 days Thu 9/20/18 Wed 10/3/18 5
Submit Research Proposal 1 day Thu 10/4/18 Thu 10/4/18 6
Get Approval to Proceed 5 days Fri 10/5/18 Thu 10/18/18 7
Research Planning 12 days Fri 10/12/18 Mon 10/29/18
Analyze Research Topic 4 days Fri 10/12/18 Wed 10/17/18 8
Prepare Research Roadmap 4 days Thu 10/18/18 Tue 10/23/18 10
Determine Research
Objectives 1 day Wed 10/24/18 Wed 10/24/18 18
Define Research Questions 1 day Thu 10/25/18 Thu 10/25/18 12
Select Appropriate 2 days Fri 10/26/18 Mon 10/29/18 13
31
CYBER HARRASSMENT WITH FEMALES
Research Methodology
Research Execution 62 days Tue 10/30/18 Wed 1/23/19
Initiate the Research
Process 2 days Tue 10/30/18 Wed 10/31/18 14
Access Online Library 1 day Thu 18/1/18 Thu 18/1/18 16
Gather Sources of Data 2 days Fri 18/2/18 Mon 18/5/18 17
Conduct Literature Review 5 days Tue 18/6/18 Mon 18/12/18 18
Collect Information from
Literature 10 days Tue 18/13/18 Mon 18/26/18 19
Conduct Extensive
Research 15 days Tue 18/27/18 Mon 12/17/18 20
Conduct Interviews
through Questionnaires 5 days Tue 12/18/18 Mon 12/24/18 21
Collect All Primary and
Secondary Data 5 days Tue 12/25/18 Mon 12/31/18 22
Conduct Data Analysis 5 days Tue 1/1/19 Mon 1/7/19 23
Reach Suitable Conclusion 1 day Tue 1/8/19 Tue 1/8/19 24
Answer Research
Questions 1 day Wed 1/9/19 Wed 1/9/19 25
Complete Documentation 10 days Thu 1/10/19 Wed 1/23/19 26
Research Completion 7 days Thu 1/24/19 Fri 2/1/19
Submit Dissertation 1 day Thu 1/24/19 Thu 1/24/19 27
Receive Marks for the
Research Work 5 days Fri 1/25/19 Thu 1/31/19 29
Sign Off 1 day Fri 2/1/19 Fri 2/1/19 30
3.10 Summary
This chapter has focused on tools and techniques used in the research for completing it on
time. There have been proper identification of tools and technique with proper justification on its
selection done. The tools and methods used in this research has been appropriate according to the
CYBER HARRASSMENT WITH FEMALES
Research Methodology
Research Execution 62 days Tue 10/30/18 Wed 1/23/19
Initiate the Research
Process 2 days Tue 10/30/18 Wed 10/31/18 14
Access Online Library 1 day Thu 18/1/18 Thu 18/1/18 16
Gather Sources of Data 2 days Fri 18/2/18 Mon 18/5/18 17
Conduct Literature Review 5 days Tue 18/6/18 Mon 18/12/18 18
Collect Information from
Literature 10 days Tue 18/13/18 Mon 18/26/18 19
Conduct Extensive
Research 15 days Tue 18/27/18 Mon 12/17/18 20
Conduct Interviews
through Questionnaires 5 days Tue 12/18/18 Mon 12/24/18 21
Collect All Primary and
Secondary Data 5 days Tue 12/25/18 Mon 12/31/18 22
Conduct Data Analysis 5 days Tue 1/1/19 Mon 1/7/19 23
Reach Suitable Conclusion 1 day Tue 1/8/19 Tue 1/8/19 24
Answer Research
Questions 1 day Wed 1/9/19 Wed 1/9/19 25
Complete Documentation 10 days Thu 1/10/19 Wed 1/23/19 26
Research Completion 7 days Thu 1/24/19 Fri 2/1/19
Submit Dissertation 1 day Thu 1/24/19 Thu 1/24/19 27
Receive Marks for the
Research Work 5 days Fri 1/25/19 Thu 1/31/19 29
Sign Off 1 day Fri 2/1/19 Fri 2/1/19 30
3.10 Summary
This chapter has focused on tools and techniques used in the research for completing it on
time. There have been proper identification of tools and technique with proper justification on its
selection done. The tools and methods used in this research has been appropriate according to the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
32
CYBER HARRASSMENT WITH FEMALES
requirements of the research. The research has been executed within the timeframe and deadline
provided. Data collection method has been given importance in the chapter and primary data
collection method has been selected in this research. A proper approach to the analysis of the
data has been provided in the chapter. Proper ethical considerations followed in the research
have been provided in the chapter.
CYBER HARRASSMENT WITH FEMALES
requirements of the research. The research has been executed within the timeframe and deadline
provided. Data collection method has been given importance in the chapter and primary data
collection method has been selected in this research. A proper approach to the analysis of the
data has been provided in the chapter. Proper ethical considerations followed in the research
have been provided in the chapter.
33
CYBER HARRASSMENT WITH FEMALES
Chapter 4: Findings and Analysis
4.1 Introduction
This chapter focuses on data collection technique used in the research. The research has
used primary data collection method. There have been 100 participants taken in the online
survey who are social media users. The survey questionnaire have been provided in this chapter
with proper data collected. After, data collection, quantitative data analysis has been done to
obtain results from data. The use of the Likert Scale has been shown in the chapter. A proper
analysis has been done ion the collected data and information.
4.2 Quantitative Data analysis
Quantitative data analysis has been chosen in this research. The use of Likert Scale
ranging from 1 to 5 has been used in this analysis for getting results and outcomes. Analysis has
been done with respect to the survey questionnaire filled by participants.
1. What is your gender?
Options Responses Responses (%) Total Respondents
Male 68 68% 100
Female 32 32% 100
CYBER HARRASSMENT WITH FEMALES
Chapter 4: Findings and Analysis
4.1 Introduction
This chapter focuses on data collection technique used in the research. The research has
used primary data collection method. There have been 100 participants taken in the online
survey who are social media users. The survey questionnaire have been provided in this chapter
with proper data collected. After, data collection, quantitative data analysis has been done to
obtain results from data. The use of the Likert Scale has been shown in the chapter. A proper
analysis has been done ion the collected data and information.
4.2 Quantitative Data analysis
Quantitative data analysis has been chosen in this research. The use of Likert Scale
ranging from 1 to 5 has been used in this analysis for getting results and outcomes. Analysis has
been done with respect to the survey questionnaire filled by participants.
1. What is your gender?
Options Responses Responses (%) Total Respondents
Male 68 68% 100
Female 32 32% 100
34
CYBER HARRASSMENT WITH FEMALES
Figure 1: Gender
Analysis: According to the table and graph, it can be observe that 68% of the total
participants are female. Therefore, it can be analyzed that most of the females have been
affected by cyber bullying over social media. Females have been suffering with various cyber-
attacks over social media platforms including Facebook, Twitter, Instagram and Snap chat.
Therefore, most of the females have participated in this survey. The above table describes that
32% of the total participants have been male. They used to talk gently with these adolescent
girls and take all information and data from them. This type of cyber abusing has been increased
in recent years. Sexting and sending nudes of people has been becoming common on social
media. The amount of nude pictures uploaded to social media platforms have been increasing in
recent years. Adolescent females and girls have been feeling in safe over those social media
platforms due to cyber bullying. The male participants have provided answers about how they
are bullied by fake female profiles over the social media. This have been a serious issue
regarding increase in the fake profiles over social media.
2. What is your age?
Options Responses Responses (%) Total Respondents
CYBER HARRASSMENT WITH FEMALES
Figure 1: Gender
Analysis: According to the table and graph, it can be observe that 68% of the total
participants are female. Therefore, it can be analyzed that most of the females have been
affected by cyber bullying over social media. Females have been suffering with various cyber-
attacks over social media platforms including Facebook, Twitter, Instagram and Snap chat.
Therefore, most of the females have participated in this survey. The above table describes that
32% of the total participants have been male. They used to talk gently with these adolescent
girls and take all information and data from them. This type of cyber abusing has been increased
in recent years. Sexting and sending nudes of people has been becoming common on social
media. The amount of nude pictures uploaded to social media platforms have been increasing in
recent years. Adolescent females and girls have been feeling in safe over those social media
platforms due to cyber bullying. The male participants have provided answers about how they
are bullied by fake female profiles over the social media. This have been a serious issue
regarding increase in the fake profiles over social media.
2. What is your age?
Options Responses Responses (%) Total Respondents
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
35
CYBER HARRASSMENT WITH FEMALES
18-20 years 9 9% 100
21-30 years 25 25% 100
31-40 years 37 37% 100
41-50 years 17 17% 100
Above 50 years 12 12% 100
Figure 2: Age
Analysis: According to tables and chart, 37% of the participants are between 21-30 years
of age. 25% of the participants are between 18-20 years of age. Therefore, it can be concluded
that teenagers and adults have been facing cyber violence over the social media. The graph
shows that 18-40 years of participants have been suffering from the cyber violence over the
social media,. Most of the participants have been teenagers and using social media from low
ages. This has been the main reasons of wrong use of social media over the internet. Due to lack
of knowledge about privacy and security over social media, adolescent girls have been sharing
CYBER HARRASSMENT WITH FEMALES
18-20 years 9 9% 100
21-30 years 25 25% 100
31-40 years 37 37% 100
41-50 years 17 17% 100
Above 50 years 12 12% 100
Figure 2: Age
Analysis: According to tables and chart, 37% of the participants are between 21-30 years
of age. 25% of the participants are between 18-20 years of age. Therefore, it can be concluded
that teenagers and adults have been facing cyber violence over the social media. The graph
shows that 18-40 years of participants have been suffering from the cyber violence over the
social media,. Most of the participants have been teenagers and using social media from low
ages. This has been the main reasons of wrong use of social media over the internet. Due to lack
of knowledge about privacy and security over social media, adolescent girls have been sharing
36
CYBER HARRASSMENT WITH FEMALES
their personal details over the social media. Therefore, this has been causing cyberbullying over
the social media through fake profiles.
What is
your
gender?
What is
your
age ?
Which social media
platform, you use
frequently?
How much time you
spend time over social
media?
How often do you
think cyber bullying
happens?
Female 18-20
years
Facebook 1-2 hours It happens too often,
but not all the time.
Female 18-20
years
Facebook 1-2 hours It happens too often,
but not all the time.
Male 21-30
years
Twitter 3-4 hours It hardly ever
happens.
Male 21-30
years
Twitter 2-3 hours It happens sometimes.
Female 18-20
years
Twitter 2-3 hours It happens sometimes.
Male 21-30
years
Facebook 1-2 hours It happens sometimes.
Female 21-30
years
Instagram More than 4 hours It happens too often,
but not all the time.
Male 21-30
years
Instagram 2-3 hours It happens too often,
but not all the time.
Female 18-20
years
Twitter Less than one hour It happens all the
time.
Female 21-30
years
Facebook More than 4 hours It happens all the
time.
Male 21-30
years
Facebook 2-3 hours It happens sometimes.
Female 18-20
years
Facebook 1-2 hours It happens too often,
but not all the time.
Male below
10 years
Snap chat 1-2 hours It never happens.
Female 31-40
years
Twitter More than 4 hours It happens all the
time.
3. Which social media platform, you use frequently?
Options Responses Responses (%) Total Respondents
LinkedIn 6 6% 100
Facebook 37 37% 100
CYBER HARRASSMENT WITH FEMALES
their personal details over the social media. Therefore, this has been causing cyberbullying over
the social media through fake profiles.
What is
your
gender?
What is
your
age ?
Which social media
platform, you use
frequently?
How much time you
spend time over social
media?
How often do you
think cyber bullying
happens?
Female 18-20
years
Facebook 1-2 hours It happens too often,
but not all the time.
Female 18-20
years
Facebook 1-2 hours It happens too often,
but not all the time.
Male 21-30
years
Twitter 3-4 hours It hardly ever
happens.
Male 21-30
years
Twitter 2-3 hours It happens sometimes.
Female 18-20
years
Twitter 2-3 hours It happens sometimes.
Male 21-30
years
Facebook 1-2 hours It happens sometimes.
Female 21-30
years
Instagram More than 4 hours It happens too often,
but not all the time.
Male 21-30
years
Instagram 2-3 hours It happens too often,
but not all the time.
Female 18-20
years
Twitter Less than one hour It happens all the
time.
Female 21-30
years
Facebook More than 4 hours It happens all the
time.
Male 21-30
years
Facebook 2-3 hours It happens sometimes.
Female 18-20
years
Facebook 1-2 hours It happens too often,
but not all the time.
Male below
10 years
Snap chat 1-2 hours It never happens.
Female 31-40
years
Twitter More than 4 hours It happens all the
time.
3. Which social media platform, you use frequently?
Options Responses Responses (%) Total Respondents
LinkedIn 6 6% 100
Facebook 37 37% 100
37
CYBER HARRASSMENT WITH FEMALES
Twitter 19 19% 100
Instagram 23 23% 100
Snap chat 15 15% 100
Figure 3: Which social media platform, you use frequently?
Analysis: As per the charts and tables, 37% of the total participants have been using
Facebook as social media. Facebook has been one of the most popular social media platform all
over the world. It has been easy to make an account over the Facebook using a mail id.
Therefore, most of the people are available over the Facebook. There are many fake profiles over
Facebook through which cyberbullying is done to females. The major reason of this kind of
illegal attack has been lack of knowledge of using social media. Many females used to share
their personal details, photos and videos to unknown person over Facebook. 23% of the
participants have been using Instagram where, pictures and videos are uploaded. Therefore, the
wrong use of social media has been creating cyber issues for females over the internet.
4. How much time you spend time over social media?
CYBER HARRASSMENT WITH FEMALES
Twitter 19 19% 100
Instagram 23 23% 100
Snap chat 15 15% 100
Figure 3: Which social media platform, you use frequently?
Analysis: As per the charts and tables, 37% of the total participants have been using
Facebook as social media. Facebook has been one of the most popular social media platform all
over the world. It has been easy to make an account over the Facebook using a mail id.
Therefore, most of the people are available over the Facebook. There are many fake profiles over
Facebook through which cyberbullying is done to females. The major reason of this kind of
illegal attack has been lack of knowledge of using social media. Many females used to share
their personal details, photos and videos to unknown person over Facebook. 23% of the
participants have been using Instagram where, pictures and videos are uploaded. Therefore, the
wrong use of social media has been creating cyber issues for females over the internet.
4. How much time you spend time over social media?
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
38
CYBER HARRASSMENT WITH FEMALES
Options Responses Responses (%) Total Respondents
Less than one hour 18 18% 100
1-2 hours 33 33% 100
2-3 hours 17 17% 100
3-4 hours 17 17% 100
Above 4 hours 22 22% 100
Figure 4: How much time you spend time over social media?
Analysis: According to the charts and tables, 33% of the participants used to spend 2-3
hours’ time over social media. This shows that most of the people are addicted to the social
media. They used to share their feelings, personal details and emotions over the social media.
22% of the participants used to spend more than four hours over different social media platforms.
Therefore, it can be analyzed that this virtual world has been able to engage people within. This
has been creating a wrong impact in the mind of young girls. Chatting at night has been more
dangerous for females, as most of the sexting from fake profiles and males are done. Different
types of nude photos and videos are being shared frequently. Therefore, online harassing to
females has been increasing over years.
CYBER HARRASSMENT WITH FEMALES
Options Responses Responses (%) Total Respondents
Less than one hour 18 18% 100
1-2 hours 33 33% 100
2-3 hours 17 17% 100
3-4 hours 17 17% 100
Above 4 hours 22 22% 100
Figure 4: How much time you spend time over social media?
Analysis: According to the charts and tables, 33% of the participants used to spend 2-3
hours’ time over social media. This shows that most of the people are addicted to the social
media. They used to share their feelings, personal details and emotions over the social media.
22% of the participants used to spend more than four hours over different social media platforms.
Therefore, it can be analyzed that this virtual world has been able to engage people within. This
has been creating a wrong impact in the mind of young girls. Chatting at night has been more
dangerous for females, as most of the sexting from fake profiles and males are done. Different
types of nude photos and videos are being shared frequently. Therefore, online harassing to
females has been increasing over years.
39
CYBER HARRASSMENT WITH FEMALES
Femal
e
18-20 years Twitter 3-4 hours It never happens.
Femal
e
21-30 years Faceboo
k
3-4 hours It hardly ever happens.
Male 21-30 years Instagra
m
Less than one
hour
It happens too often, but not all the
time.
Femal
e
below 10
years
Snap
chat
Less than one
hour
It happens all the time.
Femal
e
18-20 years Faceboo
k
1-2 hours It happens all the time.
Male 21-30 years Twitter 1-2 hours It happens too often, but not all the
time.
Male 31-40 years Instagra
m
3-4 hours It hardly ever happens.
Femal
e
Above 40
years
Twitter More than 4
hours
It happens too often, but not all the
time.
Male 21-30 years LinkedI
N
2-3 hours It hardly ever happens.
Male 21-30 years Instagra
m
Less than one
hour
It hardly ever happens.
Male 21-30 years Faceboo
k
More than 4
hours
It happens sometimes.
Male 21-30 years Instagra
m
Less than one
hour
It never happens.
Femal
e
21-30 years Twitter 2-3 hours It happens sometimes.
Femal
e
21-30 years Faceboo
k
1-2 hours It happens too often, but not all the
time.
Femal
e
18-20 years Faceboo
k
1-2 hours It happens too often, but not all the
time.
Femal
e
18-20 years Faceboo
k
1-2 hours It happens too often, but not all the
time.
Femal
e
21-30 years Faceboo
k
Less than one
hour
It happens too often, but not all the
time.
Femal
e
Above 40
years
Snap
chat
2-3 hours It happens sometimes.
Femal
e
18-20 years LinkedI
N
1-2 hours It hardly ever happens.
Femal
e
21-30 years Snap
chat
2-3 hours It happens sometimes.
Femal
e
18-20 years Faceboo
k
3-4 hours It never happens.
Femal
e
31-40 years Instagra
m
More than 4
hours
It happens sometimes.
Femal
e
21-30 years Instagra
m
More than 4
hours
It happens all the time.
CYBER HARRASSMENT WITH FEMALES
Femal
e
18-20 years Twitter 3-4 hours It never happens.
Femal
e
21-30 years Faceboo
k
3-4 hours It hardly ever happens.
Male 21-30 years Instagra
m
Less than one
hour
It happens too often, but not all the
time.
Femal
e
below 10
years
Snap
chat
Less than one
hour
It happens all the time.
Femal
e
18-20 years Faceboo
k
1-2 hours It happens all the time.
Male 21-30 years Twitter 1-2 hours It happens too often, but not all the
time.
Male 31-40 years Instagra
m
3-4 hours It hardly ever happens.
Femal
e
Above 40
years
Twitter More than 4
hours
It happens too often, but not all the
time.
Male 21-30 years LinkedI
N
2-3 hours It hardly ever happens.
Male 21-30 years Instagra
m
Less than one
hour
It hardly ever happens.
Male 21-30 years Faceboo
k
More than 4
hours
It happens sometimes.
Male 21-30 years Instagra
m
Less than one
hour
It never happens.
Femal
e
21-30 years Twitter 2-3 hours It happens sometimes.
Femal
e
21-30 years Faceboo
k
1-2 hours It happens too often, but not all the
time.
Femal
e
18-20 years Faceboo
k
1-2 hours It happens too often, but not all the
time.
Femal
e
18-20 years Faceboo
k
1-2 hours It happens too often, but not all the
time.
Femal
e
21-30 years Faceboo
k
Less than one
hour
It happens too often, but not all the
time.
Femal
e
Above 40
years
Snap
chat
2-3 hours It happens sometimes.
Femal
e
18-20 years LinkedI
N
1-2 hours It hardly ever happens.
Femal
e
21-30 years Snap
chat
2-3 hours It happens sometimes.
Femal
e
18-20 years Faceboo
k
3-4 hours It never happens.
Femal
e
31-40 years Instagra
m
More than 4
hours
It happens sometimes.
Femal
e
21-30 years Instagra
m
More than 4
hours
It happens all the time.
40
CYBER HARRASSMENT WITH FEMALES
Femal
e
21-30 years Instagra
m
More than 4
hours
It hardly ever happens.
Femal
e
31-40 years Faceboo
k
3-4 hours It happens sometimes.
Male 21-30 years Faceboo
k
3-4 hours It never happens.
Male 18-20 years Faceboo
k
1-2 hours It happens sometimes.
Femal
e
below 10
years
Faceboo
k
1-2 hours It happens too often, but not all the
time.
Femal
e
31-40 years Instagra
m
1-2 hours It happens too often, but not all the
time.
Male 21-30 years Twitter 2-3 hours It hardly ever happens.
Femal
e
31-40 years Snap
chat
More than 4
hours
It hardly ever happens.
Femal
e
31-40 years Twitter More than 4
hours
It hardly ever happens.
Femal
e
below 10
years
LinkedI
N
Less than one
hour
It happens all the time.
Femal
e
21-30 years Twitter More than 4
hours
It happens sometimes.
Femal
e
18-20 years Faceboo
k
1-2 hours It happens too often, but not all the
time.
5. How often do you think cyber bullying happens?
Options Responses Responses (%) Total Respondents
It happens all the
time
14 14% 100
It happens too often,
but not all the time
35 35% 100
It happens
sometimes.
14 14% 100
It hardly ever
happens.
19 19% 100
CYBER HARRASSMENT WITH FEMALES
Femal
e
21-30 years Instagra
m
More than 4
hours
It hardly ever happens.
Femal
e
31-40 years Faceboo
k
3-4 hours It happens sometimes.
Male 21-30 years Faceboo
k
3-4 hours It never happens.
Male 18-20 years Faceboo
k
1-2 hours It happens sometimes.
Femal
e
below 10
years
Faceboo
k
1-2 hours It happens too often, but not all the
time.
Femal
e
31-40 years Instagra
m
1-2 hours It happens too often, but not all the
time.
Male 21-30 years Twitter 2-3 hours It hardly ever happens.
Femal
e
31-40 years Snap
chat
More than 4
hours
It hardly ever happens.
Femal
e
31-40 years Twitter More than 4
hours
It hardly ever happens.
Femal
e
below 10
years
LinkedI
N
Less than one
hour
It happens all the time.
Femal
e
21-30 years Twitter More than 4
hours
It happens sometimes.
Femal
e
18-20 years Faceboo
k
1-2 hours It happens too often, but not all the
time.
5. How often do you think cyber bullying happens?
Options Responses Responses (%) Total Respondents
It happens all the
time
14 14% 100
It happens too often,
but not all the time
35 35% 100
It happens
sometimes.
14 14% 100
It hardly ever
happens.
19 19% 100
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
41
CYBER HARRASSMENT WITH FEMALES
It never happens. 18 18% 100
Figure 5: How often do you think cyber bullying happens?
Analysis: As per the chart and table, 35% of the total participants think that cyber
bullying happens often. However, 19% of the participants think it happens all tine. There have
been many cases related to cyber bullying activities to females over the social media. The use of
social media has been turning into addiction among young people in the world. The amount of
nude pictures uploaded to social media platforms have been increasing in recent years.
Adolescent females and girls have been feeling in safe over those social media platforms due to
cyber bullying. Several hackers and abusers used to blackmail some females with nude photos
and videos and create depression among them. There have been various cases on social media
due to blackmailing and cyber bullying. The use of the social media has been going wrong both
the increase in the security protocols over social media.
Fe
mal
e
21-30
years
Twitt
er
1-2 hours It never happens. stealing your identity
Fe
mal
e
21-30
years
Insta
gram
3-4 hours It hardly ever
happens.
Sexting
CYBER HARRASSMENT WITH FEMALES
It never happens. 18 18% 100
Figure 5: How often do you think cyber bullying happens?
Analysis: As per the chart and table, 35% of the total participants think that cyber
bullying happens often. However, 19% of the participants think it happens all tine. There have
been many cases related to cyber bullying activities to females over the social media. The use of
social media has been turning into addiction among young people in the world. The amount of
nude pictures uploaded to social media platforms have been increasing in recent years.
Adolescent females and girls have been feeling in safe over those social media platforms due to
cyber bullying. Several hackers and abusers used to blackmail some females with nude photos
and videos and create depression among them. There have been various cases on social media
due to blackmailing and cyber bullying. The use of the social media has been going wrong both
the increase in the security protocols over social media.
Fe
mal
e
21-30
years
Twitt
er
1-2 hours It never happens. stealing your identity
Fe
mal
e
21-30
years
Insta
gram
3-4 hours It hardly ever
happens.
Sexting
42
CYBER HARRASSMENT WITH FEMALES
Fe
mal
e
21-30
years
Face
book
2-3 hours It happens all the
time.
Sexting
Fe
mal
e
21-30
years
Snap
chat
More than
4 hours
It happens all the
time.
stealing your identity
Fe
mal
e
31-40
years
Insta
gram
2-3 hours It happens too often,
but not all the time.
cyber-stalking
Fe
mal
e
31-40
years
Insta
gram
3-4 hours It never happens. Sexting
Fe
mal
e
31-40
years
Snap
chat
3-4 hours It never happens. stealing your identity
Mal
e
21-30
years
Insta
gram
Less than
one hour
It hardly ever
happens.
Sexting
Fe
mal
e
below
10 years
Twitt
er
2-3 hours It happens too often,
but not all the time.
trying to damage your reputation
by making false comments
Fe
mal
e
18-20
years
Face
book
3-4 hours It hardly ever
happens.
cyber-stalking
Fe
mal
e
21-30
years
Snap
chat
2-3 hours It happens too often,
but not all the time.
cyber-stalking
Mal
e
21-30
years
Insta
gram
2-3 hours It happens too often,
but not all the time.
electronic sabotage
Fe
mal
e
Above
40 years
Snap
chat
More than
4 hours
It never happens. cyber-stalking
Fe
mal
e
below
10 years
Twitt
er
3-4 hours It never happens. electronic sabotage
Fe
mal
e
18-20
years
Insta
gram
3-4 hours It hardly ever
happens.
cyber-stalking
Mal
e
21-30
years
Face
book
More than
4 hours
It happens all the
time.
trying to damage your reputation
by making false comments
Fe
mal
e
Above
40 years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Mal
e
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Fe
mal
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
CYBER HARRASSMENT WITH FEMALES
Fe
mal
e
21-30
years
Face
book
2-3 hours It happens all the
time.
Sexting
Fe
mal
e
21-30
years
Snap
chat
More than
4 hours
It happens all the
time.
stealing your identity
Fe
mal
e
31-40
years
Insta
gram
2-3 hours It happens too often,
but not all the time.
cyber-stalking
Fe
mal
e
31-40
years
Insta
gram
3-4 hours It never happens. Sexting
Fe
mal
e
31-40
years
Snap
chat
3-4 hours It never happens. stealing your identity
Mal
e
21-30
years
Insta
gram
Less than
one hour
It hardly ever
happens.
Sexting
Fe
mal
e
below
10 years
Twitt
er
2-3 hours It happens too often,
but not all the time.
trying to damage your reputation
by making false comments
Fe
mal
e
18-20
years
Face
book
3-4 hours It hardly ever
happens.
cyber-stalking
Fe
mal
e
21-30
years
Snap
chat
2-3 hours It happens too often,
but not all the time.
cyber-stalking
Mal
e
21-30
years
Insta
gram
2-3 hours It happens too often,
but not all the time.
electronic sabotage
Fe
mal
e
Above
40 years
Snap
chat
More than
4 hours
It never happens. cyber-stalking
Fe
mal
e
below
10 years
Twitt
er
3-4 hours It never happens. electronic sabotage
Fe
mal
e
18-20
years
Insta
gram
3-4 hours It hardly ever
happens.
cyber-stalking
Mal
e
21-30
years
Face
book
More than
4 hours
It happens all the
time.
trying to damage your reputation
by making false comments
Fe
mal
e
Above
40 years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Mal
e
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Fe
mal
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
43
CYBER HARRASSMENT WITH FEMALES
e
Fe
mal
e
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Mal
e
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
6. What type of online harassment you have faced?
Options Responses Responses (%) Total Respondents
trying to damage
your reputation by
making false
comments
18 18% 100
stealing your identity 37 37% 100
electronic sabotage 15 15% 100
Sexting 19 19% 100
cyber-stalking 18 18% 100
Figure 6: What type of online harassment you have faced?
CYBER HARRASSMENT WITH FEMALES
e
Fe
mal
e
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Mal
e
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
6. What type of online harassment you have faced?
Options Responses Responses (%) Total Respondents
trying to damage
your reputation by
making false
comments
18 18% 100
stealing your identity 37 37% 100
electronic sabotage 15 15% 100
Sexting 19 19% 100
cyber-stalking 18 18% 100
Figure 6: What type of online harassment you have faced?
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
44
CYBER HARRASSMENT WITH FEMALES
Analysis: According to the table and chart, 37% participants have answered as stealing
identity has been one of the most used online harassment 19% participants have answered
sexting as a type of online harassment. This has been a critical approach towards the validity of
security and privacy over the social media. Facebook has been main platform for cybercrime
over the social media. According to chart, 18% participants have answered cyber-stalking as
online harassment. There are various fake profiles over the Facebook that have been stalking to
female accounts and messaging them unnecessary. There have been increase in the sexting from
unknown profiles over the Facebook and other social media. Fake profiles used to post nude
photos and video on anyone profile. The security of female accounts over social media has been
low due to lack of knowledge. Hackers used to collect data from profiles of adolescent females
and girls and get access to their account.
7. Do you feel safe over social media sharing your daily routine and identity?
Options Responses Responses (%) Total Respondents
Yes 71 71% 100
No 29 29% 100
CYBER HARRASSMENT WITH FEMALES
Analysis: According to the table and chart, 37% participants have answered as stealing
identity has been one of the most used online harassment 19% participants have answered
sexting as a type of online harassment. This has been a critical approach towards the validity of
security and privacy over the social media. Facebook has been main platform for cybercrime
over the social media. According to chart, 18% participants have answered cyber-stalking as
online harassment. There are various fake profiles over the Facebook that have been stalking to
female accounts and messaging them unnecessary. There have been increase in the sexting from
unknown profiles over the Facebook and other social media. Fake profiles used to post nude
photos and video on anyone profile. The security of female accounts over social media has been
low due to lack of knowledge. Hackers used to collect data from profiles of adolescent females
and girls and get access to their account.
7. Do you feel safe over social media sharing your daily routine and identity?
Options Responses Responses (%) Total Respondents
Yes 71 71% 100
No 29 29% 100
45
CYBER HARRASSMENT WITH FEMALES
Figure 7: Do you feel safe over social media sharing your daily routine and identity?
Analysis: As per collected data and tables, 71% participants have answered that they are
not safe over social media. The reason behind this has been lack of security and knowledge over
the social; media accounts. As per research, Facebook has been one of the most preferred social
media network used by the users. Snap chat has been responsible for providing nude pictures of
females over the network. Therefore, due to lack in awareness among users of social media,
cybercrimes has been increasing in the digital age. The use of the social media has been
increasing all over the world. However, along with this cyber bullying has been also increasing
all over the world. Adolescent females and girls have been affected by this cyber harassing
problem, all over the world. Therefore, most of the females have reported as not safe over the
social media.
8. If you saw or experienced a violent incident, assault, or threatening behavior at work,
did you report it?
Options Responses Responses (%) Total Respondents
Yes 53 53% 100
No 47 47% 100
CYBER HARRASSMENT WITH FEMALES
Figure 7: Do you feel safe over social media sharing your daily routine and identity?
Analysis: As per collected data and tables, 71% participants have answered that they are
not safe over social media. The reason behind this has been lack of security and knowledge over
the social; media accounts. As per research, Facebook has been one of the most preferred social
media network used by the users. Snap chat has been responsible for providing nude pictures of
females over the network. Therefore, due to lack in awareness among users of social media,
cybercrimes has been increasing in the digital age. The use of the social media has been
increasing all over the world. However, along with this cyber bullying has been also increasing
all over the world. Adolescent females and girls have been affected by this cyber harassing
problem, all over the world. Therefore, most of the females have reported as not safe over the
social media.
8. If you saw or experienced a violent incident, assault, or threatening behavior at work,
did you report it?
Options Responses Responses (%) Total Respondents
Yes 53 53% 100
No 47 47% 100
46
CYBER HARRASSMENT WITH FEMALES
Figure 8: If you saw or experienced a violent incident, assault, or threatening behavior at
work, did you report it?
Analysis: As per the chart and table, 53% of the participants used to report on
experiencing any kind of cyber harassment. However, 47% of the participants have reported that
they do not report any kind of activities related to cyber harassments. Thus shows that there have
been any changes in the reports that are shown over the internet as most of the people do not
report about cyber bullying and harassment. The main reason of this has been lack of awareness.
Females do not know how and where to report a complaint against such activities. Along with
this, many women and females do not even know what to do in case of cyber bullying and
harassment. This has been the main reason of such illegal activities over the social media. They
used to make a new account to mitigate cyber harassment problem.
9. If you would feel threatened - who would you turn to for help?
Options Responses Responses (%) Total Respondents
A friend 18 18% 100
My parents/guardians 38 38% 100
My teacher 20 20% 100
CYBER HARRASSMENT WITH FEMALES
Figure 8: If you saw or experienced a violent incident, assault, or threatening behavior at
work, did you report it?
Analysis: As per the chart and table, 53% of the participants used to report on
experiencing any kind of cyber harassment. However, 47% of the participants have reported that
they do not report any kind of activities related to cyber harassments. Thus shows that there have
been any changes in the reports that are shown over the internet as most of the people do not
report about cyber bullying and harassment. The main reason of this has been lack of awareness.
Females do not know how and where to report a complaint against such activities. Along with
this, many women and females do not even know what to do in case of cyber bullying and
harassment. This has been the main reason of such illegal activities over the social media. They
used to make a new account to mitigate cyber harassment problem.
9. If you would feel threatened - who would you turn to for help?
Options Responses Responses (%) Total Respondents
A friend 18 18% 100
My parents/guardians 38 38% 100
My teacher 20 20% 100
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
47
CYBER HARRASSMENT WITH FEMALES
Police 15 15% 100
Other 16 16% 100
Figure 9: If you would feel threatened - who would you turn to for help?
Analysis: Above table and chart depicts that 38% of the victims of cyber harassment
used to tell to their parents/guardians about it. 20% of the victims speaks to their teacher as most
of the participants are teenagers are might be school or college going students. Therefore, social
media has been affecting these adolescent girls and females who are school going. They used to
speak to their parents about the cyber harassment so that they can they can take steps against it.
However, only 15% of the participants approaches to police. This percentage has been very low.
This need to be improved so that hackers can be traced by the police. Female victims need to
approach directly to police related to cyber harassment cases. This help in mitigating these issues
in proper manner.
Fe
mal
e
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Mal
e
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Fe 18-20 Face 1-2 hours It happens too often, stealing your identity
CYBER HARRASSMENT WITH FEMALES
Police 15 15% 100
Other 16 16% 100
Figure 9: If you would feel threatened - who would you turn to for help?
Analysis: Above table and chart depicts that 38% of the victims of cyber harassment
used to tell to their parents/guardians about it. 20% of the victims speaks to their teacher as most
of the participants are teenagers are might be school or college going students. Therefore, social
media has been affecting these adolescent girls and females who are school going. They used to
speak to their parents about the cyber harassment so that they can they can take steps against it.
However, only 15% of the participants approaches to police. This percentage has been very low.
This need to be improved so that hackers can be traced by the police. Female victims need to
approach directly to police related to cyber harassment cases. This help in mitigating these issues
in proper manner.
Fe
mal
e
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Mal
e
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Fe 18-20 Face 1-2 hours It happens too often, stealing your identity
48
CYBER HARRASSMENT WITH FEMALES
mal
e
years book but not all the time.
Mal
e
Above
40 years
Snap
chat
More than
4 hours
It never happens. cyber-stalking
Fe
mal
e
31-40
years
Insta
gram
More than
4 hours
It hardly ever
happens.
electronic sabotage
Mal
e
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Mal
e
Above
40 years
Snap
chat
More than
4 hours
It never happens. cyber-stalking
Fe
mal
e
Above
40 years
Link
edIN
Less than
one hour
It happens all the
time.
trying to damage your reputation
by making false comments
Fe
mal
e
Above
40 years
Snap
chat
More than
4 hours
It never happens. cyber-stalking
Fe
mal
e
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Fe
mal
e
31-40
years
Twitt
er
2-3 hours It happens sometimes. electronic sabotage
Fe
mal
e
Above
40 years
Insta
gram
More than
4 hours
It never happens. cyber-stalking
Fe
mal
e
31-40
years
Insta
gram
3-4 hours It hardly ever
happens.
electronic sabotage
Fe
mal
e
Above
40 years
Insta
gram
More than
4 hours
It hardly ever
happens.
Sexting
Mal
e
21-30
years
Link
edIN
3-4 hours It happens sometimes. electronic sabotage
Fe
mal
e
21-30
years
Snap
chat
2-3 hours It happens all the
time.
trying to damage your reputation
by making false comments
Fe
mal
e
21-30
years
Insta
gram
Less than
one hour
It never happens. electronic sabotage
Mal
e
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Mal
e
below
10 years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Mal
e
below
10 years
Twitt
er
1-2 hours It happens too often,
but not all the time.
stealing your identity
CYBER HARRASSMENT WITH FEMALES
mal
e
years book but not all the time.
Mal
e
Above
40 years
Snap
chat
More than
4 hours
It never happens. cyber-stalking
Fe
mal
e
31-40
years
Insta
gram
More than
4 hours
It hardly ever
happens.
electronic sabotage
Mal
e
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Mal
e
Above
40 years
Snap
chat
More than
4 hours
It never happens. cyber-stalking
Fe
mal
e
Above
40 years
Link
edIN
Less than
one hour
It happens all the
time.
trying to damage your reputation
by making false comments
Fe
mal
e
Above
40 years
Snap
chat
More than
4 hours
It never happens. cyber-stalking
Fe
mal
e
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Fe
mal
e
31-40
years
Twitt
er
2-3 hours It happens sometimes. electronic sabotage
Fe
mal
e
Above
40 years
Insta
gram
More than
4 hours
It never happens. cyber-stalking
Fe
mal
e
31-40
years
Insta
gram
3-4 hours It hardly ever
happens.
electronic sabotage
Fe
mal
e
Above
40 years
Insta
gram
More than
4 hours
It hardly ever
happens.
Sexting
Mal
e
21-30
years
Link
edIN
3-4 hours It happens sometimes. electronic sabotage
Fe
mal
e
21-30
years
Snap
chat
2-3 hours It happens all the
time.
trying to damage your reputation
by making false comments
Fe
mal
e
21-30
years
Insta
gram
Less than
one hour
It never happens. electronic sabotage
Mal
e
18-20
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Mal
e
below
10 years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Mal
e
below
10 years
Twitt
er
1-2 hours It happens too often,
but not all the time.
stealing your identity
49
CYBER HARRASSMENT WITH FEMALES
Mal
e
Above
40 years
Snap
chat
1-2 hours It happens too often,
but not all the time.
stealing your identity
Fe
mal
e
21-30
years
Insta
gram
More than
4 hours
It happens too often,
but not all the time.
stealing your identity
Fe
mal
e
31-40
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Fe
mal
e
31-40
years
Twitt
er
3-4 hours It hardly ever
happens.
cyber-stalking
Fe
mal
e
31-40
years
Twitt
er
3-4 hours It hardly ever
happens.
Sexting
Mal
e
31-40
years
Insta
gram
1-2 hours It never happens. stealing your identity
Fe
mal
e
below
10 years
Link
edIN
Less than
one hour
It happens all the
time.
trying to damage your reputation
by making false comments
Fe
mal
e
21-30
years
Face
book
1-2 hours It never happens. cyber-stalking
Fe
mal
e
Above
40 years
Snap
chat
More than
4 hours
It never happens. cyber-stalking
Mal
e
21-30
years
Face
book
2-3 hours It happens all the
time.
electronic sabotage
10. Do you think the government and organizations are listening to young people about
safety issues they face online?
Options Responses Responses (%) Total Respondents
Yes, I feel young
people have strong
voice on the main
issues
15 15% 100
Sometimes, but I 30 30% 100
CYBER HARRASSMENT WITH FEMALES
Mal
e
Above
40 years
Snap
chat
1-2 hours It happens too often,
but not all the time.
stealing your identity
Fe
mal
e
21-30
years
Insta
gram
More than
4 hours
It happens too often,
but not all the time.
stealing your identity
Fe
mal
e
31-40
years
Face
book
1-2 hours It happens too often,
but not all the time.
stealing your identity
Fe
mal
e
31-40
years
Twitt
er
3-4 hours It hardly ever
happens.
cyber-stalking
Fe
mal
e
31-40
years
Twitt
er
3-4 hours It hardly ever
happens.
Sexting
Mal
e
31-40
years
Insta
gram
1-2 hours It never happens. stealing your identity
Fe
mal
e
below
10 years
Link
edIN
Less than
one hour
It happens all the
time.
trying to damage your reputation
by making false comments
Fe
mal
e
21-30
years
Face
book
1-2 hours It never happens. cyber-stalking
Fe
mal
e
Above
40 years
Snap
chat
More than
4 hours
It never happens. cyber-stalking
Mal
e
21-30
years
Face
book
2-3 hours It happens all the
time.
electronic sabotage
10. Do you think the government and organizations are listening to young people about
safety issues they face online?
Options Responses Responses (%) Total Respondents
Yes, I feel young
people have strong
voice on the main
issues
15 15% 100
Sometimes, but I 30 30% 100
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
50
CYBER HARRASSMENT WITH FEMALES
think they could
listen more to what
young people have to
say
No, I do not feel
young people get
enough of a say about
the issues that affect
them online
26 26% 100
Don't know 18 18% 100
Neutral 18 18% 100
Figure 10: Do you think the government and organizations are listening to young people
about safety issues they face online?
Analysis: According to the chart and table, 30% of the participants believe that
sometimes government have been listening to young people. Along with, 26% of the participants
CYBER HARRASSMENT WITH FEMALES
think they could
listen more to what
young people have to
say
No, I do not feel
young people get
enough of a say about
the issues that affect
them online
26 26% 100
Don't know 18 18% 100
Neutral 18 18% 100
Figure 10: Do you think the government and organizations are listening to young people
about safety issues they face online?
Analysis: According to the chart and table, 30% of the participants believe that
sometimes government have been listening to young people. Along with, 26% of the participants
51
CYBER HARRASSMENT WITH FEMALES
believe that government is not listening to the young people and taking no actions against cyber
harassment cases. Overall, it can be analyzed that the government has been in neural position as
both positive and negative factors have been in the government. There have been various cyber
Acts against cybercrimes. However, hackers are not following those protocols and continuing
cyber harassment with adolescent females and girls.
CYBER HARRASSMENT WITH FEMALES
believe that government is not listening to the young people and taking no actions against cyber
harassment cases. Overall, it can be analyzed that the government has been in neural position as
both positive and negative factors have been in the government. There have been various cyber
Acts against cybercrimes. However, hackers are not following those protocols and continuing
cyber harassment with adolescent females and girls.
52
CYBER HARRASSMENT WITH FEMALES
Chapter 5: Conclusion and recommendations
5.1 Conclusion
The UK has driven the route in moving toward the issue from a viewpoint of self-control
as opposed to enactment. Self-direction works since it realizes organizations and causes us to
push ahead more rapidly. A genuine model is the making of the Internet Watch Foundation,
which was the main philanthropy to concentrate on managing pictures of type sexual
maltreatment. It is a model that has been duplicated the world over, and it turned out to be
unbelievably critical in driving forward the ongoing work with internet indexes, for example,
Google, to make hunting down and finding pictures of kid misuse online a whole lot increasingly
troublesome. We have worked with the Internet Watch Foundation to guarantee that network
access suppliers had the subsidizing to expand their ability, and we have worked with innovation
suppliers on the utilization of innovation that empowers pictures to be coordinated and followed,
and that makes it simpler to catch and follow culprits.
In any case, the Conservative pronouncement said that a Conservative government would
not just build up an advanced contract, to "offset opportunity with assurance for clients" yet
would likewise make an "administrative structure in law" to support this. The Labor
proclamation guaranteed to guarantee that "tech organizations are obliged to make measures" to
handle online maltreatment. The internet innovation has been expanding its significance in the
21st century. There have been increment in the utilization of internet innovation in the market.
Internet based life has been encountering bigger methodology in the market by the adolescents. It
has been focusing on both sex and sex inside youthful age of the world. In the UK, there has
been sharp increment in the utilization of online life among youthful age of both sexual
CYBER HARRASSMENT WITH FEMALES
Chapter 5: Conclusion and recommendations
5.1 Conclusion
The UK has driven the route in moving toward the issue from a viewpoint of self-control
as opposed to enactment. Self-direction works since it realizes organizations and causes us to
push ahead more rapidly. A genuine model is the making of the Internet Watch Foundation,
which was the main philanthropy to concentrate on managing pictures of type sexual
maltreatment. It is a model that has been duplicated the world over, and it turned out to be
unbelievably critical in driving forward the ongoing work with internet indexes, for example,
Google, to make hunting down and finding pictures of kid misuse online a whole lot increasingly
troublesome. We have worked with the Internet Watch Foundation to guarantee that network
access suppliers had the subsidizing to expand their ability, and we have worked with innovation
suppliers on the utilization of innovation that empowers pictures to be coordinated and followed,
and that makes it simpler to catch and follow culprits.
In any case, the Conservative pronouncement said that a Conservative government would
not just build up an advanced contract, to "offset opportunity with assurance for clients" yet
would likewise make an "administrative structure in law" to support this. The Labor
proclamation guaranteed to guarantee that "tech organizations are obliged to make measures" to
handle online maltreatment. The internet innovation has been expanding its significance in the
21st century. There have been increment in the utilization of internet innovation in the market.
Internet based life has been encountering bigger methodology in the market by the adolescents. It
has been focusing on both sex and sex inside youthful age of the world. In the UK, there has
been sharp increment in the utilization of online life among youthful age of both sexual
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
53
CYBER HARRASSMENT WITH FEMALES
orientation. However, there have been increment in the cybercrimes in the nation. Different
cybercrime exercises including private accomplices, for example, online badgering, chauvinist
loathe discourse, internet based stalking, internet based harassing, various dangers, pantomime or
non-consensual sharing of realistic substance. There has been increment in the online violations
for the ladies and young ladies over the internet based life including Facebook, Twitter, Online
dating sites and other internet based life sites. Numerous wrongdoing reports have been
accounted for in the UK in later past years. Online maltreatment has been arranged into two
kinds including verbal maltreatment and graphical maltreatment. Verbal maltreatment alludes to
chauvinist abhor discourse strengthened by converging characters/vulnerabilities, sextortion and
passing, assault and torment dangers, and realistic online maltreatment, including screenshots,
realistic dangers and vengeance pornography.
This research has been done so as to break down the effect of internet based life in digital
savagery against young ladies and juvenile females. This research will concentrate on different
elements causing digital viciousness against ladies. As, all things considered, ladies and young
ladies are focused on online on account of their sex and due to the male centric generalizations
fundamental sexual orientation imbalance. Several hackers and abusers used to blackmail some
females with nude photos and videos and create depression among them. There have been
various cases on social media due to blackmailing and cyber bullying. The use of the social
media has been going wrong both the increase in the security protocols over social media. Ladies
and young ladies are additionally targets as a result of what they do: women's activist activists
and women's activist ladies and young ladies, craftsmen, (press) sketch artists, ladies in male
ruled ventures, ladies Human Rights protectors, writers, NGO activists, administrators,
individuals from parliament, scholastics, bloggers, legal advisors, educators, leaders, and so on.
CYBER HARRASSMENT WITH FEMALES
orientation. However, there have been increment in the cybercrimes in the nation. Different
cybercrime exercises including private accomplices, for example, online badgering, chauvinist
loathe discourse, internet based stalking, internet based harassing, various dangers, pantomime or
non-consensual sharing of realistic substance. There has been increment in the online violations
for the ladies and young ladies over the internet based life including Facebook, Twitter, Online
dating sites and other internet based life sites. Numerous wrongdoing reports have been
accounted for in the UK in later past years. Online maltreatment has been arranged into two
kinds including verbal maltreatment and graphical maltreatment. Verbal maltreatment alludes to
chauvinist abhor discourse strengthened by converging characters/vulnerabilities, sextortion and
passing, assault and torment dangers, and realistic online maltreatment, including screenshots,
realistic dangers and vengeance pornography.
This research has been done so as to break down the effect of internet based life in digital
savagery against young ladies and juvenile females. This research will concentrate on different
elements causing digital viciousness against ladies. As, all things considered, ladies and young
ladies are focused on online on account of their sex and due to the male centric generalizations
fundamental sexual orientation imbalance. Several hackers and abusers used to blackmail some
females with nude photos and videos and create depression among them. There have been
various cases on social media due to blackmailing and cyber bullying. The use of the social
media has been going wrong both the increase in the security protocols over social media. Ladies
and young ladies are additionally targets as a result of what they do: women's activist activists
and women's activist ladies and young ladies, craftsmen, (press) sketch artists, ladies in male
ruled ventures, ladies Human Rights protectors, writers, NGO activists, administrators,
individuals from parliament, scholastics, bloggers, legal advisors, educators, leaders, and so on.
54
CYBER HARRASSMENT WITH FEMALES
5.2 Recommendations
The following recommendations can be applied in order be safe from cyber harassment for
females over social media:
Policy responses need to be executed so that cyber VAGW can be implemented. Various
strategies for implementing cyber VAWG need to be included as the voices of women
who have been victims in these cyber harassment cases.
In future, definition of cybercrime need to be changed and various online forms for
registering cases of cyber harassment need to be uploaded over the internet. The
marketing and awareness about these forms need to be provided to women and females.
The EU need to execute stricter cyber laws against cyber harassment cases so that this
can be minimized immediately. The EU legislation need to be strong enough to provide
strict actions against these cyber humiliating activities.
Training in cyber VAWG on gender perspective need to be implemented in the society.
This might help female victims to know about different approaches and strategies taken
by government of the UK.
Various prevention methods need to be included in the ICT sector that include adoption
of self-regulatory standards for minimizing stereotyping and degraded images of women
related to sex.
It has been important for EU legislation for providing online security to women and
females for tackling with cyber harassment and bullying cases. A strong legislative forum
need to be established by the government in order to hear voices of women on cyber
harassment and bullying.
CYBER HARRASSMENT WITH FEMALES
5.2 Recommendations
The following recommendations can be applied in order be safe from cyber harassment for
females over social media:
Policy responses need to be executed so that cyber VAGW can be implemented. Various
strategies for implementing cyber VAWG need to be included as the voices of women
who have been victims in these cyber harassment cases.
In future, definition of cybercrime need to be changed and various online forms for
registering cases of cyber harassment need to be uploaded over the internet. The
marketing and awareness about these forms need to be provided to women and females.
The EU need to execute stricter cyber laws against cyber harassment cases so that this
can be minimized immediately. The EU legislation need to be strong enough to provide
strict actions against these cyber humiliating activities.
Training in cyber VAWG on gender perspective need to be implemented in the society.
This might help female victims to know about different approaches and strategies taken
by government of the UK.
Various prevention methods need to be included in the ICT sector that include adoption
of self-regulatory standards for minimizing stereotyping and degraded images of women
related to sex.
It has been important for EU legislation for providing online security to women and
females for tackling with cyber harassment and bullying cases. A strong legislative forum
need to be established by the government in order to hear voices of women on cyber
harassment and bullying.
55
CYBER HARRASSMENT WITH FEMALES
References
Alvesson, M. and Sköldberg, K., 2017. Reflexive methodology: New vistas for qualitative
research. Sage.
Antunovic, D., 2018. “We wouldn’t say it to their faces”: online harassment, women sports
journalists, and feminism. Feminist Media Studies, pp.1-15.
Bauer, G.R., 2014. Incorporating intersectionality theory into population health research
methodology: Challenges and the potential to advance health equity. Social science &
medicine, 180, pp.10-17.
Becker, S. and Pepiak, E., 2017. Conference Report on “Online Vitriol: Advocacy, Violence, and
the Transforming Power of Social Media”. KULT_online, (51).
Behm-Morawitz, E. and Schipper, S., 2016. Sexing the avatar: Gender, sexualization, and cyber-
harassment in a virtual world. Journal of Media Psychology: Theories, Methods, and
Applications, 28(4), p.161.
Brinkmann, S., 2014. Interview. In Encyclopedia of critical psychology (pp. 1008-1010).
Springer New York.
Charmaraman, L., Chan, H.B., Chen, S., Richer, A. and Ramanudom, B., 2018. Asian American
social media use: From cyber dependence and cyber harassment to saving face. Asian American
journal of psychology, 9(1), p.72.
Choi, K.S. and Lee, J.R., 2017. Theoretical analysis of cyber-interpersonal violence
victimization and offending using cyber-routine activities theory. Computers in Human
Behavior, 73, pp.394-402.
CYBER HARRASSMENT WITH FEMALES
References
Alvesson, M. and Sköldberg, K., 2017. Reflexive methodology: New vistas for qualitative
research. Sage.
Antunovic, D., 2018. “We wouldn’t say it to their faces”: online harassment, women sports
journalists, and feminism. Feminist Media Studies, pp.1-15.
Bauer, G.R., 2014. Incorporating intersectionality theory into population health research
methodology: Challenges and the potential to advance health equity. Social science &
medicine, 180, pp.10-17.
Becker, S. and Pepiak, E., 2017. Conference Report on “Online Vitriol: Advocacy, Violence, and
the Transforming Power of Social Media”. KULT_online, (51).
Behm-Morawitz, E. and Schipper, S., 2016. Sexing the avatar: Gender, sexualization, and cyber-
harassment in a virtual world. Journal of Media Psychology: Theories, Methods, and
Applications, 28(4), p.161.
Brinkmann, S., 2014. Interview. In Encyclopedia of critical psychology (pp. 1008-1010).
Springer New York.
Charmaraman, L., Chan, H.B., Chen, S., Richer, A. and Ramanudom, B., 2018. Asian American
social media use: From cyber dependence and cyber harassment to saving face. Asian American
journal of psychology, 9(1), p.72.
Choi, K.S. and Lee, J.R., 2017. Theoretical analysis of cyber-interpersonal violence
victimization and offending using cyber-routine activities theory. Computers in Human
Behavior, 73, pp.394-402.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
56
CYBER HARRASSMENT WITH FEMALES
Choy, L.T., 2014. The strengths and weaknesses of research methodology: Comparison and
complimentary between qualitative and quantitative approaches. IOSR Journal of Humanities
and Social Science, 19(4), pp.99-104.
Dang, G. and Pheng, L.S., 2015. Research methodology. In Infrastructure Investments in
Developing Economies (pp. 135-155). Springer, Singapore.
Dörnyei, Z., 2015. Applied Linguistics. Oxford University Press.
Dumay, J. and Cai, L., 2015. Using content analysis as a research methodology for investigating
intellectual capital disclosure: a critique. Journal of Intellectual Capital, 16(1), pp.121-155.
Englander, E.K., 2016. 50.0 Sexting, Revenge Pornography, and Digital Dating Abuse: New
Research on Adolescent Digital Behaviors. Journal of the American Academy of Child &
Adolescent Psychiatry, 55(10), p.S338.
Felmlee, D. and Faris, R., 2016. Toxic ties: Networks of friendship, dating, and cyber
victimization. Social psychology quarterly, 79(3), pp.243-262.
Felmlee, D., Rodis, P.I. and Francisco, S.C., 2018. What a B! tch!: Cyber Aggression Toward
Women of Color. In Gender and the Media: Women’s Places (pp. 105-123). Emerald Publishing
Limited.
Ghazali, S. and Ghani, N.M., 2018. Perception of Female Students towards Social Media-
Related Crimes. Pertanika Journal of Social Sciences & Humanities, 26(2).
Goodey, J., 2017. Foreword for Special Issue on the FRA’s European Union–Wide Survey on
Violence Against Women. Journal of interpersonal violence, 32(12), pp.1755-1759.
CYBER HARRASSMENT WITH FEMALES
Choy, L.T., 2014. The strengths and weaknesses of research methodology: Comparison and
complimentary between qualitative and quantitative approaches. IOSR Journal of Humanities
and Social Science, 19(4), pp.99-104.
Dang, G. and Pheng, L.S., 2015. Research methodology. In Infrastructure Investments in
Developing Economies (pp. 135-155). Springer, Singapore.
Dörnyei, Z., 2015. Applied Linguistics. Oxford University Press.
Dumay, J. and Cai, L., 2015. Using content analysis as a research methodology for investigating
intellectual capital disclosure: a critique. Journal of Intellectual Capital, 16(1), pp.121-155.
Englander, E.K., 2016. 50.0 Sexting, Revenge Pornography, and Digital Dating Abuse: New
Research on Adolescent Digital Behaviors. Journal of the American Academy of Child &
Adolescent Psychiatry, 55(10), p.S338.
Felmlee, D. and Faris, R., 2016. Toxic ties: Networks of friendship, dating, and cyber
victimization. Social psychology quarterly, 79(3), pp.243-262.
Felmlee, D., Rodis, P.I. and Francisco, S.C., 2018. What a B! tch!: Cyber Aggression Toward
Women of Color. In Gender and the Media: Women’s Places (pp. 105-123). Emerald Publishing
Limited.
Ghazali, S. and Ghani, N.M., 2018. Perception of Female Students towards Social Media-
Related Crimes. Pertanika Journal of Social Sciences & Humanities, 26(2).
Goodey, J., 2017. Foreword for Special Issue on the FRA’s European Union–Wide Survey on
Violence Against Women. Journal of interpersonal violence, 32(12), pp.1755-1759.
57
CYBER HARRASSMENT WITH FEMALES
Hamm, M.P., Newton, A.S., Chisholm, A., Shulhan, J., Milne, A., Sundar, P., Ennis, H., Scott,
S.D. and Hartling, L., 2015. Prevalence and effect of cyberbullying on children and young
people: A scoping review of social media studies. JAMA pediatrics, 169(8), pp.770-777.
Hopkins, S. and Ostini, J., 2016. Addressing technology enabled violence against women and
girls in the digital age. Redress, 25(1), p.2.
Humphries, B., 2017. Re-thinking social research: anti-discriminatory approaches in research
methodology. Routledge.
Jennings, H., Slade, M., Bates, P., Munday, E. and Toney, R., 2018. Best practice framework for
Patient and Public Involvement (PPI) in collaborative data analysis of qualitative mental health
research: methodology development and refinement. BMC psychiatry, 18(1), p.213.
Jurasz, O. and Barker, K., 2017. Submission of Evidence on Online Violence Against Women to
the UN Special Rapporteur on Violence Against Women, its Causes and Consequences, Dr
Dubravka Šimonović.
Kabir, N., 2018. Cyber Crime a New Form of Violence Against Women: From the Case Study of
Bangladesh.
Ledford, J.R. and Gast, D.L., 2018. Single case research methodology: Applications in special
education and behavioral sciences. Routledge.
Lewis, S., 2015. Qualitative inquiry and research design: Choosing among five
approaches. Health promotion practice, 16(4), pp.473-475.
CYBER HARRASSMENT WITH FEMALES
Hamm, M.P., Newton, A.S., Chisholm, A., Shulhan, J., Milne, A., Sundar, P., Ennis, H., Scott,
S.D. and Hartling, L., 2015. Prevalence and effect of cyberbullying on children and young
people: A scoping review of social media studies. JAMA pediatrics, 169(8), pp.770-777.
Hopkins, S. and Ostini, J., 2016. Addressing technology enabled violence against women and
girls in the digital age. Redress, 25(1), p.2.
Humphries, B., 2017. Re-thinking social research: anti-discriminatory approaches in research
methodology. Routledge.
Jennings, H., Slade, M., Bates, P., Munday, E. and Toney, R., 2018. Best practice framework for
Patient and Public Involvement (PPI) in collaborative data analysis of qualitative mental health
research: methodology development and refinement. BMC psychiatry, 18(1), p.213.
Jurasz, O. and Barker, K., 2017. Submission of Evidence on Online Violence Against Women to
the UN Special Rapporteur on Violence Against Women, its Causes and Consequences, Dr
Dubravka Šimonović.
Kabir, N., 2018. Cyber Crime a New Form of Violence Against Women: From the Case Study of
Bangladesh.
Ledford, J.R. and Gast, D.L., 2018. Single case research methodology: Applications in special
education and behavioral sciences. Routledge.
Lewis, S., 2015. Qualitative inquiry and research design: Choosing among five
approaches. Health promotion practice, 16(4), pp.473-475.
58
CYBER HARRASSMENT WITH FEMALES
Lindsay, M., Booth, J.M., Messing, J.T. and Thaller, J., 2016. Experiences of online harassment
among emerging adults: Emotional reactions and the mediating role of fear. Journal of
interpersonal violence, 31(19), pp.3174-3195.
Litosseliti, L. ed., 2018. Research methods in linguistics. Bloomsbury Publishing.
Lushey, C.J. and Munro, E.R., 2015. Participatory peer research methodology: An effective
method for obtaining young people’s perspectives on transitions from care to
adulthood?. Qualitative Social Work, 14(4), pp.522-537.
Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and design.
Routledge.
Mackey, A. and Marsden, E. eds., 2015. Advancing methodology and practice: The IRIS
repository of instruments for research into second languages. Routledge.
Manaf, A.R.A., Ismail, F., Shanmugam, K., Yaakob, T.K.S.T. and Mokhdzar, Z.A., 2018. THE
LEVEL OF SOCIAL MEDIA INFLUENCES ON CYBER HARASSMENT AGAINST
WOMEN. International Journal, 3(18), pp.189-135.
Marganski, A. and Melander, L., 2018. Intimate partner violence victimization in the cyber and
real world: Examining the extent of cyber aggression experiences and its association with in-
person dating violence. Journal of interpersonal violence, 33(7), pp.1071-1095.
McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or mixed
methods and choice based on the research. Perfusion, 30(7), pp.537-542.
CYBER HARRASSMENT WITH FEMALES
Lindsay, M., Booth, J.M., Messing, J.T. and Thaller, J., 2016. Experiences of online harassment
among emerging adults: Emotional reactions and the mediating role of fear. Journal of
interpersonal violence, 31(19), pp.3174-3195.
Litosseliti, L. ed., 2018. Research methods in linguistics. Bloomsbury Publishing.
Lushey, C.J. and Munro, E.R., 2015. Participatory peer research methodology: An effective
method for obtaining young people’s perspectives on transitions from care to
adulthood?. Qualitative Social Work, 14(4), pp.522-537.
Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and design.
Routledge.
Mackey, A. and Marsden, E. eds., 2015. Advancing methodology and practice: The IRIS
repository of instruments for research into second languages. Routledge.
Manaf, A.R.A., Ismail, F., Shanmugam, K., Yaakob, T.K.S.T. and Mokhdzar, Z.A., 2018. THE
LEVEL OF SOCIAL MEDIA INFLUENCES ON CYBER HARASSMENT AGAINST
WOMEN. International Journal, 3(18), pp.189-135.
Marganski, A. and Melander, L., 2018. Intimate partner violence victimization in the cyber and
real world: Examining the extent of cyber aggression experiences and its association with in-
person dating violence. Journal of interpersonal violence, 33(7), pp.1071-1095.
McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or mixed
methods and choice based on the research. Perfusion, 30(7), pp.537-542.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
59
CYBER HARRASSMENT WITH FEMALES
Mishna, F., Regehr, C., Lacombe-Duncan, A., Daciuk, J., Fearing, G. and Van Wert, M., 2018.
Social media, cyber-aggression and student mental health on a university campus. Journal of
mental health, 27(3), pp.222-229.
Mishna, F., Schwan, K.J., Birze, A., Van Wert, M., Lacombe-Duncan, A., McInroy, L. and
Attar-Schwartz, S., 2018. Gendered and sexualized bullying and cyber bullying: spotlighting
girls and making boys invisible. Youth & Society, p.0044188X18757150.
Moafa, F.A., Ahmad, K., Al-Rahmi, W.M., Yahaya, N., Kamin, Y.B. and Alamri, M.M., 2018.
Cyber harassment prevention through user behavior analysis online in kingdom of saudi arabia
(KSA). Journal of Theoretical & Applied Information Technology, 96(6).
Mohanty, J.R. and Samantaray, S., 2016. Cyber Feminism: Unleashing Women Power through
Technology.
Navarro, J.N., Clevenger, S., Beasley, M.E. and Jackson, L.K., 2017. One step forward, two
steps back: Cyberbullying within social networking sites. Security Journal, 30(3), pp.844-858.
Nova, F.F., Rifat, M.D., Saha, P., Ahmed, S.I. and Guha, S., 2019, January. Online sexual
harassment over anonymous social media in Bangladesh. In Proceedings of the Tenth
International Conference on Information and Communication Technologies and Development (p.
1). ACM.
Nova, F.F., Rifat, M.R., Saha, P., Ahmed, S.I. and Guha, S., 2018, October. Silenced Voices:
Understanding Sexual Harassment on Anonymous Social Media Among Bangladeshi People.
In Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and
Social Computing(pp. 209-212). ACM.
CYBER HARRASSMENT WITH FEMALES
Mishna, F., Regehr, C., Lacombe-Duncan, A., Daciuk, J., Fearing, G. and Van Wert, M., 2018.
Social media, cyber-aggression and student mental health on a university campus. Journal of
mental health, 27(3), pp.222-229.
Mishna, F., Schwan, K.J., Birze, A., Van Wert, M., Lacombe-Duncan, A., McInroy, L. and
Attar-Schwartz, S., 2018. Gendered and sexualized bullying and cyber bullying: spotlighting
girls and making boys invisible. Youth & Society, p.0044188X18757150.
Moafa, F.A., Ahmad, K., Al-Rahmi, W.M., Yahaya, N., Kamin, Y.B. and Alamri, M.M., 2018.
Cyber harassment prevention through user behavior analysis online in kingdom of saudi arabia
(KSA). Journal of Theoretical & Applied Information Technology, 96(6).
Mohanty, J.R. and Samantaray, S., 2016. Cyber Feminism: Unleashing Women Power through
Technology.
Navarro, J.N., Clevenger, S., Beasley, M.E. and Jackson, L.K., 2017. One step forward, two
steps back: Cyberbullying within social networking sites. Security Journal, 30(3), pp.844-858.
Nova, F.F., Rifat, M.D., Saha, P., Ahmed, S.I. and Guha, S., 2019, January. Online sexual
harassment over anonymous social media in Bangladesh. In Proceedings of the Tenth
International Conference on Information and Communication Technologies and Development (p.
1). ACM.
Nova, F.F., Rifat, M.R., Saha, P., Ahmed, S.I. and Guha, S., 2018, October. Silenced Voices:
Understanding Sexual Harassment on Anonymous Social Media Among Bangladeshi People.
In Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and
Social Computing(pp. 209-212). ACM.
60
CYBER HARRASSMENT WITH FEMALES
Panneerselvam, R., 2014. Research methodology. PHI Learning Pvt. Ltd..
Papp, L.J., Erchull, M.J., Liss, M., Waaland-Kreutzer, L. and Godfrey, H., 2017. Slut-shaming
on Facebook: Do Social Class or Clothing Affect Perceived Acceptability?. Gender
Issues, 34(3), pp.240-257.
Pashang, S., Clarke, J., Khanlou, N. and Degendorfer, K., 2018. Redefining Cyber Sexual
Violence Against Emerging Young Women: Toward Conceptual Clarity. In Today’s Youth and
Mental Health (pp. 77-97). Springer, Cham.
Pereira, F., Spitzberg, B.H. and Matos, M., 2016. Cyber-harassment victimization in Portugal:
Prevalence, fear and help-seeking among adolescents. Computers in Human Behavior, 62,
pp.136-146.
Quinlan, C., Babin, B., Carr, J. and Griffin, M., 2019. Business research methods. South Western
Cengage.
Rani, N., Yadav, S.S. and Jain, P.K., 2016. Research Methodology. Mergers and Acquisitions,
pp.18-35.
Selkie, E.M., Kota, R., Chan, Y.F. and Moreno, M., 2015. Cyberbullying, depression, and
problem alcohol use in female college students: a multisite study. Cyberpsychology, Behavior,
and Social Networking, 18(2), pp.79-86.
Sethi, D. and Ghatak, S., 2018. Mitigating Cyber Sexual Harassment: An Insight from
India. Asian Themes in Social Sciences Research, 1(2), pp.34-43.
Silverman, D. ed., 2016. Qualitative research. Sage.
Smith, J.A. ed., 2015. Qualitative psychology: A practical guide to research methods. Sage.
CYBER HARRASSMENT WITH FEMALES
Panneerselvam, R., 2014. Research methodology. PHI Learning Pvt. Ltd..
Papp, L.J., Erchull, M.J., Liss, M., Waaland-Kreutzer, L. and Godfrey, H., 2017. Slut-shaming
on Facebook: Do Social Class or Clothing Affect Perceived Acceptability?. Gender
Issues, 34(3), pp.240-257.
Pashang, S., Clarke, J., Khanlou, N. and Degendorfer, K., 2018. Redefining Cyber Sexual
Violence Against Emerging Young Women: Toward Conceptual Clarity. In Today’s Youth and
Mental Health (pp. 77-97). Springer, Cham.
Pereira, F., Spitzberg, B.H. and Matos, M., 2016. Cyber-harassment victimization in Portugal:
Prevalence, fear and help-seeking among adolescents. Computers in Human Behavior, 62,
pp.136-146.
Quinlan, C., Babin, B., Carr, J. and Griffin, M., 2019. Business research methods. South Western
Cengage.
Rani, N., Yadav, S.S. and Jain, P.K., 2016. Research Methodology. Mergers and Acquisitions,
pp.18-35.
Selkie, E.M., Kota, R., Chan, Y.F. and Moreno, M., 2015. Cyberbullying, depression, and
problem alcohol use in female college students: a multisite study. Cyberpsychology, Behavior,
and Social Networking, 18(2), pp.79-86.
Sethi, D. and Ghatak, S., 2018. Mitigating Cyber Sexual Harassment: An Insight from
India. Asian Themes in Social Sciences Research, 1(2), pp.34-43.
Silverman, D. ed., 2016. Qualitative research. Sage.
Smith, J.A. ed., 2015. Qualitative psychology: A practical guide to research methods. Sage.
61
CYBER HARRASSMENT WITH FEMALES
Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A
guidebook and resource. John Wiley & Sons.
Vaioleti, T.M., 2016. Talanoa research methodology: A developing position on Pacific
research. Waikato Journal of Education, 12(1).
Van Royen, K., Poels, K. and Vandebosch, H., 2016. Help, I am losing control! Examining the
reporting of sexual harassment by adolescents to social networking sites. Cyberpsychology,
Behavior, and Social Networking, 19(1), pp.16-22.
Van Royen, K., Poels, K., Vandebosch, H. and Adam, P., 2017. “Thinking before posting?”
Reducing cyber harassment on social networking sites through a reflective message. Computers
in Human Behavior, 66, pp.345-352.
Vitak, J., Chadha, K., Steiner, L. and Ashktorab, Z., 2017, February. Identifying Women's
Experiences With and Strategies for Mitigating Negative Effects of Online Harassment.
In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and
Social Computing(pp. 1231-1245). ACM.
Vitis, L. and Gilmour, F., 2017. Dick pics on blast: A woman’s resistance to online sexual
harassment using humour, art and Instagram. Crime, Media, Culture, 13(3), pp.335-355.
Walliman, N., 2017. Research methods: The basics. Routledge.
Wick, S.E., Nagoshi, C., Basham, R., Jordan, C., Kim, Y.K., Nguyen, A.P. and Lehmann, P.,
2017. Patterns of Cyber Harassment and Perpetration among College Students in the United
States: A Test of Routine Activities Theory. International Journal of Cyber Criminology, 18(1).
CYBER HARRASSMENT WITH FEMALES
Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A
guidebook and resource. John Wiley & Sons.
Vaioleti, T.M., 2016. Talanoa research methodology: A developing position on Pacific
research. Waikato Journal of Education, 12(1).
Van Royen, K., Poels, K. and Vandebosch, H., 2016. Help, I am losing control! Examining the
reporting of sexual harassment by adolescents to social networking sites. Cyberpsychology,
Behavior, and Social Networking, 19(1), pp.16-22.
Van Royen, K., Poels, K., Vandebosch, H. and Adam, P., 2017. “Thinking before posting?”
Reducing cyber harassment on social networking sites through a reflective message. Computers
in Human Behavior, 66, pp.345-352.
Vitak, J., Chadha, K., Steiner, L. and Ashktorab, Z., 2017, February. Identifying Women's
Experiences With and Strategies for Mitigating Negative Effects of Online Harassment.
In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and
Social Computing(pp. 1231-1245). ACM.
Vitis, L. and Gilmour, F., 2017. Dick pics on blast: A woman’s resistance to online sexual
harassment using humour, art and Instagram. Crime, Media, Culture, 13(3), pp.335-355.
Walliman, N., 2017. Research methods: The basics. Routledge.
Wick, S.E., Nagoshi, C., Basham, R., Jordan, C., Kim, Y.K., Nguyen, A.P. and Lehmann, P.,
2017. Patterns of Cyber Harassment and Perpetration among College Students in the United
States: A Test of Routine Activities Theory. International Journal of Cyber Criminology, 18(1).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
62
CYBER HARRASSMENT WITH FEMALES
Wiek, A. and Lang, D.J., 2016. Transformational sustainability research methodology.
In Sustainability Science (pp. 31-41). Springer, Dordrecht.
Wildemuth, B.M. ed., 2016. Applications of social research methods to questions in information
and library science. ABC-CLIO.
Winkelman, S.B., Early, J.O., Walker, A.D., Chu, L. and Yick-Flanagan, A., 2015. Exploring
Cyber Harrassment among Women Who Use Social Media. Universal journal of public
health, 3(5), pp.194-201.
CYBER HARRASSMENT WITH FEMALES
Wiek, A. and Lang, D.J., 2016. Transformational sustainability research methodology.
In Sustainability Science (pp. 31-41). Springer, Dordrecht.
Wildemuth, B.M. ed., 2016. Applications of social research methods to questions in information
and library science. ABC-CLIO.
Winkelman, S.B., Early, J.O., Walker, A.D., Chu, L. and Yick-Flanagan, A., 2015. Exploring
Cyber Harrassment among Women Who Use Social Media. Universal journal of public
health, 3(5), pp.194-201.
1 out of 62
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.