Cyberbullying and its Impact
VerifiedAdded on 2020/02/19
|9
|2139
|45
AI Summary
This assignment delves into the multifaceted problem of cyberbullying. It requires a comprehensive understanding of various approaches used to address this issue, an analysis of the potential consequences for individuals and society, and the exploration of effective intervention strategies. The text draws upon research from sociologists, psychologists, and educators to provide a nuanced perspective on cyberbullying in the digital age.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
[1]
How Research is Conducted
By
[Student’s name]
Course
Institution
Date
How Research is Conducted
By
[Student’s name]
Course
Institution
Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
[2]
Purpose and Scope
Introduction
A research is an orderly exploration into and study of tackles and foundations to inaugurate facts
which help in coming up with certain conclusions. Cyberbullying is described as using know-
hows of information and statement to cause deliberate, hostile and recurrent conduct by a group
or an individual, with the aim to cause trouble or of harm other people. Cyberbullying is
concerned with bothering, threatening or harassing someone through the use of the electronic
media and tools such as Facebook, Twitter, and Gmail among others (BETTS 2016, p. 89). This
research features threatening which among other cyberbullying practices includes the writer
sounding like he or she is emotionally disturbed and may end up harming someone else or
committing suicide.
Purpose of the Review
A topic needs to be thoroughly researched and identifying the gaps that have not been filled by
the previous researchers. This gives way into designing experiments, performing them, gathering
information and then submitting them for publication.
Conclusion
In order to come up with a good research about how cyber bullying is conducted and the effects,
it has on the victims certain basic steps are necessary. Several steps needs to get followed in
order to identify a problem and come up with control and corrective actions to solve the cyber
bullying problems.
Purpose and Scope
Introduction
A research is an orderly exploration into and study of tackles and foundations to inaugurate facts
which help in coming up with certain conclusions. Cyberbullying is described as using know-
hows of information and statement to cause deliberate, hostile and recurrent conduct by a group
or an individual, with the aim to cause trouble or of harm other people. Cyberbullying is
concerned with bothering, threatening or harassing someone through the use of the electronic
media and tools such as Facebook, Twitter, and Gmail among others (BETTS 2016, p. 89). This
research features threatening which among other cyberbullying practices includes the writer
sounding like he or she is emotionally disturbed and may end up harming someone else or
committing suicide.
Purpose of the Review
A topic needs to be thoroughly researched and identifying the gaps that have not been filled by
the previous researchers. This gives way into designing experiments, performing them, gathering
information and then submitting them for publication.
Conclusion
In order to come up with a good research about how cyber bullying is conducted and the effects,
it has on the victims certain basic steps are necessary. Several steps needs to get followed in
order to identify a problem and come up with control and corrective actions to solve the cyber
bullying problems.
[3]
Discussion
Description of Methods
In most countries, cyber bullying is treated as serious offense as it causes a victim to feel overly
self-conscious and scanty and in some cases, the chances of committing suicide become very
high, and it targets mostly the teenagers. The Pew Internet conducted a cyberbullying study in
2010 which found out that two out of five youths have experienced online harassment. It also
found out that some forms of cyber bullying included publicizing one’s information through the
use of text messages, e-mails and pictures and also sexual harassment (Ferris 2016, 90). This
necessitated a research to be carried out on the cyber bullying and how it can be sorted out to
save the victims and the internet users at large. For the studies of cyber bullying to be effective
there is a need to identify the main elements in cyberbullying to obtain a uniform progress in the
studies. Various methodologies were used which included online surveys, logical search, and
analysis of secondary data. The methods were designed to capitalize on the experiences of the
relevant groups and maximise the victims reach and engagement. One of the methods used to
obtain information includes the survey methodology which involves the sampling of individuals
from a given population and the data collection techniques. The benefit of using sampling is that
this would enhance time-saving and reduce any costs associated with doing the research. The
research will sample 700 Japan based youths who use social media platforms.
A sample of 700 youths from the Japan was used to participate in an online survey by responding
to some questionnaires. According to Boyd (2014, p. 54). A focus group of 12 years to 20 years
old youngsters was used to carry out the research about their use of communication technology
and experiences on cyber bullying since most of them have access to the internet. The
Discussion
Description of Methods
In most countries, cyber bullying is treated as serious offense as it causes a victim to feel overly
self-conscious and scanty and in some cases, the chances of committing suicide become very
high, and it targets mostly the teenagers. The Pew Internet conducted a cyberbullying study in
2010 which found out that two out of five youths have experienced online harassment. It also
found out that some forms of cyber bullying included publicizing one’s information through the
use of text messages, e-mails and pictures and also sexual harassment (Ferris 2016, 90). This
necessitated a research to be carried out on the cyber bullying and how it can be sorted out to
save the victims and the internet users at large. For the studies of cyber bullying to be effective
there is a need to identify the main elements in cyberbullying to obtain a uniform progress in the
studies. Various methodologies were used which included online surveys, logical search, and
analysis of secondary data. The methods were designed to capitalize on the experiences of the
relevant groups and maximise the victims reach and engagement. One of the methods used to
obtain information includes the survey methodology which involves the sampling of individuals
from a given population and the data collection techniques. The benefit of using sampling is that
this would enhance time-saving and reduce any costs associated with doing the research. The
research will sample 700 Japan based youths who use social media platforms.
A sample of 700 youths from the Japan was used to participate in an online survey by responding
to some questionnaires. According to Boyd (2014, p. 54). A focus group of 12 years to 20 years
old youngsters was used to carry out the research about their use of communication technology
and experiences on cyber bullying since most of them have access to the internet. The
[4]
respondents were invited to participate in the survey using emails which were password-
protected to enhance privacy. Some of them were enlisted or contacted directly and the
interviews conducted would take about 15 minutes in length and were carried out for a duration
of about three weeks running from 5 March to 24 March 2015. Some demographic parameters
including the region, gender, race, age, internet use and education were used to represent a
nationally online sample. The report showed that more boys than girls were involved in
cyberbullying. It also indicated that the cyber bullies normally believe that they are unidentified
hence strange to the victim who gives them the confidence to utter more hurtful things than they
would have done if they were to meet face to face with the victim.
Comparison of Methods
One advantage of the survey through the interview is that it was possible to offer freedom of
asking and having follow-up questions to have a basis of exploring the answers provided by the
respondents. However, the results obtained from this sample were prone to some errors hence
were subject to a sampling fringe of error of + or – 2.98 percentage points based on a 96 percent
level of confidence. The method could also not produce a 100 percent accurate results since not
all the invited youths responded to the survey and it was an expensive exercise regarding time-
consuming and the costs involved in reproducing the survey questionnaires.
Critical Analysis of Methods
A logical search was also carried out for cyberbullying measurement policies which were
published between 1990 and 2016. This kind of methodology ensures that the search cuts off
various unrelated documents or information which has no use in the research process. Firstly,
some key terms were excavated from a literature review which included terms such as violent,
respondents were invited to participate in the survey using emails which were password-
protected to enhance privacy. Some of them were enlisted or contacted directly and the
interviews conducted would take about 15 minutes in length and were carried out for a duration
of about three weeks running from 5 March to 24 March 2015. Some demographic parameters
including the region, gender, race, age, internet use and education were used to represent a
nationally online sample. The report showed that more boys than girls were involved in
cyberbullying. It also indicated that the cyber bullies normally believe that they are unidentified
hence strange to the victim who gives them the confidence to utter more hurtful things than they
would have done if they were to meet face to face with the victim.
Comparison of Methods
One advantage of the survey through the interview is that it was possible to offer freedom of
asking and having follow-up questions to have a basis of exploring the answers provided by the
respondents. However, the results obtained from this sample were prone to some errors hence
were subject to a sampling fringe of error of + or – 2.98 percentage points based on a 96 percent
level of confidence. The method could also not produce a 100 percent accurate results since not
all the invited youths responded to the survey and it was an expensive exercise regarding time-
consuming and the costs involved in reproducing the survey questionnaires.
Critical Analysis of Methods
A logical search was also carried out for cyberbullying measurement policies which were
published between 1990 and 2016. This kind of methodology ensures that the search cuts off
various unrelated documents or information which has no use in the research process. Firstly,
some key terms were excavated from a literature review which included terms such as violent,
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
[5]
bully, victim, aggress and harasses. These search terms were used together simultaneously to
narrow down the results of the research process. For instance, the terms victimization and
bullying were used simultaneously in salvaging the relevant publication required for evidence.
These terms were used to perform a search of several electronic databases including MedLine,
ERIC, PsychInfo and the Behavioural Sciences. The information of the relevant articles was then
screened for annexation entitlement. When there was enough evidence that a certain publication
was suitable for consideration, it would then be retrieved, the full publication was reread, and the
measure was gotten by contacting the copyright owners in case it was not available in the
publication. A data extraction form was developed to obtain all the information required to
complete the review which included 40 questions with various information. The form had three
publication items which included the year of publication and the type of writing whether a report
or a journal. The legitimacy and the consistency of each type of measure were recorded for
psychometric data. The data captured was accurate to every measurement strategy such as the
author-reported bullying mechanism present in the measure. The reporter for each strategy was
also noted, the time frame assessed, the type of the response options and whether the
measurement strategy had the term "bullying" and how the measure scored. The members of the
study team coded the same publication for coding the publications. This followed a thorough
analysis to attain a high level of agreement across the coding form questions and the coders. The
coders also met so as to discuss and solve any discrepancies. If there were any differences noted
by various coding team members, the other team members would be consulted to help coming up
with proper recommendations (Gasser 2010, 78). The method was quite accurate as it was less
prone to errors since computer expertise and the time spent online were certainly related to both
offending and cyber bullying victimization. However, it had some limitations such as the
bully, victim, aggress and harasses. These search terms were used together simultaneously to
narrow down the results of the research process. For instance, the terms victimization and
bullying were used simultaneously in salvaging the relevant publication required for evidence.
These terms were used to perform a search of several electronic databases including MedLine,
ERIC, PsychInfo and the Behavioural Sciences. The information of the relevant articles was then
screened for annexation entitlement. When there was enough evidence that a certain publication
was suitable for consideration, it would then be retrieved, the full publication was reread, and the
measure was gotten by contacting the copyright owners in case it was not available in the
publication. A data extraction form was developed to obtain all the information required to
complete the review which included 40 questions with various information. The form had three
publication items which included the year of publication and the type of writing whether a report
or a journal. The legitimacy and the consistency of each type of measure were recorded for
psychometric data. The data captured was accurate to every measurement strategy such as the
author-reported bullying mechanism present in the measure. The reporter for each strategy was
also noted, the time frame assessed, the type of the response options and whether the
measurement strategy had the term "bullying" and how the measure scored. The members of the
study team coded the same publication for coding the publications. This followed a thorough
analysis to attain a high level of agreement across the coding form questions and the coders. The
coders also met so as to discuss and solve any discrepancies. If there were any differences noted
by various coding team members, the other team members would be consulted to help coming up
with proper recommendations (Gasser 2010, 78). The method was quite accurate as it was less
prone to errors since computer expertise and the time spent online were certainly related to both
offending and cyber bullying victimization. However, it had some limitations such as the
[6]
differences in the definition of bullying and the measures taken to curb such. The race and
gender did not suggestively differentiate the offending and respondent victimization. As per this
research, offending victimization does not depend gender nor does it depend on people’s race, it
cuts across all boarders. The respondents suggested that there is need to educate people on the
importance of respect while interacting in the social media as well as understanding the concept
of empathy in their actions.
Differences in Viewpoints in Relation to Methods
Research by Bauman, (2010, p. 21)indicated that most of the cyber bullying victims do not report
the cases to the relevant authorities as they tend to think that the case will just be ignored or pass
through many procedures such that one will eventually give up. Some cyberbullying victims
normally experience low self-esteem and stress. Other victims of cyberbullying include the high
school students who ignore reporting the case in fear that they may lose friends or they may be
seen as being too mouthy. Other fear that the privilege of having to use the internet will be
withdrawn if they report to the teachers or parents. This has given room for the crime to grow
roots rapidly despite being a new type of internet crime which has cropped up in the recent years.
Cyber bullying affects people psychologically and even goes to the extent of tarnishing their
reputation in public. Mostly, cyber bullying is experienced by the social media users mainly by
the people whose intention is to harm, hurt, or interfere with other people’s publicity. For
instance, most youths have been affected by the use of Facebook and use this platform to insult
other by personal grudges and issues.
Based on the findings, the cyber bullying victims identify and cope with it in different ways
which may make them be affected in one way or the other. Cyber bullying affects the affected
differences in the definition of bullying and the measures taken to curb such. The race and
gender did not suggestively differentiate the offending and respondent victimization. As per this
research, offending victimization does not depend gender nor does it depend on people’s race, it
cuts across all boarders. The respondents suggested that there is need to educate people on the
importance of respect while interacting in the social media as well as understanding the concept
of empathy in their actions.
Differences in Viewpoints in Relation to Methods
Research by Bauman, (2010, p. 21)indicated that most of the cyber bullying victims do not report
the cases to the relevant authorities as they tend to think that the case will just be ignored or pass
through many procedures such that one will eventually give up. Some cyberbullying victims
normally experience low self-esteem and stress. Other victims of cyberbullying include the high
school students who ignore reporting the case in fear that they may lose friends or they may be
seen as being too mouthy. Other fear that the privilege of having to use the internet will be
withdrawn if they report to the teachers or parents. This has given room for the crime to grow
roots rapidly despite being a new type of internet crime which has cropped up in the recent years.
Cyber bullying affects people psychologically and even goes to the extent of tarnishing their
reputation in public. Mostly, cyber bullying is experienced by the social media users mainly by
the people whose intention is to harm, hurt, or interfere with other people’s publicity. For
instance, most youths have been affected by the use of Facebook and use this platform to insult
other by personal grudges and issues.
Based on the findings, the cyber bullying victims identify and cope with it in different ways
which may make them be affected in one way or the other. Cyber bullying affects the affected
[7]
people psychologically, emotionally, and socially leaving them to feel empty clothed in the
context of the public domain. While some victims may report the matter to the relevant
authorities, others choose to seek help from their peers and sort it out personally which may not
always be a good option. Thus, it is vital to focus on linking cyber bullying with the
psychosocial backgrounds of the victims together with other circumstantial variables which
impact the victims. There is need to properly monitor the use of Facebook and instill control
procedures and laws that govern against cyber bullying. Therefore, further research is necessary
to ensure the success and effectiveness of the various managing approaches and also to come up
with proper means to curb the crime.
people psychologically, emotionally, and socially leaving them to feel empty clothed in the
context of the public domain. While some victims may report the matter to the relevant
authorities, others choose to seek help from their peers and sort it out personally which may not
always be a good option. Thus, it is vital to focus on linking cyber bullying with the
psychosocial backgrounds of the victims together with other circumstantial variables which
impact the victims. There is need to properly monitor the use of Facebook and instill control
procedures and laws that govern against cyber bullying. Therefore, further research is necessary
to ensure the success and effectiveness of the various managing approaches and also to come up
with proper means to curb the crime.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
[8]
Bibliography
Bauman, S. 2010. Cyberbullying: what counselors need to know. Alexandria, VA, American
Counseling Association.
Betts, L. R. 2016. Cyberbullying: Approaches, Consequences, and Interventions.
http://public.eblib.com/choice/publicfullrecord.aspx?p=4719821.
Boyd, D. 2014. It's complicated: the social lives of networked teens.
Emerson, R. M., Fretz, R. I., and Shaw, L. L. 2011. Writing ethnographic fieldnotes.
http://public.eblib.com/choice/publicfullrecord.aspx?p=3563012.
Ferris, K. 2016. REAL WORLD: an introduction to sociology. [S.l.], W W NORTON.
Gasser, U. 2010. Born Digital: Understanding the First Generation of Digital Natives.
Perseus Books LLC. http://www.myilibrary.com?id=264345
Giant, N. 2013. E-safety for the i-generation: combating the misuse and abuse of technology
in schools. London, Jessica Kingsley Publishers.
Information Resources Management Association. 2016. Violence and
society: breakthroughs in research and practice. Hershey, Information Science
Reference.http://search.ebscohost.com/login.aspx?
direct=true&scope=site&db=nlebk&db=nlabk&AN=1410023.
Nair, P. K. R., and Nair, V. D. 2014. Scientific writing and communication in agriculture and
natural resources. http://public.eblib.com/choice/publicfullrecord.aspx?p=1636495.
Noor Al-Deen, H. S., and Hendricks, J. A. 2012. Social media: usage and impact.
Lanham, Md, Lexington Books.
Rivara, F., and Le Menestrel, S. 2016. Preventing bullying through science, policy, and
practice.
Bibliography
Bauman, S. 2010. Cyberbullying: what counselors need to know. Alexandria, VA, American
Counseling Association.
Betts, L. R. 2016. Cyberbullying: Approaches, Consequences, and Interventions.
http://public.eblib.com/choice/publicfullrecord.aspx?p=4719821.
Boyd, D. 2014. It's complicated: the social lives of networked teens.
Emerson, R. M., Fretz, R. I., and Shaw, L. L. 2011. Writing ethnographic fieldnotes.
http://public.eblib.com/choice/publicfullrecord.aspx?p=3563012.
Ferris, K. 2016. REAL WORLD: an introduction to sociology. [S.l.], W W NORTON.
Gasser, U. 2010. Born Digital: Understanding the First Generation of Digital Natives.
Perseus Books LLC. http://www.myilibrary.com?id=264345
Giant, N. 2013. E-safety for the i-generation: combating the misuse and abuse of technology
in schools. London, Jessica Kingsley Publishers.
Information Resources Management Association. 2016. Violence and
society: breakthroughs in research and practice. Hershey, Information Science
Reference.http://search.ebscohost.com/login.aspx?
direct=true&scope=site&db=nlebk&db=nlabk&AN=1410023.
Nair, P. K. R., and Nair, V. D. 2014. Scientific writing and communication in agriculture and
natural resources. http://public.eblib.com/choice/publicfullrecord.aspx?p=1636495.
Noor Al-Deen, H. S., and Hendricks, J. A. 2012. Social media: usage and impact.
Lanham, Md, Lexington Books.
Rivara, F., and Le Menestrel, S. 2016. Preventing bullying through science, policy, and
practice.
[9]
Walker, S. 2012. Effective social work with children, young people, and families: putting
systems theory into practice. London, SAGE.
Walker, S. 2012. Effective social work with children, young people, and families: putting
systems theory into practice. London, SAGE.
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.