Research about cyberbullying PDF

Title Research about cyberbullying
Course Senior High School STEM
Institution Polytechnic University of the Philippines
Pages 31
File Size 1.1 MB
File Type PDF
Total Downloads 30
Total Views 106

Summary

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES CHAPTER 1 THE PROBLEM AND ITS BACKGROUND I. INTRODUCTION Bullying is unwanted, aggressive behavior among school aged children that involves a real or perceived power imbalance. The behavior is repeated, or has the potential to be repeated, over time. Bullyin...


Description

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES CHAPTER 1

THE PROBLEM AND ITS BACKGROUND I. INTRODUCTION Bullying is unwanted, aggressive behavior among school aged children that involves a real or perceived power imbalance. The behavior is repeated, or has the potential to be repeated, over time. Bullying includes actions such as making threats, spreading rumors, attacking someone physically or verbally, and excluding someone from a group on purpose. Cyber bullying is different from traditional bullying due to the anonymity that the Internet can provide. Cyber bullies do not have to own their actions due to the anonymity and cyber bullying is often outside of the legal reach of schools and school boards since it often happens outside of the school. The purpose of this paper is to further understand cyber bullying which continues to occur more often as technology becomes more readily accessible by everyone, especially students and to explore ways of preventing cyber bullying before it happens.

II. BACKGROUND OF THE STUDY As the days, years and generations pass by, the world of social media is growing bigger and bigger. It becomes more advanced than ever and a lot of people want it to improve and they think that it would be better if it continues to develop more than the usual thing that we have nowadays. As it continues to grow, people have the advantages

1

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES it has been helpful to them in many aspects like connecting to other people easily by chatting them or posting something that makes them feel like they're just close to where you are. But opposite of the advantages that they have, they also have the disadvantages of using social media like they experience cyber bullying which can affect them emotionally. This cyber bullying is also growing which is resulting to more incidents of it. Many people already experienced cyber bullying, not only the known personalities like the government officials and celebrities but also an ordinary individual may experience it. Cyber bullying causes the victim to be hurt emotionally. According to ETCB or End to Cyber Bullying Organization, there are five different forms of cyber bullying. First is the harassment, it includes the bully sending offensive and malicious messages to an individual. Cyber stalking is form of harassment that includes sending rude and threatening messages that can lead to a physical harassment. The second is flaming which is somewhat similar to harassment but the difference is it often direct harsh languages to a specific person. The third is exclusion, I think many people already experience this because it's something that is common thing that people do sometimes. The exclusion is like you're in a group chat and then they blocked you and kicked you out of the chat and after that they will talk badly of you, that is what we called exclusion. The fourth is outing, that is when the bully posts something about an individual but the individual doesn’t know about that. The last one is what we called masquerading which includes the bully to fake his identity. The bully impersonates his chosen individual and harasses someone anonymously. In other words, cyber bullying looks like it's easy to do and it's really not an issue but no, all of this creates mess and hurts an individual emotionally that's why we decided to do a research with this topic to

2

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES know what are the different ways to prevent cyber bullying to cause more problems in our own places.

III. THEORETICAL FRAMEWORK Social-ecological Theory Espelage and Swearer (2004) and Cowie and Jennifer (2008) favor an ecological model for understanding bullying behaviors, similar to the one used by Bronfenbrenner, a developmental psychologist, as a way of examining bullying and cyberbullying behaviors. “This framework views youth behavior as shaped by individual characteristics and a range of nested contextual systems of schools, adults, neighborhoods, and society” (Swearer et al., p. 42, 2010). This model places the individual at the Centre and society as the overarching feature surrounding it. The reciprocal model endeavors to clarify how young people situate themselves and behave within the society to which they belong. It was developed to help understand the interactions between personal and environmental factors. As Swearer and Doll (2001) explain: Bronfenbrenner (1977) describes this eco-system with his classic diagram resembling a target, with the child at the center and concentric, reciprocal circles representing contexts from those closest to the child (family) to those furthest away (community) (p. 10). In conclusion, socio-ecological theory is an intricate system of interplaying facets. This allows for an understanding of the causes of social exclusion through the interaction of the different levels or risk factors that make up the foundation of the model. While this model may have its uses in gaining an understanding of social exclu-

3

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES sion, it has only been used in one empirical study. In a study by Festl and Quandt (2013), the socio-ecological approach was used to explain and explore the socio-demographics (the groups and classes) of the schools involved. Results showed that boys tended to be perpetrators and girls and younger students tended to be victims. IV. CONCEPTUAL FRAMEWORK

TECHNOLOGY

CELLPHONE

INTERNET

CYBERB CYBERBULL ULL ULLYING YING

CAUSE

EFFECTS

PREVENTION

This model represents the flow or the whole concept of this research, The effects and prevention of cyber bullying of grade 11 students in Institute of Technology.

4

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES V. STATEMENT OF THE PROBLEM Bullying is can be done at any forms. It may be physically or verbally. But there's one form of bullying that can affect one particular person even though it's not through a physical or verbal contact, it is cyber bullying. This is a major problem that occurs in social media and many individuals have already experienced this. This is why we, the researchers would like to find the answer to prevent the growing incidents of cyber bullying. These are the following questions that we would like to be answered by studying and creating this thesis: 1. What are the causes of cyberbullying? 2. What are the effects of cyberbullying? 3. How can we prevent this type of bullying? VI. HYPOTHESIS The research, “The Effects and Prevention of Cyber bullying of Grade 11 students in Institute of Technology” is about cyber bullying. Cyber bullying which causes many people to be depressed, anti-social and worst is to harm theirselves is a huge problem ever since social media has made. Being a part of social networking community has been a part of our daily lives in which we can do whatever we want to do and say whatever we want to do. Social media is a platform in which we can freely show or post what is in our minds therefore many people had posted many things about themselves or other people. This is why it has a advantages and disadvanteges. The advantage is you can post whatever you want and the disadvantage is you can post whatever you want. It's the same but the difference is the latter has more effects on people. Why do people say such nasty stuff to other people? Besides, why do they want

5

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES to do it even though they know that they'll gonna hurt a person's feelings? and an addition to that, cyber bullies tend to hide their own identity behind other names and faces and that's the reason why they are more confident to do it on social networking site rather than in person because nobody will know who they are and what they're really up to. In doing this research, we will be able to know the effects of cyber bullying to the victims and know how to prevent this type of bullying. VII. SCOPE AND LIMITATIONS This research intends to give possible answers to the following problems of cyber bullying. The researchers have found that some of the students in their school had already experienced it so that they tend to know what are the possible ways to prevent the growth of cyber bullying occurring in their school, the following questions will be answered by some of the chosen Senior High School students in Polytechnic University of the Philippines to know what are their opinions or reactions on this matter and the possible result of the answers of the following problems that concerns the topic.

VIII. SIGNIFICANCE OF THE STUDY The study on “The effects and prevention of Cyber bullying of Senior High School students in Polytechnic University of the Philippines” may be significant and beneficial to the following: 1. Students – With the help of this study, they may help their ability of their mind as they are luckier than those who are bullied and they will be able know what are the effects of this type of bullying.

6

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES 2. Parents – With the use of this study, parents will be able to know that they should have a sense of dedication and responsibility as mentor and model to their children. And with this study, they will know how to handle their children who is struggling in depression because of bullying.

IX. DEFINITION OF TERMS There are some terms that need to be defined in this study for clarity and further understanding and these are the following: 

Bullying - is the use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others.



Bully - a person who uses strength or power to harm or intimidate those who are weaker.



Victim – the so called “bullied” the one who is weak.



Cyber bullying - Involves the use of information and communication technologies such as e-mail, cell phone and pager text messages, instant messaging, defamatory personal Web sites, and defamatory online personal polling Web sites, to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others.



Screen name - A screen name is a made up name that people use in order to identify themselves. These names are generally not anywhere near the person's real name and are easily changeable.



Social Media - websites and applications that enable users to create and share content or to participate in social networking.

7

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES

CHAPTER 2 REVIEW OF RELATED LITERATURE I. FOREIGN STUDY According to the study of Sharon Padgett and Jessica Roden, the word cyber bullying did not even exist a decade ago, yet the problem has become a pervasive one today. Cyber bullies do not have to be strong or fast; they just need access to a cell phone or computer and a desire to terrorize. Anyone can be a cyber-bully, and such persons usually have few worries about having face-to-face confrontation with their victims. In fact, the anonymity of cyber bullying may cause students who normally would not bully in the tradition-sense to become a cyber-bully. According to the “Bullying and Cyber bullying: History, statistics, law, prevention, and analysis” by Richard Donegan of Elon Univeristy in America, Technology’s progression is often equated with the advancement of human societies. Pivotal innovations, such as the Internet, have forever changed how people interact. Though these developments have allowed the human race to make great strides in many fields, they have also allowed forms of transgression to become more rampant and widespread. This is evident when considering how traditional bullying has evolved into an issue today known as cyber bullying. While bullying and cyber bullying are often similar in terms of form and technique they also have many differences. Unlike traditional bullying, cyber bullying allows the offender to mask his or her identity behind a computer. This anonymity makes it easier for the offender to strike blows

8

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES against a victim without having to see the victim’s physical response. The distancing effect that technological devices have on today’s youth often leads them to say and do crueler things compared to what is typical in a traditional face-to-face bullying situation. According to Mesch (2009), cyber bullying emerges most commonly from relationship problems (break-ups, envy, intolerance, and ganging up); victims experience powerfully negative effects (especially on their social well-being); and the reactive behavior from schools and students is generally inappropriate, absent, or ineffective Smith et al (2008), found in line with Raskauskas and Stoltz (2007), that cyber victims had also often been traditional victims, and cyber bullies had often been traditional bullies; many traditional victims or bullies were not cyber victims or bullies, since cyber bullying is substantially less frequent. Cyber victims are more dependent upon the internet, feel less popular, take more internet-related risks, are more often a bystander and perpetrator of internet and mobile phone bullying, and are less often a perpetrator and more often a victim of traditional bullying. According to Guilia Mura, Cidgem Topcu, Ozgur Erdur-Baker of Middle East University, the study underlined a high occurrence of ICT usage and the experience of both cyber bullying and cyber victimization among two samples. It seems likely that cyber bullying and victimization may be more connected to the use of ICT than nationality and cultural factors, as Italian and Turkish seem to share very close experiences in the usage of ICT. Moreover, while previous studies usually detected

9

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES cyber bullying and victimization among secondary school students, the research shows the presence of such phenomena also in older and more educated age groups. According to From classroom to “chat room: perception of cyber bullying in Hong Kong schools” by University of Hong Kong, Bullying has been recognized for a long time, but a question remains about the seriousness of traditional bullying and cyber bullying in Hong Kong. Moreover, it is essential to explore whether there are any changing patterns between traditional bullying and cyber bullying. Thus the following is going to analyze the seriousness of bullying in Hong Kong and try to determine whether any prediction can be made on the trend of traditional bullying and cyber bullying. Wong suggested that school banding is related to school bullying and that schools with higher academic achievements have less bullying. He also explained that students with better academic results may have some personality characteristics such as high conscientiousness, obedience and self-discipline which are contrary to bullying. II. LOCAL STUDY According to Shella Guevarra, cyber bullying remains under reported in the Philippines because few parents or schools want to place the cyber victims’ or schools’ reputation under public spotlight. According to the research of Marlon de Lara, Cedrci Arcejo and Melvin Marcelo of Nueva Ecija University of Science and Technology, This study examines ways in which schools can prevent cyber bullying and, when necessary, intervene when cyber bullying does occur. In finding a possible solution to cyberbu11ying, victims will feel safer, not only in their homes, but at school as well.

10

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES Reyes (2010), Cyber bullying is a new form of bullying that follows students from the hallways of their schools to the privacy of their homes. Many victims of cyber bullying are bullied from the moment they wake up and check their cell phone or email, to the time they go to bed and shut off their computer or cell phone. According to Takumi, The survey also said three out of 10 children aged 7 to 12 were bullied through threats, two were oppressed through photo editing, one were humiliated or had their private conversations exposed, and three were either excluded or impersonated through fake accounts. In teenagers, photo editing had affected three out of 10 students, while two out of 10 were either humiliated or threatened. One out of 10 also said they were bullied by having their secret conversations exposed, while two suffered impersonation or had experienced exclusion. According to “Cyber bullying Philippines”, there was recently a report released about the way that Philippines residents may be responding to these kinds of changes. The report indicated that people are increasingly searching for cyber bullying terms through a wide array of social media venues. Notably, the Philippines was the world’s 4th leading country when it came to searching for “cyber bullying” through Google. This indicates that local residents are taking an increased interest in what they can find through this kind of report. This could actually help people develop a complete view of the issues that coincide with this kind of bullying phenomenon. According to Willard, there are three related concerns in addition to the nine forms of cyber bullying. These are students disclosing massive amounts of personal information via the Internet, becoming 'addicted' to the Internet to the point where their lives are highly dependent on their time spent online, and the prevalence of suicide and

11

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES self-harm communities in which depressed youths will sometimes access to gain information on suicide and self-harm methods. In “Confronting cyber-bullying” (2009), Shariff overviews additional concerns related to cyber bullying. These are anonymity, an infinite audience, prevalent sexual and homophobic harassment, and permanence of expression. Anonymity refers to the 8 anonymous nature of cyberspace in which people are able to hide behind screen names that protect their identity, which was mentioned earlier in this chapter. The online audience is described as being infinite due to the large number of people that are able to see what is written by the bully and the tendency of onlookers to support the perpetrators rather than the victim. According to a study conducted in 2008 by Melissa, females are as likely, if not more likely, to be involved in cyber bullying in their lifetime. Although, when students were asked about their recent experiences of being cyber bullies, males and females responded equally. When asked about lifetime participation, females reported higher rates of participating in cyber bullying, which leads one to believe females engage in these activities for a longer period of time. Females tend to take pictures of victims without them knowing and posting them online more than males did. Females also tend 12 to post things online to make fun of someone more often, although males tend to send emails to make them angry or to make fun of them.

III. FOREIGN LITERATURE According to the blog “2016 cyber bullying data” , cell phones and other mobile devices continue to be the most popular technology utilized by adolescents with the top

12

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES four reported weekly activities involving their use. Facebook remains the most frequently cited social media platform used on a weekly basis, but Instagram and Snapchat are increasing in popularity. Chat rooms, Tumblr, and Ask.fm remain largely unpopular among this age group. For this study, we contracted with three different online survey research firms to distribute our questionnaire to a nationallyrepresentative sample of middle and high school students. We had four different versions of our survey instrument which allowed us to ask a variety of questions to subsamples of each group. All students were asked questions about experiences with bullying and cyberbullying, digital dating abuse or violence, digital self-harm, sexting, and sextortion. Overall we obtained a 13% response rate, which ...


Similar Free PDFs