Research About Cyberbullying Research About Cyberbullying
Research About Cyberbullying Research About Cyberbullying
CHAPTER 1
I. INTRODUCTION
involves a real or perceived power imbalance. The behavior is repeated, or has the
potential to be repeated, over time. Bullying includes actions such as making threats,
Cyber bullying is different from traditional bullying due to the anonymity that
the Internet can provide. Cyber bullies do not have to own their actions due to the
anonymity and cyber bullying is often outside of the legal reach of schools and school
everyone, especially students and to explore ways of preventing cyber bullying before it
happens.
As the days, years and generations pass by, the world of social media is growing
bigger and bigger. It becomes more advanced than ever and a lot of people want it to
improve and they think that it would be better if it continues to develop more than the
usual thing that we have nowadays. As it continues to grow, people have the
easily by chatting them or posting something that makes them feel like they're just close
to where you are. But opposite of the advantages that they have, they also have the
disadvantages of using social media like they experience cyber bullying which can
affect them emotionally. This cyber bullying is also growing which is resulting to more
incidents of it. Many people already experienced cyber bullying, not only the known
personalities like the government officials and celebrities but also an ordinary
individual may experience it. Cyber bullying causes the victim to be hurt emotionally.
According to ETCB or End to Cyber Bullying Organization, there are five different
forms of cyber bullying. First is the harassment, it includes the bully sending offensive
includes sending rude and threatening messages that can lead to a physical harassment.
The second is flaming which is somewhat similar to harassment but the difference is it
often direct harsh languages to a specific person. The third is exclusion, I think many
people already experience this because it's something that is common thing that people
do sometimes. The exclusion is like you're in a group chat and then they blocked you
and kicked you out of the chat and after that they will talk badly of you, that is what we
called exclusion. The fourth is outing, that is when the bully posts something about an
individual but the individual doesn’t know about that. The last one is what we called
masquerading which includes the bully to fake his identity. The bully impersonates his
chosen individual and harasses someone anonymously. In other words, cyber bullying
looks like it's easy to do and it's really not an issue but no, all of this creates mess and
hurts an individual emotionally that's why we decided to do a research with this topic to
Social-ecological Theory
Espelage and Swearer (2004) and Cowie and Jennifer (2008) favor an ecologi-
cal model for understanding bullying behaviors, similar to the one used by Bronfen-
ing behaviors. “This framework views youth behavior as shaped by individual charac-
and society” (Swearer et al., p. 42, 2010). This model places the individual at the Cen-
tre and society as the overarching feature surrounding it. The reciprocal model endeav-
ors to clarify how young people situate themselves and behave within the society to
which they belong. It was developed to help understand the interactions between per-
sonal and environmental factors. As Swearer and Doll (2001) explain: Bronfenbrenner
(1977) describes this eco-system with his classic diagram resembling a target, with the
child at the center and concentric, reciprocal circles representing contexts from those
closest to the child (family) to those furthest away (community) (p. 10).
facets. This allows for an understanding of the causes of social exclusion through the
interaction of the different levels or risk factors that make up the foundation of the
model. While this model may have its uses in gaining an understanding of social exclu-
(2013), the socio-ecological approach was used to explain and explore the socio-demo-
graphics (the groups and classes) of the schools involved. Results showed that boys
TECHNOLOGY
INTERNET CELLPHONE
CYBERBULLYING
This model represents the flow or the whole concept of this research, The
Technology.
there's one form of bullying that can affect one particular person even though it's not
through a physical or verbal contact, it is cyber bullying. This is a major problem that
occurs in social media and many individuals have already experienced this. This is why
we, the researchers would like to find the answer to prevent the growing incidents of
cyber bullying. These are the following questions that we would like to be answered by
VI. HYPOTHESIS
huge problem ever since social media has made. Being a part of social networking
community has been a part of our daily lives in which we can do whatever we want to
do and say whatever we want to do. Social media is a platform in which we can freely
show or post what is in our minds therefore many people had posted many things about
themselves or other people. This is why it has a advantages and disadvanteges. The
advantage is you can post whatever you want and the disadvantage is you can post
whatever you want. It's the same but the difference is the latter has more effects on
people. Why do people say such nasty stuff to other people? Besides, why do they want
addition to that, cyber bullies tend to hide their own identity behind other names and
faces and that's the reason why they are more confident to do it on social networking
site rather than in person because nobody will know who they are and what they're
really up to. In doing this research, we will be able to know the effects of cyber
bullying to the victims and know how to prevent this type of bullying.
cyber bullying. The researchers have found that some of the students in their school had
already experienced it so that they tend to know what are the possible ways to prevent
the growth of cyber bullying occurring in their school, the following questions will be
answered by some of the chosen Senior High School students in Polytechnic University
of the Philippines to know what are their opinions or reactions on this matter and the
possible result of the answers of the following problems that concerns the topic.
The study on “The effects and prevention of Cyber bullying of Senior High
1. Students – With the help of this study, they may help their ability of their
mind as they are luckier than those who are bullied and they will be able know
their children. And with this study, they will know how to handle their children
There are some terms that need to be defined in this study for clarity and further
Bully - a person who uses strength or power to harm or intimidate those who are
weaker.
gies such as e-mail, cell phone and pager text messages, instant messaging,
defamatory personal Web sites, and defamatory online personal polling Web
Screen name - A screen name is a made up name that people use in order to
identify themselves. These names are generally not anywhere near the person's
Social Media - websites and applications that enable users to create and share
CHAPTER 2
I. FOREIGN STUDY
According to the study of Sharon Padgett and Jessica Roden, the word cyber
bullying did not even exist a decade ago, yet the problem has become a pervasive one
today. Cyber bullies do not have to be strong or fast; they just need access to a cell
phone or computer and a desire to terrorize. Anyone can be a cyber-bully, and such
persons usually have few worries about having face-to-face confrontation with their
victims. In fact, the anonymity of cyber bullying may cause students who normally
Pivotal innovations, such as the Internet, have forever changed how people interact.
Though these developments have allowed the human race to make great strides in many
fields, they have also allowed forms of transgression to become more rampant and
widespread. This is evident when considering how traditional bullying has evolved into
an issue today known as cyber bullying. While bullying and cyber bullying are often
similar in terms of form and technique they also have many differences. Unlike
traditional bullying, cyber bullying allows the offender to mask his or her identity
behind a computer. This anonymity makes it easier for the offender to strike blows
effect that technological devices have on today’s youth often leads them to say and do
situation.
experience powerfully negative effects (especially on their social well-being); and the
ineffective
Smith et al (2008), found in line with Raskauskas and Stoltz (2007), that cyber
victims had also often been traditional victims, and cyber bullies had often been
traditional bullies; many traditional victims or bullies were not cyber victims or bullies,
since cyber bullying is substantially less frequent. Cyber victims are more dependent
upon the internet, feel less popular, take more internet-related risks, are more often a
bystander and perpetrator of internet and mobile phone bullying, and are less often a
University, the study underlined a high occurrence of ICT usage and the experience of
both cyber bullying and cyber victimization among two samples. It seems likely that
cyber bullying and victimization may be more connected to the use of ICT than
nationality and cultural factors, as Italian and Turkish seem to share very close
experiences in the usage of ICT. Moreover, while previous studies usually detected
the presence of such phenomena also in older and more educated age groups.
Kong schools” by University of Hong Kong, Bullying has been recognized for a long
time, but a question remains about the seriousness of traditional bullying and cyber
bullying in Hong Kong. Moreover, it is essential to explore whether there are any
changing patterns between traditional bullying and cyber bullying. Thus the following
is going to analyze the seriousness of bullying in Hong Kong and try to determine
whether any prediction can be made on the trend of traditional bullying and cyber
bullying. Wong suggested that school banding is related to school bullying and that
schools with higher academic achievements have less bullying. He also explained that
students with better academic results may have some personality characteristics such as
Philippines because few parents or schools want to place the cyber victims’ or schools’
Marcelo of Nueva Ecija University of Science and Technology, This study examines
ways in which schools can prevent cyber bullying and, when necessary, intervene when
cyber bullying does occur. In finding a possible solution to cyberbu11ying, victims will
from the hallways of their schools to the privacy of their homes. Many victims of cyber
bullying are bullied from the moment they wake up and check their cell phone or e-
mail, to the time they go to bed and shut off their computer or cell phone.
According to Takumi, The survey also said three out of 10 children aged 7 to 12
were bullied through threats, two were oppressed through photo editing, one were
humiliated or had their private conversations exposed, and three were either excluded
or impersonated through fake accounts. In teenagers, photo editing had affected three
out of 10 students, while two out of 10 were either humiliated or threatened. One out of
10 also said they were bullied by having their secret conversations exposed, while two
about the way that Philippines residents may be responding to these kinds of changes.
The report indicated that people are increasingly searching for cyber bullying terms
through a wide array of social media venues. Notably, the Philippines was the world’s
4th leading country when it came to searching for “cyber bullying” through Google.
This indicates that local residents are taking an increased interest in what they can find
through this kind of report. This could actually help people develop a complete view of
According to Willard, there are three related concerns in addition to the nine
forms of cyber bullying. These are students disclosing massive amounts of personal
information via the Internet, becoming 'addicted' to the Internet to the point where their
lives are highly dependent on their time spent online, and the prevalence of suicide and
to cyber bullying. These are anonymity, an infinite audience, prevalent sexual and
anonymous nature of cyberspace in which people are able to hide behind screen names
that protect their identity, which was mentioned earlier in this chapter. The online
audience is described as being infinite due to the large number of people that are able to
see what is written by the bully and the tendency of onlookers to support the
more likely, to be involved in cyber bullying in their lifetime. Although, when students
were asked about their recent experiences of being cyber bullies, males and females
responded equally. When asked about lifetime participation, females reported higher
rates of participating in cyber bullying, which leads one to believe females engage in
these activities for a longer period of time. Females tend to take pictures of victims
without them knowing and posting them online more than males did. Females also tend
12 to post things online to make fun of someone more often, although males tend to
According to the blog “2016 cyber bullying data” , cell phones and other mobile
devices continue to be the most popular technology utilized by adolescents with the top
frequently cited social media platform used on a weekly basis, but Instagram and
Snapchat are increasing in popularity. Chat rooms, Tumblr, and Ask.fm remain largely
unpopular among this age group. For this study, we contracted with three different
representative sample of middle and high school students. We had four different
subsamples of each group. All students were asked questions about experiences with
bullying and cyberbullying, digital dating abuse or violence, digital self-harm, sexting,
and sextortion. Overall we obtained a 13% response rate, which isn’t amazing, but is
higher than most generic Internet surveys. With any imperfect social science study,
caution should be used when interpreting the results. We can be reassured somewhat in
the validity in the data, however, because the prevalence rates are in line with results
from our previous school-based surveys. Moreover, the large sample size helps to
diminish the potential negative effects of outliers. Finally, steps were taken to ensure
valid responses within the survey instrument. For example, we asked the respondents to
select a specific color among a list of choices and required them to report their age at
two different points in the survey, in an effort to guard against computerized responses
both the academic community and society at large, there continues to exist much
confusion about both the conceptual and operational definitions of cyber bullying (and
by implication, bullying in general). The trouble with this lack of clarity is that it leads
the ability of various stakeholders to identify, prevent, and respond to these behaviors.
In this article, we review the essential elements of cyber bullying that distinguish it
approaches to its study. We also present a cyber-bullying scale that has demonstrated
strong initial validity and reliability in ten different surveys involving nearly 15,000
students in the United States. The purpose is to reduce erratic and fitful advancement of
measured and analyzed. Through this effort we hope to meaningfully assist those on the
front lines of the problem to better know what cyber bullying is, and what it is not.
continually bullied both in-person and through technology. Also, their grades may
suffer, their self-esteem is hurt, depression can set in, they may have increased health-
related issues, abuse of alcohol and/or drugs may begin, and many more negative
effects can occur, depending on the child. With children using technology at younger
ages, the data collected in past years is becoming less relevant. In 2010-2011, the
School Crime Supplement reported 9% of children in grades 6-12 are cyber bullied, but
the increase in children that use technology can result in a much higher number.
According to the blog of Erick Manriquez, the victims and impact cyber
bullying has caused, how to prevent cyber bullying, and the laws in several states
bullying involves more emotional and psychological harm. Cyber bullying can also
lead to violence, if the cyber bully decides to physically attack their victim. Cyber
bullying has a broader audience; anyone in the world can see the hateful messages left
by a bully. Cyber bullying can involve social networking sites, text messages, websites,
and emails. Humiliating messages and videos can spread fast and cause more harm.
There have been several killings and suicides due to cyber bullying. The most effective
method of prevention is education and awareness of cyber bullying. Several states have
different laws pertaining to cyber bullying. President Obama and First Lady Michelle
have made several press releases on the issue. The author conducted a survey about the
awareness of cyber bullying. Several graphs and tables are provided for statistical
analysis.
bullying refer to minors while cyber harassment and cyber stalking for adults. The three
refers to a similar behavior that uses technology as medium to sow fear and strip the
Philippine context, media only refer to these as bullying, hopefully, when a law is
passed, the terms will be standardized. Likewise, bullies exist even before the cyber
age, the technological advancement just gave them another tool to step up the attack at
never be taken lightly and it is something that happens more often than not to those on
the spectrum. There are multiple factors that play a part into this happening more
beings and particularly those on the spectrum are known for their resiliency, bullying
takes away more than a bloody nose from someone even on the spectrum. Bullying
takes away the things that are the most difficult to get back. Things that can shape the
way a person views themselves, who they allow in their life and the choices they make
targets of bullying and cyberbullying every day, putting many at risk for outcomes such
as depression or school absenteeism. Working with kids to create ways to address these
issues is an important responsibility for adults. For example, adults can help those who
are targets of bullying explore ways to respond assertively, and they can help those who
carry out hurtful behaviors get support for addressing what’s underneath their actions.
Adults can also assist young people in identifying strategies to use as bystanders who
CHAPTER 3
This chapter will give a discussion of the different methods and procedures that
are used and done in the study; this chapter will give the description of the research
design, it will then feature the process of data collection and how the data will be
analyzed.
I. RESEARCH DESIGN
respondents. The researchers used descriptive method to know the effects and
Technology.
approximately 45 students. The respondents of the study are the 50 random students in
Institute of Technology.
survey questionnaires answer the problems for this research. The questionnaires will be
the one that the researchers will use to measure the effects and possible solution or
The data for this research were collected using a survey questionnaire. The
survey was created using suitable questions modified from related research and
questions, which were related to the participant’s perception regarding the effects and
prevention of cyber bullying. After we collect all the survey questionnaires from the 50
students, the data will be analyzed by the researchers to know the students’ opinions
Technology.
whole. Percentages are calculated by taking the number of the subcategory and dividing
Formula:
Percentage = x*n
Example: 33 out of 50 respondents answered A. Yes to get the 30% of 50 here’s the
sample:
% = .33 x 50 = 16.5%
CHAPTER 4
DATA
70%
60%
50%
40% A. Yes - 62%
30% B. No - 0%
20% C. Sometimes - 0%
10% D. Often - 38%
0%
A. Yes B. No C. D. Often
Sometimes
The researchers’ asked the respondents if they are active on social media and
the survey says 62 % of the random Senior High School students are active on social
media while 38% of the Senior High School students often use the social media.
60%
50%
40%
A. Yes - 60%
30% B. No - 0%
20% C. Sometimes - 0%
10% D. Often - 40%
0%
A. Yes B. No C. D. Often
Sometimes
bullying and the survey tells that 60% of the students experienced or experiencing
cyber bullying while the 40% of the students are often cyber bullied.
50%
40%
0%
A. Yes B. No C. D. Often
Sometimes
The researchers’ found out that less than 40% of the students have the urge to
report the bullying incident that happened to them. And almost 50% of the students
reported it sometimes while the 16% of the students don’t have the urge to report it to
anyone.
70%
60% A. Parents - 30%
50%
40% B. Guidance
30% Counselor- 0%
20% C. Friends - 70%
10%
0% D. Other Answer -
A. Parents B. Guidance C. Friends D. Other 0%
Counselor Answer
The researchers asked the respondents if they did report the incident to anyone
and the survey says that 30% of the respondents are telling the incident to their parents
while the 70% of the respondents are telling the incident to their friends.
54%
52%
50% A. Yes - 54%
48%
B. No - 0%
46%
44% C. Sometimes -
46%
42%
A. Yes B. No C. D. Often D. Often - 0%
Sometimes
The researchers asked their respondents if they’ve used bad words online and
the researchers found out that 54% respondents are using bad words online while the
50%
40%
20% B. No - 4%
0% D. Often - 0%
A. Yes B. No C. D. Often
Sometimes
Posting lies on the internet about someone is cyber bullying so the researchers
asked their respondents if they’ve posted lies about someone and the survey says 46%
of the students are telling that they posted lies while, 4% of the students don’t post lies
and half of the respondents admitted that sometimes they posted lies.
50%
40%
20% B. No - 18%
10% C. Sometimes -
46%
0%
A. Yes B. No C. D. Often D. Often - 0%
Sometimes
The researchers want to know if the respondents used another person’s account
without the owner’s permission and they got a 36% of yes and 46% of sometimes
which means many students really do it frequently. They also got a 18% of no which
means some students don’t use someone else’s account without permission.
60%
50%
40% A. Yes - 36%
30%
B. No - 14%
20%
10% C. Sometimes -
60%
0%
A. Yes B. No C. D. Often D. Often - 0%
Sometimes
researchers asked if they ever teased or threatened someone with the use of social
media. The survey says that 36% of the students had teased or threatened someone
online and 60% of the students do it sometimes. There’s also a 14% of students that
60%
50%
40%
30%
20%
10%
0%
A. Yes B. No C. D. Often
Sometimes
The researchers want to know if the students bullied someone even if they don’t
know him/her personally. They got a 10% of yes, some students do bully someone and
a 38% of no, some students knows thhat it isn’t right to do it. But the researchers got a
52% of sometimes which means that many students bully someone they didn’t even
know.
100%
80%
60%
40%
20%
0%
A. Trauma
A. Trauma - 100%
There are many possible effects of cyber bullying but the researchers want to
know what is the most possible one. The survey says that having a trauma is the most
60%
50%
40%
30%
20%
10%
0%
A. CounselingB. Attending C. Nothing D. Other
seminars answer
regarding
bullying
A. Counseling - 58% B. Att ending seminars regarding bullying - 42%
C. Nothing - 0% D. Other answer - 0%
To have a solution to cyber bullying and to know what is the best option to do to
prevent it, the researchers asked the students what do they think as the best solution to
stop this kind of bullying. The survey says that 58% of the students think that
counseling is the best option to do so and 42% of the students think that attending
I. CONCLUSION
Based on the researcher's findings, the following conclusions are given and
concluded:
1. Many Grade 11 students are always active on social media and plenty of them
2. Many victims had reported the incident but they only told it to their friends which
3. While many students have been victimized by the bullies, some students are also the
ones who's bullying others by posting lies, saying bad things online, threatening or
4. Most of the victims shared one opinion on what they think is the effect of cyber
bullying and for them it is being traumatized from what they have experienced from
being bullied.
5. The possible way to prevent the cyber bullying incidents is to attend a seminar
regarding bullying and if someone had already experienced it, try to go to a counseling
session where he/she will feel more comfortable to prevent being traumatized of the
incident.
From the findings of the study based on the conclusion drawn the following :
1. If you're always active on social media and posts something, be careful of what your
posts are. It can be the cause of cyber bullying. The bully might take advantage of what
you have posted and make stories that not even true or the bully may say bad things
2. Whether you post or comment on someone's post, always remember to think first
before you click. Your comment might offend others by misinterpreting your words or
they may misunderstand your point and that may lead to an argument.
3. If somebody have an argument with you, don't say your opinion publicly because
others might join the argument and it'll just be huge without you both noticing. If you
want him/her to hear your point, you can talk or chat privately so that you both can
focus on your point of view, let each others take turns on your own explanations and be
4. If you happen to see a bullying incident on social media or if you experience it with
the use of your account, you can report it on their site or you can also block the bully's
5. If you already experienced cyber bullying and been traumatized of the incident, it'll
be wise if you try to not be on social media for awhile and go on a counselling session.
After that, you can be back again with your normal life which you can be active again
on social media and forget what happened. Just be careful and if another bully happens
to bully you, just ignore it. Focus on the positive side of social media and have more