Professional Documents
Culture Documents
Digital Media
Internal Assessment (I.A)
Teacher’s Number:
Territory: Jamaica
Target Audience___________________________________________________________2
Data Collection___________________________________________________________4
Rationale________________________________________________________________15
Timeline________________________________________________________________16
Production Schedule_______________________________________________________17
Milestone________________________________________________________________18
Storyboard_______________________________________________________________19-20
Rough Designs____________________________________________________________21
Wireframes______________________________________________________________22-24
Mock-ups_______________________________________________________________25-27
Brainstorm
Mind map
Draft
Methodolgy
Description of Service
Name of Service: The name of the service is The Bully Detector which is
Purpose of Service: The Bully Detector is an application software that was created to help
victims who are being bullied continuously both online and physically to cease the bullying. This
device operates when a person that is being bullied should submit the necessary information on
the attacker that bullied them the bully detector will clarify the information that was given if it is
correct, the bully detector will send a message to the attacker telling them to stop the bullying. If
the information that was given is not followed then the bully detector will notify their parents
and leave all matters in the hands of the police and other child protection agencies.
1
Target Audience
● Boys and girls appear to be equally likely to be targets of physical and online harassment online.
There is some indication that girls may be more likely than boys to be targeted infrequently
(meaning once or twice) but just as likely to be targeted frequently (monthly or more often) It is
also for adult parents who has a child that had problems with bullies in the past and are afraid
that it will happen again in the future. The reason why this audience was chosen is because of
children being bullied and not telling anyone about it, therefore the parent or guardian won’t be
able to know what’s happening. Another reason why this target audience was chosen is, there are
some parents who can’t interact with their children on a daily basis and the child doesn’t talk
about school, so the parent won’t know when their child is in distress.
2
The instrument which was used to collect data was a survey. This survey was
with a total of ten questions. The main reason why people ask questions is so that
the respondent has time to think and give their answer accurately. These series of
select a response for the queries granting responders their honest opinion in their
own response. The survey also allowed a large amount of data to be obtained
within a limited time-frame; therefore it was an excellent method for capturing the
data from participants.
3
Data Collection
The research was executed by using the quantitative research method. This specific
method was selected because it collects and analyzes numerical data along with
result of using the quantitative research method. The survey was created on Google
The choice of using Google Forms to formulate the survey had various advantages
along with it. One of the advantages is that the Google form survey allowed
anonymity and privacy among the respondents which gave a sense of security
knowledgeable, as divert thoughts were given to the financial expenses and the
survey was proven to require the least amount of attention relating to the financial
convert it into hard copy to disseminate it which would then come with a cost. The
an interview which would require one on one communication with each person
4
Data Presentation & Analysis
All the data was gathered via questionnaires created in Google forms and
and 21 responses, the now closed questionnaire data was processed and converted
Figure 1
The pie chart in Fig.1 shows that 43% are females, 33% are male and 24% prefer
not to say.
5
Figure 2 What is your age group?
Figure 2 manifests a Bar Graph showing the number of children and their ages
grouped being bullied. Majority of bullying started at 50%at a 50% between the
ages of 12-14, 35% were 15-16 and 15% were 17-18.
6
The Column Chart in figure 3 represents teenagers in their various ages and the percentages of
how teens feel when going to school. 48% shows that children do not feel safe going to school
while 43% feel safe and 10% don’t.
7
Figure 4. Have you ever witnessed bullying before?
Percentages have
shown in Fig 4 that 65% have witnessed bully and 35% teenager haven’t witnessed any bullying
8
Figure 5 Have you ever been teased inside or outside of school?
9
Figure 6 How many times you been bullied?
The following Bar Chart in figure 6 shows responses toward the question “How many times have
you been bullied.”So it has been concluded that the majority of students started occasionally
have been bullied. 33% never been bullied and lastly 29% often been bullied.
10
Figure 7 Do you experience violence at home?
The charts in figure 7 represents if children experience violence at home or not. 57% have
experience violence and 43%
11
12
13
Figure 10 In what way do you ignore bullying around you?
Lastly exhibit 10 displays how students ignore bullying. Forty percent (40%) ask for advice from
others, thirty percent (30%) listens to music, twenty percent (20%) write in a journal/book and
ten percent (10%) stay alone.
14
Rationale
People are frequently being bullied on a daily basis which leads to people committing suicide,
abandoning their place of stay, stay alone to themselves because their too scared to open up.
Consequently the victims find it frustrating and idiotic because people bully these students when
they are on their happiest times. For instance, if a student has achieved something worthwhile
and could possibly help them in the future, this is where the bully decides to pick on the weak
and vulnerable because of either fame or jealousy. Furthermore, situation arise when children are
too scared to talk to someone and want to take matters in their own hands negatively so this is
the main reason why we made The Bully Detector so that if you have no one to talk to or have
guidance we will send out distress signals to the agencies who are responsible for child act and
15
Timeline
Rationale 22nd-28th
Wireframes 3rd-
5th
Storyboard 4th-27th
Timeline 28th-
31st
Milestone 2nd-6th
Proposal 6th-9th
Pitch 15th-
20th
16
Production Schedule
The Bully Detector
Weeks 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Execution of -
Research
Definition of - -
Problem
Data - -
Arrangement
Data Analysis - -
Application - - - - - - -
Layout
17
Milestone
Storyboard 4th-29th
18
19
Storyboard
20
Rough Designs
21
Wireframes
22
23
24
Mock-ups
25
26
27
Overview
This Digital Media Internal Assessment (I.A) has conducted research finding out the
depth of these problems and their root cause, in order to develop a suitable solution that will
meet all the needs. The application software, The Bully Detector, has been created by the
researchers to help solve the problems that students and teenagers are being bullied and the
After developing the idea for this research, the researchers started working on this project in
early October. In order to gather data for this project, questionnaires were distributed via Google
forms to various respondents ranging from young teenagers to high school students. An analysis
and presentation of the data collected was later done by the group members. All the researchers
were responsible for creating designs and a storyboard to aid in the development of the app. The
final app was later created by all researchers in April. The app has a homepage that branches off
with different pages where the user can browse and find exactly what they're looking for
regarding bullying. A pitch was done the following week to explain the app solution.
The Bully Detector app intends to save persons time and money. It will also make the students
come out of the shadow, communicate with their peer groups and a better place to live happily
without worrying who is watching them from afar. Another advantage is it is student friendly,
user and customer friendly. This app will eliminate the problem of bullying and as a result
decrease the amount of death heard on the news, radio stations and social media platforms.
28
Brainstorm
Student reports to
Bully still
Teacher speaks to Guidance Counselor
continues
bully
Student being
bullied
Mind map
Bully Detector
depression every now and then, the members of the group decided to create an app called The
Bully Detector. The sole purpose of this app is to aid in the location of victims being bullied and
ensure the bullies are dealt with by the higher authority. When the user opens the app, they
should be directed to the login page screen whereupon they are prompted to put in their
username and password in the respective text fields. If the user does not have an account, there is
an option below the login button that should say sign up. But if you have forgotten your
password, no need to worry because app will ask for your email account and password to create a
new password
Once the account has fully registered, the user can navigate back to the login page using
the android operating system back button. After the user has been signed into the application,
eventually they are greeted with the home page. The home page consists of many cards giving a
brief introduction to the Bully Detector. These cards display all the features available along with
showing some packs for themes, alarms and daily reminders to how to not be involve in and
around a bully. Below the cards is a button that says “Get started” which will initiate the
configuration of The Bully capability. The button will take you to the settings page which will
prompt you to agree or deny to the terms of use for the app. If accepted the application will then
direct you to the now unlocked side menu with all the app directories.The directories listed in the
menu all contribute in keeping track of your device along with configuration of track settings.
From adding devices, toggling alarm settings, enabling widgets and having an on screen map
overlay that pinpoints your location with a push of a button. The feature of The Bully Detector
was designed cleverly to enable efficient and effectiveness in completing the sole task of locating
Photoshop was used as it produced clear quality images as it provided additional tools with
special effects. Logotype Maker was mainly used in the establishment of the logo meanwhile
Just-in-mind Prototype was used for the wireframes while Mockup, Snapmod and Mockup
Builder were used to complete the mock-ups and user interface assignments. Additionally,
Google Forms was also used in the formulation of the graphs, charts and the questionnaire.
Furthermore, Storyboard That was used to create and manifest the storyboard. Fundamentally,
Google Docs was used to complete the theory section of the internal assessment, as all the
necessary data and information relating to the application was formulated and presented in it.
VLLO, Videoshop and Capcut was used to edit, crop or remove from the pitch while we
will used Youtube media to publish the videos and spread the link globally, The creative
technique that was used throughout the project was brainstorming and receiving feedback. This
allowed us to easily return to the previous stages of the process so that it could be adjusted and
edited for errors that occurred and think as a team. Thus, this process consisted of seven steps.
These steps were carried out in the order as follows; acceptance, definition, ideation, selection,
analysis, evaluation and implementation. Firstly, we commenced by accepting the fact that
various tasks would be presented for us to execute. Secondly, we then defined the issue that we
observed then generated multiple ideas as to providing a solution for it. Hence we selected the
various solutions and methods that we would carry out later on. Afterwards, we analyzed the
selections that were made earlier and evaluated them keenly to ensure that the requirements were