You are on page 1of 64

Action Research Based Project

on

Effect of Online Training Module of Cyberbullying on the Awareness Level of


Students.

Year
2022-23

As part fulfillment of III Semester

in B.Ed. Programme from

University of Mumbai

Jennifer Sunil Nunes

Name of the guide

Ujwala Kharat Kamble

Diwakar Patil College of Education

No.26/2 Pastha, Naka Boisar,

Rarapur Road, Palghar,

Maharashtra 401501
Certificate

This is to certify that Jennifer Sunil Nunes of Diwakar Patil College of


Education has completed her action research under my guidance as part
fulfillment of B.Ed. Program in III Semester of University of Mumbai for the
year 2022-23 and it is her original work.

Mrs. Ujwala Kharat Kamble


Date:
Declaration

I, Jennifer Sunil Nunes of Diwakar Patil College of Education, hereby declare that the
Action Research entitled ―Effect of Online Training Module of Cyberbullying on the
Awareness Level of Students " is my own work and has been carried under the
supervision and guidance of
Mrs. Ujwala Kharat.

The information and data given in the report is authentic to the best of my knowledge.
This project report is not submitted to any other universityor institution for the
awardof any degree, diploma or fellowshipor published any time before.

Signature of Student
Date:
ACKNOWLEDGEMENT

Action Research is an opportunity for all the B. Ed students for self-development.


I consider myself very lucky and I express my deepest gratitude towards our
Principal Dr. Shashikala , who gave us an opportunity to work on a topic chosen by
her. I am grateful for her valuable time for the research and guided us on how to
go by it. This work wouldhave not been possible without her support and guidance.

I would also like to express my heartfelt thanks to our guide Mrs. Ujwala Kharat for
her enthusiasm and immense knowledge. I would also like to thank Mrs. Marliyn
S Parakel who initially guided us from the scratch about the review of literature
which, I think, was required for me. It wasa great learning experience.

I would also like to thank the Principal Charlotte Gabriel of St. Anthony High
School and Junior College, Nallasopara (East) and the staff for allowing us to do
our research work. I would also like to thank them for their patience and
cooperation throughout.

This acknowledgement is not complete without thanking my peer Mrs. Ujwala


Kharat, for always being there and motivating me throughout the research work.
I would also like to thank my family for being patient and understanding me
through the work.

Signature of Student
Date:
Content Page No

Title Page I

Certificate II

Declaration III

Acknowledgement IV

Table ofContent V

List ofTables VIII

List ofFigures VIII

CHAPTER – I : INTRODUCTION

1.1 Introduction 1

1.2 Needfor the Study 5

1.3 Title 5

1.4 Definitionsof theTerms 5

1.5 Variablesof the Study 6

1.6 Aim of the Study 6

1.7 Objectivesof the Study 6


1.8 Hypothesesof the Study 7

1.9 Significance of theStudy 7

1.10 Delimitationof theStudy 8

1.11 References 8

CHAPTER – II REVIEW OF RELATED LITERATURE

2.1 Introduction 10

2.2 StudiesConducted 10

2.3 Conclusion 14

2.4 References 14

CHAPTER – III DEVELOPMENTOF INSTRUCTIONAL MODULE

3.1 Introduction 17

3.2 Developmentof InstructionalModule/Programme 17

3.3 Conclusion 18

3.4 References 19

CHAPTER – IV RESEARCH DESIGN

4.1 Introduction 20

4.2 Sample 21
4.3 Methodologyof the Study 22

4.4 TargetGroup 23

4.5 Toolof the datacollection 23

4.6 Data CollectionProcedure 25

4.7 Conclusion 25

4.8 References 26

CHAPTER –VANALYSISAND INTERPRETATION

5.1 Introduction -SG 27

5.2 DescriptiveAnalysis 27

5.3 References 39

CHAPTER –VICONCLUSION

6.1 Introduction 40

6.2 Findingsof theStudy 40

6.3 Suggestionsfor the FutureStudies 41

6.4 Conclusion 41

6.5 References 42
APPENDIX –A : ResearchTool(Google form - Questionnaire) 43

APPENDIX – B : Administrativetool 46

APPENDIX - C : Data Sheet 54

Bibliography 56

LIST OF TABLES
Table Title of the Table Page
No No

4.1 Implementationof tools for data collection of standard 22

4.2 Total no.of BoysandGirls of 9th standardclass 23

5.1 Mean of Pre-Test and Post-Test scores of InstructionalModuleon 9th 26


standard Students

5.2 Meanof Pre-Test scores of InstructionalModuleon 9th standard 30


Students amongboysand girls

5.3 Mean of Post-Test scores of InstructionalModuleon 9th standard 30


Students amongboysand girls

LIST OF FIGURES
Graph Title of the Figures Page
No No

1.1 American mathematicianNorbertWienercoined "Cybernetics"in 1948. 2


5.1 Bar Graph of mean of Pre-Test andPost-Test scores of Instructional 29

Moduleon 9th standard Students

5.2 Bar Graph of Mean of Post-Test scores of InstructionalModuleon 31


9th standardStudentsamong boysand girls

5.3 Bar Graph of opinionof ‗Thingsthatcan be consideredas online 32


harassment‘

5.4 Pie chart ofApproximatetime spenton socialmediabystudents 33

5.5 Pie chart of opinionof ‗Safetyof DP on social media‘ 34

5.6 Pie chartof opinionof ‗Privacy of publicprofiles on differentsocial 35


media platforms‘

5.7 Pie chart of opinionof ‗Followingsocial mediatrendsrandomly‘ 36

5.8 Pie chart of opinionof ‗Socialmediaas best andsafest platformto 37


connect with friends andrelatives‘

5.9 Pie chartof opinionof ‗Addingstrangersto account to increase the 38


friend circle‘

CHAPTER I:
INTRODUCTION

1.1 Introduction
“Being the bully on the internet is a sign of insecurity & weakness.”
- Rev Run (Joseph Simmons)
Just like we humans have evolved from a tiny creature that was born in the water to what
we are today in the 21st century, which is known as the age of technology. As, now we are
surrounded by various technologies like cell-phones, laptops & flat television with high definition
details. Today technology has become an integral part of our lives. In earlier days having a
telephone & computer at home was a sign of luxury but not today. In today‘s day there are many
families who have computer or laptop with them as it has become very essential not only for
adults who work but even for students. It serves as a gadget which helps in communication &
with computers & laptops and mobile phones are also an essential part and an easiest way for
communication. The way people communicated 30 years ago & the way people are
communicating now is way different. Just like the evolution of man the technology also evolved
gradually, in the 21st century growth of technology is at its peak, where in 5.28 billion people
from 7.77 billion people are unique mobile subscribers which is 67.95 % of the world
population. There are still many people who cannot afford a smart phone & some cannot afford
evena mobile phoneto communicate to theirlovedones.
Communication has changed a lot from ancient times by using animals, birds and ‗the
marathon man‘ to today‘s day where we are just a few clicks away & we can talk to anyone
around the world. We can also search for anyone on the various social media platforms like
Facebook, Snapchat and Instagram and so on. These platforms are an easy way to connect to
people, know them & learn from the world. Teenagers today are using the internet more than
ever. They view the internet and even more so the mobile phones as positive aspects of our
society. The internet and mobile phones systems are the two biggest systems of communication
which play a crucial role in our daily activities and development of identities. On the other hand,
these same technologiesare also oftenused negatively.Some are hurtbytherudecomments,

mean personal messages, putting their corrupted photos, morphingfacesof anyindividualon the
other, spreading rumours and many more. Many children are the targets of bullying via the
internet or mobile phones resulting in total confusion on the part of the ―target. Very often,
children are not able to understand that what they are going through is a form of bullying. As a
result the previously safe environment of the internet is now becoming a source of confusion and
anxiety. This form of things which hurt the modesty of an individual is considered as
‗Cyberbullying‘ which comes under a term called ‗cyber crimes‘. ‗Cyber crimes‘ is a big
umbrella term for many crimes that take place online such as hacking, stealing data online,
stalking someone online,it also includesbullying someoneonlineand manymore.

Origin of the word “cyber”

Cybernetics is "theory or study of communication and


control," coined in 1948 by U.S. mathematician Norbert
Wiener(1894-1964), with -ics + Latinizedform of Greek
―kybernetes"steersman"(metaphorically"guide,
governor"),from kybernan"to steer or pilot a ship, directas
a pilot,"figuratively"to guide,govern,"which is of uncertain
origin.Beekesagrees that"the wordhasno cognates"and
concludes "Foreignorigin is probable."The constructionis
perhapsbased on 1830s Frenchcybernétique
"theart of governing."

(https://www.etymonline.com/word/cybernetics)
Figure 1.1 (U.S Mathematician

Nobert Wiener 1894-1964)

Cybercrimes
The bane of the internet, cybercrime refers to any and all illegal activities carried out using
technology. Cybercriminals — who range from rogue individuals to organized crime groups to
state-sponsored factions — use techniques like phishing, social engineering, and all kinds of
malwareto pursuetheirnefariousplans.(https://www.avast.com/c-cybercrime)

Cyber-crimetakesplacein variousformssuch as, some of which are:


∙Phishing: using fake email messages to get personal information from internet users; ∙

Cyberbullying: theuse of electronic mediato bullya person, typicallybysending messages of an


intimidatingor threateningnature.

∙ Misusingpersonal information(identitytheft);

∙ Hacking: shuttingdown or misusingwebsites or computernetworks;


∙ Spreadinghateand incitingterrorism;

∙ Distributing childpornography;

∙ Grooming: making sexualadvancesto minors.


Nowadays,all digitaldevices(includingcomputers, tablets, andsmartphones)are connected to
theinternet.

(https://www.government.nl/topics/cybercrime/forms-of-cybercrime)

Cyberbullying

Cyberbullying is defined as ―The process of using the Internet, cell phones or other devices to
send or post text or images intended to hurt or embarrass another person.ǁ - The National Crime
Prevention Council (U.S Legal). Cyberbullying is the use of technology to harass, threaten,
embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets,
posts, or messages all count. So does posting personal information, pictures, or videos designed
to hurtor embarrasssomeone else.
Cyberbullying also includes photos, messages, or pages that don't get taken down, even after
the person has been asked to do so. In other words, it's anything that gets posted online and is
meant to hurt, harass, or upset someone else. Intimidation or mean comments that focus on
things like a person's gender, religion, sexual orientation, race, or physical differences count as
discrimination, which is against the law in many states. That means the police could get
involved,and bulliesmay face seriouspenalties.
Online bullying can be particularly damaging and upsetting because it's usually anonymous
or hard to trace. It's also hard to control, and the person being victimized has no idea how many
people(or hundredsof people)haveseen the messages or posts. People can be tormented

nonstop whenever they check their device or computer. Online bullying and harassment can be
easier to commit than other acts of bullying because the bully doesn't haveto confronthis or her
target inperson.(https://kidshealth.org/en/teens/cyberbullying.html)

Types of cyberbullying:

1. Harassment: It involvesrepeatedlysending inappropriate,hateful,and hurtfulmessages to an


individualor a groupand is oftenrepeatedmultipletimes.
2.Flaming/Trolling: Flaming is similar to harassment, but it refers to an online fight exchanged via
emails, instant messaging or chat rooms. It is a type of public bullying that often directs harsh
languages,or images to a specific person.
3.Stalking: Electronically following someone and sending targeted messages with the intention
of scaring, harming,or intimidatinghim/her/them
4.Outing/Doxing: Outing is when a bully shares personal and private information, pictures, or
videos about someone publicly. A person is ―outedǁ when his information has been disseminated
throughout theinternet.
5.Exclusion: Exclusion is the act of intentionally singling out and leaving a person out from an
online group such as chats and sites. The group then subsequently leaves malicious comments
andharasses the one theysingled out.
6.Masquerading/Impersonation: Masquerading is a situation where a bully creates a fake
identity to harass someone anonymously. In addition to creating a fake identity, the bully can
impersonate someone else to send malicious messages to the victim.
(http://cyberbaap.org/cyberbullying/effects-of-cyberbullying/)

Any of the above kinds of cyberbullying can lead to various effects on the individual which
could be either emotional or mental; in most of the cases both effects can be seen. In some cases
the cyberbullying activities turns out to be so severe that the cyber bully victim commit suicide.
Cyber bullying activities may not only put effects on the victim but in some cases it may also
harm the bully. The effects could be anxiety, depression, anger, etc. It also harms an individual‘s
academic growth, they tend to lose interest in the work or act they used to love, they try to be
alone & avoid theirclose ones as well.

As we can see that with the increase in the technology crimes are no more related only in
physical but many use these technology to harm someone either intentionally or unintentionally
which leads to the major loss either to one or both. Cyber cells have been developed in many
countries including India. Government is working hard to control the crimes that occur with the
use oftechnology.
2. Need for the study
With the easy access to smart phones & internet there are many criminals or people who try to
take revenge through online media. It is necessary to study cyberbullying because many
teenagers these days are falling prey to the online crime i.e.; cyberbullying. This is because many
teenagers are not aware about the third party, who tries to get our personal information & some
might use those for the wrong purpose. It is important to make our younger generation aware that
many social media platforms have privacy policies & also they should try not to click on any link that
pop-up as this might send our details to an unwanted person, which would turn out to be a big
problem. It is always better to keep our personal details hidden & accounts private, preventing
our data from going in wrong hands. Thus, it is important to make teenagers aware about the
cyber cells & let them know what should be done, if they are stuck in any kind of cyberbullying
activityeverintheirlife.

3. Title
A Study of Effectiveness of Online Training Module of Cyberbullying on the Awareness Level of
Studentsof 9th standardof St. Anthony’s high school and junior college.

4. Definitions of the term

1.4.1 Conceptual definition


Online Training Module:-
A training module is one structured section of a course. The content within a training module
should be designed, and created, to support the learner‘s intake and retention of the information
it contains.
Olivia McGarry, Content Marketer at LearnUpon Published on November 19, 2019.
(https://www.learnupon.com/blog/develop-online-training-module/)

Cyberbullying: - Cyberbullying is an aggressive, intentional act, or behavior that is carriedout


by a group or an individual, using electronic forms of contact such as SMS, instant messengers,
digital images/messages repeatedly, and overtime against a victim who cannot easily defendhim
or herself.(Saswati Mukherjeeet al)

Awareness:-
―The qualityorstate of beingaware: knowledge andunderstandingthatsomething is
happeningor exists.ǁ DefinitionbyMerriam-Webster.

1.4.2 Operational definition


Online training module: - It can be defined as a use of anyinstructionalmaterial forthe
learningprocess of thestudentsin the virtualor onlineclassroom.

Cyberbullying: - Cyberbullyingis a kind of onlineharassment which can be done on anysocial


mediaplatform,which emotionally& mentallyhampersteenagers.

Awareness: - It is the level of beingconscious aboutanything.

5. Variables of the study.


1. Independent variables : program
2. Dependent variables : Pre-test& Post-test results.

6. Aim of the study


Tostudythe ―Effect of OnlineTrainingModule of Cyberbullyingon theAwarenessLevel of
Students.ǁ

7. Objective of the study


∙ Tostudytheunderstandingof studentsof internettechnology, its benefits andside-effects. ∙

Tostudythe awarenesslevel of studentsaboutcyberbullying.

∙ Todevelopthe understandingof precautionsof widely used internetfacilitiesand various social


mediaplatforms.
∙ Tosensitize the studentsaboutsevere issue like cyberbullying.
∙ Tocreate awarenessaboutmeasures to be takento avoid cyberbullying. ∙ To

make studentsawareaboutsafe onlinepractices of internettechnologies.

1.8 Hypotheses

Ho1. Thereis no significant difference in the pre-test& post-testscores of St. Anthony’s high
school and Juniorcollege.
Ho2. Thereis no significant differencein thelevel of perceptionof girls & boysof 9th standard
class dueto the onlinetrainingmodule.
Ho3. Thereis no significant differencein the awarenesslevel of 9th standard studentsof
online trainingmodule on cyberbullying.
Ho4. There is no significant differencein the enthusiasm of 9th standard studentstowards
online trainingmodule.

1.9 Significance of the study. -SG

The programme will not only help students but it will also help other stakeholder of the
education system:-
For Students: This programme will help students to know about the various types of
cyberbullying activities that may occur in anyone‘s life. It will also help them to know about the
effects of cyberbullying, preventive measures, steps that need to be taken & whom they should
seek for help.It will also helpthem to know aboutthe helplinenumbers.
For Teachers: This onlineawarenessprogrammewill also helpteachers to guidetheir
studentsin a betterway with some concrete examples& in an effective way.For Parents:
Parentsmay not be directlyinvolvedin thisawarenessprogramme butit may help parentsto
make theirkids awareaboutthe use of ICT & internetservices, how to keep

thingsprivate& not to fallin a trapof cyberbullying.Evenifthe child has fallenpreyto it, this will
helpthem to get theirkids outof thiskind of situation.
1.10 DELIMITATION OF THE STUDY

∙ The studyis limited toSt. Anthony high school and JuniorCollegeOnly.

∙ The studyis limitedto the studentsof 9th Standard only.

∙ The studyis limited tothe GoregaonWestarea only.

∙ The studyis limitedto Mumbaisuburbarea onlyand does not includeareas from other regions.
∙ The studyis limitedonlyto finding the awarenessof studentsaboutcyberbullying.

1.11 References.

1.Ben-Joseph,B.-J. (2018,April).Cyberbullying(forTeens)- Nemours KidsHealth.Retrieved April


2020, from (https://kidshealth.org/en/teens/cyberbullying.html)

2.CyberbullyingDefinition.. RetrievedApril 2020, from


(https://definitions.uslegal.com/c/cyber-bullying/)

3.cybernetics| Origin and meaningof cyberneticsby OnlineEtymology Dictionary. . Retrieved


April 2020, from (https://www.etymonline.com/word/cybernetics)

4.McGarry, O. (2019, November 20). How to Develop an Online Training Module for Your
Corporate Learning. Retrieved April 2020, from (https://www.learnupon.com/blog/develop
online-training-module/)

5.MinisterievanJustitie enVeiligheid.(2016, October 5). Formsof cybercrime.Retrieved April


2020, from(https://www.government.nl/topics/cybercrime/forms-of-cybercrime)

6. NorbertWiener Prize inAppliedMathematics(AMS-SIAM NorbertWienerPrize inApplied


Mathematics). . Retrieved June 1, 2020, from (http://www.ams.org/prizes
awards/paview.cgi?parent_id=33)
7.Psychological effects of cyberbullying,trolling,harassment, stalking. (2019). Retrieved April
2020, from(http://cyberbaap.org/cyberbullying/effects-of-cyberbullying/)

8.The Introduction To Cyber Bullying Media Essay. (2019, March 18). Retrieved from
(https://www.ukessays.com/essays/media/the-introduction-to-cyber-bullying-media-
essay.php)

9.Turner,B.A. (2020, May2). 1 BillionMore PhonesThanPeople InTheWorld!Retrieved from


(https://www.bankmycell.com/blog/how-many-phones-are-in-the-world)
Chapter II: REVIEW OF RELATED LITERATURE.

2.1 Introduction

Review of literature is a summary of previous research on a particular topic. It provides an


overview of the research, methodology used theories behind it & the findings obtained after the
completion of the research or after studying a research paper. Literature review does not report
any original work, it only tells about the topic on which the research was conducted, theories
relatedto it, totalsample number,findings of theresearch & theconclusion.

2.2 Studies Conducted

https://www.academia.edu/42961894/COVID_19_IMPACT_ON_STUDENTS?sm=b
A few days later, the genome of a novel coronavirus was released (http://virological.org/t/novel-
2019-coronavirus-genome/319; Wuhan-Hu-1, GenBank accession No. MN908947) and made publicly
available to the scientific community. This novel coronavirus was provisionally named 2019-nCoV,
now SARS-CoV-2 according to the Coronavirus Study Group of the International Committee on
Taxonomy of Viruses. SARS-CoV-2 belongs to the Coronaviridae family, Betacoronavirus genus,
subgenus Sarbecovirus. Since its discovery, the virus has spread globally, causing thousands of deaths
and having an enormous impact on our health systems and economies. In this review, we summarize
the current knowledge about the epidemiology, phylogenesis, homology modeling, and molecular
diagnostics of SARS-CoV-2. Key Messages: Phylogenetic analysis is essential to understand viral
evolution, whereas homology modeling is important for vaccine strategies and therapies. Highly
sensitive and specific diagnostic assays are key to case identification, contact tracing, identification
of the animal source, and implementation of control measures.
1. Guha,Soma (November 2020) conducted a study/researc on
hjgh;pkhc,kmkjdxshghjlbccv,mbvcbvcv,.mnbcnm mbnn,mvhb, h

. Hellfeldt K, Lopez-Romero L & Andershed H (December 2019) conducted research on how


cyberbullying can affect the well-being of an individual as well as the mediation effect of social
support provided by family, friends & teachers. Investigation was done on 1707 young
adolescents (10-13 years old) out of whom 47.5% were girls, who filled the online questionnaire.
The study showed that the victim of cyber bullying suffered from a high level of depression &
anxiety when there was no support or very less support from their family. If a child is provided
with some kind of social support from family or from a teacher they show low levels of
depressive & anxiety symptoms. It was concluded that when a higher level of support is provided
from family & teachers, they are less likely to show the depressive & anxiety symptoms & higher
level ofwell-being.

2. Azam Z, Shoba J.K.S, 2018, study was conducted on the effects of cyber bullying amongst the
students less than 18 years old. Children below 18 were an easy target as it is the growing age & it
affects them throughout their life & develops fear. The paper deals with the impact of traditional
bullying & cyber bullying. It also deals with the awareness program for school students, teachers
as well as parents.

3. Livazovi. G.C, Ham.E, 2019, studied the role of socio-economic status, family, parenting
styles, peer relations & school factors in cyber-bullying & how emotional health is affected. A
survey was conducted on 259 participants out of whom 58.1% experienced cyber violence &
56.8 had nevercyberbulliedanyone.It was observedthat girls talk to othersabout cyberbullying as
compared to boys. Cyber bullies were majorly the ones who had low academic performances.
It is observed that girls are more often cyber bullied. It was observed that the role of, family,
parenting styles, peer relations & school factors least affected the cyber victimization profile. It
was observed that the students who had less educated mothers, low academic achievements &
hadleast expectationsfrom thesociety & peers, were less likely to get bullied.
Hence, it was concluded that the role of socio-economic status, family, parenting styles, peer
relations& school factorswere notthe major factorswhich wouldcause cyber-bullying.

4.Mattson S.A, Rafiq.R, Han R, December 2015, studied the various cyber bullying incidents
taking place on one of the widely used social media platforms i.e.; Instagram. Several data like
images and associated comments were collected. A study was then designed & then the study
was initiated online on a crowd sourced website. Later the analysis was done & it was found that
the cyber bullying incident was associated with the cyber aggression, profanity (swear words),
linguisticcontent,temporal commenting behavior& image content.

5.Snell.P.A, Englander.E.K, 2010, study was conducted to observe gender trends in cyber
bullying. Earlier pilot study was conducted on girls. Both pilot study & Preliminary results
showed that the girls are often involved in cyberbullying as victims as well as perpetrators. The
research also said that more further researches should be conducted to examine the gender trend
in cyberbullying.

6.Dr. Singh P.N, Prof. Motwani A & Pande P, November, 2015, conducted study on cyberbullying
in India. It is said that cyberbullying is repeated harm caused to any person through the use of
any electronic gadgets. Cyberbullying is hurting, insulting or/and being rude to any person,
teasing anyone online by uploading inappropriate pictures, videos or making comments on
anyone.‗GlobalYouthOnlineBehaviourSurvey‘was conductedof 25 countries

by Microsoft in which China was on first position with 70% in cyberbullying, followed by
Singapore 58% & on third place was India with 53% (children aged between 8 - 17). According to
the stats it was concluded that 1 in every 5 children was a victim of online cyberbullying. Due to the
increase in the cases of cyberbullying suicide rate has increased worldwide. The court has
to take strict action on cyberbullying activities that occur before it could turn fatal for someone.
The paper is about how cyberbullying is affecting the world & how it doesn‘t only harass anyone
onlinebutalso defamesan individualbecause thingsspreadeasily online.

7.Aune (2009) Review of a literature was done related to cyberbullying. It was observed that
with the increase in the technology it has become easy for everyone to access it not only for
adults but even for students of school and college. It was also observed that with the increase in
the technology the crime was also increasing it was termed as cyber-crime. Cyber-crime takes
place through prank calls, instant messaging, etc. It was found that cyberbullying was more
prevalent in girls as compared to boys. Cyber victims can be emotionally disturbing and can
become as serious as the victim can even commit suicide. Two cases are included in the paper.
The paper also discusses preventive measures and intervention that can be taken by parents,
teachers andstudents.

8.Roy K (September 2018) study was conducted on teachers & students of the schools in West
Bengal & to find the various reasons & cultural differences through other sets of data (secondary
data). Study was conducted to know the prevalence of cyberbullying in our country (India). After
the completion of the study it was observed that the girls were the most affected by
cyberbullying. The online bullying is rapidly increasing in India. It concluded that to control
cyberbullyingactivitycertain stepsneedto be taken& changes haveto be made in laws.

9.Mukherjee S, Sinha D, De A, Misra R, Pal A & Mondal T. K (March 2020) Study was conducted
in two higher secondary schools in Kolkata to observe the prevailing cyberbullying amongst the
adolescents with the use of information technology. Study was conducted on 254 students with
the help of questionnaire & it was observed that 210 i.e.; 82.7% of the students were using
social networkingsites. 10.5% (22) out of 210 studentsexperienced

cyberbullyingout of which 16 studentscouldn‘tunderstandit, rest of the studentssought their


friends'help.The research showedthatcyberbullyingis increasingday byday.
10.Minocha L & Minocha S, (July 2017) conducted a research on the prevention of cyber
stalking & safety of teenagers over the internet. After the study of the stats given by NCRB it was
observed that there was a rise in cybercrime by 69% in a year from 2013 to 2014. Teenagers are the
most affected from cyberbullying. Children start the use of information technology at an early age
because of various reasons, unaware of the do‘s & don‘ts of cyberspace. It was observed that
the majority of them knew about the safety measure & some of them were aware about the
sufficient knowledgeof cyberspace.

11.Bennett B. S, May 2013 conducted a critical analysis study on young adolescents &
teenagers in Georgia. The study shows that cyberbullying is more detrimental than the traditional
bullying as it takes place off the school grounds. More number of teens & young adolescents
have access to technology which can help bullies to bully anyone at any time & provides them
various platforms to do so. Cyber bullying has less to a higher level & short to long term harmful
effect on the victims. It not only harms the psychology of the cyber bully victim but also affects
cyber-bystanders as well as the bullies themselves. Since the bullies are not monitored by
teachers or any staff members online, they find it convenient to bully anyone online. School
administrators are trying their best but struggle to protect students from getting cyber bullied.
School administrators should update the guidelines to protect students against cyber bullying.
The author‘s purpose was to sensitize students & make them aware of the current policies placed
by theofficials.

12.Saravanan M, Baskaran M, Maheshwari T, Dr. Jayasudha A, Benita (June 2019) conducted


research to see the effectiveness of cyber therapy programme on management of cyber bullying
experiences among adolescents in PSG Sarvajana Higher secondary school, Coimbatore. As the
technology kept growing in the last two decades the cybercrime rate also went up with it, it is
affecting 10% to 15% adolescents which are also causing negative health effects. Earlier
questionnaires were administered on 1500 out of which, 30 samples who were identified to be
with issues & cybertherapyprogrammewere administered.37 % experienced

cyberbullying in pre-test as compared to 81% in post-test. Out of which 25% experiencedsevere


cyberbullying & 2 % in the post test. It was observed that the cyberbullying problem was
reducedaftertheprogramme.

3. CONCLUSION:
After reviewing the above mentioned articles & papers of a few papers related to cyberbullying, it
can be said that crime cannot only take place physically with a person but that can also happen
through the use of Information technology & communication (ICT).As the technology is
developed throughout the decade it bought advantages as well as certain disadvantages with it.
The crime which occurs with the use of the technology either on the computer, laptop, mobile
through social media sites, e-mails, etc.by putting comments on an individual‘s picture saying
something mean about them, being rude, hurting the modesty of an individual by any possible
ways, which harms an individual emotionally as well as mentally this is known as
―cyberbullyingǁ. In some cases the victim of cyberbullying suffers from depression & few of them
tend to take their life. In many researches it was observed that the girls are more vulnerable to
cyberbullying as compared to boys. The victim of cyberbullying in most of the cases does not share
their problem with anyone, in case if they share their problems then they would probably share
their problem & seek help from their friends. As the technology is progressing we also need to
be aware about the pros and cons of it & make our children aware about it. Government has to
takeserious stepsto control theincreasing cybercrime.

4. REFERENCES
1.Hellfeldt K, Lopez-Romero L Andershed H (December 2019) Cyberbullying and
PsychologicalWell-beinginYoungAdolescence: The PotentialProtectiveMediationEffects of
Social Support from Family, Friends, and Teachers. (https://www.mdpi.com/1660-
4601/17/1/45/htm)

2.Azam Z, ShobaJ.K.S( 2018)A studyon cyberbullying amongschool students.


(https://acadpubl.eu/hub/2018-120-5/1/42.pdf)

3. Livazovi.G.C, Ham.E (2019) Cyberbullying andemotional distress in adolescents: the


importance of family, peers and school.
(https://www.sciencedirect.com/science/article/pii/S2405844019356178#sec1
.3)

4.MattsonS.A, Rafiq.R, Han R, (December 2015)AnalyzingLabeled CyberbullyingIncidents on the


Instagram Social Network.
(https://www.researchgate.net/profile/Richard_Han2/publication/300208221_Analyzing_Label
ed
_Cyberbullying_Incidents_on_the_Instagram_Social_Network/links/57a17b1808ae5f8b258972
2 c/Analyzing-Labeled-Cyberbullying-Incidents-on-the-Instagram-Social-Network.pdf)

5.Snell.P.A,Englander.E.K,(2010) CyberbullyingVictimizationand BehaviorsAmong


Girls:Applying Research Findings in the Field.
(https://core.ac.uk/download/pdf/48826397.pdf)

6.Dr. Singh P.N, Prof. Motwani A & Pande P (November 2015) Cyber-bullying – Horrors, Analysis
& Remedies in India.
(https://www.google.com/url?sa=t&source=web&rct=j&url=http://euroasiapub.org/wp
content/uploads/2016/09/2IMNov-2849-1.pdf&ved=2ahUKEwjk
eWno7XoAhXIwzgGHVn6ChI4HhAWMAh6BAgAEAE&usg=AOvVaw04IMMDq_WHFsrF_
ETG_mKK)

7.Aune, Nicole M. Cyberbullying (2009) American Psychological Association 5th edition.


(https://www.google.com/url?sa=t&source=web&rct=j&url=https://www2.uwstout.edu/conten
t/l ib/thesis/2009/2009aunen.pdf&ved=2ahUKEwjLrs6b7a3oAhUzyTgGHTJZCe0QFjABegQIAxA
B&usg=AOvVaw3-L6hbe946sEhWTUFnYU4t)

8.Roy K (September 2018) Adolescents' interaction on the internet: student and teacher
perceptions of cyber bullying.
(https://www.google.com/url?sat&sourceweb&rctj&url%=https://www.ijmra.us/project%20do
c/ 2018/IJRSS_SEPTEMBER2018/IMRA14409.pdf&ved=2ahUKEwiExako7XOAHVR4zgGHeF
gBqU4FBAWMAJ6BAGHEAE&usg=AOvVawolch1F6gxtBE_y_aoiFwAw)
9.MukherjeeS, Sinha D, DeA, Misra R, PalA & MondalT.K (March2020) Cyberbullying among Late
Adolescent:A Cross-sectional StudyinTwoHigher SecondarySchools of Kolkata, West Bengal.
(http://www.ijph.in/article.asp?issn=0019-
557X;year=2019;volume=63;issue=1;spage=86;epage=88;aulast=Mukherjee)

10.MinochaL & Minocha S (July 2017) Preventionof cyberstalking safetyof teenagersover


internet as a medium- a study. (http://www.mcu.ac.in/media-mimansa/2017/July-September
2017/mm-12-22.pdf)

11.Bennett B. S, (May 2013) Cyberbullying Among School-Aged Adolescents and Teens: A Policy
Review and Recommendations for Georgia.
(https://www.google.com/url?sa=t&source=web&rct=j&url=https://scholarworks.gsu.edu/cgi/vi
e wcontent.cgi%3Farticle%3D1291%26context%3Diph_theses&ved=2ahUKEwiDiZqV7K3oAhU
GyzgGHUIUAwMQFjARegQIBRAB&usg=AOvVaw0232JotkS2NprC6ACAc9eM&cshid=158
4872378304)

12.Saravanan M, Baskaran M, Maheshwari T, Dr. Jayasudha A, Benita, (June 2019) Effectiveness


of cyber therapy programme on management of cyber bullying experiencesamong adolescents,
PSG Sarvajana Higher Secondary School
(https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.ijsrr.org/down_82880.
php&ved=2ahUKEwjSst6io7XoAhUNzzgGHeEwCh84ChAWMAR6BAgAEAE&usg=AOvVa
w0gDwgkbDX2_W0SRqCI3bTX)
CHAPTER– III: DEVELOPMENT OF INSTRUCTIONAL
MODULE/PROGRAMME

1. Introduction

An instructional module is a self-contained unit that focuses on a specific learning goal or


instructional focus. It usually contains documents, multimedia experiences, discussion boards,
and information for the student and groups to use. Instructional module used in this research was
donevia online modeand hence, can be called as an onlinetrainingmodule.

2. Development of Instructional Module/ Programme

For any online training module to be implemented it is necessary to know the sample for the
research. Content of the module needs to be planned in proper sequence and necessary resources
to be uploaded. After the completion of the module post test can be conducted in any form like a
questionnairecan be given onlineor in quizform.

(a)Content Analysis - Cyber-crimes, types of cyber-crimes, cyberbullying, types of cyberbullying,


effects of cyberbullying, Precautionary measures for cyberbullying and security measures, laws,
helplinenumberfor cyberbullying

(b)Learner Analysis - Studentshaveknowledgeof basic usage of varioussocial media


platforms.

(c) Designing- Designing is to plan out things and work in order to achieve the goal.

1. Learning outcomes- After the implementation of awareness program the student will be
able to

∙ Define online harassmentin theirown words.

∙ Explainthe term cyber-crimesin theirown words.

∙ Enlistthe typesof cybercrimes.

∙ Define cyberbullyingin theirown words.

∙ Differentiatebetween in personbullyingand cyberbullying.

∙ Enlistthe typesof cyberbullying.


∙ Discuss precautionarymeasures of cyberbullying.

∙ Sensitizelearnersaboutconsequences of cyberbullying.

∙ Adaptsafe cyberpractices.

2. Methodology- Virtualclassroom (Google Classroom)

3. Creating an instructional strategy

-Pre instructional activities:


1. Developmentof a questionnaireon thetopic and its approvalfrom theguide.
2. Generatinguniqueclassroom code.
3. Enrollingstudentsin Google Classroom viacode.
4.Fillingup a Pre-testGoogle form to understandtheir entrylevel knowledge/awarenessabout
thetopic of research.

∙ Learners Activities:
1.ReferringthePower pointpresentationrecording,Manuals/ handout andwatching videos
about CyberbullyingAwareness

2. Developmentanddiscussions of cyberbullyingcase on a blog


- Evaluation Activity: Fillingupa Post-test Google form to understandthe effect of Online
TrainingModuleon the awarenesslevel aboutthetopic of research on students

(d) Implementation

∙ Implementation stageandanalysis is discussed in thenextchapter

3.3 Conclusion

The instructional module was completely online and hence there were lots of challenges. Each
and every resource which was supposed to be uploaded in the classroom was carefully chosen,
recording of power point presentations was also uploaded and a blog for a case study. Every step
was planned afterconsideringthe pre-test responsesof students.
3.4 References

1.Whatis InstructionalModules| IGI Global. . RetrievedApril 2020, from (https://www.igi


global.com/dictionary/building-relationship-through-learning-communities-and-participation-
in online-learning-environments/51368)

2.SoledadMina Roguel.. Instructionalmodule andits components.RetrievedMay 2020, from


(https://studylib.net/doc/8976661/instructional-module-and-its-components)

3.McLeod, S.A. (2018). Questionnaire: definition, examples, design and types. Simply
Psychology.(https://www.simplypsychology.org/questionnaires.html)

4.Bhattacherjee, A. . Sampling. Retrieved May 2020, from


(https://courses.lumenlearning.com/suny-hccc-research-methods/chapter/chapter-8-
sampling/)

5.Kabir, & Muhammad, S. (2016, October 7). METHODS OF DATA COLLECTION. Retrieved May
2020, from
https://www.researchgate.net/publication/325846997_METHODS_OF_DATA_COLLECTION)

6.Kona Bansal, S., Onika Dalrymple, O., & Gaffar, A. (2015, June 14). Design, Development, and
Implementation of Instructional Module Development System (IMODS). Retrieved May 2020,
from www.asee.org ›ASEE-2015-Final_NSFGranteesSession_
CHAPTER – IV RESEARCH DESIGN

4.1 INTRODUCTION

Research consists of three steps – pose a question, collect data to answer the question and present
an answer to the question.

Importance of Research

1.EducationalResearch is veryimportantto bringsufficient changes in otherfields on the basis of


itsresults.
2.It helpsin finding newconcepts which were neglectedearlieror were not considered
important.
3. It helpsin finding solutionsto manyeducationalproblems.
4.Research carried out byteachers or researchersmake their knowledge moreauthenticand
objective.
5.It helpsstudentsto excel in theiracademic career to make newdiscoveriesand inventions
with it.

A research design is concerned with turning a research question into a testing project. Every
design has its positive and negative sides. The research design has been considered a ―blueprint
for research, dealing with at least fair problems, what question to study, what data are relevant,
what datato collect and howto analyzethe result.

A research design is the arrangement of conditions for collections and analysis of data in a
manner that aims to combine relevance to the research purpose with economy in procedure.
Research design provides the glue that holds all the elements in a research project together. A
designis used to structurea research.

A population is any group of individuals that has one or more characteristics in common and that
are of interest to the person doing the research. However, to study the entire population to arrive
at generalizationswouldbe impractical, so sample is required.
Definition

―Educational Research is that activity which is directed towards development of a science of


behavior in educational situations. The ultimate aim of such a science is to provide knowledge
thatwill permitto achieve its goals bythe most effectivemethodsǁ (J.W.Best)

The researchdesign for thisstudywas as follows:

1. Identifythe research problem.


2. Gettingit approvedbythe guide.
3. Settingtheaims, objectives,scope and delimitations.
4. On thebasis of the set objectivesgettingthe tool for data collection.
5. Carryingout theprocess of datacollection.
6. Carryingout theprocess of analysis andinterpretationof the data.
7. Drawingsignificant andmeaningfulconclusion.
8. Listingthe suggestionovertheproblem.

4.2 Sample

A sample is a subject of a population.It is a small proportionthatis selected for observationand


analysis.The process of collecting informationfrom a sample is reflected as sampling.

TYPES OF SAMPLING

❖ Probabilitysampling

Probability samples are selected in such a way as to be representative of the population. They
provide the most valid or credible results because they reflect the characteristics of the
population from which they are selected (e.g., residents of a particular community, students at an
elementary school,etc.

❖ Randomsampling
The term randomhas a veryprecise meaning.Each individual inthe populationof interesthas an
equal likelihood of selection. This is a verystrict meaningyou can'tjust collect responseson the
streetand havea randomsample.

❖ Stratifiedsampling

A stratified sample is a mini-reproduction of the population. Before sampling, the


population is divided into characteristics of importance for the research. For example, by gender,
social class, education level, religion, etc. Then the population is randomly sampled within each
category. If 38% of the population is college-educated, then 38% of the sample is randomly
selected from the college-educatedpopulation.

In this research, a sample comprised of 40 students of class 9th Standard, both girls and boys of St.
Anthony’s High School and Junior College which is Maharashtra State board situated in
Nallasopara (East).
Random Sampling Method is adopted in the project. It seeks to obtain precise information
concerning the current status of the problem and draw valid general conclusion and interpret
those conclusion.

4.3 Methodology of the Study

FollowingOne Group ExperimentalDesign was used

Table 4.1 Implementation of tools for data collection

DATE IMPLEMENTATION OF TOOLSFOR DATA TIMETAKEN FOR


(Mentionthe COLLECTION OF STANDARD DATACOLLECTION
dates (minutes)
accordingly)

12/11/2022 Pre-test 120


12/11/2022- ImplementationofOnlineTrainingModule 60
22/12/2022

10/01/2023 Post-test 200

Pre-test– X - Post-test

Pre-testandPost-test –The test containingitems thatwouldhelp in comparing the level of


perceptionandits effectivenesson theirachievementlevel

X -the groupon which experimentwas conductedusing the OnlineTrainingModuleon Google


classroom.

4.4 Target Group

Target group: - Selected from studentsof St. Anthony High School and JuniorCollege,
Nallasopara East,Palghar.

Table 4.2 Total no. of Boys and Girls of class

Total no. of Total No of Standard Name of School/College


students Students

Male 31 9Th Standard St. Anthony’s High School and


Junior College

Female 9

4.5 Tool for Data collection


A researcherwill requiredata gatheringtools which may varyin theircomplexity, designor
interpretation.Each tool must be appropriatefor the collection of certain type of information.

Thereare manytools of educationalresearch, fewof them are:-

∙ Questionnaire

∙ Opinionnaire

∙ Checklist

∙ Interview

∙ AchievementTest

∙ AptitudeTest

∙ IntelligenceTest

∙ PersonalityTest

Questionnaire:A questionnaireis a research instrument consisting of a series of questionsand


otherpromptsfor thepurposeof gatheringinformationfrom respondents.

Opinionnaire:A form containinga list of statements, each of which the members of a selected
groupare asked to endorse or reject, thepurposebeingto gatherinformationfor a survey.

Checklist:A list of items to be noted,checkedor remembered.

Interview:An interviewis a conversationbetween two people, i.e interviewerand interviewee


where questionsare asked bytheinterviewerto obtaininformationfrom the interviewee.

Achievement test:A test designed to measure the knowledge or proficiency of an individualin


somethingthathas been learnedor taught.Eg :ArithmeticorTyping.

Aptitude test: It assumes that individuals have inherent strengths and weakness, and are
naturally inclined towards success and failure in certain areas based on their inherent
characteristics.It is used to determinean individual‘spropensityto succeed in a given activity.

Intelligence test: A standardized test used to establish an intelligence level rating by measuring a
subject‘s ability to form concepts, solve problems, acquire information, reason and perform other
intellectualoperations.
Personality test:A test usuallyinvolvinga standardizedseries of questionsor tasks used to
describe or evaluatesubject‘spersonalitycharacteristics.

From the above mentioned tools of research, researcher have chosen a questionnaire tool for her
study which consists of 19 statements to find out the effectiveness of the awareness program. The
questionnaire used is very carefully constructed which contains statements that checks the
awarenesslevel of thestudentsabout‗Cyberbullying‘

Refer Appendix: A for the sample of Researchtool.

6. Data Collection Procedure


Data collection is essentiallypartof the research with the helpof which generalization ismade.
The researcher selected ―St. Anthony’s High School Junior College for the survey, permission
was taken from the Principalof the college to conduct the survey.The entiremodule was explained
to the Principal andapprovalwas takento carry it out.Withthe cooperation of the collegestaff and
studentstheAdministrationtool was made available for the studenton theappointeddayand
time given by the Principal of High school and junior college. Since the research was oriented
towards online mode, studentswere takento the IT lab.Theywere given a brieforientationabout
the program and guidedto operateGoogle Classroom. The studentswere given the class code and
researcher assisted them to join the virtualclassroom. The Pre-testquestionnairein the Google
form was made available to fill as per their knowledgeandunderstanding.The instructionswere
given and studentswere asked to fill the formshonestlyandfreely.
After studying the responses received from students, the online training module for awareness of
cyberbullying was designed to make it available for the students in the Google classroom.
Resource materials such as videos, power point presentations and a handbook of cyber safety
made by the Ministry of Home Affairs, Govt. of India was also added regarding the topic of
awareness and were made available online in the classroom. After a time period, the post test
questionnaire Google form was made available to all the students in the virtual classroom. Later,
theresponses were receivedfor furtheranalysis.

7. Conclusion
The research design beingthemost significant partof the entireresearch, it was done with
utmost care.The plannedactivitieswere implementedas planned andwas takencare to provide

appropriateand requireddetails to studentswhich may help them anytimein theirlife.Data were


obtainedandlater wasanalyzed.

4.8 References :

1.GunceKozaL.(2012,October 26). Inspiration &Understanding.Retrieved April 2020, from


(http://guncekozal.blogspot.com/2012/10/inspiration-
understanding.html?_escaped_fragment_)

2.Research Design.(2016, October). RetrievedMay2020, from


(http://mjsocialwork.blogspot.com/2016/10/research-
design.html)

3.RESEARCH SUMMARY, FINDING, CONCLUSION AND SUGGESTIONS. . Retrieved May2020,


from (https://shodhganga.inflibnet.ac.in/bitstream/10603/28049/14/14_chapter8.pdf)
CHAPTER – V ANALYSIS ANDINTERPRETATION

1. Introduction

Data analysis is the process of properly organizing raw data in order to get useful information. It is
a process of inspecting, transforming and modeling data with the goal of highlighting useful
information,suggestingconclusion andsupportingdecision making.
Data analysis is to make sense of the massive amounts of data, reduce the volume of information.
Identify significant patterns and construct a framework for communicating the essence of what
the datareveal.
Data interpretationis explainingthe analyzeddata.Researchers interpretdatausing statistical
procedures.
Researchers in thisaction researchfirst analyzedthe surveyeddata bypropertabulation andthen
didthe percentageanalysis of each statement.Bar graphis drawnto graphicallyinterpretdata .

2. Descriptive Analysis
∙Mean: a mean represents a numerical average for a set of responses. When dealing with a data
set (or multiple data sets), a mean will represent a central value of a specific set of numbers. It is
the sum of the values divided by the number of values within the data set. Other terms that can
be used to describe the concept are arithmeticmean, average and mathematical expectation.
∙Percentage :In mathematics, a percentage (from Latin per centum "by a hundred") is a number or
ratio expressed as a fraction of 100. The percent value is computed by multiplying the numeric
valueof the ratio by100.

∙ Arithmeticmean andpercentagewere used

∙ Interpretationwas done usingbargraphsas followswith referenceto the hypotheses.

Followingare the hypotheses:-

Ho 1 : There is no significant difference in the pre-test and post-test scores of students


of St. Anthony’s High School and Junior College.
Mean was calculated to analyze the data by using following formula:

ThereforeMeanwill be thesummation of all marks obtaineddividedbythe numberof


participantsin the program.i.e.;

Mean =

Percentage Mean Score =

Test Total Number of Mean Percentage


Students

Pre-test 40 8.525 42.62%

Post-test 40 13.625 68%

Mean scores convert into percentage score and if the percentage score are higher than 50% that
indicates hypothesis is rejected and lower than 50% would indicates that null hypothesis is
retained

Figure 5.1 Bar Graph of Mean of Pre-Test and Post-Test scores of Instructional Module on
Students
The difference in the post-test scores would indicate that the programme was effective in
enhancing the perception of students of St. Anthony’s high school and Junior College, Nallasopara
due to theawarenessprogramme.Hence, the nullhypothesiswas rejected.

Ho 2: There is no significant difference in the level of perception of girls & boys of


standard 9th due to the online training module.

Mean was calculated to analyze the data by using following formula:

Therefore,Meanwill be thesummation of all marks obtaineddividedbythe numberof


participantsin the program.i.e.;
Mean =

Percentage Mean Score =

Table 5.2 Mean of Pre-Test scores of Online training Module on Students among boys and
girls

Category Number of Mean Percentage


Students

Boys 31 8.64 43.20%

Girls 09 8.11 40.55%

Table 5.3 Mean of Post-Test scores of Online training Module on Students among boys and
girls

Category Number of Mean Percentage


Students

Boys 31 14.41 72.05%

Girls 09 10.88 54.40%

Figure 5.2 Comparative bar Graph of mean of Pre-test and Post-Test scores of
Instructional Module on students among boys and girls.
Mean scores convert into percentage score and if the percentage score are higher than 50% that
indicates hypothesis is rejected and lower than 50% would indicates that null hypothesis is
retained

The difference in the pre-test and post-test scores of boys and girls indicates that the program
was effective in enhancing the perception of boys of St. Anthony high school and Junior College,
Nallasoparadue to the awarenessprogramme.Hence, the null hypothesiswas rejected.

Ho3- There is no significant difference in the awareness level of students of


online training module on cyberbullying.

Comparative Analysis of the awareness level of students regarding cyberbullying.

∙ Things can be considered as online harassment.


Pre-test

Post-test

Figure 5.3 Bar Graph of opinion of „ Things that can be considered as online harassment‟

Before implementing the awareness training module online many students thought that unwanted
phone calls, undesirable and unwanted forwards and even promotional emails were a part of
online harassment. After the module was implemented it was observed that the maximum
studentsknew thatabuseandbullyingonline andevene-stalking is consideredas online

harassmentas the changecan be seen in the abovegraphwhich has increasedfrom 75% to


92.5%.

∙ Time spent on social media.


Pre-test

Post-test

Figure 5.4 Pie chart of Approximate time spent on social media by students

Some students have been seen to reduce the time they spend on social media but, there is no
marginal difference observed in the pre & post test. Even, the number of the students who
answeredalwaysremainsthe same.

∙ My DP is safe online.

Pre-test
Post-test

Figure 5.5 Pie chart of opinion „ Safety of DP on social media‟

Significant difference is observed in the chart from 25% to 52.5% of students for the opinion of
safety of DP on social media wherein they feel that profile picture are not always safe on social
media.Thoughmanyare not sure aboutthe safetyof theirprofile pictureon social media.

∙ Public Profile on various social media platforms and its privacy.

Pre-test
Post Test

Figure 5.6 Pie chart of privacy of Public profiles on different social media platforms

Difference is observed in the perception of students 62.5% of the students earlier opted for yes
option which means that their profile was public and could be easily viewed by anyone online. In
posttest, 87.5% students opted for the yes option which means that the students would follow the
privacysettingsto keeptheirprofile safe.

∙ Following social media trends.

Pre-test
Post-test

Figure 5.7 Pie chart of opinion of „following social media trends randomly

Marginal difference can be seen from 45% to 57.5% for the perception of the students that they
would not follow the social media trend in orderto fit in a friendcircle or to match up with all of
their agegroup.

∙ Social media as a platform to connect with friends and relatives.


Figure 5.8 Pie chart of opinion of „Social media as best and safest platform to connect with
friends and relatives‟

Perceptions of students have changed for rarely sharing their information and picture with
friends and relatives from 30% to 52.5%. Earlier 20% of students were in favour of sharingtheir
detailswith theirfriendsand relativesonlinewhich has nowchanged.

∙ Adding strangers to their account

Figure 5.9 Pie chart of opinion of “Adding strangers to account to increase the friend circle‟

Earlier 52.5% students said that they would never add strangers in their account and in post test
82.5% students said they would not add any stranger to their account in order to increase their
followers. But, there are still few students who may add strangers to increase the number of
their friends list.

The comparative analysis of difference between pre-test and post-test opinions indicates that
the program was effective in enhancing the perception of students of 9th Standard class of St.
Anthony’s High School and Junior College, Nallasopara due to the awareness program. Hence,
the null hypothesis was rejected.
5.3 REFERENCES

1. ANALYSIS OF QUALITATIVE DATA.Retrieved onApril 2020, from


(http://www.egyankosh.ac.in/bitstream/123456789/8391/1/Unit-
17.pdf)

2. Lebied.M.(2018,August22).A GuideToThe Methods, Benefits & Problems ofThe


Interpretationof Data. RetrievedMay 2020, from (https://www.datapine.com/blog/data
interpretation-methods-benefits-problems/)

3. Percentage.Retrievedon May2020, from (https://worddisk.com/wiki/Percentage/)

4.Percentage.Retrievedon May2020, from( https://en.wikipedia.org/wiki/Percentage)

CHAPTER – VI: CONCLUSION

6.1 Introduction

The research was carried out to know the Awareness level of students on cyberbullying. The
research was conducted online through virtual classroom viz.; Google classroom. Programme
was conducted in the three steps firstly, pre-test questionnaire followed by the online training
module which consisted of videos, powerpoint presentations and a handbook for the safety rules
to be followed for cyber usage was uploaded and lastly the post test form was uploaded and the
data was obtained for further procedure. Scores were given and interpreted and findings were
concluded.
6.2 Findings of the Study

Findingsare discussed as follows:

∙The 40 studentswho participated inthe awarenessprogram show a highermean score of 13.625


in the post test as compared to the mean score of 8.525 in the pre-test. ∙ The 40 students who
participatedin the programshow a higherpercentagescore of 68% in the post test as compared to
the percentagescore of 42.62% in the post-test. ∙ The post test score (545 marks) is higherthan the
pretest score (341 marks) outof the total (800 marks) of 40 students.
∙Significantdifferenceis observedin theperceptionof 31 boys(447 marks) as compared to 9

girls (98marks).
∙Remarkable differenceis seen in the awarenesslevel of studentsafter the implementationof the
awarenessmodule.

∙ The Null Hypothesesare rejectedon completion of the research.


∙The hesitance of studentswas observedthroughoutthe program for an onlinetraining module
of awarenesson cyberbullying.

The rejection of threeNull hypothesessuggests theeffectivenessof thedesign and


implementationof onlinetrainingmodule.

6.3 Suggestions for the Future Studies

For Researchers:-

Cyberbullying is one of the vast topic for any researcher. Many things are a part of this topic and can
be considered while doing research. When a research is being carried out for the same certain
things like what are the various ways of cyberbullying that can happen to anyone, ways to keep our
social media accounts safe, if anyone is doing the crime what are the punishments for several
crimes; can be mentioned in the research. During the collection of the data proper protocol
should be followed and prior permission should be taken to avoid any kind of hassle that may
interfere and may make it difficult for anyone. The last hypothesis of this research which was
related to the enthusiasm level of students towards the use of online training module has wider
scope andcould be studiedin detail.
For teachers and school personnel:-

Teachers can try their best to remain updated with the latest social trends and apps. This may
help teachers to make students aware about the ill uses of the app and how to avoid it. Schools
can plan a session on cyberbullying with the help of the parents and other stakeholders. This may
help students to understand how any online bullying can occur and how we can cope with it.
Students can be made aware about the various helpline numbers, website where any child can
reportaboutit andmainly whom theyshouldgo to reportin person.

4. Conclusion

Cyberbullying can occur with anyone but the most vulnerable ones are the teenagers. As
teenagers these days use various social media platforms without being aware about the privacy
setting and a lot more safer practices and may fall prey to any sort of cybercrimes. Research was
carried out on the students who have entered the college and are quite eager about various social
mediaplatformsand make newfriendsonline.From the findings of thisresearch, it can be said

that there is a lot more which students have to be aware about, the privacy and prevention of
cyberbullying. But there is a marginal difference in the awareness level of the students of 9th
Standard of St. Anthony’s High School and Junior College regarding cyberbullying after the
implementation of the online training module. More and more awareness should be created
amongst the teenagers, parents, school and other stakeholders of the society pertaining to
education, which in some or the other waymay helpto save anyonefrom beingbulliedonline.

5. References

1.Tacklingonlineharassment andpromotingonline welfare.(2019,September2). Retrievedon


May 2020, from https://www.universitiesuk.ac.uk/policy-and-analysis/reports/Pages/tackling
online-harassment.aspx
APPENDIX – A (Google Form – Questionnaire)

Appendix A (Ⅰ) Pre -test

1. Name of the Student

2. Age (in years)-

3. College Name

4.Standard & Division

Section A

Which social mediaplatformdo you use the most? (Ex. Facebook,Tik-Tok etc) Ans:

……………………………………………………………………….

1. Onlineharassment can happenon which social mediaplatform?


Ans:
…………………………………………………………………………..

3. Whichthingscan be consideredas onlineharassment?


a. Unwanted phonecalls,
b. undesirableandunwantedforwards.
c. emails (promotional)
d. abuseand bullyingonlinee.stalking.

4. How much time do you spendon social media?Specifyapproximatelyhow manyhoursa day.


a. 2hrsb.4hrsc. 6hrs d.8hrs e. always

5. How in personharassmentis differentfrom onlineharassment?


Ans:
…………………………………………………………………………..
6. Whatis publicandprivatemessaging?
Ans:
…………………………………………………………………………..

7. Is my DP alwayssafe on social media?

a.Yesb.No c. can‘t say

8.Which social media platforms you think are more likely to get hacked?
Ans:…………………………………………………………………………..

9. Whom shoulda person needto reportin case of online harassment?


Ans:
…………………………………………………………………………..

10. What is hacking?


Ans.
………………………………………………………………………………………...

11. Whatare the precautionsthatcan be takento preventhacking?


Ans:
…………………………………………………………………………..

Section B
Please select the option you feel is right.
12. I havepublicprofiles on different social mediaplatforms.
a.Yesb.No

13. I use #followforfollowtrend

a.Alwaysb.Often c. Sometimes d.Rarelye. Never

14. I feel social mediais the best and safest channelto know my friendsand relatives aboutmy life
in and out.
a.Alwaysb.Often c. Sometimes d.Rarelye. Never

15. I like to add strangersto my account to increase my friendcircle.


a.Alwaysb.Often c. Sometimes d.Rarelye. Never

SECTION C
Answer following questions
16. Whatare 3 R'sof cyber-crime?
............................................................................................................................................................

17. How will you recognize ifsomeone is beingharassed online?

............................................................................................................................................................

18.How will you make people awarethatonline harassmentis a crime andshouldbe reported
immediately?

............................................................................................................................................................

19. Whatare the consequencesof online harassmentfor the victim?


...........................................................................................................................................................
.
AppendixA(Ⅱ)

Post-test

1. Name of the Student

2. Age (in years)-

3. College Name

4. Standard & Division

Section A

1.Which social mediaplatformdo you use the most? (Ex. Facebook,Tik-Tok etc)

Ans: ……………………………………………………………………….

2. Onlineharassment can happenon which social mediaplatform?


Ans: …………………………………………………………………………..

3. Whichthingscan be consideredas onlineharassment?


a. Unwanted phonecalls,
b. undesirableandunwantedforwards.
c. emails (promotional)
d. abuseand bullyingonlinee.stalking.

4. How much time do you spendon social media?Specifyapproximatelyhow manyhoursa day.


a. 2hrsb.4hrsc. 6hrs d.8hrs e. always

5. How in personharassment is differentfrom online harassment?


Ans:
…………………………………………………………………………..

6. Whatis publicandprivatemessaging?
Ans:
…………………………………………………………………………..
7. Is my DP alwayssafe on social media?
a.Yesb.No c. can‘t say

8.Which social media platforms you think are more likely to get hacked?
Ans:…………………………………………………………………………..

9. Whom shoulda person needto reportin case of online harassment?


Ans:
…………………………………………………………………………..

10. What is hacking?


Ans.
………………………………………………………………………………………...

11. Whatare the precautionsthatcan be takento preventhacking?


Ans:
…………………………………………………………………………..

Section B
Please select the option you feel is right.

12.I wouldfollowthe privacysettingsof the social mediaplatformto keep my profile safe from
beingmisused.

a.Yesb.No

13. I wouldfollowsocial mediatrendblindlyto fit in my friendcircle or match up with the other of


myage.

a.Alwaysb.Often c. Sometimes d.Rarelye. Never

14. I wouldpost pictures& detailedinformation aboutthe picture& location to helpmy friends


& relativesknow aboutme.
a.Alwaysb.Often c. Sometimes d.Rarelye. Never

15. I wouldaddanyoneto my friendslist to increase the numberof followers.

a.Always b.Often c. Sometimes d. Rarelye. Never

SECTION C
Answer following questions

16. Whatare 3 R'sof cybercrime?


............................................................................................................................................................

17. How will you recognize ifsomeone is beingharassed online?

............................................................................................................................................................

18.How will you make people awarethatonline harassmentis a crime andshouldbe reported
immediately?

...........................................................................................................................................................

. 19.Whatare the consequencesof onlineharassmentfor the victim?

...........................................................................................................................................................

.
APPENDIX – B (Presentation used for awareness)

Blog llink

https://www.blogger.com/blogger.g?blogID=8167950923012889937&pli=1#editor/target=post;postID
= 8
527777887644505418;onPublishedMenu=allposts;onClosedMenu=allposts;postNum=0;src=postname

Video links

1. https://youtu.be/lvJm0d9xEu8
2. https://www.youtube.com/watch?v=0YpA7JGRC-0#action=share
3. https://www.youtube.com/watch?v=5wjKb4DAhI4#action=share

Handbooks/Manuals

1. CyberSafeGirl.pdf(www.cybersafegirl.com)
2.A HandbookforAdolescents/Studentson Cybersafety- By Ministryof HomeAffairs, Govt. of
India.
Appendix C (Data Sheet)
Names Pre test Post test
(out of 20 (out of 20
marks) marks)

PATEL SALMANUSMAN 5 12

shaikh zainub(F) 9 9

Shukran 13 16

jonas 11 13

REYHAAN 8 14

azim nisarkhan 4 15

ShaikhVaqar 7 8

7 14
IBRAHIM MIRZABEGMIRZAIZHAR BEG

Shighrekar habibazim 7 4

skabdulmuksitsk abdulhaque 6 16

sunilsharma 11 18

Suraj SandeepNaidu 14 17

SaadAnsari 7 12

Ansulsharma 7 15

MalikNoorAlamMohdJalaluddin Malik 8 13

Shaikh MohammedFurqan 4 17

SUMEET MISHRA 10 16

madhuri joshi(F) 11 16

aisha qureshi(F) 3 7

sahil navnathchavan 7 17

MohitPadave 8 10

umatiyasahil 9 17

AbhishekYadav 5 17

Arifkhan 10 11
MadooriSandesh 10 19

Navneet SantoshPadave 15 17

MauryaAkashAnil 9 14

anmol 1 11

YadavSumitRamAwadh 6 18

AdityaVedak 14 15

shaikhabuzar 15 16

ubaidullahsiddiqui 8 14

qureshimdsahibealammdnural 7 14

k.sanjaykumar 15 17

Jagruti 9 12

Vaidehi GovindKalgutkar 9 11

Mariya MunirPoonawala 10 11

Sneha VirendraPandey 8 6

Shirin 5 10

Dhadkan 9 16

Total 341 545

Average (Mean) 8.525 13.625

Percentage Mean score 42.62% 68%

Girls= 09 Pre Test Post Test

Total Marks 73 98

Average(Mean) 8.11 10.88


Pre Test
Boys=31 Post Test

Total Marks 268 447

Average(Mean) 8.64 14.41

Bibliography

1.Ben-Joseph,B.-J. (2018,April).Cyberbullying(forTeens)- Nemours KidsHealth.Retrieved April


2020, from (https://kidshealth.org/en/teens/cyberbullying.html)

2.CyberbullyingDefinition.. RetrievedApril 2020, from


(https://definitions.uslegal.com/c/cyber-bullying/)

3.cybernetics| Origin and meaningof cyberneticsby OnlineEtymology Dictionary. . Retrieved


April 2020, from (https://www.etymonline.com/word/cybernetics)

4.McGarry, O. (2019, November 20). How to Develop an Online Training Module for Your
Corporate Learning. Retrieved April 2020, from (https://www.learnupon.com/blog/develop
online-training-module/)

5.MinisterievanJustitie enVeiligheid.(2016, October 5). Formsof cybercrime.Retrieved April


2020, from(https://www.government.nl/topics/cybercrime/forms-of-cybercrime)

6.NorbertWienerPrize inAppliedMathematics(AMS-SIAM NorbertWiener Prize inApplied


Mathematics). . Retrieved June 1, 2020, from (http://www.ams.org/prizes
awards/paview.cgi?parent_id=33)

7.Psychological effects of cyberbullying,trolling,harassment, stalking. (2019). Retrieved April


2020, from(http://cyberbaap.org/cyberbullying/effects-of-cyberbullying/)
8.The Introduction To Cyber Bullying Media Essay. (2019, March 18). Retrieved from
(https://www.ukessays.com/essays/media/the-introduction-to-cyber-bullying-media-
essay.php)

9.Turner,B.A. (2020, May2). 1 BillionMore PhonesThanPeople InTheWorld!Retrieved from


(https://www.bankmycell.com/blog/how-many-phones-are-in-the-world)

10. Hellfeldt K, Lopez-Romero L Andershed H (December 2019) Cyberbullying and


PsychologicalWell-beinginYoungAdolescence: The PotentialProtectiveMediationEffects of
Social Support from Family, Friends, and Teachers. (https://www.mdpi.com/1660-
4601/17/1/45/htm)

11.Azam Z, ShobaJ.K.S( 2018)A studyon cyberbullying amongschool students.


(https://acadpubl.eu/hub/2018-120-5/1/42.pdf)

12.Livazovi.G.C, Ham.E (2019) Cyberbullyingandemotional distressin adolescents: the


importance of family, peers and school.
(https://www.sciencedirect.com/science/article/pii/S2405844019356178#sec1.3)

13.Mattson S.A, Rafiq.R, Han R, (December 2015) Analyzing Labeled Cyberbullying Incidents on
the Instagram Social Network.
(https://www.researchgate.net/profile/Richard_Han2/publication/300208221_Analyzing_Labe
led
_Cyberbullying_Incidents_on_the_Instagram_Social_Network/links/57a17b1808ae5f8b2589
72 2 c/Analyzing-Labeled-Cyberbullying-Incidents-on-the-Instagram-Social-Network.pdf)

14.Snell.P.A, Englander.E.K, (2010) Cyberbullying Victimization and Behaviors Among


Girls:ApplyingResearch Findingsin theField.
(https://core.ac.uk/download/pdf/48826397.pdf)

15.Dr.SinghP.N,Prof. MotwaniA & PandeP (November2015) Cyber-bullying –Horrors,


Analysis & Remedies in India.
(https://www.google.com/url?sa=t&source=web&rct=j&url=http://euroasiapub.org/wp
content/uploads/2016/09/2IMNov-2849-1.pdf&ved=2ahUKEwjk
eWno7XoAhXIwzgGHVn6ChI4HhAWMAh6BAgAEAE&usg=AOvVaw04IMMDq_WHFsrF_
ETG_mKK)

16.Aune, Nicole M. Cyberbullying(2009)American PsychologicalAssociation 5th edition.


(https://www.google.com/url?sa=t&source=web&rct=j&url=https://www2.uwstout.edu/conte
nt/l

ib/thesis/2009/2009aunen.pdf&ved=2ahUKEwjLrs6b7a3oAhUzyTgGHTJZCe0QFjABegQIAx
A B&usg=AOvVaw3-L6hbe946sEhWTUFnYU4t)

17.Roy K (September 2018) Adolescents' interaction on the internet: student and teacher
perceptions of cyber bullying.
(https://www.google.com/url?sat&sourceweb&rctj&url%=https://www.ijmra.us/project%20do
c/ 2018/IJRSS_SEPTEMBER2018/IMRA14409.pdf&ved=2ahUKEwiExako7XOAHVR4zgGHeF
gBqU4FBAWMAJ6BAGHEAE&usg=AOvVawolch1F6gxtBE_y_aoiFwAw)

18.MukherjeeS, Sinha D, DeA, Misra R, PalA & MondalT.K (March 2020) Cyberbullying among
LateAdolescent:A Cross-sectional StudyinTwoHigher SecondarySchools of Kolkata, West
Bengal. (http://www.ijph.in/article.asp?issn=0019-
557X;year=2019;volume=63;issue=1;spage=86;epage=88;aulast=Mukherjee)

19.MinochaL & Minocha S (July 2017) Preventionof cyberstalking safetyof teenagersover


internet as a medium- a study. (http://www.mcu.ac.in/media-mimansa/2017/July-September
2017/mm-12-22.pdf)

20.Bennett B. S, (May 2013) Cyberbullying Among School-Aged Adolescents and Teens: A Policy
Review and Recommendations for Georgia.
(https://www.google.com/url?sa=t&source=web&rct=j&url=https://scholarworks.gsu.edu/cgi/vi
e wcontent.cgi%3Farticle%3D1291%26context%3Diph_theses&ved=2ahUKEwiDiZqV7K3oAhU
GyzgGHUIUAwMQFjARegQIBRAB&usg=AOvVaw0232JotkS2NprC6ACAc9eM&cshid=158
4872378304)

21. Saravanan M, Baskaran M, Maheshwari T, Dr. Jayasudha A, Benita, (June 2019) Effectiveness
of cyber therapy programme on management of cyber bullying experiencesamong adolescents,
PSG Sarvajana Higher Secondary School
(https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.ijsrr.org/down_82880.
php&ved=2ahUKEwjSst6io7XoAhUNzzgGHeEwCh84ChAWMAR6BAgAEAE&usg=AOvVa
w0gDwgkbDX2_W0SRqCI3bTX)

22. Whatis InstructionalModules| IGI Global. . RetrievedApril2020, from (https://www.igi


global.com/dictionary/building-relationship-through-learning-communities-and-participation-
in online-learning-environments/51368)

23.SoledadMina Roguel.. instructionalmodule andits components.RetrievedMay 2020, from


(https://studylib.net/doc/8976661/instructional-module-and-its-components)

24.McLeod, S.A. (2018). Questionnaire: definition, examples, design and types. Simply
Psychology. (https://www.simplypsychology.org/questionnaires.html)

25.Bhattacherjee, A. . Sampling. Retrieved May 2020, from


(https://courses.lumenlearning.com/suny-hccc-research-methods/chapter/chapter-8-sampling/)
26. Kabir, & Muhammad, S. (2016, October 7). METHODS OF DATA COLLECTION. Retrieved May
2020, from
(https://www.researchgate.net/publication/325846997_METHODS_OF_DATA_COLLECTION

27.Kona Bansal, S., Onika Dalrymple, O. & Gaffar, A. (2015, June 14). Design, Development, and
Implementation of Instructional Module Development System (IMODS). Retrieved May 2020,
from www.asee.org ›ASEE-2015-Final_NSFGranteesSession_

28. GunceKozaL.(2012,October 26). Inspiration& Understanding.RetrievedApril 2020, from


http://guncekozal.blogspot.com/2012/10/inspiration-
understanding.html?_escaped_fragment_

29.Research Design.(2016, October). RetrievedMay2020, from


(http://mjsocialwork.blogspot.com/2016/10/research-
design.html)

30.RESEARCH SUMMARY, FINDING, CONCLUSION AND SUGGESTIONS. Retrieved May2020,


from (https://shodhganga.inflibnet.ac.in/bitstream/10603/28049/14/14_chapter8.pdf)

31. ANALYSIS OF QUALITATIVE DATA.RetrievedonApril 2020, from


(http://www.egyankosh.ac.in/bitstream/123456789/8391/1/Unit-17.pdf)

32.Lebied, M.(2018,August 22).A GuideToThe Methods,Benefits & Problems ofThe


Interpretation of Data. Retrieved May 2020, from (https://www.datapine.com/blog/data
interpretation-methods-benefits-problems/)

33. Percentage.Retrievedon May2020, from (https://worddisk.com/wiki/Percentage/)

34. Percentage.Retrievedon May2020, from (https://en.wikipedia.org/wiki/Percentage)

You might also like