Professional Documents
Culture Documents
on
Year
2022-23
University of Mumbai
Maharashtra 401501
Certificate
I, Jennifer Sunil Nunes of Diwakar Patil College of Education, hereby declare that the
Action Research entitled ―Effect of Online Training Module of Cyberbullying on the
Awareness Level of Students " is my own work and has been carried under the
supervision and guidance of
Mrs. Ujwala Kharat.
The information and data given in the report is authentic to the best of my knowledge.
This project report is not submitted to any other universityor institution for the
awardof any degree, diploma or fellowshipor published any time before.
Signature of Student
Date:
ACKNOWLEDGEMENT
I would also like to express my heartfelt thanks to our guide Mrs. Ujwala Kharat for
her enthusiasm and immense knowledge. I would also like to thank Mrs. Marliyn
S Parakel who initially guided us from the scratch about the review of literature
which, I think, was required for me. It wasa great learning experience.
I would also like to thank the Principal Charlotte Gabriel of St. Anthony High
School and Junior College, Nallasopara (East) and the staff for allowing us to do
our research work. I would also like to thank them for their patience and
cooperation throughout.
Signature of Student
Date:
Content Page No
Title Page I
Certificate II
Declaration III
Acknowledgement IV
Table ofContent V
CHAPTER – I : INTRODUCTION
1.1 Introduction 1
1.3 Title 5
1.11 References 8
2.1 Introduction 10
2.2 StudiesConducted 10
2.3 Conclusion 14
2.4 References 14
3.1 Introduction 17
3.3 Conclusion 18
3.4 References 19
4.1 Introduction 20
4.2 Sample 21
4.3 Methodologyof the Study 22
4.4 TargetGroup 23
4.7 Conclusion 25
4.8 References 26
5.2 DescriptiveAnalysis 27
5.3 References 39
CHAPTER –VICONCLUSION
6.1 Introduction 40
6.4 Conclusion 41
6.5 References 42
APPENDIX –A : ResearchTool(Google form - Questionnaire) 43
APPENDIX – B : Administrativetool 46
Bibliography 56
LIST OF TABLES
Table Title of the Table Page
No No
LIST OF FIGURES
Graph Title of the Figures Page
No No
CHAPTER I:
INTRODUCTION
1.1 Introduction
“Being the bully on the internet is a sign of insecurity & weakness.”
- Rev Run (Joseph Simmons)
Just like we humans have evolved from a tiny creature that was born in the water to what
we are today in the 21st century, which is known as the age of technology. As, now we are
surrounded by various technologies like cell-phones, laptops & flat television with high definition
details. Today technology has become an integral part of our lives. In earlier days having a
telephone & computer at home was a sign of luxury but not today. In today‘s day there are many
families who have computer or laptop with them as it has become very essential not only for
adults who work but even for students. It serves as a gadget which helps in communication &
with computers & laptops and mobile phones are also an essential part and an easiest way for
communication. The way people communicated 30 years ago & the way people are
communicating now is way different. Just like the evolution of man the technology also evolved
gradually, in the 21st century growth of technology is at its peak, where in 5.28 billion people
from 7.77 billion people are unique mobile subscribers which is 67.95 % of the world
population. There are still many people who cannot afford a smart phone & some cannot afford
evena mobile phoneto communicate to theirlovedones.
Communication has changed a lot from ancient times by using animals, birds and ‗the
marathon man‘ to today‘s day where we are just a few clicks away & we can talk to anyone
around the world. We can also search for anyone on the various social media platforms like
Facebook, Snapchat and Instagram and so on. These platforms are an easy way to connect to
people, know them & learn from the world. Teenagers today are using the internet more than
ever. They view the internet and even more so the mobile phones as positive aspects of our
society. The internet and mobile phones systems are the two biggest systems of communication
which play a crucial role in our daily activities and development of identities. On the other hand,
these same technologiesare also oftenused negatively.Some are hurtbytherudecomments,
mean personal messages, putting their corrupted photos, morphingfacesof anyindividualon the
other, spreading rumours and many more. Many children are the targets of bullying via the
internet or mobile phones resulting in total confusion on the part of the ―target. Very often,
children are not able to understand that what they are going through is a form of bullying. As a
result the previously safe environment of the internet is now becoming a source of confusion and
anxiety. This form of things which hurt the modesty of an individual is considered as
‗Cyberbullying‘ which comes under a term called ‗cyber crimes‘. ‗Cyber crimes‘ is a big
umbrella term for many crimes that take place online such as hacking, stealing data online,
stalking someone online,it also includesbullying someoneonlineand manymore.
(https://www.etymonline.com/word/cybernetics)
Figure 1.1 (U.S Mathematician
Cybercrimes
The bane of the internet, cybercrime refers to any and all illegal activities carried out using
technology. Cybercriminals — who range from rogue individuals to organized crime groups to
state-sponsored factions — use techniques like phishing, social engineering, and all kinds of
malwareto pursuetheirnefariousplans.(https://www.avast.com/c-cybercrime)
∙ Misusingpersonal information(identitytheft);
∙ Distributing childpornography;
(https://www.government.nl/topics/cybercrime/forms-of-cybercrime)
Cyberbullying
Cyberbullying is defined as ―The process of using the Internet, cell phones or other devices to
send or post text or images intended to hurt or embarrass another person.ǁ - The National Crime
Prevention Council (U.S Legal). Cyberbullying is the use of technology to harass, threaten,
embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets,
posts, or messages all count. So does posting personal information, pictures, or videos designed
to hurtor embarrasssomeone else.
Cyberbullying also includes photos, messages, or pages that don't get taken down, even after
the person has been asked to do so. In other words, it's anything that gets posted online and is
meant to hurt, harass, or upset someone else. Intimidation or mean comments that focus on
things like a person's gender, religion, sexual orientation, race, or physical differences count as
discrimination, which is against the law in many states. That means the police could get
involved,and bulliesmay face seriouspenalties.
Online bullying can be particularly damaging and upsetting because it's usually anonymous
or hard to trace. It's also hard to control, and the person being victimized has no idea how many
people(or hundredsof people)haveseen the messages or posts. People can be tormented
nonstop whenever they check their device or computer. Online bullying and harassment can be
easier to commit than other acts of bullying because the bully doesn't haveto confronthis or her
target inperson.(https://kidshealth.org/en/teens/cyberbullying.html)
Types of cyberbullying:
Any of the above kinds of cyberbullying can lead to various effects on the individual which
could be either emotional or mental; in most of the cases both effects can be seen. In some cases
the cyberbullying activities turns out to be so severe that the cyber bully victim commit suicide.
Cyber bullying activities may not only put effects on the victim but in some cases it may also
harm the bully. The effects could be anxiety, depression, anger, etc. It also harms an individual‘s
academic growth, they tend to lose interest in the work or act they used to love, they try to be
alone & avoid theirclose ones as well.
As we can see that with the increase in the technology crimes are no more related only in
physical but many use these technology to harm someone either intentionally or unintentionally
which leads to the major loss either to one or both. Cyber cells have been developed in many
countries including India. Government is working hard to control the crimes that occur with the
use oftechnology.
2. Need for the study
With the easy access to smart phones & internet there are many criminals or people who try to
take revenge through online media. It is necessary to study cyberbullying because many
teenagers these days are falling prey to the online crime i.e.; cyberbullying. This is because many
teenagers are not aware about the third party, who tries to get our personal information & some
might use those for the wrong purpose. It is important to make our younger generation aware that
many social media platforms have privacy policies & also they should try not to click on any link that
pop-up as this might send our details to an unwanted person, which would turn out to be a big
problem. It is always better to keep our personal details hidden & accounts private, preventing
our data from going in wrong hands. Thus, it is important to make teenagers aware about the
cyber cells & let them know what should be done, if they are stuck in any kind of cyberbullying
activityeverintheirlife.
3. Title
A Study of Effectiveness of Online Training Module of Cyberbullying on the Awareness Level of
Studentsof 9th standardof St. Anthony’s high school and junior college.
Awareness:-
―The qualityorstate of beingaware: knowledge andunderstandingthatsomething is
happeningor exists.ǁ DefinitionbyMerriam-Webster.
1.8 Hypotheses
Ho1. Thereis no significant difference in the pre-test& post-testscores of St. Anthony’s high
school and Juniorcollege.
Ho2. Thereis no significant differencein thelevel of perceptionof girls & boysof 9th standard
class dueto the onlinetrainingmodule.
Ho3. Thereis no significant differencein the awarenesslevel of 9th standard studentsof
online trainingmodule on cyberbullying.
Ho4. There is no significant differencein the enthusiasm of 9th standard studentstowards
online trainingmodule.
The programme will not only help students but it will also help other stakeholder of the
education system:-
For Students: This programme will help students to know about the various types of
cyberbullying activities that may occur in anyone‘s life. It will also help them to know about the
effects of cyberbullying, preventive measures, steps that need to be taken & whom they should
seek for help.It will also helpthem to know aboutthe helplinenumbers.
For Teachers: This onlineawarenessprogrammewill also helpteachers to guidetheir
studentsin a betterway with some concrete examples& in an effective way.For Parents:
Parentsmay not be directlyinvolvedin thisawarenessprogramme butit may help parentsto
make theirkids awareaboutthe use of ICT & internetservices, how to keep
thingsprivate& not to fallin a trapof cyberbullying.Evenifthe child has fallenpreyto it, this will
helpthem to get theirkids outof thiskind of situation.
1.10 DELIMITATION OF THE STUDY
∙ The studyis limitedto Mumbaisuburbarea onlyand does not includeareas from other regions.
∙ The studyis limitedonlyto finding the awarenessof studentsaboutcyberbullying.
1.11 References.
4.McGarry, O. (2019, November 20). How to Develop an Online Training Module for Your
Corporate Learning. Retrieved April 2020, from (https://www.learnupon.com/blog/develop
online-training-module/)
8.The Introduction To Cyber Bullying Media Essay. (2019, March 18). Retrieved from
(https://www.ukessays.com/essays/media/the-introduction-to-cyber-bullying-media-
essay.php)
2.1 Introduction
https://www.academia.edu/42961894/COVID_19_IMPACT_ON_STUDENTS?sm=b
A few days later, the genome of a novel coronavirus was released (http://virological.org/t/novel-
2019-coronavirus-genome/319; Wuhan-Hu-1, GenBank accession No. MN908947) and made publicly
available to the scientific community. This novel coronavirus was provisionally named 2019-nCoV,
now SARS-CoV-2 according to the Coronavirus Study Group of the International Committee on
Taxonomy of Viruses. SARS-CoV-2 belongs to the Coronaviridae family, Betacoronavirus genus,
subgenus Sarbecovirus. Since its discovery, the virus has spread globally, causing thousands of deaths
and having an enormous impact on our health systems and economies. In this review, we summarize
the current knowledge about the epidemiology, phylogenesis, homology modeling, and molecular
diagnostics of SARS-CoV-2. Key Messages: Phylogenetic analysis is essential to understand viral
evolution, whereas homology modeling is important for vaccine strategies and therapies. Highly
sensitive and specific diagnostic assays are key to case identification, contact tracing, identification
of the animal source, and implementation of control measures.
1. Guha,Soma (November 2020) conducted a study/researc on
hjgh;pkhc,kmkjdxshghjlbccv,mbvcbvcv,.mnbcnm mbnn,mvhb, h
2. Azam Z, Shoba J.K.S, 2018, study was conducted on the effects of cyber bullying amongst the
students less than 18 years old. Children below 18 were an easy target as it is the growing age & it
affects them throughout their life & develops fear. The paper deals with the impact of traditional
bullying & cyber bullying. It also deals with the awareness program for school students, teachers
as well as parents.
3. Livazovi. G.C, Ham.E, 2019, studied the role of socio-economic status, family, parenting
styles, peer relations & school factors in cyber-bullying & how emotional health is affected. A
survey was conducted on 259 participants out of whom 58.1% experienced cyber violence &
56.8 had nevercyberbulliedanyone.It was observedthat girls talk to othersabout cyberbullying as
compared to boys. Cyber bullies were majorly the ones who had low academic performances.
It is observed that girls are more often cyber bullied. It was observed that the role of, family,
parenting styles, peer relations & school factors least affected the cyber victimization profile. It
was observed that the students who had less educated mothers, low academic achievements &
hadleast expectationsfrom thesociety & peers, were less likely to get bullied.
Hence, it was concluded that the role of socio-economic status, family, parenting styles, peer
relations& school factorswere notthe major factorswhich wouldcause cyber-bullying.
4.Mattson S.A, Rafiq.R, Han R, December 2015, studied the various cyber bullying incidents
taking place on one of the widely used social media platforms i.e.; Instagram. Several data like
images and associated comments were collected. A study was then designed & then the study
was initiated online on a crowd sourced website. Later the analysis was done & it was found that
the cyber bullying incident was associated with the cyber aggression, profanity (swear words),
linguisticcontent,temporal commenting behavior& image content.
5.Snell.P.A, Englander.E.K, 2010, study was conducted to observe gender trends in cyber
bullying. Earlier pilot study was conducted on girls. Both pilot study & Preliminary results
showed that the girls are often involved in cyberbullying as victims as well as perpetrators. The
research also said that more further researches should be conducted to examine the gender trend
in cyberbullying.
6.Dr. Singh P.N, Prof. Motwani A & Pande P, November, 2015, conducted study on cyberbullying
in India. It is said that cyberbullying is repeated harm caused to any person through the use of
any electronic gadgets. Cyberbullying is hurting, insulting or/and being rude to any person,
teasing anyone online by uploading inappropriate pictures, videos or making comments on
anyone.‗GlobalYouthOnlineBehaviourSurvey‘was conductedof 25 countries
by Microsoft in which China was on first position with 70% in cyberbullying, followed by
Singapore 58% & on third place was India with 53% (children aged between 8 - 17). According to
the stats it was concluded that 1 in every 5 children was a victim of online cyberbullying. Due to the
increase in the cases of cyberbullying suicide rate has increased worldwide. The court has
to take strict action on cyberbullying activities that occur before it could turn fatal for someone.
The paper is about how cyberbullying is affecting the world & how it doesn‘t only harass anyone
onlinebutalso defamesan individualbecause thingsspreadeasily online.
7.Aune (2009) Review of a literature was done related to cyberbullying. It was observed that
with the increase in the technology it has become easy for everyone to access it not only for
adults but even for students of school and college. It was also observed that with the increase in
the technology the crime was also increasing it was termed as cyber-crime. Cyber-crime takes
place through prank calls, instant messaging, etc. It was found that cyberbullying was more
prevalent in girls as compared to boys. Cyber victims can be emotionally disturbing and can
become as serious as the victim can even commit suicide. Two cases are included in the paper.
The paper also discusses preventive measures and intervention that can be taken by parents,
teachers andstudents.
8.Roy K (September 2018) study was conducted on teachers & students of the schools in West
Bengal & to find the various reasons & cultural differences through other sets of data (secondary
data). Study was conducted to know the prevalence of cyberbullying in our country (India). After
the completion of the study it was observed that the girls were the most affected by
cyberbullying. The online bullying is rapidly increasing in India. It concluded that to control
cyberbullyingactivitycertain stepsneedto be taken& changes haveto be made in laws.
9.Mukherjee S, Sinha D, De A, Misra R, Pal A & Mondal T. K (March 2020) Study was conducted
in two higher secondary schools in Kolkata to observe the prevailing cyberbullying amongst the
adolescents with the use of information technology. Study was conducted on 254 students with
the help of questionnaire & it was observed that 210 i.e.; 82.7% of the students were using
social networkingsites. 10.5% (22) out of 210 studentsexperienced
11.Bennett B. S, May 2013 conducted a critical analysis study on young adolescents &
teenagers in Georgia. The study shows that cyberbullying is more detrimental than the traditional
bullying as it takes place off the school grounds. More number of teens & young adolescents
have access to technology which can help bullies to bully anyone at any time & provides them
various platforms to do so. Cyber bullying has less to a higher level & short to long term harmful
effect on the victims. It not only harms the psychology of the cyber bully victim but also affects
cyber-bystanders as well as the bullies themselves. Since the bullies are not monitored by
teachers or any staff members online, they find it convenient to bully anyone online. School
administrators are trying their best but struggle to protect students from getting cyber bullied.
School administrators should update the guidelines to protect students against cyber bullying.
The author‘s purpose was to sensitize students & make them aware of the current policies placed
by theofficials.
3. CONCLUSION:
After reviewing the above mentioned articles & papers of a few papers related to cyberbullying, it
can be said that crime cannot only take place physically with a person but that can also happen
through the use of Information technology & communication (ICT).As the technology is
developed throughout the decade it bought advantages as well as certain disadvantages with it.
The crime which occurs with the use of the technology either on the computer, laptop, mobile
through social media sites, e-mails, etc.by putting comments on an individual‘s picture saying
something mean about them, being rude, hurting the modesty of an individual by any possible
ways, which harms an individual emotionally as well as mentally this is known as
―cyberbullyingǁ. In some cases the victim of cyberbullying suffers from depression & few of them
tend to take their life. In many researches it was observed that the girls are more vulnerable to
cyberbullying as compared to boys. The victim of cyberbullying in most of the cases does not share
their problem with anyone, in case if they share their problems then they would probably share
their problem & seek help from their friends. As the technology is progressing we also need to
be aware about the pros and cons of it & make our children aware about it. Government has to
takeserious stepsto control theincreasing cybercrime.
4. REFERENCES
1.Hellfeldt K, Lopez-Romero L Andershed H (December 2019) Cyberbullying and
PsychologicalWell-beinginYoungAdolescence: The PotentialProtectiveMediationEffects of
Social Support from Family, Friends, and Teachers. (https://www.mdpi.com/1660-
4601/17/1/45/htm)
6.Dr. Singh P.N, Prof. Motwani A & Pande P (November 2015) Cyber-bullying – Horrors, Analysis
& Remedies in India.
(https://www.google.com/url?sa=t&source=web&rct=j&url=http://euroasiapub.org/wp
content/uploads/2016/09/2IMNov-2849-1.pdf&ved=2ahUKEwjk
eWno7XoAhXIwzgGHVn6ChI4HhAWMAh6BAgAEAE&usg=AOvVaw04IMMDq_WHFsrF_
ETG_mKK)
8.Roy K (September 2018) Adolescents' interaction on the internet: student and teacher
perceptions of cyber bullying.
(https://www.google.com/url?sat&sourceweb&rctj&url%=https://www.ijmra.us/project%20do
c/ 2018/IJRSS_SEPTEMBER2018/IMRA14409.pdf&ved=2ahUKEwiExako7XOAHVR4zgGHeF
gBqU4FBAWMAJ6BAGHEAE&usg=AOvVawolch1F6gxtBE_y_aoiFwAw)
9.MukherjeeS, Sinha D, DeA, Misra R, PalA & MondalT.K (March2020) Cyberbullying among Late
Adolescent:A Cross-sectional StudyinTwoHigher SecondarySchools of Kolkata, West Bengal.
(http://www.ijph.in/article.asp?issn=0019-
557X;year=2019;volume=63;issue=1;spage=86;epage=88;aulast=Mukherjee)
11.Bennett B. S, (May 2013) Cyberbullying Among School-Aged Adolescents and Teens: A Policy
Review and Recommendations for Georgia.
(https://www.google.com/url?sa=t&source=web&rct=j&url=https://scholarworks.gsu.edu/cgi/vi
e wcontent.cgi%3Farticle%3D1291%26context%3Diph_theses&ved=2ahUKEwiDiZqV7K3oAhU
GyzgGHUIUAwMQFjARegQIBRAB&usg=AOvVaw0232JotkS2NprC6ACAc9eM&cshid=158
4872378304)
1. Introduction
For any online training module to be implemented it is necessary to know the sample for the
research. Content of the module needs to be planned in proper sequence and necessary resources
to be uploaded. After the completion of the module post test can be conducted in any form like a
questionnairecan be given onlineor in quizform.
(c) Designing- Designing is to plan out things and work in order to achieve the goal.
1. Learning outcomes- After the implementation of awareness program the student will be
able to
∙ Sensitizelearnersaboutconsequences of cyberbullying.
∙ Adaptsafe cyberpractices.
∙ Learners Activities:
1.ReferringthePower pointpresentationrecording,Manuals/ handout andwatching videos
about CyberbullyingAwareness
(d) Implementation
3.3 Conclusion
The instructional module was completely online and hence there were lots of challenges. Each
and every resource which was supposed to be uploaded in the classroom was carefully chosen,
recording of power point presentations was also uploaded and a blog for a case study. Every step
was planned afterconsideringthe pre-test responsesof students.
3.4 References
3.McLeod, S.A. (2018). Questionnaire: definition, examples, design and types. Simply
Psychology.(https://www.simplypsychology.org/questionnaires.html)
5.Kabir, & Muhammad, S. (2016, October 7). METHODS OF DATA COLLECTION. Retrieved May
2020, from
https://www.researchgate.net/publication/325846997_METHODS_OF_DATA_COLLECTION)
6.Kona Bansal, S., Onika Dalrymple, O., & Gaffar, A. (2015, June 14). Design, Development, and
Implementation of Instructional Module Development System (IMODS). Retrieved May 2020,
from www.asee.org ›ASEE-2015-Final_NSFGranteesSession_
CHAPTER – IV RESEARCH DESIGN
4.1 INTRODUCTION
Research consists of three steps – pose a question, collect data to answer the question and present
an answer to the question.
Importance of Research
A research design is concerned with turning a research question into a testing project. Every
design has its positive and negative sides. The research design has been considered a ―blueprint
for research, dealing with at least fair problems, what question to study, what data are relevant,
what datato collect and howto analyzethe result.
A research design is the arrangement of conditions for collections and analysis of data in a
manner that aims to combine relevance to the research purpose with economy in procedure.
Research design provides the glue that holds all the elements in a research project together. A
designis used to structurea research.
A population is any group of individuals that has one or more characteristics in common and that
are of interest to the person doing the research. However, to study the entire population to arrive
at generalizationswouldbe impractical, so sample is required.
Definition
4.2 Sample
TYPES OF SAMPLING
❖ Probabilitysampling
Probability samples are selected in such a way as to be representative of the population. They
provide the most valid or credible results because they reflect the characteristics of the
population from which they are selected (e.g., residents of a particular community, students at an
elementary school,etc.
❖ Randomsampling
The term randomhas a veryprecise meaning.Each individual inthe populationof interesthas an
equal likelihood of selection. This is a verystrict meaningyou can'tjust collect responseson the
streetand havea randomsample.
❖ Stratifiedsampling
In this research, a sample comprised of 40 students of class 9th Standard, both girls and boys of St.
Anthony’s High School and Junior College which is Maharashtra State board situated in
Nallasopara (East).
Random Sampling Method is adopted in the project. It seeks to obtain precise information
concerning the current status of the problem and draw valid general conclusion and interpret
those conclusion.
Pre-test– X - Post-test
Target group: - Selected from studentsof St. Anthony High School and JuniorCollege,
Nallasopara East,Palghar.
Female 9
∙ Questionnaire
∙ Opinionnaire
∙ Checklist
∙ Interview
∙ AchievementTest
∙ AptitudeTest
∙ IntelligenceTest
∙ PersonalityTest
Opinionnaire:A form containinga list of statements, each of which the members of a selected
groupare asked to endorse or reject, thepurposebeingto gatherinformationfor a survey.
Aptitude test: It assumes that individuals have inherent strengths and weakness, and are
naturally inclined towards success and failure in certain areas based on their inherent
characteristics.It is used to determinean individual‘spropensityto succeed in a given activity.
Intelligence test: A standardized test used to establish an intelligence level rating by measuring a
subject‘s ability to form concepts, solve problems, acquire information, reason and perform other
intellectualoperations.
Personality test:A test usuallyinvolvinga standardizedseries of questionsor tasks used to
describe or evaluatesubject‘spersonalitycharacteristics.
From the above mentioned tools of research, researcher have chosen a questionnaire tool for her
study which consists of 19 statements to find out the effectiveness of the awareness program. The
questionnaire used is very carefully constructed which contains statements that checks the
awarenesslevel of thestudentsabout‗Cyberbullying‘
7. Conclusion
The research design beingthemost significant partof the entireresearch, it was done with
utmost care.The plannedactivitieswere implementedas planned andwas takencare to provide
4.8 References :
1. Introduction
Data analysis is the process of properly organizing raw data in order to get useful information. It is
a process of inspecting, transforming and modeling data with the goal of highlighting useful
information,suggestingconclusion andsupportingdecision making.
Data analysis is to make sense of the massive amounts of data, reduce the volume of information.
Identify significant patterns and construct a framework for communicating the essence of what
the datareveal.
Data interpretationis explainingthe analyzeddata.Researchers interpretdatausing statistical
procedures.
Researchers in thisaction researchfirst analyzedthe surveyeddata bypropertabulation andthen
didthe percentageanalysis of each statement.Bar graphis drawnto graphicallyinterpretdata .
2. Descriptive Analysis
∙Mean: a mean represents a numerical average for a set of responses. When dealing with a data
set (or multiple data sets), a mean will represent a central value of a specific set of numbers. It is
the sum of the values divided by the number of values within the data set. Other terms that can
be used to describe the concept are arithmeticmean, average and mathematical expectation.
∙Percentage :In mathematics, a percentage (from Latin per centum "by a hundred") is a number or
ratio expressed as a fraction of 100. The percent value is computed by multiplying the numeric
valueof the ratio by100.
Mean =
Mean scores convert into percentage score and if the percentage score are higher than 50% that
indicates hypothesis is rejected and lower than 50% would indicates that null hypothesis is
retained
Figure 5.1 Bar Graph of Mean of Pre-Test and Post-Test scores of Instructional Module on
Students
The difference in the post-test scores would indicate that the programme was effective in
enhancing the perception of students of St. Anthony’s high school and Junior College, Nallasopara
due to theawarenessprogramme.Hence, the nullhypothesiswas rejected.
Table 5.2 Mean of Pre-Test scores of Online training Module on Students among boys and
girls
Table 5.3 Mean of Post-Test scores of Online training Module on Students among boys and
girls
Figure 5.2 Comparative bar Graph of mean of Pre-test and Post-Test scores of
Instructional Module on students among boys and girls.
Mean scores convert into percentage score and if the percentage score are higher than 50% that
indicates hypothesis is rejected and lower than 50% would indicates that null hypothesis is
retained
The difference in the pre-test and post-test scores of boys and girls indicates that the program
was effective in enhancing the perception of boys of St. Anthony high school and Junior College,
Nallasoparadue to the awarenessprogramme.Hence, the null hypothesiswas rejected.
Post-test
Figure 5.3 Bar Graph of opinion of „ Things that can be considered as online harassment‟
Before implementing the awareness training module online many students thought that unwanted
phone calls, undesirable and unwanted forwards and even promotional emails were a part of
online harassment. After the module was implemented it was observed that the maximum
studentsknew thatabuseandbullyingonline andevene-stalking is consideredas online
Post-test
Figure 5.4 Pie chart of Approximate time spent on social media by students
Some students have been seen to reduce the time they spend on social media but, there is no
marginal difference observed in the pre & post test. Even, the number of the students who
answeredalwaysremainsthe same.
∙ My DP is safe online.
Pre-test
Post-test
Significant difference is observed in the chart from 25% to 52.5% of students for the opinion of
safety of DP on social media wherein they feel that profile picture are not always safe on social
media.Thoughmanyare not sure aboutthe safetyof theirprofile pictureon social media.
Pre-test
Post Test
Figure 5.6 Pie chart of privacy of Public profiles on different social media platforms
Difference is observed in the perception of students 62.5% of the students earlier opted for yes
option which means that their profile was public and could be easily viewed by anyone online. In
posttest, 87.5% students opted for the yes option which means that the students would follow the
privacysettingsto keeptheirprofile safe.
Pre-test
Post-test
Figure 5.7 Pie chart of opinion of „following social media trends randomly
Marginal difference can be seen from 45% to 57.5% for the perception of the students that they
would not follow the social media trend in orderto fit in a friendcircle or to match up with all of
their agegroup.
Perceptions of students have changed for rarely sharing their information and picture with
friends and relatives from 30% to 52.5%. Earlier 20% of students were in favour of sharingtheir
detailswith theirfriendsand relativesonlinewhich has nowchanged.
Figure 5.9 Pie chart of opinion of “Adding strangers to account to increase the friend circle‟
Earlier 52.5% students said that they would never add strangers in their account and in post test
82.5% students said they would not add any stranger to their account in order to increase their
followers. But, there are still few students who may add strangers to increase the number of
their friends list.
The comparative analysis of difference between pre-test and post-test opinions indicates that
the program was effective in enhancing the perception of students of 9th Standard class of St.
Anthony’s High School and Junior College, Nallasopara due to the awareness program. Hence,
the null hypothesis was rejected.
5.3 REFERENCES
6.1 Introduction
The research was carried out to know the Awareness level of students on cyberbullying. The
research was conducted online through virtual classroom viz.; Google classroom. Programme
was conducted in the three steps firstly, pre-test questionnaire followed by the online training
module which consisted of videos, powerpoint presentations and a handbook for the safety rules
to be followed for cyber usage was uploaded and lastly the post test form was uploaded and the
data was obtained for further procedure. Scores were given and interpreted and findings were
concluded.
6.2 Findings of the Study
girls (98marks).
∙Remarkable differenceis seen in the awarenesslevel of studentsafter the implementationof the
awarenessmodule.
For Researchers:-
Cyberbullying is one of the vast topic for any researcher. Many things are a part of this topic and can
be considered while doing research. When a research is being carried out for the same certain
things like what are the various ways of cyberbullying that can happen to anyone, ways to keep our
social media accounts safe, if anyone is doing the crime what are the punishments for several
crimes; can be mentioned in the research. During the collection of the data proper protocol
should be followed and prior permission should be taken to avoid any kind of hassle that may
interfere and may make it difficult for anyone. The last hypothesis of this research which was
related to the enthusiasm level of students towards the use of online training module has wider
scope andcould be studiedin detail.
For teachers and school personnel:-
Teachers can try their best to remain updated with the latest social trends and apps. This may
help teachers to make students aware about the ill uses of the app and how to avoid it. Schools
can plan a session on cyberbullying with the help of the parents and other stakeholders. This may
help students to understand how any online bullying can occur and how we can cope with it.
Students can be made aware about the various helpline numbers, website where any child can
reportaboutit andmainly whom theyshouldgo to reportin person.
4. Conclusion
Cyberbullying can occur with anyone but the most vulnerable ones are the teenagers. As
teenagers these days use various social media platforms without being aware about the privacy
setting and a lot more safer practices and may fall prey to any sort of cybercrimes. Research was
carried out on the students who have entered the college and are quite eager about various social
mediaplatformsand make newfriendsonline.From the findings of thisresearch, it can be said
that there is a lot more which students have to be aware about, the privacy and prevention of
cyberbullying. But there is a marginal difference in the awareness level of the students of 9th
Standard of St. Anthony’s High School and Junior College regarding cyberbullying after the
implementation of the online training module. More and more awareness should be created
amongst the teenagers, parents, school and other stakeholders of the society pertaining to
education, which in some or the other waymay helpto save anyonefrom beingbulliedonline.
5. References
3. College Name
Section A
Which social mediaplatformdo you use the most? (Ex. Facebook,Tik-Tok etc) Ans:
……………………………………………………………………….
8.Which social media platforms you think are more likely to get hacked?
Ans:…………………………………………………………………………..
Section B
Please select the option you feel is right.
12. I havepublicprofiles on different social mediaplatforms.
a.Yesb.No
14. I feel social mediais the best and safest channelto know my friendsand relatives aboutmy life
in and out.
a.Alwaysb.Often c. Sometimes d.Rarelye. Never
SECTION C
Answer following questions
16. Whatare 3 R'sof cyber-crime?
............................................................................................................................................................
............................................................................................................................................................
18.How will you make people awarethatonline harassmentis a crime andshouldbe reported
immediately?
............................................................................................................................................................
Post-test
3. College Name
Section A
1.Which social mediaplatformdo you use the most? (Ex. Facebook,Tik-Tok etc)
Ans: ……………………………………………………………………….
6. Whatis publicandprivatemessaging?
Ans:
…………………………………………………………………………..
7. Is my DP alwayssafe on social media?
a.Yesb.No c. can‘t say
8.Which social media platforms you think are more likely to get hacked?
Ans:…………………………………………………………………………..
Section B
Please select the option you feel is right.
12.I wouldfollowthe privacysettingsof the social mediaplatformto keep my profile safe from
beingmisused.
a.Yesb.No
SECTION C
Answer following questions
............................................................................................................................................................
18.How will you make people awarethatonline harassmentis a crime andshouldbe reported
immediately?
...........................................................................................................................................................
...........................................................................................................................................................
.
APPENDIX – B (Presentation used for awareness)
Blog llink
https://www.blogger.com/blogger.g?blogID=8167950923012889937&pli=1#editor/target=post;postID
= 8
527777887644505418;onPublishedMenu=allposts;onClosedMenu=allposts;postNum=0;src=postname
Video links
1. https://youtu.be/lvJm0d9xEu8
2. https://www.youtube.com/watch?v=0YpA7JGRC-0#action=share
3. https://www.youtube.com/watch?v=5wjKb4DAhI4#action=share
Handbooks/Manuals
1. CyberSafeGirl.pdf(www.cybersafegirl.com)
2.A HandbookforAdolescents/Studentson Cybersafety- By Ministryof HomeAffairs, Govt. of
India.
Appendix C (Data Sheet)
Names Pre test Post test
(out of 20 (out of 20
marks) marks)
PATEL SALMANUSMAN 5 12
shaikh zainub(F) 9 9
Shukran 13 16
jonas 11 13
REYHAAN 8 14
azim nisarkhan 4 15
ShaikhVaqar 7 8
7 14
IBRAHIM MIRZABEGMIRZAIZHAR BEG
Shighrekar habibazim 7 4
skabdulmuksitsk abdulhaque 6 16
sunilsharma 11 18
Suraj SandeepNaidu 14 17
SaadAnsari 7 12
Ansulsharma 7 15
MalikNoorAlamMohdJalaluddin Malik 8 13
Shaikh MohammedFurqan 4 17
SUMEET MISHRA 10 16
madhuri joshi(F) 11 16
aisha qureshi(F) 3 7
sahil navnathchavan 7 17
MohitPadave 8 10
umatiyasahil 9 17
AbhishekYadav 5 17
Arifkhan 10 11
MadooriSandesh 10 19
Navneet SantoshPadave 15 17
MauryaAkashAnil 9 14
anmol 1 11
YadavSumitRamAwadh 6 18
AdityaVedak 14 15
shaikhabuzar 15 16
ubaidullahsiddiqui 8 14
qureshimdsahibealammdnural 7 14
k.sanjaykumar 15 17
Jagruti 9 12
Vaidehi GovindKalgutkar 9 11
Mariya MunirPoonawala 10 11
Sneha VirendraPandey 8 6
Shirin 5 10
Dhadkan 9 16
Total Marks 73 98
Bibliography
4.McGarry, O. (2019, November 20). How to Develop an Online Training Module for Your
Corporate Learning. Retrieved April 2020, from (https://www.learnupon.com/blog/develop
online-training-module/)
13.Mattson S.A, Rafiq.R, Han R, (December 2015) Analyzing Labeled Cyberbullying Incidents on
the Instagram Social Network.
(https://www.researchgate.net/profile/Richard_Han2/publication/300208221_Analyzing_Labe
led
_Cyberbullying_Incidents_on_the_Instagram_Social_Network/links/57a17b1808ae5f8b2589
72 2 c/Analyzing-Labeled-Cyberbullying-Incidents-on-the-Instagram-Social-Network.pdf)
ib/thesis/2009/2009aunen.pdf&ved=2ahUKEwjLrs6b7a3oAhUzyTgGHTJZCe0QFjABegQIAx
A B&usg=AOvVaw3-L6hbe946sEhWTUFnYU4t)
17.Roy K (September 2018) Adolescents' interaction on the internet: student and teacher
perceptions of cyber bullying.
(https://www.google.com/url?sat&sourceweb&rctj&url%=https://www.ijmra.us/project%20do
c/ 2018/IJRSS_SEPTEMBER2018/IMRA14409.pdf&ved=2ahUKEwiExako7XOAHVR4zgGHeF
gBqU4FBAWMAJ6BAGHEAE&usg=AOvVawolch1F6gxtBE_y_aoiFwAw)
18.MukherjeeS, Sinha D, DeA, Misra R, PalA & MondalT.K (March 2020) Cyberbullying among
LateAdolescent:A Cross-sectional StudyinTwoHigher SecondarySchools of Kolkata, West
Bengal. (http://www.ijph.in/article.asp?issn=0019-
557X;year=2019;volume=63;issue=1;spage=86;epage=88;aulast=Mukherjee)
20.Bennett B. S, (May 2013) Cyberbullying Among School-Aged Adolescents and Teens: A Policy
Review and Recommendations for Georgia.
(https://www.google.com/url?sa=t&source=web&rct=j&url=https://scholarworks.gsu.edu/cgi/vi
e wcontent.cgi%3Farticle%3D1291%26context%3Diph_theses&ved=2ahUKEwiDiZqV7K3oAhU
GyzgGHUIUAwMQFjARegQIBRAB&usg=AOvVaw0232JotkS2NprC6ACAc9eM&cshid=158
4872378304)
21. Saravanan M, Baskaran M, Maheshwari T, Dr. Jayasudha A, Benita, (June 2019) Effectiveness
of cyber therapy programme on management of cyber bullying experiencesamong adolescents,
PSG Sarvajana Higher Secondary School
(https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.ijsrr.org/down_82880.
php&ved=2ahUKEwjSst6io7XoAhUNzzgGHeEwCh84ChAWMAR6BAgAEAE&usg=AOvVa
w0gDwgkbDX2_W0SRqCI3bTX)
24.McLeod, S.A. (2018). Questionnaire: definition, examples, design and types. Simply
Psychology. (https://www.simplypsychology.org/questionnaires.html)
27.Kona Bansal, S., Onika Dalrymple, O. & Gaffar, A. (2015, June 14). Design, Development, and
Implementation of Instructional Module Development System (IMODS). Retrieved May 2020,
from www.asee.org ›ASEE-2015-Final_NSFGranteesSession_