Professional Documents
Culture Documents
In Partial Fulfillment
Practical Research II
Luche, Alliyah S.
INTRODUCTION
conduct's distinctive traits, the offenders and targets of the activity are
and adults may feel less empowered to intervene as a result of the influence of
Anonymity and the disinhibition effect are two prevalent causes that are related
their online behavior. Teenagers may act and speak in ways they would never
victims, so they were unable to feel the effects of their behavior, according to
forces. Teenagers claimed that the reason they engaged in cyberbullying was
that they found joy or gratification in hurting their victims. While some cyberbully
perpetrators claimed they victimized targets so they could feel better about
themselves, others claimed that they cyberbullied because they felt their victims
had provoked them and they wanted to get even (Hayley Cults and Joel
Meyers, 2010).
Also, some cyberbullies may harass their victims out of dislike for the
individual or jealousy for them. Teenagers may also bully individuals online just
"for fun," which is a different motivation than doing so for selfish reasons
because they may not care if their victims suffer any harm when acting this way
applications. These tools and applications include the internet, cell phones,
instant messaging (IM), e-mail, text messaging (Short Service or SMS and
result of increased awareness and new technology, bullying can now be one or
“sending or posting harmful or cruel text or images using the internet or other
only provide a means to harass and threaten victims, but often amplifies the
Bullying has evolved into a new form and identity as it enters a new
and deserves serious and immediate attention (Hinduja and Patchin, 2009).
only does cyberbullying affect victims and perpetrators, but also school policy
with their tormentors. Parris, Varjas, Meyers and Cutts (2011) distinguish
between reactive coping strategies that include avoiding, accepting, justifying,
and seeking social support, and preventive strategies that include talking in
awareness.
in friends and teachers, staying offline, not using websites/software used by the
bully, and blocking the bully (Dehue, Bolman, and Vollink, 2008; Price and
with cyberbullying, and different strategies may work better for different
individuals. Victims should choose coping strategies that work best for them
undoubtedly offers many advantages, but it also has disadvantages. That is the
false information about them. It is quite simple for anyone to abuse this access
should learn to develop the ability to live alongside others as well as on our
own. There are times when our interactions with others are not always pleasant
This study follows the framework of a survey that flows from the
illustration below.
Lazarus and Folkman, the figure identify strategies that may be considered
approach or avoidant.
potential responses. Based on their belief about whether they have resources
to address cyberbullying. The student would then choose one of four coping
they adopt the belief that there is no way to prevent cyberbullying. Otherwise,
with cyberbullying.
Figures 1 provide a framework from which adults can teach coping skills
to students who may experience cyberbullying. One important finding was that
students who may not report cyberbullying because they do not believe adults
cyberbullying may increase student confidence that seeking help from an adult
would be helpful. Another implication for adults from this study is the need to
experiencing cyberbullying.
CYBERBULLYING
Cyberbullying Awareness of
Incident Cyberbullying
Secondary Appraisal
Secondary Appraisal
Is there something I can
Are there ways to prevent
do about the situation?
Cyberbullying?
No Yes No Yes
Avoidance
Problem
Justification Increase
Seeking Social Security Talk in
Support and Person
Awareness
Figure 1. Transactional model adaptive for reactive coping and
Hypothesis
various groups:
Students. This study may help the students to know that cyberbullying
occur between the victim and a bully (or group of bullies) in school. These
bodily harm. However, unlike real-world bullying, which can be abated when a
levels of stress and anxiety, despair, violent outbursts, and low self-esteem.
Even after the bullying has ended, cyberbullying can have long-lasting
emotional impacts.
and safe practices for using digital media. This involves educating students on
how to spot, handle, and steer clear of online bullying. Finding a place for these
courses in the school day can be difficult given the pressures on teachers to
satisfy school, district, and state goals. Fortunately, more schools and districts
are giving teachers the time and resources to prioritize these abilities as
technology permeates every area of our lives, including how we teach and
learn.
Parents. This study might make parents more aware of the possibility
that cyberbullying is taking place in their homes without their knowledge, and it
may encourage them to take extra precautions to shield their kids from both
psychological toll that all forms of cyberbullying take on its victims. Future
researchers can use the findings of this study to advise institutions like schools
cyberbullying.
Child High School to conduct a survey about exploring ways in dealing with
according to their age and gender since the participants will express various
Definition of Terms
The following term will be defined for the purpose of this study:
computers, and tablets. Cyberbullying can occur through SMS, Text, and apps,
or online in social media, forums, or gaming where people can view, participate
negative, harmful, false, or mean content about someone else. It can include
or criminal behavior.
mean content about someone else. It can include sharing personal or private
another person. Online threats and mean, aggressive, or rude texts, tweets,
over its prevalence and significance. The chapter will also discuss how
cyberbullying differs between men and women. Ways and techniques for
section.
Conceptual Literature
harmful, false, or mean content about someone else. It can include sharing personal or
everyday world each day. New technologies are being discovered, and new
programs are being made to improve different aspects of our environment. One
big example is the use of technology to better our communication to each other.
With the internet we are now able to email, blog, instant message, create
websites, and talk in chat rooms, etc. The internet is not the only developed
mode of communication. Cell phones are becoming more popular than ever.
People are able to use the cell phones not only to talk to other people, but to
also text, send pictures, and access the internet. Most of these advances have
people; however, technology has also had negative effects, especially on the
youth. School aged children have started to use this technology to bully others;
such as email, cell phone, pager text messages, instant messages (IM),
Research Literature
Crime Prevention Council and Harris Interactive, Inc.'s study in 2006, 43% of
the students surveyed had been cyberbullied within the last year (cited in
Moessner, 2007). That same year, the Pew Internet and American Life Project
found that one out of three teens have experienced online harassment
(Lenhart, 2007).
impersonation and cyber threats. According to Willard (2006), there are nine
main forms of cyberbullying: flaming, harassment, denigration, impersonation,
fights using electronic messages with angry and vulgar language. Harassment
is another form in which the cyberbully repeatedly sends insulting messages via
the Internet. Denigration is "dissing" someone online which can include sending
or posting gossip or rumors about a person that could damage their reputation
that person in trouble with other people or to damage their reputation and
the cyberbully will trick the victim to reveal secrets or embarrassing information
the victim. Lastly, cyber threats are defined as either threats or "distressing
material," general statements that make it sound like the writer is emotionally
personal information via the Internet, becoming 'addicted' to the Internet to the
point where their lives are highly dependent on their time spent online, and the
(Willard, 2006).
According to a study conducted in 2008 by Hinduja & Patchin, females
Although, when students were asked about their recent experiences of being
cyberbullies, males and females responded equally. When asked about lifetime
which leads one to believe females engage in these activities for a longer
period of time. Females tend to take pictures of victims without them knowing
and posting them online more than males did. Females also tend to post things
online to make fun of someone more often, although males tend to send emails
to make them angry or to make fun of them. Although traditionally males tend to
bully in more outward and public ways, according to this study, females are
more likely to ensure that their victims are embarrassed in front of a larger
audience since they use social networking sites instead of e-mail more often
than males do. When it comes to being a victim of cyberbullying, the results are
about the same. Females are more likely to have experienced the effects of
cyberbullying than males, although the difference disappears when they were
asked about the last 30 days. The data shows that females are 6% more likely
to have been cyberbullied in their lifetime than males. Females also have
threats made online be carried out at school (Hinduja & Patchin, 2008).
According to Willard (2006), there are many ways that schools, parents,
and students can help prevent cyberbu1lying and intervene when cyberbullying
has occurred. The steps that Willard suggested for schools contain elements of
action to engage in effective threat analysis for any reports of cyberbullying that
There are eight main steps that Willard suggested for addressing
do about it, and finally, to assess the cyberbullying prevention and intervention
prevented through reactive coping. Reactive coping refers to the strategies and
distress. Here are some common examples of reactive coping strategies used
interactions with the cyberbully. Seeking social support: This involves confiding
advice. Confronting the bully: This involves standing up to the cyberbully and
confronting them directly about their behavior. Reporting the bullying: This
as using the reporting tools available on social media platforms. Self-care: This
help: In severe cases, victims may need to seek professional help from a
coping with cyberbullying, and different strategies may work better for different
individuals.
CHAPTER III
METHODOLOGY
This chapter presents the methods being used in this study and
Research Design
This study will use a case study as the main tool for obtaining
the gathered data about exploring ways to deal with cyberbullying. This will be a
Research Environment
The locale of the study will be Holy Child High School Inc., Villaba,
Leyte. The researcher observed and perceived that some of the students at
Holy Child High School Inc. is the only private high school in
Villaba, Leyte, where the researcher studied with less than 1,000 students in
JHS and SHS. The students who are studying in the said school are coming
The researcher will use Grade 7 at Holy Child High School, Inc. The
respondents will be identified by getting their names from the school registrar.
The researcher will get from the school registrar’s office the number of all
Grade 7 students. Then, their names will be written on a piece of paper, which
will be rolled, placed in a box, and mixed thoroughly. Only 60 out of the total
number of Grade 7 students will be drawn, and the names written there will be
Research Instrument
students in this school. This will be done to come up with a more realistic and
from their office. The descriptive method will be utilized in this study, with
questionnaires as the main tool for gathering information. This will allow the
cyberbullying; and Part IV is the way helpful and favorable for the students to
handle cyberbullying.
Ethical Consideration
are not disclosed to anyone. The researcher also made sure that the
participants were aware of the rights associated with participation as well as the
their voluntary participation in this study. Neither the participants nor the school
incurred any costs. People have the option to reject or decline the research
With Cyber bullying of the randomly selected Grade 7 students of Holy Child
major themes emerged from the data, each shedding light on different aspects
awareness and promoting digital literacy. The results show that people with
more information are better able to identify, stop, and deal with cyberbullying.
3. Responding Actions:
issues like underreporting and the requirement for trust in reporting systems.
4. Rehabilitative Strategies:
This emphasizes the necessity of flexible approaches that can quickly take
This chapter contains the summary of the entire study. It includes the
Summary
among the randomly selected grade 7 students of Holy Child High School
Incorporated, Villaba, Leyte. The aim of the study was to explore ways to deal
with cyberbullying.
The results of the study revealed that majority of the Grade 7 students
accessible support networks, both online and offline. The discussion revolved
This study adds to our complex knowledge of the different strategies that
people and communities use to deal with cyberbullying. The results highlight
interventions and establish the framework for further study in the continuing
Findings
Notable results have been obtained from the extensive study that was
carried out to uncover efficient ways to deal with cyberbullying among the grade
7 students at Holy Child High School Incorporated in Villaba, Leyte who were
chosen at random. The analysis of the data clearly shows that a sizable
majority of the students in this group had in fact experienced cyberbullying. This
highlights how urgently and crucially focused measures must be put in place.
setting.
Lastly, the study has shed light on the psychological and emotional toll
that cyberbullying has on the adolescents who are targeted. The individuals'
students access to sufficient support networks to help them deal with its
psychological effects.
The results of this survey not only show how common cyberbullying is,
but they also make a strong plea for quick action and coordinated efforts to
culture, the school community may cooperate to establish a more secure and
Conclusion
cyberbullying among students in grade 7. The results highlight how urgently this
The study has shed light on the numerous forms and manifestations of
majority of 7th grade pupils have been victims of such instances. The emotional
and psychological toll that the impacted young one’s bear highlights the
seriousness of the issue and highlights the need for customized treatments that
inform students about the various aspects of cyberbullying, its effects, and the
environment where students can thrive academically and personally, free from
Dealing with Cyberbullying," among Grade 7 students of Holy Child High School
1. Provide and carry out thorough awareness campaigns that teach students
about the different types of cyberbullying, its effects, and appropriate online
concerns without fear of retaliation by making sure that their concerns are
students can help and mentor junior ones. Promote a culture of mutual aid
deal with cyberbullying. Form alliances that can offer the school's projects
environment for its students by implementing these suggestions into its anti-
cyberbullying plan. This will also help to establish a school culture that actively
www.bullying.org/external/documents/ACF6F8.pdf
(2): 217-233.
10-14.
January 1, 2012.
Juvonen, J., and Gross, E. F. (2008). Extending the school grounds. Bullying
Doi:10.1111/j.1746-1561.2008.00335.x
Lazarus, R.S., and Folkman, S. (1984). Stress, appraisal and coping. New
Lenhart, A. (2007). Cyberbullying and online teens. Pew Internet & American
20, 1-23.
Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russel, S., and Tippett, N.
Doi:10.111/j.1469-7610.2007.01846.x
www.asdkI2.orglMiddleLinklAVBlbully_topics/ EducatorsGuide _
Cyberbullying.pdf