A research is an orderly exploration into and study of tackles and foundations to inaugurate facts which help in coming up with certain conclusions. Cyberbullying is described as using know-hows of information and statement to cause deliberate, hostile and recurrent conduct by a group or an individual, with the aim to cause trouble or of harm other people. Cyberbullying is concerned with bothering, threatening or harassing someone through the use of the electronic media and tools such as Facebook, Twitter, and Gmail among others (BETTS 2016, p. 89). This research features threatening which among other cyberbullying practices includes the writer sounding like he or she is emotionally disturbed and may end up harming someone else or committing suicide.
A topic needs to be thoroughly researched and identifying the gaps that have not been filled by the previous researchers. This gives way into designing experiments, performing them, gathering information and then submitting them for publication.
Conclusion
In order to come up with a good research about how cyber bullying is conducted and the effects, it has on the victims certain basic steps are necessary. Several steps needs to get followed in order to identify a problem and come up with control and corrective actions to solve the cyber bullying problems.
Description of Methods
In most countries, cyber bullying is treated as serious offense as it causes a victim to feel overly self-conscious and scanty and in some cases, the chances of committing suicide become very high, and it targets mostly the teenagers. The Pew Internet conducted a cyberbullying study in 2010 which found out that two out of five youths have experienced online harassment. It also found out that some forms of cyber bullying included publicizing one’s information through the use of text messages, e-mails and pictures and also sexual harassment (Ferris 2016, 90). This necessitated a research to be carried out on the cyber bullying and how it can be sorted out to save the victims and the internet users at large. For the studies of cyber bullying to be effective there is a need to identify the main elements in cyberbullying to obtain a uniform progress in the studies. Various methodologies were used which included online surveys, logical search, and analysis of secondary data. The methods were designed to capitalize on the experiences of the relevant groups and maximise the victims reach and engagement. One of the methods used to obtain information includes the survey methodology which involves the sampling of individuals from a given population and the data collection techniques. The benefit of using sampling is that this would enhance time-saving and reduce any costs associated with doing the research. The research will sample 700 Japan based youths who use social media platforms.
A sample of 700 youths from the Japan was used to participate in an online survey by responding to some questionnaires. According to Boyd (2014, p. 54). A focus group of 12 years to 20 years old youngsters was used to carry out the research about their use of communication technology and experiences on cyber bullying since most of them have access to the internet. The respondents were invited to participate in the survey using emails which were password-protected to enhance privacy. Some of them were enlisted or contacted directly and the interviews conducted would take about 15 minutes in length and were carried out for a duration of about three weeks running from 5 March to 24 March 2015. Some demographic parameters including the region, gender, race, age, internet use and education were used to represent a nationally online sample. The report showed that more boys than girls were involved in cyberbullying. It also indicated that the cyber bullies normally believe that they are unidentified hence strange to the victim who gives them the confidence to utter more hurtful things than they would have done if they were to meet face to face with the victim.
One advantage of the survey through the interview is that it was possible to offer freedom of asking and having follow-up questions to have a basis of exploring the answers provided by the respondents. However, the results obtained from this sample were prone to some errors hence were subject to a sampling fringe of error of + or – 2.98 percentage points based on a 96 percent level of confidence. The method could also not produce a 100 percent accurate results since not all the invited youths responded to the survey and it was an expensive exercise regarding time-consuming and the costs involved in reproducing the survey questionnaires.
A logical search was also carried out for cyberbullying measurement policies which were published between 1990 and 2016. This kind of methodology ensures that the search cuts off various unrelated documents or information which has no use in the research process. Firstly, some key terms were excavated from a literature review which included terms such as violent, bully, victim, aggress and harasses. These search terms were used together simultaneously to narrow down the results of the research process. For instance, the terms victimization and bullying were used simultaneously in salvaging the relevant publication required for evidence. These terms were used to perform a search of several electronic databases including MedLine, ERIC, PsychInfo and the Behavioural Sciences. The information of the relevant articles was then screened for annexation entitlement. When there was enough evidence that a certain publication was suitable for consideration, it would then be retrieved, the full publication was reread, and the measure was gotten by contacting the copyright owners in case it was not available in the publication. A data extraction form was developed to obtain all the information required to complete the review which included 40 questions with various information. The form had three publication items which included the year of publication and the type of writing whether a report or a journal. The legitimacy and the consistency of each type of measure were recorded for psychometric data. The data captured was accurate to every measurement strategy such as the author-reported bullying mechanism present in the measure. The reporter for each strategy was also noted, the time frame assessed, the type of the response options and whether the measurement strategy had the term “bullying” and how the measure scored. The members of the study team coded the same publication for coding the publications. This followed a thorough analysis to attain a high level of agreement across the coding form questions and the coders. The coders also met so as to discuss and solve any discrepancies. If there were any differences noted by various coding team members, the other team members would be consulted to help coming up with proper recommendations (Gasser 2010, 78). The method was quite accurate as it was less prone to errors since computer expertise and the time spent online were certainly related to both offending and cyber bullying victimization. However, it had some limitations such as the differences in the definition of bullying and the measures taken to curb such. The race and gender did not suggestively differentiate the offending and respondent victimization. As per this research, offending victimization does not depend gender nor does it depend on people’s race, it cuts across all boarders. The respondents suggested that there is need to educate people on the importance of respect while interacting in the social media as well as understanding the concept of empathy in their actions.
Research by Bauman, (2010, p. 21)indicated that most of the cyber bullying victims do not report the cases to the relevant authorities as they tend to think that the case will just be ignored or pass through many procedures such that one will eventually give up. Some cyberbullying victims normally experience low self-esteem and stress. Other victims of cyberbullying include the high school students who ignore reporting the case in fear that they may lose friends or they may be seen as being too mouthy. Other fear that the privilege of having to use the internet will be withdrawn if they report to the teachers or parents. This has given room for the crime to grow roots rapidly despite being a new type of internet crime which has cropped up in the recent years. Cyber bullying affects people psychologically and even goes to the extent of tarnishing their reputation in public. Mostly, cyber bullying is experienced by the social media users mainly by the people whose intention is to harm, hurt, or interfere with other people’s publicity. For instance, most youths have been affected by the use of Facebook and use this platform to insult other by personal grudges and issues.
Based on the findings, the cyber bullying victims identify and cope with it in different ways which may make them be affected in one way or the other. Cyber bullying affects the affected people psychologically, emotionally, and socially leaving them to feel empty clothed in the context of the public domain. While some victims may report the matter to the relevant authorities, others choose to seek help from their peers and sort it out personally which may not always be a good option. Thus, it is vital to focus on linking cyber bullying with the psychosocial backgrounds of the victims together with other circumstantial variables which impact the victims. There is need to properly monitor the use of Facebook and instill control procedures and laws that govern against cyber bullying. Therefore, further research is necessary to ensure the success and effectiveness of the various managing approaches and also to come up with proper means to curb the crime.
Bauman, S. 2010. Cyberbullying: what counselors need to know. Alexandria, VA, American Counseling Association.
Betts, L. R. 2016. Cyberbullying: Approaches, Consequences, and Interventions.
https://public.eblib.com/choice/publicfullrecord.aspx?p=4719821.
Boyd, D. 2014. It’s complicated: the social lives of networked teens.
Emerson, R. M., Fretz, R. I., and Shaw, L. L. 2011. Writing ethnographic fieldnotes.
https://public.eblib.com/choice/publicfullrecord.aspx?p=3563012.
Ferris, K. 2016. REAL WORLD: an introduction to sociology. [S.l.], W W NORTON.
Gasser, U. 2010. Born Digital: Understanding the First Generation of Digital Natives.
Perseus Books LLC. https://www.myilibrary.com?id=264345
Giant, N. 2013. E-safety for the i-generation: combating the misuse and abuse of technology
in schools. London, Jessica Kingsley Publishers.
Information Resources Management Association. 2016. Violence and
society: breakthroughs in research and practice. Hershey, Information Science
Reference.https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1410023.
Nair, P. K. R., and Nair, V. D. 2014. Scientific writing and communication in agriculture and
natural resources. https://public.eblib.com/choice/publicfullrecord.aspx?p=1636495.
Noor Al-Deen, H. S., and Hendricks, J. A. 2012. Social media: usage and impact. Lanham, Md, Lexington Books.
Rivara, F., and Le Menestrel, S. 2016. Preventing bullying through science, policy, and practice.
Walker, S. 2012. Effective social work with children, young people, and families: putting systems theory into practice. London, SAGE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download