Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

CADANGAN CONTENT (UNTUK SETIAP CHAPTER)

CHAPTER ONE
Introduction
1.1 Background of the Cyberbullying Phenomenon
1.2 Problem Statement
1.3 Research Questions
1.4 Research Objectives
1.5 Research Scope
1.6 Significance of Research
1.7 Limitation of Research
1.7.1 Accuracy of Data
1.7.2 Perceptions of the Participants
1.7.3 Restriction of Answers
1.7.4 The Characteristics of the Participants
1.7.5 Choice of Respondents
1.8 Organization of the Report
CHAPTER TWO
2.0 Introduction
2.1 Social Network Sites
2.1.1 Facebook
2.2 Cyberbullying – Various Definitions
2.4 Cyberbullying: A Global Concern
2.4.1 The United States of America (U.S.A.)
2.4.2 Australia
2.4.3 Canada
2.4.4 United Kingdom (U.K.)
2.5 Cyberbullying: The Situation in Asia
2.5.1 Japan
2.5.2 Korea
2.5.3 Malaysia
2.5.3.1 Computer Crimes Act 1997
2.5.3.2 Communication and Multimedia Act
2.6 Theories and Models of Behaviour Change
2.6.1 The Theory of Reasoned Action (TRA)
2.6.1.1 Attitudes toward the Behaviour
2.6.1.2 Subjective norms 
2.6.1.3 The Theory of Reasoned Action Key Concepts
2.6.2 The BJ Fogg's Behaviour Model (FBM)
2.7 Persuasion and Its Types
2.7.1 Interpersonal Persuasion
2.7.2 Computer-Mediated Persuasion
2.7.3 Human-Computer Persuasion
2.8 Persuasive Technology – Can Machine Change Human Behaviour?
2.9 Captology
2.10 Persuasive design
2.10.1 Eight steps in early-stage persuasive design of the “CyBIC”
2.11 “CyBIC” – Cyberbullying Information Centre
2.12 Summary
CHAPTER THREE
3.0 Introduction
3.1 Survey as Quantitative Research Methodology
3.2 The Research Process
3.3 Research Design
3.3.1 Questionnaires
3.3.2 Pilot Test
3.3.3 Structured Interview
 The Advantages of Structured Interview
3.4 Data Analysis
3.6 Summary
CHAPTER FOUR
4.0 Introduction

4.1 Findings
4.1.1 Findings from the Interview
4.1.2 Findings from the Questionnaire

4.2 Demographic Background


4.2.1 Sex
4.2.2 Form
4.2.3 Age

4.3 Internet Usage


4.3.1 Time Spend on the Internet (daily)
4.3.2 Time Spend on the Internet (weekly)
4.3.3 Students Internet Usage (the most)
4.3.4 Distribution of students based on Facebook account
4.3.5 Distribution of students based on Number of Facebook friends
4.3.6 Distribution of students based on Facebook Group

4.4 Cyberbullying Understanding and Awareness Level


4.4.1 Students Understanding of Cyberbullying
4.4.2 Students Understanding of Traditional Bullying vs. Cyberbullying

4.5 Students Understanding and Awareness of Cyberbullying Behaviours


4.5.1 Students Cyberbullying Experience
4.5.2 How Students Cope With Cyberbullying Situations
4.5.3 How Should People Deal With Cyberbullying Situation

4.6 Students Awareness of Cyberbullying in School

4.7 “CyBIC” (PERSUASIVE TECHNOLOGY)


4.8 Correlation between Awareness and Persuasion of CyBIC

4.9 Legislation against Cyberbullying

4.9.1 Cyberbullying is a Crime

4.9.2 Suggestion to prevent cyberbullying from happening

4.10 Summary

CHAPTER FIVE
5.0 Introduction
5.1 Conclusion
5.2 Recommendations
5.2.1 Education-Based Approach
5.3 Future Research

REFERENCES

HARAP DR DAPAT TOLONG FINALIZE ARRANGEMENT OF THE CONTENT DGN


SEBAIKNYA
TQ

You might also like