Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Cyberbullying Predicament: A Study on Those 13-17 Year Old Teenagers Who are Bullied by

Others

Stanley Miguel L. Agato1,2,3, Margielyn D.C Barcelon1,2,3, Angela Mae T. Cudal1,2,3, Benedict John L.
Isip1,2,3, Alia L. Manlegro1,2,3, 1,2,3, Mark Darren M. Mercado1,2,3, Harmanpreet S. Patwal1,2,3, Suzanne F.
Rizardo1,2,3 , Jaylyn Marie E. Uson1,2,3, Mr. John Phaul Singian, LPT1,2,3,4

1
Senior High School

2
Basic Education Department

3
Our Lady of Fatima University

4
Research Advisor

March 2022
CYBERBULLYING PREDICAMENT: A STUDY ON… 1

1.0 Introduction

Last 2013, the Philippines approved the Anti-Bullying law, which covered cyberbullying.
However, a 2015 study revealed that 80% of Filipino teenagers aged 13 to 16 are still experiencing
cyberbullying (Takumi, 2016). This paper attempted to compare existing laws on cyberbullying
among selected ASEAN (Association of Southeast Asian Nations) countries such as Indonesia,
Malaysia, Philippines, Singapore, Thailand, and Vietnam. It also aims to identify each country’s
anti-cyberbullying measures that might fit other ASEAN countries’ needs. To achieve its purposes,
it used a qualitative research with the following primary methods: discourse analysis of
cyberbullying laws and alternative strategies addressing said concern; and literature review of
online journals, online publications, and online news articles. The study revealed that the
Philippines is the only ASEAN country with a cyberbullying law that addresses the students, while
other countries have alternative strategies in addressing the issue. Further, it found that
cyberbullying is experienced by individuals aged 6 to 30 through Facebook and Twitter. The study
suggests that the government should require schools to develop specific and consistent policies that
would address this concern; and a curriculum that promotes digital responsibility. Finally, parents
are encouraged to educate their children on ethical values, particularly in the digital world. Ruiz,
R. M. N. M. (2018)

Twitter is widely used to explore on the opinions of the public in variety of topics. It has
constantly gained popularity as good source of information for visualization-centered application.
This paper aims to understand the opinions of senior high school students’ on cyberbullying in a
university in the Philippines. This study uses a tweet visualization tool to present the opinions of
students. The results of the study indicate that most of the students feel pleasant on cyberbullying
as the university administration officers continuously drives information awareness campaign that
decreases fear and unpleasant emotion among the senior high school students. Therefore,
cyberbullying among senior high school students remain an important concern for educators and
students. This study suggests practical and research recommendations. Vargas, E., Niguidula, J. D.,
Hernandez, A. A., Marquez, P. S., & Caballero, J. M. (2018)

According to Ogi Djuraskovis 2022, bullying has been a part of human society from the
dawn of time. Bullying will always be characterized by stronger people preying on the weak, but
now it has extended to the online as a result of the advancement of technology. Cyberbullying has

OUR LADY OF FATIMA UNIVERSITY SENIOR HIGH SCHOOL


CYBERBULLYING PREDICAMENT: A STUDY ON… 1

become more prevalent in nations across the globe. In essence, cyberbullying is very indicative of
the type of bullying that several teenagers were becoming accustomed to at school. The only
distinction is that it is accomplished purely online.

"Cyber Bullying is a relatively new growing phenomenon due to society’s heavy reliance
on advanced technologies”. (Crosslin & Golman, 2014; Washington, 2014) Many young people,
aged 13 to 17 years old, who use social media such as Facebook, experience bullying that is also
experienced by their peers as well. Stephanie Pappas said, "Cyberbullying on social media is linked
to depression in teenagers, according to new research that analyzed multiple studies of the online
phenomenon." Many young people try to commit suicide because they are experiencing bullying
that both young and adult people are doing to them. Furthermore, 61% of teens who reported being
bullied say it was because of their appearance. Intelligence comes next (25%). Racism (17%) and
heterosexism (15%) are also common forms of prejudice, as are criticizing someone's money issues
(15%) and belief (11%). Bullies commonly target individuals who have impairments or mental
problems.

Since 2004, there has been increased research attention on cyberbullying, with a particular
focus on predictors and outcomes of victimization and perpetration. Outcomes have included
measures of well-being, such as self-esteem, depression, and social support. However, limited
research has examined well-being in connection with cyberbullying on social media. Thus, the
purpose of the current paper is to present a comprehensive review of this research. Our goal is to
gather and analyze recent data and provide future research suggestions regarding cyberbullying
among 13 to 17 year old teenagers.

1.1 Statement of the Problem

Since cyberbullying is getting prominent time by time, there is an utmost need to pay attention to this
kind of issues in the society. From time-to-time, as the rate increases, it is becoming very alarming as we
are talking about the youth of the generation. Therefore, this study aims to determine the following:

1. What are the major causes of cyberbullying to 13-17 year old teenagers?
2. What are the major effects of cyberbullying to 13-17 year old teenagers?
3. How can cyberbullying affect one’s social health?

OUR LADY OF FATIMA UNIVERSITY SENIOR HIGH SCHOOL


CYBERBULLYING PREDICAMENT: A STUDY ON… 1

4. What are the lived experiences of teenagers that are cyberbullied?

1.2 Significance of the Study


The result of the study will be extremely beneficial to the following:
Minors/Teenagers (13-17 Years Old Children)
The findings redound to the benefit of the minors aged 13 to 17, since they will be fully
aware that cyber bullying is on the rise across the country, and that many of their peers have been
victims of it (they are not alone). Students may be harassed via harassing conversations, texts,
messages, remarks, forum posts, and photographs on their phones, laptops, and other gadgets,
causing them emotional pain. This research will open their eyes to the fact that instead of tearing
each other down, they should be helping each other flourish. They will also understand the
consequences of cyberbullying and how it can be avoided. Statistics on cyberbullying indicates that
victims of online harassment are at risk for depression, and via this study, the occurrence of
depression and suicide amongst youths may be reduced, allowing teens to live their best life without
facing this nightmare that no one wants.

Parents
This study can assist parents of not only adolescents who have been cyberbullied, but also
parents of all teenagers throughout the world. This will serve as a reminder to them to pay attention
to this significant issue and how it may affect their children's lives. It will raise their understanding
of the significance of protecting and guiding their children while using the Internet, as well as
imposing greater restrictions on the sites they access and organizations they join that might lead to
cyberbullying. It will also assist families in teaching their children not to bully others and to keep
a safe distance from bullies.
Internet Users (Netizens)
Cyberbullies flourish on social media because the whole social network is interconnected,
allowing them to shame their victims in front of their peers. Because cyberbullying occurs on the
Internet, Internet users will benefit from this research for the following reasons. As we all know,
these people are vulnerable to cyberbullying, and with the help of this study, they will gain a better
understanding of social netiquettes, understand their limitations, and be fully aware of what they
are sharing and how they act on the internet, since mean comments, making fun of the victim
publicly on social media, gossiping, and even threatening through private messages are all
examples of social bullying.
Real-World Community (Citizens)
Communities now communicate with one another in a variety of ways and on a variety of
platforms. It's a complicated network of interactions on several levels. To get along with people,
we need to have certain life skills and behaviors, such as the capacity to be courteous,
compassionate, and supportive of one another. The citizens will benefit from this research in terms
of being aware of what individuals are going through, that bullying behaviors should never be
overlooked, and our reactions to them should be united and consistent. They will also learn that
larger social change is required, and that we must collaborate to establish a community-wide

OUR LADY OF FATIMA UNIVERSITY SENIOR HIGH SCHOOL


CYBERBULLYING PREDICAMENT: A STUDY ON… 1

strategy to assist children and teenagers in forming, maintaining, and repairing connections, as well
as ensuring that they develop a strong self-awareness, greater sense of shared duty for one another
and knowledge.

Academic Institutions
Since we have students of Our Lady of Fatima University as the respondents of the study,
institutions like OLFU will definitely benefit from the results of this research as they would grasp
an idea on the status of cyberbullying to the teenagers studying in their institutions. From the results
after which, the said institutions would be able to take appropriate actions to these matter. If the
results are negative from this study, OLFU must implement programs on how to raise awareness
among their students not to become one of the bullies, and to those victims, learning to raise their
voices and stand strong in front of the bullies should be encouraged. They may also create a solid
action plan that lays out a framework for dealing with bullying behaviors, allowing us to increase
awareness and alter attitudes around bullying in order to have healthy families and communities.
They can create programs and hold seminars to educate and encourage students about this problem,
which should be addressed seriously, as well.
Future Researchers
The study presented may be used as reference data in conducting new researches or in
testing the validity of other related findings. This study will also serve as their cross-reference that
will give them a background or an overview on cyberbullying.

1.3 Scope and Delimitations


This study is focused on the lived experiences of those 13-17 year old teenagers who are bullied on
social media platforms. This study concentrates on the upshots that hinder these teenagers’ personal lives
and how hard it is for them to adapt in society and public. Through this analysis, the researchers will be
able to understand and provide them mental and emotional support, from which they can present themselves
with confidence and hopefully the rate of cyberbullying happening to 13-17 year old teenagers will reduce.
Their live experiences can help us to find a way to understand and aid them in a kind of way that we can
help.
The delimitations of this study are the following: (1) lived experiences of 13-17 year old teenagers
studying in Our Lady of Fatima University – Valenzuela Campus and those taking STEM – Academic
Track for the school year 2021 – 2022 only. (2) The only subjects of this research are the senior high school
students who has/have been cyberbullied. (3) This research would be covering five (5) respondents only.
The time frame of this study is before the 2nd semester ends.

2.0 Review of Related Literature


2.0.1 “Solid Impact of Cyberbullying to Victims’ Mental and Emotional Well-Being”
Cyberbullying can have a devastating impact on academic achievement, school dropout, and
physical and mental health. The United Nations Education Agency warned that cyberbullying is on the

OUR LADY OF FATIMA UNIVERSITY SENIOR HIGH SCHOOL


CYBERBULLYING PREDICAMENT: A STUDY ON… 1

upsurge, blaming it on our current situation, more students have been "living, learning, and socializing
online.” According to UNESCO, this has resulted in an "unprecedented increase in screen time and the
merging of online and offline worlds," making children more vulnerable to bullying and cyberbullying.
Cyberbullying has indeed been defined as an individual’s personal or a group's malware and revisited use
of technological tools to send dangers to others (Lee & Wu, 2018).
According to an article that was published on September 06, 2019, as shown in a new poll released
today by UNICEF, the United Nations organization working for children's rights, one out of every three
young people in 30 countries has been a target of cyberbullying, and one in every five has skipped school
due to cyberbullying and abuse. Based on the most recent published data in the Philippines, Filipino
children usually encounters verbal abuse via the internet or cellphone and even sexual missives. Females
were more likely than males to receive messages with sexually explicit subject matter.
2.0.2 “The Risks of Online access to Internet users through Verbal and Mental Persecution”
According to a UNICEF U-Report study done in June 2019, social media platforms such as
Facebook, Instagram, Snapchat, and Twitter are the most popular sites for online bullying. One-third of
Filipino children's cyberviolence comes in the form of verbal harassment via the internet or through
smartphones, while a fourth comes in the form of messaging.
Almost everything is undertaken through electronically media, such as the Online platform, bulletin
boards, emails, cell phones, cell phone cameras, text messages, teleconferencing, blogs, and social
networking sites aimed at other people (Neto & Barbosa, 2019). Social media is considered to have a
significant impact on children's lives, although being continuously connected to the Internet carries
associated risks, which include online sexual exploitation of children and adolescents. The anonymity
afforded by the Internet is exploited by sending information to peers or strangers in public in order to instill
fear, harm, and shame in the victims (Lee & Wu, 2018), potentially leading to mental health issues among
victims and society as a whole (Rivara & Le Menestrel, 2016). Mobile Game Addiction and Cyberbullying
are also ethical concerns that should be addressed respectively as it hampers regular individual activities
particularly of students in an academic institution. Where people tend to say inappropriate words and
cursing when losing in a game or even winning in it. (Fabito, B. S., & Yabut, E. R)
2.0.3 “Cyberspace Victimization due to Rapid Technological Advancements”
Technology continues to develop rapidly and is therefore changing our ways of functioning in
society. While internet cell phones and other communication technologies providing us with conveniences,
it also expose our students to interactions that put their safety and emotional well-being at risk. Aside from
the growth of technology, there are additional issues that lead to the surge, increased stress, isolation,
boredom, decreased supervision online. Mostly teenagers aged 13 to 16 are cyberbullied through social
media while children counterparts aged 7 to 12 suffered the same abuse (Takumi, 2016).
In addition, Connolly (2014) stated in the “Facts About Cyberbullying” that only 1 in 10 victims
will inform their parents or trusted adult about their abuse. As a result, cyberbullying victims can easily get
away with their act. In relation to this, only one in every six parent to adolescents knows exactly what
cyberbullying is. With this being said, cyberbullying is a serious problem and with the development of
technology, the rates of its victimization continue to grow rapidly. Cyberbullying is indeed a prominent
concern in the Western countries, however it is becoming more widespread in nations such as India as the
rate of Internet use rises. According to the current findings, 82.7 percent of respondents had used any form
of networking sites, with the large percentage accessing the Internet from home. (Marret and Choo, 2017).

OUR LADY OF FATIMA UNIVERSITY SENIOR HIGH SCHOOL


CYBERBULLYING PREDICAMENT: A STUDY ON… 1

2.0.4 “Efforts being made to Crack a Solution for Cyberbullying”


Bullying in the Philippines is widespread in schools and over the Internet, with a study that states
that about 50% of Filipino students are bullied in school. Bullying can easily affect both the bully and the
victim, and that’s why the government in the Philippines is working hard to crack down on it. The latest
measures include the signing the anti-bullying act of 2013, which criminalizes any act of bullying or cyber
bullying that happens in the country.
School, family and community programs that strengthen positive relationships and promote safe
use of technology provide promise for reducing cyberbullying. Goebert, D., Else, I., Matsu, C., Chung-Do,
J., & Chang, J. (2011) For any bullying prevention program to be successful it is necessary for each school
to have a clear and easily understood philosophy that promotes a safe and positive environment. This
philosophy should start during the early childhood years and continue throughout high school. Three values
which promote a positive climate and develop a basis for a bullying prevention program include the belief
that all children can learn, people should be treated with respect 21 and dignity, and there is no place for
violence in the school. (Orpinas & Home, 2006.) It is consistent with the practice of conventional bullying
happening in front of third-party observers, and the critical role witnesses play in minimizing or halting its
behavior. (MA Carter, 2013)

2.0.5 “Rapid Increase of Cyberbullying Incidents in the Digital-World”


Many themes emerge from the research on cyberbullying, including the frequency, repercussions,
and potential penalties with such deviant behavior. To begin with, while cyberbullying is a relatively new
issue, at least in terms of reporting such acts, it appears that cyberbullying occurs at comparable or higher
rates than traditional bullying. In a survey conducted by the Canadian Centre for Addiction and Mental
Health, for example, the rate of reported bullying increased from 26.4 percent in 2001 to 33 percent in 2003,
with the majority of the bullying reported being "verbal bullying" (Adlaf et al., 2003). When Canadian
figures on online harassment are expanded to include those who reported that someone said something
"hurtful" to them through the internet, the number of confirmed internet harassment incidents rises to 57
percent from 17% (Adlaf et al., 2003).
Kowalski and Limber (2007) analyzed 3,767 middle school students across the United States who
had been the victims of cyberbullying at least once in the previous two months. Cyberbullying is
problematic because it may be anonymous, and abusers can easily communicate with their victims
throughout the day. As observed with the COVID-19 pandemic, students and learners must use social media
as a communication tool to enhance both online learning and online communication (Sobaih et al., 2020).
However, because of the growing usage of social media, cyberbullying offenders may be encouraged to
bully their victims. This factor will very certainly increase the incidence of cyberbullying.
2.1 Theoretical Framework
2.1.1 Online Disinhibition Effect
The researchers based this study on Online Disinhibition Effect (2004). In a paper titled Online
Disinhibition Effect, a psychologist named John Suller (2004) outlines the six (6) aspects that influence and
alter human conduct when they are in cyberspace, where their behavior is significantly more extreme than
in actual face-to-face contacts. Dissociative anonymity, invisibility, asynchronicity, solipsistic introjection,

OUR LADY OF FATIMA UNIVERSITY SENIOR HIGH SCHOOL


CYBERBULLYING PREDICAMENT: A STUDY ON… 1

dissociative imagination, and minimization of authority are among the factors mentioned. It is a dramatic
cognitive and behavioral shift and shedding of inhibitions online, which is caused by the anonymity
provided by websites, as well as the large scale engagement of individuals at once, which allows them to
easily speak or do whatever they want and get away with it given the lack of jurisdiction and regulations in
cyberspace.

People say and do things in cyberspace they would not ordinarily do in the face-to-face world. They
loosen up, feel less restrained and express themselves more openly. (Suller, 2004). When online,
adolescents are prone to behave in ways that they unlikely to do when in physical encounters. This can lead
to the lacking of their sense of responsibility for their irrational acts, and the effects could fall into two (2)
categories. It can either be benign which it encourages appropriate self-disclosure or toxic disinhibition that
fosters nasty or cruel assaults on others. Meanwhile, the factors that fueled up the said effects are:
dissociative anonymity, where an individual isolates the reality from the virtual world by obscuring their
persona; invisibility, which restricts an individual from seeing and being seen during interactions;
asynchronicity, that unables an individual to see the reactions of the people online; solipsistic introjections,
refers to when a person assumes the personality of the person they are conversing with online; dissociative
imagination, it is the splitting of web narrative or fictions from the actuality; and minimization of authority,
pertains to the lack of power or status from one's real life to the online world. Hence, there is a high tendency
that people will be more aggressive, rude and narcissistic in online since they are anonymous and can act
as unpleasantly as they like without immediate consequence (Aboujaoude, 2011). These findings suggest
that as we shift and rely more on the cyberworld, bullying will become more prevalent. Cyberbullying has
become an extension of oppressive behaviors. As more teenagers gain access to technology, internet will
become a new landscape for bullying.

2.1.2 Social Dominance Theory

A theory named Social Dominance Theory was proposed and introduced by Jim Sidanius and
Felicia Pratto (1999) mainly suggests that an individual or a group controls or dictates over others' behavior,
primarily in competitive situations. In social dominance theory, those who are more aggressive and have
higher rank, status, or power victimize others perceived as having lower rank, status, or power to maintain
their social hierarchy within the group structure (Sidanius & Pratto, 1999). These individuals were using
aggressiveness, taunting, and humiliation to gain a sense of power through cyberbullying. As a result, the
authority achieved was to cope and feed their self-esteem, as well as to consider themselves to blend in with
their peers; it also serves the purpose of maintaining distinction of the in-group in those of other groups
(Blumenfield, 2005).

We all know that in the cyberworld, you can easily alter and modify your social status by disguising
and conspiring to be the person you want to be. As a result, identities in these spaces become fluid. For
example, when revising your profile information such as your appearance, educational background, social

OUR LADY OF FATIMA UNIVERSITY SENIOR HIGH SCHOOL


CYBERBULLYING PREDICAMENT: A STUDY ON… 1

position, and so on, cyberbullying makes it worse since perpetrator may play pretend and seem tough as
they publish this fictional image of themselves online. In this sense of pretending, the lower rank class in
the actual world social hierarchy may use this chance to perpetuate people worse than they experienced as
a means of provoking vengeance, rage, and frustration. They may use bullying someone a way to release
the anger they have towards a person. This may provide oppressed youngsters with an opportunity to redo
what the perpetuators have done to them, or to become the perpetuator itself that they fear in the first place.

3.0 Methodology

3.1 Research Design

This study will use a phenomenological design to evaluate and analyze the experiences of
individuals who were a victim in cyberbullying. This method is used through the descriptions and scrutinize
human experiences provided by the persons involved. A qualitative method will also be used since it
provides a more in-depth analysis. The goal of taking a qualitative approach was to learn more about
cyberbullying and develop a better understanding of it. The collected data will be conducted using
interviews through video calls in google meet and a focus group in which participants were prepared to
discuss their terrible experience because of the actions of the perpetrators.

Miles and Hubermann (1994) describe qualitative research as “prolonged contacts with life
situations that are reflective of everyday life of individuals, groups, societies, and organizations” (p. 6).
Phenomenological research meanwhile, focuses on the descriptions of human experiences and how they
were experienced (Patton, 2002).

The data gathered will be the summary and assessment to determine the major causes and effects of
cyberbullying to 13-17 years old, how can it be prevented and their lived experiences about being
cyberbullied.

3.2 Research Locale

We have chosen OUR LADY OF FATIMA UNIVERSITY, VALENZUELA CITY to be the


location for our research because it will be beneficial to us researchers to gather information for our study
since students are more likely to be exposed and usually the primary target of cyberbullying through social
media. According to Anderson (2018), specifically, more than 80% of today’s teens have their own
smartphones. They average more than seven hours a day engaged in social media. And about 70%
experience some form of cyberbullying before turning 18.

OUR LADY OF FATIMA UNIVERSITY SENIOR HIGH SCHOOL


CYBERBULLYING PREDICAMENT: A STUDY ON… 1

Respondents from OUR LADY OF FATIMA UNIVERSITY VALENZUELA CITY, will be


interviewed through online meetings by utilizing the app, Google Meet. The researchers chose the
enforcement area because it would provide researchers with the necessary information from people who
have experienced bullying through social media. The study will be conducted in the second semester of the
current year.

3.3 Population and Sampling

To make this research happen, we will apply the Purposive Sampling Technique which is a type of
Non-Probabilty Sampling design. The practice of selecting a sample group using non-random procedures,
usually according to the researcher's judgment, is called Non-Probabilty Sampling. We hand-picked the
respondents based on our judgments as not everyone in the population has the chance to participate in this
study. Specifically, we utilized the Purposive Sampling Technique where it is a form of non-probability
sampling in which decisions concerning the individuals to be included in the sample are taken by the
researcher, based upon a variety of criteria which may include specialist knowledge of the research issue,
or capacity and willingness to participate in the research. (Oliver, 2013)

The reason we choose this sampling approach is because we need to choose people based on their
interests, qualifications, or typicality, and they must fit a basic profile of the types of participants who would
be beneficial in executing this research effectively. Samples that meet the study's specific objectives are
collected. The following are the study's criteria; (1) adolescents specifically in the age ranging from 13-17
years old that is exposed to cyberspace, (2) a current student in Our Lady of Fatima University, (3) 13-17
year old students who experienced any form of humiliation while on the internet.

3.4 Research Ethics

According to the Roles of Ethics in Research by Pubrica Knowledge Works (2018), Research
Ethics is essential for a researcher to ensure that his or her aim is to provide original information, truth and
avoid any errors. Researchers need to have values such as fairness, trust and mutual respect amongst all
those who are involved in their research. In addition to these, researchers need to be ethical by being
accountable to general public by safeguarding animal or human subjects who will be a part of the research.
Moreover, Enago Academy (2021) stated that it is important that the person who is invited to be part of the
research understands both the benefits and the risks involved. They must have all the information that could
affect their decision to participate. All research must seek to answer questions that will benefit humanity.
The risks must be minimized as far as humanly possible.

OUR LADY OF FATIMA UNIVERSITY SENIOR HIGH SCHOOL


CYBERBULLYING PREDICAMENT: A STUDY ON… 1

Nonetheless, the information of the participants who are participating in the legal creation of the study must
be protected by the researchers. Information breaches that might lead to a misconception of the study should
not be permitted. As per Data Guidance (2021), the Data Privacy Act of 2012 (Republic Act No. 10173)
indicates that it is the policy of the State to protect the fundamental human right of privacy of
communication while ensuring free flow of information with an end in view to promote innovation and
growth, recognizing the vital role of information and communications technology in nation-building and
the inherent obligation of the State to ensure that personal data in the information and communications
systems in the government and in the private sector is secured and protected. The Act applies to the
processing of all types of personal information and to any natural and juridical person involved in personal
information processing.

3.5 Research Instruments

3.5.1 Interview Questionnaire

We used these questionnaires to allow us to collect data and information from our respondents that
will help us in our research. According to (Peterson, 2000), Effective questionnaire items are short and to
the point. They avoid using words that are too complex, too technical, or that are unneeded. This shortness
makes them easier to understand and faster to complete for responses. Questionnaire items that are effective
are also relevant to the research issue. However, this speeds up the completion of the questionnaire, but it
also avoids bothering respondents with what they will rightfully regard as unimportant or even "nosy"
questions.

3.5.2 Screening Tool

A screening tool is important for effective recruitment of participants for a research study. This is
the procedure by which research team determines if a person is a suitable person for the study. It is a test
or interview or something activity to know if your respondents is eligible for the interview or survey you
will make. We used this screening tool to help us determine who is eligible for the interview. As a result,
screening will help us to make the interview flow more smoothly.

3.5.3 Pen and Paper

We used a pen and paper to jot down the details stated by the respondents. According to Paper on
the Rocks (2020), Taking notes with a pen and paper rather than a computer allows you to better digest and
remember the information you were listening to. Because it is not possible to literally write down an entire
lecture, for example, you must immediately rephrase the information in your own words and select only the
most important parts. When taking notes on a computer, you can almost literally type down what you've

OUR LADY OF FATIMA UNIVERSITY SENIOR HIGH SCHOOL


CYBERBULLYING PREDICAMENT: A STUDY ON… 1

just heard. After much research on the subject, the message appears to be clear for students and others who
want to remember lectures, etc.: write your notes with a pen and paper.

3.5.4 Online Interview Medium

For the purpose of interviewing the respondents, our group decided to use Google Meet as our tool.
Despite the fact that Zoom has superior features, we chose Google Meet because Zoom has a 40-minute
call limit, while Google Meet can run up to an hour. As said by Purwanto & Tannady (2020), Google Meet
is a secure application because Google has stated that all of their commodities are built and operated on a
secure foundation. As a result, they believe their product users' data will exist and remain private. Google's
Google Meet product also includes built-in protection by default, which keeps users' meetings secure (St
John, 2020). Many people in the business and education sectors prefer to use Google Meet as a video
conferencing application because of its numerous benefits. Users find Google Meet to be simple to use,
which creates a favorable impression of the platform. And the number of Google Meet users is steadily
increasing. Informed Consent This research paper is being carried out by our team with the participants'
informed consent. Statement by the Regents of the University of Michigan (2022)

3.5.5 Informed Consent

Informed consent is the process of telling potential research participants about the key elements of
a research study and what their participation will involve. The consent process typically includes providing
a written consent document containing the required information (i.e., elements of informed consent) and
the presentation of that information to prospective participants.

3.6 Data Collection

Data collection refers to acquiring information to answer the essential evaluation questions
previously identified in the review process by the author/authors. It is an essential component of any
research project. (NA Athukorala, 2009) First and foremost, the researchers asked the approval for the
research adviser on the research topic and instruments before conducting the study. Second, the researchers
began communicating with people who could be interested in taking part in the study. Third, the researchers
presented the informed consent to ask the respondents’ permission to participate in the study. Fourth,
screening test was implemented to identify the respondents’ eligibility to participate in the study. Fifth, the
researchers collected the important data from 5 13-17 year old teenagers who are residing in Valenzuela
City. We used thematic analysis in analyzing the data that we researchers gathered.

OUR LADY OF FATIMA UNIVERSITY SENIOR HIGH SCHOOL


CYBERBULLYING PREDICAMENT: A STUDY ON… 1

3.7 Data Analysis

The data that has been gathered is analyzed through thematic analysis. Data analysis in qualitative
research is defined as the process of systematically searching and arranging the interview transcripts,
manuscript, observation notes, or other non-textual materials that the researchers accumulate to increase
the understanding of the phenomenon.

According to Gareth Terry, Nikki Hayfield, Victoria Clarke, Virginia Braun (2017), this chapter
introduces thematical analysis (TA), a method that has become a widely-used tool for analyzing qualitative
data, both in psychology and beyond. We first outline the history and context of TA, and identify key issues
that need to be considered when conducting TA. We discuss the flexibility TA can offer, and highlight the
need for deliberate and careful research. This flexibility can apply to Theoretical assumptions, research
questions, data collecting and analysis.

The researchers analyzed the thematic analysis. It is a thoroughly used method in qualitative
research. Also, we need to close by considering the limit and utilization of thematic analysis. A thematic
analysis of interviews with a well-chosen sample of such persons might indicate how they represent various
mental health experts if one were interested in how those who do not use the services of mental health
professionals regard them. This, in turn, would disclose what inhibits individuals from seeking help from
professionals like psychotherapists and psychologists.

OUR LADY OF FATIMA UNIVERSITY SENIOR HIGH SCHOOL

You might also like