Professional Documents
Culture Documents
Finalpaper Ict12-05 Grp8
Finalpaper Ict12-05 Grp8
Finalpaper Ict12-05 Grp8
RESEARCH PAPER
Submitted by:
ICT 12 – 05
GROUP NO. 8
Members:
Ragasa, Ryan
Reyes, Hiroshi
Sarabia, Desiree
Submitted to:
Completion:
APPROVAL SHEET
Prepared and submitted by Ragasa, Ryan, Quintanilla, Quinn Nicole, Reyes, Howard Job,
Reyes, Hiroshi, Sarabia, Desiree in partial fulfilment of the requirements of ICT 12 – 05 in
Inquiries, Investigation and Immersion
___________________________________________
Mrs. Romalaine D. Del Rosario, LPT
ACADEMIC ADVISER
___________________________________________
Mr. Holden Kenneth G. Alcazaren
Research Coordinator, Basic Education Department
iii
Senior High School Department
ACKNOWLEDGEMENT
We would like to express our gratitude to our Inquiries, Investigation and Immersion
teacher who guided us throughout this project, As well as our principal, who gave us the
golden opportunity to do this wonderful project on the topic, which also helped us in doing a
lot of Research and we came to know about so many new things we are really thankful to
them.
I would also like to thank our friends and our family who supported us and offered
deep insight into the study. We wish to acknowledge the help provided by the technical and
The researchers would also like to give special thanks to each of our member for
giving all of our best in this study. This study would not be completed if we don't work as a
group, the following people who participate for helping us finalize this project.
iv
Senior High School Department
ABSTRACT
Cyber-bullying has become rampant among our adolescent population. So, although
pervasive during the middle school years. Building and maintaining positive social
form of peer aggression which can be as damaging as any form of conventional aggression
(Mickie, 2011). The problem investigated in this research concerns cyber bullying that
disturbs university students psychologically and emotionally. Bullying also prevents students
from achieving good grades. It seems that technologies are in some ways creating more stress
on our young in the form of cyber bullying rather than to help them progress. Research
findings have shown that young students who become victims of cyber bullies suffer great
stress (Elizabeth, 2010). Hence there is an urgent need to understand the problems faced by
the victims so that concrete and proactive measures can be taken by university authorities,
The study is to bring awareness about cyberbullying. This study is important because
the researchers would propose solutions that can help victims and potential victims from
cyberbullying.
v
Senior High School Department
TABLE OF CONTENTS
TITLE PAGE................................................................................................................................i
APPROVAL SHEET....................................................................................................................ii
ACKNOWLEDGEMENT............................................................................................................iii
ABSTRACT ...............................................................................................................................iv
TABLE OF CONTENTS ..............................................................................................................v
LIST OF TABLES ......................................................................................................................vi
LIST OF FIGURES ....................................................................................................................vii
DISCLAIMER ..........................................................................................................................viii
ETHICAL CONSIDERATIONS ..................................................................................................ix
CHAPTER 1: THE PROBLEM AND REVIEW OF RELATED LITERATURE
Background of the Study ........................................................................................................... 1-2
Research Objectives…………………………………………………………………………...2
Significance of the Study ..............................................................................................................3
Review of Related Literature ..................................................................................................... 2-6
Theoretical Framework ............................................................................................................. 7-8
Conceptual Framework .................................................................................................................8
Scope and Limitation ....................................................................................................................8
Definition of Terms .................................................................................................................. 8-9
CHAPTER 2: METHODOLOGY
Research Design and Research Site................................................................................................9
Respondents of the Study ............................................................................................................10
and Data Collection ....................................................................................................................10
Data Analysis.............................................................................................................................10
Research Instrument ...................................................................................................................10
CHAPTER 3: RESULTS AND DISCUSSION.................................................................... 11-13
CHAPTER 4: CONCLUSION AND RECOMMENDATIONS
Conclusion .......................................................................................................................... 14-15
Recommendation........................................................................................................................15
References ........................................................................................................................... 16-17
Appendices .......................................................................................................................... 18-22
vi
Senior High School Department
LIST OF TABLES
Table 1.........................................................................................................................................8
vii
Senior High School Department
LIST OF FIGURES
Figure 1 .....................................................................................................................................11
Figure 2 .....................................................................................................................................12
Figure 3 .....................................................................................................................................13
viii
Senior High School Department
DISCLAIMER
The study has been made the product of hard work of the researchers. It has been
approved and accepted by the panel of reviewers. Hence, no part of this paper may be used
ETHICAL CONSIDERATIONS
This survey is intended to find out The Perceived Pros and Cons of Technical Tactics
of Cyberbullying of the senior high school students. This is part of our performance task in
Practical Research II, a subject of grade 12 students. Bearing this in mind, we respectfully
request your participation by filling out this survey. The first part aims to elicit information
on your background. While the second part requires your insights on cyberbullying. By
signing your name on the conforme below, this would mean that you consent to responding
to this survey. We assure you that the information disclosed here shall not be used for any
Chapter 1: Introduction
harass others on social media sites like Twitter, Facebook, Instagram, and other social media
sites. Harmful bullying behavior can include posting rumors, threats, sexual remarks, a
victims' personal information, or abusive labels (i.e., hate speech). And now cyberbullying is
According to Livingstone & Haddon (2009), technology evolves rapidly and the
advent of the Internet has substantially changed the way most people live their lives. There
have been obvious social benefits arising from advances of the Internet and communication
maintenance of friendships, and instant access to a wide variety of entertainment; these are
only a few of the many ways to describe the Internet’s pervasiveness in daily life.
In the previous study of Aftab & Belsey (2011) and Hester (2012), there are
media. Email is among the most frequently used means of digital communication. Instant and
text messaging are typically shorter forms of communication between two or more 11 people.
It is now common for these types of communication to include image, video, or sound
content. Cyberbullying through messaging services takes many different forms, but most
obviously is the sending of angry or threatening messages. In accordance with chat rooms,
2
Senior High School Department
message boards, blogs, and user created websites are also prone to cyber harassment and
flaming as they are loosely regulated. Social networking websites, such as Facebook and
Twitter, allow users to become part of a virtual community and thus provide an additional
According to Patchin & Hinduja (2012), most websites require users to build a basic
profile that can include demographic information, photos, personal essays, short comments,
and so forth. After a profile is created, users can interact with others by following their
profiles, sending messages, or leaving comments directly on other profiles. Not only does
this open the door for cyber harassment, fake profiles or parody accounts can easily be
created to embarrass or trick other users. Today there are hundreds of social networking sites
The general study aims to identify the pros and cons of technical tactics in
cyberbullying encountered before and after getting. The group needs to know the technical
tactics to know how and what are needed to prevent them from bullying. This study might
help the students, school, and parents to prevent the bullying that may encounter.
B. Research Objectives
their victims.
• Students – this study will be significant to students because they will be able to know
the different types of techniques and tactics that the cyberbullies use. Knowing these
techniques and tactics, they could be able to prevent themselves f rom getting
• Teachers – This study will be significant to the teachers because this research will be
able to provide good and accurate information about cyberbullies in social media.
They could consult the victims/perpetrator and take action using the given
• School – This study will be significant to the school because this research will be able
• Parents – this study will be significant to the parents because they can be able to
provide the needs the school or the teachers weren’t able to provide to their children
Gollwitzer & Steffgen (2010), Cyberbullying has been defined as intentional harmful
behavior carried out by a group or individuals, repeated over time, using modern digital
From the words of Guilia Mura, Cidgem Topcu, Ozgur Erdur-Baker of the Middle
East University, the study underlined a high occurrence of ICT usage and the experience of
both cyber bullying and cyber victimization among two samples. It seems likely that cyber
bullying and victimization may be more connected to the use of ICT than nationality and
cultural factors, as Italian and Turkish seem to share very close experiences in the usage of
ICT. Moreover, while previous studies usually detected cyber bullying and victimization
among secondary school students, the research shows the presence of such phenomena also
Based on the study “chat room: perception of cyber bullying in Hong Kong schools”
by the University of Hong Kong, Bullying has been recognized for a longtime, but a question
remains about the seriousness of traditional bullying and cyberbullying in Hong Kong.
Moreover, it is essential to explore whether there are any changing patterns between
traditional bullying and cyber bullying. Thus, the following is going to analyze the
seriousness of bullying in Hong Kong and try to determine whether any prediction can be
made on the trend of traditional bullying and cyberbullying. Wong suggested that school
banding is related to school bullying and that schools with higher academic achievements
have less bullying. He also explained that students with better academic results may have
5
Senior High School Department
According to the “Bullying and Cyber bullying: History, statistics, law, prevention,
is often equated with the advancement of human societies. Pivotal innovations, such as the
Internet, have forever changed how people interact. Though these developments have
allowed the human race to make great strides in many fields, they have also allowed forms of
transgression to become more rampant and wide spread. This is evident when considering
how traditional bullying has evolved into an issue today known as cyber bullying. While
bullying and cyber bullying are often similar in terms of form and technique, they also have
many differences. Unlike traditional bullying, cyber bullying allows the offender to mask his
or her identity behind a computer. This anonymity makes it easier for the offender to strike
blows against a victim without having to see the victim’s physical response. The distancing
effect that technological devices have on today’s youth often leads them to say and do crueler
Based on the study of Padgett and Roden, the word cyberbullying did not even exist a
decade ago, yet the problem has become a pervasive one today. Cyber bullies do not have to
be strong or fast; they just need access to a cellphone or computer and a desire to terrorize.
Anyone can be a cyber-bully, and such persons usually have few worries about having face-
to-face confrontation with their victims. In fact, the anonymity of cyber bullying may cause
students who normally would not bully in the tradition-sense to become a cyber-bully.
6
Senior High School Department
In this cyberbullying, this mode takes the form of leaving a website, deleting
threatening message etc. In the context of cyberbullying, some studies include technical
coping or directly addressing the bully in this model (Paris, Varjas, Meyers & Cutts, 2011).
Ellly & Keijer (2013), Cyberbullying showed that victim exposure to antisocial media
content was significantly associated with cyberbullying behavior, especially in victims who
experienced anger and frustration due to face-to-face victimization. Goodness of fit indices
demonstrated a good fit of the theoretical model to the data and indicated that exposure to
There are very few research studies about the technical tactics that cyber bullies use
and some research studies about the mindset of the perpetrators who do these kinds of online
harassment. therefore, we are missing some critical related literatures that can help make this
research study easier for the researchers. We need more research studies related in this field
so that we can find more accurate information about the technical tactics of cyberbullying.
Studying these literatures that we researched, it appears that cyberbullying affects the
victims negatively and positively affects the perpetrators. With today’s technology, many
studies have shown that the offender is able to get away easily because of the anonymity in
Cyberbullying has caused many damages to the different victims, that’s why the
researchers are finding out the technical tactics to defend the future and past victims of the
7
Senior High School Department
said problem. We also need to come up with some strategies that can help aid the victims and
E. Theoretical Framework
Uses and gratification theory builds off of a history of communication theories and
research. Blumler and McQuail laid the primary groundwork in 1969 with their
categorization of audience motivations for watching political programs during the time of the
1964 election in the United Kingdom. This eventually led them to develop UGT later on with
their colleagues.
Uses and gratification theory seeks to understand why people seek out the media that
they do and what they use it for. UGT differs from other media effect theories in that it
assumes that individuals have power over their media usage, rather than positioning
individuals as passive consumers of media. UGT explores how individuals deliberately seek
out media to fulfill certain needs or goals such as entertainment, relaxation, or socializing.
Today, UGT has more relevance than ever as a tool for understanding how we as
individuals connect with the technologies around us. These technologies span everything
from the Internet to video gaming to mobile phones. UGT research into mobile phone usage
has found that people seek a number of gratifications from their phones, including
contemporary technology, when using social media, users can be motivated by factors like a
need to vent negative feelings, recognition, and cognitive needs. Animated news and
8
Senior High School Department
entertainment media are just two other examples of media technologies that UGT researchers
continue to explore.
F. Conceptual Framework
It comes from social media which are the main cause of the cyberbullying that gives them
a negative feeling/effect on that might cause them to other bad things technical tactics makes
This study focuses on the perceived pros and cons of the technical tactics of
cyberbullying in the University of Perpetual Help – Molino. We chose 190 students in the
This research is designed to expand the knowledge of the people about the different
H. Definition of Terms
• Cyberbullying - A form of harassment with the use of technology and social media.
• Internet - A network that connects the computer systems all around the globe.
9
Senior High School Department
• Social Media - A website or a phone application that enables people to connect with
each other.
Chapter 2: Methodology
A. Research Design
Descriptive research design will be used for this study to gather an accurate
information that are needed. This will be using a descriptive research question survey
B. Research Site
interviewed inside the school, or any comfortable place that the respondent will
choose to. These respondents will be interviewed in personal via recording their
voices. The researchers chose the place of implementation because it will give
The study will be conducted in the second semester of the academic year 2018-
2019.
10
Senior High School Department
The respondents of this study are the 190 students of senior high school of UPH-
Molino. We took the all strand of grade 12 to gather the data that be needed in this
study.
D. Data Collection
In collecting a data the researchers kindly randomly asked someone if he/she can
answer our survey questionnaire, we randomly asked since we think everyone been
bullied or harassed through social media platform. For faster collecting we assigned
one person in every floor to collect a data. When we done we start solving.
E. Data Analysis
The researcher used descriptive statistics for this study to organized and summarize the
data. In this study this study descriptive statistics will be used to organized and
F. Research Instrument
100
choice 1
80
choice 2
60 choice 3
40 choice 4
choice 5
20
choice 6
0
Question 1 Question 2 Question 3 Question 4 Question 5
According to the results from the data we gathered from our respondents, 69% of our
respondents have been cyberbullied. 30% of them got angry at the cyberbullies, and 23% of
them felt insecure about themselves. Most of them were so badly affected that 33% of them
suffered from trust issues and 29% of them suffered anxiety. Their academic performance
was also affected because 38% of them avoided to participate in activities and 27% of them
had absences because of the severity of cyberbullying. It appears that many of them was
negatively impacted due to their positions as victims in the case, this is to be expected as
100
choice 1
80
choice 2
60 choice 3
40 choice 4
choice 5
20
choice 6
0
Question 6 Question 7 Question 8
From the results we have gathered from our respondents, it seems that the
respondents were mostly the subjects of cyberbullying in Facebook - 49%, twitter - 20%, and
online games - 22%. The respondents mostly encountered verbal attacks - 26%, false rumors
– 23%, physical threats – 22%, and trolling – 22% from the offenders. These results shows
that some of our respondents were cornered in a position where they felt very vulnerable
from the bullies, we also assume that this is also why most of them had trust issues as they
had no idea who was behind the horrible threats and insults they encountered.
13
Senior High School Department
100
choice 1
80
choice 2
60 choice 3
40 choice 4
choice 5
20
choice 6
0
Question 9 Question 10 Question 11 Question 12 Question 13 Question 14 Question 15
56% of the respondents we surveyed answered that they ignore the threats and insults
from the cyberbullies, 22% of them get therapy sessions, 15% of them get revenge, and 7%
of them do other things to cope. 36% of them private their social medias, 32% of them
stopped publicizing their personal information, and 30% of them stopped posting about
themselves. 55% of the respondents will report them to authorities. Many of our respondents
seems to be aware of the dangers of the internet, although most of them are not really well
versed in the strategies that can help them prevent the bullies or offenders.
14
Senior High School Department
Conclusion
In the first question, it stated if our respondent has experienced cyberbullying, many
of them have been cyberbullied. While there are still a very few of our respondent doesn't
that some of our respondent who answer's no also experience cyberbullying they just don't
want to talk about it, because they feel shy or scared. Also, the researchers put a question on
what they felt when they experience cyberbullying, most of our respondent got angry and
suffered in anxiety, out of 190 respondents 30% got angry and 29% of them suffered anxiety.
how cyberbullying affect a student’s academic performance, out of 190 respondents most of
them avoided to participate to activities and had absences. Cyberbullying can cause a student
to fail because they are shy about what happened or they are scared from cyberbullying.
The researchers also obtain information about the technical tactics of cyberbullying in
order attack their victims. In question number 6, researchers asked the respondents where
on twitter and 22% in online games. As of now in our generation facebook is the one people
use, the researchers conclude that facebook can be used for cyberbullying because it is easy
to communicate, post, and socialize with other people. The researchers also put a question on
what are the cyberbullying uses to bully them, out of 190 respondents, 26% of them
encountered verbal attacks, 23% false rumors, 22% physical threats, and 22% trolling. The
15
Senior High School Department
researchers think that cyberbullying is done in different ways. The researchers also cite the
most of the 56% respondents answers that they ignore the threats and insult of the
cyberbullies.
The researchers conclude that ignoring can also help because it can make you not to
think about it, it makes you to move on. 55% of respondents choose to report it to the
authorities. The researchers conclude that this is good because telling it to other people is
Recommendation
The research needs to be more in-depth since we have also missed a lot of important
factors that could very well affect the researcher’s study. It is important not to respond to any
messages or posts written about you, no matter how it hurts you so much or even untrue
stories about you are being exposed don't be so much affected about it. Reach out for help
References:
Aboujaoude, E., Savage, M. W., Starcevic, V., & Salame, W. O. (2015). Cyberbullying:
Review of an old problem gone viral. Journal of Adolescent Health, 57(1), 10–18.
doi:10.1016/j.jadohealth.2015.04.011Anales de Psicología, 27(1), 221–231.
Álvarez-García, D., Núñez, J. C., Álvarez, L., Dobarro, A., Rodríguez, C., & González-
Castro, P. (٢٠١١). Violencia a través de las tecnologías de la información y la
comunicación en estudiantes de secundaria Introducción. Anales de Psicología, 27(1),
221–231.Technology and psychological well-being (pp. 34–76). Cambridge, UK:
Cambridge University Press. doi:10.1017/CBO9780511635373.003
Ang, R. P., Huan, V. S., & Florell, D. (2014). Understanding the relationship between
proactive and reactive aggression, and cyberbullying across United States and
Singapore adolescent samples. Journal of Interpersonal Violence, 29(2), 237–54.
doi:10.1177/0886260513505149
Area, M., Gutiérrez, A., & Vidal, F. (2012). Alfabetización digital y competencias
informacionales. Madrid. Retrieved
from http://campus.fundec.org.ar/admin/archivos/CAP 1_ Alfabetizacion_digital.pdf
Barboza, G. E. (2015). The association between school exclusion, delinquency and subtypes
of cyber- and F2F-victimizations: Identifying and predicting risk profiles and
subtypes using latent class analysis. Child Abuse & Neglect, 39, 109–122.
doi:10.1016/j.chiabu.2014.08.007
Beckman, L., Hagquist, C., & Hellström, L. (2013). Discrepant gender patterns for
cyberbullying and traditional bullying –An analysis of Swedish adolescent data.
Computers in Human Behavior, 29(5), 1896–1903. doi:10.1016/j.chb.2013.03.010
17
Senior High School Department
Berne, S., Frisén, A., Schultze-Krumbholz, A., Scheithauer, H., Naruskov, K., Luik, P., K
atzer, C., Erentaite, R., & Zukauskiene, R. (2013). Cyberbullying assessment
instruments: A systematic review. Aggression and Violent Behavior, 18(2), 320–334.
doi:10.1016/j.avb.2012.11.022Interactive Technology and Smart Education, 12(2),
100–115. doi:10.1108/ITSE-08-2014-0025
Buelga, S., Cava, M. J., Musitu, G., & Torralba, E. (2015). Cyberbullying aggressors among
Spanish secondary education students: an exploratory study. Interactive Technology
and Smart Education, 12(2), 100–115. doi:10.1108/ITSE-08-2014-0025
Calvete, E., Orue, I., Estévez, A., Villardón, L., & Padilla, P. (2010). Cyberbullying in
adolescents: Modalities and aggressors’ profile. Computers in Human Behavior,
26(5), 1128–1135.doi:10.1016/j.chb.2010.03.017
Cappadocia, M. C., Craig, W. M., & Pepler, D. (2013). Cyberbullying prevalence, stability,
and risk factors during adolescence.
https://cyberbullyingcrim12.weebly.com/theories.html
APPENDIX A
19
Senior High School Department
Dear Respondents:
This survey is intended to find out The Perceived Pros and Cons of Technical Tactics of
Cyberbullying of the senior high school students. This is part of our performance task in
Practical Research II, a subject of grade 12 students. Bearing this in mind, we respectfully
request your participation by filling out this survey. The first part aims to elicit information
on your background. While the second part requires your insights on cyberbullying. By
signing your name on the conforme below, this would mean that you consent to responding
to this survey. We assure you that the information disclosed here shall not be used for any
other purposes except for the ones mentioned above.
Respectfully,
Ragasa, Ryan
Quintanilla, Quinn Nicole
Reyes, Howard Job
Reyes, Hiroshi
Sarabia, Desiree
Part I. Conforme
My signature would mean that I have understood the aims of this survey and I allow the
researchers to use my responses as part of the investigation. Likewise, I consent to the use of
my responses solely for research purposes and shall be assured that my identity shall not be
disclosed.
______________________________
Signature of Respondent
20
Senior High School Department
Part II. This section attempts to determine The Perceived Pros and Cons of Technical
Tactics of Cyberbullying on the mental health of the Senior High School Students.
1. I have been cyberbullied. (Left malicious comments under posts, trash-talked during
games, etc.)
▢Yes ▢No
▢it gave me anxiety ▢it gave me trust issues ▢It gave me low self esteem
▢It gave me stress ▢It gave me suicidal thoughts ▢Others (Please Specify):
_______________
4. What are the effects of cyberbullying towards your academic performance?
5. What is your impression if when someone used you for their inconvenienced meme?
6. What do you think is the motivational of attacker, why did she/he attack the victim?
21
Senior High School Department
▢They want attention ▢They thought I was an easy target ▢For Fun
▢Others (Please Specify): ________________________________
9. Do you take screenshots on your phone or computer to get some evidences that he/she
bullied you?
▢Yes ▢No ▢Sometimes
14. What would you do if you see someone cyberbullying your friends?
▢ I will to talk to them regarding on what she/he did
▢I will warn them
▢ I will report them to the authority
▢Other (Please Specify)