Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 25

STUDENT PERCEPTION OF

CYBERBULLYING
INTERVENTIONS

BY : GROUP PARADOX
SIGNAL VILLAGE NATIONAL
HIGH SCHOOL
Author: The Paradox
Title:
Research Adviser: Mrs. Maria Imelda Nollora
Month/Year: January 2019
Number of Pages:
THE HISTORY OF CYBERBULLYING
by The Bark Team | Mar 22, 2017 | What is Cyberbullying
Traditional bullying forced its way onto the web in the 1990s with the advent of
affordable, personal computers. Whether in public chat rooms or private
messaging platforms, classmates and ever strangers have subjected children
and teens to cyberbullying. The web’s anonymity provided the perfect cover for
a user to harass or intimidate others without much repercussion. While several
US states have enacted laws in recent years to regulate teen cyberbullying, the
wider-reaching effects can be harmful and are something we should be more
aware of and take proactive measures against.
ABSTRACT:
A literature review of research pertaining to cyberbullying was
completed. Findings indicate that cyberbullying is becoming more
prevalent as students spend an increasing amount of time using
technology that keeps them connected to people at all hours of the day.
There are many different ways in which cyberbullies reach their victims,
including instant messaging over the Internet, social networking web
sites, text messaging and phone calls to cell phones. There are different
forms of cyberbullying including, but not limited to, harassment,
impersonation, and cyberstalking.
*TABLE OF CONTENTS*

…………………………………………………………………….Page
History of Cyberbullying………………………………………….. ii
Abstract………………………………………………………......... iii
Chapter 1: Introduction……………………………………………. 1
Problem of Cyberbullying………………………………… 2
Purpose of the Study……………………………………… 3
Research Questions………………………………………... 4
Chapter 2: Body…...……………………………………………… 5
Differences of Bully and Cyberbully……………………… 5
Methods how to Cyberbully………………………………. 6
Examples of Cyberbullying……………………………… 7
Person who is affected and its effect……………………. 8
Differences of the Bully and the Victim………………….. 13
Differences in Bullying: Female and Male……………….. 14
Chapter 3: Conclusion………………………………………….. 15
Preventing Cyberbullying……………………………….. 16
Responding to Cyberbullying…………………………… 17
INTRODUCTION

However, discussions of explanatory theories of cyberbullying involvement among youth are sparse
and piecemeal, and conclusions have been based largely on cross-sectional studies. The goals of this
chapter are threefold. First, we review numerous theories that have been empirically supported in
the aggression, bullying, and general social development literature that might offer some promise in
understanding cyberbullying. These theories range from the comprehensive social ecological
framework to more specific theories related to communication, social norms, and social learning.
Second, a series of longitudinal analyses are presented to evaluate the transactional association
between face-to-face bullying perpetration and cyberbullying perpetration, the association between
peer victimization and cyberbullying perpetration, and the reciprocal interaction between
cyberbullying victimization and perpetration. Third, self-concept theory and research is summarized
to highlight how theory could inform prevention efforts.
PROBLEM OF CYBERBULLYING
How big a problem are bullying and harassment of pre-teens and teenagers on social media? originally appeared
on Quora: the place to gain and share knowledge, empowering people to learn from others and better understand
the world.

Answer by Leah MacDermid, Copywriter at Two Hat Security, on Quora:

The numbers indicate that cyberbullying and harassment are huge problems for young people on social media. A
2016 report from the Cyberbullying Research Center indicates that 33.8% of students between 12 and 17 were
victims of cyberbullying in their lifetime. Conversely, 11.5% of students between 12 and 17 indicated that they had
engaged in cyberbullying in their lifetime.

Cyberbullying is different from “traditional” bullying in that it happens 24/7. For victims, there is no escape. It’s
not confined to school or the playground. Kids and teens connect through social media, so for many, there is no
option to simply go offline.

Even more troubling is the connection between cyberbullying and child exploitation. At Two Hat Security, we’ve
identified a cycle in which child predators groom young victims, are tricked into taking explicit photos which are
then shared online; this leads to bullying and harassment from peers and strangers. Finally, the victim suffers from
depression, engages in self-harm, and sometimes — tragically — commits suicide. It’s a heartbreaking cycle.
PURPOSE OF THE STUDY
The purpose of this comprehensive literature review is to further understand
cyberbullying which continues to occur more frequently as technology becomes
more readily accessible by the masses, especially students; and to explore ways
of preventing cyberbullying before it happens, and intervening after it has
occurred. The study was conducted in 2019.
RESEARCH QUESTIONS:

This study addressed three research questions.


1. What is the prevalence of cyberbullying and what are the
different forms of cyberbullying?
2. What are the differences between males and females when it
comes to cyberbullying?
3. What are some prevention and intervention techniques for
cyberbullying?
METHODS ON HOW TO CYBERBULLY
Prevalence, psychological impact, and coping of cyberbully victims among college students:

Allison M Schenk, William J Fremouw

Journal of School Violence 11 (1), 21-37, 2012

With the growth of technology, bullying has expanded into the technological realm. Labeled
cyberbullying, individuals are utilizing technology, such as cell phones and the Internet, to bully
and harass others with the intention of causing harm. The purpose of this study was to expand
prevalence, psychological impact, and coping strategy research with college victims of
cyberbullying in the United States. Among 799 college students surveyed via the Internet, 8.6%
were victims of cyberbullying. On the Symptom Checklist-90-R, the 69 victims scored higher
than 69 matched controls on depression, anxiety, phobic anxiety, and paranoia, and were
elevated on global severity index and positive symptom distress index scales. Victims had
significantly more suicidal ideations, planning, and attempts. Victims generally coped with
cyberbullying by telling someone and avoiding friends and peers, with few differences between
genders. The results indicated that cyberbullying is occurring in a college sample and having a
negative impact upon victims.
Differences in
Bullying:
Female and Male
FEMALE
The article, Battle of the sexes: An examination of male and female cyber bullying by Catherine
D. Marcum, George E. Higgins, Tina L. Freiburger, and Melissa L. Ricketts, studied the
differences between male and female cyber bullying when looking at posting gossip online in
order to hurt someone. The results for females showed that women are more likely than men to
post gossip on the internet to hurt other people they might know.

When talking to others some women tend to gossip to other women about different situations
that are going about in their lives. With this in mind females would rather hid behind the
screens of the computer and spread false or true rumors about someone they might dislike than
being assertive in person. Why? Females prefer participating in behavior that is not physically
confrontational, and by hiding behind the protection of a computer, they can be more brazen
with their behavior. (Marcum, Higgins, Freiburger, & Ricketts, 2012). Cyberbullying by
Gender also shows results that support that females are more likely to experience cyberbullying
than their male counterparts.
MALE
Unlike females who post information with the intent to hurt others, males on the other hand attack others with threats
and homophobic insults. In the article, Cyber bullying in Schools: A Research of Gender Differences by Qing Li, a
survey was conducted to see how a sample of students in Junior High school have experienced or witnessed cyber
bullying. This study revealed showing that about one in four of the students had been cyber-bullied and over half of the
students reported that they knew someone being cyber bullied. (Li, 2006). What the results also showed is that males
were more likely to be bullies and cyber bullies than their female counterparts. (Li, 2006).

It’s hard to say how often cyber bullying occurs within the male population. When questioned sometimes males use
hypothetical statements so that it won’t hurt their pride or ego they have. Males often answer questions in a way so
that they do not look like the victim. Due to this, the findings of gender differences have been inconsistent. There are
several articles that have researched gender differences where the results showed girls being more likely to get
involved with cyber bullying. There are also articles that have showed that males are more likely to be involved with
cyber bullying. One thing seems to be common with majority of researchers; Cyber bullying occur the most in Junior
High school.
CONCLUSION:
PREVENTING CYBERBULLYING

It decide on the roles and responsibilities for cyberbullying prevention


work is important to. This will typically involve a named lead from the
senior management team (usually the person with overall responsibility
for anti-bullying work), as well as IT staff, pastoral care staff, and
school council members.
Essential elements of prevention are awareness-raising and promoting
understanding about cyberbullying. Awareness can be raised and
understanding promoted through discussion and activity around what
cyberbullying is and how it differs from other forms of bullying.
RESPONDING TO CYBERBULLYING

Cyberbullying is a form of bullying, and as such schools should already be equipped to deal
with the majority of cyberbullying cases through their existing anti-bullying and behavior
policies and procedures. However, schools should recognize the ways in which cyberbullying
differs from other forms of bullying and reflect that in how they respond to it. In addition to
considerations about the invasiveness of cyberbullying, the size of the audience, and other such
factors, cyberbullying yields evidence in a way that other forms of bullying do not.
The person being bullied will usually have examples of texts or emails received, and should be
encouraged to keep these to aid in any investigation. There are also additional reporting routes
available, through mobile phone companies, internet service providers and social networking
sites. Detailed information on retaining evidence, containing incidents, and contacting the
relevant organizations is provided in this guidance.

You might also like