Академический Документы
Профессиональный Документы
Культура Документы
In Partial Fulfilment
By
VINCENT G. LUAGUE
STANIEL CAPILITAN
March 2019
TABLE OF CONTENTS
Title Page
Table of Contents
Abstract
Acknowledgement
Dedication
Chapter
Introduction
Purpose statement
Research Question
Definition of terms
Research Design
Research Locale
Participants
Research Instrumentation
Qualitative Analysis
Ethical Considerations
References
Appendises
A. Letter to validators
B. Letter to participants
C. Appendix E
D. Appendix F
ABSTRACT
the following three perspectives: (a) What are the experiences of grade 11
11-CSS.Several themes have emerged from the analysis, which uncovers some
study.
ACKNOWLEDGEMENT
appreciation to the individuals, who hve willingly shared their time; effort and
support for making this study a dream of fulfilled kindness and assistance
Esther D. Vinson, MA, MT II, the researchers' adviser, for providing not
only her unselfish comments, suggestions and pieces of advice, but also her
of the panel, and to the rest of the members of panel of examiners, for their
Metro Dadiangas for their cooperation in providing the needed data for this study;
Mrs. Jeannet E. Canda and Mrs. Marife C. Guanzon, the validators of the
researchers' questionnaire, for their reviews and suggestions regarding the tool
-The Researcher
DEDICATION
To their friends
and
Above all, to their personal Savior
our almighty God
March 2019
Chapter 1
Introduction
means such as email, mobile phones calls, text messages, instant messenger
contact, photos, social networking sites, and personal web pages, with the
Essentially, any communication like messages, post text etc. that aims to belittle,
became the newest must have items. Teens could share text messages and
photos to anyone in their phones. There was a girl killed herself after her
boyfriend sent nude photos of teenagers in at least seven Ohio High schools.
She was cyberbullied through Myspace and text messages. A year later, in a
nearl identical case, a young girl in Florida killed herself after her boyfriend
shared a nude photos of her across six High schools. Both deaths resulted in
lawsuits against the schools and new state cyberbullying laws. Lately,
cyberbullying occurs across numerous social media platforms and apps. A ten-
second snap chat post can go viral on facebook, instagram and twitter in a matter
of hours. Anyone in the world can view and comment on videos posted in
youtube.(Bark,2017)
In generations past, bullying was a problem that could be left on the
The advent of the internet and the rape increase in cyberbullying, though,
makes every internet user a potential cyberbullying victim. More than a dozen
all evidence suggests that the bullying-induced suicide rate is rising. In 2012,
ever performed, and the results were striking. The survey polled 18,000 people
living in their 24 countries, and stunning 80% reported that cyberbullying was a
cyberbullying, and 25% of parents reported that a child they knew had been
India had one of the highest rates of cyberbullying, with 32% of parents reporting
that their children had experienced online bullying. Rates in Brazil were 20%,
and 18% of Canadian parents reported that their children had been bullied.
Indonesians were more likely to report knowing a child who had been
96.22 percent,106 cases in 2015 to 208 last year. Cases of vexation spiked by
According to the Anti-bullying Act of 2013, these acts are collectively called
identity. A bill has been filed at the house of representatives defining and
and social media has generated. It can potentially affect not only school-aged
children, but also any individual who has access to mobile phone or the internet.
imprisonment between six months and six years, or both, at the discretion of the
court.(Andaya,2015). Thus, this study looked into the experiences of the Senior
of Metro Dadiangas. The participants of the study were ten (10) grade eleven
This study was significant tool in helping the student who are troubled in
cyberbullying and also the bullies will be able to hear out the feelings of the
bullied person. With this, The study is also bringing benefits of the following body:
cyberbullying.
The Netizens, to guide the social media users in cyberbullying. By doing so,
The parents, they are the most concerned about their children. They will know if
their children is one of the bullied or bullies and it will help them to be
Purpose Statement
Definition Of Terms
Computer System Servicing- this refers to one of the strand in TechVoc tracks
refers to the knowledge or skills that is obtained from doing seeing of feeling
This chapter presented the related literature that shed light to the study.
This review of literature was designed to explore critically the different forms of
study.
Theoretical Lens
Barlett and Gentile Cyberbullying Model (BGCM). Specifically, we delve into the
need for such a theory and how other similar theories may be inadequate in
the learning-based theoretical foundation that helped to build the BGCM before
with how the BGCM can inform intervention efforts to hopefully reduce
cyberbullying.(Elsevier,2017)
Cyberbullying is a practice where an individual or group uses the
internet to ridicule, harass or harm another person. The social and emotional
harm inflicted by cyberbullies grows out of –or leads to physical bullying in the
behaviours with the use of new technologies. Although the different types of
cyberbullying are currently not well understood, researchers are starting to make
distinctions between methods by which cyber bullying is carried such as: flaming,
that typically occurs in public online forums, discussions rooms and chat rooms
when individuals or groups become the target of angry and rude messages via
electronic means ,if continual argument persist, usually including rude and vulgar
Identity theft occurs when a perpetrator pretends to be another person and either
hacks or obtains the password of their target’s account, and sends hurtful and
harmful information to the friends or the target examples include students posting
untrue and hurtful information about their targets on slam books for others to
read, a digitally altering photos to make a target look ugly or fat on purpose.
information that was meant to be kept secret and should have not been leaked
can be blocked or deleted off friend list, excluded from an online group or friends
posts on web pages, slam books, emails, text messages or via instant
about their targets and digitally altering photos to make a target look unattractive.
involves repetitive threats, lurking and intimidation. For example a student may
student. (Li, 2016).Happy Slapping is a relatively new cyber bullying term which
occurs when perpetrators intentionally bully, hit, assault or make fun of other
targets whilst being video recorded for the sole purpose of leaking the video on a
public websites and/or sending the video via email, internet, or mobile phone for
sending sexual images such as nude or partially nude photos of the targets or
view.(Ballistic,2011)
Effects of Cyberbullying
carried such as: emotional and physical effects, oeel Overwhelmed, Feel
Vulnerable and powerless. Feel exposed and humiliated, Feel dissatisfied with
The emotional and physical effects may bleed into their social lives as they
encounter more trouble getting along with others. They experience trust issues
and are more likely to abuse alcohol or drugs at an earlier age. Victims of
if a lot of kids are participating in the bullying. It can feel at times like the entire
world knows what it is going on. Sometimes the stress of dealing with
cyberbullying can cause kids to feel like the situation is more than they can
find it difficult to feel safe. Typically, this is because the bullying can invade their
home through a computer or cellphone at anytime of day. They no longer have a
place where they can escape. To a victim, it feels like the bullying is everywhere.
Additionally, because the bullies can remain anonymous, this can escalate
feelings or fear. Kids who are targeted have no idea who is inflicting the pain.
Although some cyberbullies choose people they know. Feel exposed and
permanent. Kids know that once something is out there, it will always be out
there. Why cyberbullying occurs, the nasty posts, messages or text can be
shared with multitudes of people. The sheer volume of people that know about
the bullying can lead to intense feelings of humiliation. Feel dissatisfied with who
they are. Cyberbullying often attacks victims where they are most vulnerable. As
a result, targets of cyberbullying often begin to doubt their worth and value. They
may respond to these feelings by harming themselves in some way. For instance
if a girl is called fat, she may begin a crash diet with the belief that if she alters
how she looks then the bullying will stop. Other times victims will try to change
get angry about what is happening to them. As a result, they plot revenge and
in the bully-victim cycle. It is always better to forgive a bully than it is to get even.
Most of students who are bullied do not report their experiences to adults.
.This was true 30 years ago when endured middle school and our research
shows it largely continues to this day. Since then Sameer surveyed more than
20,000 middle and high school students from around the United States. In every
one of those studies we ask students who they told about it. Most often over the
years, students tell us that when they do tell someone about being bullied, it is
friend. In 2010, there are about being 4,500 students, 39% told a friend
(compared to 18% who told a parent).But something changed in our most recent
survey (from late 2016).Recently it appears atleast , more students are turning to
understanding of what cyber-bully is, how harmful they can be really be, and how
to prevent cyber-bullying from happening. This paper can be used to help victims
realize they are not alone and should not give in to a bully’s dangerous
behaviour’s. This research paper is to inform society about what has been going
on lately and how unacceptable and dangerous it is. Youths are killing
themselves over photos, web posts, and videos posted by bullies using the
incidents have quadrupled in this era. The fact of the matter is, technology is not
figuring out what can be done to stop cyber-bullies in their tracks. Cyber-bullies
If you see any kind of bullying happening in front of you, stop it if possible, and
Related Studies
to face bullying suggests that the period of adolescences can provide a particular
significant social changes related to students moving from high school to college
schooling can also be a factor. This transition of schooling can result in changes
in students peer group availability, individuals’ standing within groups and lack of
peer support as students move to larger and typically more impersonal school
settings. This phase is disruption in social networks can ultimately lead young
status. Overall, it would appear that age does have some impact on the level of
study as an evidence from school-based leaders who have efficiently dealt with
cyberbullying would be greater than bullying because there is no escape for the
victims: harmful material could be easily preserved as well a quickly and widely
spread. Further, many people who would not harass others face-to-face might
cyberbullying peers because they believe that they could hide or it would be
school boundaries, school might direct such issues back to parents, saying that
or vice versa, even if the incidents appear to be initiated using school property.
Research Methodology
This chapter presented the method of research being used, the research
design, the locale of the study, the research of participants, the research
Research Design
(2015) states that the qualitative research study things in their natural
meanings people bring to them. It involves the studied use and collection of a
describe the routine and problematic moments and meaning in individuals lives.
The study was conducted at the Irineo L. Santiago National High School of
Participants
The participants of the study are composed of 10 students from both two
Dadiangas. Each participants are chosen based on their characteristic and the
The purposive sampling of this study was to investigate the Senior High
representative sample by using a sound judgment, which will result in saving time
when only limited numbers of people can serve as primary data sources due to
the two teachers in qualitative research,during the conduct of the study, the
data. Face-to-face interview is probably the most popular and oldest form of
survey data collection. It has continued to be the best form of data collection
when one wants to minimize nonresponse and maximize the quality of the data
The following steps are undertaken by the investigator in the conduct study:
1. Initial Stage- The investigator are going to write a letter to the principal
regarding to the conduct of the study. Upon the approval of the principal, the two
advisers from two sections of Grade 11CSS will be informed in the study to be
conducted. Both advisers will be informed also in the questionnaire guide of the
interview.
2. Actual Implementation Stage- At this stage, These are carried out one with an
interview format l, the agenda is relatively set, but the interviewer is free to follow
the respondent's train of thought and to explore tangential areas that may arise.
The interviewer may rephrase the questions and how they are asked depending
interviewing group.
Research Analysis
the accounts that are of direct relevance to the phenomenon under investigation.
themes that are common across all accounts. Again bracketing of pre-
suppositions is crucial, especially to avoid any potential influence of existing
theory.
at step 4.
exhaustive description down to a short, dense statement that captures just those
she may go back and modify earlier steps in the analysis in the light of this
feedback.
evaluating its worth and making the study essential. Trustworthiness involves
establishing:
of the information gathered, rather than the amount of data gathered. There are
participants/readers are the only ones who can reasonably judge the credibility of
the results.
to other contexts, this section is defined by readers of the research. The reader
notes the specific details of the research situation that they are more familiar
with. If the specifics are comparable, the original research would be deemed
3.Dependability - ensures that the research findings are consistent and could be
repeated. This is measured by the standard of which the research are conducted
analysed and presented. Each process in the study should be reported in detail
to enable an external researcher to repeat the inquiry and achieve similar results.
effectiveness.
4.Confirmability - questions how the research findings are supported by the data
collected. This is a process to establish whether the researcher has been bias
during the study; this is due to the assumption that qualitative research allows the
judge whether this is the case by studying the data collected during the original
inquiry. To enhance the confirmability of the initial conclusion, and audit trail can
research which will manage and exhibited the researcher’s behaviour during the
conduct of the study. Research ethics provides guidelines for the responsible
to ensure a high ethical standard. This included the honestly report data, results,
misrepresent data, strive to avoid bias in experimental design, keep the promises
and agreements; act with sincerity; strive for consistency of thought and
competence, legality, and human subjects protection. During the conduct of the
study, the researchers was careful not to offend the participants and respect the
submitted for publications. To attain the trust of the participants, the researcher's
was informed regarding the conduct of the study before the actual interview and
justified to the participants the purpose and significance of the conduct of the
study and how the participants responses can contribute to the improvement of
individuals to share their cyberbullying experience. This also discusses how this
statements.
interview for the Grade 11-Compter system servicing students to determine their
One of our participants boost her self confidence to answer the investigator,P1
Numerous Friends
are people sending them a friend request on facebook.This is a safe way to avoid
scamming and bullying that happens on social media,as P7 said "No especially if
we don't know the person we should know them before accepting to avoid
scamming and Cynerbullying"(code 7.3).P10 also said "No i check first their
Aside from P7,P9 also said "No especially if we don't know the person to
avoid Cyberbullying"(code 9.3).P4 also said "I don't always accept friend request
i always visiting their timeline to know them so that i could accept the friend
request"(code 4.3)
person"(code4.4).
Aside from P1 and P4,P8 said "Cyberbullying is when you bully someone and
or group uses the internet to ridicule, harass or harm another person. The social
and emotional harm inflicted by cyberbullies grows out of –or leads to physical
Annihilated the life of a person is one of the result when people didn't
feeling sad,mad and depression about thinking the hurtful word that bully shared
on social media can lead to killing the life of a bullied person..As P6 said "I don't
feel it because if i feel it i can be depressed and maybe kill myself"(code 6,5),P4
also said "It can really destroy the background of a person"(code 4,5).
Aside from P6 and P4,P7 also said "It hurts because we are being bullied without
effects may bleed into their social lives as they encounter more trouble getting
along with others. They experience trust issues and are more likely to abuse
dangerous stigmas, and experience harmful shame from their peers.Youths are
killing themselves over photos, web posts, and videos posted by bullies using the
internet.
Optimists believe that their own actions result in positive things happening, that
they are responsible for their own happiness, and that they can expect more
good things to happen in the future. Optimists don’t blame themselves when bad
themselves. I didn’t blame myself for losing my job, but saw it as a business
decision that had nothing to do with me personally.As P1 said "Think positive and
show them that you are fearless",P3 said "Learn to accept your flaws and Don't
be affected by it".Aside from P1 and P3 ,P5 also said "I Learned to be strong and
intelligence, which translates to a better career and greater success in life. Life is
too short to be miserable, so start turning your thinking around! The power of
positive thinking can advance your prospects for work, relationships and other life
experiences.
CHAPTER V
Santiago National High School of Metro Dadiangas. It weaves the result of the
be presented.
Summary of Findings
The findings of the study are presented in integrating part fro the participants
interviews.
There are seven emerged themes under the study of the experiences of
Numerous friends, (3) not easily accepting friends, (4)Decimate a person through
the use of social media, (5) Annihilated the life of a person, (6) Neglecting
On the other hand there are eighteen clustered themes from the
formulated meanings wich are : (1) Having many friends, (2)Nearly 5,000 ,
Dependinf if there are mutal friends, (6) Harassing through the use of social
media, (7) Torturing someone, (8) Pull down the reputation of a person, (9) Feel
anger and hurt, (10) Destroying someone’ s life, (11) lose self-esteem ,(12) lead
to depression and kill someone’ s life, (13) Sharing the problems to
the situation, (16) Unaffected by it and not thinking negative, (17) Learn to accept
Conclusion
Based on the gathered data by the researchers, it come up the conlusion that
the facebook website, there are a lot of people disseminating and spreading
socially in this digital era.They shared if they have a lot of friends on Facebook
numbers of units or people working and operating each other in social media
world. Not easily accepting friends on facebook is a safe way to avoid scamming
and bullying that happens on social media. It stated that are people sending them
The decimate a person through the use of social media is to ruin the
structure of a lavish number of people. The used of social media on the negative
feeling affected or expressively grief about thinking the hurtful word that bully
shared on social media that can steer in the hysterical life of a bullied person.
and behaviour of the people who getting bullied and to those who bully.
Recommendations:
formulated;
1.the netizens should should visite the timeline/background of a person who send
2.the bullies should know the effects of cyberbullying if they’re trying to hurt
someone.
3.The students should not be affected by the gossips for them to avoid
depression.
4.The personwho is trying to hurt someone should think before they click.
5.If ever you are a victim of cyberbullying you should open up to your parents to
Sub-code 1
Code Significant Formulated Meaning Cluster Emerged
No. Statement Theme Theme
1 Yes a lot Have friends -Having many
friends
2 Yes, Of Many friends -Gathered
course. many
friends
3 Yes Have friends
4 Yes Have friends
5 Yes..I have Many friends
alot
6 Yes Have friends
7 Yes...a lot Many friends
8 Yes Have friends
9 Yes Have friends
10 Yes Have friends
Sub-code 2
Code Significant Formulated Meaning Cluster Emerged
No. Statement Theme Theme
1 I think 900. Almost 1,000 friends -Nearly 5,000 Numerous
friends
2 Almost 4,000 Nearly 5,000 -Almost
4,000
3 Have a 2,500 More than 1,000
friends on
facebook
4 Have almost Exactly 5,000
5,000
5 Have 4,000+ More than 4,000
friends
6 4,000+ friends More than 4,000 friends
7 3,000+ Greater than 3,000
8 Have 3,000 Almost 3,000
9 5,000 friends Exactly 5,000
10 I think 1k More than 1,000
Sub-code 3
Code Significant Formulated Meaning Cluster Emerged
No. Statement Theme Theme
1 No, accept Not accepting strangers -checking Not easily
them if i know person’s accepting
them background friends
before
2 Yes to Accept a friend
accepting
discover new
friend -Depending if
there are
3 No,accept Accepting friends with mutual friends
them if there's mutual friends
a lot of mutual
friends
4 I don't always Checking the person’s
accept friend background
request i
always visiting
their timeline
to know them
so that i could
accept the
friend request
5 No, accept Accept only whom they
those people know
we know
6 only selected Accept if there are
those people mutual friends
have a lot of
mutual friends
7 No especially if Not easily accepting
we don't know strangers
the person we
should know
them before
accepting to
avoid
scamming and
Cynerbullying
8 Sometimes Checking the timeline/
Yes, background before
Sometimes No accepting
because when
someone
sending friend
request we
should always
stalking them
before we
confirm them
9 No especially if Not easily accepting
we don't know friends
the person to
avoid
Cyberbullying
10 No i check first Checking the
their background to know
background of them
what they are
and who they
are
Sube-code 4
Sub-code 5
Sub-code 6
Cod Significant Formulated Meaning Cluster Emerged
e Statement Theme Theme
No.
1 Just nothing Let alone them -Sharing the Neglecting
... Nevermind problems to someone/
them parents/friend something
s
2 Nevermind Let alone about them
them -Adore
yourself to
3 I just don't Not thinking about it play games
mind and to study
4 Open up to Sharing to love one's -By passing
parents or the situation
closed
friends
5 Ignore it By passing it
6 I don't think Not thinking of it because it
about it if i do can kill a life if noticing it
maybe i can
kill my self
7 Solve the Resolve the problem and
problem and proving that you are better
show to them
that you are
better than
them
8 Just think a Enjoy by playing games and
happy ways studying
like playing
games and
studying
9 Ignore it By passing and not be
because we affected from what they say
know
ourselves
and don't be
affected by
what they
say
10 Ignore and By passing and do not think
always think negative
positive
Sub-code 7
Code Significant Formulated Meaning Cluster Emerged
No. Statement Theme Theme
1 Think positive Not thinking negative -Unaffected Being
and show by it and not optimistic in
them that you thinking life
are fearless negative
2 Don't be Not be affected by false -Learn to
affected by information accept
gossips imperfections
3 Learn to Not be affected by it and -Utilize
accept your accept weaknesses maturity and
flaws and not avenge
Don't be
affected by it
4 Open yourself Let your parents know
especially to about what you truly feel
your parents
so that they
will know what
you truly feel
5 I Learned to Not be affected by it and
be strong and learned to be brave
don't be
affected by
those people
6 Think before Analyzing before posting
you click
7 I learned to Resolve own problem
Solve the and search for a ways to
problem and deal with it
find a ways to
overcome the
situation
8 Don't Revenge Don't payback
9 Be matured Become fully developed
in mind
10 Don't Revenge Don't reprisal and counsel
and give them them
advise to stop
doing it