Sei sulla pagina 1di 36

Young Students in Mindanao Christian Foundation College and Seminary Should

Not be Exposed to Gadgets and They Should Understand the Different Potential
Dangers of Cyber Bullying

A Research Paper

Presented to

Mr. Benjie Salcedo

English Subject Teacher

Mindanao Christian Foundation College and Seminary Inc.

High School Department

Catalunan Pequeo, Davao City

In Partial Fulfillment of

The Requirements

In English 10

World Literature with Research

By:

Reyes, Xyreil Sean S.

Delos Reyes, Noahdel M.

Infiesto, Mark Lawrence A.

Sardoncillo, Derek R.

Bonggo, Charlie C.

Abraham, Leah Dale Fora J.

March 2016
Acknowledgement

The researchers acknowledge the following persons who have extended


their great help in the accomplishment of this study.

We would like to express deepest gratitude to our teacher, Sir Benjie


Salcedo for his guidance, understanding and encouragement throughout our study
and research. Without his incredible patience and timely wisdom and counsel, our
thesis work would have been a frustrating and overwhelming pursuit. In addition,
we express our appreciation to Sir Rogelio Chavez and Sir Reynante Estardo for
having served our committee. Their thoughtful questions and comments were
valued greatly.

We would also like to thank my group mates Noahdel delos Reyes, Xyreil
Sean Reyes, Derek Sardoncillo, Charlie Bonggo, Mark Lawrence Infiesto and Leah
Abrahan, for not giving up our thesis work.

Thanks also to our fellow graduating students at the Mindanao Christian


Foundation College and Seminary (MCFCS) for supporting and memories we
make.

Finally we would like to thank our Lord for giving us knowledge, wisdom
and strength to face those scenarios that sometimes we experiences hard times in
making researches. We would not have been able to complete this thesis without
their continuous love and encouragement.
Dedication

We would like to dedicate this:

To our supporting and loving parents for their encouragement and


patience.

To our friends for their moral support.

To our teachers who guide us in every work we did, molded us to be


mature one. And help developed our talents and abilities.

And most of all our Almighty God for his love, protection, and guidance.
Abstract

This study is mainly focused on the effects of young students in Mindanao


Christian Foundation College and Seminary exposed to gadgets and the different
potential dangers of cyber bullying. This short report highlights the increasing use
of the Internet and online social networking technologies for health information and
health decision making, and the consequences of seeking information from sites
with biased or inaccurate health information. As the number of disreputable health
information sites continues to grow rapidly, this paper provides practical advice for
health providers on how they can help prevent health information consumers from
seeking inaccurate information online. Reflecting on the utility of online social
networking technologies for reaching large audiences, we recommend that health
providers use online social networking technologies to communicate with patients
and consumers of health information and direct them to reputable sources with
accurate health information. We outline the steps to this approach.

Young students using electronic gadgets like smartphones at a younger


age are increasingly exposed to certain social and health risks that come with it.
Parents and teachers, however, do not fully understand the negative effects of
using such devices. Many also do not teach young students how to use them
properly. There social and emotional risks when young students are exposed to
gadgets like gaming addiction and cyber-bullying, which could lead to serious
consequences. Young students could pick up negative habits like being violent, or
face problems in socializing with peers. Cyber bullying on social media is linked to
depression in teenagers and also in young students, according to new research
that analyzed multiple studies of the online phenomenon.

Victimization of young students online has received an increasing level of


scrutiny, Twitter, likewise, announced plans in April to filter out abusive tweets and
suspend bullying users. Social media use is hugely common among young
students and teenagers, said Michele Hamm, a researcher in pediatrics at the
University of Alberta, but the health effects of cyber bullying on social media sites
is largely unknown. Regular, face-to-face bullying during the teen years
may double the risk of depression in adulthood, and bullying's effects can be as
bad or worse than child abuse, studies show.

Introduction
Cyber bullying is a form of bullying that has been taking place a lot more in
middle and high schools because of the improvement of technology and increased
usage of social media networks. People say that online bullying is easier to get
away with than bullying in person. This may be true but this paragraph with give
reasons why people shouldnt think this. Refutation, Maybe its not the school
board that the blame should be put on rather than te parents should deal with
them. It is their kids so why not have the parents get involved and try to stop their
children from being bullies? Some may say its no one elses business on what the
do on the internet but some parents may feel hurt that their child could actually do
that.

The birth of the Internet and its success in changing the secondary
students has been largely researched in various subjects and defined in various
terms. But as years passes by the Internet evolves and creates new rules for
being aware from cyber bullying.

According to Strategy Analytics report (2007), Social media users will


exceed 1 billion by 2012. The enormous growth of Social networks (MySpace,
Facebook, BeBo)Blogs, Wikis and consumers There are lots of users of social
networking sites right now, even a young kids starting to have an account specially
Facebook, and some of them experienced cyber bullying. The 2013 Youth Risk
Behavior Surveillance Survey finds that 15% of high school students (grades 9-12)
were electronically bullied in the past year. Research on cyberbullying is growing.
However, because kids technology use changes rapidly, it is difficult to design
surveys that accurately capture trends.

Do you know if your middle school or high school had a punishment for
this? Exactly. It is not very common for schools to have cyber bullies suspended.
Not because of it being hard for them to get away with it, but because schools may
not realize how serious of an issue this really is. Middle schools and high schools
should have students who act as bullies on the internet suspended from school to
teach them a lesson on what they are doing is wrong. Many students have taken
their own lives because of another student saying something harmful to them
online, and this needs to stop. I think that cyber bullies of middle school and high
school ages should be punished because they will finally understand that what
they are doing is wrong.

A social networking is an online interaction service that managed to build


people and connect them with shared interest (Boyd & Ellison, 2007). Social
networking sites such as MySpace, Facebook, and Twitter has attracted millions of
users who have integrated these sites into their daily practices. Some sites cater to
diverse audiences while others attract people based on their common language or
national based identity by making their own blog in the web. Last year, there are
483 million daily active users on average in December 2011 and they had 845
million monthly active users at the end of the said year (Facebook, 2011).
Moreover, these sites are becoming so popular in the status quo because it
continuously attract many people especially Teenagers since their interests are
being catered by these websites .Besides, virtual communities enhance peoples
friendship and love relationship. In line with this, three of many features that SNS
could offer- first, users can make their own profile that would associate to their
selves and users could easily edit it as much as they want to share their
information by adding friends. Second, there is an instant messaging, so you can
easily communicate to other parts of the world in your place and time. And lastly
you could check the other users profile including their pictures and read their
personal information without their permission. Further, todays generation has
become so technology dependent. Students tend to consult the educational related
websites such as Google to supply their needs from time to time but then they also
visited other websites including Facebook to check their profile and ended up they
spend too much using Facebook rather than making their assignments or
whatsoever. Having these statement we could accumulate that Social Networking
Sites brought a great impact to the youth especially teenagers. Thus, this impact
could be advantageous and disadvantageous. (Boyd, d. m., & Ellison, N. B. 2007).

What are the negative effects of social networking and what are the
problems that result from these effects? Now, this term paper aims to discuss the
effects of social networking sites to teenagers. It increasingly interest academic
and industry researchers who were intrigued by Social Networking Sites
affordability and reach. Besides, we researchers want to specify that we would like
to discuss only negative effects of Social Networking Sites to teenagers focusing
with these areas. First, Social Networking causes cyber bullying and personal
fraud. How are these two connected? According to Ann Frisn, Professor of
Psychology at the University of Gothenburg, Cyber bullying occurs when new
technologies such as computers used to harass or bully somebody. The
perpetrators often use SMS, e-mail, chat rooms and Facebook to spread their
message. While personal fraud is a crime type that is rapidly growing in the society
because of the wide range of expansion and availability of internet technology and
the enhancement of electronic storage, spread and distribution of data (Australian
Bureau of Statistics,2008). Then, cyber bullying and personal fraud would lead to
several problems, these includes: depression, isolation and invasion of privacy. For
better understanding, the researchers would discuss briefly these three problems.
First, Young victims of electronic or cyber bullying which occurs online are more
likely to suffer from depression than their tormentors are a new study of (Science
Daily, 2010). Cyber bullying has more grave impact to its target victim mentally
because of its wide range of audience since it can be seen worldwide and this
causes traumatic experience to the victims that lead to mild or severe depression
rather than traditional bullying which caters only limited audience. Because of
severe depression of the victim that would lead to another problem which is
isolation since the victim is being humiliated it would now be a hindrance for the
victim to mingle and could weaken the strong ties as e result of preoccupied mind
and eventually interferes and lessens with the victims interpersonal skills. This is
true also for the victims of personal fraud since their information are being stolen.
And this would lead to invasion of privacy, since the victim has no personal space
anymore and plagiarizes the personal data of the victim. For further integration, the
researchers would discuss thoroughly these problems in the later part and discover
how these affect the point of view of the readers. Furthermore, the researchers
have conducted this study to give importance to this rising problems and to look at
the possible effects and analyze each effect further. If each effect would already be
understood then pieces of advice on lessening these effects will be further studied
and eventually be given by experts.

Chapter 1

REVIEW RELATED LITERATURE


YOUNG STUDENTS SHOULD NOT BE EXPOSED TO GADGETS AND THEY
SHOULD UNDERSTAND THE DIFFERENT POTENTIAL DANGERS OF CYBER
BULLYING

There has been much discussion over the last few days about whether it is
appropriate for schools to actively monitor the social media activities of students. At
the center of this recent interest is Glendale Unified School District, which is
located in Southern California and has a middle and high school student
population of about 14,000. The district has contracted with Geo Listening, (a
Hermosa Beach, California-based tech company founded in January) to monitor
and keep track of the various things their student body says, posts, shares, and
does online.

The company states that it actively looks for anything online that could
threaten the safety and well-being of students in the district, including cyberbullying
and threats of self-harm. These could be posts that are initiated from school, or
not; using school-owned technology, or not. The technology also allows for the
flagging and reporting of drug use or class-cutting or really anything publicly
posted by a student that could be viewed as problematic to the school.

According to the Cyber bullying Research Center, there are contacted fairly
regularly by tech companies who have developed some technological solution to
cyber bullying that they are looking to market to schools. Weve yet to be swept off
our feet by any of these proposed solutions, and what Geo Listening is doing is
similarly not very innovative or revolutionary. That said, the question remains:
should schools be in the business of actively monitoring what their students are
saying online?

Most people would agree that parents have a responsibility to keep tabs on
what their kids are doing online. This is best accomplished, in my view, by actively
participating in the online activities with them and asking questions about what
they are posting and who they are interacting with. Parents frequently ask me,
though, whether it is a good idea to install tracking or monitoring software on their
childs computer or cell phone as a way to monitor. This is a tough issue. On the
one hand, I am not in a position to tell anyone how to parent their kids. So when
responding to this question, I simply explain the potential consequences of going
this route. If a parent chooses to surreptitiously monitor the online activities of their
kids, eventually they will find something that they will have to confront their child
about. When they do, and their child finds out that the parent had been spying on
them, it will be extremely difficult to repair the harm done as it relates to
encouraging an open and trusting relationship in the future.

In general, if a parent thinks it is necessary to take such a step, then advise


them to make their children aware of it. Parents should tell them why they are
installing the software and explain that the primary goal is to protect them. Finally,
parents should use this as an opportunity to encourage responsible use by telling
their children that as they demonstrate safe and appropriate behaviors online over
time, they will gradually earn more privacy. This can be a very effective strategy for
early Internet users who are still learning how to navigate the World Wide Web
safely. A concern we have is that some parents may fall into a false sense of
security when they hear that the school is paying someone to watch over what
their kids are doing online and therefore not take the time to do it themselves.

The reality of course is that if a child wants to circumvent tracking and


monitoring software, it is pretty easy to do. They will go online from a friends
house using their device, or log on from another location, such as the public library.
Even if they had two separate principals in different schools telling that an 18 year-
old senior had picked up a tracfone or other pay-as-you-go device from Walmart to
give to their 15 year-old girlfriend, whose mom and dad didnt even know that she
had it. The point is, if you push too hard, teens will go underground which will make
it even more difficult to keep up. And finally, research has cast doubt on the
effectiveness of monitoring and blocking software in preventing experiences with
cyberbullying.

Some argue that schools monitoring social media amounts to a violation of


a students privacy. We are not particularly convinced of that. Most students are
savvy enough to realize that what they post in public spaces online is open for
anyone to see. And they know that schools are looking. Counselors, principals, and
school resource officers have been looking for years. The only thing new about this
is that a school is contracting with a third party to do the looking.

Most students say that they have their Facebook accounts set to private.
Indeed, in early research into the social media behaviors of students on MySpace
(remember that site?), we found that in 2006 less than 40% of students had set
their profiles to private. By 2009, 85% of the active users had their profiles
restricted. And this was not a survey of students where we asked them to report
what they were doing. We randomly selected profiles to carefully review to see
how much information was publicly visible. So very early on over four years ago
students recognized the need to avoid having their profiles open for the whole
world to see. Furthermore, more and more teens are moving to ephemeral
communication apps like Snapchat that make it more difficult to watch over and
track what they are saying.

From perspective, schools (along with parents, of course) do have an


obligation to keep track of what students are doing online. However, that schools
should need to go on fishing expeditions where they scour the Web and social
media for inappropriate behaviors. In a perfect world, paying a company to watch
over the online interactions of students wouldnt be necessary. That schools should
work to develop a culture where everyone looks out for everyone else and if
something of concern arises, someone will step up and take appropriate action.
Most of the time, when there is a threat to cause harmeither to ones self or
otherssomeone sees or hears about it. What do they do at that moment? Are
they empowered to take action themselves? Do students feel comfortable talking
with an adult at school about what they witnessed or heard about? Do they feel
that telling an adult at school or at home would resolve the situation?

There is also the added benefit in that by encouraging and empowering


students to come forward with concerns, schools have many more people on the
lookout for trouble and are able to access much more potentially problematic
information since even private profiles (not accessible to a 3rd party monitoring
company) are visible to at least some students.

Whether other school districts are also paying others for these services
(were not aware of any). Geo Listening claims that they expect to be working with
more than 3000 schools worldwide by the end of the year. So, this is just the
beginning of the discussion we will have. It remains to be seen how this latest
experiment in using a technological solution to solve a social problem will work out.

Theoretical framework

Student in MCFCS uses gadgets for social media, social media is


something we all use every day, but an air of caution should be used. Posts you
make on Facebook, Twitter, Instagram and other sites can be seen by millions of
people and can get out of hand very easily. Social networks can be used for a
variety of purposes. Here in MCFCS some students are creating a large pool of
friends from many aspects of their life. That doesnt mean all friends are created
equal. Use tools to manage the information their share with friends in different
groups or even have multiple online pages. If youre trying to create a public
persona as a blogger or expert, create an open profile or a fan page that
encourages broad participation and limits personal information. Use your personal
profile to keep your real friends (the ones you know trust) more synched up with
your daily life. People nowadays freely give out their personal information on social
media without knowing the implications of such actions in students in MCFCS. The
proliferation of social networking sites creates the illusion of fun that made people
to overlook the downsides of using these media. This paper examines the privacy
awareness and general concerns of undergraduate students who form the bulk of
users of these media. An evaluation of students has been carried out to assess
their level of concern for privacy and how conscientious they are regarding privacy
policies. The work also examines whether based on the awareness, users are
more careful or generally carefree. Furthermore, the research also sought to
evaluate whether the privacy policies as currently presented is adequate. Another
objective of the research is to examine better ways of engaging users if the
composition and presentation of privacy policies are found to be contributive to the
low level engagement.

Social networking communities are here to stay. Facebook has over 500
million users, while Twitter has over 200 million. Thats not even counting blogs or
YouTube video blogs. Theres no doubt that students are actively engaged in
online communities, but what kind of effects are these sites having and how can
parents counteract the bad and bolster the positive? Students, who attempt to
multi-task, checking social media sites while studying, show reduced academic
performance. Their ability to concentrate on the task at hand is significantly
reduced by the distractions that are brought about by YouTube, stumble upon,
Facebook or Twitter. Between cell phones, social media websites, and online
gaming, students today seem to have more outlets for interacting with each other
virtually than they do for interacting with each other in person. However, with all of
the good social interaction that is done as a result of these technologies also
comes the bad. In addition to the physical and verbal bullying that may take place
at school, cyber-bullying in the form of harassing text messages and derogatory
posts on students Facebook or Twitter accounts is now commonplace. Even
though it may not take place in person, the emotional and psychological effects of
cyber-bullying areINDEPENDENT VARIABLE
just as destructive. Since new media and cell phones are harder
to track and monitor, parents need to take preventive measures that can help
of
minimize the effects Privacy and security
cyber-bullying settings
on their children.exist for a
reason
Once posted, always posted
Conceptual Paradigm:
Protect your reputation on social
networks
Know and manage your friends
Be honest if youre uncomfortable
Know what action to take
DEPENDENT VARIABLE

MINDANAO CHRISTIAN FOUNDATION


COLLEGE AND SEMINARY

Statement of the Problem

The study intends to determine the effects of being exposed to gadgets and the
potential dangers of cyber bullying To all year levels of high school students of
Mindanao Christian Foundation College And Seminary Inc.
Further, it sought answer to the following questions.

1. What is the Demographic profile of all year levels of Mindanao Christian


Foundation College And Seminary Inc.?

2. What would be the significance effects of being exposed to gadgets?

3. What would be the impact of the social networking sites on students victimized
by cyber bullying?

4. What has the highest weighted mean?

5. Which has the lowest weighted mean?

Significance of the Study

The results of the study and research provided valuable insights into the
current social media strategies of organizations and the reasoning behind them.
Judging from both their strategies and their social media experience, it was clear
that communications planners recognize social medias value even if they dont
actually utilize it during emergencies. The study found that, despite planners
acknowledging the value of incorporating social media, 58% of respondents had
no plan, with lack of authorization being the biggest factor of this response.
Additionally, the importance of mobile devices is increasing, while many deem
landline phones as increasingly unreliable for emergency communications.
Respondents were asked questions such as, whether they include social media
such as Facebook and Twitter within their emergency communications strategy,
whether they plan to do so (also why or why not), and how social media fits in with
their other tools such as landline phone, mobile phone and email. Respondents
were also asked about the growing role of mobile versus landline channels and
how social media fits into that trend. Its increasingly important that organizations
recognize that lacking a social media strategy during a crisis is a strategy in and of
itself, albeit not a good one. The public increasingly expects organizations to use
social media both as an inbound and outbound form of communication. If your
organization isnt using social media both to communicate and monitor information
during incidents, you risk missing out on important situational intelligence that
could be critical to your operations and the safety of your employees and key
constituents,

The importance of this study is to aware students in cyber bullying, Young


students cyber bully for many reasons. Some do it to deal with their anger, seek
revenge, or make themselves appear better than their peers. Others do it for
entertainment or for the pleasure of tormenting others. Still others do it simply
because they can. By remaining anonymous, and avoiding face-to-face contact,
cyber bullies may not realize the consequences of their actions. As a result, they
are more likely to say and do things they might hesitate to say or do in person. And
young students are often hesitant to report cyber bullying because they are afraid
that doing so will lead to restrictions on their own Internet or cell phone use or they
believe nothing can be done to stop it. Technology provides todays students with
an infinite number of distractions; mobile devices have literally put texting,
facebook, and addictive games at their fingertips. Although some educators might
perceive this technology as a bane to classroom learning, it can actually be one of
your most powerful educational tools. All of your students can benefit from
technology in the classroom, but new advancements have become particularly
useful for those with special needs. Known as assistive technology (AT), these
developments help level the playing field for students with special needs, giving
them a greater chance at success in some of the more challenging areas. This
study will evaluate how students influence to use gadgets that will lead to cyber
bullying.

Scope and Delimitation

They love it! And oftentimes it seems that they cant live without it. The rise
of social networking sites has students throughout the Mindanao Christian
Foundation College and Seminary fanatical about these addictive websites. Social
networking is a platform of online sites that focus on building relationships among
co-students who may share the same interest or activities. It provides a way for
users to interact over the Internet. Users are often identified by their profiles, which
can consist of photos and basic information, such as location, likes and dislikes, as
well as friends and family. Well-known sites such as Facebook, MySpace, and
Friendster, have taken social networking to a new level. In addition to the
convenience of being able to access these websites from a computer, there are
also applications on mobile devices that make it easy to access social applications
anywhere and anytime. As a teacher, you want to make sure your students is safe
when he or she is engaged in social networking. You may find it challenging to
keep up with the ever-changing technology. You may also feel like your students is
much more Internet savvy than you are, and in fact, that may be true. But as savvy
as your student may be, he or she may not be aware of the dangers of online
networking and what precautions he or she should take to stay safe. It is time to
talk to your teen about social networking safety.

There are plenty of good things about social media but also many
potential dangers and things that you want the students and teens to avoid. They
don't always make the smartest choices when they post something to a site like
Facebook or YouTube, and sometimes this can lead to problems. So it's important
for parents to teach their students how to use social media wisely. People can
worry about a lot. Like everything else in this world, social media is something
that the adults in their life will get nervous about. While theres good reason for
that, its not easy for them to understand why Facebook or Twitter is such a big
deal. Social networking sites, chat rooms, virtual worlds, and blogs are how
students socialize online; it's important to help them learn how to navigate these
spaces safely. Among the pitfalls that come with online socializing are sharing too
much information or posting comments, photos, or videos that can damage a
reputation or hurt someone's feelings. Social networking sites like Facebook,
Twitter, and Foursquare have become an integral part of human life, and their use
has increased considerably over recent years. Facebook is the fastest growing
social networking site, but little research has investigated the negative outcomes
relating to the problematic use and predictors of this media phenomenon. Social
media platforms, such as Facebook, provide up-to-date, accessible and
personalized communication, yet they also have the potential to become
addictive. For those that do develop addictive symptoms, there can be serious
negative results. Such addictions can result in academic failure, sleep
deprivations, social isolation, health issues and many other impairments for
adolescents and young adults; they can also result in reduced work performance
and marital discord and separation for students.
Definition of Terms

Exposed - To reveal the guilt or wrongdoing of.

Potential - Capable of being but not yet in existence; latent or undeveloped.

Caution - Careful forethought to avoid danger or harm.

Variety - The quality or condition of being various or varied; diversity.

Aspects - A way in which something can be viewed by the mind.

Persona - The character represented by the voice of the speaker in a


literary work.

Blogger - To write entries in, add material to, or maintain a blog.


Synched - To cause, to agree in time or to make (things) happen at the same time
and speed.

Proliferation To increase in number or amount quickly

Downsides A part of something that you do not want or like.

Implications A possible future effect or result.

Undergraduate A student at college or university who was not yet earned a


degree.

Conscientious Very careful about doing what you are supposed do.

Derogatory Expressing a low opinion of someone or something.

Respondents A person who gives a response or answer to a question that is

asked specially as part of a survey.

Deem To think of (someone or something) in particular way.

Outbound Traveling away from a place.

Constituents Any one of the people who live and vote in an area.

Tormenting Extreme physical or mental pain

Bane Killer, slayer, poison, death, destruction

Fanatical Mark by excessive enthusiasm and often tense uncritical devotion.

Deprivations The state of not having something that people needs.

Bulk The largest part of something, large size of someone.


Chapter 2

Research Methodology

Research Design

The purpose of this study is to aware the young students from exposing to
gadgets to minimize cyber bullying in social networking sites like facebook, Twitter
and other sites and to understand the different potential dangers of cyber bullying.
For example, what major types of problems the users are facing and the feedbacks
from the users who are victimize by cyber bullying.

Participants

The participants of this study included High school students in MCFCS


representing different year levels in grade 7 there are 33 students, in grade 8 there
are 40 students, in grade 9 there are 34 students, and in grade 10 there are 43
students of system responsibility. Participation in this study was completely
voluntary and the participants had the right to withdraw from the study at any time.
Each participant was presented with a consent document that detailed their rights
as a participant, and to obtain approval for the response information to be used as
part of this study.

Instruments

The study was primarily utilized as self- designed survey questionnaire. The
questionnaire serves as the primary instrument in data gathering. The researchers
asked permission to look into solving the problem and looking some documents
gathered, the research critically analyzed the data first, to determine reliably and
second to determine the true meaning and value of the data.

Data Gathering Procedure

The researchers of this study followed some procedures in order for them to
achieve the objectives of this work. First, they prepared a questionnaire in a form
of a checklist which covered all the variables included in their statement of the
problem. The researchers presented it to their English teacher who is Mr. Benjie
Salcedo and asked for his approval before they were finally able to reproduce
enough copies of the questionnaires intended for their respondents to answer.
Additionally, with the help of our statician Mr. Reynante Estardo the mathematics
teacher of MCFCS.

Chapter 3

RESULTS AND DICUSSIONS

This chapter deals with the result of this study from the tabulation of the data
gathered using effective statistics treatment.
TABLE 1. Weighted mean of the Young Students Should not be Exposed to
Gadgets and they Should Understand the Different Potential Dangers of Cyber
Bullying.

5 Strongly agree 4 - agree 3 Neutral 2 Disagree 1- Strongly Disagree

QUESTIONS 5 4 3 2 1 WEIGHTED INTERPETATION


TOTAL MEAN

1. I feel indifferent 20 84 168 90 23 385 2.57 DISAGREE


when I don't have
the most updated
model of a digital
gadget
2. I accept 55 108 105 80 37 385 2.57 DISAGREE
strangers who try
to friend me in
networking sites.
3. I use an online 16 220 132 22 7 546 3.04 NEUTRAL
network to keep 5
in touch with my
family and
friends. and
share my
experiences.
4. Ive been a 20 60 75 90 61 306 2.04 DISAGREE
victim of online
bullying in social
networking sites.
5. My parents are 11 232 126 40 8 516 3.73 NEUTRAL
aware of my 0
social networking
activities.
6. I experienced 25 120 159 60 32 396 2.64 DISAGREE
sending nasty
messages and e-
mails to my
classmates and
friends.
7. I might not be 45 60 126 86 41 358 2.39 DISAGREE
aware of the
potential harm or
danger of
cyberbullying.
8. I spend my 12 204 138 44 7 513 3.42 NEUTRAL
vacant time in 0
surfing social
networking sites.
9. I have sought 45 136 162 52 27 422 2.81 DISAGREE
emotional/practic
al support when
Im worried about
or have been
affected by cyber
bullying.
10. 23 176 123 22 7 563 3.73 NEUTRAL
Communication is 5
difficult without
technological
gadget
nowadays.
11. Social 95 184 168 34 12 493 3.29 NEUTRAL
relationship is
ruined by social
networking sites.
12. I use gadgets 13 224 135 32 6 532 3.55 NEUTRAL
and surf social 5
networking sites
regularly.

13. I feel upset, 13 148 162 50 7 502 3.35 NEUTRAL


hurt and 5
embarrassed to
my classmates
when they sent
me nasty
messages and
images.
14. Exposing to 17 184 141 34 6 535 3.57 NEUTRAL
gadgets create 0
generation gaps
between children
and parents.
15. I prefer to 80 140 156 58 18 452 3.01 NEUTRAL
open my
accounts in some
networking sites
first before
studying and
doing my
assignments.
16. I unserstand 18 224 105 38 3 555 3.7 NEUTRAL
the different 5
potential danger
of cyber bullying.
Discussions

This chapter deals with the presentation analysis and interpretation result
about the young students exposing to gadgets and the different potential of cyber
bullying. Students is the mostly victims of this kind of situation. Bullying in Middle
School is probably one of the hardest levels of aggression a young person has
to face. Most kids are still at the age where they do not feel the rules of society
apply to them. Adolescent girls are just as likely, if not more likely than boys to
experience cyber bullying . Cyber bullying is related to low self-esteem, suicidal
ideation, anger, frustration, and a variety of other emotional and psychological
problems. Cyber bullying is related to other issues in the real world including
school problems, anti-social behavior, substance use, and delinquency. Traditional
bullying is still more common than cyber bullying . Traditional bullying and cyber
bullying are closely related: those who are bullied at school are bullied online and
those who bully at school bully online. As kids transition from elementary to middle
school, they are increasingly the targets of cyber bullies, according to a recent
study .

But the researchers studying U.S school kids in grades 5 through 8 found
that verbal and physical bullying declines as students get older. Because bullying
patterns vary, bullying intervention and prevention strategies must address all
types of bullying as well as differences in bullying among boys and girls, the
researchers said. The study was published recently in School Psychology
Quarterly.

"School-based interventions need to address the differences in perpetrator


and victim experiences," said study author Cixin Wang, an assistant professor at
the University of California, Riverside's Graduate School of Education. "The key is
to use individualized specific interventions for bullying, not a one-size-fits-all
approach," Wang said in a journal news release.

Researchers examined three semesters of data compiled on 1,180 students


at schools in the Midwest. The investigators looked at the amount and type of
bullying that took place as well as the number of students victimized. They also
considered variables such as the children's gender, grade and whether or not
English was their native language. The bullies themselves were also grouped into
three categories: 5 percent bullied frequently; 26 percent were occasional
traditional bullies; and 69 percent bullied infrequently.

Although the amount of bullying decreased over time, the authors found that
it surged between fifth and sixth grade when the students in the study moved from
elementary to middle school. Overall, the study found that girls were more often
the targets of cyber bullying and verbal and relational bullying than boys. Boys,
however, were more likely to be physically bullied. Whether or not students spoke
English as a second language did not appear to have an impact on whether or not
they were bullied, the findings showed.

The study authors said schools could help prevent bullying among students
through the following strategies:

Focus bullying prevention and intervention programs on students in sixth


and eighth grades, teaching them social-emotional learning skills and
healthy ways to cope with new peer groups and social hierarchies.

Consider different bullying interventions for boys and girls. Strategies


targeting girls should focus on relationship issues and how to use social
media responsibly. For boys, interventions should focus on physical
bullying.

Schools and parents should also talk to students about cyber safety.
Children should be supervised when using the Internet and mobile devices
so they learn how to avoid being victimized. Any reports of bullying should
be taken seriously

The survey table is about the students behavior in using gadgets/social


media which composed of 16 questions, which this questionnaires are related to
the students response regarding the expose of gadgets and different potential
danger of cyber bullying . The highest

The highest weighted mean presented in the table with the total of 3.73 that
shows that the parents of the students of MCFCS is aware of their child activity in
social networking sites and student shows that communication is difficult without
technological gadgets nowadays. Out of 150 students respondent there are
15.37% of student who choose strongly agree among the 16 questions that we
made, 16.23% who agreed with these 16 questions, 29.19% who choose to
answer neutral with 16 questions, 25.58% who answered disagree in 16 questions
and 13.63% who answered strongly disagree in our 16 questions.

Chapter 4

SUMMARY, CONCLUSION, AND RECOMMENDATIONS

Presented in this chapter are the research summary of findings, conclusions


formulated and the recommendations based on the result of the study.

Summary

The overriding purpose of this study was to determine the number of young
students in secondary level that is aware of harmful effect of cyber bullying in
social networking sites. To accomplish that goal it became necessary to reach
some prerequisite goals. Determining what general idea to think if it is necessary to
take such a step, then advise them to make the students aware of it.

The Internet has created a whole new world of social communications or


social networking for young students who are using e-mail, Web sites, instant
messaging, chat rooms and text messaging to stay in touch with friends and make
new ones. While most interactions are positive, new technologies have given
young students a new and powerful platform from which to target peers through
social networking. One effect that social networking have brought to the society is
cyber bullying.

Cyber bullying is defined as bullying through information or communication


technologies (Webster, n.d. 2011), mediums such as, e-mails mobile phone text
messages, phone calls, internet chat rooms, instant messaging and most
importantly and recently, social networking websites such as MySpace, Facebook,
and Bebo. As part of the study, the researchers have tackled on the prominent
reasons why social networking greatly causes cyber bullying to teenagers
(Hardcastle, M. 2012). To begin with there are a lot of reasons why social
networking causes cyber bullying. According to Rebecca Sweeney (Online
Conference on Networks and Communities, 2011), social networking has been
used as a platform for bullies to say things they might not usually say to someone
in person. This is because they do not have the feeling of fear anymore since there
is anonymity and no physical proximity on the victims. Bullies could just easily
contact or attack their victims. These attacks include receiving threatening
messages; having their private emails or text messages forwarded without
consent; having an embarrassing picture posted without permission; or having
rumours about them spread online. Another, bullies can come in online contact with
their victims anytime, anywhere, day or night and not just in a school yard; making
online bullying more accessible. Also, bullies have this feeling of confidence
whenever they are online due to the lack of fear already, enabling them to do what
they want and it has a very wide audience who can be able to witness the whole
bullying events. In addition, cyber bullying has also turned the usual image of "the
bully" on its head; it's no longer only the "tough kids" who may act aggressively it
can just as easily be the shy, quiet types, hidden behind their computers making
victims of cyber bullying.

There are a lot of reasons why it causes depression among students of


Mindanao Christian Foundation College and seminary. According to (Sweeney, R.
2011) that in terms of cyber bullying, even though that it is not coming in physical
contact and instilling physical injury on a victim, its emotional and psychological
effects are devastating for the victim and can often lead to depression. Also, unlike
traditional forms of bullying, youth who are the targets of cyber bullying at school
are at greater risk for depression than are the youth who bully them, according to a
survey conducted by researchers at the National Institutes of Health. The new
finding is in contrast to earlier studies of traditional bullying, which found that the
highest depression scores were reported by another category of youth involved in
bullying-bully victims. Past studies on traditional bullying show that bully-victims
those who both bully others and are bullied themselves are more likely to report
feelings of depression than are other groups.

Conclusion

Are you interested in Facebook, Myspace or twitter? These are just some of
the social networking hat are popular nowadays. Social networking hit the
mainstream when many of the social networking was launch from 2003 onward.
Currently, there are no reliable data regarding many people use social
networking ,although marketing research indicates that social networking are
growing in popularity worldwide (Comscore,2007), but what really is social
networking? These are using social web pages, which allow an individual to
construct a public profile that could because to interact with other people online. A
major component of the use of social networking is to browse other peoples profile
pages. It typically provide general biographical information, photos, statements out
ones views and interests as well as detailed description of the persons social
environment through friend lists and comments or guestbook entries. In addition,
some social networking users provide more narrative information about their lives
by maintaining weblogs embedded in their profiles. Meanwhile, some sites cater to
diverse audiences, while others attract people based on their common language or
shared racial, sexual, religious, or national-based identity. The first notable social
networking site was SixDegrees.com which allowed users to create profiles, list of
their friends and beginning in 1998, surf their friends list. With this more and more
social networking sites that involve social networking, came out until they became
a global phenomenon. As social networking become phenomenon in the status
quo, the rise of negative social effects within our society also rises. We would have
increasing instances of cyber bullying and further cases of personal fraud that
could affect not only the victims themselves but also the perpetrators and the
people surrounding them. This could also result to even more grave problems on
the victims and bullies parts. We will also see our strong ties relationships weaken
to a shallower and convenient type of affairs and conversation among teenagers
due to some issues that may hinder interpersonal skills. It could cause depression
among the individuals involved may bring traumatic experiences to them. In
addition, it could also affect privacy issues and may be crucial when it already has
become illegal. Furthermore, social networking has had a huge negative impact on
our psychological and social aspect and will continue to do so into the future if it
would not be prevented. It is also evident that social networking facilitates all these
issues and concerns. Therefore it is undeniably true that Facebook, Twitter,
MySpace, and the like do in fact cause more harm than good in our society.

Recommendations

We write this paper to communicate our beliefs that health providers,


through a small commitment to use online social networking technologies, can play
an active role in preventing the growing trend of patients receiving inaccurate
health information online. Fortunately, they can do this in a way that takes little
time, is in accordance with legal regulations, and will bring both societal and
economic rewards without compromising their privacy or identity.

We outline the following steps for health practitioners and believe that these
steps can prevent patients from receiving inaccurate health information and
improve the practice of health providers:
1. Create an account on Facebook, Myspace, or any online social networks
that may be relevant to your specialization and the patients you advise.
Accounts can be set up as profile pages, describing an individual, or as a
corporate or (secondary) page. A secondary account can be created in
order to keep your profile professional and public while also being able to
maintain a private life.

2. Provide information about your expertise along with a statement that


includes advice that you would provide for others including websites that
you have seen provide accurate health information. By posting references
to websites that are reputable sources for health information (such as the
Centers for Disease Control and Prevention websites), health providers
will be able to reduce the impact of consumers receiving inaccurate health
information online. Further, providers can avoid potential legal issues by
referring online health information seekers to view government websites
that have been set up to provide accurate health information. In the United
States, only 1 of the top 10 most visited health websites is a government
(.gov) sites.

3. Provide information about your location, whether you are willing to receive
emails, and how often you plan to respond to their messages. Set your
profile security settings to a level according to your comfort. Provide
information about your specialty and background. It is important to set up
security settings and state your level of commitment to those who might
contact you. Taking a more active role in communication with patients via
social networking technologies (such as through multi-media posts or blog
updates) could potentially increase patients for providers who want to
expand their practice. In fact, many people report having found a health
provider or keeping in touch with their provider through online social
networks.
Table Of Contents

I. APPROVAL SHEET

II. ACKNOWLEDGEMENT

III. ABSTRACT

IV. INTRODUCTION

V. CHAPTER I

Review of Related Literature

Theoretical Framework

Conceptual Paradigm

Statement of the Problem

Significance of the Study

Scope and Delimitation

Definition of Terms

VI. CHAPTER II

Participants

Instruments

Data Gathering Procee

RESEARCH METHODOLOGY

Research Design

VII. CHAPTER III


RESULTS AND DISCUSSIONS

Discussions

VIII. CHAPTER IV

SUMMARY, CONCLUSIONS, AND RECOMMENDATIONS

IX. LIST OF RESPONDENTS

X. CURRICULUM VITAE
List of Respondents

S.Y. 2015-2016

Grade 7 Diamond

Male Female

1. Abog, Gary 1. Adan, Aleah May


2. Apud, Ralph 2. Angadan, Keziah Wyne
3. Caintic, John Royce 3. Butardo, Jelou
4. Calingan Rey Jarone 4. Delos Reyes, Andrea
5. Eltagonde, Harvey Jones 5. Domingo, Josephine
6. Furog, Alekxander 6. Galindo, Ellyn Faye
7. Gonzales, Jack 7. Garzon, Derlie Mae
8. Ingutan, Adrian 8.Jalbuena, Jana Allysa
9. Martinez, Alger Jhon 9. Jusayan, Germaine
10. Mollina, Mcbrean 10. Lumapas, Monique
11. Paguntalan, Franz 11. Magbanua, Donna
12. Shansing, Ryan Kenneth 12. Mante, Mary
13. Solijan, Myrnel 13 Mendez, Andrea
14. Te huy, Luke Albe 14. Mendoza, Alexis Nicole
15. Toul, Kirk Ivan 15. Luz, Iha
16. Sabornido, Shamy
17. Soriano, Shaera May
18. Suarez, Lalaine Jade
19. Yebes, Mary Abigail Mercel
20. Redillas, Gabby
21. Rosalejos, Valerrie
List of Respondents

S.Y. 2015-2016

Grade 8 Garnet

Male Female

1. Aurita, Shemuelery 1. Astillero, Grace Ann


2. Baltonado, Ash Shanley 2. Bacanaya, Christine
3. Borre, Caesar Chuck 3. Bayla, Elyka
4. Culasing, Marlou III 4. Cajes, Cyndee Joyce
5. Henoguin, James Ian 5. Caredo, Strawbyrose
6. Jaugan, Marloun 6. Esguerra, Natasha May
7. Luna, Anjoe Fritz 7. Esguerra, Trisha Marie
8. Manzano, Chuck 8. Fabriga, Ana Victoria
9. Maturan, Ernest Saul 9. Francisco, Alexander
10. Medina, Jerome 10. Gabato, Danica
11. Medina, Mark Andrei Rey 11. Gador, Remah Joy
12. Monreal, John Micheal 12. Gustilo, Suie
13. Morishita, Christopher 13. Imperial, Sam Jussel
14. Palo, Floyd Christian 14. Jaroda, Dianne Gretch
15. Ricalde, Harvey 15. Javier, Bea Patrice
16. Salise, Jordan Paul 16. Lacia, Rebecca
17. Santos, Ernest Walter 17. Mante, Hanna Angela
18. Sasedor, Jan Floyd 18. Nadera, Kizel Faiz
19. Violan, Nikko Andrei 19. Regner, Eula Jane
20. Rodrguez, Claire Sheira
21. Sardoncillo, Mary Charis
22. Verdida, Richely
List of Respondents

S.Y. 2015-2016

Grade 9 Emerald

Male Female

1. Aguinsatan, Christian Albert 1. Alpas, Christine Joy


2. Alpas, Rodolfo 2. Alvar, Swhirly Anne
3. Amora, Cedrick Jay 3. Aosa, Andrea Joy
4. Bayla, Edijay 4. Apolinares, Junica
5. Blanco, Carlos Mig 5. Bolongaita, Chrystylnie
6. Cabactulan, Matthew 6. Briones, Ericka
7. Ducusin, Christian Noel 7. Butuasan, Cery
8. Fajardo, Kenneth 8. Carmona, Margaux
9. Infiesto, Nicole John 9. Javier, Evernica
10. Jugueta, John Philip 10. Langi, Diana Jane
11. Justonal, Wendell 11. Saberon, Lady
12. Luminarias, Zedner 12. Songcat, Glecy
13. Nabatar, Alexis 13. Vilos, Zephaniah
14. Neo, Patrick Miles
15. Ong, Valdwin
16. Samillani, Ian Lemuel
17. Sasedor, Dann Zachary
18. Toledo, Clark
19. Visabella, John Paul
20. Yebes, Jethro
List of Respondents

S.Y. 2015-2016

Grade 10 Onyx

Female

Male 1. Abrahan, Leah Dale Fora


2. Aguila, Deo Micah
1. Aguinsatan, Robert Andrew 3. Angadan, Jephunnah
2. Bangot, Ryan 4. Barol, Ella Mae
3. Batulan, Loen Mark 5. Caballo, Hanna Kathleen
4. Bonggo, Charlie 6. Caballo, Kate Issabel
5. Comiso Jr., Jimmy 7 . Culasing, MekaylaCiahara Lou
6. Coretico, Christian Paul 8. Delos Reyes, Noahdel
7. Digdigan, Jake ALson 9. Imbo, Chalil
8. Ehidio Jr., Jason 10. Jalbuena, Nissi Lois
9. Fajardo, John Andrew 11. Macasero, Jewel Mujannah
10. Gundaya, Neil 12. Malait. Methylnae
11. Infiesto, Mark Lawrence 13. Medina, Cyrah Joyce
12. Manatad, Jhayson Pev 14. Palero, Allen Pearl
13. Matondo, Nathaniel 15. Rebong, Gerddy Mae
14. Morales, Rey Charles 16. Reyes, Xyreil Sean
15. Mugas, Rovengil Mevan 17. Rodriguez, Eloisa
16. Nuez, Ian Dave 18. Yanong, Lovely Ann
17. Padilla, Christian Dale
18. Real, Kurt Andrew
19. Repalda, Jmark
20. Requillo, Yancee
21. Sardoncillo, Derek
22. TeHuy, Jules Emman
23. Vecina, James Anthony
24. Yana, Nico John

Potrebbero piacerti anche