Vous êtes sur la page 1sur 13

PERCEIVED EFFECTIVE METHODS OF CONTROLING

CYBERBULLYING AT AIR FORCE CITY HIGH SCHOOL


______________________________________________

In Partial Fulfillment
Of the Requirements for the
Subject, English

______________________________________________
Qualitative
______________________________________________

Researchers
G.A.S 102 – A
BARCELON,JOHN PAUL A.
DEQUINA, BRYAN D.
CHAPTER 1

PROBLEM AND BACKGROUND

Research Question

This question provides significant idea for the respondent to know there

reaction through this research

1. What is the action that he/she must do if he/she get bully though the internet?

2. As a nitizen do you have any experiences of getting bully through internet?

3. What are the suggestions we can give for those person who get bully through

internet of engage the cyber bullying depression?


Introduction

“THINK BEFORE YOU TYPE”


(UNKNOWN)

Young people today are using the internet more than ever. They view

the internet and even more so the mobile phones as positive aspects of our society.

The internet and mobile phones systems are the two biggest systems of

communication which play a crucial role in our daily activities and development of

identities. On the other hand, these same technologies are also often used

negatively. Many children are the targets of bullying via the internet or mobile

phones resulting in total confusion on the part of the "target". Very often, children

are not able to understand that what they are going through is a form of bullying.

As a result the previously safe environment of the internet is now becoming a

source of confusion and anxiety.

But Cyberbullying occurs when someone uses the Internet, emails, text

messages, instant messaging, social media, online forums, chat rooms, or other

digital technology to harass, threaten, or humiliate another person. Unlike

traditional bullying, cyberbullying doesn't require face-to-face contact and isn't

limited to just a handful of witnesses at a time. It also doesn’t require physical

power or strength in numbers.

For those suffering bullying or cyberbullying, the effects can be devastating, leaving

you feeling helpless, humiliated, angry, depressed, or even suicidal. And technology
means that bullying is no longer limited to schoolyards or street corners.

Cyberbullying can occur anywhere, even at home, via cell phones, emails, texts,

and social media, 24 hours a day, with potentially hundreds of people involved. But

no type of bullying should ever be tolerated. These tips can help you protect

yourself or your child—at school and online—and deal with the growing problem of

bullying and cyberbullying.

The methods kids and teens use to cyberbully can be as varied and

imaginative as the technology they have access to. It ranges from sending

threatening or taunting messages via email, text, social media, or IM to breaking

into your email account or stealing your online identity to hurt and humiliate you.

Some cyberbullies may even create a website or social media page to target you.

As with face-to-face bullying, both boys and girls cyberbully, but tend to do

so in different ways. Boys tend to bully by "sexting" (sending messages of a sexual

nature) or with messages that threaten physical harm. Girls, on the other hand,

more commonly cyberbully by spreading lies and rumors, exposing your secrets, or

by excluding you from social media groups, emails, buddy lists and the like.

Because cyberbullying is so easy to perpetrate, a child or teen can easily change

roles, going from cyberbullying victim at one point to cyberbully the next, and then

back again.

As researchers we conduct, this research to find the solution on how cyber

bullying be stop using an effective methods that we will assimilate. We focus on this

study to occur the lack of people who frighten to prolong their concern of cyber

bullying specially for the student at air force city high school.
RESEARCH METHODOLOGY

This Chapter includes the researchers design , Participant of the study ,

research of instrument and research procedures used in this study.

Reseach Design

The research design of this study is descriptive analysis , This is

base on what are the result of the interview that the researchers conduct

about the research.

Participants of the Study

The study of this research are participated by the ten (10)

volunteer (3) students of Grade 10 and (3) student of Grade 9 (2)student

from Grade 8 and (2) Student from Grade 7 at Air force City High School.
Research Instrument

The researchers prepared an intense interview which the researchers

conduct a one on one interview for the ten(10) student volunteer of Air force

City High School and its consist of two (2) parts.

 The first part recorded the participant’s demographic data such as

their name, section, age and Gender.

The second part was design to interview the ten (10) student volunteer of

Air force City High School about “PERCEIVED EFFECTIVE METHODS OF

CONTROLING CYBERBULLYING”
Research Procedures

 The researchers will conduct an observation for the student that is

willing to volunteers and we will choose ten (10) students who are

interested of this topic.


 After conduction an observation, the researchers may ask for

permission to the ten (10) chosen students if they are willing to be

interviewed
 After asking for the ten (10) chosen student if they are willing to be

interviewed and that is the time where the researchers can conduct

the interview.

Survey

This is the tool that we will going to use to seek the information to the

student at air force city high school to now there reaction and idea and

recommendation.
Name:________ Gender:___________

Section:____________ Age:___________

1. What is the action that he/she must do if he/she get bully though the internet?

2. As a nitizen do you have any experiences of getting bully through internet?

3. What are the suggestions we can give for those person who get bully through

internet of engage the cyber bullying depression?

Analysis
Conclusion

The conclusion of your paper should include final connection about the two

subject and then a restatement of your thesis.


A bully no longer means the strongest, toughest guy in school. On the Internet,

anyone can be a bully. Cyber bullying is a serious issue, but you can protect

yourself against the this issue by following this instructions:

Know that it’s not your fault. What people call “bullying” is sometimes an

argument between two people. But if someone is repeatedly cruel to you,

that’s bullying and you mustn’t blame yourself. No one deserves to be

treated cruelly.

Don’t respond or retaliate. Sometimes a reaction is exactly what aggressors

are looking for because they think it gives them power over you, and you

don’t want to empower a bully. As for retaliating, getting back at a bully

turns you into one – and can turn one mean act into a chain reaction. If you

can, remove yourself from the situation. If you can’t, sometimes humor

disarms or distracts a person from bullying.

Save the evidence. The only good news about bullying online or on phones is

that it can usually be captured, saved, and shown to someone who can help.

You can save that evidence in case things escalate. Tell the person to stop.

This is completely up to you – don’t do it if you don’t feel totally comfortable

doing it, because you need to make your position completely clear that you

will not stand for this treatment any more. You may need to practice

beforehand with someone you trust, like a parent or good friend.


Reach out for help – especially if the behavior’s really getting to you. You

deserve backup. See if there’s someone who can listen, help you process

what’s going on and work through it – a friend, relative or maybe an adult

you trust.

Use available tech tools. Most social media apps and services allow you to

block the person. Whether the harassment’s in an app, texting, comments or

tagged photos, do yourself a favor and block the person. You can also report

the problem to the service. That probably won’t end it, but you don’t need

the harassment in your face, and you’ll be less tempted to respond. If you’re

getting threats of physical harm, you should call your local police (with a

parent or guardian’s help) and consider reporting it to school authorities.

Protect your accounts. Don’t share your passwords with anyone – even your

closest friends, who may not be close forever – and password-protect your

phone so no one can use it to impersonate you.

If someone you know is being bullied, take action. Just standing by can

empower an aggressor and does nothing to help. The best thing you can do

is try to stop the bullying by taking a stand against it. If you can’t stop it,

support the person being bullied. If the person’s a friend, you can listen and

see how to help. Consider together whether you should report the bullying.

If you’re not already friends, even a kind word can help reduce the pain. At
the very least, help by not passing along a mean message and not giving

positive attention to the person doing the bullying.

Vous aimerez peut-être aussi