STEM-11-10A-G4
STEM-11-10A-G4
STEM-11-10A-G4
Others
Stanley Miguel L. Agato1,2,3, Margielyn D.C Barcelon1,2,3, Angela Mae T. Cudal1,2,3, Benedict John L.
Isip1,2,3, Alia L. Manlegro1,2,3, 1,2,3, Mark Darren M. Mercado1,2,3, Harmanpreet S. Patwal1,2,3, Suzanne F.
Rizardo1,2,3 , Jaylyn Marie E. Uson1,2,3, Mr. John Phaul Singian, LPT1,2,3,4
1
Senior High School
2
Basic Education Department
3
Our Lady of Fatima University
4
Research Advisor
March 2022
CYBERBULLYING PREDICAMENT: A STUDY ON… 1
1.0 Introduction
Last 2013, the Philippines approved the Anti-Bullying law, which covered cyberbullying.
However, a 2015 study revealed that 80% of Filipino teenagers aged 13 to 16 are still experiencing
cyberbullying (Takumi, 2016). This paper attempted to compare existing laws on cyberbullying
among selected ASEAN (Association of Southeast Asian Nations) countries such as Indonesia,
Malaysia, Philippines, Singapore, Thailand, and Vietnam. It also aims to identify each country’s
anti-cyberbullying measures that might fit other ASEAN countries’ needs. To achieve its purposes,
it used a qualitative research with the following primary methods: discourse analysis of
cyberbullying laws and alternative strategies addressing said concern; and literature review of
online journals, online publications, and online news articles. The study revealed that the
Philippines is the only ASEAN country with a cyberbullying law that addresses the students, while
other countries have alternative strategies in addressing the issue. Further, it found that
cyberbullying is experienced by individuals aged 6 to 30 through Facebook and Twitter. The study
suggests that the government should require schools to develop specific and consistent policies that
would address this concern; and a curriculum that promotes digital responsibility. Finally, parents
are encouraged to educate their children on ethical values, particularly in the digital world. Ruiz,
R. M. N. M. (2018)
Twitter is widely used to explore on the opinions of the public in variety of topics. It has
constantly gained popularity as good source of information for visualization-centered application.
This paper aims to understand the opinions of senior high school students’ on cyberbullying in a
university in the Philippines. This study uses a tweet visualization tool to present the opinions of
students. The results of the study indicate that most of the students feel pleasant on cyberbullying
as the university administration officers continuously drives information awareness campaign that
decreases fear and unpleasant emotion among the senior high school students. Therefore,
cyberbullying among senior high school students remain an important concern for educators and
students. This study suggests practical and research recommendations. Vargas, E., Niguidula, J. D.,
Hernandez, A. A., Marquez, P. S., & Caballero, J. M. (2018)
According to Ogi Djuraskovis 2022, bullying has been a part of human society from the
dawn of time. Bullying will always be characterized by stronger people preying on the weak, but
now it has extended to the online as a result of the advancement of technology. Cyberbullying has
become more prevalent in nations across the globe. In essence, cyberbullying is very indicative of
the type of bullying that several teenagers were becoming accustomed to at school. The only
distinction is that it is accomplished purely online.
"Cyber Bullying is a relatively new growing phenomenon due to society’s heavy reliance
on advanced technologies”. (Crosslin & Golman, 2014; Washington, 2014) Many young people,
aged 13 to 17 years old, who use social media such as Facebook, experience bullying that is also
experienced by their peers as well. Stephanie Pappas said, "Cyberbullying on social media is linked
to depression in teenagers, according to new research that analyzed multiple studies of the online
phenomenon." Many young people try to commit suicide because they are experiencing bullying
that both young and adult people are doing to them. Furthermore, 61% of teens who reported being
bullied say it was because of their appearance. Intelligence comes next (25%). Racism (17%) and
heterosexism (15%) are also common forms of prejudice, as are criticizing someone's money issues
(15%) and belief (11%). Bullies commonly target individuals who have impairments or mental
problems.
Since 2004, there has been increased research attention on cyberbullying, with a particular
focus on predictors and outcomes of victimization and perpetration. Outcomes have included
measures of well-being, such as self-esteem, depression, and social support. However, limited
research has examined well-being in connection with cyberbullying on social media. Thus, the
purpose of the current paper is to present a comprehensive review of this research. Our goal is to
gather and analyze recent data and provide future research suggestions regarding cyberbullying
among 13 to 17 year old teenagers.
Since cyberbullying is getting prominent time by time, there is an utmost need to pay attention to this
kind of issues in the society. From time-to-time, as the rate increases, it is becoming very alarming as we
are talking about the youth of the generation. Therefore, this study aims to determine the following:
1. What are the major causes of cyberbullying to 13-17 year old teenagers?
2. What are the major effects of cyberbullying to 13-17 year old teenagers?
3. How can cyberbullying affect one’s social health?
Parents
This study can assist parents of not only adolescents who have been cyberbullied, but also
parents of all teenagers throughout the world. This will serve as a reminder to them to pay attention
to this significant issue and how it may affect their children's lives. It will raise their understanding
of the significance of protecting and guiding their children while using the Internet, as well as
imposing greater restrictions on the sites they access and organizations they join that might lead to
cyberbullying. It will also assist families in teaching their children not to bully others and to keep
a safe distance from bullies.
Internet Users (Netizens)
Cyberbullies flourish on social media because the whole social network is interconnected,
allowing them to shame their victims in front of their peers. Because cyberbullying occurs on the
Internet, Internet users will benefit from this research for the following reasons. As we all know,
these people are vulnerable to cyberbullying, and with the help of this study, they will gain a better
understanding of social netiquettes, understand their limitations, and be fully aware of what they
are sharing and how they act on the internet, since mean comments, making fun of the victim
publicly on social media, gossiping, and even threatening through private messages are all
examples of social bullying.
Real-World Community (Citizens)
Communities now communicate with one another in a variety of ways and on a variety of
platforms. It's a complicated network of interactions on several levels. To get along with people,
we need to have certain life skills and behaviors, such as the capacity to be courteous,
compassionate, and supportive of one another. The citizens will benefit from this research in terms
of being aware of what individuals are going through, that bullying behaviors should never be
overlooked, and our reactions to them should be united and consistent. They will also learn that
larger social change is required, and that we must collaborate to establish a community-wide
strategy to assist children and teenagers in forming, maintaining, and repairing connections, as well
as ensuring that they develop a strong self-awareness, greater sense of shared duty for one another
and knowledge.
Academic Institutions
Since we have students of Our Lady of Fatima University as the respondents of the study,
institutions like OLFU will definitely benefit from the results of this research as they would grasp
an idea on the status of cyberbullying to the teenagers studying in their institutions. From the results
after which, the said institutions would be able to take appropriate actions to these matter. If the
results are negative from this study, OLFU must implement programs on how to raise awareness
among their students not to become one of the bullies, and to those victims, learning to raise their
voices and stand strong in front of the bullies should be encouraged. They may also create a solid
action plan that lays out a framework for dealing with bullying behaviors, allowing us to increase
awareness and alter attitudes around bullying in order to have healthy families and communities.
They can create programs and hold seminars to educate and encourage students about this problem,
which should be addressed seriously, as well.
Future Researchers
The study presented may be used as reference data in conducting new researches or in
testing the validity of other related findings. This study will also serve as their cross-reference that
will give them a background or an overview on cyberbullying.
upsurge, blaming it on our current situation, more students have been "living, learning, and socializing
online.” According to UNESCO, this has resulted in an "unprecedented increase in screen time and the
merging of online and offline worlds," making children more vulnerable to bullying and cyberbullying.
Cyberbullying has indeed been defined as an individual’s personal or a group's malware and revisited use
of technological tools to send dangers to others (Lee & Wu, 2018).
According to an article that was published on September 06, 2019, as shown in a new poll released
today by UNICEF, the United Nations organization working for children's rights, one out of every three
young people in 30 countries has been a target of cyberbullying, and one in every five has skipped school
due to cyberbullying and abuse. Based on the most recent published data in the Philippines, Filipino
children usually encounters verbal abuse via the internet or cellphone and even sexual missives. Females
were more likely than males to receive messages with sexually explicit subject matter.
2.0.2 “The Risks of Online access to Internet users through Verbal and Mental Persecution”
According to a UNICEF U-Report study done in June 2019, social media platforms such as
Facebook, Instagram, Snapchat, and Twitter are the most popular sites for online bullying. One-third of
Filipino children's cyberviolence comes in the form of verbal harassment via the internet or through
smartphones, while a fourth comes in the form of messaging.
Almost everything is undertaken through electronically media, such as the Online platform, bulletin
boards, emails, cell phones, cell phone cameras, text messages, teleconferencing, blogs, and social
networking sites aimed at other people (Neto & Barbosa, 2019). Social media is considered to have a
significant impact on children's lives, although being continuously connected to the Internet carries
associated risks, which include online sexual exploitation of children and adolescents. The anonymity
afforded by the Internet is exploited by sending information to peers or strangers in public in order to instill
fear, harm, and shame in the victims (Lee & Wu, 2018), potentially leading to mental health issues among
victims and society as a whole (Rivara & Le Menestrel, 2016). Mobile Game Addiction and Cyberbullying
are also ethical concerns that should be addressed respectively as it hampers regular individual activities
particularly of students in an academic institution. Where people tend to say inappropriate words and
cursing when losing in a game or even winning in it. (Fabito, B. S., & Yabut, E. R)
2.0.3 “Cyberspace Victimization due to Rapid Technological Advancements”
Technology continues to develop rapidly and is therefore changing our ways of functioning in
society. While internet cell phones and other communication technologies providing us with conveniences,
it also expose our students to interactions that put their safety and emotional well-being at risk. Aside from
the growth of technology, there are additional issues that lead to the surge, increased stress, isolation,
boredom, decreased supervision online. Mostly teenagers aged 13 to 16 are cyberbullied through social
media while children counterparts aged 7 to 12 suffered the same abuse (Takumi, 2016).
In addition, Connolly (2014) stated in the “Facts About Cyberbullying” that only 1 in 10 victims
will inform their parents or trusted adult about their abuse. As a result, cyberbullying victims can easily get
away with their act. In relation to this, only one in every six parent to adolescents knows exactly what
cyberbullying is. With this being said, cyberbullying is a serious problem and with the development of
technology, the rates of its victimization continue to grow rapidly. Cyberbullying is indeed a prominent
concern in the Western countries, however it is becoming more widespread in nations such as India as the
rate of Internet use rises. According to the current findings, 82.7 percent of respondents had used any form
of networking sites, with the large percentage accessing the Internet from home. (Marret and Choo, 2017).
dissociative imagination, and minimization of authority are among the factors mentioned. It is a dramatic
cognitive and behavioral shift and shedding of inhibitions online, which is caused by the anonymity
provided by websites, as well as the large scale engagement of individuals at once, which allows them to
easily speak or do whatever they want and get away with it given the lack of jurisdiction and regulations in
cyberspace.
People say and do things in cyberspace they would not ordinarily do in the face-to-face world. They
loosen up, feel less restrained and express themselves more openly. (Suller, 2004). When online,
adolescents are prone to behave in ways that they unlikely to do when in physical encounters. This can lead
to the lacking of their sense of responsibility for their irrational acts, and the effects could fall into two (2)
categories. It can either be benign which it encourages appropriate self-disclosure or toxic disinhibition that
fosters nasty or cruel assaults on others. Meanwhile, the factors that fueled up the said effects are:
dissociative anonymity, where an individual isolates the reality from the virtual world by obscuring their
persona; invisibility, which restricts an individual from seeing and being seen during interactions;
asynchronicity, that unables an individual to see the reactions of the people online; solipsistic introjections,
refers to when a person assumes the personality of the person they are conversing with online; dissociative
imagination, it is the splitting of web narrative or fictions from the actuality; and minimization of authority,
pertains to the lack of power or status from one's real life to the online world. Hence, there is a high tendency
that people will be more aggressive, rude and narcissistic in online since they are anonymous and can act
as unpleasantly as they like without immediate consequence (Aboujaoude, 2011). These findings suggest
that as we shift and rely more on the cyberworld, bullying will become more prevalent. Cyberbullying has
become an extension of oppressive behaviors. As more teenagers gain access to technology, internet will
become a new landscape for bullying.
A theory named Social Dominance Theory was proposed and introduced by Jim Sidanius and
Felicia Pratto (1999) mainly suggests that an individual or a group controls or dictates over others' behavior,
primarily in competitive situations. In social dominance theory, those who are more aggressive and have
higher rank, status, or power victimize others perceived as having lower rank, status, or power to maintain
their social hierarchy within the group structure (Sidanius & Pratto, 1999). These individuals were using
aggressiveness, taunting, and humiliation to gain a sense of power through cyberbullying. As a result, the
authority achieved was to cope and feed their self-esteem, as well as to consider themselves to blend in with
their peers; it also serves the purpose of maintaining distinction of the in-group in those of other groups
(Blumenfield, 2005).
We all know that in the cyberworld, you can easily alter and modify your social status by disguising
and conspiring to be the person you want to be. As a result, identities in these spaces become fluid. For
example, when revising your profile information such as your appearance, educational background, social
position, and so on, cyberbullying makes it worse since perpetrator may play pretend and seem tough as
they publish this fictional image of themselves online. In this sense of pretending, the lower rank class in
the actual world social hierarchy may use this chance to perpetuate people worse than they experienced as
a means of provoking vengeance, rage, and frustration. They may use bullying someone a way to release
the anger they have towards a person. This may provide oppressed youngsters with an opportunity to redo
what the perpetuators have done to them, or to become the perpetuator itself that they fear in the first place.
3.0 Methodology
This study will use a phenomenological design to evaluate and analyze the experiences of
individuals who were a victim in cyberbullying. This method is used through the descriptions and scrutinize
human experiences provided by the persons involved. A qualitative method will also be used since it
provides a more in-depth analysis. The goal of taking a qualitative approach was to learn more about
cyberbullying and develop a better understanding of it. The collected data will be conducted using
interviews through video calls in google meet and a focus group in which participants were prepared to
discuss their terrible experience because of the actions of the perpetrators.
Miles and Hubermann (1994) describe qualitative research as “prolonged contacts with life
situations that are reflective of everyday life of individuals, groups, societies, and organizations” (p. 6).
Phenomenological research meanwhile, focuses on the descriptions of human experiences and how they
were experienced (Patton, 2002).
The data gathered will be the summary and assessment to determine the major causes and effects of
cyberbullying to 13-17 years old, how can it be prevented and their lived experiences about being
cyberbullied.
To make this research happen, we will apply the Purposive Sampling Technique which is a type of
Non-Probabilty Sampling design. The practice of selecting a sample group using non-random procedures,
usually according to the researcher's judgment, is called Non-Probabilty Sampling. We hand-picked the
respondents based on our judgments as not everyone in the population has the chance to participate in this
study. Specifically, we utilized the Purposive Sampling Technique where it is a form of non-probability
sampling in which decisions concerning the individuals to be included in the sample are taken by the
researcher, based upon a variety of criteria which may include specialist knowledge of the research issue,
or capacity and willingness to participate in the research. (Oliver, 2013)
The reason we choose this sampling approach is because we need to choose people based on their
interests, qualifications, or typicality, and they must fit a basic profile of the types of participants who would
be beneficial in executing this research effectively. Samples that meet the study's specific objectives are
collected. The following are the study's criteria; (1) adolescents specifically in the age ranging from 13-17
years old that is exposed to cyberspace, (2) a current student in Our Lady of Fatima University, (3) 13-17
year old students who experienced any form of humiliation while on the internet.
According to the Roles of Ethics in Research by Pubrica Knowledge Works (2018), Research
Ethics is essential for a researcher to ensure that his or her aim is to provide original information, truth and
avoid any errors. Researchers need to have values such as fairness, trust and mutual respect amongst all
those who are involved in their research. In addition to these, researchers need to be ethical by being
accountable to general public by safeguarding animal or human subjects who will be a part of the research.
Moreover, Enago Academy (2021) stated that it is important that the person who is invited to be part of the
research understands both the benefits and the risks involved. They must have all the information that could
affect their decision to participate. All research must seek to answer questions that will benefit humanity.
The risks must be minimized as far as humanly possible.
Nonetheless, the information of the participants who are participating in the legal creation of the study must
be protected by the researchers. Information breaches that might lead to a misconception of the study should
not be permitted. As per Data Guidance (2021), the Data Privacy Act of 2012 (Republic Act No. 10173)
indicates that it is the policy of the State to protect the fundamental human right of privacy of
communication while ensuring free flow of information with an end in view to promote innovation and
growth, recognizing the vital role of information and communications technology in nation-building and
the inherent obligation of the State to ensure that personal data in the information and communications
systems in the government and in the private sector is secured and protected. The Act applies to the
processing of all types of personal information and to any natural and juridical person involved in personal
information processing.
We used these questionnaires to allow us to collect data and information from our respondents that
will help us in our research. According to (Peterson, 2000), Effective questionnaire items are short and to
the point. They avoid using words that are too complex, too technical, or that are unneeded. This shortness
makes them easier to understand and faster to complete for responses. Questionnaire items that are effective
are also relevant to the research issue. However, this speeds up the completion of the questionnaire, but it
also avoids bothering respondents with what they will rightfully regard as unimportant or even "nosy"
questions.
A screening tool is important for effective recruitment of participants for a research study. This is
the procedure by which research team determines if a person is a suitable person for the study. It is a test
or interview or something activity to know if your respondents is eligible for the interview or survey you
will make. We used this screening tool to help us determine who is eligible for the interview. As a result,
screening will help us to make the interview flow more smoothly.
We used a pen and paper to jot down the details stated by the respondents. According to Paper on
the Rocks (2020), Taking notes with a pen and paper rather than a computer allows you to better digest and
remember the information you were listening to. Because it is not possible to literally write down an entire
lecture, for example, you must immediately rephrase the information in your own words and select only the
most important parts. When taking notes on a computer, you can almost literally type down what you've
just heard. After much research on the subject, the message appears to be clear for students and others who
want to remember lectures, etc.: write your notes with a pen and paper.
For the purpose of interviewing the respondents, our group decided to use Google Meet as our tool.
Despite the fact that Zoom has superior features, we chose Google Meet because Zoom has a 40-minute
call limit, while Google Meet can run up to an hour. As said by Purwanto & Tannady (2020), Google Meet
is a secure application because Google has stated that all of their commodities are built and operated on a
secure foundation. As a result, they believe their product users' data will exist and remain private. Google's
Google Meet product also includes built-in protection by default, which keeps users' meetings secure (St
John, 2020). Many people in the business and education sectors prefer to use Google Meet as a video
conferencing application because of its numerous benefits. Users find Google Meet to be simple to use,
which creates a favorable impression of the platform. And the number of Google Meet users is steadily
increasing. Informed Consent This research paper is being carried out by our team with the participants'
informed consent. Statement by the Regents of the University of Michigan (2022)
Informed consent is the process of telling potential research participants about the key elements of
a research study and what their participation will involve. The consent process typically includes providing
a written consent document containing the required information (i.e., elements of informed consent) and
the presentation of that information to prospective participants.
Data collection refers to acquiring information to answer the essential evaluation questions
previously identified in the review process by the author/authors. It is an essential component of any
research project. (NA Athukorala, 2009) First and foremost, the researchers asked the approval for the
research adviser on the research topic and instruments before conducting the study. Second, the researchers
began communicating with people who could be interested in taking part in the study. Third, the researchers
presented the informed consent to ask the respondents’ permission to participate in the study. Fourth,
screening test was implemented to identify the respondents’ eligibility to participate in the study. Fifth, the
researchers collected the important data from 5 13-17 year old teenagers who are residing in Valenzuela
City. We used thematic analysis in analyzing the data that we researchers gathered.
The data that has been gathered is analyzed through thematic analysis. Data analysis in qualitative
research is defined as the process of systematically searching and arranging the interview transcripts,
manuscript, observation notes, or other non-textual materials that the researchers accumulate to increase
the understanding of the phenomenon.
According to Gareth Terry, Nikki Hayfield, Victoria Clarke, Virginia Braun (2017), this chapter
introduces thematical analysis (TA), a method that has become a widely-used tool for analyzing qualitative
data, both in psychology and beyond. We first outline the history and context of TA, and identify key issues
that need to be considered when conducting TA. We discuss the flexibility TA can offer, and highlight the
need for deliberate and careful research. This flexibility can apply to Theoretical assumptions, research
questions, data collecting and analysis.
The researchers analyzed the thematic analysis. It is a thoroughly used method in qualitative
research. Also, we need to close by considering the limit and utilization of thematic analysis. A thematic
analysis of interviews with a well-chosen sample of such persons might indicate how they represent various
mental health experts if one were interested in how those who do not use the services of mental health
professionals regard them. This, in turn, would disclose what inhibits individuals from seeking help from
professionals like psychotherapists and psychologists.