?I need a capstone on this topic meeting all of the criteria and literature review from scholarly articles. I have attached w
I need a capstone on this topic meeting all of the criteria and literature review from scholarly articles. I have attached work and milestones that have already been done. a significant portion of the work has been done. needs revision to meet guidelines for the FINAL project.
INSTRUCTOR FEEDBACK
Alexis, this submission provided a broad overview of cyberbullying. But, repeating DB1 feedback, "Within the broad topic of cyberbullying, what would your focus be?" For example, since Cummings (2017) was the only in-date reference, do you want to study anger? Thank you.
Introduction: Question or Problem Statement
Identifies the specific problem or research question to be explored and the underlying thesis
Alexis, this submission included "what kind of problems and emotional effects teenagers and children have regarding an online attack, as well as how we can stop it and propose possible ways of preventing it". But, a Module Two Learning Objective was to “Predict the outcome of a research project with a thesis statement”. And, as stated on the Milestone One Pre-Submission Checklist, your first introductory paragraph should begin or end with this statement. A thesis statement is a logically reasoned position on a topic based on known data. Essentially, your thesis statement is your central idea. For example, to make your thesis statement clear to the reader, your paper could state something similar to “This paper argues that [fill in the blank].” This foundation tells the reader what your writing is about, and frames the literature review paragraphs that follow. For alignment and clarity, consider population, as well as diagnosis (if applicable), treatment (if applicable), and measurement(s) used. Also, keep in mind a thesis statement is best brief, narrow, and argumentative, with variables, direction, and utility in the real-world. Thank you.
Top of Form
Alexis, Module Two Learning Objectives included “Searching for and gathering pertinent research articles” to “Select and critically review and report on research relevant to chosen topic”. Unfortunately, this submission did not clearly state what is known and unknown about a specific and narrow aspect of the broad topic of cyberbullying based on the literature. One of the challenges you’ll face is finding research to support your thesis in a literature review. You are looking to objectively support an argument. Determining the language of the field of psychology to use as keywords is key to finding supportive data. Please work with a Librarian. As stated in Module Two in the Gathering Research section, you want the 5-7 articles in your literature review to be credible, vetted, and of good quality. Thus, look for recent research articles (preferably within the last 5 years) from peer-reviewed academic journals. Thank you.
Introduction: Critical Review
Clear Feedback
Alexis, a Module Two Learning Objective was “Summarizing and critically reviewing the articles and relating them to your present study”. Repeating DB1 feedback, you wanted “5 starting references [of] recency (preferably within the last 5 years; since 2015) … so that we are working with the most updated information." Yet, this submission did not include any articles for the critical portion of the Introduction section. Also, as per the Milestone One Pre-Submission Checklist, the critical review should also help you look for flaws. The limitations of the reviewed studies should logically lead to the gap your project will fill. This should also allow you to reach a logical conclusion in the final paragraph of the introduction about what the project will focus on. A literature review should synthesize the main overlapping ideas of multiple sources. Articles should not be presented separately. Thus, moving forward, as per the Milestone One Pre-Submission Checklist, include in synthesized form (rather than a separate paragraph for each article) design/method/procedure, sample demographics (ex. gender, age, race, SES, and education are commonly reported information), findings, limitations, generalizability, and future research/impact of each literature summarized. Thank you.
Criterion Feedback
Alexis, a Module Two Learning Objective was “Summarizing and critically reviewing the articles and relating them to your present study”. Repeating DB1 feedback, you wanted “5 starting references [of] recency (preferably within the last 5 years; since 2015) … so that we are working with the most updated information." Yet, this submission did not include any articles for the critical portion of the Introduction section. Also, as per the Milestone One Pre-Submission Checklist, the critical review should also help you look for flaws. The limitations of the reviewed studies should logically lead to the gap your project will fill. This should also allow you to reach a logical conclusion in the final paragraph of the introduction about what the project will focus on. A literature review should synthesize the main overlapping ideas of multiple sources. Articles should not be presented separately. Thus, moving forward, as per the Milestone One Pre-Submission Checklist, include in synthesized form (rather than a separate paragraph for each article) design/method/procedure, sample demographics (ex. gender, age, race, SES, and education are commonly reported information), findings, limitations, generalizability, and future research/impact of each literature summarized. Thank you.
Articulation of Response
Clear Feedback:
Alexis, please utilize the APA links from the Milestone One FAQs/Checklist and work with the Online Writing Center to correct the following APA style errors:
1. In APA style, an effective title should creatively summarize the main idea in about 12 words, including the studied variables.
2. APA style should utilize simple double-spacing throughout the document. You may need to edit line and paragraph settings in your word processor to remove extra automatic spacing. Use Tech Support if you need assistance with this formatting.
3. For the final submission Abstract, Abstract is centered, but should not be bold. The Abstract is always its own page 2. Do not indent the paragraph. Keep it to a single paragraph average of 150 words, with the range of 75 to 250 words generally acceptable (if all information is economically included). Include your research question, thesis statement, and hypothesis. Include summary sentences about your hypothetical study design/method/procedure, sample, findings, limitations, generalizability, and future impact/research.
4. Headings should not be numbers, chapters, or parts of the assignment. Use standard APA style headings to delineate the sections, and your content should be self-evident for including the required elements.
5. To begin your paper, start a new page, repeating your centered paper title, and start the introductory paragraph on the next line.
6. There should be no “I” or ""we"" in professional writing.
7. Reference publications should be italicized, and without extra spacing between words.
8. References should be listed by last name of the first author.
Criterion Feedback
Alexis, please utilize the APA links from the Milestone One FAQs/Checklist and work with the Online Writing Center to correct the following APA style errors: 1. In APA style, an effective title should creatively summarize the main idea in about 12 words, including the studied variables. 2. APA style should utilize simple double-spacing throughout the document. You may need to edit line and paragraph settings in your word processor to remove extra automatic spacing. Use Tech Support if you need assistance with this formatting. 3. For the final submission Abstract, Abstract is centered, but should not be bold. The Abstract is always its own page 2. Do not indent the paragraph. Keep it to a single paragraph average of 150 words, with the range of 75 to 250 words generally acceptable (if all information is economically included). Include your research question, thesis statement, and hypothesis. Include summary sentences about your hypothetical study design/method/procedure, sample, findings, limitations, generalizability, and future impact/research. 4. Headings should not be numbers, chapters, or parts of the assignment. Use standard APA style headings to delineate the sections, and your content should be self-evident for including the required elements. 5. To begin your paper, start a new page, repeating your centered paper title, and start the introductory paragraph on the next line. 6. There should be no “I” or ""we"" in professional writing. 7. Reference publications should be italicized, and without extra spacing between words. 8. References should be listed by last name of the first author. 9. Every citation should have a reference, and vice versa. Only Adams (2010), Alsaker & Olweus (1986), Donegan (2012), Mason (2008), McQuade (2009), and Roosen (2007) did. There was no reference for Hirsch (2014), Smith (2010), Patchin & Hinduja (2006), Solberg & Olweus (2003). Conversely, there was no matching in-line citation for Beale (2007), Beran (2007), Cummings (2017), Haber (2011), Hinduja & Patchin (2013 or 2010), or Patchin & Hinduja (2010 or 2013). Thank you.
*
|
|
Alexis, a Module Two Learning Obje
Alexis, please utilize the APA links from the Milestone One FAQs/Checklist and work with the Online Writing Center to correct the following APA style errors:
,
Running head: CYBERBULLYING 1
CYBERBULLYING 9
Cyberbullying
Alexis Niel
Southern New Hampshire University
Abstract
According to Hirsch, "the perpetrators of cyber bullying are around 1 in 4 teenagers, and about 1 in 6 reports having cyberbullied anyone. More than half of the teenagers surveyed in some surveys have said they have encountered violence through social as well as digital media "(Hirsch, 2014). There are various and nuanced effects of cyberbullying. Sorrow, feeling wounded, poor mental wellbeing, school attendance is significant reasons for cyber-stalking.
2. Statement of the topic and a description of its importance and relevance:
All sorts of bullying, especially cyberbullying, can have a severe impact on our decades today. Stopping the development of technical devices in contemporary society seems inevitable. Cyberbullying can create long emotional wounds, even lethal aftermath. Recently, I've read enough disturbing news stories like rape, murder, and several other things that occurred as a result of cyberbullying. Mobile phones, forums, emails, social media sites, as well as other digital media are an equal and vital part of the lives of the majority. However, to get real results from this electronic equipment, cyberbullying needs to be stopped.
3. Background Information:
Cyberbullying comprises bullying, which occurs through the web, email, social media, tweets, forums, mobile phones, or some other digital technology. Two years earlier, there had been a film that brought a crazy conversation about adolescents, which is about such a young girl who had been a cyberbullying survivor. She is getting her mother's computer for her birthday. As she joins in a social media network, whereby her peers start submitting important stuff to her account, the condition evolves. She begins to love him once she meets a guy as he sticks up for her, however when he starts to turn and writing bad stuff about her being on web, she always takes it seriously as well as loses track. Instead, by getting hooked on drugs, her excellent friend catches her attempting to attempt suicide. Cyberbullying is becoming harder to handle as technological advancements have evolved (Smith, 2010). Donegan(2012) writes, a first notable case occurred in 1998, a middle school boy in the US brought into existence a social network where he put blackmailing and threatening statements to his teacher and soon, he was bleached from the school due to the harassment, provoking, disrespect, threats. The first time, the American states like Colorado have passed anti-bullying legislation that required strict policies about bullying, including cyberbullying.
4. Research Questions/Objectives:
Thus, the purpose of this paper is to investigate what kind of problems and emotional effects teenagers and children have regarding an online attack, as well as how we can stop it and propose possible ways of preventing it. It will help those who need help, support, and actual development of the future generation, which were harmed from online stalking. In modern society, many things have changed since the 20th century.
5. Research Methods:
To answer these questions, around 20 KIMEP students, professionals, teenagers, parents, as there is an essential number of families with modern upbringing, with an equal amount of males and females approximately aged from 13 to 30 will be asked to fill out a questionnaire that includes survey and questions related to cyberbullying. Also, the data will be collected by face to face interview. Interviews are used to get the story of a participant's cyberbullying experiences.
6. Hypothesis/Expectations:
The theory of this research is that the results will show an equal number of students, children, parents who are influenced, impacted by cyberbullying. Also, if they were cyberbullied, how they find solutions to prevent or stop, and suggestions to avoid such kinds of problems.
Chapter 2 – Literature review
The present analysis of the literature seeks to review current information on dealing with cyberbullying. The goal of such research was also to examine the literature regarding cyberbullying as well as the effect it has on young people. The cyberbullying information would be contrasted with each other and with conventional bullying. Abusers could now submit threatening emails or phone calls, post offensive messages through digital noticeboards or forums, and even create websites to spread somebody's defamatory material. Individuals can also use texts to threaten a victim and through their mobile phones (Patchin & Hinduja, 2006). Stress management strategies are described as habits of responses; however, also feelings/behaviors which are useful towards cyberbullying and failing to do so. We distinguish among three various areas of coping: decreasing risks, addressing the issue, and latency adverse effects. A randomized trial of literature producing eight related papers was performed. Conceptually, cyberbullying includes transmitting or uploading offensive or offensive text, including images through the web (like instant messages, emails, bulletin boards, including social media sites) or any other electronic communication tools, like mobile phones (Adams, 2010). These may include stalking, intimidation, abuse, impersonation, embarrassment, trickery, even omission.
Chapter 3 – Results
The purpose of the research was to study what kind of problems and emotional effects teenagers and children have regarding an online attack as well as how we can stop cyberbullying and propose possible ways of preventing it. To find information for the study, there was one face-to-face interview with the man who is a psychologist asked to avoid publishing his identity, conducted a survey among 20 teenagers with an equal amount of males and females approximately aged from 13 to 19.
Chapter 4 – Discussion
The survey and interview were conducted to find what emotional effects teenagers and children can have after they have been cyberbullied and what preventive measures need to be taken to reduce online stalking. In a century of growing technologies, a lot of teenager’s abuse using electronic devices and don't know that it can seriously hurt, destroy one's life. The research paper also focuses on finding solutions from cyberbullying. Although, there are enough experts have researched online attack, this research paper has found some new interesting facts and reasonable measures to prevent cyberbullying through conducting the interview, which was taken from expert, and survey, which participants were teenagers.
Some parts of the research around cyberbullying exploitation may be repletion with blended findings. The interview with the expert indicates that stricter laws against cyberbullying do not help to decide the problem. This finding will be much as predicted and parallels what was observed in our previous studies of a scale of Global Negative Self-Evaluations (Alsaker & Olweus, 1986) as well as the global problem of conventional harassment (Solberg & Olweus, 2003). These findings show that few'' new''' victims or even abusers responded to the latest social media. Cyberbullied either to cyberbully many learners seemed to be component of an overall trend of bullying to something like a large degree when the usage of social media remains only one potential form and a type with a rather low incidence. The findings also indicate that while many cyberbullying occurs anywhere in school time, as stated in many other studies, much of the instances of cyberbullying happen within the school environment.
Solutions
Many researchers, teachers, parents concern such kinds of things like internet safety. It will be useful to introduce parents, educators, teachers with the necessary knowledge about new technologies.
The first solution is school administration should create standards and strategies with the use of technologies, providing supervision, and monitoring students' use of computers, cell phones in schools. Many schools will benefit from implementing, including strictly enforcing specific rules in schools regarding the usage of cellphones, computers, gadgets as well as the internet.
The next approach is parental supervision, since cyberbullying often happens at home, plays critical roles, and central. Mason (2008) stated that over 30% of adolescents use the web for 4 hours or over a day, and over 50% of them recorded inadequate parental oversight in those hours. McQuade (2009) stated how 73 percent of parents, adolescents recorded setting Rules today about their children. Nevertheless, on the online operation, 37 percent of children reported being given no rules by their parents. Similarly, Rosen (2007) showed that while most parents showed restrictions on the usage of the internet for their kids, they are also not actively managing those restrictions. So, parents don't know what their children do in the social network when they are sitting on the internet.
Chapter 5 – Conclusion
This study paper has examined the impact of cyberbullying on the younger generation and protective steps against digital bullying. The goal of the present study has been to decide whatever kind of issues children/teenagers can experience and also to show possible ways to mitigate cyberbullying. The research showed that cyberbullying could usually lead to serious health issues; it is death, addiction, anxiety, lower self-esteem, minimal academic performance. The survey also found that classrooms must use policies to punish students against cyberbullying acts, teach students about cyber-ethics, as well as supervision of the stay at home parent remains essential.
References
Adams, C. (2010). Cyberbullying: How to make it stop. Instructor. 120(2), 44-49.
Alsaker, F. D., & Olweus, D. (1986). Assessment of global negative self-evaluations and the Perceived stability of self in Norwegian preadolescents and adolescents. Journal of Early Adolescence, 6, 269–278.
Beale, A. V., & Hall, K. R. (2007). Cyberbullying: What school administrators (and parents) can do. Clearing House, 81(1), 8-12. DOI: 10.3200/TCHS.81.1.8-12
Beran, T. & Qing L. (2007). The relationship between cyberbullying and school bullying. Journal of Student Wellbeing, 1(2), 15-33
Chantelle A. Cummings (2017), I Can’t See You, You Can’t See Me: Cyberbullying: An Exploratory Study Examining this concept through the Lens of the Social Bond Theory. Int J Cri & For Sci. 1:2, 32-39. DOI: 10.25141/2576-3563-2017-2.0032
Haber, J. D., & Daley, L. A. (2011). Cyberbullying Protection Plan. Camping Magazine, 84(2), 32-37.
Hinduja, S. & Patchin, J. W. (2013). Social influences on cyberbullying behaviors among middle and high school students. Journal of Youth and Adolescence, 42(5), 711-722.
Hinduja, S., & Patchin, J. W. (2010). Cyberbullying: A review of the legal issues facing educators. Part of a special issue: Cyberbullying: Preventing School Failure, 55(2), 71-78.
Mason, K. (2008). Cyberbullying: A preliminary assessment for school personnel. Psychology in the Schools, 45, 323-348.
McQuade, C. S., Colt, P. J., Meyer, B. N. (2009). Cyberbullying. Protecting kids and adults from online bullies. Westport, Connecticut: Praeger.
Patchin, J. W. & Hinduja, S. (2010). Cyberbullying and Self-Esteem. Journal of School Health, 80(12), 614-621.
Patchin, J. W. & Hinduja, S. (2013). Cyberbullying among Adolescents: Implications For Empirical Research. Journal of Adolescent Health 53(4), 431-432.
Richard Donegan (2012). Bullying and Cyberbullying: History, Statistics, Law, Prevention, and Analysis. Retrieved January 27, 2015, from https://www.elon.edu/docs/web/academics/communications/research/vol3no1/04DoneganEJSpring12.pdf
Rosen, L. D. (2007) Me, MySpace, and I: Parenting the Net Generation. New York: Palgrave Macmillan
,
Running head: CYBERBULLYING 1
CYBERBULLYING 7
Cyberbullying
Alexis Niel
Southern New Hampshire University
Cyberbullying
With the introduction of modern technology and the use of different social media platforms, cyberbullying is an aspect that is quite rampant. Cyberbullying is the art of using the internet or modern technology to intimidate, harass, or cause harm to another person. Most of the teenagers who participated in the research agreed to being bullied at least one time when using social media platforms. The rationale of this paper is to introduce us to a study that conducts the emotional effects of cyberbullying.
Statement of the topic and a description of its importance and relevance
Any form of cyberbullying always has adverse effects on the victim. Cyberbullying can create long emotional wounds for the persons who have experienced this (Cummings, 2017). Analyzing this topic is fundamental so that we can suggest ways in which it can be prevented. We will also suggest how we can deal with cases of cyberbullying in case that happens. As we follow what happens in our society today, some people have gone to as far as killing themselves because of being trolled online. Young people like teenagers and young adults need to be taught about the safe usage of online spaces. This group spends a lot of time online doing various activities. To get more information about cyberbullying, we explored more research about scholars who focused on this sensitive topic.
Background Information
Cyberbullying is the form of harassment that happens using electronic means. It is also called online bullying. This kind of trend has become prevalent, especially among young people, especially teenagers. Harmful bullying can include threats online, posting rumors, rude sexual remarks, using a person's personal information negatively, hate speech, and using pejorative labels on people. Cyberbullying, in most instances, is done with the intent to bring harm. People who have gone through this may have low self-esteem, increased suicidal thoughts. Others may start getting scared, may fall into depression, may get angry and frustrated. Some of the people that have been cyberbullied have exited online spaces for their safety.
Awareness of cyberbullying, especially here in the United States, has been promoted due to many cases that have been announced lately. Several laws have been passed to combat the malpractice of cyberbullying. Some of the cases that have reported have extended from online bullying to physical bullying. Cases of cyberbullying can be reported to any authorities around. Cyberbullying can come in the form of trolling. The internet is the common form in online spaces where people come together to talk negatively on another person. Cyberstalking is another form of cyberbullying where a person uses various platforms online to find information about another person. This may pose potential threats to the victim. Gaining one's sensitive information can be used negatively to harm them. Cyberstalking is considered online harassment and poses severe risks to the victim's safety. Different researches have also shown that peer pressure is malpractice that often results from visiting several sites online.
Bullies online usually send a particular message to harass a person and may ask other online users to do the same. Defamatory, false accusations on a person may make them lose their self-esteem. Making a person the subject of ridicule online is immensely destroying a person's character (Febriana, 2019). It’s also very humiliating to talk negatively about a person online. Many people have fallen prey to cyberbullying even if they haven't talked about it. The kind of trauma and anxiety that comes with cyberbullying may make a person go silent for some time.
Research Questions/Objectives
The main objective of this paper is to investigate the impact of cyberbullying on teenagers and children. This is the group that could be affected most by the effects of cyberbullying. Some of the research questions that we will use are;
What are the main forms of cyberbullying experienced?
To what extent does cyberbullying affect people?
What group is commonly affected by cyberbullying?
What measures can we put in place to combat the malpractice?
How does society view cyberbullying?
How has the government handled cyberbullies?
Using these research questions, we will be able to explore the whole area of cyberbullying. Specifically, we will address the kind of problems that teenagers and children have regarding online spaces. We will also suggest ways of how cyberbullying can be stopped.
Research Methods
Data from this study will be collected from responses in the form of questionnaires. To answer these questions, 80 students from colleges and high school will be asked to fill the questionnaires. Professionals and parents will also have their own set of questionnaires to fill. This is to ensure that we can get enough feedback from teenagers as well as their parents. We will try to balance the number of females and male respondents so that we can get unbiased information. Additionally, the data will be collected through interviews for the parents and guardians and some of the respondents that have gone through cyberbullying experiences.
Hypothesis/Expectations:
Our hypotheses will have various variables under study. These variables will be measured to ascertain how they affect each other. Hypotheses formulated from the study will be to investigate the different effects of cyberbullying. Testing the hypotheses will give us the results we desire-of how far does cyber bully negatively affects the victims. The main hypothesis understudy will be to determine the emotional trauma caused by online bullying. For the victims that were cyberbullied, they will also tell us how they dealt with the situation.
Literature review
Several studies have been done to address the issue of cyberbullying. Research by Olweus & Limber has indicated that most cyberbullying happens in sites like Facebook, Instagram, MySpace, and twitter. By 2008, 93 % of the youths between 12-17 have Facebook and Instagram accounts. Other studies by Kowalski, Limber, McCord (2019), showed that most of the youth spend more time on social media than any other activity other than sleeping. The last decade has witnessed a high number of people being bullied through social media platforms. Some people say that they haven’t been directly bullied but have witnessed mean behavior online. Another study by Yurtkoru & Islamoglu(2019) has analyzed that cyberbullying represents one of the dark sides of using the internet. The increased usage of the internet and social media platforms has brought negative impacts that have given researchers an interesting topic for research. Researchers have discussed various aspects affecting the issue of cyberbullying. However, one thing is common among all these studies; the effects of cyberbullying are harmful to all the victims. No single cyberbullying incident has a happy ending. Cyberbullying is quite hard to stop in children because parents might not understand when such things are happening to their children.
(Sahni & Raja, 2017), who conducted their research in India found that celebrities have a high probability of being trolled. This is because the lives of celebrities are out there. Most of the celebrities can do nothing about it-only ignoring what the haters say. Most people will troll celebs for how they look, who they date, and what they do. A larger population of people also compares their private lives online compared to 2013(Sahni & Raja, 2017). This includes a lot of their images, location, and even contact information. Malicious people might use this information to attack people online. Parents can take precautions by not sharing confidential information about their children online. Rosewarne, in her research, noted that cyberbullies might disclose the victim's personal data (Rosewarne, 2016). Some bullies also create fake accounts and practice impersonation, where they publish fake information about a person. Impersonation or creating fake accounts leaves a cyberbully anonymous. This will make it difficult
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.