The Impact of Cyber Bullying on Mental Health
The current research pre-proposal focuses upon the topic of cyber bullying and also investigates into the mental health of the accusers who get into bullying people through online social media sites. With significant rise in the rate of the online crimes we need to ponder upon the factors which promote the same. The research pre-proposal also focuses upon different methods implemented to reduce the rates of cyber bullying within the United States and their successive outcomes.
As mentioned by Hinduja & Patchin (2014), cyber bullying is the most common online risk for teens in the United States of America and worldwide. In 36% of the cases the parents are absolutely unaware of the digital communication addiction of their children (“Facts About Bullying”, 2018). Most of the times the times the communication gaps are further developed into generation gaps which are not easy to trespass by the parents. In such cases the results are often lethal resulting in teenage suicides. Additionally, the social media handle has also been seen to be used by people across all age groups. As mentioned by Davison & Stein (2014), diverse the age group, diverse is the bully reports. The increase in the rate of use of cell phones and reduction in the age limit of starting to use the cell phone has been a major trigger in this effect. As commented by Hinduja & Patchin (2014), age for the use of cell phone in US has got reduced to as early as 11.6 years. Moreover, the social media and online sites have also been seen to used by students, working professionals and people of all age groups alike for making negative resentful comments regarding their teachers, bosses , colleagues (“Facts About Bullying”, 2018). As commented by Carpenter & Hubbard (2014), excessive resentment often takes the form of online trolls which is a kind of cyber bully and punishable by law.
The project will help us in identifying the primary group that will benefit from the research. It includes the teenagers in schools, colleges, the working professionals, the parents and teachers of the teenagers. Therefore, undertaking research project could help in understanding the effects of cyber bullying on teens and adults and also help in designing effective control measures. The qualitative and quantitative approach taken in the research would also help in developing effective counseling approaches.
Cyber bullying is one of the common forms of resentful behavior projected within the current decade. Cyber bullying could be primary verbal aggression and in the form of threatening or harassing. It could also be relational bullying where people are using social media handles to spread rumors about others. Additionally, forging the pictures of people and using them to distort their image in front of the virtual world are some of the other serious forms of crimes done through cyber bullying (Kupczynski, Mundy & Green, 2013). As commented by Carpenter & Hubbard (2014), children and teenagers are easy targets as they get easily carried away by strong emotions. Evidence has proven that the lonely teens have more propensities to be trapped by cyber bullies. The figures and statistics are depressing which mentions that 15% of the high school students have been bullied in the past year (Davison & Stein, 2014). Online activities can be an amazing source of entertainment and duly reduces the stress and boredom in people. It can provide many forms of entertainment at the same time in the form of movies, music, games, educative material, online shopping etc. However, too much addiction of the online sites and dislodging private information within then has been seen to produce negative consequences. As commented by Ribble & Miller (2013), the bullies generally exhibit two different personality traits. One is who are confident enough to keep to their real identity. Additionally, there are others who masquerade their identity and use fake names to bully their targets. In this respect, the bully could be referred to as anyone who either bullies or gets bullied. There are several rich literature sources which have pointed towards the presence of high levels of mental indignation for the depiction of negative approaches towards the society in general.
Types of Cyber Bullying
In order to stop cyber bullying it is important to know and differentiate between the different forms of cyber bullying. Some of these are – cyber stalking, denigration, exclusion/gossip groups, masquerading or impersonating, flaming etc. The most common type of online bullying which happens is cyber stalking, where the bully may be constantly sending some or the other kind of abusive or threatening messages to the victim, so much as to instill fear in the minds of the vulnerable that the bully may actually move out in real life and physically harm the person (Cassim, 2013). Additionally, flaming is a type of online bullying where the bully supplements the abusive messages with graphics and images. which can distort the social image of the victimized. As commented by Kupczynski et al. (2013), there are many online phishing sites which may look like an instagram or a facebook but they are solely crated and controlled by hackers. The personal life secrets and information leaked over here can lead to devastating effects such as teenage suicide. As commented by Cassidy, Faucher, & Jackson (2013), the anonymity related to cyber bullying fosters a sense of lack of inhibition as the bully can remain faceless. This kind of behavior is mainly taken over by individual who are afraid to confront their peers or competitors in real life or have themselves been a victim of bully.
Counseling efforts have seen to produce positive effects in controlling the devastating effects of cyber bullying. As supported by Wong, Cheung & Xiao (2018), children who dislike school are more likely to get dropped out of school, face crisis in life and career and hold beliefs that support violence. Schools, colleges and offices can play a very strong role in preventing the rates of cyber bullying by implementing effective counseling measures. The mental health professionals can closely work with the schools, offices or colleges to follow the mental health of individuals they suspect to be facing harassment or depicting resentful or abnormal behavior at workplace and in schools. These could be done in a number of steps such as educating family, educators and students about the negative effects of online trolling. In this respect, offering support and coping strategies to the ones who have been bullied can reduce the occurrences of such phenomenon. As commented by Campbell & Zavrsnik (2013), communication gaps between the workplaces, schools and mental healthcare channels often delays the process if mental health referrals. A number of acts and policies have been implemented in this regards which includes the Bullying prevention for school safety and crime reduction act of 2003, safe school plan to reduce the chances of school children being victimized by online grooming activities by making them aware.
Effective Control Measures
The research design is crucial to the success of a research project. Based upon the design of the research the collection of the data is done and analyzed. In the current research project the researcher will follow a mixed research design. Hence, the researcher will employ both qualitative and quantitative methods of data collection. The mixed methods would enable the researcher to collect sufficient data, which will further help in doing a comparative analysis.
The researcher will follow a phenomenological research design over here which will help the researcher in understanding the vivid and real life experiences of the victim and the bully. It will be established by the researcher using a qualitative research design. For following the particular research design the researcher will need to get permission granted from his supervisor as well as follow the research ethics. As mentioned by Lewis (2015), getting approval through the participants is the first and most important step in the conduction of a research project. As mentioned by Mayoh & Onwuegbuzie (2015), confidentiality is another important concern which needs to be kept in mind during collection of data through qualitative methods.
However, there are several strengths and limitations of the phenomenological research design. The individual experiences will help the researcher in looking at the larger picture. As commented by Brannen (2017), to understand a lived experience means that changes could be brought about in the form of important policies and regulations which can help in checking the menace of cyber bullying.
Additionally, the researcher will also encounter difficulties in the process of data collection due to hindrances offered due to age, cognition and embarrassment etc. As commented by Mayoh & Onwuegbuzie (2015), adopting the approach could result in researcher’s bias which could interfere with the test results. The data analysis through this method will take time to complete and is laborious.
In the current study, the researcher will use a mixed data collection method for developing of the research questions. The purpose of the research is to find out effective prevention and control methods for reducing the effect and the hazards created by cyber bullying. The research questions have been further divided based upon the methods of data collection
H0= cyber bullying causes neutral or no effect on the mental well-being of people
H1= cyber bullying can have considerable negative impact upon the mental health of people
H0’= counseling produces little or no effect in reducing the chances of cyber bullying in schools and workplaces
Research Design: Mixed-Methods Approach
H1’= Counseling in schools/workplaces can significantly reduce the chances of cyber bullying
In the current research, pre-proposal more than two research hypothesis have been suggested. The hypothesis H0 and H1 have been developed for conducting a quantitative research analysis whereas the hypothesis H0’ and H1’ have been developed for conducting a qualitative research study.
In the current study, the researcher will follow a mixed method of data collection. Hence, the researcher will use both a qualitative and quantitative research design. The data collection plans with respect to both have been highlighted over here. The participant selection is one of the crucial steps for a quantitative study design. For conducting the survey prior consent will be taken from the participants of the surveys process. Hence, a number of steps will be followed by the researcher for conducting the quantitative study.
Participant Selection
For conducting the quantitative study, the researcher will select children from schools and colleges as well as participants from workplaces who have faced incidences of cyber bullying in the past. The researcher will meet the participants at the regional centre for mental health. The participants will be divided into small focus groups which will help in conducting the survey.
Gaining Permission
The researcher will get in touch with the schools and colleges of the children and a consent form will be sent to the parents of the students who will be made part of the survey process. The researchers will only conduct the survey after getting approval from the parents and teachers of the children. The researcher will also obtain a no objection certificate from the workplaces of the employee who have to undergo the study design.
Data to be Collected
The data collected will help in arriving at statistically significant results which will be presented in the form of graphs and charts.
Data Collection Instruments
The data will be collected using close ended questionnaire where the researcher will collect responses from the participants of the survey process.
The researcher will also use a qualitative research design where the researcher will arrange an interview with his focus group of participants. The focus group will be divided into the young adults and the office goers many of who have experienced workplace bullying. In this respect, certain important factors for conducting the interview will also be taken into account by the researcher.
Sampling Approach-
The researcher will undertake a random probability sampling over here which help in eradicating any form of biasness in the selection of the focus group. As commented by Yilmaz (2013), selection of a random probability sampling will provide equal chances to each and every participant to take part in the interview.
Research Hypotheses
Gaining Permission
The researcher will get approval from the participants of the interview process by sending theme consent forms. Without getting approval in the consent forms the researcher cannot conduct the interview.
Data to be collected
The researcher will obtain specific responses from the participants of the interview process where he will provide them with open ended questionnaire. The responses collected will be made into similar themes which will help the researcher in doing a comparative analysis.
Procedures for Recording Data
The researcher will use audio tapes for recording the data
The researcher will use both quantitative and qualitative methods for the collection of the data. Both have been discussed as follows:
Preparing Data for quantitative Analysis
The data for quantitative analysis will be collected using survey questionnaire where the participants will be made to answer close ended questionnaire.
Analyzing the Data
The responses collected will be compiled into empirical data for presentation of statistically significant results.
Reporting and interpreting the Results
The results will be reported in the form of numeric and graphs and charts
Preparing and Organizing Data for qualitative Analysis
For the interpretation of the qualitative data the researcher will use an audio tape for recoding the interview responses of the candidates.
Exploring and coding the data into themes
These audio recordings will be used by the researcher later for grouping into similar dissimilar data.
Interpreting the report findings
The data will be further used for doing thematic analysis. The data will be coded into similar and dissimilar themes which will help in comparing the data.
Validating the Accuracy of the Findings
The validity of the interview responses will be tested by the researcher comparing with secondary literature sources (Mertens, 2014). Additionally, the survey responses across different focus groups will be compared to test the synonymy of the results.
The ethical and cultural considerations are equally important in conducting a research project. During conducting the interview and the survey process the researcher will not force the participants for extracting information as this will be a violation of the research ethics and policies. Additionally, the researcher needs to ensure that the participants will be able to leave the interview process at any point of time. In case the participants of the interview process are below 17 years of age the researcher will get approved consent from their parents and their teachers at schools. This will help in getting sufficient cooperation from the participants at the interview process.
The cultural considerations also forms an important part of the research process. The cultural sentiments of the participants will be taken into consideration during conducting the interview process (Lewis, 2015). This is because some of the participants will not be comfortable disclosing confidential details. Hence, the researcher will need to ensure that the need for privacy of the participants is duly respected.
Conclusion
The research pre-proposal focuses on the issue of cyber bullying and the deteriorating impacts it can have upon people. Cyber bullying can produce a number of negative effects upon different age group. In this case both the one who have been bullied and the one causing the bully have been termed as bully. The research pre-proposal here gives an outline of the different steps and methods which will be followed for conducting the study. However, limitations are always there which is not getting sufficient cooperation from the participants. Additionally, being at an arm’s length from the place of bully can affect the researcher’s decision making.
Additionally, breach of the research ethics can also invite legal action against the researcher. Hence, the researcher needs to conduct the study in compliance with the rules and regulations of the research. The success of the research also lies significantly on the data collection plan and the research design. Hence, the researcher will need to make his selections wisely.
References
Brannen, J. (Ed.). (2017). Mixing methods: Qualitative and quantitative research. Abingdon: Routledge, 85-115.
Campbell, M. A., & Zavrsnik, A. (2013). Should cyberbullying be criminalized. Cyberbullying through the New Media: Findings from an International Network; Psychology Press: East Sussex, UK, 65-82.
Carpenter, L. M., & Hubbard, G. B. (2014). Cyberbullying: implications for the psychiatric nurse practitioner. Journal of child and adolescent psychiatric nursing, 27(3), 142-148. DOI: 10.1111/jcap.12079
Cassidy, W., Faucher, C., & Jackson, M. (2013). Cyberbullying among youth: A comprehensive review of current international research and its implications and application to policy and practice. School Psychology International, 34(6), 575-612. Retrieved from: https://journals.sagepub.com/doi/abs/10.1177/0143034313479697
Cassim, F. (2013). Formulating adequate legislation to address cyber-bullying: Has the law kept pace with advancing technology?. South African Journal of Criminal Justice, 26(1), 1-20. Retrieved from: https://journals.co.za/content/ju_sajcj/26/1/EJC144043
Davison, C. B., & Stein, C. H. (2014). The dangers of cyberbullying. North American Journal of Psychology, 16(3), 595. Retrieved from: https://search.proquest.com/openview/7fced4a423e2017cb96eee45b24c1381/1?pq-origsite=gscholar&cbl=28796
Facts About Bullying. (2018). StopBullying.gov. Retrieved 9 March 2018, from https://www.stopbullying.gov/media/facts/index.html
Hinduja, S., & Patchin, J. W. (2014). Bullying beyond the schoolyard: Preventing and responding to cyberbullying.
Kupczynski, L., Mundy, M., & Green, M. E. (2013). The prevalence of cyberbullying among ethnic groups of high school students. International Journal of Educational Research, 1(2), 48-53. Retrieved from: https://ijsse.com/ijer/sites/default/files/papers/2013/v1i2/1
Lewis, S. (2015). Qualitative inquiry and research design: Choosing among five approaches. Health promotion practice, 16(4), 473-475. Retrieved from: https://journals.sagepub.com/doi/abs/10.1177/1524839915580941
Lewis, S. (2015). Qualitative inquiry and research design: Choosing among five approaches. Health promotion practice, 16(4), 473-475. Retrieved from: https://journals.sagepub.com/doi/abs/10.1177/1524839915580941
Mayoh, J., & Onwuegbuzie, A. J. (2015). Toward a conceptualization of mixed methods phenomenological research. Journal of mixed methods research, 9(1), 91-107. Retrieved from: https://journals.sagepub.com/doi/abs/10.1177/1558689813505358
Mertens, D. M. (2014). Research and evaluation in education and psychology: Integrating diversity with quantitative, qualitative, and mixed methods. London: Sage publications, 101-225.
Ribble, M., & Miller, T. N. (2013). Educational Leadership in an Online World: Connecting Students to Technology Responsibly, Safely, and Ethically. Journal of asynchronous learning networks, 17(1), 137-145. Retrieved from: https://files.eric.ed.gov/fulltext/EJ1011379
Wong, R. Y., Cheung, C. M., & Xiao, B. (2018). Does gender matter in cyberbullying perpetration? An empirical investigation. Computers in Human Behavior, 79, 247-257. Retrieved from: https://doi.org/10.1016/j.chb.2017.10.022
Yilmaz, K. (2013). Comparison of quantitative and qualitative research traditions: Epistemological, theoretical, and methodological differences. European Journal of Education, 48(2), 311-325.