Final Thesis
Final Thesis
CHAPTER 1
INTRODUCTION
(all in title) yields only twenty-one articles. In 2009, 2012 and 2013 one
article appeared each year, since 2014 each year there were few
The word cyber bullying did not even exist a decade ago, yet the
problem has become a pervasive one today. Cyber bullies do not have
bullying may cause students who normally would not bully in the
than 97% of youths in the United States are connected to the Internet
in some way (Tokunaga, 2010). The number of children and teens who
use the Internet at home is rapidly growing, with now over 66% of
Conclusion:
We concluded from our results that the Cyber bully-victim group has
perceived social support from family and from teachers reduce the
social support from the family increase the probability of higher levels
students.
terms of:
1.1. Flaming;
1.2. Slandering;
1.3. Refer;
1.5. Deletion?
1.1. Autonomy;
Hypothesis
Theoretical Framework
with cyber victimization, over and above, traditional bullying. Given the
online use; (5) risk and protective factors; (6) negative psycho-social
6
Page
outcomes, over and above traditional bullying; and (7) a brief overview
7
Directions are discussed. (PsycInfo Database Record (c) 2020 APA, all
Conceptual Framework
Variable
2013. Topics covered in the review have been categorized starting with
the walls of the schools, and in the community, the war against the
children will only intensify. (Beringer A., 2004). Cyber bullying uses
their ability to become a cyber bully (Patchin & Hinduja, 2007). Forty-
remain a serious issue that has not yet been appropriately addressed
effects to the school day since the comments will be discussed among
their peers at school the next day (Auerbach, 2009).Cyber bullying can
occur more often than traditional methods of bullying with effects felt
for days, weeks, or further, New technologies being used at home and
The word cyber bullying did not even exist a decade ago, yet the
problem has become a pervasive one today. Cyber bullies do not have
bullying may cause students who normally would not bully in the
than 97% of youths in the United States are connected to the Internet
in some way (Tokunaga, 2010). The number of children and teens who
use the Internet at home is rapidly growing, with now over 66% of
Ahia, & Dickson, 2004, as cited in Tokunaga, 2010), and cyber bullying
which collectively place the safety of children and teens who use the
cause for concern (Hinduja & Patchin, 2008). While bullying among
11
Page
wide prevalence and the social concern that surrounds it. When
cyber bullied one to two times within a month’s time and 50% of the
revealed that 32% of the students were victims of both cyber bullying
12
Page
13
studies that have pointed out the relationship between cyber and
the overlap between traditional and cyber bullying (32% of overlap for
overlap for both types of bullying) is not too large. The conclusion may
be drawn from this result that although cyber bullying and traditional
anyone in order to get help were 56% in Study One and 59% in Study
bullying (Whitney & Smith, 1993). Smith et al, (2008) in Study Two,
someone. Qing (2010) states that 40% of cyber bullied students would
students reported incidents that fall under its definition. Posting mean
bullying increases slightly with age. Finally, teens spending much time
school.
reported more outside of school than inside. Phone call and text
while rarer, was perceived to have a more negative impact. Age and
gender differences varied between the two studies. The first study
found most cyber bullying was done by one or a few students, usually
from the same year group. It often just lasted about a week, but
sometimes much longer. The second study found being a cyber victim,
but not a cyber bully, correlated with internet use; many cyber victims
many cyber victims had told no one about it. It can be concluded cyber
outside school.
Willard, 2005 as cited in Mason, 2008). There are six different roles
who believe they are superior and have the right to harass or demean
bullies are individuals who are picked on because bullies believe that
15
Page
they are different or inferior. Retaliators are individuals who have been
16
retaliators are individuals who have been bullying others, but are now
who are part of the problem are individuals who encourage and
support the bully or who watch the bullying from the sidelines but do
nothing to help the victim. Finally, bystanders who are part of the
solution are individuals who seek to stop the bullying, protest it, and
In Study, one phone call and text message bullying were most
who report having close friends are more confident, more altruistic,
17
greater advantage for the bully. The bully can make anonymous
and rest easy knowing that most authority figures will be unable to
trace or stop the harassment. A victim, on the other hand, feels more
that generally last longer than a black eye (Anderson & Strum, 2007).
2011).
Autonomy
internal locus of control (Ryff, 1989b; Ryff & Keyes, 1995). A fully
the standards of others. They do not strive for endorsement from other
individuals (Ryff, 1989b), are focused on their own beliefs and are less
having a positive impact on the world (Deci and Ryan, 2008; Ryff and
personality traits like hope, zest, gratitude, curiosity, and love (Hausler
being was provided by Ryff (2018), who also emphasized the need for
and Alvarado, 2011; Cáliz et al., 2013; Posada, 2013; Inguglia et al.,
Environmental mastery
20
actions (Ryff, 1989b; Ryff & Keyes, 1995). While a high level of
step out of one’s ‘comfort zone’ when striving for optimal sporting
performance.
and Keyes, 1995). The field of health and social science is increasingly
sclerosis.
life satisfaction in the midst of adversity." For those 65 and up who are
variables. In fact, the PWBI has been referenced in nearly 400 scholarly
the Canadian Study of Health and Aging have all included it in their
22
Few studies have examined the PWBI's factor structure to date (see
Ryff, 1989), but none have focused on the EMS or any of its other
have been able to validate the second-order factor structure after the
whether the first-order factors (or scales) are valid and reliable
Personal growth
goals (Ryff, 1989b; Ryff & Keyes, 1995). To achieve peak psychological
variety of new and diverse experiences. Athletes, who are humble but
22
Page
oneself."
individual with the goal of improving his or her life." There is evidence
to suggest that those with higher PGI also report lower levels of
lives is the initiative to develop oneself. In the last decade, the field of
positive psychology has increasingly become a focal point for the study
Positive relations
communication and support (Ryff, 1989b; Ryff & Keyes, 1995). A calm
1989b). The ability to have good human relations is one key feature of
25
sporting performance.
Self-acceptance
of optimal functioning (Ryff, 1989b; Ryff & Keyes, 1995). Healthy levels
Purpose in life
contribute to the appreciation of life (Ryff, 1989b; Ryff & Keyes, 1995).
25
Page
Mental health includes awareness that one has a greater goal and
26
concentration, set realistic goals and aim to be more holistic, they seek
a greater goal for themselves and often then also assist others. The
CHAPTER 2
METHODOLOGY
Research Design
method of study in which you have two quantitative variables from the
26
Page
descriptive method entails much more than just data collection. Its
fully than they could before using this method. (W. Fox and M.S. Bayat)
since it best answered the questions and served the study's objective.
Research Locale
City, and Cagayan de Oro. It shares borders with other towns in the
Matalam to the west, M'lang to the south, and Makilala to the east. The
27
city spans over 358.47 square kilometers (138.41 sq. mi) of land,
Page
northeast, close to the highest point in the Philippines, Mount Apo. The
Kabacan River originates from the northeastern part of the city and
flows across the northern border with Magpet town. The city
crops such as rice, corn, sugarcane, and fruits, is the primary driver of
the city's economy. The city also has a rich cultural heritage, with
Research Respondents
they may have direct experiences of cyber bullying. This study utilized
sample and save time and money (Black, 2010). Researchers choose
29
study.
Research Instrument
adapted from the work of Tudkuea & Laeheem (2014) which identifies
the work of Ryff & Keyes (1995) which identifies the six indicators such
Research Procedure
Statistical Tools
point from the mean. A high standard deviation implies that the data is
widely spread out, while a low standard deviation says that the data is
be used to illustrate the degree to which they are correlated with one
They were given the free-will to join in the study without any
the study were presented to the respondents, they were given the
was explained to the respondents and once they agree, they were
CHAPTER 3
Level of cyberbullying
denotes that the data are closely distributed around the mean value.
Flaming
I gossip and say bad words behind someone’s 4.35 1.273 High
back
I use rude words to scold others 3.97 1.089 High
I tease others about their bad or embarrassing
3.98 1.269 High
behaviors
I make fun of others’ physical impairments 3.65 1.246 High
I speak to embarrass, dishonor others and harm
3.55 1.383 High
their reputation
Category Mean 3.90 1.048 High
Table 1. Level of Cyberbullying
Mean SD Description
Slandering
3.53 1.308 High
I slander against others’ name to third persons
I slander against others to make third persons hate
3.57 1.212 High
them
I share embarrassing pictures or videos of others 3.75 1.144 High
I share images of others to harm their reputation 3.53 1.157 High
I spread rumors to humiliate others 3.82 1.228 High
Category Mean 3.64 .987 High
Refer (Identity Thief)
I use someone else’ name without permission to chat 3.65 1.300 High
online through social networks
I use someone else’ name without permission in bad
3.55 1.346 High
ways
I use images of others without permission 3.60 1.291 High
I use someone else’ name without permission for my
3.80 1.205 High
benefits
I use someone else’ name without permission to hurt
3.75 1.202 High
third persons
Category Mean 3.67 .989 High
Secret (Revealing other People’s Personal Secrets)
I brought the name of parents or closely adult relative of 3.57 1.110 High
other people to disclose or forward
35
disclose or forward
36
say bad words behind someone’s back has the highest mean with a
value of 4.35 or high. On the other hand, the lowest mean is 3.55 or
their reputation.
students. The item I spread rumors to humiliate others has the highest
mean score of 3.82 or high, while the item I slander against others’
name to third persons got the lowest mean score of 3.53 or high. The
or high, this signifies that refer (identify thief) is highly evident. The
Page
37
item I use someone else’ name without permission for my benefits with
3.80 got the highest mean score. Meanwhile, the item I use someone
else’ name without permission in bad ways acquired the lowest mean
highly evident among criminology students. The item I led the secret
that makes the shame and disgrace of the other people to disclose or
forward has the highest mean score of 3.82 or high. On the other hand,
3.57 or high.
score of 3.88 or high, this indicates that deletion is highly evident. The
from the group has the highest mean score of 4.12 or high, while the
item I unfriend or delete people I do not like from the group got the
to 1.055 and with an overall mean score of 4.09 or high. This means
Page
38
manifested.
Autonomy
4.42 .869 High
I tend to be influenced by people with strong opinions.
I have confidence in my own opinions, even if they are
4.18 .833 High
different from the way most other most people think.
I judge myself by what I think is important, not by the
4.13 .892 High
values of what others think is important.
Category Mean 4.24 .700 High
Environmental Mastery
3.80 1.022 High
The demands of everyday life often get me down.
In general, I feel I am in charge of the situation in
3.93 .880 High
which I live.
I am good at managing the responsibilities of daily life. 3.95 .946 High
Category Mean 3.89 .718 High
Personal Growth
For me, life has been a continuous process of 3.95 .982 High
learning, changing, and growth.
I think it is important to have new experiences that
3.87 .947 High
challenge how I think about myself and the world.
I gave up trying to make big improvements or changes
4.12 .846 High
in my life a long time ago
Category Mean 3.98 .708 High
Positive Relation
Maintaining close relationships has been difficult and 3.93 .936 High
frustrating for me.
People would describe me as a giving person, willing
4.07 .936 High
38
by people with strong opinions has the highest mean with a value of
4.42 or high. On the other hand, the lowest mean is 4.13 or high in the
good at managing the responsibilities of daily life has the highest mean
Page
40
score of 3.95 or high, while the item The demands of everyday life
often get me down got the lowest mean score of 3.80 or high. The
improvements or changes in my life a long time ago with 4.12 got the
new experiences that challenge how I think about myself, and the
and trusting relationships with others has the highest mean score of
has been difficult and frustrating for me gained the lowest mean score
of 3.93 or high.
mean score of 4.17 or high, while the item When I look at the story of
40
Page
my life, I am pleased with how things have turned out so far got the
41
item I sometimes feel as if I’ve done all there is to do in life has the
highest mean score of 4.35, while the item Some people wander
aimlessly through life, but I am not one of them got the lowest mean
affected.
R P-value Remarks
42
Cyber bullying
.272* .000 Significant
the walls of the schools, and in the community, the war against the
CHAPTER 4
Conclusion
In this section, conclusions are derived based on the perceptions
social well-being); and the reactive behavior from schools and students
homes, within the walls of the schools, and in the community, the war
Recommendation
respondents.
REFERENCES
Bhat, C., Suniti, C., Shih-Hua, L., & Jamie A. (2010). Addressing cyber
bullying as media literacy. New Horizons in Education, 58(3), 34-
43.
Boulton, M., Lloyd, J., Down, J., & Marx, H. (2012). Predicting
undergraduates' self-reported engagement in traditional and
cyber bullying from attitudes. Cyberpsychology, Behavior, and
45
Calvete, E.,Orue, I., Estévez, A., Villardón, L., & Padilla, P.(2010). Cyber
bullying in adolescents: Modalities and aggressors’ profile.
Computers in Human Behavior, 26(5), 1128-1135. 8p. DOI:
10.1016/j.chb.2010.03.017.
Dehue, F., Bolman, C., & Völlink, T. (2008). Cyber bullying: Youngsters'
experiences and parental perception. CyberPsychology &
Behavior, 11(2), 217-223.
Durkin, K., & Patterson, D. (2011). Cyber bullying, cyber harassing, and
cyber stalking. In: The Routledge handbook of deviant behavior.
Bryant, C. D. (Ed.); New York, NY, US: Routledge/Taylor & Francis
Group, 450-455. [Chapter]
Allen, K. P. 2012. "Off the Radar and Ubiquitous: Text Messaging and
Its Relationship to Drama and Cyber bullying in an Affluent,
Academically Rigorous Us High School," Journal of Youth Studies
(15:1), pp. 99-117.
Beran, T., and Li, Q. 2008. "The Relationship between Cyber bullying
and School Bullying," The Journal of Student Wellbeing (1:2), pp.
16-33.
Bhat, C., and Ragan, M. 2013. "Cyber bullying in Asia,"). Bocij, P. 2004.
Cyber stalking: Harassment in the Internet Age and How to
Protect Your Family. Greenwood Publishing Group.
Estell, D. B., Farmer, T. W., Irvin, M. J., Crowther, A., Akos, P., &
Boudah, D. J. (2009). Students with exceptionalities and the peer
group context of bullying and victimization in late elementary
school. Journal of Child & Family Studies, 18(2), 136-50.
Fredrick, K. (2010). Mean girls (and boys): Cyber bullying and what can
be done about it. School Library Media Activities Monthly, 25(8),
44-45.
Hoff, D. L., & Mitchell, S. N. (2009). Cyber bullying: Causes, effects, and
remedies. Journal of Educational Administration, 47(5), 652-665.
Holladay, J. (2011). Cyber bullying. Education Digest, 76(5), 4-9. [22]
Humphrey, N., & Symes, W. (2010). Responses to bullying and
use of social support among pupils with autism.
Brewer, B., Cave, A., Massey, A., Vurdelja, A., and Freeman, J. 2012.
"Cyber Bullying among Female College Students: An Exploratory
Study," Californian Journal of Health Promotion (12:1), pp. 40-51.
APPENDEX A
49
SURVEY QUESTIONNAIRES
Page
50
SURVEY QUESTIONNAIRE
Read each item carefully. Using the scale below, please indicate
how well the statement describes how you feel towards the statement.
Please answer the questions honestly. There is NO right or wrong
answers. Please do not skip each item. Please check the correspondent
scale below.
Legend
5 Strongly Agree
4 Agree
3 Neutral
2 Disagree
1 Strongly Disagree
Flaming 5 4 3 2 1
behaviors
Slandering
Deletion
Autonomy 5 4 3 2 1
Environmental Mastery
Personal Growth
Positive Relation
Self-acceptance
achievements in life.”
Page
Purpose in Life
54
APPENDEX E
CURRICULUM VITAE
54
Page
55
CURRICULUM VITAE
NORODIN S. IBRAHIM
Birthdate: April 19, 2001
Birth Place: Poblacion, Carmen, Cotabato
Present Address: Poblacion, Carmen, Cotabato
E-mail Address: [email protected]
Educational Qualification
MORSHED LANDASAN
Birthdate: August 5, 2000
Birth Place: Buliok, Pagalungan, Maguindanao
Present Address: Inug-ug, Pikit, Cotabato
E-mail Address: [email protected]
Educational Qualification
S.Y. 2014-218
57
MOJAHED M. ULANGKAYA
Birthdate: September 29, 2000
Birth Place: Damalasak, Pagalungan, Maguindanao del Sur
Present Address: Batulawan, Pikit, Cotabato
E-mail Address: [email protected]
Educational Qualification
MOHAMAD S. SAPAL
Birthdate: March 7, 1999
Birth Place: Pagangan, Aleosan, Cotabato
Present Address: Pagangan, Aleosan, Cotabato
E-mail Address: [email protected]
Educational Qualification
GREMEL M. ALEJO
Birthdate: August 5, 2000
Birth Place: Katitisan, Datu Montawal, Maguindanao del Sur
Present Address: Katitisan, Datu Montawal, Maguindanao del Sur
E-mail Address: [email protected]
Educational Qualification
Educational Qualification
APPENDEX C
VALIDATION FORM
61
Page