Cyber Bullying Peer Reviewed Journal

PAGES
3
WORDS
873
Cite

Testing Assumptions About Cyberbullying: Perceived Distress Associated With Acts of Conventional and Cyberbullying Grade:

Course Code:

Cyber bullying

Bauman & Newman (2012), in light of the considerable attention that cyber bullying has received in the recent past and the assumptions the phenomenon had received, undertook to test assumptions about cyber bullying. Cyber bullying in essence has much to do with using the knowledge of information and communication technology to harm other people's social status, relationships, and reputation. Conspiracy that clouds cyber bullying continues considerable attention from popular media. Protracted legal tussles have been witnessed in instances when reports of isolated cases have been made. Bauman & Newman (2012), sought to establish whether experts speculation that the potential from cyber bullying was in deed greater than the dangers posed by conventional bullying. The fact that this assumption had not been empirically informed their resolve to conduct this study.

Five hundred and eighty eight students from Southern University participated in this study. Seventy six percent of the participants were female gender. The participants' ages ranged from 17 to 25. Their mean age was 19.8. About 45% of the participants came from the university vicinity. Ten per cent of them came from elsewhere while 35% were natives of other U.S. states. Nine percent of the participants had other national origins. Sixty-six percent of the participants...

...

Five percent of the participants indicated they belonged to "other" ethnicity. Participants were predominantly from psychology classes. They were recruited via online subject pool system.
The system was settled on because it provided several options for fulfilling students' course research requisites. The word bullying was never mentioned until the debriefing as the survey was advertised as a study of social attitudes. The online survey lasted for at least 15 minutes. Participants' informed consent was sought before the survey commenced. Procedures and measures were approved by the Institutional Review Board at the researcher's university. Questionnaires used in the survey were developed by the authors of the study. Items in the questionnaire captured a broad range of behaviors that represented familiar forms of bullying in 17- to 25-year-olds that could be delivered through conventionally or through the cyber. Final scale had eight pairs of items that described an incident in which a participant was bullied. The eight items also addressed incidences of conventional bullying.

The items also addressed parallel scenarios in which the same bullying behavior was perpetuated through communication technology. Response options ranged from 1 to 7. To assess historical victimization, participants were asked whether they were bullied during junior high, high school, and college by choosing from never,…

Sources Used in Documents:

References List

Bauman, S. & Newman, M.L. (2012). Testing Assumptions About Cyberbullying: Perceived

Distress Associated With Acts of Conventional and Cyberbullying. Tucson: Arizona University Press.


Cite this Document:

"Cyber Bullying" (2012, September 21) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/cyber-bullying-75563

"Cyber Bullying" 21 September 2012. Web.19 April. 2024. <
https://www.paperdue.com/essay/cyber-bullying-75563>

"Cyber Bullying", 21 September 2012, Accessed.19 April. 2024,
https://www.paperdue.com/essay/cyber-bullying-75563

Related Documents

Bullying and Cyber Bullying at Schools The pervasive culture of bullying and cyber bullying in schools has become a serious dilemma for many students and parents, and has been brought on by many different aspects of life, but how does the violence that children are exposed to in video games come into play when it comes to children bullying others both online and in person? This is a serious question with

Cyber Bullying: An Impact on Adolescents College Students In this literature review, the author will be reviewing literature regarding cyber bullying and how it impacts upon college students. This is especially fertile ground for research because there is not much information about how such electronic aggression affects college students. The focus of most of the research has been upon younger adolescents. In such individuals, concern is widespread that new forms of

Cyber-Bullying Bullying may be a practice that has been around since the beginnings of human history, but with the increasing access that people have to technology a new medium is now used by aggressors. Cyber bullying is an act that involves using computers, cell phones and other sorts of media to consistently harass others. The object of the bullying, to cause physical or psychological damage to another, is the same, but

Bullying and Cyber Bullying are major issues in the world today, particularly in young people who are either in middle school or high school. Bullying happens at others stages in life, but it seems to be between ages 12 and 17 that kids have the worst problems with being bullied. It is truly tragic what happens to kids who are targeted by bullies. The definition of bullying is "unwanted words

Cyber Bullying and Its Impact Over the past decade, attention has been drawn to cyber-bullying by the media and researchers. Research on cyber-bullying has covered the various behavior aspects; focusing mainly on demographic and personal factors of the involved individuals. Particularly, the research has been targeted at factors among adolescents; who account for a majority of cyber-bullying cases. Nonetheless, it is important that other populations are studied too -- even adults

Cyber Bullying
PAGES 7 WORDS 1931

Cyberbullying The effects of the recent trend known as cyberbullying was investigated. Current literature was examined on the subject in order to establish a general basis of the various potentialities of this harmful activity. Upon synthesizing a working knowledge and hypothesis from this data, a comprehensive research method was developed whereby participants were asked to temporarily forgo their privacy in online and electronic environments. By allowing the research team to assiduously