Qualification - Higher National Certificate and Higher National Diploma in Computing

Unit Name - Computing Research Project

Unit Number - Unit 13

Assignment Title - Digital wellbeing on Cyber-bullying

Learning Outcome 1: Examine appropriate research methodologies and approaches as part of the research process.

Learning Outcome 2: Conduct and analyse research relevant to a computing research project.

Learning Outcome 3: Communicate the outcomes of a research project to identified stakeholders.

Learning Outcome 4: Reflect on the application of research methodologies and concepts.

Students are to choose their own research topic for this unit. Strong research projects are those with clear, well focused and defined objectives. A central skill in selecting a research objective is the ability to select a suitable and focused research objective. One of the best ways to do this is to put it in the form of a question. Students should be encouraged by tutors to discuss a variety of topics related to the theme to generate ideas for a good research objective.

Hire Our Higher National Certificate and Higher National Diploma in Computing Assignment help Services Now!

Solution:

Digital wellbeing on Cyber-bullying

Introduction

Bullying is known as someone hurt by their words or actions and make feels bad of it. It is a hard time to stop what happen to them. The new technology gives them new platform for their action now a days and bullies have been for long time. The cyberbullying is known as use of new technology such as email, internet, social media photos, mobile phones to do harassment, embarrass and threaten to target person. These types of actions usually occur on young people but when an adult involved which means cyber stalking, cyber harassment etc. The cyberbullying is important to concern on public health which can lead to increase the risk of mental health issues such as development problems, suicide and psychological. Many researchers had lack of agreements on definition and occurrences of cyberbullying and methods to measure of cyberbullying and its prevalence. This report discusses on object of this case study, literature survey, research methods, limitation of each methods, ethical issues and finally we conclude on cyberbullying on digital wellbeing.

Also read: Determine own responsibilities and performance, Engage our proficient labor HND assignment assistants at a competitive rate and receive plagiarism-free assignment solutions deserving of top grades.

Objective

The main objective of this report is to demonstrate the prevalence of cyberbullying in and also determine how to prevent and deal effectively with cyberbullying before it takes an opportunity to play in life. This paper demonstrates that cyber bullying using new technology and literature survey is used to support to change the policy on bullying which has limits in many places to discipline perpetrators when the bullying occurs. Also discuss research process and methodology, limitation of each methods and ethical issues.

Literature Review

The continuous examination on cyberbullying is obliged to give the liberal confirmation by the composition audit to help the advancement of cyberbullying issue and wild. Qing Li proposed an article on 2007 which communicates that data exhibited that one-fourth of the understudies were cyberbullying losses and fifteen percent of the understudies were bothered with the use of specific electronic devices.Furthermore, the delayed effects of the examination showed that most events are unreported. The maker prescribes that the web's customer anonymity is an essential deterrent in the schools ' fight against computerized torment.
Jennifer Holladay proposes an examination between standard tormenting and propelled harassing. The report takes a gander at the remarkable mercilessness of cutting edge chafing explicitly conventional on social correspondence regions like Facebook. Holladay claims "some spot in the extent of 33% to one piece of youth shave been based on". In their article Beale and Hall see that paying little regard to endeavours by schools to make undertakings and give direction on cyberbullying the issue still drives forward. The creators stress riddle stayed to the liable gatherings through the web as beast hindrance to battle the issue. The article in like way proposes that present tormenting laws should be stretched out to combine an electronic baiting area.

Tangen and Campbell similarly shown practically identical responses as for cyberbullying scenes experienced by the two get-togethers. The two social occasions furthermore felt that educators were less disposed to envision cyberbullying than eye to eye tormenting. The makers in like manner express that schools miss the mark on the data to neutralize and cyberbullying against.
Kathleen Conn traces the different cyberbullying types and horrific cyberbullying after-effects. Suicides have occurred in a few instances of cyberbullying. Misused individuals can't escape the various kinds of cyberbullying as it's the delight of anyone cruising around when posted. The objective of the article is to give legal examples of cyberbullying.

Get Best Unit 13 Computing Research Project - BTEC Higher National Diploma in Computing Assignment Help Service with Ease!

Research Approaches and Methodology

Research Approach

According to Feather (2016), a research approach is simply a procedure employed in gathering data, and in making analysis of the collected data. There are two common types of research approaches: inductive vs deductive. Inductive approach entails utilisation of specific observations in order to establish and affirm general theories and statements. On the other hand, deductive approach involves making conclusions on the general statements or observations made be respondents. This means that the latter is chiefly related with quantitative data while the former is majorly concerned on qualitative approach. The current study will make use of inductive research approach, owing to the fact that it will majorly rely on qualitative data. This approach is deemed to be suitable owing to its potential to obtain the required information from a readily available and wide source. Since the problem under investigation is wide-scale, this is presumed to be the most effective means of gathering data from different levels.

Primary vs. Secondary data
Two forms of data suffice: secondary vs primary. Secondary data is a form of data from already published sources such as journals, scientific databases, books, articles among others. On the other hand, primary data is a kind of data which is obtained from first hand observations. The collection of this type of data can be done through questionnaires, experiments, and interviews. Accordingly, the current study will use both primary and secondary data to gain data and information in relation to the research objective. The reason for settling on this approach is because they are cost effective while also making it easier to collect the needed information from desktop research and in a timelier manner (Dipak, 2013).

Research Methods

According to Bengtsson (2016), a research method can either be qualitative or quantitative. Quantitative research methods are one that employs numerical quantitative data in deducing inferences. The data obtained is then compared with existing findings after which analysis is made on the inferences. On the other hand, qualitative research methods are those that uses non-numerical data and are mostly exploratory in nature. This method is mostly preferred to gain a better comprehension regarding opinions, motivations and reasons. It is also employed in highlighting trends in thoughts, opinions and more insights on the study phenomena (Bengtsson, 2016). Accordingly, the research will deploy the use of qualitative research which is better applied with secondary research owing to its relevance in answering the research questions. In using this approach, the researcher aims to benefit from the advantages including its ability to gain wider insights regarding the measures to curb cyber bullying and its effects.

Data Analysis
Data obtained from secondary sources will be analyzed using content analysis. According to Bulmer (2017), content analysis is the best approach in analysing secondary and qualitative data. The approach works by comparing information and data from one source to another in terms of differences and similarities. The meaning, implication of the data will then be deduced after which generalisation will be made. The interpretation of the information will then be made based on the research objectives.

On the other hand, data obtained from primary sources, who includes parents and internet users will be collected through the use of survey monkey. Survey Monkey is an online survey platform that facilitates posting and collection of data from willing respondents.

Ethical Issues

As postulated by Neuman (2016), any researcher needs to observe ethical guidelines when collecting data from whatever approaches. This is critical in ensuring that the outcome remains credible, valid and reliable. Since this research is secondary in nature, the researcher will make sure that all the information is properly cited and that all sources are properly credited. Furthermore, the researcher will ensure that the information used and analyzed is relevant to the objective as well as ensuring that the evidence used is the latest. On the other hand, participants in the primary data collection will be guaranteed on confidentiality issues while they will be accorded their right to participate or refuse to participate. Furthermore, participants will be informed on the role of the research alongside the implications.

Conclusion
Bullying is known as someone hurt by their words or actions and make feels bad of it. It is a hard time to stop what happen to them. The cyberbullying is known as use of new technology such as email, internet, social media photos, mobile phones to do harassment, embarrass and threaten to target person. The cyberbullying is important to concern on public health which can lead to increase the risk of mental health issues such as development problems, suicide and psychological. This report discussed on object of this case study, literature survey, research methods, limitation of each methods, ethical issues and finally we conclude on cyberbullying on digital wellbeing.

Also read: Seeking assistance with your Unit 34 Business Systems Assignment? Hire a skilled and professional UK tutor today!

Findings & Analysis

Prevalence of Cyber bulling

According to a latest report by Ofcom (2019), one in eight children age-12-15 years claim to have been directly bullied in one way or another on social media. This implies that actually cyber-bullying is rife and that the trend is becoming common on social media platforms. The relevant authorities need to come up and design strategies to deal with the phenomena.
What are the Peak Years for CyberBullying Risk

According to a report by Suffolk Cybersurvey (2016), the most prime years for cyberbullying risks are between 14-15 years. The risks also depend on a range of online experiences and encounters. Of course these group of people are those who have began being active on the internet. However, they don't know much about how to protect themselves from cyber-bullying.

The Eagerness of Parents to Know about Cyber Bullying

Results from survey monkey indicate that approximately 59% of parents want to know more about online bullying as they are unsure about when to intervene and how to approach this in a sensitive manner if they sense their child is being bullied by someone in their friendship group. This information is important for them to know how they respond should the need arise.
The more time children spend online, the more chance they have of having a negative experience at some point. From the results, about half of all cyber-bullying comes from someone known to the victim.

Summary
From this analysis, it is evident that cyber-bullying is prevalent in the society, and to a tremendous level. Mores, the generation that are more at risk of cyber bullying are the young children within the age range of 14-15. These are the young people who have started becoming active on social media but who harbour little knowledge on how to protect themselves from cyber-bulling and its effects. Furthermore, the research has found out that it is the concern of parents to want to know more about cyber-bulling so that they can protect their children accordingly.

Recommendations
A more in-depth research is needed to find out the prevalence of cyber-bullying and its effect on the society. There is also a need to create awareness programs on both parents and children on matters related to cyber bulling and how they can protect themselves from the vice. Parents are also expected to control their children's access on digital and social media platforms as well as establish measures to control the activities. This will go a long way towards protecting them from cyber-bullying. The government and relevant authorities also need to establish policies and strategies of helping vulnerable children in the society to curb the implications.

RELATED COURSES & ASSIGNMENT SERVICE!!


COMMENTS(0)

LEAVE A COMMENT


Captcha

 

 

Are You Looking for Digital wellbeing on Cyber-bullying Assignment Help?


Find Impeccable And Tailor-Made Unit 13 Computing Research Project - Higher National Certificate and Higher National Diploma in Computing Assignment help and Solutions Right Here With Us!

Learning Outcomes and Assessment Criteria:

Learning Outcome

Pass

Merit

Distinction

LO1 Examine appropriate research methodologies and approaches as part of the research process

P1 Produce a research proposal that clearly defines a research question or hypothesis supported by a literature review.

P2 Examine appropriate research methods and approaches to primary and secondary research.

 

M1 Evaluate different research approaches and methodology and make justifications for the choice of methods selected based on philosophical/theoretical frameworks.

D1 Critically evaluate research methodologies and processes in application to a computing research project to justify chosen research methods and analysis.

LO2 Conduct and analyse research relevant for a business research project

P3 Conduct primary and secondary research using appropriate methods for a computing research project that consider costs, access and ethical issues.

P4 Apply appropriate analytical tools, analyse research findings and data.

 

M2 Discuss merits, limitations and pitfalls of approaches to data collection and analysis.

LO3 Communicate the outcomes of a research project to identified stakeholders

P5 Communicate research outcomes in an appropriate manner for the intended audience.

M3 Coherently and logically communicate outcomes to the intended audience demonstrating how outcomes meet set research objectives.

D2 Communicate critical analysis of the outcomes and make valid, justified recommendations.

LO4 Reflect on the application of research methodologies and concepts

P6 Reflect on the effectiveness of research methods applied for meeting objectives of the computing research project.

P7 Consider alternative research methodologies and lessons learnt in view of the outcomes.

M4 Provide critical reflection and insight that results in recommended actions for improvements and future research considerations.

D3 Demonstrate reflection and engagement in the resource process leading to recommended actions for future improvement.

Acquire our services for below mentioned units like:-

  • Unit 11 Maths for Computing Assignment Help
  • Unit 10 Website Design & Development Assignment Help
  • Unit 8 Computer Systems Architecture Assignment Help
  • Unit 7 Strategic Information Systems Assignment Help
  • Unit 17 Network Security Assignment Help
  • Unit 5 Security Assignment Help
  • Unit 19 Data Structures & Algorithms Assignment Help
  • Unit 12 Data Analytics Assignment Help
  • Unit 6 Managing a Successful Computing Project Assignment Help
  • Unit 18 Discrete Maths Assignment Help