Cyber-Bullying: An Old Threat in A New Avatar
Cyber-Bullying: An Old Threat in A New Avatar
Cyber-Bullying: An Old Threat in A New Avatar
RESEARCH METHODOLOGY
Table of Contents
Abstract...........................................................................................................4
Research Objectives and Questions................................................................5
Research Hypothesis.......................................................................................7
Questionnaire..................................................................................................8
Data Sources.................................................................................................10
Books:.........................................................................................................10
Articles:......................................................................................................10
Cases:.........................................................................................................10
Summaries....................................................................................................11
Book Summary...........................................................................................11
Article Summary.........................................................................................12
Case Summary...........................................................................................13
2 | Page
Subject
Area
Topic
cyber-bullying
Abstract
Advancements in technology have resulted in the overall development
of the society and have facilitated the free interaction between humans on a
global scale. However, just as a coin has two sides, these technological
developments have a dark side. Apart from the obvious examples of nuclear
warfare and worldwide pollution which have captured global attention,
there are various growing issues that still remain unnoticed. This project
focuses on such an area, which has been a result of the developments in the
field of communication technology: Cyber-bullying, an old threat that was
limited to schools and playgrounds, which has crept its way into the digital
realm, violating the basic human rights. People being subject to bullying of
any kind often feel defenseless to repel or put up a fight against their
aggressors. Cyber-bullying augments a new dimension to this helplessness
with its ability to reach the victims 24/7.
The finger has been pointed towards web-users, parents, teachers,
policy-makers and social networking sites to bring a stop to it. That being
said, to what extent can restrictions be imposed to prevent cyber-bullying?
There has been a lot of debate on filtering technology and measures like
banning social network sites as means to stop cyber-bullying, as they seem
to violate the right to freedom of expression.
3 | Page
5 | Page
Research Hypothesis
6 | Page
Questionnaire
The Questions are posed to parents, teachers, school administrative bodies,
social networking sites, internet service providers and web-users.
1. Are you aware of what cyber bullying is?
Yes
No
7 | Page
Agree
Not sure
Agree
Disagre
Completely
Disagree
Agree
Not sure
Agree
Disagre
Completely
Disagree
Agree
Not sure
Agree
Disagre
Completely
Disagree
No
6. Do you think the schools, social networking sites and internet service
providers are justified in imposing such restrictions to curb cyberbullying?
Completely
Agree
Agree
Not sure
Disagre
Completely
Disagree
8 | Page
Agree
Not sure
Agree
Disagre
Completely
Disagree
8. Do you believe that policy-makers and the laws enacted by them are
the only factors that can make a significant positive impact on the
prevention of cyber-bullying?
Completely
Agree
Not sure
Agree
Disagre
Completely
Disagree
9. Do you think the measures adopted by the social networking sites and
internet service providers to regulate cyber-bullying are inadequate
and are in need of a better protection mechanism?
Completely
Agree
Not sure
Agree
10.
Disagre
Completely
Disagree
Agree
Not sure
Disagre
Completely
Disagree
9 | Page
Data Sources
The Researcher has relied on primary sources such as articles, books,
journals, case laws and internet sources for drafting the current research
abstracts, questionnaire and the proposed hypothesis.
Books:
Kowalski, Robin M., et al., Cyber Bullying: Bullying in the Digital Age,
(Massachusetts: Blackwell Publishing Ltd., 2008)
Articles:
Butler, Des, et al., Cyber Bullying In Schools and the Law: Is There an
Effective Means of Addressing the Power Imbalance?, 16 eLaw J. 84
(2009)
Cases:
Summaries
Book Summary
counter-part
and
delves
into
the
question
whether
the
Article Summary
the
already
proposed
legislation
criminalizing
cyber-bullying.
Additionally, the section also discusses the proposed federal legislation that
would consider the failure of the bill, and recommends federal legislation
that would successfully afford relief to adolescent victims of cyber-bullying.
Considering the dearth of literature on the subject, this article,
though limited to the US scenario, captures all the necessary aspects of
cyber-bullying particularly its impacts on the victims and the society, in a
general tone.
Case Summary
14 | P a g e