Annotated Bibliography

978 Words4 Pages

1. Research question and hypothesis

As specified, this research aims to evaluate the hypothesis that uncontrolled and excessive use of social media online had indeed served as a driving force of cyber-bullying behavior. As this research covers the perspectives of both victims and perpetrators by utilizing the interpretivist paradigm, this research will also be able to uncover if youths who excessively use social media, cyber-bullies and their victims are without a doubt interrelated in an endless loop as a by-effect of influence.

2. Available methods

To achieve accuracy and effectiveness when carrying out this research, careful consideration of the methodology is needed. To restate, carrying out this research will obtain qualitative data …show more content…

Perpetrators on the other hand, would be able to answer how excessive use of the internet and social media led them to become cyber bullies. Both victims and perpetrators would be able to rate how the excessive use of the internet and social media’s influences played a part in their involvement with cyber bullying either as a victim or a cyber bully. In addition to that, a few open ended questions could be added to allow the participants to express their …show more content…

This idea ties well with the issue of cyber bullying as the subjects would already have past experiences with cyber bullying and would likely be inclined to provide insightful information. However, Barbour had pointed out that information gathered would be based on a common experience and those who had different and more exclusive anecdotes would likely keep the information to themselves. Another issue of concern is that the perpetrators may be defensive about their experiences and may feel victimized or fear being judged by the other participants for being cyber bullies and may feel the urge to defend and justify their actions as a team. This may result in the moderator to lose control during the discussion. As mentioned by David Stewart et. Al (2007), it is crucial for the moderator to control the self-appointed leaders who may tend to dominate the

Open Document