Final Research
Final Research
In recent decades, teens’ social interactions have been impacted by their usage of
text messaging and internet access. Most teenagers today own a computer or a cell phone,
and they communicate with several people at once on a daily basis. Both positive and
negative effects result from this continual exposure to immediate communication, but the
detrimental effects of cyberbullying have drawn special attention from parents, educators,
In just over twenty years, digital technologist has burst into our life and all forms
of radically and profoundly that we can assert that the media and communicative
ecosystem was clearly transform in the last quarter of the twentieth century. From the
hegemonic model of the mass media, we have moved to a model of production and
In just over twenty years, digital technologist has burst into our life and all forms of
radically and profoundly that we can assert that the media and communicative ecosystem
was clearly transform in the last quarter of the twentieth century. From the hegemonic
model of the mass media, we have moved to a model of production and dissemination of
Today’s adolescents were born into a world where ICTs were already widespread,
and they have adapted these technologies to their daily chores in a seemingly almost
mechanical and impeccable way. (Solano, Gonzales, & Lopez, 2013) Nevertheless, the
fact that technologies become normal part of our lives has meant that bullying and other
problems gave shifted towards the virtual, so complicating possible solutions. The
increasing phenomenon occurred mainly at school, today the use of ICT means that
children have no place to “hide” from this problem. (Slonje & Perren, 2012). This and
other features, likes anonymity, have led many people to believe that this problem is
more serious than traditional bullying. There is no consensus what cyberbullying is.
with its own characteristics. (Del Rey, Elipe, & Ortega. 2012)
anonymity, the disinhibitory effect of the internet, and repetitio. (Ybarra, Espelage, &
Mitchell 2014). Studies conducted heretofore have varied in their attempts to understand
this problem and to measure it, but majority suggest that twenty to fifty (20-50) percent
of adolescence, and that the number of cyber victims will increase over time.
(Garaigordobil & Aliri 2013; Gonzales-Calatayud, Prendes Espinosa, & Lopez, 2016).
Many victims of cyberbullying also suffer more forms of harassment, and there is a
strong relationship between the two forms of bullying. (Cappadocia, Craig, & Pepler,
2013; Kowalsi & Limber, 2013; Waasdorp & Bradshaw, 2015). Furthermore, addition to
differences among victims, there are also differences among perpetrators. (Buelga, Cava,
3
Musitu, & Torralba, 2015) these differences in relation to the number of victims and
perpetrators could derive from the fact that there is no consensus as whether
where the authors refer to the need to bear repetition in mind as a key factor as with
traditional bullying. (Ang, Huan, & Florel, 2014 ; Muller, Pfetsch, &Wachs 2014; Wes
2015) while other authors believe that with ICT it is impossible to know how often a
video or web page, is viewed, copied, and passed on to the others, so a victim can be
humiliated time and again through a single act. (Beckman, Hagquist & Hellstrom, 2013;
Frisen, Berne & Lunde 2014; Kowalski & Limber, 2013, Slonje, Smith & Frisen, 2013)
Some previous studies have identified gender differences one of the risk factors of
Pearce, & Negro (2013) boys are usually more likely to engage in bullying than girls,
particularly physical bullying. For cyberbullying, in the previous studies undertaken, the
data obtained differs substantially in relation to gender. Thus, in some studies women
suffer more harassment than men according to (Lee & Shin, 2017) while in others, the
opposite is the case, with men being the most victimized. From as sociological
perspective, research shows that the cases of cyberbullying are frequently related to the
victim’s gender and/or sexuality. Bullying among girls or abused directed at girls tends to
(homophobia) and/or lack of ability (especially sporting). (Vasquez, Hurtado, & Banos,
Not all studies analyse the age and academic year. But in the recent study (Coelho
et all, 2016) it was found out that the number of cyberbullying decreases in line with the
4
academic years. However, in the previous studies it was concluded that the highest
2015)
This study aims to describe the perception and awareness about Cyberbullying among
the students of Criminal Justice Education of Tarlac State University, it sought answers to
1.1. Sex
5. Does the students aware of the formal procedures about cyberbullying incidents?
6. What intervention program should be taken for the students to be aware of resolving or
Hypothesis
5
The result of this study will be helpful as well as valuable not just for the students
but also give an input about awareness and perception of cyberbullying here at Tarlac
State University. It will enhance their knowledge with regards to the impact of
crucial effect and the possibilities to avoid victimization. And this study will benefit the
following:
To the students. The results of this study will benefit the students on how to
prevent and deal with cyberbullying. It aims to give them a partial knowledge on how
they respond or react when they encounter a person being cyberbullied. They might
discover and as well as be mindful that bullying has not just occurred physically but also
committed in cyberspace.
To the teachers. This study will have a great impact on the teachers in molding
the attitudes and behavior of the student. As we are all aware, crime rates are increasing,
6
and most teenagers are engaging with such. As a second parent, they have the authority to
To the College of Criminal Justice Education. They can use this research as
their resources if they will do research that is similar with this study. The study also
prefers to inform them and to serve as an eye-opener to the students regarding with
To the Tarlac State University. This research study will be a great contribution
to Tarlac State University. As the institution aims to highlight the value of research
contribution in today's standard of education system. This study will also contribute to the
mission of the university which aims to make Tarlac State University as a center for
To the future researchers. The study may stand as their reference to guide and
help them with regards to the student’s awareness and perception of cyberbullying. They
To the General Society. The study also prefers to inform the public and to serve
as an eye-opener to the community regarding cyberbullying that can experience not only
by the students but also by other people or one of their family members.
7
cyberbullying among the female and male students of the College of Criminal Justice
Education of Tarlac State University, School Year 2023-2024 who will represent the
population. The study would be done through the utilization of questionnaire to the
chosen students as a survey and reference. By their strategy the researchers will be able to
Literature Review
Cyberbullying
communication according to The Varjas group (2010). Like the usual physical and verbal
bullying, it is purposeful and repetitive. It has distinct characteristics such as the bullies
and victims may be anonymous, they are not connected to physical or social signs of
cyberbullying episodes, and adults are less involved because they're not into technology.
Christopher J. Cocal's 2019 study highlights how the increased accessibility of the
internet has led to a rise in harmful behaviors, particularly through what is known as
"social bullying." Cyberbullying occurs not only online, but also through mobile devices
via SMS. Any form of humiliation, threat, or oppression that uses technology qualifies as
cyberbullying.
9
For example, teenagers can easily become targets of online bullying through
intended to embarrass someone online constitute cyberbullying. This also includes using
websites to harass others, creating fake accounts, and editing or uploading offensive
videos.
Forms of Cyberbullying
Masquerading, which involves posing as someone else in order to injure the victim, is a
coerce someone into disclosing private or embarrassing information, which is then made
Additional types include "framing" (posing as the victim online), dissing (disseminating
profiles), phishing (coercing people into divulging personal information), online stalking,
such as social media, messaging apps, gaming platforms, and mobile devices. It involves
happen through social media, text messages, games, or online platforms (Abrahamson,
2022).
While bullying is a consistent issue in U.S. schools, many students still don't
Langos (2012) distinguishes between two types of cyberbullying: Direct and Indirect.
Direct cyberbullying involves sending hurtful messages directly to the victim through
private channels like email or text. Indirect cyberbullying happens when the bully posts
harmful content about the victim on public platforms like social media or blogs.
Bauman and Newman (2013) explain that while all cyberbullying involves digital
technology, the emotional impact on victims can vary depending on the method used. For
example, some perpetrators may hack the victim’s accounts and send embarrassing
11
messages, forcing the victim to explain themselves. Anonymous messages can also create
A study by Kaspersky Lab and Symbol Kids & Youth highlights both the positive
and negative aspects of technology. While it fosters connectivity and ease of information
information, post embarrassing content, or send offensive messages. Devices like phones,
computers, tablets, and social media platforms are often used for such harmful behaviors,
and the effects on victims can be severe, impacting their psychological, emotional, and
physical health.
exhibit high levels of empathy, which may lead them to turn into cyberbullies themselves.
photographs and making disparaging remarks, which affected their social, emotional, and
understanding varied based on factors like sex, grade level, and family income.
An online article by Gayle (2013) reported that Facebook is the most common platform
for cyberbullying, with 19-year-old boys being frequent targets. In the Philippines,
cyberbullying is not widely reported, though the government has attempted to address it
Varjas et al. (2010) studied the motivations behind cyberbullying, finding that anonymity
and the disinhibition effect were significant factors. Anonymity allows bullies to act
12
without fear of consequences, making them more likely to engage in behaviors they
wouldn’t in person. Jealousy or envy for their victims are also motivations for some
social media sites like Facebook and Twitter as well as on mobile applications. People
post private images to get comments, however this might result in negative remarks.
These days, social media are crucial part of everyday life, providing a platform for
Cyberbullying is a significant risk that comes with using the Internet, particularly
for younger users. The internet environment has numerous chances for harassment,
abuse, and degradation due to the quick advancement of technology. Conflicts have
become more deadly as a result of people's forced changes in interaction due to new
communication technology. Kids who don't have good parental supervision are especially
unsupervised actions have the potential to cause serious mental health problems and, in
insecurity, victims frequently suffer with mental health conditions like anxiety,
depression, and low self-esteem. Social disengagement, alterations in eating and sleeping
habits, and a loss of interest in once-enjoyed hobbies are some effects of bullying.
forums and can even have legal consequences. Circumstances such as post-traumatic
stress disorder may intensify as an effects of the psychological impacts. A large number
of victims are unwilling to ask for assistance out of concern about denounce or societal
activities, and avoiding social interactions or talking about their digital experiences are all
difficult to focus on their studies due to the emotional toll it takes (Akcil, 2018). The
psychological issues that victims frequently encounter, including as loneliness, pain, and
anxiety, can negatively impact their mental, emotional and physical well-being (Peled,
2019; Akcil, 2018). Additionally, it may result in behavioral problems, substance misuse,
inactivity, nightmares, and even anorexia. He also draws attention to concerning data,
like the fact that 7% of students engage in cyberbullying and 20% of students see it. It is
tough to protect children against cyberbullying since they hide instances from their
parents. Teenage suicides have unfortunately been connected to cyberbullying. Lacey &
technologies like smartphones, computers, and the internet. According to Belsey (2021)
and Price & Dalgleish (2010), it is defined as intentional, repetitive, and hostile behavior
according to Britannica. Both the procedure and the stimulation cause this experience,
awareness, cyberbullies frequently don't actively look for victims online but instead carry
their bullying from real-world settings, such as schools, to the virtual world. Because
harmful content, like as images and words, are permanently preserved online,
cyberbullying permits ongoing harassment and can have a serious negative effect on a
victim's reputation.
Every state has unique laws pertaining to cyberbullying. While many states
provide schools authority, others allow them to contact public officers or even suspend or
Laws are crucial to prosecute bullies and increase public awareness about
in 12 states. Although there is still work to be done, the groundwork is being established
to deal with this expanding problem. Every state has legislation requiring schools to
address bullying, and many states also specifically address cyberbullying, according to
15
stopbullying.gov. These laws give schools the authority to enforce local norms or impose
institutions, according to Rajab and Eydgahi (2019), with negligence and ignorance
students in the United States have opened malicious email attachments. Human mistake is
also responsible for 95% of data breaches, according to a 2017 PWC report.
According to Varjas et al. (2010), anonymity and the disinhibition effect are
important factors in cyberbullying. Teens are protected from the repercussions of their
activities by anonymity, which encourages conduct that they might not display in person.
In addition, some bullies may target victims out of jealousy or contempt. The 2019 Youth
sixteen percent of high school students reported having been the victim of cyberbullying
in the past year. Social media platforms including Instagram, Snapchat, and Twitter were
statements can quickly reach a large audience, and the anonymity these platforms provide
often encourages people to act in ways that are more damaging or disagreeable
As said to the study conducted by Akrim and Sulasmi (2020) among students at
concurred that sending offensive messages via social media, text messages, or emails was
the frequent type of cyberbullying. Furthermore, more than 40% of respondents says that
16
cyberbullying frequently results from sadness, retaliation, pain or rage feelings. It can
also be effect by someone's desire for self-importance at the expense of others. According
to Patchin's (2023) survey, which involved 5,000 high school students in the United
2023 included negative comments or rumors posted online, being shamed or humiliated
online, and being excluded from group chats or texts, as well as receiving repeated
Department of Education (DepEd) survey, one in three Filipino students reported being
victims of cyberbullying. Victims of cyberbullying are also more likely to suffer from
loneliness, depression, shamed and suicidal thoughts. This alarming trend highlights the
urgent need for stronger regulations and support systems especially families and friends
to protect victims from cyberbullying and mitigate its harmful effects on mental and
physical health.
Comparisons in Cyberbullying
17
advanced world, teenagers are especially affected by the social communication options
offered by the internet or any social media. Cyberbullying is far more worldly-wise and
widespread than traditional way of bullying, which usually takes place in public places
like schools and parks Cyberbullying occurs online, therefore victims are frequently
unable to flee after they leave school premises, in contrast to peer bullying, which occurs
at defined times, such as school hours. Teenagers' emotional toll is made worse by their
constant online presence because they are still susceptible to harassment at home.
hampered by their ongoing exposure to cyberbullying because they are still adjusting to
developmental changes and may act impulsively, without considering the long-term
consequences.
(2007) discovered that female students are more likely than males to experience
cyberbullying. Although it's possible that men are more likely to be bullies or bully-
victims, women are more commonly identified as the main victims of bullying on social
media. However, because social media bullying is relatively new, it can be difficult to
identify which gender is more affected because, in most cases, both genders seem to be
demonstrated that the harmful mental health effects of cyberbullying, such as depression
In the Philippines, four out of five male and forty-three percent of female minors
between the ages of 13 and 17 report having been victims of cyber violence. Verbal
percentage of cyber violence. But a sizable portion of cyber violence is also sexual
harassment, which includes sexual texts and primarily affects women. Both men and
women say they have come across improper sexual content online, but men are twice as
Philippines, 2019).
place online, through mobile phones, text messages, and other electronic devices, or
through digital platforms like social media, forums, and gaming platforms. This type of
dehumanize them.
threats, intimidating mark, or the unapproved release of explicit content. Given its
pervasiveness and scope, cyberbullying poses serious hazards to teens mental emotional
and physical health, call for both legislative action and public awareness campaigns.
establishments must continue to offer their services since learning should never stop.
which are now being employed as instruments to cause harm to countries. In order to
counter this, the Malaysian government has put in place a number of security standards,
Cyber Security Framework for the public sector. Adopting efficient online learning
techniques that are backed by a national analysis of problems and possible solutions is
(HEIs) must restrict network access in the wake of the 2022 pandemic and urge users to
exercise greater caution while protecting their privacy and personal information when
learning remotely and online. In open and distance learning (ODL) programs, technology
is being used by both teachers and students to enhance learning. Flexibility provided by
online learning platforms makes it easier for teachers and students to modify lesson plans
Willard (2006) states that there are a number of strategies that parents, students,
and schools can use to stop and deal with cyberbullying. Willard advises schools to take
the following actions: educating students, parents, teachers, and community members on
how to prevent and deal with cyberbullying; alerting parents and cyberbullies to the
repercussions of their actions; and making sure that online activities are properly
monitored. Willard also stresses the significance of establishing a plan of action for
evaluating the hazards posed by cyberbullying, particularly when there are potential risks
examining policies and procedures pertaining to internet and mobile device use. Willard
also recommends that district staff receive professional development, that parents be
taught how to recognize and stop cyberbullying, that students be taught how to deal with
cyberbullying situations, and that the efficacy of the prevention and intervention
Conceptual Framework
The conceptual framework shows the main goal of this research is to identify and
study the awareness and perception of cyberbullying to the students and to determine how
they cope this problem encountered. The study also aims to provide information on how
the student affected with the said crimes to determine the possible causes. The
cyberbullying. The paradigm illustrated bellow serve as the guideline of this study.
Common Reason of
Cyberbullying.
Criminology Students of Tarlac
State University.
Formal Procedure about
Cyberbullying Incidents.
22
Figure 1
Definition of Terms
information about someone unless they comply with certain demands, typically for
money or favors.
Child. A young human being who has not yet reached puberty or the age of
majority.
intimidate, harass, or harm others, often through the use of electronic communication
Cyber stalk. The act of repeatedly harassing or monitoring someone online, often
Cyber violence. Acts of violence or aggression that occur in the digital realm,
or intimidate others, often through social media, text messages, or online forums.
24
false or harmful statements about them, which can be either spoken (slander) or written
(libel).
for the exchange of information, communication, and access to resources and services.
Internet face. The public persona or identity that a person presents or maintains
the internet, that reach large audiences and have the potential to influence public opinion
and culture.
their consent.
Social media. Online platforms and websites that enable users to create and share
Victim. A person who suffers harm, injury, or loss as a result of an event, action,
CHAPTER 2
This chapter discussed the research method used and the procedure that the
research will employ in the conduct of the study. This section consists of the research
design, locale of the study, sampling design and participants, research instruments, data
Research Design
descriptive research design is an effective tool for gathering information about a specific
group or phenomenon. This type of research provides a detailed and accurate picture of a
specific population's or subject's characteristics and behaviors. This type of research helps
researchers gain a deeper understanding of a specific issue and provides valuable insights
28
that can inform future studies by observing and collecting data on a given topic. The
study aims to understand the awareness and perception of cyberbullying among students
by gathering the data through prepared sample questions. This methodology focuses more
on “what” and “how” of the research subject rather than the “why” of the research
subject. This study also seeks to evaluate or estimate the quantity of observations about
the attributes of the research population. It assesses the kind of responders or items that
The study was conducted at Tarlac State University, College of Criminal Justice
Education, this place was selected for knowing the efficiency of the study of awareness
The researcher used purposive sampling to select respondents that were used in
the study. A purposive sample is a non-probability sample that is selected based on the
awareness of cyberbullying at Tarlac State University and the objective of the study.
sampling techniques where the units that are investigated are based on the judgment of
the researcher.
Table 1
Research Instruments
The researcher used a survey question to gather the needed data and information in the
study since it could collect data faster than any other instrument. It also provides appropriate
The data for this research were collected using a questionnaire. The
questionnaires were from the other existing research chosen by the researcher in its
compatibility with the research problem. The survey was comprised of twenty-seven (27)
questions. In the questionnaire, Dichotomous Scale was used to determine the answer of
the respondents on the yes or no questions. After the professor validated the
questionnaire, these were then distributed to the first year to third year students at the
Data Analysis
Microsoft Excel and Statistical Treatment and Analysis was used in treating the gathered
data in the study. Frequency counts and percentages were used to describe the profile of
the respondents. Weighted mean was used to describe the respondents’ implication in
assessing the effectiveness of blended learning. To describe the weighted mean, the
Ethical Considerations
For Ethical Considerations, before the study process starts, the respondents will
undergo a briefing and the researchers will explain the purpose of the study. Through the
informed consent, the respondents are engaged to an agreement that they will be part of
the study. All the identity and personal information of the respondents will remain
31
confidential and are ensured that they will remain for academic purposes only with
respect to Republic Act No. 10173 or also known as Data Privacy Act.
CHAPTER 3
This chapter presents, analyzes, and interprets the data gathered from the
respondents. The data obtained from the respondents were shown in the Table according
Table 1 represents the Profile of the Respondents. In sex, 145 male (51.79%) and 135
female (48.21%) respectively took part in the poll and answered the questions. In total,
there are 280 respondents who participated to answer the survey. In year Level, a total of
178 First Year Students, or 63.57%, took part in the survey. There are 78 Second-Year
Students, or 27.85%, who took part and responded to the survey. Finally, 24 Third Year
How do you feel the student felt about being 218 – sad 77%
cyberbullied
145 – scared or 51.2%
frightened
135 – frustrated
47.7%
or helpless
16 – no 6.7%
Table 2 represents the description of the influence of cyber bullying to the CCJE
students at Tarlac State University. According to the results, statement 1 obtained 77% of
the respondents that they felt sad about those who experienced cyberbullying, 145
respondents with the average percentage of 51.2% are scared or frightened, 135
respondents with the average percentage of 47.7% are frustrated or helpless. Statement 2
have 80.9% of the respondents agreed that the students experiencing cyberbullying
avoiding or making excuses not to attend classes and 51 (19.1%) responds no, statement
3 have 92.2% of the respondents concur that persons subject for cyberbullying having a
hard time to concentrate and accomplish school works, statement 4, 93.3% of the
respondents approved that the students being cyberbullied suffers their academic grades
What do you think are the most common 224 - for fun 79.2%
reason of cyberbullying? 169 – hate 59.7%
134 - revenge 47.3%
Tarlac State University. According to the results, with the average percentage of 79.2%
responses from 224 students in answer to statement 1, the most frequent reason for
cyberbullying is for fun, second reason is hate with 169 respond with the average
percentage of 59.7%, and the third most common reason is revenge with 134 responds
Do you feel that students in your school are 204 – yes 72.1%
comfortable or impowered to step up and 27.9%
76 - no
inform a trusted adult about cyberbullying
that is occurring to them?
Did the student know who was cyberbullying 192 - yes 67%
them? 33%
88 - no
130 - yes
Did they tell a school staff member about the 179 - no 63.3%
cyberbullying? 36.7%
101 – yes
27.2 %
74 - no
taught how to recognize cyberbullying and threats to their online safety and 24 (9.5%%)
students respond no. The Statement 4 describes that there are 253 respondents with a
percentage of 89.4% acknowledged that teachers know how to recognize cyberbullying
issues and 27 (10.6%) respond no. Statement 5 have 255 students with a percentage of
90.1% recognized that teachers know how to intervene/help in a cyberbullying situation
in an appropriate manner and 25 (9.9%) respond no. Statement 6 explains that there are
204 students with a percentage of 72.1% agreed that the students are comfortable or
empowered to step up and inform a trusted adult about cyberbullying that is occurring to
them and 76 (27.9%) disagreed.
In response to statement 7, 192 students say "yes," with an average percentage of
62% indicating that they don't know who the perpetrator of the cyberbullying is and 88
(33%) respond no. In Statement 8, 150 students answered "no," with an average
percentage of 53% indicating that they had not been attacked by any individual and 130
(47%) responds that they are experience cyberbullying. The statement 9, had 146 student
responses, with an average proportion of 51.6% indicating that no online treats were
carried out at the University134 (48.4%) respond yes and. In statement 10, 181 students
with an average percentage of 64% said that they didn't tell their parents when they had
been the victim of cyberbullying and 99 (36%) responds yes. In answer to statement 11,
179 people said that they don't report cyberbullying to school staff members, with an
average percentage of 63.3% and 101 (36.7%) responds yes. In response to statement 12.
206 students, on average, claim that they share them with their peers about being
cyberbullied, with an average proportion of 72.8% and 74 (27.2%) responds no. With an
average percentage of 58.3%, in statement 13, 165 respondents indicated that they had
blocked the bully, with the average percentage of 38.5% 109 responds they did nothing,
and 102 respondents with the average percentage of 36% responds that they log off the
computer.
23%
65 - school
counseling
32 - suspension 11.3%
Table 5 represents the description of the formal procedure for cyber bullying of
the CCJE Tarlac State University. According to the results, statement 1 obtained 86.6%
of the respondents concur that the university have a formal procedure for policy for
investigating cyberbullying and 35 with the average percentage of 13.4% respond no,
statement 2 have 89% of the respondents agreed that the university have a formal
40
incidences and 28 respondent with the average percentage of 11% respond no. Statement
3 have 247 respondents with the average percentage of 87.3% concur that the policy
includes language about off campus behavior subject to discipline and 33 (12.7%)
responds no. Statement 4, 163 respondents with the average percentage of 57.6%
through school disciplinary action, 65 respondents with the average percentage of 23%
should be address through school counseling and 32 respondents with the average
percentage of 11.3% select suspension . Statement 5, have a 230 respondents with the
average percentage of 81.3% agreed that the university offer training to staff in the policy
CHAPTER 4
This chapter presents the summary of your study and summary of findings,
conclusions, and recommendations of this research study.
The study summarizes the advancement of technology that causes issues and
problems in cyberspace which lead to cyberbullying, the reason why this study was
conducted. The study visualizes the perception and awareness of the criminology student
at Tarlac State University to address the expedient issues regarding cyberbullying and to
provide programs that can minimize victimization in the virtual world. The researchers
specific issue and provides valuable insights that can help future studies and especially to
Summary of Results
The data on results shows that cyberbullying has a significant negative impact to
the victim. It shows that most of the students experiencing cyberbullying have difficulty
in their academic life. On the other hand, cyberbullying is committed through various
causes. Many agreed that one of the reasons for the commission of cyberbullying is just
for fun, and it happens oftentimes. Lastly, most of the respondents admit that the
university educated the students on how to utilize the cyber world properly.
Cyberbullying occurs mainly online. Teachers and students are aware of how to deal with
The limitation of the study shows the problems and challenges encountered during
Access. While a great deal of research has been done, much like the study we are
working on, some of those studies are not available to everyone. Before we can access the
significant amount of time. We're having trouble locating relevant studies and have
Cultural and other type of bias. This study excluded the staff members of those
Lack of availability and /or reliability. Some of the problem often faced when
gathering data is the fundamental issue in terms of collecting data and lack of sources or
data quality issues which result to inconsistencies and other issues and deciding what data
to collect.
Lack of prior research studies or topic Lack of research studies prior to gathering data
are too narrow which may not provide enough data for meaningful analysis. The
researcher often must work within the time frame with a limited resources in collecting
data. Measures used to collect data in terms of questionnaire, we can’t find a reliable
questionnaire that are related in our topic that’s why we adapted a questionnaire of other
Conclusions
In conclusions, most of the answers of the respondents are in favor of the fact that
cyberbullying really happens in school. Based on the results, with 224 votes (79.2%) the
most common reasons for cyberbullying are for fun, which is a common scenario that
how to combat cyberbullying in a proper manner with 237 votes (83.7%), because almost
all students today are tech users, and the availability of cyberbullying preventions online
are accessible. Aside from that, the respondents of this study are criminology students,
which cyberbullying, and cybercrimes were being discussed on their specific courses.
Students are aware of the formal procedures about the cyberbullying incidents with 230
44
votes (86.6%) some respondents express approval that the university have a formal
Recommendation
focus on building trust that could help the students to have comfortable
surroundings so that they can communicate their feelings and problems well to
their teachers.
aware on the elements on how cyberbullying were committed. Also, the teachers
will have the knowledge on how to handle cases regarding this issue. This will
corner of the university to keep everyone informed and aware of the various
1. Figure out the crucial factors why cyberbullying is on a rise. How this issue is on
the track regardless on the actions and preventive measure being implemented.
2. Aside from social media platforms and digital devices, what are the other means
in committing cyberbullying.
References
Abrahamson, A., (2022). Cyberbullying: What is it and how can you stop it? American
Psychological Association. https://www.apa.org/topics/bullying/cyberbullying-
online-social-media
Akbulut, Y., & Eristi, B. (2011). Cyberbullying and victimisation among Turkish
university students. Journal of Educational Technology, 27(7).
https://doi.org/10.14742/ajet.910
Akrim, A., & Sulasmi, E. (2020). Student perception of cyberbullying in social media.
Journal of Talent Development and Excellence, 12(1), 322–333.
46
http://publikasiilmiah.umsu.ac.id/index.php/kumpulanmakalah/article/download/
1019/926
Bauman, S., & Newman, M. L. (2013, January 1). Testing assumptions about
cyberbullying: Perceived distress associated with acts of conventional and cyber
bullying. Psychology of Violence. https://doi.org/10.1037/a0029867
Beebe, J. E. (2010). The Prevalence of Cyber Bullying Victimization and Its Relationship
to Academic, Social, and Emotional Adjustment among College Students. In
ProQuest LLC eBooks. https://eric.ed.gov/?id=ED517400
Calvete, E., Orue, I., Estevez, A., Villardon, L. and Padilla, P. (2010). Cyberbullying in
adolescents: Modalities and agressors` profile. Computers in Human Behavior,
26(5), 1128-1135.
https://www.sciencedirect.com/science/article/abs/pii/S0747563214001733
Costales, J., Asio, J.M., Albino, M., Albino, F. and Dios, E.E.R. (2022). Empathy levels
among cyberbullying victims and the potential for perpetration. Journal of
Adolescent Research, 37(4), 456-472.
https://cyberbullying.org/research/map/phillipines?utm_source=chatgpt.com
Delara, E., (2012). Why adolescents don't disclose incidents of bullying and harassment.
Journal of School Violence, 11(4), 288-305.
https://www.researchgate.net/publication/254371724_Why_Adolescents_Don
%27t_Disclose_Incidents_of_Bullying_and_Harassment
Faryadi, Q. (2011). Cyber bullying and academic performance. Online Submission, 1(1),
23-30. http://files.eric.ed.gov/fulltext/ED574784.pdf
47
Health Resources and Services Administration (HRSA). (2024, March 21). Stop Bullying
home page. StopBullying.gov. https://www.stopbullying.gov/
Kaspersky Lab. (2016, November 11). Children's dependency on the internet leads to
secrecy, over-sharing, and social withdrawal. Kaspersky.
https://www.kaspersky.com/about/press-releases/childrens-dependency-on-the-
internet-leads-to-secrecy-over-sharing-and-social-withdrawal
Lai, C. S., Mohamad, M. M., Lee, M. F., Salleh, K. M., Sulaiman, N. L., Rosli, D. I., &
Chang, W. V. S. (2017). Prevalence of Cyberbullying among Students in
Malaysian Higher Learning Institutions. Advanced Science Letters, 23(2), 781–
784. https://doi.org/10.1166/asl.2017.7492
Patchin, J. W., & Hinduja, S. (2022). Cyberbullying among Asian American youth before
and during the COVID‐19 pandemic. Journal of School Health, 93(1), 82–87.
https://doi.org/10.1111/josh.13249
Peled, Y. (2019). Cyberbullying and its influence on academic, social, and emotional
development of undergraduate students. Heliyon, 5(3), e01393.
https://doi.org/10.1016/j.heliyon.2019.e01393
Rajab, M., & Eydgahi, A. (2018). Evaluating the explanatory power of theoretical
frameworks on intention to comply with information security policies in higher
education. Computers & Security, 80, 211–223.
https://doi.org/10.1016/j.cose.2018.09.016
Ramos, J. B. M. (2023, February 14). DepEd, DOH, DSWD urged to fight student
suicide, bullying | Inquirer News. INQUIRER.net.
https://newsinfo.inquirer.net/1729405/deped-doh-dswd-urged-to-fight-student-
suicide-bullying
Selkie, E. M., Kota, R., Chan, Y., & Moreno, M. (2015). Cyberbullying, Depression, and
Problem Alcohol Use in female college Students: a multisite study.
Cyberpsychology Behavior and Social Networking, 18(2), 79–86.
https://doi.org/10.1089/cyber.2014.0371
UNICEF. (2019). Online bullying remains prevalent in the Philippines & other countries.
UNICEF. https://www.unicef.org/philippines/press-releases/online-bullying-
remains-prevalent-philippines-other-countries
Varjas, K., Henning, M., & Meyers, J. Parris, L., & Cutts, H. (2010). High school
students' perceptions of motivations for cyberbullying. Journal of School Violence, 9(4),
323–338. https://pmc.ncbi.nlm.nih.gov/articles/PMC2941365/
Varjas, K., Talley, J., Meyers, J., Parris, L., & Cutts, H. (2010). High school students’
perceptions of motivations for cyberbullying: an exploratory study. PubMed.
https://pubmed.ncbi.nlm.nih.gov/20882148
Watts, L., Velasquez, B., Wagner, J., & Behrens, P. (2017). Cyberbullying in higher
education: A literature review.
https://www.researchgate.net/publication/312336055_Cyberbullying_in_higher_e
ducation_A_literature_review
Ybarra, M. L., Diener-West, M., & Leaf, P. J. (2007). Examining the overlap in internet
harassment and school bullying: Implications for school intervention. Journal of
Adolescent Health, 41(6), S42–S50.
https://doi.org/10.1016/j.jadohealth.2007.09.004
Appendix A
50
Appendix C
Research Instrument
52
Name (Optional):
Sex:
Instructions: Please answer the following questions. Put a check mark on the box
indicating your answer.
1. Student’s Year Level
First Year
Second Year
Third Year
2. How many times have you been cyberbullied?
0 times
1-5 times
5-10 times
More than 10 times
3. Please evaluate the following:
3a. Cyberbullying is on a rise?
Yes
No
3b. Incidences are most often reported by? (Check all that apply)
Friend of victim
Student/Peer
Parent
Bully
School
Friend's House
Community Location
3d. Cyberbullying most often occurs with? (Check all that apply)
Computers
Mobile Phones
PDA (Personal Digital Assistant)
53
3e. Cyberbullying occurs most often via? (Check all that apply)
Instant Messaging (messenger)
E-mails
Blogs
5. If students take a photo of someone, do they need that person’s permission to post it?
Yes
No
6. Students are taught acceptable computer and Internet use during the school year?
Yes
No
7. Students are taught about how to recognize cyberbullying and threats to their online safety?
Yes
No
8. Students are taught how to respond to cyberbullying in an appropriate manner?
Yes
No
9. Teachers know how to recognize cyberbullying issues?
Yes
No
10. Teachers know how to intervene/ help in a cyberbullying situation in an appropriate manner?
Yes
No
11. Does your university have a formal procedure or policy for investigating cyberbullying?
Yes
No
12. Does your university have a formal procedure or policy with a continuum/ range of
consequences for cyberbullying incidences?
Yes
No
13. Your cyberbullying policy includes language about off-campus behaviors subject to discipline?
Yes
No
14. Cyberbullying on school campus should be addressed through? (Check all that apply)
School Disciplinary Action
Suspension
Expulsion
School Counseling Sessions
54
Scared or frightened
Frustrated/helpless.
Embarrassed
Did not bother me.
20. When students experience cyberbullying, do they seem to want to stay away/avoid
and make excuses not to go to university?
Yes
No
21. When students experience cyberbullying, do they find it harder to concentrate on
schoolwork?
Yes
No
22. When students experience cyberbullying, do their academic grades suffer?
Yes
No
23. What do you think are the most common reasons for cyberbullying? (Check all that
apply)
Revenge
They deserved it
For fun
Power
Hate
24. How often do you think cyberbullying occurs with school computer use?
Frequently
Occasionally
Never
25. How often do you think cyberbullying occurs through cell phone use during school
hours?
Frequently
Occasionally
Never
26. Do you feel that students in your school are comfortable or empowered to step up
and inform a trusted adult about cyberbullying that is occurring to them?
Yes
No
27. Does your university offer training to staff in that policy and procedure?
56
Yes No
BIONOTE
entitled “Glampro: Unleashing Personal Growth” held on March 26, 2024. She also
seminar entitled “Glampro: Unleashing Personal Growth” held on March 26, 2024. He
26, 2024. She also attended a seminar entitled “Decoding Forensic Science Techniques
Incoming Fourth Year College Student. She is currently taking Bachelor of Science in
entitled “Glampro: Unleashing Personal Growth” held on March 26, 20224. She also
on March 26, 2024. She also attended a seminar entitled “Decoding Forensic Science