SlideShare a Scribd company logo
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 673
Role of Information Technology in Social Society and Cyber
Bullying as a Contemporary Issue in the Society amongst
Teenagers
Ammad Khan
Ph.D. Scholar
Senior Software Engineer, Salesforce, Indianapolis, Indiana, USA
Master of Science in Computer Science
College of Computer Science, Maharishi University of Management, Iowa, USA
Email: akhan@mum.edu
----------------------------------------************************----------------------------------
Abstract:
Modern day times as mediated by information technology have eased the way people interact, especially
as mediated by computers, mobile gadgets and through telecommunications. Video games is great
educational potential, and same popular in every age of group(Suhaib, 2018), Also, through the rise of
social interactivity through social media, the world has been reduced to a global village and in the same
note accelerated the freedom of expression. Nevertheless, a myriad of societal issues has developed, arisen
by this adage of information technology. As a result, this paper would like to succinctly preview cyber
bullying as one can recount from this adage of information technology. To highlight this, this paper will
take account of previous cases as reported in the media and analyse its impact. Also, through the various
postulated methodologies recommend an apt manner through which authorities and the society at large can
deal with this menace.
Keywords —Cyberbullying, Social media, Virtual networks, Contemporary, Teenager, E-learning,
Mixed-method
----------------------------------------************************----------------------------------
I. INTRODUCTION
According to D'Antona, 2010, the misuse of
interactive and digital technologies or the internet,
where dominant groups abuse authority by
intimidating less central groups could be considered
as cyberbullying. Many articulate cyberbullying as
a by-product of the capitalist instinct as it prevails
in the society as a form of advocacy for personal
progression above any other goals. As a result,
children from a tender age have always been
encouraged to be the best over any other people.
Gathering from these, instincts push them to
achieve these socially advocated results, no matter
the limits that they have to push (Hay, Meldrum,
&Mann, 2010). Some may result in overriding these
instincts in most instances as a means of personal
survival by dominating others and in other instances
pushing others out of the competition by
intimidating them.Racing Games are most popular
in teenagers, the present study interdicts access
throughout mobiles mobile-phones or tablets to
control and comparing steering control of racing
game(Suhaib, 2018).
In the modern adage, through communication
devices and the internet, a fertile ground has been
borne that has allowed for bullying. Additionally,
given that the internet affords anonymity, this has
provided a rise in instances of cyberbullying. For
the most part of it, cyberbullying has had negative
RESEARCH ARTICLE OPEN ACCESS
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 674
impacts, as gauged on a societal level, on those who
have been victims of the same as previewed below.
II. RELATED WORK
A survey in the year 2017 found that almost 59% of
teenagers in the United States have experienced
bullying online while another 42% of Instagram
teenage users have also reported to experiencing
bullying (Juvonen & Gross, 2008). Cyberbullying
may take the form of an argument soaring where
people take sides in an argument and join in arms to
insult one party. Another instance of cyberbullying
is where a bully may choose to humiliate a victim
by sending hurtful emails, images or text messages
to a victim. Denigration is also another
cyberbullying where a bully chooses to tarnish a
victim by hurling attacks through the spread of false
humiliating information. Finally, there is also an
instance where a bully may assume the identity of
another individual with intent of causing malicious
intent to a victim with the credentials that the bully
poses in their impersonated mask. Below is a table
highlighting social media consummate in the
United States of America by teenagers.
Out of studies conducted with regards to the
effects of cyberbullying, bullying has been shown
to heavily contribute to emotional damage to their
victims, a factor that has foreseen extreme cases of
suicides by these victims foreseeing that most of
them have found it difficult to admit to these effects.
In a study conducted by the Cyberbullying
Research Centre, a sample size of about 468
students were gathered. Out of these students 39%
admitted to feeling frustrated, 36% admitted to
feeling, and 25% admitted to feeling sad about
having being bullied. Robert Agnew, a sociologist,
hypothesized the Great Strain Theory which
postulated that victims of instances of bullying had
been found to develop problematic emotions which
further cause deviant behaviour(Hay, Meldrum,
&Mann, 2010). Additionally, D'Antona, 2010, have
reported the victims undergoing a vicious cycle
which has resulted in the emergent antisocial
behaviour in the victims, as they try to find an
outlet for their frustration and anger.
In a similar context, as studied by the Office
of Juvenile Justice and Delinquency Prevention,
bullying also has a toll on the bullies. From the
report, about 60% of teenage males with tendencies
of bullying were convicted with a felon at least
once in their adult life; this is in contrast to 23% of
those convicted but did not bully (Smalley, Warren,
& Barefoot, 2016). Further studies as reported by
Smalley, Warren, & Barefoot, 2016 show that
bullies have been reported to use it as a mechanism
of coping which has equally lead to the
development of a vicious cycle for both the bully
and the victim. Borne out of the above, it is evident
that bullying has a substantial negative impact on
the society, the effects of this have been long-
lasting, and in some cases individuals have felt its
repercussions throughout in their life.
III. METHODOLOGY
The effects of cyberbullying in society were
studied amongst students in a school. Using various
sources of evidence, this research synthesized case
studies to study the topic under scope. The primary
advantage of using a case study is in the providence
of comprehensive and rich information concerning
the phenomenon under scope. Additionally, it
provides a holistic understanding of how different
synthesized elements within the case study interact,
and in the same context how they affect each other
(Elamé & Boaretto, 2013). A mixed-method
approach was utilized in this context in aiding this
research to utilize various methods of analysing and
collecting data from qualitative and a quantitative
approach of this single research study.
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 675
Table 01: Technology Usage in Teenagers
IV. RESULTS
In total, the participants involved were 67 and out
of this number about 84% participants confirmed to
owning a cell phone and also had access to the
internet, the rest surfed the internet through their
relatives or friends cell phones. The majority of the
participants, about 80% confirmed that their
favorited site was Facebook and they accessed it
regularly. Also, about 84% if the participants
confirmed to using social media almost daily
From the study, participants affirmed having
experienced some of the highlighted forms of
cyberbullying frequently. Also, out of the
participants, about 68% confirmed to have been
victims of harassment, mainly sexually through
sexual videos or pictures posted on their social
media pages, 66% experienced false information
about them having been spread about them, another
65% confirmed to have been victims of hostile text
messages, 61% reported being victims of harmful
messages being propagated based on their
background, 60% were victims of harmful name-
calling, and another 55% have been victims of
name-calling.
Out of the above, many of the contributors affirmed
to having been affected negatively in their
emotional well-being by the instances reported
above. Out of these individuals, 21% of the
individuals confirmed to lacking in self-confidence
due to cyberbullying, 35% were feeling depressed
by these instances, 23% had suicidal ideations, and
another 6% were feeling frustrated.
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 676
From the results borne above, the results of the
study show an alarming rate on the impacts of
cyberbullying to teenagers, mainly those who are
school-going. As a result, this may have a negative
impact on their academic performance, with a
likelihood of some skipping school and others
quitting school. Additionally, it may have a
negative impact on the students’ grades, with a
majority likely to drop their marks and some even
being forced to repeat a grade. However, the most
problematic effect is the suicidal ideation by the
participants and the likelihood of some resulting in
self-harm.
V. METHODOLOGY
The results of the above study show that the
effects highlighted may be experienced by other
students elsewhere in the world. Also, it shows that
even though students have access to cyber
technologies, they have not been equipped well
enough to prevent and cope with its associated
adverse effects. As a result, this study recommends
that there is a need for schools to appoint a
counselling teacher and the consequent
establishment of anti-cyberbullying policies within
schools (Starrett & Fredrickson, 2015). Adoption of
these policies, however, should be implemented
with cooperation between teachers, learners,
stakeholders, and parents. Moreover, seeing that
universities and governments seeks to expand on
cyber technology and e-learning, there is also an
urgent need to include cyber protection and cyber
safety strategies in the curriculum and in e-learning
training ((Juvonen & Gross, 2008). Furthermore
studies on sexual and gender cyberbullying should
further be ratified and enhanced.
REFERENCES
[1] Browne, K., & Nash, C. J. (2016). Queer Methods and
Methodologies. Queer Methods and Methodologies, 1-24.
doi:10.4324/9781315603223-1
[2] Suhaib, Muhammad, A Study of Playing Video Game on Computer
with Keyboard Control (September 30, 2018). International Research
Journal of Engineering and Technology (IRJET) Volume 5, Issue 10
(Oct 2018). Available at SSRN: https://ssrn.com/abstract=3409536 or
http://dx.doi.org/10.2139/ssrn.3409536
[3] D'Antona. (2010). Sexting, Texting, Cyberbullying, and Keeping
Youth Safe Online. Journal of Social Sciences, 6(4), 523-528.
doi:10.3844/jssp.2010.523.528
[4] Elamé, E., & Boaretto, A. (2013). Recommendations for the Struggle
Against Discriminatory Bullying. Discriminatory Bullying, 371-388.
doi:10.1007/978-88-470-5235-2_21
[5] Hay, C., Meldrum, R., & Mann, K. (2010). Traditional Bullying, Cyber
Bullying, and Deviance: A General Strain Theory Approach. Journal
of Contemporary Criminal Justice, 26(2), 130-147.
doi:10.1177/1043986209359557
[6] Juvonen, J., & Gross, E. F. (2008). Extending the School Grounds?-
Bullying Experiences in Cyberspace. Journal of School Health, 78(9),
496-505. doi:10.1111/j.1746-1561.2008.00335.x
[7] Suhaib, Muhammad, Tilt or Touch? An Evaluation of Steering Control
of Racing Game on Tablet or Smartphone (September 1, 2018).
International Journal of Innovative Research in Computer and
Communication Engineering, Vol. 6, Issue 9, September 2018.
Available at SSRN: https://ssrn.com/abstract=3409575 or
http://dx.doi.org/10.2139/ssrn.3409575
[8] Starrett, T. M., & Fredrickson, R. (2015). Keeping our Students Safe:
Teacher’s Responsibility. Advances in Social Sciences Research
Journal, 2(6). doi:10.14738/assrj.26.1211
[9] Smalley, K. B., Warren, J. C., & Barefoot, K. N. (2016). Connection
Between Experiences of Bullying and Risky Behaviors in Middle and
High School Students. School Mental Health, 9(1), 87-96.
doi:10.1007/s12310-016-9194-z
[10] Suhaib, Muhammad, A Study of the Learning Curve of the Japanese
Keyboard on Smartphone (September 25, 2018). International Journal
of Scientific Research & Engineering Trends, Volume 4, Issue 5, Sept-
Oct-2018. Available at SSRN: https://ssrn.com/abstract=3409538 or
http://dx.doi.org/10.2139/ssrn.3409538

More Related Content

What's hot

2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_1107112012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711Dustianne North
 
2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_textingDustianne North
 
2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrainsDustianne North
 
Adolescent and Young Adult Social Media Use: Using For a Purpose, but Resulti...
Adolescent and Young Adult Social Media Use: Using For a Purpose, but Resulti...Adolescent and Young Adult Social Media Use: Using For a Purpose, but Resulti...
Adolescent and Young Adult Social Media Use: Using For a Purpose, but Resulti...
samhauck
 
Top 14 booklet 2019
Top 14 booklet 2019Top 14 booklet 2019
Top 14 booklet 2019
TaylorThelander
 
Top 14 booklet 2019
Top 14 booklet 2019Top 14 booklet 2019
Top 14 booklet 2019
TaylorThelander
 
Top 14 booklet 2019
Top 14 booklet 2019 Top 14 booklet 2019
Top 14 booklet 2019
TaylorThelander
 
Social Media Paper
Social Media Paper Social Media Paper
Social Media Paper
handleyrr
 
Inormation Literacy Paper
Inormation Literacy PaperInormation Literacy Paper
Inormation Literacy Paper
Seneca Washburn
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
ijtsrd
 
Teens and Sexting
Teens and SextingTeens and Sexting
Covid bullying wp2021-8_final
Covid bullying wp2021-8_finalCovid bullying wp2021-8_final
Covid bullying wp2021-8_final
AlexNegru3
 
PSYCH610researchproposalweek8TamaraHarms
PSYCH610researchproposalweek8TamaraHarmsPSYCH610researchproposalweek8TamaraHarms
PSYCH610researchproposalweek8TamaraHarmsTamara Harms
 
Citit 7839 nou
Citit 7839 nouCitit 7839 nou
Citit 7839 nou
AlexNegru3
 
Vaillancourt2021 articol
Vaillancourt2021 articolVaillancourt2021 articol
Vaillancourt2021 articol
AlexNegru3
 
How socialmediaishurtingsociety
How socialmediaishurtingsocietyHow socialmediaishurtingsociety
How socialmediaishurtingsociety
mcghee27
 
Young Adults And On Line Privacy
Young Adults And On Line PrivacyYoung Adults And On Line Privacy
Young Adults And On Line Privacy
Recrue
 
Social Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglySocial Media: the good, the bad and the ugly
Social Media: the good, the bad and the ugly
Josh Cowls
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Trost, Micki
 

What's hot (20)

2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_1107112012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
 
2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting
 
2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains
 
Adolescent and Young Adult Social Media Use: Using For a Purpose, but Resulti...
Adolescent and Young Adult Social Media Use: Using For a Purpose, but Resulti...Adolescent and Young Adult Social Media Use: Using For a Purpose, but Resulti...
Adolescent and Young Adult Social Media Use: Using For a Purpose, but Resulti...
 
Top 14 booklet 2019
Top 14 booklet 2019Top 14 booklet 2019
Top 14 booklet 2019
 
Top 14 booklet 2019
Top 14 booklet 2019Top 14 booklet 2019
Top 14 booklet 2019
 
Top 14 booklet 2019
Top 14 booklet 2019 Top 14 booklet 2019
Top 14 booklet 2019
 
Social Media Paper
Social Media Paper Social Media Paper
Social Media Paper
 
Inormation Literacy Paper
Inormation Literacy PaperInormation Literacy Paper
Inormation Literacy Paper
 
Connecting and protecting
Connecting and protectingConnecting and protecting
Connecting and protecting
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
Teens and Sexting
Teens and SextingTeens and Sexting
Teens and Sexting
 
Covid bullying wp2021-8_final
Covid bullying wp2021-8_finalCovid bullying wp2021-8_final
Covid bullying wp2021-8_final
 
PSYCH610researchproposalweek8TamaraHarms
PSYCH610researchproposalweek8TamaraHarmsPSYCH610researchproposalweek8TamaraHarms
PSYCH610researchproposalweek8TamaraHarms
 
Citit 7839 nou
Citit 7839 nouCitit 7839 nou
Citit 7839 nou
 
Vaillancourt2021 articol
Vaillancourt2021 articolVaillancourt2021 articol
Vaillancourt2021 articol
 
How socialmediaishurtingsociety
How socialmediaishurtingsocietyHow socialmediaishurtingsociety
How socialmediaishurtingsociety
 
Young Adults And On Line Privacy
Young Adults And On Line PrivacyYoung Adults And On Line Privacy
Young Adults And On Line Privacy
 
Social Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglySocial Media: the good, the bad and the ugly
Social Media: the good, the bad and the ugly
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
 

Similar to Role of Information Technology in Social Society Cyber Bullying as a Contemporary Issue in the Society amongst Teenagers

International Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxInternational Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docx
LaticiaGrissomzz
 
Cyberbullypowerpoint
CyberbullypowerpointCyberbullypowerpoint
Cyberbullypowerpointtorremalku
 
CYBERBULLYING EXPERIENCES OF UNIVERSITY OF MINDANAO CRIMINOLOGY STUDENTS
CYBERBULLYING EXPERIENCES OF UNIVERSITY OF MINDANAO CRIMINOLOGY STUDENTSCYBERBULLYING EXPERIENCES OF UNIVERSITY OF MINDANAO CRIMINOLOGY STUDENTS
CYBERBULLYING EXPERIENCES OF UNIVERSITY OF MINDANAO CRIMINOLOGY STUDENTS
AJHSSR Journal
 
Impact of social media on teenagers
Impact of social media on  teenagersImpact of social media on  teenagers
Impact of social media on teenagers
Miss Perfect
 
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
VannaSchrader3
 
Academic writing assi.1.docx
Academic writing assi.1.docxAcademic writing assi.1.docx
Academic writing assi.1.docx
maryanneGatumbi
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
MohinderSingh78
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned out
Mohamed Sedky
 
P36132142
P36132142P36132142
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1bmcdade
 
Running head FINAL PAPER .docx
 Running head FINAL PAPER                                      .docx Running head FINAL PAPER                                      .docx
Running head FINAL PAPER .docx
MARRY7
 
Social media hurting
Social media hurtingSocial media hurting
Social media hurting
clay153
 
Influence of cyberbullying behaviour on
Influence of cyberbullying behaviour onInfluence of cyberbullying behaviour on
Influence of cyberbullying behaviour on
MohinderSingh78
 
Il poster
Il posterIl poster
Il poster
fareezsham
 
Infographic Poster Report
Infographic Poster ReportInfographic Poster Report
Infographic Poster Report
Farah Sham
 
Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Megan Bednar
 
Cyber Bullying.docx
Cyber Bullying.docxCyber Bullying.docx
Cyber Bullying.docx
write31
 

Similar to Role of Information Technology in Social Society Cyber Bullying as a Contemporary Issue in the Society amongst Teenagers (20)

International Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxInternational Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docx
 
Sm
SmSm
Sm
 
Sm
SmSm
Sm
 
Cyberbullypowerpoint
CyberbullypowerpointCyberbullypowerpoint
Cyberbullypowerpoint
 
CYBERBULLYING EXPERIENCES OF UNIVERSITY OF MINDANAO CRIMINOLOGY STUDENTS
CYBERBULLYING EXPERIENCES OF UNIVERSITY OF MINDANAO CRIMINOLOGY STUDENTSCYBERBULLYING EXPERIENCES OF UNIVERSITY OF MINDANAO CRIMINOLOGY STUDENTS
CYBERBULLYING EXPERIENCES OF UNIVERSITY OF MINDANAO CRIMINOLOGY STUDENTS
 
Impact of social media on teenagers
Impact of social media on  teenagersImpact of social media on  teenagers
Impact of social media on teenagers
 
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
 
Academic writing assi.1.docx
Academic writing assi.1.docxAcademic writing assi.1.docx
Academic writing assi.1.docx
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...Prevalence and influence of cyberbullying behaviour on self esteem and body i...
Prevalence and influence of cyberbullying behaviour on self esteem and body i...
 
Plugged in and tuned out
Plugged in and tuned outPlugged in and tuned out
Plugged in and tuned out
 
P36132142
P36132142P36132142
P36132142
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
 
Running head FINAL PAPER .docx
 Running head FINAL PAPER                                      .docx Running head FINAL PAPER                                      .docx
Running head FINAL PAPER .docx
 
Social media hurting
Social media hurtingSocial media hurting
Social media hurting
 
Influence of cyberbullying behaviour on
Influence of cyberbullying behaviour onInfluence of cyberbullying behaviour on
Influence of cyberbullying behaviour on
 
Il poster
Il posterIl poster
Il poster
 
Infographic Poster Report
Infographic Poster ReportInfographic Poster Report
Infographic Poster Report
 
Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Capstone Project Final 7-19-13
Capstone Project Final 7-19-13
 
Cyber Bullying.docx
Cyber Bullying.docxCyber Bullying.docx
Cyber Bullying.docx
 

More from IJSRED

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
IJSRED
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
IJSRED
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
IJSRED
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
IJSRED
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
IJSRED
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
IJSRED
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
IJSRED
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
IJSRED
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
IJSRED
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
IJSRED
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
IJSRED
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
IJSRED
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
IJSRED
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
IJSRED
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
IJSRED
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
IJSRED
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
IJSRED
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
IJSRED
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
IJSRED
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
IJSRED
 

More from IJSRED (20)

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
 

Recently uploaded

DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
itech2017
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 

Recently uploaded (20)

DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 

Role of Information Technology in Social Society Cyber Bullying as a Contemporary Issue in the Society amongst Teenagers

  • 1. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 673 Role of Information Technology in Social Society and Cyber Bullying as a Contemporary Issue in the Society amongst Teenagers Ammad Khan Ph.D. Scholar Senior Software Engineer, Salesforce, Indianapolis, Indiana, USA Master of Science in Computer Science College of Computer Science, Maharishi University of Management, Iowa, USA Email: akhan@mum.edu ----------------------------------------************************---------------------------------- Abstract: Modern day times as mediated by information technology have eased the way people interact, especially as mediated by computers, mobile gadgets and through telecommunications. Video games is great educational potential, and same popular in every age of group(Suhaib, 2018), Also, through the rise of social interactivity through social media, the world has been reduced to a global village and in the same note accelerated the freedom of expression. Nevertheless, a myriad of societal issues has developed, arisen by this adage of information technology. As a result, this paper would like to succinctly preview cyber bullying as one can recount from this adage of information technology. To highlight this, this paper will take account of previous cases as reported in the media and analyse its impact. Also, through the various postulated methodologies recommend an apt manner through which authorities and the society at large can deal with this menace. Keywords —Cyberbullying, Social media, Virtual networks, Contemporary, Teenager, E-learning, Mixed-method ----------------------------------------************************---------------------------------- I. INTRODUCTION According to D'Antona, 2010, the misuse of interactive and digital technologies or the internet, where dominant groups abuse authority by intimidating less central groups could be considered as cyberbullying. Many articulate cyberbullying as a by-product of the capitalist instinct as it prevails in the society as a form of advocacy for personal progression above any other goals. As a result, children from a tender age have always been encouraged to be the best over any other people. Gathering from these, instincts push them to achieve these socially advocated results, no matter the limits that they have to push (Hay, Meldrum, &Mann, 2010). Some may result in overriding these instincts in most instances as a means of personal survival by dominating others and in other instances pushing others out of the competition by intimidating them.Racing Games are most popular in teenagers, the present study interdicts access throughout mobiles mobile-phones or tablets to control and comparing steering control of racing game(Suhaib, 2018). In the modern adage, through communication devices and the internet, a fertile ground has been borne that has allowed for bullying. Additionally, given that the internet affords anonymity, this has provided a rise in instances of cyberbullying. For the most part of it, cyberbullying has had negative RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 674 impacts, as gauged on a societal level, on those who have been victims of the same as previewed below. II. RELATED WORK A survey in the year 2017 found that almost 59% of teenagers in the United States have experienced bullying online while another 42% of Instagram teenage users have also reported to experiencing bullying (Juvonen & Gross, 2008). Cyberbullying may take the form of an argument soaring where people take sides in an argument and join in arms to insult one party. Another instance of cyberbullying is where a bully may choose to humiliate a victim by sending hurtful emails, images or text messages to a victim. Denigration is also another cyberbullying where a bully chooses to tarnish a victim by hurling attacks through the spread of false humiliating information. Finally, there is also an instance where a bully may assume the identity of another individual with intent of causing malicious intent to a victim with the credentials that the bully poses in their impersonated mask. Below is a table highlighting social media consummate in the United States of America by teenagers. Out of studies conducted with regards to the effects of cyberbullying, bullying has been shown to heavily contribute to emotional damage to their victims, a factor that has foreseen extreme cases of suicides by these victims foreseeing that most of them have found it difficult to admit to these effects. In a study conducted by the Cyberbullying Research Centre, a sample size of about 468 students were gathered. Out of these students 39% admitted to feeling frustrated, 36% admitted to feeling, and 25% admitted to feeling sad about having being bullied. Robert Agnew, a sociologist, hypothesized the Great Strain Theory which postulated that victims of instances of bullying had been found to develop problematic emotions which further cause deviant behaviour(Hay, Meldrum, &Mann, 2010). Additionally, D'Antona, 2010, have reported the victims undergoing a vicious cycle which has resulted in the emergent antisocial behaviour in the victims, as they try to find an outlet for their frustration and anger. In a similar context, as studied by the Office of Juvenile Justice and Delinquency Prevention, bullying also has a toll on the bullies. From the report, about 60% of teenage males with tendencies of bullying were convicted with a felon at least once in their adult life; this is in contrast to 23% of those convicted but did not bully (Smalley, Warren, & Barefoot, 2016). Further studies as reported by Smalley, Warren, & Barefoot, 2016 show that bullies have been reported to use it as a mechanism of coping which has equally lead to the development of a vicious cycle for both the bully and the victim. Borne out of the above, it is evident that bullying has a substantial negative impact on the society, the effects of this have been long- lasting, and in some cases individuals have felt its repercussions throughout in their life. III. METHODOLOGY The effects of cyberbullying in society were studied amongst students in a school. Using various sources of evidence, this research synthesized case studies to study the topic under scope. The primary advantage of using a case study is in the providence of comprehensive and rich information concerning the phenomenon under scope. Additionally, it provides a holistic understanding of how different synthesized elements within the case study interact, and in the same context how they affect each other (Elamé & Boaretto, 2013). A mixed-method approach was utilized in this context in aiding this research to utilize various methods of analysing and collecting data from qualitative and a quantitative approach of this single research study.
  • 3. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 675 Table 01: Technology Usage in Teenagers IV. RESULTS In total, the participants involved were 67 and out of this number about 84% participants confirmed to owning a cell phone and also had access to the internet, the rest surfed the internet through their relatives or friends cell phones. The majority of the participants, about 80% confirmed that their favorited site was Facebook and they accessed it regularly. Also, about 84% if the participants confirmed to using social media almost daily From the study, participants affirmed having experienced some of the highlighted forms of cyberbullying frequently. Also, out of the participants, about 68% confirmed to have been victims of harassment, mainly sexually through sexual videos or pictures posted on their social media pages, 66% experienced false information about them having been spread about them, another 65% confirmed to have been victims of hostile text messages, 61% reported being victims of harmful messages being propagated based on their background, 60% were victims of harmful name- calling, and another 55% have been victims of name-calling. Out of the above, many of the contributors affirmed to having been affected negatively in their emotional well-being by the instances reported above. Out of these individuals, 21% of the individuals confirmed to lacking in self-confidence due to cyberbullying, 35% were feeling depressed by these instances, 23% had suicidal ideations, and another 6% were feeling frustrated.
  • 4. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 5, Sep – Oct 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 676 From the results borne above, the results of the study show an alarming rate on the impacts of cyberbullying to teenagers, mainly those who are school-going. As a result, this may have a negative impact on their academic performance, with a likelihood of some skipping school and others quitting school. Additionally, it may have a negative impact on the students’ grades, with a majority likely to drop their marks and some even being forced to repeat a grade. However, the most problematic effect is the suicidal ideation by the participants and the likelihood of some resulting in self-harm. V. METHODOLOGY The results of the above study show that the effects highlighted may be experienced by other students elsewhere in the world. Also, it shows that even though students have access to cyber technologies, they have not been equipped well enough to prevent and cope with its associated adverse effects. As a result, this study recommends that there is a need for schools to appoint a counselling teacher and the consequent establishment of anti-cyberbullying policies within schools (Starrett & Fredrickson, 2015). Adoption of these policies, however, should be implemented with cooperation between teachers, learners, stakeholders, and parents. Moreover, seeing that universities and governments seeks to expand on cyber technology and e-learning, there is also an urgent need to include cyber protection and cyber safety strategies in the curriculum and in e-learning training ((Juvonen & Gross, 2008). Furthermore studies on sexual and gender cyberbullying should further be ratified and enhanced. REFERENCES [1] Browne, K., & Nash, C. J. (2016). Queer Methods and Methodologies. Queer Methods and Methodologies, 1-24. doi:10.4324/9781315603223-1 [2] Suhaib, Muhammad, A Study of Playing Video Game on Computer with Keyboard Control (September 30, 2018). International Research Journal of Engineering and Technology (IRJET) Volume 5, Issue 10 (Oct 2018). Available at SSRN: https://ssrn.com/abstract=3409536 or http://dx.doi.org/10.2139/ssrn.3409536 [3] D'Antona. (2010). Sexting, Texting, Cyberbullying, and Keeping Youth Safe Online. Journal of Social Sciences, 6(4), 523-528. doi:10.3844/jssp.2010.523.528 [4] Elamé, E., & Boaretto, A. (2013). Recommendations for the Struggle Against Discriminatory Bullying. Discriminatory Bullying, 371-388. doi:10.1007/978-88-470-5235-2_21 [5] Hay, C., Meldrum, R., & Mann, K. (2010). Traditional Bullying, Cyber Bullying, and Deviance: A General Strain Theory Approach. Journal of Contemporary Criminal Justice, 26(2), 130-147. doi:10.1177/1043986209359557 [6] Juvonen, J., & Gross, E. F. (2008). Extending the School Grounds?- Bullying Experiences in Cyberspace. Journal of School Health, 78(9), 496-505. doi:10.1111/j.1746-1561.2008.00335.x [7] Suhaib, Muhammad, Tilt or Touch? An Evaluation of Steering Control of Racing Game on Tablet or Smartphone (September 1, 2018). International Journal of Innovative Research in Computer and Communication Engineering, Vol. 6, Issue 9, September 2018. Available at SSRN: https://ssrn.com/abstract=3409575 or http://dx.doi.org/10.2139/ssrn.3409575 [8] Starrett, T. M., & Fredrickson, R. (2015). Keeping our Students Safe: Teacher’s Responsibility. Advances in Social Sciences Research Journal, 2(6). doi:10.14738/assrj.26.1211 [9] Smalley, K. B., Warren, J. C., & Barefoot, K. N. (2016). Connection Between Experiences of Bullying and Risky Behaviors in Middle and High School Students. School Mental Health, 9(1), 87-96. doi:10.1007/s12310-016-9194-z [10] Suhaib, Muhammad, A Study of the Learning Curve of the Japanese Keyboard on Smartphone (September 25, 2018). International Journal of Scientific Research & Engineering Trends, Volume 4, Issue 5, Sept- Oct-2018. Available at SSRN: https://ssrn.com/abstract=3409538 or http://dx.doi.org/10.2139/ssrn.3409538