GET ASSURED A++ GRADE IN EACH UNIT 13 COMPUTING RESEARCH PROJECT ASSIGNMENT ORDER - ORDER FOR ORIGINALLY WRITTEN SOLUTIONS!
Unit 13 Computing Research Project Assignment
Learning Outcomes -
- Examine appropriate research methodologies & approaches as part of the research process.
- Conduct & analyse research relevant to a computing research project.
- Communicate the outcomes of a research project to identified stakeholders.
- Reflect bon the application of research methodologies and concepts.
Topic - Digital wellbeing on Cyber-bullying
The range of topics discussed could cover the following:
• How to find the balance towards a healthy relationship with devices?
• Are tech companies responsible for the health, safety and wellbeing of users?
• What tools and strategies can a company use to develop a system(s) that addresses digital wellbeing for users?
• What impact will future digital tech have on human wellbeing?
Answer - Unit 13 - Computing Research Project - Digital wellbeing on Cyber-bullying
Bullying is known as someone hurt by their words or actions and make feels bad of it. It is a hard time to stop what happen to them. The new technology gives them new platform for their action now a days and bullies have been for long time. The cyberbullying is known as use of new technology such as email, internet, social media photos, mobile phones to do harassment, embarrass and threaten to target person. These types of actions usually occur on young people but when an adult involved which means cyber stalking, cyber harassment etc. The cyberbullying is important to concern on public health which can lead to increase the risk of mental health issues such as development problems, suicide and psychological. Many researchers had lack of agreements on definition and occurrences of cyberbullying and methods to measure of cyberbullying and its prevalence. This report discusses on object of this case study, literature survey, research methods, limitation of each methods, ethical issues and finally we conclude on cyberbullying on digital wellbeing.
NO PLAGIARISM POLICY - ORDER NEW UNIT 13 COMPUTING RESEARCH PROJECT ASSIGNMENT & GET WELL WRITTEN SOLUTIONS DOCUMENTS WITH FREE TURNTIN REPORT!
The main objective of this report is to demonstrate the prevalence of cyberbullying in and also determine how to prevent and deal effectively with cyberbullying before it takes an opportunity to play in life. This paper demonstrates that cyber bullying using new technology and literature survey is used to support to change the policy on bullying which has limits in many places to discipline perpetrators when the bullying occurs. Also discuss research process and methodology, limitation of each methods and ethical issues.
The continuous examination on cyberbullying is obliged to give the liberal confirmation by the composition audit to help the advancement of cyberbullying issue and wild. Qing Li proposed an article on 2007 which communicates that data exhibited that one-fourth of the understudies were cyberbullying losses and fifteen percent of the understudies were bothered with the use of specific electronic devices.Furthermore, the delayed effects of the examination showed that most events are unreported. The maker prescribes that the web's customer anonymity is an essential deterrent in the schools ' fight against computerized torment.
Jennifer Holladay proposes an examination between standard tormenting and propelled harassing. The report takes a gander at the remarkable mercilessness of cutting edge chafing explicitly conventional on social correspondence regions like Facebook. Holladay claims "some spot in the extent of 33% to one piece of youth shave been based on". In their article Beale and Hall see that paying little regard to endeavours by schools to make undertakings and give direction on cyberbullying the issue still drives forward. The creators stress riddle stayed to the liable gatherings through the web as beast hindrance to battle the issue. The article in like way proposes that present tormenting laws should be stretched out to combine an electronic baiting area.
Tangen and Campbell similarly shown practically identical responses as for cyberbullying scenes experienced by the two get-togethers. The two social occasions furthermore felt that educators were less disposed to envision cyberbullying than eye to eye tormenting. The makers in like manner express that schools miss the mark on the data to neutralize and cyberbullying against.
Kathleen Conn traces the different cyberbullying types and horrific cyberbullying after-effects. Suicides have occurred in a few instances of cyberbullying. Misused individuals can't escape the various kinds of cyberbullying as it's the delight of anyone cruising around when posted. The objective of the article is to give legal examples of cyberbullying.
Research Approaches and Methodology
According to Feather (2016), a research approach is simply a procedure employed in gathering data, and in making analysis of the collected data. There are two common types of research approaches: inductive vs deductive. Inductive approach entails utilisation of specific observations in order to establish and affirm general theories and statements. On the other hand, deductive approach involves making conclusions on the general statements or observations made be respondents. This means that the latter is chiefly related with quantitative data while the former is majorly concerned on qualitative approach. The current study will make use of inductive research approach, owing to the fact that it will majorly rely on qualitative data. This approach is deemed to be suitable owing to its potential to obtain the required information from a readily available and wide source. Since the problem under investigation is wide-scale, this is presumed to be the most effective means of gathering data from different levels.
ENDLESS SUPPORT IN UNIT 13 COMPUTING RESEARCH PROJECT ASSIGNMENTS WRITING SERVICES - YOU GET REVISED OR MODIFIED WORK TILL YOU ARE SATISFIED WITH OUR UNIT 13 COMPUTING RESEARCH PROJECT ASSIGNMENT HELP SERVICES!
Primary vs. Secondary data
Two forms of data suffice: secondary vs primary. Secondary data is a form of data from already published sources such as journals, scientific databases, books, articles among others. On the other hand, primary data is a kind of data which is obtained from first hand observations. The collection of this type of data can be done through questionnaires, experiments, and interviews. Accordingly, the current study will use both primary and secondary data to gain data and information in relation to the research objective. The reason for settling on this approach is because they are cost effective while also making it easier to collect the needed information from desktop research and in a timelier manner (Dipak, 2013).
According to Bengtsson (2016), a research method can either be qualitative or quantitative. Quantitative research methods are one that employs numerical quantitative data in deducing inferences. The data obtained is then compared with existing findings after which analysis is made on the inferences. On the other hand, qualitative research methods are those that uses non-numerical data and are mostly exploratory in nature. This method is mostly preferred to gain a better comprehension regarding opinions, motivations and reasons. It is also employed in highlighting trends in thoughts, opinions and more insights on the study phenomena (Bengtsson, 2016). Accordingly, the research will deploy the use of qualitative research which is better applied with secondary research owing to its relevance in answering the research questions. In using this approach, the researcher aims to benefit from the advantages including its ability to gain wider insights regarding the measures to curb cyber bullying and its effects.
Data obtained from secondary sources will be analyzed using content analysis. According to Bulmer (2017), content analysis is the best approach in analysing secondary and qualitative data. The approach works by comparing information and data from one source to another in terms of differences and similarities. The meaning, implication of the data will then be deduced after which generalisation will be made. The interpretation of the information will then be made based on the research objectives.
On the other hand, data obtained from primary sources, who includes parents and internet users will be collected through the use of survey monkey. Survey Monkey is an online survey platform that facilitates posting and collection of data from willing respondents.
HELPING STUDENTS TO WRITE QUALITY UNIT 13 COMPUTING RESEARCH PROJECT ASSIGNMENT AT LOW COST!
As postulated by Neuman (2016), any researcher needs to observe ethical guidelines when collecting data from whatever approaches. This is critical in ensuring that the outcome remains credible, valid and reliable. Since this research is secondary in nature, the researcher will make sure that all the information is properly cited and that all sources are properly credited. Furthermore, the researcher will ensure that the information used and analyzed is relevant to the objective as well as ensuring that the evidence used is the latest. On the other hand, participants in the primary data collection will be guaranteed on confidentiality issues while they will be accorded their right to participate or refuse to participate. Furthermore, participants will be informed on the role of the research alongside the implications.
Bullying is known as someone hurt by their words or actions and make feels bad of it. It is a hard time to stop what happen to them. The cyberbullying is known as use of new technology such as email, internet, social media photos, mobile phones to do harassment, embarrass and threaten to target person. The cyberbullying is important to concern on public health which can lead to increase the risk of mental health issues such as development problems, suicide and psychological. This report discussed on object of this case study, literature survey, research methods, limitation of each methods, ethical issues and finally we conclude on cyberbullying on digital wellbeing.
GET READYMADE UNIT 13 COMPUTING RESEARCH PROJECT ASSIGNMENT SOLUTIONS - 100% PLAGIARISM FREE WORK DOCUMENT AT NOMINAL CHARGES!
Findings & Analysis
Prevalence of Cyber bulling
According to a latest report by Ofcom (2019), one in eight children age-12-15 years claim to have been directly bullied in one way or another on social media. This implies that actually cyber-bullying is rife and that the trend is becoming common on social media platforms. The relevant authorities need to come up and design strategies to deal with the phenomena.
What are the Peak Years for CyberBullying Risk
According to a report by Suffolk Cybersurvey (2016), the most prime years for cyberbullying risks are between 14-15 years. The risks also depend on a range of online experiences and encounters. Of course these group of people are those who have began being active on the internet. However, they don't know much about how to protect themselves from cyber-bullying.
The Eagerness of Parents to Know about Cyber Bullying
Results from survey monkey indicate that approximately 59% of parents want to know more about online bullying as they are unsure about when to intervene and how to approach this in a sensitive manner if they sense their child is being bullied by someone in their friendship group. This information is important for them to know how they respond should the need arise.
The more time children spend online, the more chance they have of having a negative experience at some point. From the results, about half of all cyber-bullying comes from someone known to the victim.
MOST RELIABLE AND TRUSTWORTHY UNIT 13 COMPUTING RESEARCH PROJECT ASSIGNMENT HELP & HOMEWORK WRITING SERVICES AT YOUR DOORSTEPS!
From this analysis, it is evident that cyber-bullying is prevalent in the society, and to a tremendous level. Mores, the generation that are more at risk of cyber bullying are the young children within the age range of 14-15. These are the young people who have started becoming active on social media but who harbour little knowledge on how to protect themselves from cyber-bulling and its effects. Furthermore, the research has found out that it is the concern of parents to want to know more about cyber-bulling so that they can protect their children accordingly.
A more in-depth research is needed to find out the prevalence of cyber-bullying and its effect on the society. There is also a need to create awareness programs on both parents and children on matters related to cyber bulling and how they can protect themselves from the vice. Parents are also expected to control their children's access on digital and social media platforms as well as establish measures to control the activities. This will go a long way towards protecting them from cyber-bullying. The government and relevant authorities also need to establish policies and strategies of helping vulnerable children in the society to curb the implications.
SAVE DISTINCTION MARKS IN EACH UNIT 13 COMPUTING RESEARCH PROJECT ASSIGNMENT WHICH IS WRITTEN BY OUR PROFESSIONAL WRITER!