Verified Document

Cyberbullying Research Protocol Title Of Research Paper

All data will be coded to protect identifying information about the participants. The rules and guidelines of the IRB will be adhered to throughout the study. Also, students will be provided with access to school counselors if they become upset or want to talk further about cyberbullying. A virtual environment was chosen to be the safest, best controlled and most ethically sound method in which to examine cyberbullying. i. Confidentiality -- the identity of the participants will be protected by coding all identifying information. Also, only the primary researchers will be allowed to listen to the original transcripts of the focus groups and after transcription the tapes will be destroyed.

2. Informed Consent Form

a. Statement of Invitation to Participate -- We would like to invite you to participate in a study about cyberbullying. The aim of this study is to raise awareness and educate others about this important and relevant topic.

b. Statement of What Study Will Ask the Participant to Do or Have Done to Him/Her -- This study asks students to participate in a confidential survey about cyberbullying. After the survey, students will have the opportunity to volunteer to participate in a focus group and educational simulation also.

c. Statement of Benefits Derived from Participating in the Study -- This study aims to raise awareness and educate others about the topic of cyberbullying. By participating in this study you will be helping to raise awareness about an important topic of concern to students, parents and educators alike. You will also be helping to develop tools to educate other students, parents and educators.

d. Statement of Risks Encountered from Participating in the Study -- This study asks students to participate in a survey, focus group or educational simulation about a potentially emotional topic. Also, although participation in this study will be confidential, due to the group...

Statement of How Confidentiality Will be Maintained -- the confidentiality of the participants will be maintained at all times. The identity of the participants will be protected by coding all identifying information. Also, only the primary researchers will be allowed to listen to the original transcripts of the focus groups and after transcription the tapes will be destroyed.
f. Identification of Person(s) Who Can Be Contacted if Questions Arise Regarding the Study -- Should any questions arise about this study please contact Vivian H. Wright at the Department of Curriculum and Instruction, College of Education, the University of Alabama by telephone at (205) [HIDDEN] or e-mail at -- .

References

Beale, a., Hall, K. (2007). Cyberbullying: What school administrators (and parents) can do. The Clearing House: 81, 8-12.

Carney, J. (2008). Perceptions of bullying and associated trauma during adolescence. Professional School Counseling: 11(3), 179-187.

Li, Q. (2007). New bottle but old wine: A research of cyberbullying in schools. Computers in Human Behavior: 23(4), 1777-1791.

Morgan, D.L. (1988). Focus groups as qualitative research. Newbury Park, CA: Sage.

Sources used in this document:
References

Beale, a., Hall, K. (2007). Cyberbullying: What school administrators (and parents) can do. The Clearing House: 81, 8-12.

Carney, J. (2008). Perceptions of bullying and associated trauma during adolescence. Professional School Counseling: 11(3), 179-187.

Li, Q. (2007). New bottle but old wine: A research of cyberbullying in schools. Computers in Human Behavior: 23(4), 1777-1791.

Morgan, D.L. (1988). Focus groups as qualitative research. Newbury Park, CA: Sage.
Cite this Document:
Copy Bibliography Citation

Related Documents

Internet Protocols the Internet Is More Than
Words: 631 Length: 2 Document Type: Essay

Internet Protocols The internet is more than what it appears to many of its users. The World Wide Web is the standard and most popular method or protocol of acquiring information off the interconnectivity that the internet provides. The purpose of this essay is to define an internet protocols and give examples of several different types and the advantages and disadvantages they provide for myself and other users of this technology. HTTP

Internet Protocol Version 6 IPV6 Technology
Words: 713 Length: 2 Document Type: Essay

Internet Protocol Version 6 (IPv6) technology, one of the technologies listed on Gartner's 2004 Hype Cycle that has high visibility today because new IPv4 addresses are nearly exhausted. On the 2012 Hype Cycle, IPv6 is now listed in the "Trough of Disillusionment," yet the U.S. government is still directing that transition to this protocol continue: Name at least three advantages that government organizations will gain by transitioning to IPv6 technology

Voice Over Internet Protocol -Voip
Words: 1593 Length: 4 Document Type: Term Paper

Fundamentally, proxy servers get SIP messages and redirect them to the next SIP server in the network. Proxy servers are able to provide operations like authentication, authorization, network access control, routing, reliable request transmission, and security. (ii) Redirect server: Gives the client with information regarding the nest hop or hops which the message must take and subsequently the client contacts the next hop server and UAS directly. (iii) Registrar

Personal Statement an Internet Protocol
Words: 818 Length: 3 Document Type: Term Paper

The address classes are the defined as a, B, C, D or E.This is however dependent on the initial bits. The total of number of addresses in IPv4 are 4 294-967-296. As for IPv6, the address is made up of 128 bit long pieces which are 16 bytes. The fundamental structure of IPv6 is 64 bits (network number) and 64 bits (host number). In most case the host portion

Voip Voice Over Internet Protocol
Words: 1391 Length: 5 Document Type: Term Paper

This system was problematic because of the number of students in the district and the time that it took to engage in this type of communication. In an effort to find a solution for the problem an Information Systems Manager was called in to assist the district (Milner, 2005). After abandoning an idea that called for the expansion of the traditional telephone system by placing new jacks in classrooms because

Voice Over Internet Protocol Report
Words: 3916 Length: 10 Document Type: Term Paper

With the growth of VoIP, new requirements are brought forwarded, such as providing communication between a PC-based soft phone and a phone on PSTN. Such requirements strengthen the need for a standard for IP telephony. Same as other technologies, there are various standards proposed to be accepted by the industry. Two major standard bodies which govern the multimedia transmission over IP network are: International Telecommunications Union (ITU) Internet Engineering Task Force

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now