Studyspark Study Document

Cyberbullying Research Protocol Title of Research Paper

Pages:3 (1020 words)

Sources:3

Subject:Technology

Topic:Internet Protocol

Document Type:Research Paper

Document:#60378779




h. Risks -- the safety and anonyminity of the participating students is of central concern for the researchers. All data will be coded to protect identifying information about the participants. The rules and guidelines of the IRB will be adhered to throughout the study. Also, students will be provided with access to school counselors if they become upset or want to talk further about cyberbullying. A virtual environment was chosen to be the safest, best controlled and most ethically sound method in which to examine cyberbullying.

i. Confidentiality -- the identity of the participants will be protected by coding all identifying information. Also, only the primary researchers will be allowed to listen to the original transcripts of the focus groups and after transcription the tapes will be destroyed.

2. Informed Consent Form

a. Statement of Invitation to Participate -- We would like to invite you to participate in a study about cyberbullying. The aim of this study is to raise awareness and educate others about this important and relevant topic.

b. Statement of What Study Will Ask the Participant to Do or Have Done to Him/Her -- This study asks students to participate in a confidential survey about cyberbullying. After the survey, students will have the opportunity to volunteer to participate in a focus group and educational simulation also.

c. Statement of Benefits Derived from Participating in the Study -- This study aims to raise awareness and educate others about the topic of cyberbullying. By participating in this study you will be helping to raise awareness about an important topic of concern to students, parents and educators alike. You will also be helping to develop tools to educate other students, parents and educators.

d. Statement of Risks Encountered from Participating in the Study -- This study asks students to participate in a survey, focus group or educational simulation about a potentially emotional topic. Also, although participation in this study will be confidential, due to the group setting of the survey and focus group, other students will be aware of one another's participation in the study.

e. Statement of How Confidentiality Will be Maintained -- the confidentiality of the participants will be maintained at all times. The identity of the participants will be protected by coding all identifying information. Also, only the primary researchers will be allowed to listen to the original transcripts of the focus groups and after transcription the tapes will be destroyed.

f. Identification of Person(s) Who Can Be Contacted if Questions Arise Regarding the Study -- Should any questions arise about this study please contact Vivian H. Wright at the Department of Curriculum and Instruction, College of Education, the University of Alabama by telephone at (205) [HIDDEN] or e-mail at -- .

References

Beale, a., Hall, K. (2007). Cyberbullying: What school administrators (and parents) can do. The Clearing House: 81, 8-12.

Carney, J. (2008). Perceptions of bullying and associated trauma during adolescence. Professional School Counseling: 11(3), 179-187.

Li, Q. (2007). New bottle but old wine: A research of cyberbullying in schools. Computers in Human Behavior: 23(4),…


Sample Source(s) Used

References

Beale, a., Hall, K. (2007). Cyberbullying: What school administrators (and parents) can do. The Clearing House: 81, 8-12.

Carney, J. (2008). Perceptions of bullying and associated trauma during adolescence. Professional School Counseling: 11(3), 179-187.

Li, Q. (2007). New bottle but old wine: A research of cyberbullying in schools. Computers in Human Behavior: 23(4), 1777-1791.

Morgan, D.L. (1988). Focus groups as qualitative research. Newbury Park, CA: Sage.

Cite this Document

Join thousands of other students and

"spark your studies".