Write a 750 word evaluation of the research processes you undertook in this course about bullying

Running head: BULLYING RESEARCH 1

BULLYING RESEARCH 2

Bullying Research

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Chericia Avant

BEH/225

12/11/2013

Melodie Miller

When conducting online research and posting reports within websites concerning bullying it is considered to be advantageous though the process is marred by various challenges. It is advantageous in that it is through the internet that the information can reach a wider percentage of the targeted audience. In addition, it is through such researches that not only the potential victims but also their guardians can access detailed information about the various forms of bullying, as well as, the newly emerging forms of bullying such as cyber-bullying. Moreover, the research reports offers information on the actions which one has to undertake upon becoming a bullying victim. Information concerning the legal action which the bullying victim should undertake is of great essence because most of the times the said victims end up not taking any action because of being unaware of their legal rights (Mishna, 2012). It is also through the internet that those accessing the information can give their feedback direct and even forward their queries about what they do not comprehend or has not been covered with the research.

Nevertheless, presenting the bullying research reports within the internet can turn out as challenging due to various reasons. First, the author of the said reports can be in the position whereby he or she lacks the technical know how of posting the information within the internet because of computer illiteracy. It is also necessary to come up with strategic measures which will ensure that the information is securely protected and cannot be distorted by hackers. Given that most hackers are computer gurus who are in the position of devising ways of hacking into the websites or even blogs, it is a great challenge to make it certain that the information is well protected (Mishna, 2012).

In this twenty first century, majority of individuals prefer obtaining information from the internet and thus featuring bullying research reports may not reach a bigger audience as that which has been featured within blogs. It is also understandable that most individuals do not pay attention to news features thus in the event that the bullying research reports is present within the aforementioned avenues it is set to reach an insignificant percentage of the targeted audience (Gackenbach, 2007).

References

Gackenbach, J. (2007). Psychology and the internet: Intrapersonal, interpersonal, and transpersonal implications. Amsterdam: Elsevier/Academic Press.

Mishna, F. (2012). Bullying: A guide to research, intervention, and prevention. New York: Oxford University Press.

Problem Solving Simulation

The only strategy which I made use of in solving the problem is the try and error method. In that regard, I picked one animal at and a time and crossed the river in the hope that I would manage to safely send the three animals across the river. The most challenging obstacle in coming up with a solution was that one would not put aboard more than one animal within the boat at a single strip. I believe that the problem would be easily solved in the event that it would be possible for two animals to board the boat at a single trip. I was unable to solve the problem after trying for almost one hour and exhausting all the options which I could think about. Therefore, no amount of additional time would enable me solve the problem unless the rules of the game are changed as earlier stated.