

A Solution to Combat Cyber-Bullying
The project brief or the aim of this challenge is to design a solution to help parents and/or kids to combat cyber-bullying.
Project Duration: 48 Hours
PLEASE NOTE:
Because of the nature of this challenge and the limited time assigned to it, the concept and the final design proposal is solely based on quick secondary research and personal intuition wherever needed.

Framing Questions
Developing and writing down Framing questions is important before starting research. It helps to focus on different aspects of research and identifying all the stakeholders in a project. It also helps to investigate different perspectives while conducting ethnographic research and documenting user behaviors.
-
What Is cyber-bullying and what does it exactly mean?
-
What are the types of cyber-bullying?
-
Why does it happen and what are the causes?
-
Who are the stakeholders and what are the motivational values that drive them?
-
What are their needs and pain points?
-
What are the consequences of cyber-bullying?
-
What are the known methods of preventing cyber-bullying?
-
How is cyber-bullying usually handled by authorities / parents / adults / society / children?
-
What are the known solutions of combat against cyber-bullying in the market?
-
What are the existing policies against cyber-bullying?
-
How are people made aware about cyber-bullying? Is it enough?
-
How to support a victim of cyber-bullying? What are the resources needed?
Secondary Research
Building context around the research areas and backing it up with data is very important to ground the research done and build on after taking into consideration every available perspective of the problem. For Secondary Research, I referred the following links and online resources in order to extract data, and widen the scope of the research.
What is Cyber-Bullying?
Online Harassing, or A form of Bullying using electronic means
Cyber-bullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyber-bullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyber-bullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyber-bullying crosses the line into unlawful or criminal behavior.
What are it's consequences?
Lower Self-Esteem, Depression, Lack of Sleep, Mental Disorders, Anxiety, etc
Cyber-bullying is an intense form of psychological abuse, whose victims are more than twice as likely to suffer from mental disorders compared to traditional bullying. The effects of cyber-bullying vary, but research illustrates that cyber-bullying adversely affects youth to a higher degree than adolescents and adults. Youth are more likely to suffer since they are still growing mentally and physically. Kids that are bullied are likely to experience anxiety, depression, loneliness, unhappiness and poor sleep. Most of the time cyber-bullying goes unnoticed; the younger generation hides their bullying from anyone that can help to prevent the bullying from occurring and from getting worse
How do people fight it?
Notice, Talk, Document, Report, and Support
Cyber-bullying is a form of bullying, and adults should take the same approach to address it: support the child being bullied, address the bullying behavior of a participant, and show children that cyber-bullying is taken seriously. Because cyber-bullying happens online, responding to it requires different approaches. Adults have to notice the signs of bullying in their children, talk to them and investigate the incident, document all the tangible proof of cyber-bullying and report it to authorities, and finally take measures to support the child at every step.
Stakeholder Map
Mapping out all the stakeholders identified for this project through secondary research was the next step. It was important to consider every perspective, all their pain points, and motivations before analyzing the data for insights and developing opportunity spaces.

Identifying Motivations and Pain Points
After all the stakeholders were identified and mapped out, it was necessary to identify their motivations, and needs behind their specific behaviors and actions. This provided better insight and context to the research conducted. Finally, all the pain points and difficulties of each stakeholder was studied in detail.

Affinity Mapping
Target Users and Needs
To establish the Target User for the design, and to flush out the final concept thoroughly, it was useful to create a detailed persona for the same. Personas are fabricated fictional user profiles developed to explain a design and convey a realistic story and emotionally driven behaviors.

Ideation Sketches
Concept 'Be Bold'
INFORMATION ARCHITECTURE
'Be Bold' urges the teens to be strong and brave. It allows them to report and anonymously expose the people bullying them, and also take legal action if necessary. Additionally, it utilizes the internet's power to inform and spread awareness, connect them to experts and professionals, psychologists and other empowering people to help them during their 'dark days'. It also gives them access to a forum, and a support community of people to help them get through the current phase.


The Design
THE INTERACTION FLOW-DIAGRAM
The 'Be Bold' app has three main screens, namely the 'Resource Screen' which provides limitless resources for the teenagers and the app users, the 'Support Screen' which provides instant connection to people, professionals, and an online support forum via texts and calls, and the 'Share / Add Screen', which helps to share any documentation proof of the cyber-bullying incident publicly or privately through the forum. It also has an 'Emergency Screen' which provides emergency contacts and links.

High-Fidelity Wireframes
