A Model of Factors Affecting Cyber Bullying Behavi PDF
A Model of Factors Affecting Cyber Bullying Behavi PDF
A Model of Factors Affecting Cyber Bullying Behavi PDF
net/publication/328945731
CITATIONS READS
10 247
6 authors, including:
Some of the authors of this publication are also working on these related projects:
CHRONOLOGY OF BRAIN TUMOR CLASSIFICATION OF INTELLIGENT SYSTEMS BASED ON MATHEMATICAL MODELING, SIMULATION AND IMAGE PROCESSING TECHNIQUES
View project
All content following this page was uploaded by Mahdi M Alamri on 30 November 2018.
This work was supported by Research Management Centre (RMC) at Universiti Teknologi Malaysia (UTM) for funding this project under
grant number PY/2018/02903: Q.J130000.21A2.04E40.
ABSTRACT This research attempts to mitigate this gap within the literature concerning the use of social
media for cyber engagement among students. Since students often become upset when network
providers intervene, the present study aims to develop a model to measure ethics issues related to
engagement with social media. The conducted survey examines social media use with regard to cyber
engagement, cyber bullying behaviors, and being bullied, harassed, and stalked. To achieve the study
objective, the study employed a questionnaire as the main data collection method and distributed it to 242
students, all of whom use social media. The findings were obtained via a quantitative research method,
Structural Equation Modeling (SEM) and Partial least squares (PLS). The findings from our empirical
study indicate that the assessment of discriminant validity has become an extensively acknowledged
requirement for the analysis of latent variables‟ relationships. Goodness of fit indices demonstrates a
good fit of the model. Roughly more than half of students indicated they had been bullied, harassed, and
stalked online. The proposed model will help campus administration and decision-makers formulate
strategies that can significantly reduce cyber harassment among students.
INDEX TERMS Social Media Used, Cyber Harassment, Cyberstalking, Cyber bullying
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE Access
effects of cyber bullying have been cyberstalking, and cyber bullying among
acknowledged, although a comprehensive students.
investigation remains to be undertaken [12].
Moreover, the negative impact of cyberstalking II. RESEARCH MODEL AND HYPOTHESES
has been found to be compounded when fiscal This research considers the social media used
costs are also incurred, as this worsens the and cyber engagement to be independent
victim‟s psychological distress and sense of variables, and cyber harassment, and
persecution [13]. Thus, this research aimed to cyberstalking to be mediator variables. The
specifically proposes a model for identifying the dependent variable is cyber bullying.
significant factors that are anticipated to play a
major role in minimizing cyber harassment,
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE Access
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE Access
5 CB5 0.7993
6 CH1 0.8210
7 Cyber CH2 0.7525
8 Harassment CH3 0.8364 0.907 0.903 0.632 0.532
9 CH4 0.7746
10 CH5 0.7642
11 CE1 0.8344
12 Cyber CE2 0.8023
13 Engagement CE3 0.8465 0.899 0.909 0.601 0.000
14 CE4 0.7854
15 CE5 0.8345
16 CS1 0.8123
17 Cyberstalking CS2 0.8239
18 CS3 0.7360 0.910 0.900 0.708 0.507
19 CS4 0.8228
20 CS5 0.8004
21 SMU1 0.8340
22 Social Media SMU2 0.7109
23 Used SMU3 0.8345 0.923 0.920 0.698 0.000
24 SMU4 0.7395
25 SMU5 0.7739
4.3 Discriminant Validity of Measurements exceeded 0.50. Having determined each factor‟s
The items‟ degree of difference within each item variance, it is imperative that the square
factor, as well as the difference among the root of the average variance among the relevant
factors, was tested through discriminant validity. items not be surpassed when the item
In accordance with [34], each construct‟s relationship between two factors, according to
discriminant validity was confirmed at a [29, 33]. See Table 3.
significance of p = 0.001, as all AVE results far
TABLE 3. Discriminant Validity of Measurements
Factors Code CB CH CS CE SMU
Cyber Bullying CB 0.8423
Cyber Harassment CH 0.6420 0.9732
Cyberstalking CS 0.5312 0.4329 0.9634
Cyber Engagement CE 0.5420 0.5510 0.4507 0.8316
Social Media use SMU 0.4991 0.4983 0.5501 0.4620 0.8961
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE Access
Additionally, table 3 presents the variables of subsequent Structural equation modeling SEM
cyberstalking, cyber harassment and cyber stage adopted confirmatory factor analysis CFA
engagement, and social media in general, in in order to verify the posited hypotheses. Figure
relation to cyber bullying. Table 3 also provides 2 indicates that all hypotheses were accepted.
the reliability and validity scores. The
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE Access
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE Access
[6] V. Starcevic, and E. Aboujaoude. “Cyberchondria, cyber [24] A. AlKaabi. “Strategic framework to minimise information
bullying, cybersuicide, cybersex:„new‟ psychopathologies security risks in the UAE”. University of Bedfordshire,
for the 21st century?”. World Psychiatry 14(1): 97–100, 2014.
2015. [25] P. P. Nicolle, and L. J. Moriarty. “Cyberstalking: Utilizing
[7] J. Bishop. “Representations of „trolls‟ in mass media What We Do Know. Victims & Offenders”. An International
communication: a review of media-texts and moral panics Journal of Evidence-based Research, Policy, and Practice
relating to „internet trolling‟”. International Journal of Web 2009; 4.4, 435-41, 2009.
Based Communities 10(1): 7, 2014. [26] S. Hinduja, and J. W. Patchin. “Cyberbullying: identification,
[8] F. Pereira, B. H. Spitzberg, and M. Matos. “Cyber-harassment prevention, and response”. Cyberbullying Research
victimization in Portugal: Prevalence, fear and help- Center. Retrieved May, 3, 2011.
seeking among adolescents”. Computers in Human [27] K.K. J. Seo, J. Tunningley, Z. Warner, and J. Buening. “An
Behavior 62: 136–146, 2016. Insight Into Student Perceptions of Cyberbullying”.
[9] M. O. Lwin, B. Li, and R. P. Ang. “Stop bugging me: An American Journal of Distance Education 30(1), 39-47,
examination of adolescents‟ protection behavior against 2016.
online harassment”. Journal of adolescence 35(1), 31-41, [28] F. A. Moafa, K. Ahmad, W. M. Al-Rahmi, N. Yahaya, Y.B.
2012. Kamin and M.M. Alamri, “Develop a Model to Measure the
[10] M. Fridh, M. Lindström, and M. Rosvall. “Subjective health Ethical Effects of Students through Social Media
complaints in adolescent victims of cyber harassment: Use.” IEEE Access. 6, (8466942), 56685-56699, 2018.
Moderation through support from parents/friends - A [29] J.F. Hair, and C.M. Ringle, “Sarstedt M. PLS-SEM: Indeed a
Swedish population-based study”. BMC Public Health silver bullet”. Journal of Marketing theory and Practice
15(1): 1–11, 2015. 19(2), 139-152, 2011.
[11] T. Beran, and Q. Li. “Cyber-Harassment: a Study of a New [30] A. Schrock, and D. Boyd. “Online threats to youth:
Method for an Old Behavior”. Journal of Educational Solicitation, harassment, and problematic content:
Computing Research 32(3): 265–277, 2005. Literature review prepared for the Internet Safety
[12] S. Hinduja, and J. W. Patchin. “Bullying beyond the Technical Task Force.2008.
schoolyard: Preventing and responding to cyber bullying”. [31] W. M. Al-Rahmi, N. Alias, M. S. Othman, V.I. Marin and G.
Thousand Oaks, CA: Sage.2009. Tur. “A model of factors affecting learning performance
[13] K. Mason. “Cyber bullying: A preliminary assessment for through the use of social media in Malaysian higher
school personnel”. Psychology in the Schools 45, 323- education”. Computers & Education 121, 59-72, 2018.
348, 2008. [32] T. Heiman, and D. Olenik-Shemesh. “Cyber bullying
[14] T. Varinder, and P. Kanwar. “Understanding social media”. Experience and Gender Differences Among Adolescents
Bookboon, 2012. in Different Educational Settings”. Journal of Learning
[15] N. B. Ellison, C. Steinfield, and C. Lampe. “The benefits of Disabilities 48 (2). 146-155, 2015.
facebook “friends:” Social capital and college students‟ [33] A. Alzahrani, B. C. Stahl, and M. Prior. “Developing an
use of online social network sites”. J. Comput. Commun instrument for e-public services‟ acceptance using
12, 4, 1143–1168, 2007. confirmatory factor analysis: Middle East contex”.. Journal
[16] A. Lenhart, M. Madden, A. Smith, K. Purcell., K. Zickuhr, of Organizational and End User Computing (JOEUC)
and L. Rainie. “Teens, Kindness and Cruelty on Social 24(3), 18-44, 2012.
Network Sites: How American Teens Navigate the New [34] C. Fornell, and D.F. Larcker. “Evaluating structural equation
World of" Digital Citizenship". Pew Internet & American models with unobservable variables and measurement
Life Project. 2011. error”. Journal of marketing research, 39-50, 1981.
[17] W. M. Al-rahmi, M. S. Othman and L. M. Yusuf, Exploring [35] S. Livingstone, L. Haddon, A. Görzig and K. Ólafsson.
the Factors that Affect Student Satisfaction through Using “Risks and safety on the internet: the perspective of
E-Learning in Malaysian Higher Education Institutions. European children: full findings and policy implications
Mediterranean Journal of Social Sciences, 6(4): 2015, from the EU Kids Online survey of 9-16 year olds and their
pp299-310. parents in 25 countries.2011.
[18] W. M. Al-Rahmi, M. S. Othman, and L. M. Yusuf, “The [36] W. Baker, M. Goudie, A. Hutton, C. D. Hylender, J.
effectiveness of using e-learning in Malaysian higher Niemantsverdriet, C. Novak and P. Tippett. “Data breach
education: A case study Universiti Teknologi Malaysia,” investigations report”. Verizon RISK Team.2011.
Mediterranean Journal of Social Sciences, vol. 6, no. 5, [37] J. Wolak, K. J. Mitchell and D. Finkelhor. “Does online
pp. 625- 637, 2015. harassment constitute bullying? An exploration of online
https://doi.org/10.5901/mjss.2015.v6n5s2p625 harassment by known peers and online-only
[19] W. M. Al-Rahmi, M. S. Othman, and L. M. Yusuf, “The contacts”. Journal of adolescent health 41(6), S51-S58,
effect of social media on researchers‟ academic 2007.
performance through collaborative learning in Malaysian [38] K. Williams and N. Guerra. “Prevalence and predictors of
higher education,” Mediterranean Journal of Social Internet bullying”. Journal of Adolescent Health 41(6),
Sciences, vol. 6 no. (4), pp. 193-203, 2015. S14–S21, 2007.
http://doi:10.5901/mjss.2015.v6n4s1p193 [39] M. Constantinos. Kokkinos, Nafsika Antoniadou, Angeliki
[20] A. Smith. “Protection of Children Online: Federal and State Asdre and Kyriaki Voulgaridou. “Parenting and Internet
Lawes Addressing Cyberstalking, Cyberharassment and Behavior Predictors of Cyber-Bullying and Cyber-
Cyberbuylling. Congressional Research Service Reports Victimization among Preadolescents”. Deviant Behavior,
for the People”. pág, 4.2009. 37:4, 439-455, 2016.
[21] M. Fishbein, and I. Ajzen. “Belief Attitude, Intention and [40] F. A. Moafa, K. Ahmad, W. M. Al-Rahmi, N. Alias and
Behavior: An Introduction to Theory and Research M.A.M. Obaid. “Factors For Minimizing Cyber Harassment
Reading”. 6, 1975. Among University Students: Case Study In Kingdom Of
[22] W. M. Al-Rahmi, N. Alias, M. S. Othman, I. A. Ahmed, A. Saudi Arabia (KSA)”. Journal of Theoretical & Applied
M. Zeki and A.A. Saged, “Social Media Use, Collaborative Information Technology 96(6), 2018.
Learning and Students' academic Performance: A [41] W. M. Al-Rahmi, M.S. Othman and L.M. Yusuf. “Effect of
Systematic Literature Review of Theoretical Engagement and Collaborative Learning on Satisfaction
Models”. Journal of Theoretical & Applied Information Through the use of Social Media on Malaysian Higher
Technology, 95(20). 5399-5414, 2017. Education”. Research Journal of Applied Sciences,
[23] S. Jameson. “Cyberharrasment: Striking a balance between Engineering and Technology 9, 12, 1132-1142, 2015
free speech and privacy”. CommLaw Conspectus 17, [42] W.M. Al-Rahmi, N. Alias, M.S. Othman, A. I. Alzahrani, O.
231, 2008. Alfarraj, A.A. Saged and N.S. Abdul Rahman. "Use of E-
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE Access
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE
Access
Appendix
Factors No Items
1 The use of bad social media is considered a form of cyber bullying, cyber
harassment, and cyber stalking.
2 Pretending to be another person without that person‟s approval on social
Social Media media is considered a form of cyber bullying, cyber harassment, and cyber
Used stalking.
3 Entering someone‟s personal page on social media without their approval is
considered a form of cyber bullying, cyber harassment, and cyber stalking.
4 I feel that using of social media will be easy in my study but sometime it‟s
considered a form of cyber bullying, cyber harassment, and cyber stalking.
5 I feel that using social media will be easy to incorporate in my study but
sometime its considered a form of cyber bullying, cyber harassment, and
cyber stalking.
1 By using of social media, via interactions with other peers I had cyber
engagement.
Cyber 2 By using the social media in my study has favored my personal relationships
Engagement with my peers but I had cyber engagement.
3 By using of social media, I am not satisfied with the cyber engagement.
4 By using of social media, I had frequent conversations with peers, but I had
cyber engagement.
5 By using the social media I felt that my opinions have been taken into account
via my peers but I had cyber engagement.
1 I bullied others students through social media use outside my university.
Cyber Bullying 2 I bullied others students through social media use inside my university.
3 I bullied others students through cyber engagement outside my university.
4 I bullied others students through cyber engagement inside my university.
5 I need to learn to deal with cyber bullying by myself.
1 I harassed others students through social media use outside my university.
2 I harassed others students through social media use inside my university.
Cyber 3 I harassed others students through cyber engagement outside my university.
Harassment 4 I harassed others students through cyber engagement inside my university.
5 Cyber harassment has direct influence on cyber bullying. Thus, Impact on
academic achievement.
1 I stalked others students through social media use inside my university.
2 I stalked others students through social media use outside my university.
Cyberstalking 3 I stalked others students through cyber engagement outside my university.
4 I stalked others students through cyber engagement inside my university.
5 Cyber stalking has direct influence on cyber bullying. Thus, Impact on
academic achievement.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
View publication stats http://www.ieee.org/publications_standards/publications/rights/index.html for more information.