A Model of Factors Affecting Cyber Bullying Behavi PDF

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/328945731

A Model of Factors Affecting Cyber Bullying Behaviors among University


Students

Article  in  IEEE Access · November 2018


DOI: 10.1109/ACCESS.2018.2881292

CITATIONS READS
10 247

6 authors, including:

Waleed Mugahed Al-Rahmi Noraffandy Yahaya


Universiti Teknologi Malaysia Universiti Teknologi Malaysia
75 PUBLICATIONS   571 CITATIONS    88 PUBLICATIONS   206 CITATIONS   

SEE PROFILE SEE PROFILE

Mahdi M Alamri Fahad Moafa


King Faisal University Universiti Kebangsaan Malaysia
14 PUBLICATIONS   43 CITATIONS    8 PUBLICATIONS   33 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Massive open online course MOOCs View project

CHRONOLOGY OF BRAIN TUMOR CLASSIFICATION OF INTELLIGENT SYSTEMS BASED ON MATHEMATICAL MODELING, SIMULATION AND IMAGE PROCESSING TECHNIQUES
View project

All content following this page was uploaded by Mahdi M Alamri on 30 November 2018.

The user has requested enhancement of the downloaded file.


This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE Access

A Model of Factors Affecting Cyber Bullying


Behaviors among University Students
1 1 2
WALEED MUGAHED AL-RAHMI , NORAFFANDY YAHAYA* , MAHDI M ALAMRI , NADA ALI
3 1 4
ALJARBOA , YUSRI BIN KAMIN , FAHAD ABDULLAH MOAFA
1
Faculty of Education, Universiti Teknologi Malaysia, 81310, UTM Skudai, Johor, Malaysia
2
Faculty of Education, Education Technology Department, King Faisal University, Alahsa, Saudi Arabia
3
College of Education, Psychology Department, Taif University, Taif, Saudi Arabia
4
Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Malaysia
Corresponding author: Noraffandy Yahaya (email: p-afandy@utm.my) and Waleed Al-Rahmi (waleed.alrahmi@yahoo.com).

This work was supported by Research Management Centre (RMC) at Universiti Teknologi Malaysia (UTM) for funding this project under
grant number PY/2018/02903: Q.J130000.21A2.04E40.

ABSTRACT This research attempts to mitigate this gap within the literature concerning the use of social
media for cyber engagement among students. Since students often become upset when network
providers intervene, the present study aims to develop a model to measure ethics issues related to
engagement with social media. The conducted survey examines social media use with regard to cyber
engagement, cyber bullying behaviors, and being bullied, harassed, and stalked. To achieve the study
objective, the study employed a questionnaire as the main data collection method and distributed it to 242
students, all of whom use social media. The findings were obtained via a quantitative research method,
Structural Equation Modeling (SEM) and Partial least squares (PLS). The findings from our empirical
study indicate that the assessment of discriminant validity has become an extensively acknowledged
requirement for the analysis of latent variables‟ relationships. Goodness of fit indices demonstrates a
good fit of the model. Roughly more than half of students indicated they had been bullied, harassed, and
stalked online. The proposed model will help campus administration and decision-makers formulate
strategies that can significantly reduce cyber harassment among students.

INDEX TERMS Social Media Used, Cyber Harassment, Cyberstalking, Cyber bullying

I. INTRODUCTION media reports, cyber bullying is an international


A particularly grave problem facing society issue [4]. In terms of internet-based harassment,
today, to the extent that it may be deemed a and in some cases student suicides, cyber
threat to public health [1], is cyber bullying. bullying is prominent. One illustrative case is the
Modes of entertainment, learning approaches bullying of a student at McClure Middle School
and social engagement among students have in Seattle, which resulted in the suspension of
fundamentally changed particularly over the 28 students [5]. Rather than groups of students,
previous decade as a result of the expansion of it is specific students who tend to be affected
technology and computer-driven engagement most by cyber bullying. However, cyber
and knowledge dissemination. Significantly, new harassment has not only received a significant
methods of communication have emerged: SMS amount of attention from social networking
communication, social media platforms, chat platforms, the mitigation of cyber harassment
forums, emailing, webcams, instant messaging has also been spearheaded by the mass media
apps and websites have become pervasive, [6], almost to the extent of creating a moral
especially among youths. This influx of new panic about the issue [7]. In terms of the
technology significantly influences individuals‟ international prevalence of cyber harassment,
day-to-day lives [2]. Indeed, with regard to social over the course of their lives, 69.9% of
engagement, digital communication apparatuses teenagers in Portugal stated they had been
are perceived as indispensable by most victims [8] and 51% of teenagers in Singapore
students [3]. However, the prevalence of reported being abused a minimum of one time
smartphones and other digital tools has [9]. Additionally, 20% of Swedish female youths
increased the occurrence of cyber bullying and 14% of male youths stated they had been
activities. Bullying via the internet is a particular subject to cyber harassment [10], as well as
hazard for students. According to various global 21% of Canadian teenagers [11]. The extreme

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE Access

effects of cyber bullying have been cyberstalking, and cyber bullying among
acknowledged, although a comprehensive students.
investigation remains to be undertaken [12].
Moreover, the negative impact of cyberstalking II. RESEARCH MODEL AND HYPOTHESES
has been found to be compounded when fiscal This research considers the social media used
costs are also incurred, as this worsens the and cyber engagement to be independent
victim‟s psychological distress and sense of variables, and cyber harassment, and
persecution [13]. Thus, this research aimed to cyberstalking to be mediator variables. The
specifically proposes a model for identifying the dependent variable is cyber bullying.
significant factors that are anticipated to play a
major role in minimizing cyber harassment,

FIGURE 1. Research Model and Hypotheses


2. 1 Social Media Use cyber bullying directly or indirectly via deviant
Social media is defined as “forms of electronic behavior intention [22].
communications (as Web sites for social 2.3 Cyber Harassment
networking and microblogging) through which Cyber harassment is the interchangeable and
users create online communities to share synonymous use of the terms “cyber
information, ideas, personal messages, and harassment,” “cyberstalking,” and “cyber
other content (as videos)” [14]. Numerous bullying”, Cyber harassment is defined by a
possibilities for communication are extended to perpetrator‟s “desire to frighten or embarrass the
youths through social media [15]. However, harassment victim” [23]. It has been argued by
these communication opportunities have AlKaabi [24] that any crime conducted involving
engendered an increase in harassment for computer-based technology is regarded as a
numerous users [16]. In contrast, [17, 18, 19] cybercrime.
students and researchers have positive attitudes
and intentions to use social media for 2. 4 Cyberstalking
educational purposes. Cyberstalking is “an escalated form of online
harassment directed at a specific person that
2.2 Cyber Engagement causes substantial emotional distress and
Cyber engagement is engage online to be serves no legitimate purpose, the action is to
communicated and share words, images, or annoy, alarm, and emotionally abuse another
language by or through the use of electronic person” [25]. The increasing use of cyberspace
mail or electronic communication, directed at a by 'criminals' has prompted a rush of legislation
specific person, causing substantial emotional and, as a result, academic interest. However, in
distress to that person and serving no legitimate spite of the number of high-profile cases
purpose [20]. A study conducted by Fishbein appearing in the media, the topic has yet to be
and Ajzen [21] reveals the effect of cyber analyzed against a proper theoretical framework
engagement and bullying through deviant that combines an understanding of internet
behavior intention in theory of reasoned action crime with an understanding of the psychological
(TRA). However, previous studies have phenomenon of stalking.
indicated that cyber engagement can affect

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE Access

2.5 Cyber bullying considered to determine construct validity [29]. A


Cyber bullying is when someone “repeatedly methodical assessment of the extant literature
makes fun of another person online or was undertaken to identify other analysts‟
repeatedly picks on another person through devised and assessed items.
email or text message or when someone posts
something online about another person that they 4.2 Convergent Validity of Measurements
don‟t like” [26]. Cyber bullying is different from Alzahrani et al. [33] and Hair et al. [29] state that
cyberstalking in that it usually occurs between convergent validity can be confirmed using three
minors, and it is subtler in nature [27, 28,43]. methodological procedures: composite reliability
(CR), factor loadings and Average Variance
III. RESEARCH METHODOLOGY Extracted (AVE). The suggested lower limit for
Data from 242 questionnaires was stored into composite reliability (0.70) was exceeded by the
the SPSS 23 version package software. identified values, which were between 0.9004
Postgraduate students at Malaysia‟s Universiti and 0.9201. The recommended lower limit for
Teknologi, who are present on social media, the factor loadings was also surpassed, with
comprised the questionnaire sample. The results between 0.71 and 0.86. As Table 1
model‟s validity using confirmatory factor indicates, the loadings show that the factors
analysis by employing SmartPLS 3.0, were allocated the appropriate items, which is
specifically the Partial Least Square Structural equal to or above 0.50. The factor must be
Equation Modelling (PLS-SEM). Additionally, the assessed through the loading of pertinent
investigation implemented an appropriate indicators, as [33] have emphasized. With
methodology to formulate an effective model. results between 0.6014 and 0.7088 for the
Given that inaccuracy in the findings may stem (AVE), this also exceeded the suggested figure
from outlier cases, data is removed from further of 0.5 as indicated by [29, 33] for all the three
analysis in accordance with Hair et al. [29]. tests of convergent validity. As well, the square
Extant literature [13, 30, 31, 32] was reviewed to root of the average variance shared by a single
identify appropriate factors for study: social construct‟s items should not be exceeded by the
media use (SMU), cyber engagement (CE), correlations between the items in two constructs,
cyber harassment (CH), cyberstalking (CS), and as indicated by Hair et al. [29]. Table 1 presents
cyber bullying (CB). The Table 4 presents the the statistical model‟s overall confirmatory factor
25-questions questionnaire that was used in this analysis (CFA) with R Square. Moreover, In
study. relation to this, Hair et al. [29] suggested the
model estimation to be estimated through the
IV. RESULT AND ANALYSIS maximum likelihood estimation procedures by
The data was analyzed through a two-step using the goodness-of-fit guidelines, like the
procedure established by Hair et al. [29]. First, normed chi-square, chi-square/degree of
the measurement model was examined for its freedom, normed fit index (NFI), relative fit index
reliability, as well as its convergent and (RFI), incremental fit index (IFI), Tucker-Lewis
discriminant validity. Second, the structural coefficient (TLI) comparative fit index (CFI), the
model was examined to analyze the proposed parsimonious goodness of fit index (PGFI), the
relationships among the constructs, in terms of rootmean-square residual (RMR) and the root
strength and direction. mean square error of approximation (RMSEA).
Table 2 presents the Summary of Goodness Fit
4.1 Construct Validity of Measurements Indices for the Measurement Model. See Table
The degree to which a particular factor is 1 and Table 2.
actually reflected in the quantified items is
TABLE 1. Confirmatory Factor Analysis Results
No Variables Code Factors Cronbach‟s Composite AVE R
Loading Alpha Reliability Square
1 CB1 0.8177
2 Cyber Bullying CB2 0.7937
3 CB3 0.8429 0.890 0.911 0.668 0.498
4 CB4 0.8173

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE Access

5 CB5 0.7993
6 CH1 0.8210
7 Cyber CH2 0.7525
8 Harassment CH3 0.8364 0.907 0.903 0.632 0.532
9 CH4 0.7746
10 CH5 0.7642
11 CE1 0.8344
12 Cyber CE2 0.8023
13 Engagement CE3 0.8465 0.899 0.909 0.601 0.000
14 CE4 0.7854
15 CE5 0.8345
16 CS1 0.8123
17 Cyberstalking CS2 0.8239
18 CS3 0.7360 0.910 0.900 0.708 0.507
19 CS4 0.8228
20 CS5 0.8004
21 SMU1 0.8340
22 Social Media SMU2 0.7109
23 Used SMU3 0.8345 0.923 0.920 0.698 0.000
24 SMU4 0.7395
25 SMU5 0.7739

TABLE 2. Summary of Goodness Fit Indices for the Measurement Model


Type of measure Acceptable level of fit Values
Root-Mean Residual (RMR) Close to 0 (perfect fit) .034
Normed Fit Index (NFI) Value should be equal to or greater than 0.90. .931
Relative Fit Index (RFI) Value should be equal to or greater than 0.90. .934
Incremental Fit Index (IFI) Value should be equal to or greater than 0.90. .947
Tucker Lewis Index (TLI) Value should be equal to or greater than 0.90. .945
Comparative Fit Index (CFI) Value should be equal to or greater than 0.90. .952
Root-Mean Square Error of Value below 0.10 indicates a good fit and below 0.05 is
Approximation (RMSEA) deemed a very good fit. .046

4.3 Discriminant Validity of Measurements exceeded 0.50. Having determined each factor‟s
The items‟ degree of difference within each item variance, it is imperative that the square
factor, as well as the difference among the root of the average variance among the relevant
factors, was tested through discriminant validity. items not be surpassed when the item
In accordance with [34], each construct‟s relationship between two factors, according to
discriminant validity was confirmed at a [29, 33]. See Table 3.
significance of p = 0.001, as all AVE results far
TABLE 3. Discriminant Validity of Measurements
Factors Code CB CH CS CE SMU
Cyber Bullying CB 0.8423
Cyber Harassment CH 0.6420 0.9732
Cyberstalking CS 0.5312 0.4329 0.9634
Cyber Engagement CE 0.5420 0.5510 0.4507 0.8316
Social Media use SMU 0.4991 0.4983 0.5501 0.4620 0.8961

4.4 Analysis of the Structural Model and Discussion


In order to investigate the different constructs‟ PLS algorithm. The identified path coefficients
correlations, the hypotheses were assessed are presented in figure 1, while the hypothesis
using the SmartPLS 3.0, which implemented the testing outcomes are outlined in figures 2.

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE Access

Additionally, table 3 presents the variables of subsequent Structural equation modeling SEM
cyberstalking, cyber harassment and cyber stage adopted confirmatory factor analysis CFA
engagement, and social media in general, in in order to verify the posited hypotheses. Figure
relation to cyber bullying. Table 3 also provides 2 indicates that all hypotheses were accepted.
the reliability and validity scores. The

FIGURE 2. Path Coefficients Results


The hypotheses developed for the factors‟ apparent that the structural framework‟s
correlations, as well as the research model, are assessment for verifying hypotheses and
supported by the findings. The structural determining the framework‟s validity is sound,
framework‟s standard errors and unstandardized with robust results given in relation to the crucial
coefficient results are presented in Table 4. It is statistical measures.

TABLE 4. Hypotheses testing results of Structural Model


H Independent Relationship Dependent Path S.E. T. Value Result
H1 SMU CH 0.3348 0.0154 13.400 Supported
H2 SMU CS 0.1930 0.0160 9.702 Supported
H3 SMU CE 0.4426 0.0122 27.111 Supported
H4 CE CH 0.1528 0.0137 7.943 Supported
H5 CE CS 0.4241 0.0137 24.994 Supported
H6 CH CS 0.3747 0.0142 19.624 Supported
H7 CH CB 0.2009 0.0132 10.246 Supported
H8 CS CB 0.2339 0.0209 9.762 Supported
Note: SE: Standard Error.
also positive and supported, as a relationship
Regarding the first hypothesis, the relationship exists between cyber engagement and
between social media use and cyber cyberstalking (β =0.4241, t =24.994, p < 0.001).
harassment achieved the following results (β Cyber harassment was further found to be
=0.3348, t =13.400, p < 0.001). Therefore, the positively and significantly related with
first hypothesis is positive and supported. The cyberstalking (β =0.3747, t =19.624, p < 0.001).
second hypothesis is also positive and The relationship between cyber harassment and
supported, as the analysis indicates a cyber bullying was also found to be positive and
relationship between social media use and significantly (β =0.2009, t =10.246, p < 0.001).
cyberstalking (β =0.1930, t =9.702, p < 0.001). Finally, the results also confirm that
The next direct effect is the relationship between cyberstalking is significantly related to cyber
social media use and cyber engagement (β bullying (β =0.2339, t =9.762, p < 0.001), thus
=0.4426, t =27.111, p < 0.001). Therefore, confirming hypothesis number 8.
hypothesis number 3 is positive and supported. In sum, the entire hypotheses are supported by
Moreover, hypothesis number four is also the results of this study, which consistent the
positive and supported, as the analysis also majority of the prior studies that reported the
indicates a strong relationship between cyber social media use affect cyber harassment, and
engagement and cyber harassment (β =0.1528, cyberstalking which in turn effect cyber bullying
t =7.943, p < 0.001). The next hypothesis five is [35, 36, 37, 43] that showed a negative impact

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE Access

on student academic performance but are 4.5 Implications and Contribution


contradict with others [38] that showed a positive Internationally, research on cyber bullying has
impact on student academic performance. In the rapidly evolved over the last years with the
current research majority of students (84.3%) findings indicating that, similarly to university
surveyed reported that they have been victims of and school bullying, participation is related to a
repeated cyber bullying, cyber harassment, and number of factors, which can be both individual
cyberstalking, a greater proportion than has and contextual. In terms of individual factors,
been found in previous studies [11]. The most research findings indicate that boys and
majority of victims also reported a double girls participate equally in cyber bullying, but
involvement in cyber harassment, and with different forms of deviant behaviors [12, 39].
cyberstalking, both as aggressor and as victim Therefore, this research indicates that
which in turn to effect cyber bullying. Added, regardless of the fact that these social media are
young students were more cyber bullying, cyber there to enhance our social experiences but
harassment, and cyberstalking [37]. many negative experiences were identified on
Cyber bullying negatively correlated with deviant cyber bullying, cyber harassment and
behavioral control. Psychological autonomy, cyberstalking. Therefore, contributed develop a
warm involvement and on-line disinhibition model for identifying the significant factors that
significantly predicted Cyberbullying, while are anticipated to play a major role in minimizing
psychological autonomy, cyber victimization cyber harassment, cyberstalking, and cyber
[39]. Added to the above, the use of social bullying among students.
media also brings cyber harassment, and
cyberstalking which in turn affect cyber bullying. V. CONCLUSION AND FUTURE WORK
However, in this research questionnaire sought This study investigated the factors that affect
responses to questions regarding specific cyber cyber bullying on cyber harassment,
bullying, cyber harassment, and cyberstalking cyberstalking among university students. In
conduct: whether the student had carried out or summary, our results indicate that exposure to
been subject to such acts. From the social media use and cyber engagement
respondents 51% got cyber bullying only, 47% amplifies cyber bullying, cyber harassment, and
got cyberstalking only, and 68% got cyber cyberstalking. These findings emphasize the
harassment only. While 84.3% respondents got importance of considering the roles that social
cyber bullying, cyber harassment, and media and cyber engagement play in everyday
cyberstalking. These findings differ a little from life in an effort to mitigate the negative effects
previous research [11, 38]. For Facebook, more associated with cyber bullying, cyber
than half of the people who use this platform harassment, and cyberstalking.
reported that have been the victims of Facebook
bullying at least one time in the last year. ACKNOWLEDGEMENTS
Additionally, most of these students have been We would like to thank the Research
confronted with abusive actions on this platform. Management Centre (RMC) at Universiti
As the use of the internet becomes a daily Teknologi Malaysia (UTM) for funding this
activity practiced by students, it is expected that project under grant number PY/2018/02903:
Q.J130000.21A2.04E40.
they face information or experiences regarding
other online threats, such as being victims of
REFERENCES
online hacking and data theft [35, 36].Thus, [1] C. David-Ferdon and M. Feldman Hertz. “Electronic media,
avoiding strangers on the internet and using violence and adolescents: an emerging public health
problem”. Journal of Adolescent Health 41:S1–S5, 2007.
online fabricated personas are common [2] D. Boyd. “Why youth heart social network sites: The role of
protective deviant behaviors against online networked publics in teenage social life”. In D.
threats and are considered as protective Buckingham (Ed.), Youth, identity, and digital media 199–
142. Cambridge, MA: MIT Press, 2008.
measures against these attacks [11, 37, 40, 43]. [3] R. Kowalski, S. Limber, and P. W. Agatston. “Cyber bullying.
Conversely, the web and web-based social Malden”. MA: Blackwell.2008.
networking have significantly expanded in [4] P. Agatson, R. Kowalski, and S. Limber. “Students‟
perspectives on cyber bullying”. Journal of Adolescent
simplicity and speed, and thus social networking Health 41, S59–S60, 2007.
sites also allow for the public sharing of [5] P. Bocij. “Cyber stalking: Harassment in the Internet age and
how to protect your family”. Greenwood Publishing
information, engagement, and collaborative Group.2004.
learning [19, 41, 42, 44, 45].

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE Access

[6] V. Starcevic, and E. Aboujaoude. “Cyberchondria, cyber [24] A. AlKaabi. “Strategic framework to minimise information
bullying, cybersuicide, cybersex:„new‟ psychopathologies security risks in the UAE”. University of Bedfordshire,
for the 21st century?”. World Psychiatry 14(1): 97–100, 2014.
2015. [25] P. P. Nicolle, and L. J. Moriarty. “Cyberstalking: Utilizing
[7] J. Bishop. “Representations of „trolls‟ in mass media What We Do Know. Victims & Offenders”. An International
communication: a review of media-texts and moral panics Journal of Evidence-based Research, Policy, and Practice
relating to „internet trolling‟”. International Journal of Web 2009; 4.4, 435-41, 2009.
Based Communities 10(1): 7, 2014. [26] S. Hinduja, and J. W. Patchin. “Cyberbullying: identification,
[8] F. Pereira, B. H. Spitzberg, and M. Matos. “Cyber-harassment prevention, and response”. Cyberbullying Research
victimization in Portugal: Prevalence, fear and help- Center. Retrieved May, 3, 2011.
seeking among adolescents”. Computers in Human [27] K.K. J. Seo, J. Tunningley, Z. Warner, and J. Buening. “An
Behavior 62: 136–146, 2016. Insight Into Student Perceptions of Cyberbullying”.
[9] M. O. Lwin, B. Li, and R. P. Ang. “Stop bugging me: An American Journal of Distance Education 30(1), 39-47,
examination of adolescents‟ protection behavior against 2016.
online harassment”. Journal of adolescence 35(1), 31-41, [28] F. A. Moafa, K. Ahmad, W. M. Al-Rahmi, N. Yahaya, Y.B.
2012. Kamin and M.M. Alamri, “Develop a Model to Measure the
[10] M. Fridh, M. Lindström, and M. Rosvall. “Subjective health Ethical Effects of Students through Social Media
complaints in adolescent victims of cyber harassment: Use.” IEEE Access. 6, (8466942), 56685-56699, 2018.
Moderation through support from parents/friends - A [29] J.F. Hair, and C.M. Ringle, “Sarstedt M. PLS-SEM: Indeed a
Swedish population-based study”. BMC Public Health silver bullet”. Journal of Marketing theory and Practice
15(1): 1–11, 2015. 19(2), 139-152, 2011.
[11] T. Beran, and Q. Li. “Cyber-Harassment: a Study of a New [30] A. Schrock, and D. Boyd. “Online threats to youth:
Method for an Old Behavior”. Journal of Educational Solicitation, harassment, and problematic content:
Computing Research 32(3): 265–277, 2005. Literature review prepared for the Internet Safety
[12] S. Hinduja, and J. W. Patchin. “Bullying beyond the Technical Task Force.2008.
schoolyard: Preventing and responding to cyber bullying”. [31] W. M. Al-Rahmi, N. Alias, M. S. Othman, V.I. Marin and G.
Thousand Oaks, CA: Sage.2009. Tur. “A model of factors affecting learning performance
[13] K. Mason. “Cyber bullying: A preliminary assessment for through the use of social media in Malaysian higher
school personnel”. Psychology in the Schools 45, 323- education”. Computers & Education 121, 59-72, 2018.
348, 2008. [32] T. Heiman, and D. Olenik-Shemesh. “Cyber bullying
[14] T. Varinder, and P. Kanwar. “Understanding social media”. Experience and Gender Differences Among Adolescents
Bookboon, 2012. in Different Educational Settings”. Journal of Learning
[15] N. B. Ellison, C. Steinfield, and C. Lampe. “The benefits of Disabilities 48 (2). 146-155, 2015.
facebook “friends:” Social capital and college students‟ [33] A. Alzahrani, B. C. Stahl, and M. Prior. “Developing an
use of online social network sites”. J. Comput. Commun instrument for e-public services‟ acceptance using
12, 4, 1143–1168, 2007. confirmatory factor analysis: Middle East contex”.. Journal
[16] A. Lenhart, M. Madden, A. Smith, K. Purcell., K. Zickuhr, of Organizational and End User Computing (JOEUC)
and L. Rainie. “Teens, Kindness and Cruelty on Social 24(3), 18-44, 2012.
Network Sites: How American Teens Navigate the New [34] C. Fornell, and D.F. Larcker. “Evaluating structural equation
World of" Digital Citizenship". Pew Internet & American models with unobservable variables and measurement
Life Project. 2011. error”. Journal of marketing research, 39-50, 1981.
[17] W. M. Al-rahmi, M. S. Othman and L. M. Yusuf, Exploring [35] S. Livingstone, L. Haddon, A. Görzig and K. Ólafsson.
the Factors that Affect Student Satisfaction through Using “Risks and safety on the internet: the perspective of
E-Learning in Malaysian Higher Education Institutions. European children: full findings and policy implications
Mediterranean Journal of Social Sciences, 6(4): 2015, from the EU Kids Online survey of 9-16 year olds and their
pp299-310. parents in 25 countries.2011.
[18] W. M. Al-Rahmi, M. S. Othman, and L. M. Yusuf, “The [36] W. Baker, M. Goudie, A. Hutton, C. D. Hylender, J.
effectiveness of using e-learning in Malaysian higher Niemantsverdriet, C. Novak and P. Tippett. “Data breach
education: A case study Universiti Teknologi Malaysia,” investigations report”. Verizon RISK Team.2011.
Mediterranean Journal of Social Sciences, vol. 6, no. 5, [37] J. Wolak, K. J. Mitchell and D. Finkelhor. “Does online
pp. 625- 637, 2015. harassment constitute bullying? An exploration of online
https://doi.org/10.5901/mjss.2015.v6n5s2p625 harassment by known peers and online-only
[19] W. M. Al-Rahmi, M. S. Othman, and L. M. Yusuf, “The contacts”. Journal of adolescent health 41(6), S51-S58,
effect of social media on researchers‟ academic 2007.
performance through collaborative learning in Malaysian [38] K. Williams and N. Guerra. “Prevalence and predictors of
higher education,” Mediterranean Journal of Social Internet bullying”. Journal of Adolescent Health 41(6),
Sciences, vol. 6 no. (4), pp. 193-203, 2015. S14–S21, 2007.
http://doi:10.5901/mjss.2015.v6n4s1p193 [39] M. Constantinos. Kokkinos, Nafsika Antoniadou, Angeliki
[20] A. Smith. “Protection of Children Online: Federal and State Asdre and Kyriaki Voulgaridou. “Parenting and Internet
Lawes Addressing Cyberstalking, Cyberharassment and Behavior Predictors of Cyber-Bullying and Cyber-
Cyberbuylling. Congressional Research Service Reports Victimization among Preadolescents”. Deviant Behavior,
for the People”. pág, 4.2009. 37:4, 439-455, 2016.
[21] M. Fishbein, and I. Ajzen. “Belief Attitude, Intention and [40] F. A. Moafa, K. Ahmad, W. M. Al-Rahmi, N. Alias and
Behavior: An Introduction to Theory and Research M.A.M. Obaid. “Factors For Minimizing Cyber Harassment
Reading”. 6, 1975. Among University Students: Case Study In Kingdom Of
[22] W. M. Al-Rahmi, N. Alias, M. S. Othman, I. A. Ahmed, A. Saudi Arabia (KSA)”. Journal of Theoretical & Applied
M. Zeki and A.A. Saged, “Social Media Use, Collaborative Information Technology 96(6), 2018.
Learning and Students' academic Performance: A [41] W. M. Al-Rahmi, M.S. Othman and L.M. Yusuf. “Effect of
Systematic Literature Review of Theoretical Engagement and Collaborative Learning on Satisfaction
Models”. Journal of Theoretical & Applied Information Through the use of Social Media on Malaysian Higher
Technology, 95(20). 5399-5414, 2017. Education”. Research Journal of Applied Sciences,
[23] S. Jameson. “Cyberharrasment: Striking a balance between Engineering and Technology 9, 12, 1132-1142, 2015
free speech and privacy”. CommLaw Conspectus 17, [42] W.M. Al-Rahmi, N. Alias, M.S. Othman, A. I. Alzahrani, O.
231, 2008. Alfarraj, A.A. Saged and N.S. Abdul Rahman. "Use of E-

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE Access

Learning by University Students in Malaysian Higher


Educational Institutions: A Case in Universiti Teknologi
Malaysia." IEEE Access 6, 14268-14276, 2018.
[43] M. Tezer. “Cyber Bullying and University Students:
Behaviours, Opinions and Reactions.” International
Journal of Educational Sciences, 19:2-3, 199-204, 2017.
[44] W. M. Al-Rahmi, M.S. Othman, and L.M. Yusuf. “Using
Social Media for Research: The Role of Interactivity,
Collaborative Learning, and Engagement on the
Performance of Students in Malaysian Post-Secondary
Institutes. Mediterranean Journal of Social Sciences, 6(5),
536, 2015.
[45] W. M. Al-Rahmi, M. S. Othman, and L. M. Yusuf, “Social
media for collaborative learning and engagement:
Adoption framework in higher education institutions in
Malaysia,” Mediterranean Journal of Social Sciences, vol.
6 no. 3S1, pp. 246-252, 2015.

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2881292, IEEE
Access

Appendix
Factors No Items
1 The use of bad social media is considered a form of cyber bullying, cyber
harassment, and cyber stalking.
2 Pretending to be another person without that person‟s approval on social
Social Media media is considered a form of cyber bullying, cyber harassment, and cyber
Used stalking.
3 Entering someone‟s personal page on social media without their approval is
considered a form of cyber bullying, cyber harassment, and cyber stalking.
4 I feel that using of social media will be easy in my study but sometime it‟s
considered a form of cyber bullying, cyber harassment, and cyber stalking.
5 I feel that using social media will be easy to incorporate in my study but
sometime its considered a form of cyber bullying, cyber harassment, and
cyber stalking.
1 By using of social media, via interactions with other peers I had cyber
engagement.
Cyber 2 By using the social media in my study has favored my personal relationships
Engagement with my peers but I had cyber engagement.
3 By using of social media, I am not satisfied with the cyber engagement.
4 By using of social media, I had frequent conversations with peers, but I had
cyber engagement.
5 By using the social media I felt that my opinions have been taken into account
via my peers but I had cyber engagement.
1 I bullied others students through social media use outside my university.
Cyber Bullying 2 I bullied others students through social media use inside my university.
3 I bullied others students through cyber engagement outside my university.
4 I bullied others students through cyber engagement inside my university.
5 I need to learn to deal with cyber bullying by myself.
1 I harassed others students through social media use outside my university.
2 I harassed others students through social media use inside my university.
Cyber 3 I harassed others students through cyber engagement outside my university.
Harassment 4 I harassed others students through cyber engagement inside my university.
5 Cyber harassment has direct influence on cyber bullying. Thus, Impact on
academic achievement.
1 I stalked others students through social media use inside my university.
2 I stalked others students through social media use outside my university.
Cyberstalking 3 I stalked others students through cyber engagement outside my university.
4 I stalked others students through cyber engagement inside my university.
5 Cyber stalking has direct influence on cyber bullying. Thus, Impact on
academic achievement.

2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
View publication stats http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

You might also like