Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Computers in Human Behavior 29 (2013) 16–25

Contents lists available at SciVerse ScienceDirect

Computers in Human Behavior


journal homepage: www.elsevier.com/locate/comphumbeh

Facebook bullying: An extension of battles in school


Grace Chi En Kwan, Marko M. Skoric ⇑
Wee Kim Wee School of Communication and Information, Nanyang Technological University, 31 Nanyang Link, Singapore 637718, Singapore

a r t i c l e i n f o a b s t r a c t

Article history: This study examines the phenomenon of cyberbullying on Facebook and how it is related to school bul-
Available online 11 August 2012 lying among secondary school students in Singapore, aged 13–17. We also focus on generic use of Face-
book and risky Facebook behaviors as the predictors of cyberbullying and victimization on Facebook.
Keywords: 1676 secondary students, from two secondary schools, participated in a pen and paper survey. The find-
Facebook ings show that the intensity of Facebook use and engagement in risky Facebook behaviors were related to
Cyberbullying Facebook victimization and Facebook bullying, respectively. Moderately strong positive relationships
Risky Facebook use
between school bullying and Facebook bullying, as well as between school victimization and Facebook
Singapore
victimization, were also uncovered.
Ó 2012 Elsevier Ltd. All rights reserved.

1. Introduction cial network sites could be found in the United States as well as
in Singapore, the research site for this study. While there has been
Research on bullying has been carried out for decades. The rea- plenty of research looking into cyberbullying across different plat-
son for this drive to understand the phenomenon lies in the fact that forms, none has specifically measured bullying that takes place
victims of bullying experience a range of negative effects from poor over SNSes, such as Facebook. By tailoring measures of cyberbully-
academic performance to emotional trauma and even suicide ing of Cassidy, Jackson, and Brown (2009) and Patchin and Hinduja
(Dupper & Meyer-Adams, 2002; Glover, Gough, Johnson, & Cart- (2010) to the context of Facebook, this study hopes to contribute to
wright, 2000; Ma, Phelps, Lerner, & Lerner, 2009; Meadows, the literature of cyberbullying by exploring how it is manifested on
2005). However, while researchers have been focused on studying a social network site.
face-to-face (FTF) or traditional bullying, communication technolo- Research shows that the likelihood of being involved in cyber-
gies have been evolving. Social interactions are now occurring in a bullying is predicted by the time spent online (Hinduja & Patchin,
technology-mediated context as much as they are occurring FTF. 2008) and risky online behaviors (Erdur-Baker, 2010). Therefore,
Furthermore, the widespread use of social network sites (SNSs) this study also examines how the intensity of Facebook use (Elli-
and content-sharing sites has significantly transformed the nature son, Steinfield, & Lampe, 2007) and engagement in risky Facebook
of everyday social interactions. use relate to both the involvement in Facebook bullying and likeli-
Accompanying this shift in communication is the emergence of hood of Facebook victimization. We also seek to establish the rela-
cyberbullying. Essentially, cyberbullying is bullying that occurs via tionship between school bullying and victimization and their
information and communication technologies (ICTs). This study Facebook equivalents.
more specifically focuses on bullying that happens via Facebook,
a popular SNS, which has an estimated 2.4 million users in Singa- 2. Literature review
pore, as of April 2011, of which, 13% are aged 13–17 (Socialbakers.,
2011). Aside from the fact that Facebook is a popular social net- 2.1. Defining bullying
work site (SNS) among Singaporeans, this study focused on Face-
book as a case study for bullying over SNS due to the specific Bullying can be defined as a prolonged mistreatment by a person
affordances of the platform. Social network sites allow users to who harbors malicious intentions and who is perceived to be more
post comments on each other’s profile pages, send private mes- powerful than the victim of abuse (Hinduja & Patchin, 2007). Face-
sages, comment on each other’s postings, upload photos and vid- to-face (FTF) bullying can be carried out physically, verbally or
eos, organize group events and join interest groups. While being relationally (Woods & Wolke, 2004). Physical and verbal bullying
a facilitator of social interaction, these same tools could also be are forms of direct bullying. While physical bullying involves
used for cyberbullying. Examples of teenage victimizations on so- hitting, taking of belongings, shoving, and kicking, verbal bullying
involves teasing, taunting, name-calling and being insulting.
⇑ Corresponding author. Tel.: +65 6316 8893; fax: +65 6792 4329. Relational bullying is an indirect manner of bullying and involves
E-mail address: marko@ntu.edu.sg (M.M. Skoric). the spreading of gossip and rumors (Woods & Wolke, (2004)).

0747-5632/$ - see front matter Ó 2012 Elsevier Ltd. All rights reserved.
http://dx.doi.org/10.1016/j.chb.2012.07.014
G.C.E. Kwan, M.M. Skoric / Computers in Human Behavior 29 (2013) 16–25 17

In defining bullying, it is important to take into account the bullying (Campbell, 2005). Willard (2007) listed eight forms of
motivations of the perpetrator. Rigby (2008) illustrated the differ- cyberbullying:
ence between aggression and bullying using the following exam-
ple. Aggression may occur when two children resolve a conflict 1. Flaming: Angry and vulgar online exchanges.
in an aggressive manner, like that of fighting. However, this act 2. Harassment: Repeated sending of nasty and insulting messages
of aggression is not necessarily bullying if both parties are equal to the victim.
in strength and there is no power differential between them. Bul- 3. Denigration: Spreading of rumors and gossiping about a person
lying carries with it a malicious intent to hurt a weaker party. online to damage his/her reputation or friendship.
Therefore, bullying could also be defined as a ‘‘systematic abuse 4. Impersonation: To cause someone to get into trouble or to dam-
of power in interpersonal relationships’’ (Rigby, 2008). This defini- age someone’s reputation by pretending to be that person and
tion suggests that the perpetrator is conscious of the power differ- sending material on that person’s behalf.
ential and uses it to hurt the victim. The victim, in turn, feels 5. Outing: Sharing secrets or humiliating information of another
oppressed and helpless. person on the Internet.
6. Trickery: To convince someone to share humiliating informa-
2.2. Prevalence of bullying tion, then making the information available online.
7. Exclusion: To intentionally exclude someone from an online
The prevalence of bullying has been studied in many different group in order to cause hurt to the person.
countries and contexts. For example, 16% school children in 8. Cyberstalking: To repeatedly harass someone such that the per-
Australia, aged 7–17, reported being bullied (Rigby (2008)). In son feels threatened or afraid.
Korea, a study of 13–15 year old youths found that around 14%
of students were involved in bullying (Rhee, Yun, & Khang, Victims of cyberbullying have been found to suffer significant
2007), while panel study conducted on the Japanese form of bully- psychological harm like feeling threatened and distressed
ing, ijime, which consisted of name-calling, isolation and ignoring (National Center for Missing, 2000), and have even committed
of someone, is practiced by around 8% of primary school and junior suicide when they were no longer able to cope with the abuse
high school students (Taki, 2001). In Singapore, a study of primary (Meadows, 2005, March 14). In a study of adolescents’ experiences
and secondary school students found that around 13% were bullied with cyberbullying, about half of the respondents thought that
on a weekly basis (Ng & Rigby, 2010) though 94.7% of respondents cyberbullying had an equal or more serious impact than traditional
have experienced at least one of the 21 types of bullying behaviors bullying (Kapatzia & Sygkollitou, 2007).
listed in the questionnaire. These statistics suggests that bullying is A well-known case of cyberbullying involved Megan Meyer, a
a problem that is common to cultures and nations, and that the so- teenage girl from Missouri, US (Steinhauer, 2008, November 26).
cial climate in Singaporean schools is similar to those in other Megan committed suicide after being harassed by an adult, who
countries. posed as a 16-year-old boy in MySpace. It was later discovered that
the adult was the mother of the girl’s friend. Another publicized
2.3. Demographic factors and bullying incident of cyberbullying occurred in 2003, in which a video tape
of a Canadian teenager pretending to be a character from Star Wars
Research on bullying has found several key demographic pat- was stolen from his school and uploaded onto a website (Snider &
terns that affect likelihood of being involved in bullying. Boys, in Borel, 2004). This attracted millions of hits to the website and the
general, bully more often than girls (Boulton & Smith, 1994; Boul- teenager was teased relentlessly in school, causing him to change
ton & Underwood, 1992; Rigby, 2008). Proportion of boys who re- schools. Though these were isolated incidents of cyberbullying,
port high frequencies of victimization is also greater than that of they illustrate how cyberbullying can have real and devastating
girls. Notably, boys and girls differ in the types of bullying they impact on its victims. While cyberbullying excludes the possibility
experience. Boys are more likely to be physically bullied while girls of physical abuse that is common in FTF bullying, research has
usually report being bullied verbally or relationally (Crick & Grot- found that compared to physical abuse and direct verbal abuse,
peter, 1995; Crick, Bigbee & Howes, 1996; Rigby, 2008; Smith & relational abuse causes greater distress (Coyne, Archer & Elsea,
Shu, 2000). As children grow up, they tend to engage in less bully- 2006). Sharp’s (1995) study on 13–16 years old secondary students
ing. A study of 4000 students in Australia, grades 7–11, found that also found that indirect aggression, involving spreading rumors
victimization peaks at grade 8, followed by a decrease in reported and telling tales to be perceived as most hurtful.
frequencies (Marsh, Parada, Craven, & Finger, 2004). However,
Rigby (2008) noted that changes in school environment, like that
of moving from primary to secondary school, might result in an in- 2.5. Cyberbullying in technophilic Singapore
crease in bullying. He suggested that it is a result of a need to rees-
tablish social ranking and status in a new environment. In 2009, 81% of Singapore households had Internet access (Info-
comm Development Authority, 2010) and mobile penetration rate
2.4. Bullying-conducive environments stood at 137.4% (Infocomm Development Authority, 2010). Singap-
oreans aged 15 and above, spent an average of 21 h online in the
Bullying usually occurs when there is a lack of adult supervision month of February in 2009 (comScore (March 27, 2009, March
and when there is a presence of an audience (Rigby, 2008). Smith & 27. Online users spent an average of 10 h in April 2010 viewing on-
Shu (2000) found that the common venues for school bullying to line videos, watching a total of 320 million videos in that month
occur were the playground, corridors and hallways. With the alone (comScore, 2010b, June 3). The younger users, between the
advancement of various new communication platforms, the access ages of 15 and 24, were found to display the strongest online video
to such bullying-conducive environments is greatly increased. Fur- engagement, watching 192 videos per viewer in April 2010. Fur-
thermore, parents often find it difficult to adapt to new online thermore, Internet users are found to spend 24.2% of their time
environments as quickly as their children, failing to understand on Instant Messaging and 8% on social network sites (comScore
their use for purely social purposes (Ribak, 2001). (March 27, 2009, March 27). In fact, Singapore was ranked 5th in
Bullying which takes place over communication platforms like SNS penetration rate in the Asia Pacific markets with 83.7% pene-
email, chat rooms, mobile phones and websites is termed cyber- tration rate as of February 2010 (comScore, 2010a, April 7).
18 G.C.E. Kwan, M.M. Skoric / Computers in Human Behavior 29 (2013) 16–25

The likelihood of being involved in cyberbullying is predicted by 2.5.1. Wider audience


the time spent online (Hinduja & Patchin, 2008). Given that, it is no The first two characteristics (i.e. wider audience, longevity of
wonder that cyberbullying is becoming a cause for concern in a message) of cyberbullying relate to the effectiveness of the Internet
technophilic society such as Singapore. It was found that among as a communication tool. SNS have become a key platform for on-
Singaporean students, ages 13–17, 25% have experienced cyberbul- line interaction among Singaporean youths (comScore, 2010a,
lying and 31% reported being cyberbullied on top of being bullied April 7) and vast amounts of content sharing takes place over social
in school (Chew, 2010). These figures included reports of bullying media. The connectivity provided by the Internet allows audiences,
over various communication platforms, including chat rooms, beyond one’s social circle, to access humiliating content. Facebook,
emails, instant messages, blogs and mobile phones. Specifically, in particular, has various applications, which allow users to effi-
stories of cyberbullying occurring in social media have called to ciently search and find long-lost friends or add new friends to their
attention the misuse of these platforms. networks. Friends Finder, for example, acts like a search engine for
In 2008, a 16-year-old Singaporean girl was found to create fake friends. By suggesting friends to users based on number of mutual
profiles on social network sites, such as MySpace and Facebook, to friends, this application can be used to expand one’s Facebook net-
befriend people whom she disliked in school. After making friends work easily.
with them online, she started hurling insults at them (Tan, 2008, While FTF bullying usually involves the interaction between the
December 15). The school discovered what she was doing and bully and the victim, cyberbullying may be witnessed by the un-
she was stopped before the victims suffered deeper emotional known masses on the Internet. Slonje and Smith (2008), in their
scars (Tan, 2008, December 15). Another 14-year-old Singaporean study on Swedish adolescents, ranging from 12 to 20 years, found
boy was spammed with sexually offensive messages through his that cyberbullying that used pictures or video clips were perceived
Friendster account. Even after reporting to the police, the cyberbul- as having greater impact than traditional bullying due to the visual
lies were never found and the boy was told that nothing else could information and the fear of an unknown audience for these
be done (Tan, 2009, February 11). These are but a few stories of materials.
cyberbullying. It is likely that many cyberbullying victims are suf-
fering in silence. This trend, however, has triggered efforts from the 2.5.2. Longevity of messages
Singapore Ministry of Education to combat cyberbullying by intro- The Internet’s capacity for storing an unlimited amount of con-
ducing a framework that aims to encourage respectful interactions tent for an extended period of time constitutes another character-
on cyberspace and to raise awareness of issues regarding Internet istic of cyberbullying. Longevity of messages in cyberbullying
safety (Ng, 2010). challenges the definition of FTF bullying, which involves abuse that
Given the extant literature on cyberbullying, paired with the takes place over a period of time. Uploaded video clips or posts,
widespread use of SNSes in Singapore, the study proposes the fol- containing abusive content, can be accessed long after they were
lowing hypotheses regarding the generic use of Facebook and first posted. As digital content is easily replicated (boyd, 2008), on-
involvement in Facebook bullying and Facebook victimization: line content can be downloaded and ‘‘reposted’’ in its exact form. In
this regard, cyberbullies lose some, if not all, of the ownership and
H1. Intensity of Facebook use is positively related to engagement distribution control of the content once it is posted online. Unlike
Facebook bullying. FTF bullying where one can be held accountable for ones’ actions
and words, cyberbullying allows diffusion of responsibility. Audi-
ences of cyberbullying may feel less personally responsible for
H2. Intensity of Facebook use is positively related to Facebook redistributing content due to the large number of people engaged
victimization. in the same activity (Petty, Harkins, Williams, & Latane, 1977).
Furthermore, Facebook has been found not only to extend one’s The terms of Facebook use also state that users, depending on
online social network, but also to be of prime importance for the their privacy and account settings, grants Facebook ‘‘a non-exclu-
maintenance of existing offline relationships (Ellison et al., 2007). sive, transferable, sub-licensable, royalty-free, worldwide license
boyd and Ellison (2007) described social network sites as egocen- to use any IP content’’ posted on Facebook (Facebook, 2010). This
tric networks, in which individuals are at the center of their own copyright license will only end when users delete their Facebook.
online social networks. The overlap between offline and online so- However, if the content has been shared with other users, Face-
cial networks is likely to result in the translation of power relation- book continues to own this content. Therefore, victims of Facebook
ships which exist in offline networks to online networks. For these bullying are subjected, not only perpetrators’ abuse, but feel help-
reasons, this study proposed the following hypotheses: less against corporate ownership of this abusive content that may
continue to circulate long after the incident occurred.
H3. Engagement in school bullying is positively related to engage- The provision of sensitive and personal information on Face-
ment in Facebook bullying. book puts individuals in vulnerable positions, and could be used
as ammunition by people with malicious intentions. The same
affordances which allow Facebook users to connect and share
H4. School victimization is positively related to Facebook information could be used to cause mental and emotional abuse.
victimization. Therefore, this study proposed the following hypothesis:
While Facebook has features that facilitate the extension one’s
social network and maintenance of existing relationship with H5. Engagement in risky Facebook use is positively related to
acquaintances and friends, (Ellison et al., 2007), these same fea- victimization on Facebook.
tures can also be used with ill intentions to harass and abuse oth-
ers. Intuitively, one may understand cyberbullying to be simply an
extension of FTF bullying to ICT platforms. However, three key 2.5.3. Anonymity in cyberbullying
characteristics of cyberbullying distinguish it from FTF bullying: Computer-mediated communication (CMC) provides the users
wider audience, (Campbell, 2005; National Center for Missing & with the option of remaining anonymous. Interaction in chat
Exploited Children, 2006; Shariff, 2005), longevity of message rooms, over emails and even social media can occur without full
(Cassidy et al., 2009) and anonymity of bully (Campbell, 2005; disclosure of one’s identity. Anonymity is associated with disinhib-
Chisholm, 2006; Shariff, 2005). iting effect when engaging in CMC, which may change the manner
G.C.E. Kwan, M.M. Skoric / Computers in Human Behavior 29 (2013) 16–25 19

of self-disclosure and self-portrayal. The online disinhibition effect races. Respondents were evenly divided across the ages of 13–17,
is defined as the ‘‘loosening of psychological barriers that serve to with only 0.7% being age 18 and above. The mean age of the sample
block the release of innermost, private thoughts, feelings, and was 15. Majority of the sample was in the Express stream (54.2%),
needs’’ (Chisholm, 2006, pp. 77). Indeed, it was found that a signif- followed by the Normal (Academic) (32.6%) and Normal (Techni-
icant number of teenagers admitted to taking on alternative perso- cal) (12.5%) streams. Students from the Express stream were
nas online and engaging in online activities in which they would slightly under-represented (Ministry of Education Singapore.,
not have taken part in real life (Cassidy et al., 2009). While many 2010). Majority (68.8%) of the sample reported living in 4-room
Facebook users choose to reveal their identity in order to facilitate and 5-room HDB (subsidized public housing) flats. The median
social interactions with their offline friends, it is possible to create parental highest education qualifications were ‘O’ Levels. Majority
several accounts and assume various online personas. In South (80.8%) of the sample did not employ domestic helpers. Means and
Korea, users of the SNS, Cyworld, are required to provide their na- stand deviations of all variables are presented in Table 1.
tional identity numbers when registering an account. Facebook,
however, does not have such measures in place to ensure that each 3.2. Procedure
user is interacting using their true or offline identity. Therefore, the
option to assume another identity on Facebook may empower The questionnaires were administered by the form teacher of
Facebook bullies, who might not have engaged in abuses using each class during their home period. Each form teacher was given
their real identities, although this does not seem to be common an instruction sheet to ensure that: enough time was allowed for
practice. the completion of the questionnaires, students did not write their
The disinhibition effect of CMC also shelters the cyberbully from names on the questionnaires and that students did not discuss
the consequence of his or her actions (Blumenfeld, 2005). Perhaps their answers while filling in the questionnaires. At the beginning
due to the disinhibiting effects of CMC, cyberbullying was found to of the questionnaire, the respondent were informed that they
be more retaliatory than FTF bullying (Erdur-Baker, 2010). It is pos- could skip questions should they feel uncomfortable answering
sible that victims of cyberbullying may also be empowered to en- them. The completed questionnaires from each class were then
gage in retaliatory attacks through the online medium. Therefore, handed to the person-in-charge at each school.
this study proposed the following hypothesis:
3.3. Measures
H6. Engagement in Facebook bullying is positively related to
victimization on Facebook. 3.3.1. Cyberbullying
To assess the extent to which Singaporean youths experience
cyberbullying, two scales measuring cyberbullying behaviors (bul-
3. Method lying and victimization) were developed based on the measure-
ments used in the studies by Cassidy et al. (2009) and Patchin
3.1. Design and sample and Hinduja (2010). As this study focuses on cyberbullying that oc-
curs on Facebook, the items were rephrased so that they are rele-
The data for this study is obtained through convenience sam- vant to the platform. Respondents were asked to indicate the
pling of secondary school students in Singapore, aged 13–17. Data number of times (Never, Once, 2–4 times, 5–7 times, 8–10 times
collection was completed over a span of 3 weeks in March 2011. or More than 10 times) at which they have engaged in specific bul-
The survey questionnaires were available only in English. Before lying activities since the start of the school year. The scale was reli-
proceeding with data collection, a sample of the questionnaire able with Cronbach’s a of .86.
was sent to the Ministry of Education to seek permission to collect Respondents were also asked to indicate the number of times
data in the secondary schools. The questionnaire was approved by (Never, Once, 2–4 times, 5–7 times, 8–10 times or More than 10
the Ministry to ensure that it did not contain sensitive or inappro- times) at which they experienced cyberbullying since the start of
priate questions. The researcher approached the principals of sev- the school year. The scale was reliable with Cronbach’s a of .89.
eral secondary schools to seek permission to conduct data
collection in their respective schools. The schools approached con- 3.3.2. School bullying
sisted of government, government-aided, independent, single-sex In order to provide a context in which cyberbullying is taking
and co-ed schools. However, the researcher was only able to gain place and to understand how Facebook bullying is related to school
access to two government co-ed schools. The researcher was able bullying, this study included measures for school bullying and vic-
to collect data from the entire school from School A and 10 classes timization. The scale is similar to that of Facebook bullying in that
from School B. However, the questionnaires from one class of it provides a list of different instances of bullying instead of asking
School A were misplaced while in the care of the teacher-in-charge. the respondent if they have bullied directly. The items of the school
A total of 1676 questionnaires were collected, of which, only 1597 bullying scale were adapted from the questionnaire used by Ng &
were included in the analysis as 79 respondents were foreigners Rigby’s (2010) in a study based in Singapore. These items consisted
and thus excluded from the analysis. of physical, verbal and relational bullying and students were asked
It is advised that when using a non-probability sample in a sta- the number of times they have experienced or engaged in these
tistical analysis, a comparison between the convenience sample activities in the past school year (Never, Once, 2–4 times, 5–7
and the population across a range of variables can strengthen the times, 8–10 times or More than 10 times). There are 14 items for
case for its representativeness (Wilkinson & the Task Force on Sta- school victimization (Cronbach’s a = .88) and 14 items (Cronbach’s
tistical Inference, 1999). Because this study used a non-probability a = .90) for school bullying.
sample, a comparison between the demographic information from
the sample and that of official national data was performed, indi- 3.3.3. Facebook use
cating that the sample is a good representation of the population. Facebook users were asked to respond to a series of questions
The sample was found to reasonably approximate the Singapore based on the Facebook Intensity scale (Cronbach’s a = .82) (Ellison
population in terms of race and gender. 48% of the sample was et al., 2007). These questions include the number of friends they
males, and 52% was females. 72.2% of the respondents were Chi- had and amount of time spent on Facebook. The respondents were
nese, 15.2% was Malay, 7.7% was Indian and 2.9% was of other asked six questions which measured their level of attachment to
20 G.C.E. Kwan, M.M. Skoric / Computers in Human Behavior 29 (2013) 16–25

Table 1 were measured. Other than the intensity of Facebook use, a scale
Demographic information. was created to measure the level of risky Facebook use that youths
Demographic information % engaged in on Facebook. These items consist of measures for per-
Age sonal information disclosure, posting of content which could com-
13 22.0 promise one’s safety and befriending strangers. This measure was
14 23.3 moderately reliable with a Cronbach’s a of .72.
15 25.4 All the above measures were pretested with about 40 secondary
16 22.0
17 7.3
school students aged 13–17 before data collection commenced, to
ensure satisfactory reliability scores. Wordings of questions were
Gender
Male 48.4
also edited after the pretest to ensure that students were able to
Female 51.6 understanding the wordings of the questions.
Race
Chinese 73.7
Malay 15.5 4. Findings
Indian 7.9
Other 2.9
4.1. Prevalence of Facebook bullying
Secondary level
1 19.5
2 23.9
Facebook bullying seemed to be relatively common with 59.4%
3 25.4 of Facebook users (n = 1493) reported experiencing at least one
4 24.8 form of bullying in the past year and 56.9% of users (n = 1491)
5 6.4 admitting to engaging in at least one form of Facebook bullying.
Academic stream The frequency of each Facebook bullying instance is presented
Express 54.6 in Tables A.1 and A.2, which can be found in Appendix A. It was
Normal (academic) 32.8
found that the receiving of nasty messages was the most common
Normal (technical) 12.6
form of Facebook bullying, with 28.5% of respondents experiencing
Housing
this at least once in the last school year. Other common forms of
1-room HDB 1.2
2-room HDB 6.1 Facebook bullying include being insulted on Facebook repeatedly
3-room HDB 6.0 and being made a laughing stock on Facebook by others, 22.6%
4-room HDB 36.3 and 23.3% of respondents have experienced these respectively.
5-room HDB 32.5 Being threatened on Facebook, being excluded from Facebook
Condominium and private 8.1
flats
groups, and being tricked into revealing secrets on Facebook are
Terrace house 3.1 the least common forms of Facebook victimization. Less than
Semi-detached bungalow 1.8 5% of respondents have experienced these types of Facebook
Other 0.6 bullying.
Mother’s education level On other hand, blocking someone on Facebook seems to be
No formal education 8.6 quite commonly practiced among the youths surveyed; around
PSLE 16.0
half of the respondents (45.5%) have blocked someone on Facebook
‘N’ Levels 5.5
‘O’ Levels 34.5 at least once. 13% of respondents said that they have sent nasty
NITEC/ITE 2.2 messages to someone on Facebook and 13.9% admitted to saying
‘A’ Levels 6.4 something to make someone a laughing stock on Facebook. Mas-
Diploma 11.8 querading, threatening others and hacking into someone’s Face-
University degree 11.7
book account are the least common forms of Facebook bullying
Post graduate 3.4
practiced by the youths, with less than 2% of respondents admit-
Father’s education level
ting to engaging in these activities.
No formal education 5.4
PSLE 16.1
‘N’ Levels 5.7
‘O’ Levels 27.5 4.2. Prevalence of school bullying
NITEC/ITE 5.0
‘A’ Levels 4.4
Diploma 14.0
In general, school bullying seems to be more prevalent than
University degree 16.6 Facebook bullying. 84.5% of respondents (n = 1590) reporting hav-
Post graduate 5.3 ing experienced at least form of bullying at least once in the past
school year. 71.4% of respondents (n = 1589) admitted to engaging
in at least one form of bullying at least once in the past school year.
The frequencies of school bullying are reported in Tables A.3
and A.4, which can be found in Appendix A. The most common
Facebook on five-point Likert scales (1 = Strongly Disagree; forms of school bullying are hitting, punching, biting, pushing
5 = Strongly Agree). These include: Facebook is part of my everyday and shoving, with 61.1% of respondents saying that they have
activity; I am proud to tell people I am on Facebook; Facebook has experienced this at least once in the school year and 46.6% admit-
become part of my daily routine; I feel out of touch if I do not log ting to engaging in these types of bullying before. The use of vulgar
into Facebook for a while; I feel that I am part of the Facebook com- language is also common among the youths. 58.6% of respondents
munity; I would be sorry if Facebook shuts down. All 8 items were have been verbally abused at least once and 46.6% said that they
combined to form a measure for the intensity of Facebook use. In have used vulgarities against someone. The least common form
addition to the Facebook intensity scale, risky Facebook usage of bullying reported in the demanding of money, with 10.6% of
was also measured. Engagement in risking cyber behaviors like respondents experiencing this and 4.9% engaging in this form of
sharing of Facebook password, accepting friend requests from bullying. However, one may argue that 1 victim out of 10 students
strangers and posting of inappropriate information and photos is still a relatively high percentage.
G.C.E. Kwan, M.M. Skoric / Computers in Human Behavior 29 (2013) 16–25 21

Table 2
Correlation matrix for demographics, Facebook use, emotional support and bullying.

1 2 3 4 5 6 7 8 9 10 11
1 Age
2 Gender .04
3 Race .05 .03
4 Type of housing .02 .01 .001
5 Normal Stream .18** .16** .10 .08**
6 School Bully .06* .18** .01 .03 .09
7 School Victimization .05 .13** .08** .01 .15** .58**
8 Facebook Bully .002 .07* .01 .02 .01 .56** .33**
9 Facebook Victimization .05 .06* .02 .05 .04 .28** .48** .54**
10 Facebook Intensity .03 .02 .06* .01 .04 .12** .08** .16** .18**
11 Risky Facebook Use .17** .09** .02 .02 .10** .29** .14** .33** .22** .21**
*
p < .05.
**
p < .01.

Table 3
Regressions predicting school bullying, school victimization, Facebook bullying and victimization from demographic, school bullying involvement, Facebook usage variables, and
Facebook bullying variables (N = 1446).

School bullying School victimization Facebook bullying Facebook victimization


b b b b
Demographics
Age .06 .10** .03 .02
Gender .11** .01 .03 .01
Race .03 .08** .02 .02
Type of housing .02 .002 .01 .04
Normal stream .03 .10** .04 .01
R2 change .04** .04** .01 .01**
School bullying involvement
School bully – .58** .37** .18
School victimization .54** – .08** .44**
R2 change .31** .31** .24** .24**
Facebook usage
Intensity of Facebook use .09** .01 .004 .11**
Risky Facebook Use .18** .02 .14** .04
R2 change .04** .00 .04** .03**
Facebook bullying involvement
Facebook Bullying – – – .40**
Facebook victimization – – .40** –
R2 change – – .11** .11**
Total R2 adj. (%) 39.1 35.0 38.7 38.8
F 117.11** 97.89** 92.40** 92.85**

Table shows controls for age, gender and race.



p < .05.
**
p < .01.

4.3. Bivariate analyses victimization (r = .18, p < .001). Risky Facebook use was found to
be related to higher level of victimization on Facebook (r = .22,
Pearson correlation coefficients were computed to access the p < .001). Interestingly, risky Facebook use was also found to be
relationship between all demographic, school bullying and Face- positively related to engagement in Facebook bullying (r = .33,
book bullying variables. The results are presented in Table 2. p < .001).

4.3.1. Relationship between school and Facebook bullying 4.4. Multivariate analyses
In general, being involved in school bullying is positively related
to being involved in Facebook bullying (r = .56, p < .001) as well as 4.4.1. Predicting engagement in Facebook bullying
to being victimized on Facebook (r = .28, p < .001). Being victimized Regression analysis predicting engagement in Facebook bully-
in school is positively related to being victimized on Facebook ing with engagement in school bullying, victimization in school,
(r = .48, p < .001) as well as to being a Facebook bully (r = .33, Facebook usage, risky Facebook usage, and Facebook victimization
p < .001). was conducted. Demographic variables of age, race, gender, type of
housing and academic stream were included in the analysis.
4.3.2. Bullying and victimization on Facebook There was no significant relationship between intensity of Face-
It was found that level of engagement in Facebook bullying is book use and engagement in Facebook bullying. Therefore, H1 was
positively related to level of victimization on Facebook (r = .54, not supported. Engagement in school bullying (b = .37, p < .001)
p < .001). was positively related to engagement in Facebook bullying, thus
supporting H3. School victimization was significantly negatively
4.3.3. Facebook use and Facebook bullying related to Facebook bullying (b = .08, p < .001). Risky Facebook
The intensity of Facebook use was found to be positively related use was significantly positively related to Facebook bullying
to engaging in Facebook bullying (r = .16, p < .001) and Facebook (b = .14, p < .001) as was Facebook victimization (b = .40, p < .001).
22 G.C.E. Kwan, M.M. Skoric / Computers in Human Behavior 29 (2013) 16–25

4.4.2. Predicting victimization on Facebook Past studies on school bullying have uncovered specific patterns
Regression analysis predicting Facebook victimization with with regards to age, gender and race. Rigby (2008) found that
engagement in school bullying, victimization in school, Facebook minority racial groups reported higher frequencies of bullying than
usage, risky Facebook usage, and engagement in Facebook bullying other races. This study found support for the relationship between
was conducted. Demographic variables of age, race, gender, type of demographic factors and school bullying. Essentially, school bullies
housing and academic stream were included in the analyses. tend to be older children while younger children tend to experi-
Intensity of Facebook use (b = .11, p < .001) was positively re- ence more school victimization. Boys were also more likely to bully
lated to Facebook victimization, supporting H2; school victimiza- their peers, while gender was not found to be related to the extent
tion (b = .44, p < .001) was also found to be positively related to to which one is bullied in school. In particular, racial minorities
Facebook victimization, supporting H4. No significant relationship were more likely to be bullied. This suggests that racial lines are
was found between engagement in risky Facebook use and victim- present in social interactions in Singapore schools and serves as
ization on Facebook; therefore, H5 is not supported. Engagement in an important reminder for educators and parents to not take racial
Facebook bullying (b = .40, p < .001) was found to be positively re- harmony among Singaporean youths for granted. Interestingly, the
lated to Facebook victimization, providing support for H6. demographics factors were not important factors in Facebook bul-
Lastly, for comparison purposes, we also provide the findings lying. While this suggests less race-oriented bullying on Facebook,
from regression analyses analyzing the relationships between var- the moderately strong relationship between being victimized in
ious predictor variables and school bullying and victimization as school and on Facebook is worrying. Social networks maintained
the outcome variables (Table 3). on Facebook are largely relationships that are initiated offline.
Facebook is a platform on which offline relationships are main-
tained and expanded. Katzer, Fetchenhauer, and Belschak (2009)
5. Discussion found some similarities between the predictors of being victims
of offline and online bullying. Lower perceived popularity and low-
This study set out to understand cyberbullying on a specific so- er self concepts predicted the likelihood of being a victim in school
cial media platform, one which has gained significant popularity as well as in chatrooms. Katzer and her colleagues suggested that
among youths around the world, including Singapore. The findings being socially excluded is probably an important factor leading
show that while social network sites, like Facebook, were intended to being a victim. Therefore, the lack of social popularity in offline
for enhancing our social experiences, these experiences have not and online contexts is predictive of victimization. Beran & Li (2007)
been all positive for the vast majority of its users–more than half conceptualized this comparison between cyberbullying and FTF
of them have experienced at least one form of Facebook bullying bullying using the social rank theory, which ‘‘posits that the peer
in the past year. Furthermore, many of these students have also en- group becomes established as a hierarchy whereby some students
gaged in abusive actions on the platform. use aggression to dominate their peers as a means of gaining pres-

Table A.1
Prevalence of Facebook victimization.

% Who have % Who had the % Who had the % Who had the % Who had the % Who had the
‘‘never’’ had the experience experience ‘‘2– experience ‘‘5– experience ‘‘8– experience ‘‘more
experience ‘‘once’’ 4 times’’ 7 times’’ 10 times’’ than 10 times’’
I have received nasty messages on Facebook which 71.5 14.4 10.2 2.3 .6 1.0
made me upset
I have received insulting Facebook messages/ 77.4 10.3 7.3 2.5 1.1 1.4
comments repeatedly
I have continued to receive insulting Facebook/ 91.3 4.2 2.8 .9 .4 .5
comments even after I have asked the sender to
stop
I have received unwanted sexual suggestions/ 89.1 5.3 3.2 1.0 .4 .9
sexually explicit pictures on Facebook
People have posted messages on Facebook about me 81.8 9.7 5.3 1.5 .5 1.1
that damaged my reputation
People have spread rumors about me on Facebook to 81.0 10.3 5.0 1.5 .9 1.3
damage my reputation
People have said things about me on Facebook that 85.9 8.0 3.5 1.0 .8 .8
caused my friends to dislike me
People have said things about me on Facebook to 76.7 11.7 7.3 2.1 .7 1.4
make me a laughing stock
Someone has hacked into my Facebook account and 92.5 4.9 1.3 .7 .1 .6
posted/sent messages to make me look bad
Someone has pretended to be me on Facebook and 94.7 4.1 .7 .2 .1 .2
put up personal/sensitive information about me
that I did not want others to know
Someone has shared my secrets on Facebook 89.9 6.6 2.5 .5 .3 .2
I have been tricked to share my secret which was 95.3 2.8 .9 .5 .3 .3
later spread on Facebook
I have felt betrayed by my friends who posted things 86.6 7.7 4.1 .9 .4 .3
about me on Facebook that I did not want others
to know
I have been blocked on Facebook by other people 80.7 14.2 3.7 .8 .1 .5
I have been deliberately excluded from a Facebook 95.2 2.9 1.4 .1 .1 .3
group by people
I have received threatening messages on Facebook 95.9 2.3 .8 .4 .2 .4
I feel like someone on Facebook is tracking my 92.2 4.8 1.4 .6 .1 .9
activities and wants to do me harm
G.C.E. Kwan, M.M. Skoric / Computers in Human Behavior 29 (2013) 16–25 23

Table A.2
Prevalence of Facebook bullying.

% Who have % Who % Who % Of respondents % Who % Who engaged


‘‘never’’ had engaged in engaged in who engaged in engaged in in activity ‘‘more
engaged in activity activity ‘‘2–4 activity ‘‘5–7 activity ‘‘8–10 than 10 times’’
activity ‘‘once’’ times’’ times’’ times’’
I have sent nasty messages to someone on Facebook to 87.0 7.8 3.4 .7 .1 .9
upset the person
I have sent insulting Facebook messages/comments to 90.0 5.1 2.6 .9 .3 1.0
someone repeatedly
I have continued to send insulting Facebook/comments 95.8 1.7 1.5 .5 .1 .3
even after the person asked me to stop
I have made unwanted sexual suggestions and/or sent 98.5 .7 .5 0 0 .2
sexually explicit pictures to someone on Facebook
I have posted messages on Facebook about someone to 91.4 5.2 2.4 .5 .1 .4
damage the person’s reputation
I have spread rumors about someone on Facebook to 93.0 3.7 2.2 .6 .1 .3
damage the person’s reputation
I have said things about someone to cause the person to 91.8 5.7 1.6 .5 .2 .1
be disliked by his/her friends
I have said things about someone to make the person a 86.1 7.2 3.4 1.9 .5 .9
laughing stock
I have hacked into someone’s Facebook account and 97.2 1.7 .7 .1 .1 .3
posted/sent messages to make the person look bad
I have pretended to be someone else on Facebook and 98.0 1.5 .2 .1 .1 .1
put up personal/sensitive information about the
person that he/she did not want others to know
I have shared someone else’s secrets on Facebook 95.5 3.1 .5 .3 .3 .3
I have posted embarrassing photos or videos of 89.1 5.4 3.9 .4 .3 .9
someone else on Facebook
I have tricked someone into sharing his/her secret with 98.6 .7 .3 0 .2 .2
me which I then spread on Facebook
I have betrayed my friend by posting things about him/ 96.8 2.3 .6 .2 0 .1
her on Facebook, that he/she did not want others to
know
I have blocked someone on Facebook 55.5 19.8 16.7 3.3 .7 4.0
I have deliberately excluded someone from a Facebook 94.3 3.7 .9 .4 .2 .5
group to make him/her feel left out
I have sent threatening messages on Facebook 97.7 1.3 .5 .1 .2 .2
I have tried to make someone feel like I am tracking 98.0 1.1 .4 .1 .1 .3
his/her activities and feel threatened

Table A.3
Prevalence of school victimization.

% Who have % Who have the % Who have the % Who have the % Who have the % Who have the
‘‘never’’ had the experience ‘‘once’’ experience ‘‘2–4 experience ‘‘5–7 experience ‘‘8–10 experience ‘‘more than
experience times’’ times’’ times’’ 10 times’’
Hitting, pinching, biting, 38.9 13.3 17.5 8.6 3.3 18.4
pushing and shoving
Taking your belongings 54.6 16.8 16.5 6.3 1.5 4.3
and refusing to return
them
Hiding your belongings 53.6 15.9 16.8 6.2 2.1 5.4
Damaging your 70.3 13.9 9.9 2.7 .8 2.3
belongings
Demanding your money 89.4 5.0 2.7 1.5 .6 .8
Threatening and 81.3 7.7 4.9 1.9 1.1 3.1
intimidating you
Throwing things at you 60.6 13.9 12.1 5.7 2.0 5.7
Insulting you in front of 58.8 13.7 11.6 6.2 2.6 7.1
people
Calling you names that 58.4 13.2 11.2 5.9 2.2 9.1
hurt you
Spreading rumors about 55.1 15.2 13.0 6.2 2.8 7.6
you
Using vulgar language on 41.4 11.6 11.1 7.9 3.2 24.8
you
Making things up to get 71.7 11.2 7.8 4.4 1.8 3.2
you into trouble
Preventing others from 73.9 9.8 8.0 3.8 1.8 2.6
befriending you
Purposely leaving you out 70.7 11.2 8.3 4.2 1.8 3.8
of a group or isolating
you
24 G.C.E. Kwan, M.M. Skoric / Computers in Human Behavior 29 (2013) 16–25

Table A.4
Prevalence of school bullying.

% Who have ‘‘never’’ % Who engaged % Who engaged in % Who engaged in % Who engaged in % Who engaged in
had engaged in in activity activity ‘‘2–4 activity ‘‘5–7 activity ‘‘8–10 activity ‘‘more than 10
activity ‘‘once’’ times’’ times’’ times’’ times’’
Hitting, pinching, biting, pushing 55.5 12.2 12.1 4.8 2.0 13.4
and shoving someone
Taking someone’s belongings 75.7 10.4 7.9 2.5 .8 2.8
and refusing to return them
Hiding someone’s belongings 68.5 15.1 8.4 4.0 1.1 2.8
Damaging someone’s belongings 88.0 6.6 3.5 .6 .1 1.3
Demanding someone’s money 95.1 2.3 1.1 .4 .3 .8
Threatening and intimidating 88.3 4.7 3.8 1.1 .7 1.4
someone
Throwing things at someone 69.4 11.6 7.8 4.4 1.6 5.2
Insulting someone in front of 73.8 10.8 5.9 3.9 1.5 4.0
people
Calling someone names that hurt 70.7 11.6 8.4 3.8 1.1 4.4
him/her
Spreading rumors about 72.5 12.5 9.1 2.9 1.1 2.0
someone
Using vulgar language on 53.4 11.9 10.2 6.0 2.9 15.7
someone
Making things up to get 88.8 5.7 3.2 1.0 .6 .8
someone into trouble
Preventing others from 88.0 5.6 3.6 1.7 .5 .6
befriending someone
Purposely leaving someone out 83.6 8.7 4.3 1.8 .6 1.0
of a group or isolating
someone

tige, power, and access to resources’’ (p. 18). Similar to the present While practitioners have advised students to avoid high-risk
study, their study found positive relationships between being an behaviors on cyberspace to avoid being victims of cyberbullying
offline bully and being a cyberbully. Olweus’s (1993) argued that (Ng & Rigby, 2010), the findings of this study showed that risky
adolescents who engaged in bullying to gain social acceptance Facebook use is positively related to engaging in Facebook bullying
would continue their behavior even when they grow up. This is be- and not Facebook victimization. Additional analyses not reported
cause many of them do not develop other social skills to gain peer in this paper indicate that Facebook bullies are more likely to dis-
acceptance. Therefore, it is not surprising that teenagers who bully close personal information like real names, contact number and
in school would fall back on bullying to gain social status in cyber- email addresses. This suggests greater confidence in using one’s
space. Therefore, power relations that exist offline are translated real identity in online interactions on Facebook. Self-esteem or
into the similar power dynamics online. As Facebook is usually confidence is a trait that carries itself from offline social settings
used to maintain and manage existing offline relationships (Ellison to online ones (Katzer et al., 2009). More importantly, a lack of
et al., 2007), it is likely that offline bullying could find its way to self-confidence online can make one vulnerable to cyberbullying.
continue on Facebook, especially when bullies and victims share In this case, it seems like youths who have greater self-confidence
the same network of friends. Indeed, looking at the multivariate are also more likely to engage in Facebook bullying.
analyses, one can see that almost one quarter of the variance in Rigby (2008), when discussing measurement of the severity of
both Facebook bullying and victimization is explained by FTF bul- bullying experience, suggested that the type of bullying, on top
lying. Interestingly, the same analyses show that offline victimiza- of frequency should be accounted for so as to better understand
tion did not translate into increased, but slightly decreased how the experience has affected the victim. In this study, the mea-
likelihood of Facebook bullying, suggesting a potential magnifying surement of Facebook bullying was done by listing various in-
effect of Facebook on the existing power relationships in school. stances of bullying which could possibly occur on the platform.
It has been suggested that the prevention and intervention of These include verbal as well as relational forms of bullying. By list-
cyberbullying is difficult to carry out as it is difficult for adults to ing different instances of cyberbullying, we are hopefully able to
monitor the online activities of youths (Campbell, 2005) especially capture the big picture of cyberbullying on Facebook and under-
when parents find it difficult to wrap their heads around the way stand the most common types of bullying that are currently occur-
their children use these new technologies (Ribak, 2001). The find- ring on the platform. While some respondents have experienced
ings of this study suggest that a student’s offline experience with one form of bullying several times, others may have experienced
bullying is highly predictive of his/her involvement in cyberbully- a wider variety of abuse, each occurring possibly only once.
ing on Facebook. Parents and teachers can therefore improve their
supervision efforts by communicating with each other about their 6. Conclusion
observations at home and in school. If a teenager is often bullied in
school, parents can take steps to reduce his/her likelihood of Facebook has empowered youths by giving them more tools to
becoming a victim online. Some examples of protection could be expand their social networks and maintain existing relationships.
to customize privacy settings or block school bullies on Facebook However, the tool also serves as an additional channel through
so that they are unable to access the teenager’s online profile. which bullying could now travel from the school into one’s home.
The results of this study provide partial support for previous Essentially, the root of the problem of bullying lies in the social
findings, in which media use was found is be positively related environment, be it poor parenting or hostile peer relationships. A
to involvement in cyberbullying (Ybarra & Mitchell, 2004). In this problem that exists in one’s social network would naturally also ex-
study, we only found a weak relationship between Facebook inten- ist on an online platform that was designed to bring the network
sity and Facebook victimization, but none with Facebook bullying. online, and facilitate its maintenance and expansion. Therefore, in-
G.C.E. Kwan, M.M. Skoric / Computers in Human Behavior 29 (2013) 16–25 25

stead of focusing on solutions which are specific to that of cyberbul- Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors
related to offending and victimization. Deviant Behavior, 29, 129–156.
lying, parents and schools should focus on the root of the problem,
Infocomm Development Authority (2010). Telecommunications. <http://
which very frequently manifests itself in everyday school bullying. www.ida.gov.sg/Publications/20070822130650.aspx> Retrieved 02.07.10.
It is also necessary to question the continued efforts in differentiat- Kapatzia, A., & Sygkollitou, E. (2007). Cyberbullying in Middle and high Schools:
ing cyberbullying from school bullying. While the medium/envi- Prevalence, Gender and Age Differences. <http://miha2.ef.uni-lj.si/cost298/
gbc2009-proceedings/papers/P198.pdf> Retrieved 01.06.10.
ronments certainly differs, it seems that fundamental causes and Katzer, C., Fetchenhauer, D., & Belschak, F. (2009). Cyberbullying: Who are the
motivations are quite similar. Therefore, scholars may wish to veer victims? A comparison of victimization in Internet chatrooms and victimization
away from overly technology-reliant explanations of cyberbullying. in school. Journal of Media Psychology, 21(1), 25–36.
Ma, L., Phelps, E., Lerner, J. V., & Lerner, R. M. (2009). Academic competence for
Rather, due to the affordances of social network sites, the conver- adolescents who bully and who are bullied: Findings from the 4-H Study of
gence of offline and online social networks has allowed offline Positive Youth Development. Journal of Early Adolescence, 29(6), 862–897.
and online social problems to converge as well. It is important to Marsh, H. W., Parada, R. H., Craven, R. G., & Finger, L. (2004). In the looking glass: A
reciprocal effect model elucidating the complex nature of bullying, psychological
recognize this development in order to better inform educators determinants, and the central role of self-concept. In C. E. der & G. D. Phye (Eds.).
and parents on better ways to prevent bullying in school and online. Bullying: Implications for the classroom (pp. 63–110). Academic Press.
Meadows, B. (2005, March 14). The Web: the bully’s new playground. People.com,
63(10). <http://www.people.com/people/archive/article/0,,20147083,00.html>
Appendix A Retrieved 20.06.10.
Ministry of Education Singapore. (2010). Education Statistics Digest 2010. <http://
See Tables A.1–A.4. www.moe.gov.sg/education/education-statistics-digest/files/esd-2010.pdf>
Retrieved 29.04.11.
National Center for Missing & Exploited Children (2000). Online Victimization: A
References Report on the Nation’s Youth. <http://www.missingkids.comen_US/publications/
NC62.pdf> Retrieved 12.07.10.
Beran, T., & Li, Q. (2007). The relationship between cyberbullying and school National Center for Missing & Exploited Children (2006). Online Victimization of
bullying. Journal of Student Wellbeing, 1(2), 15–33. Youth: Five Years Later. <http://www.unh.edu/ccrc/pdf/CV138.pdf> Retrieved
Blumenfeld, W. J. (2005). Cyberbullying: A new variation on an old theme. Paper 12.07.10.
presented at CHI 2005 Abuse Workshop, Portland, OR. <http:// Ng, E. (2010). Story box. In E. Ng & K. Rigby (Eds.), Breaking the silence: Bullying in
www.agentabuse.org/papers.htm> Retrieved 22.03.2007. Singapore (pp. 3–26). Singapore: ARMOUR Publishing.
Boulton, M. J., & Smith, P. K. (1994). Bully/victim problems in middle-school Ng, E., & Rigby, K. (2010). Breaking the Silence. Bullying in Singapore (pp. 3–26).
children: Stability, self-perceived competence, peer perceptions and peer Singapore: ARMOUR Publishing.
acceptance. British Journal of Development Psychology, 12, 315–329. Olweus, D. (1993). Bullying at school: What we know and what we can do. UK:
Boulton, M. J., & Underwood, K. (1992). Bully/victim problems in middle-school Blackwell Publishers.
children. British Journal of Educational Psychology, 62, 73–87. Patchin, J. W., & Hinduja, S. (2010). Cyberbullying and self-esteem. Journal of School
Boyd, D. M. (2008). Taken Out of Context: American Teen Sociality in Networked Health, 80(12), 614–621.
Publics. Unpublished PhD thesis. University of California, Berkeley. Petty, R. E., Harkins, S. G., Williams, K. D., & Latane, B. (1977). The effects of group
Boyd, D. M., & Ellison, N. (2007). Social network sites: Definition, history, and size on cognitive effort and evaluation. Personality and Social Psychology Bulletin,
scholarship. Journal of Computer-Mediated Communication, 13(1). <http:// 3, 579–582.
jcmc.indiana.edu/vol13/issue1/boyd.ellison.html> Retrieved 12.03.12. Rigby, K. (1998). Manual for the Peer Relations Questionnaire (PRQ). Point Lonsdale,
Campbell, M. A. (2005). Cyberbullying: An old problem in a new guise? Australian Victoria, Australia: The Professional Reading Guide.
Journal of Guidance and Counselling, 15(1), 68–76. Rhee, D., Yun, S.-C., & Khang, Y.-H. (2007). Co-occurrence of problem behaviors in
Cassidy, W., Jackson, M., & Brown, K. N. (2009). Sticks and stones can break my South Korean adolescents: Findings from Korea Youth Panel Survey. Journal of
bones, but how can pixels hurt me? Students’ experiences with cyber-bullying. Adolescent Health, 40, 195–197.
School Psychology International, 30(4), 383–402. Ribak, R. (2001). Like immigrants: Negotiating power in the face of the home
Chew, C. (2010). Prevalence of cyber bullying in Singapore. In E. Ng & K. Rigby (Eds.), computer. New Media and Society, 3, 220–238.
Breaking the Silence: Bullying in Singapore (pp. 65–84). Singapore: ARMOUR Rigby, K. (2008). Children and bullying: How parents and educators can reduce bullying
Publishing. at school. Boston: Blackwell/Wiley.
Chisholm, J. F. (2006). Cyberspace violence against girls and adolescent females. Shariff, S. (2005). Cyber-dilemmas in the new millennium: School obligations to
Annals of New York Academy of Sciences, 1087, 74–89. provide student safety in a virtual school environment. McGill Journal of
comScore. (March 27, 2009). Singapore Internet Users Spend Half of Online Time on Education, 40(3), 457–477.
Social and Entertainment Sites. <http://www.comscore.com/Press_Events/ Sharp, S. (1995). How much does bullying hurt? The effects of bulling on the
Press_Releases/2009/3/First_Report_on_Singapore_Internet_Usage> Retrieved personal well-being and educational progress of secondary-aged students.
06.07.10. Educational and Child Psychology, 12(2), 81–88.
comScore. (April 7, 2010). Social Networking Habits Vary Considerably Across Asia- Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying?
Pacific Markets. <http://www.comscore.com/Press_Events/Press_Releases/2010/ Scandinavian Journal of Psychology, 49, 147–154.
4/Social_Networking_Across_Asia-Pacific_Markets> Retrieved 06.07.10. Smith, P. K., & Shu, S. (2000). What good schools can do about bullying: Findings
comScore. (June 3, 2010). Average Internet User in Singapore Spent More than 10 from a survey in English schools after a decade of research and action.
Hours Viewing Online Video in April. <http://www.comscore.com/Press_Events/ Childhood, 7, 193–212.
Press_Releases/2010/6/Average_Internet_User_in_Singapore_Spent_10_Hours_ Snider, M., & Borel, K. (2004). Stalked by a cyberbully. Maclean’s, 117(21–22), 76–77.
Viewing_Online_Video> Retrieved 14.07.10. Socialbakers. (2011). Facebook Statistics Singapore. <http://www.socialbakers.com/
Coyne, S. M., & Archer, J. A. & Eslea, M. (2006). We’re not friends anymore! facebook-statistics/singapore> Retrieved 24.05.10.
Unless. . .: The frequency and harmfulness of relational, indirect and social Steinhauer, J. (2008, November 26). Verdict in MySpace suicide case. The New York
aggression. Aggressive Behavior, 32, 294–307. Times. <http://74.125.155.132/scholar?q=cache:SwfwylQo1SwJ:scholar.google.
Crick, N. R., Bigbee, M. A., & Howes, C. (1996). Gender differences in children’s com/+megan+meyer+myspace&hl=en&as_sdt=2000> Retrieved 26.07.10.
normative beliefs about aggression: How do I hurt thee? Child Development, 67, Taki, M. (2001). Japanese school bullying: Ijime. Queen’s University, Canada: National
1003–1014. Institute for Educational Policy Research of Japan.
Crick, N. R., & Grotpeter, J. K. (1995). Relational aggression, gender and social- Tan, W. Z. (2008, December 15). Singapore: Cyber bullies turn vicious. The Straits
psychological adjustment. Child Development, 66(3), 710–722. Times. <http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=
Dupper, D. R., & Meyer-Adams, N. (2002). Low-level violence: A neglected aspect of 102200> Retrieved 15.07.10.
school culture. Urban Education, 37(3), 350–364. Tan, W. Z. (2009, February 11). Zero tolerance for cyber-bullies. The Straits Times.
Ellison, N., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook ‘‘friends:’’ <http://www.asiaone.com/News/Education/Story/A1Story20090210-
Social capital and college students’ use of online social network sites. Journal of 120811.html> Retrieved 15.07.10.
Computer-Mediated Communication, 12(4), 1143–1168. Wilkinson, L.the Task Force on Statistical Inference. (1999). Statistical methods in
Erdur-Baker, Ö. (2010). Cyberbullying and its correlation to traditional bullying, psychology journal – Guidelines and explanations. American Psychologist, 54(8),
gender and frequent and risky usage of internet-mediated communication 594–604.
tools. New Media Society, 12(1), 109–125. Willard, N. (2007). Educator’s Guide to Cyberbullying and Cyberthreats. <http://
Facebook (2010). Agreement. <http://www.facebook.com/terms.php?ref=pf> www.cyberbully.org/cyberbully/docs/cbcteducator.pdf> Retrieved 11.06.10.
Retrieved 15.04.11. Woods, S., & Wolke, D. (2004). Direct and relational bullying among primary school
Glover, D., Gough, G., Johnson, M., & Cartwright, N. (2000). Bullying in 25 secondary children and academic achievement. Journal of School Psychology, 42, 130–155.
schools: Incidence, impact and intervention. Educational Research, 42(2), Ybarra, M. L., & Mitchell, K. J. (2004). Youth engaging in online harassment:
141–156. associations with caregiver-child relationships, internet use, and personal
Hinduja, S., & Patchin, J. W. (2007). Offline consequences of online victimization: characteristics. Journal of Adolescence, 27, 319–336.
school violence and delinquency. Journal of School Violence, 6(3), 89–112.

You might also like