UPSI Digital Repository (UDRep)
Start | FAQ | About

QR Code Link :

Type :article
Subject :H Social Sciences
ISSN :1823-7797
Main Author :Sarina Yusuf
Additional Authors :Al-Majdhoub, Fatima Mohamed
Nur Nadia Abd Mubin
Rizky Hafiz Chaniago
Title :Cyber aggression-victimization among Malaysians youth
Place of Production :Tanjung Malim
Publisher :Fakulti Bahasa Dan Komunikasi
Year of Publication :2021
Notes :Asian Journal of University Education
Corporate Name :Universiti Pendidikan Sultan Idris
Web Link :Click to view web link
PDF Full Text :Login required to access this item.

Abstract : Universiti Pendidikan Sultan Idris
Cyber aggression has become a growing problem in today's society. It offers convenient opportunities to humiliate, bully, or harass others online. Global studies on cyber aggression found that youths who were aggressed online reported feeling depressed, anxious and afraid. They showed poor academic performance, and experiencd eating disorders, alcohol, drugs and substance abuse. Therefore the study aimed to investigate the interrelationships between predictive factors namely peer attachment, parental attachment, exposure to the Internet and cyber aggression-victimization among youths. The renowned general aggression model (GAM) was applied to understand the phenomenon. A sample of 430 urban youths aged between 13 and 18 years living within Klang Valley area were randomly selected to participate in the study. Data were gathered through self-report questionnaires and later analyzed using SPSS and AMOS. The results revealed several noteworthy findings; most of respondents made use of the Internet for approximately 7 to 21 hours per day during weekends mainly for surfing social media, followed by entertainment and online games. A relatively significant number of youths were engaged with cyber victimization through written-verbal and online exclusion. Finally, the structural path analysis indicates that Internet exposure is the strongest predictor associated with cyber aggression-victimization. Based on these findings, the implications and recommendations for future investigations with reference to the current theoretical framework and empirical findings on cyber aggression-victimization are thoroughly discussed. ? 2021. All Rights Reserved.

References

Akbar, J., Huang, T. -., & Anwar, F. (2014). The development of cyberbullying scale to investigate bullies among adolescents. Proceeding of International Conference on Humanities Sciences and Education (ICHE), Kuala Lumpur, Retrieved from www.scopus.com

Al Sabbah, H., Vereecken, C. A., Elgar, F. J., Nansel, T., Aasvee, K., Abdeen, Z., . . . Maes, L. (2009). Body weight dissatisfaction and communication with parents among adolescents in 24 countries: International cross-sectional survey. BMC Public Health, 9 doi:10.1186/1471-2458-9-52

Álvarez-García, D., Barreiro-Collazo, A., Núñez, J. C., & Dobarro, A. (2016). Validity and reliability of the cyber-aggression questionnaire for adolescents (CYBA). European Journal of Psychology Applied to Legal Context, 8(2), 69-77. doi:10.1016/j.ejpal.2016.02.003

Álvarez-García, D., Hevia, S. M., González-Castro, P., & Pérez, C. R. (2012). Hyperactivity-impulsivity and attention deficit as predictors of involvement in school violence situations. [Hiperactividad-impulsividad y déficit de atención como predictores de participación en situaciones de violencia escolar] International Journal of Psychology and Psychological Therapy, 12(2), 185-202. Retrieved from www.scopus.com

Álvarez-García, D., Núñez Pérez, J. C., Dobarro González, A., & Rodríguez Pérez, C. (2015). Risk factors associated with cybervictimization in adolescence. International Journal of Clinical and Health Psychology, 15(3), 226-235. doi:10.1016/j.ijchp.2015.03.002

Anderson, C. A., & Bushman, B. J. (2002). Human aggression doi:10.1146/annurev.psych.53.100901.135231 Retrieved from www.scopus.com

Ang, R. P., Tan, K. -., & Mansor, A. T. (2011). Normative beliefs about aggression as a mediator of narcissistic exploitativeness and cyberbullying. Journal of Interpersonal Violence, 26(13), 2619-2634. doi:10.1177/0886260510388286

Armsden, G. C., & Greenberg, M. T. (1987). The inventory of parent and peer attachment: Individual differences and their relationship to psychological well-being in adolescence. Journal of Youth and Adolescence, 16(5), 427-454. doi:10.1007/BF02202939

Azizan, H. (2012). Do you know whom your kids are talking to? The Star Online, Retrieved from www.scopus.com

Bakar, H. S. A. (2013). Investigating the emergence themes of cyberbullying phenomenon: A grounded theory approach. Paper presented at the Proceedings of the 2013 IEEE 63rd Annual Conference International Council for Education Media, ICEM 2013, doi:10.1109/CICEM.2013.6820146 Retrieved from www.scopus.com

Balakrishnan, V. (2015). Cyberbullying among young adults in malaysia: The roles of gender, age and internet frequency. Computers in Human Behavior, 46, 149-157. doi:10.1016/j.chb.2015.01.021

Bentler, P. M. (1990). Comparative fit indexes in structural models. Psychological Bulletin, 107(2), 238-246. doi:10.1037/0033-2909.107.2.238

Berne, S., Frisén, A., Schultze-Krumbholz, A., Scheithauer, H., Naruskov, K., Luik, P., . . . Zukauskiene, R. (2013). Cyberbullying assessment instruments: A systematic review. Aggression and Violent Behavior, 18(2), 320-334. doi:10.1016/j.avb.2012.11.022

Bonanno, R. A., & Hymel, S. (2013). Cyber bullying and internalizing difficulties: Above and beyond the impact of traditional forms of bullying. Journal of Youth and Adolescence, 42(5), 685-697. doi:10.1007/s10964-013-9937-1

Brown, V. (2017). Cyberbullying: Words can Hurt Too, Retrieved from www.scopus.com

Buelga, S., Cava, M. J., Musitu, G., & Torralba, E. (2015). Cyberbullying aggressors among spanish secondary education students: An exploratory study. Interactive Technology and Smart Education, 12(2), 100-115. doi:10.1108/ITSE-08-2014-0025

Byrne, B. M. (2001). Structural equation modeling with AMOS: Basic concepts, applications, and programming. Structural Equation Modeling with AMOS: Basic Concepts, Applications, and Programming, Retrieved from www.scopus.com

Byrne, S., Katz, S. J., Lee, T., Linz, D., & Mcilrath, M. (2014). Peers, predators, and porn: Predicting parental underestimation of children's risky online experiences. Journal of Computer-Mediated Communication, 19(2), 215-231. doi:10.1111/jcc4.12040

Calvete, E., Orue, I., Estévez, A., Villardón, L., & Padilla, P. (2010). Cyberbullying in adolescents: Modalities and aggressors' profile. Computers in Human Behavior, 26(5), 1128-1135. doi:10.1016/j.chb.2010.03.017

Cavalcanti, J. G., & Pimentel, C. E. (2016). Personality and aggression: A contribution of the general aggression model. [Personalidade e agressão: Uma contribuição do modelo geral da agressão] Estudos De Psicologia (Campinas), 33(3), 443-451. doi:10.1590/1982-02752016000300008

Cheong, L. M. (2007). Internet safety and malaysian students: A study of female undergraduates and their net pals. Asian Journal of University Education, 3(2), 23-35. Retrieved from www.scopus.com

Communications, M., & Commission, M. (2017). Internet Users Survey 2017, Retrieved from www.scopus.com

Corcoran, L., Guckin, C. M., & Prentice, G. (2015). Cyberbullying or cyber aggression?: A review of existing definitions of cyber-based peer-to-peer aggression. Societies, 5(2), 245-255. doi:10.3390/soc5020245

Defleur, M. L., & Ball-Rokeach, S. J. (1989). Theories of Mass Communication, Retrieved from www.scopus.com

Den Hamer, A., Konijn, E. A., & Keijer, M. G. (2014). Cyberbullying behavior and adolescents' use of media with antisocial ontent: A cyclic process model. Cyberpsychology, Behavior, and Social Networking, 17(2), 74-81. doi:10.1089/cyber.2012.0307

Den Hamer, A. H., & Konijn, E. A. (2015). Adolescents' media exposure may increase their cyberbullying behavior: A longitudinal study. Journal of Adolescent Health, 56(2), 203-208. doi:10.1016/j.jadohealth.2014.09.016

Dittrick, C. J., Beran, T. N., Mishna, F., Hetherington, R., & Shariff, S. (2013). Do children who bully their peers also play violent video games? A canadian national study. Journal of School Violence, 12(4), 297-318. doi:10.1080/15388220.2013.803244

Durlak, J. A., Weissberg, R. P., & Pachan, M. (2010). A meta-analysis of after-school programs that seek to promote personal and social skills in children and adolescents. American Journal of Community Psychology, 45(3-4), 294-309. doi:10.1007/s10464-010-9300-6

Eek, T. S. (2009). A Big Sister Helps Students Cope with Bullying, Retrieved from www.scopus.com

Escobar-Chaves, S. L., & Anderson, C. A. (2008). Media and risky behaviors. Future of Children, 18(1), 147-180. doi:10.1353/foc.0.0007

Faryadi, Q. (2011). Cyber bullying and academic performance. International Journal of Computational Engineering Research, 1(1), 23-30. Retrieved from www.scopus.com

Fillamenta, N. (2018). Teenagers self-identity who experience internet addiction. Asian Journal of Assessment in Teaching and Learning, 8, 1-6. Retrieved from www.scopus.com

Garaigordobil, M. (2017). Psychometric properties of the cyberbullying test, a screening instrument to measure cybervictimization, cyberaggression, and cyberobservation. Journal of Interpersonal Violence, 32(23), 3556-3576. doi:10.1177/0886260515600165

Ghazali, A. H. A., Abdullah, H., Omar, S. Z., Ahmad, A., Samah, A. A., Ramli, S. A., & Shaffril, H. A. M. (2017). Malaysian youth perception on cyberbullying: The qualitative perspective. International Journal of Academic Research in Business and Social Sciences, 7(4), 87-98. Retrieved from www.scopus.com

Greenberg, M. T., Siegel, J. M., & Leitch, C. J. (1983). The nature and importance of attachment relationships to parents and peers during adolescence. Journal of Youth and Adolescence, 12(5), 373-386. doi:10.1007/BF02088721

Group, T. (2016). Telenor Group Supports ‘Stop Cyberbullying Day 2016’across its Markets in Asia, Retrieved from www.scopus.com

Gullone, E., & Robertson, N. (2008). The relationship between bullying and animal abuse behaviors in adolescents: The importance of witnessing animal abuse. Journal of Applied Developmental Psychology, 29(5), 371-379. doi:10.1016/j.appdev.2008.06.004

Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1995). Multivariate Data Analysis, Retrieved from www.scopus.com

Hawker, D. S. J., & Boulton, M. J. (2000). Twenty years' research on peer victimization and psychosocial maladjustment: A meta-analytic review of cross-sectional studies. Journal of Child Psychology and Psychiatry and Allied Disciplines, 41(4), 441-455. doi:10.1017/S0021963099005545

Hawkins, J. D., Herrenkohl, T., Farrington, D. P., Brewer, D., Catalano, R. F., & Harachi, T. W. (1998). A review of predictors of youth violence. Serious and Violent Juvenile Offenders: Risk Factors and Successful Interventions, , 106-146. Retrieved from www.scopus.com

Hertz, M. F., & David-Ferdon, C. (2011). Online aggression: A reflection of in-person victimization or a unique phenomenon? Journal of Adolescent Health, 48(2), 119-120. doi:10.1016/j.jadohealth.2010.11.255

Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 129-156. doi:10.1080/01639620701457816

Hoeve, M., Stams, G. J. J. M., Van Der Put, C. E., Dubas, J. S., Van Der Laan, P. H., & Gerris, J. R. M. (2012). A meta-analysis of attachment to parents and delinquency. Journal of Abnormal Child Psychology, 40(5), 771-785. doi:10.1007/s10802-011-9608-1

Huang, Y. -., & Chou, C. (2010). An analysis of multiple factors of cyberbullying among junior high school students in taiwan. Computers in Human Behavior, 26(6), 1581-1590. doi:10.1016/j.chb.2010.06.005

Jakobsen, I. S., Horwood, L. J., & Fergusson, D. M. (2012). Childhood Anxiety/Withdrawal, adolescent parent-child attachment and later risk of depression and anxiety disorder. Journal of Child and Family Studies, 21(2), 303-310. doi:10.1007/s10826-011-9476-x

Ji, Y., Wang, G. -., Zhang, Q., & Zhu, Z. -. (2014). Online social networking behaviors among chinese younger and older adolescent: The influences of age, gender, personality, and attachment styles. Computers in Human Behavior, 41, 393-402. doi:10.1016/j.chb.2014.08.011

Juvonen, J., & Gross, E. F. (2008). Extending the school grounds? - bullying experiences in cyberspace. Journal of School Health, 78(9), 496-505. doi:10.1111/j.1746-1561.2008.00335.x

Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4), 1073-1137. doi:10.1037/a0035618

Law, D. M., Shapka, J. D., Domene, J. F., & Gagné, M. H. (2012). Are cyberbullies really bullies? an investigation of reactive and proactive online aggression. Computers in Human Behavior, 28(2), 664-672. doi:10.1016/j.chb.2011.11.013

Lei, L., & Wu, Y. (2007). Adolescents' paternal attachment and internet use. Cyberpsychology and Behavior, 10(5), 633-639. doi:10.1089/cpb.2007.9976

Locke, K. D. (2009). Aggression, narcissism, self-esteem, and the attribution of desirable and humanizing traits to self versus others. Journal of Research in Personality, 43(1), 99-102. doi:10.1016/j.jrp.2008.10.003

Neging, P., Musa, R., & Abdul Wahab, R. (2013). The determinants and outcomes of pathological internet use (PIU) among urban millennial teens: A theoretical framework. World Academy of Science, Engineering and Technology, 74, 02-21. Retrieved from www.scopus.com

Nickerson, A. B., & Nagle, R. J. (2005). Parent and peer attachment in late childhood and early adolescence. Journal of Early Adolescence, 25(2), 223-249. doi:10.1177/0272431604274174

Nocentini, A., Calmaestra, J., Schultze-Krumbholz, A., Scheithauer, H., Ortega, R., & Menesini, E. (2010). Cyberbullying: Labels, behaviours and definition in three european countries. Australian Journal of Guidance and Counselling, 20(2), 129-142. doi:10.1375/ajgc.20.2.129

Parsa, N., Yaacob, S. N., Redzuan, M., Parsa, P., & Esmaeili, N. S. (2014). Parental attachment, inter-parental conflict and late adolescent's self-efficacy. Asian Social Science, 10(8), 123-131. doi:10.5539/ass.v10n8p123

Prinstein, M. J., Brechwald, W. A., & Cohen, G. L. (2011). Susceptibility to peer influence: Using a performance-based measure to identify adolescent males at heightened risk for deviant peer socialization. Developmental Psychology, 47(4), 1167-1172. doi:10.1037/a0023274

Ramayah, T., & Jantan, M. (2004). Internet usage among malaysian students: The role of demographic and motivational variables. PRANJANA: The Journal of Management Awareness, 7(2), 59-70. Retrieved from www.scopus.com

Raskauskas, J., & Stoltz, A. D. (2007). Involvement in traditional and electronic bullying among adolescents. Developmental Psychology, 43(3), 564-575. doi:10.1037/0012-1649.43.3.564

Rideout, V. J., Foehr, U. G., & Roberts, D. F. (2010). Generation M2: Media in the lives of 8- to 18-year-olds. Generation M: Media in the Lives of 8- to 18-Year-Olds2, Retrieved from www.scopus.com

Salter Ainsworth, M. D., & Bowlby, J. (1991). An ethological approach to personality development. American Psychologist, 46(4), 333-341. doi:10.1037/0003-066x.46.4.333

Schoffstall, C. L., & Cohen, R. (2011). Cyber aggression: The relation between online offenders and offline social competence. Social Development, 20(3), 587-604. doi:10.1111/j.1467-9507.2011.00609.x

Shahbudin, M. S. I. (2020). Kepanikan pengguna media sosial terhadap virus covid 19. PENDETA Journal of Malay Language, Education and Literature, 11, 1-10. Retrieved from www.scopus.com

Shariff, S. (2008). Cyber-bullying: Issues and solutions for the school, the classroom and the home. Cyber-bullying: Issues and solutions for the school, the classroom and the home (pp. 1-299) doi:10.4324/9780203928837 Retrieved from www.scopus.com

Shariff, S., & Hoff, D. L. (2007). Cyber bullying: Clarifying legal boundaries for school supervision in cyberspace. International Journal of Cyber Criminology, 1(1), 76-118. Retrieved from www.scopus.com

Shuib, S. (2014). Cyberbullying on the Rise in 2014: Who is Responsible for the Phenomenon? Astro Awani Online, Retrieved from www.scopus.com

Sijtsema, J. J., Ojanen, T., Veenstra, R., Lindenberg, S., Hawley, P. H., & Little, T. D. (2010). Forms and functions of aggression in adolescent friendship selection and influence: A longitudinal social network analysis. Social Development, 19(3), 515-534. doi:10.1111/j.1467-9507.2009.00566.x

Singelis, T. M. (1994). The measurement of independent and interdependent self-construals. Personality and Social Psychology Bulletin, 20, 580-591. Retrieved from www.scopus.com

Soh, C. H. (2010). Influence of Parents and Peers on Internet Usage and Addiction Amongst School-Going Youths in Malaysia, Retrieved from www.scopus.com

Steinberg, L., & Monahan, K. C. (2007). Age differences in resistance to peer influence. Developmental Psychology, 43(6), 1531-1543. doi:10.1037/0012-1649.43.6.1531

Teimouri, M., Hassan, M. S., Bolong, J., Daud, A., Yussuf, S., & Adzharuddin, N. A. (2014). What is upsetting our children online? Procedia-Social and Behavioral Sciences, 155, 411-416. Retrieved from www.scopus.com

Thomaes, S., Bushman, B. J., Stegge, H., & Olthof, T. (2008). Trumping shame by blasts of noise: Narcissism, self-esteem, shame, and aggression in young adolescents. Child Development, 79(6), 1792-1801. doi:10.1111/j.1467-8624.2008.01226.x

Thye, L. L. (2017). On the Alert for Cyberbullying, Retrieved from www.scopus.com

Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26(3), 277-287. doi:10.1016/j.chb.2009.11.014

Tomé, G., Matos, M., Simões, C., Diniz, J. A., & Camacho, I. (2012). How can peer group influence the behavior of adolescents: Explanatory model. Global Journal of Health Science, 4(2), 26-35. doi:10.5539/gjhs.v4n2p26

Yuan, M. K., Lee, L. M., & Say, C. (2018). Our Teens are Bullies, Retrieved from www.scopus.com


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to previous page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries with this repository, kindly contact us at pustakasys@upsi.edu.my or Whatsapp +60163630263 (Office hours only)