Phenomenological Investigation of Social Media Technological Aspects Against Cyberbullying from the Third Person Perspective of Higher Education Students
DOI:
https://doi.org/10.25126/jitecs.202491578Abstract
Cyberbullying often occurs among higher education students as they frequently use and easily get access to the internet, especially through social media. However, the awareness of cyberbullying among them is very low. They do not know how to identify cyberbullying and prevent it. This research will discover the characteristics of social media that can help third persons identify and prevent cyberbullying. This research used a qualitative method with a phenomenological approach to study a person’s experience of technology regarding cyberbullying. The data collected in this study were obtained from interviews with higher education students. The data acquired were analyzed using Collaizzi's seven steps descriptive phenomenological analyses. The analysis produced a description of the phenomenon of cyberbullying on social media that have verified by the interviewees. This study found some characteristics of social media to help higher education students identify and prevent cyberbullying and discovers which social media has the most cyberbullying content and the similarities/differences of each social media in helping a third person identify and prevent cyberbullying. And found several technological factors that affect the effort of preventing cyberbullying, such as seeing other people’s activities and personal information on social media, and doing a report or sharing cyberbullying content.
References
M. Gómez, C. Lopez, and A. Molina, “An integrated model of social media brand engagement,” Comput. Human Behav., vol. 96, no. July 2018, pp. 196–206, 2019, doi: 10.1016/j.chb.2019.01.026.
C. P. Barlett, C. C. Dewitt, B. Maronna, and K. Johnson, “Social Media Use as a Tool to Facilitate or Reduce Cyberbullying Perpetration: A Review Focusing on Anonymous and Nonanonymous Social Media Platforms,” Violence Gend., vol. 5, no. 3, pp. 147–152, 2018, doi: 10.1089/vio.2017.0057.
J. W. Patchin and S. Hinduja, “Bullies Move Beyond the Schoolyard: A Preliminary Look at Cyberbullying,” Youth Violence Juv. Justice, vol. 4, no. 2, pp. 148–169, 2006, doi: 10.1177/1541204006286288.
H. Margono, “Analysis of the Indonesian Cyberbullying through Data Mining: The Effective Identification of Cyberbullying through Characteristics of Messages,” Victoria University, 2019. [Online]. Available: http://vuir.vu.edu.au/%0Ahttp://files/2191/Margono - 2019 - Analysis of the Indonesian Cyberbullying through D.pdf%0Ahttp://files/2190/39499.html
K. Gahagan, J. M. Vaterlaus, and L. R. Frost, “College student cyberbullying on social networking sites: Conceptualization, prevalence, and perceived bystander responsibility,” Comput. Human Behav., vol. 55, pp. 1097–1105, 2016, doi: 10.1016/j.chb.2015.11.019.
K. N. Sobba, B. F. Prochaska, M. B. Radu, W. M. Gass, and M. D. Glidden, “College students’ perceptions of cyberbullying on a nontraditional campus: An assessment of victims and witnesses,” Int. J. Law, Crime Justice, vol. 57, no. June 2018, pp. 116–125, 2019, doi: 10.1016/j.ijlcj.2019.03.006.
A. Elçi and Z. Seçkin, “Cyberbullying Awareness for Mitigating Consequences in Higher Education,” J. Interpers. Violence, vol. 34, no. 5, pp. 946–960, 2019, doi: 10.1177/0886260516646095.
A. Ruslan, D. T. Maharani, A. Hadistiara, J. Jasmine, and N. Fitri, “Cyberbullying Mahasiswa di Masa Pandemi,” Jakarta, 2022.
N. Hazlyna, A. A. Wahab, F. Miswari, N. Zulkipli, N. I. Ghazali, and S. M. A. Razak, “Awareness about Cyber bullying on Social Media among Female Students in a Malaysian Public University,” Turkish J. Comput. Math. Educ., vol. 12, no. 3, pp. 1592–1601, 2021, doi: 10.17762/turcomat.v12i3.972.
F. B. Shaikh, M. Rehman, and A. Amin, “Cyberbullying: A Systematic Literature Review to Identify the Factors Impelling University Students towards Cyberbullying,” IEEE Access, vol. 8, pp. 148031–148051, 2020, doi: 10.1109/ACCESS.2020.3015669.
P. D. L. Putri, D. Sudana, and A. D. Bachari, “Presupposition Analysis in Twitter Reply Columns in Alleged Cyberbullying Case,” vol. 509, no. Icollite, pp. 529–535, 2020, doi: 10.2991/assehr.k.201215.082.
B. Rusyidi, “Memahami Cyberbullying Di Kalangan Remaja,” J. Kolaborasi Resolusi Konflik, vol. 2, no. 2, p. 100, 2020, doi: 10.24198/jkrk.v2i2.29118.
H. Zainuddin, N. Latifah, B. Rosi, and R. R, “Cyberbullying Perspektif Al-Qur’an Dan Konstitusi Negara Sebagai Pendidikan Dalam Etika Penggunaan Media Sosial,” Pendekatan Pendidik. Islam Pendekatan Interdisip., vol. 4, no. 2, pp. 69–78, 2020, [Online]. Available: https://jppi.ddipolman.ac.id/index.php/jppi/article/view/78
R. S. Tokunaga, “Following you home from school: A critical review and synthesis of research on cyberbullying victimization,” Comput. Human Behav., vol. 26, no. 3, pp. 277–287, 2010, doi: 10.1016/j.chb.2009.11.014.
T. Olthof, F. A. Goossens, M. M. Vermande, E. A. Aleva, and M. van der Meulen, “Bullying as strategic behavior: Relations with desired and acquired dominance in the peer group,” J. Sch. Psychol., vol. 49, no. 3, pp. 339–359, 2011, doi: 10.1016/j.jsp.2011.03.003.
V. Balakrishnan, “Cyberbullying among young adults in Malaysia: The roles of gender, age and Internet frequency,” Comput. Human Behav., vol. 46, pp. 149–157, 2015, doi: 10.1016/j.chb.2015.01.021.
L. Xiao and J. Mou, “Social media fatigue -Technological antecedents and the moderating roles of personality traits: The case of WeChat,” Comput. Human Behav., vol. 101, no. July, pp. 297–310, 2019, doi: 10.1016/j.chb.2019.08.001.
F. F. Nova, M. R. Rifat, P. Saha, S. I. Ahmed, and S. Guha, “Online Sexual Harassment over Anonymous Social Media in,” in In Proceedings of the Tenth International Conference on Information and Communication Technologies and Development, 2018, pp. 1–12.
N. Andalibi, O. L. Haimson, M. De Choudhury, and A. Forte, “Social support, reciprocity, and anonymity in responses to sexual abuse disclosures on social media,” ACM Trans. Comput. Interact., vol. 25, no. 5, 2018, doi: 10.1145/3234942.
F. Pierri, C. Piccardi, and S. Ceri, “Topology comparison of Twitter diffusion networks effectively reveals misleading information,” Sci. Rep., vol. 10, no. 1, pp. 1–9, 2020, doi: 10.1038/s41598-020-58166-5.
S. Bin Naeem, R. Bhatti, and A. Khan, “An exploration of how fake news is taking over social media and putting public health at risk,” Health Info. Libr. J., vol. 38, no. 2, pp. 143–149, 2021, doi: 10.1111/hir.12320.
Y. Li and Y. Xie, “Is a Picture Worth a Thousand Words? An Empirical Study of Image Content and Social Media Engagement,” J. Mark. Res., vol. 57, no. 1, pp. 1–19, 2020, doi: 10.1177/0022243719881113.
Downloads
Published
How to Cite
Issue
Section
License
 Creative Common Attribution-ShareAlike 3.0 International (CC BY-SA 3.0)
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).