Development and Validation of an Instrument Measuring Cyberbullying Among Malaysian Youths
This study sought to develop and validate an instrument measuring cyberbullying among Malaysian youths. Exploratory factor analysis (EFA) was employed to determine the best sub-factors and items for the instrument, while confirmatory factor analysis (CFA) was performed to test and validate the measurement model. Results from EFA on 38 items showed that the items were pooled into four sub-factors. Meanwhile, results from CFA indicated that eight items had to be discarded in order to confirm that the model was fit. Overall, the final version of the instrument consisted of four cyberbullying sub-factors, namely, impersonation (13 items), cyberstalking and harassment (nine items), flaming (four items), and elimination (four items).
Keywords: Instrument development; Youths; Cyberbullying; Youth development
Alvarez-Garcia, D., Barreiro-Collazo, A., Nunez, J.C., & Dobarro, A. (2016). Validity and reliability of the Cyber-aggression Questionnaire for Adolescents (CYBA). The European Journal of Psychology Applied to Legal Context, 8, 69-77.
Antoniadou, N., Kokkinos, C.M., & Markos, A. (2016). Development, construct validation and measurement invariance of the Greek cyber-bullying/victimisation experiences questionnaire (CBVEQ-G). Computers in Human Behavior, 65, 380-390.
Aricak, O.T., & Ozbay, A. (2016). Investigation of the relationship between cyberbullying, cybervictimization, alexithymia and anger expression styles among adolescents. Computers in Human Behavior, 55, 278-285.
Balakrishnan, V. (2015). Cyberbullying among young adults in Malaysia: The roles of gender, age and Internet frequency. Computers in Human Behavior, 46, 149-157.
Balakrishanan, V. (2017). Unraveling the underlying factors SCulPT-ing cyberbullying behaviours among Malaysian young adults. Computers in Human Behavior, 75, 194-205.
Bauman, S., Toomey, R.B., & Walker, J.L., (2013). Associations among bullying, cyberbullying, and suicide in high school students. Journal of Adolescence, 36, 341-350.
Bentler, P.M., & Bonnet, D.C. (1980). Significance tests and goodness of fit in the analysis of covariance structures. Psychological Bulletin, 88 (3), 588-606.
Bentler, P.M. (1990). Comparative fit indexes in structural models. Psychological Bulletin, 107 (2), 238-46.
Calvete, E., Orue, I., Estevez, A., Villardon, L., & Padilla, P. (2010). Cyberbullying in adolescents: Modalities and aggressors' profile. Computers in Human Behavior, 26 (5), 1128-1135.
Cetin, B., Yaman, E., & Peker, A. (2011). Cyber victim and bullying scale: A study of validity and reliability. Computers and Education, 57, 2261-2271.
Chau, P. (1997). Re-examining a model for evaluating information center success using a Structural Equation Modelling approach. Decision Sciences, 28 (2), 309-334.
Chapin, J., & Coleman, G. (2017). The cycle of cyberbullying: Some experience required. Retrieved from: http://ac.els-cdn.com/S0362331917300319/1-s2.0-S0362331917300319-main.pdf?_tid=1d139c06-605c-11e7-b223-00000aab0f02&acdnat=1499133620_6d4e79fbfd3e109627795f8f0cb69ffb
Coelho, V.A., Sousa, V., Marchante, M., Bras, P., & Ramoa, A.M. (2016). Bullying and cyberbullying in Portugal: Validation of a questionnaire and analysis of prevalence. School Psychology International, 37, 223-239.
Del Rey, R., Casas, J.A., Ortega-Ruiz, R., Schultze-Krumbholz, A., Scheithauer, H., Smith, P., Thompson, F., Barkoukis, V., Tsorbatzoudis, H., Brighi, A., Guarini, A., Pyzalski, J., & Plichta, P. (2015). Structural validation and cross-cultural robustness of the European Cyberbullying Intervention Project Questionnaire. Computers in Human Behavior, 50, 141-147.
Digi (2015). Digi cybersafe in school. Retrieved on 11 January 2018, from http://new.digi.com.my/cs/site_template/digi/images/cybersafe/dcpinfographic-bm.jpg
Garaigordobil, M. (2015). Psychometric Properties of the Cyberbullying Test, a Screening Instrument to Measure Cyber-victimization, Cyber-aggression, and Cyberobservation. Journal of Interpersonal Violence.
Hair, J.F., Black, W.C., Babin, B.J., & Anderson, R.E. (2010). Multivariate data analysis. Seventh Edition. Prentice-Hall, Upper Saddle River, New Jersey.
Hatcher, L. (1994). A step-by-step approach to using the SAS System for factor analysis and structural equation modelling. Cary, NC: SAS Institute Inc.
Hinduja, S., & Patchin, J.W. (2010). Bullying, cyberbullying, and suicide. Archives of Suicide Research, 14, 206–221.
Kokkinos, C.M., Antoniadou, N., & Markos, A. (20164). Cyber-bullying: An investigation of the psychological profile of university student participants. Journal of Applied Developmental Psychology, 35 (3), 204-214.
Lam, L.T., & Li, Y. (2013).The validation of the E-Victimisation Scale (E-VS) and the E-Bullying Scale (E-BS) for adolescents. Computers in Human Behavior, 29, 3-7.
Landoll, R.R., La Greca, A.M., Lai, B.S., Chan, S.F., & Herge, W.M. (2015). Cyber victimisation by peers: Prospective associations with adolescent social anxiety and depressive symptoms. Journal of Adolescence, 42, 77-86.
Lee, J., Abell, N., & Holmes, J.L. (2015). Validation of measures of cyberbullying perpetration and victimisation in emerging adulthood. Research on Social Work Practice, 27, 456-467.
Lee, C., & Shin, N. (2017). Prevalence of cyberbullying and predictors of cyberbullying perpetration among Korean adolescents. Computers in Human Behavior, 68, 352-358.
Mohamad Salleh, N., & Zainal, K. (2014). Bullying among secondary school students in Malaysia: A case study. International Education Studies, 7 (13), 184-191.
Nunnally, J.C (1978). Psychometric theory. 2nd Edition. Mc-Graw Hill, New York.
Schenk, A.M., Fremouw, W.J., & Keelan, C.M. (2013). Characteristics of college cyberbullies. Computers in Human Behavior, 29, 2320-2327.
Segars, A.H., & Grover, V. (1993). Re-examining perceived ease of use and usefulness: a conﬁrmatory factor analysis. MIS Quarterly, 17 (4), 517–525.
Smith, P.K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. The Journal of Child Psychology and Psychiatry, 49 (4), 376-385.
Shapka, J.D., & Maghsoudi, R. (2017). Examining the validity and reliability of the cyber-aggression and cyber-victimisation scale. Computers in Human Behavior, 69, 10-17.
Stewart, R.W., Drescher, C.F., Maack, D.J., Ebesutani, C., & Young, J. (2014). The development and psychometric investigation of the cyberbullying scale. Journal of Interpersonal Violence, 29, 2218–2238.
Topcu, C., & Erdur-Baker, O. (2010). The Revised Cyber Bullying Inventory (RCBI): validity and reliability studies. Procedia - Social and Behavioral Sciences, 5, 660-664.
Udris, R. (2014). Cyberbullying among high school students in Japan: Development and validation of the Online Disinhibition Scale. Computers in Human Behavior, 41, 253-261.
Vranjes, I., Baillien, E., Vandebosch, H., Erreygers, S., & De Witte, H. (2017). The dark side of working online: Towards a definition and an Emotion Reaction model of workplace cyberbullying. Computers in Human Behavior, 69, 324-334.
Yubero, S., Navarro, R., Elche, M., Larranaga, E., & Ovejero, A. (2017). Cyberbullying victimisation in higher education: An exploratory analysis of its association with social and emotional factors among Spanish students. Computers in Human Behavior, 75, 439-449.
Copyright Transfer Statement for Journal
1) In signing this statement, the author(s) grant UNIMAS Publisher an exclusive license to publish their original research papers. The author(s) also grant UNIMAS Publisher permission to reproduce, recreate, translate, extract or summarize, and to distribute and display in any forms, formats, and media. The author(s) can reuse their papers in their future printed work without first requiring permission from UNIMAS Publisher, provided that the author(s) acknowledge and reference publication in the Journal.
2) For open access articles, the author(s) agree that their articles published under UNIMAS Publisher are distributed under the terms of the CC-BY-NC-SA (Creative Commons Attribution-Non Commercial-Share Alike 4.0 International License) which permits unrestricted use, distribution, and reproduction in any medium, for non-commercial purposes, provided the original work of the author(s) is properly cited.
3) For subscription articles, the author(s) agree that UNIMAS Publisher holds copyright, or an exclusive license to publish. Readers or users may view, download, print, and copy the content, for academic purposes, subject to the following conditions of use: (a) any reuse of materials is subject to permission from UNIMAS Publisher; (b) archived materials may only be used for academic research; (c) archived materials may not be used for commercial purposes, which include but not limited to monetary compensation by means of sale, resale, license, transfer of copyright, loan, etc.; and (d) archived materials may not be re-published in any part, either in print or online.
4) The author(s) is/are responsible to ensure his or her or their submitted work is original and does not infringe any existing copyright, trademark, patent, statutory right, or propriety right of others. Corresponding author(s) has (have) obtained permission from all co-authors prior to submission to the journal. Upon submission of the manuscript, the author(s) agree that no similar work has been or will be submitted or published elsewhere in any language. If submitted manuscript includes materials from others, the authors have obtained the permission from the copyright owners.
5) In signing this statement, the author(s) declare(s) that the researches in which they have conducted are in compliance with the current laws of the respective country and UNIMAS Journal Publication Ethics Policy. Any experimentation or research involving human or the use of animal samples must obtain approval from Human or Animal Ethics Committee in their respective institutions. The author(s) agree and understand that UNIMAS Publisher is not responsible for any compensational claims or failure caused by the author(s) in fulfilling the above-mentioned requirements. The author(s) must accept the responsibility for releasing their materials upon request by Chief Editor or UNIMAS Publisher.
6) The author(s) should have participated sufficiently in the work and ensured the appropriateness of the content of the article. The author(s) should also agree that he or she has no commercial attachments (e.g. patent or license arrangement, equity interest, consultancies, etc.) that might pose any conflict of interest with the submitted manuscript. The author(s) also agree to make any relevant materials and data available upon request by the editor or UNIMAS Publisher.