Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
in University Selangor
Chapter 1: Introduction
1.0 Overview
This chapter shows all items in introduction such as background of study, problem statement,
1.1 Background
The growth of internet usage among Malaysian has been increasing past few decades. This
because the internet can help computer and smartphone users get variety required
allows computer users worldwide to connect with one another and we can access information
in databases from around the world (Ryan & M.Lewis, 2017). The internet users can connect
and recognize each other through each other through social media like Facebook, Twitter,
MySpace and other media social. According to (Agger, 2015) the internet and mobile phones
are informational new technologies that can provide some benefits such as better
establishing social relations between individuals and the outside community. Statistics show
that Malaysia has 35 million mobile customers and 23.4 million Internet users. And as of July
statistics, 2015).
1
However, this use of social media is often abused by internet users especially the young.
(Allcott & Kessler, 2015) found that an adolescent shows aggressive behavior in cyberspace.
They argue through cyberspace aggressive action can be taken because it is considered a safe
place to respond revenge by using fake names on social sites (Siddiqui & Singh, 2016). It is
was also supported by (Falzone, et al., 2017) who stated that social sites, phones mobile and
other technologies are used to threaten someone by name designed to spread rumors, send
embarrassing messages or videos, sowing slander and more. This negative activity is called
(Tarablus, Heiman, & Olenik-Shemesh, 2015). Cyberbullying includes using sentences that
look down on, threaten, click an unauthorized picture over a mobile phone, broadcast an
unauthorized picture, blackmail through chat sites, and the posting of pornographic images or
personal information on the internet (Rao, Bansal, & Chandran, 2018). In short,
cyberbullying is a reference to the behavior of people who are essentially intent on harming
others in terms of it psychology through the use of electronic tools (Sasson & Mesch, 2016)
and the use of technology information for communications such as email, mobile phones, text
messaging tool, instant messaging (WhatsApp, Line, WeChat etc.) as well as the personal
website that it is used for spreading slander over and over again (Singh, Radford, Huang, &
Furrer, 2017). This cyberbullying incident occurred with the presence of social sites through
the internet and explosion technology. According to (Baker, 2016) cyberbullying is a new
(Minocha & Minocha, 2017) also argues that internet addiction by technological advances is
a factor most important for the spread of cyberbullying especially for students, universities
and children young people have less interaction and social communication. Thus based on
above issue this study aimed to increase the understanding of the concept cyberbullying
2
among student in University Selangor. However, this study aimed to include aspects such as
chat room bullying, and bullying by phone calls among student and to examine awareness
technological advancements. Cases that are notorious for crime cyberbullying is the case of
Amanda Todd and Tyler Clement who chose to kill self-induced stress. That's enough prove
that cyberbullying crime can have devastating effects on the victim bullying especially the
teenagers and society's perceptions of the individuals involved. As such, a study conducted
by Cybersecurity Malaysia and The Ministry of Education Malaysia found that in 2016, 23
per cent of respondents out of 9651 students from 459 adolescents across Malaysia admitted
situations cyber (Cybersecurity Malaysia, 2016). Additionally, the results of the 2017 cyber
report also found 250 complaints were filed in 2014 and it increased by 389 complaints in
2015 an increase of 55.6 percent. In fact, until November 2016 it increased 5I6 complaints
were reported. Through the results of the statistical reports generated by the Group Malaysian
media is an increasingly popular medium for activity bullying other than traditional bullying.
Thus it is important to identify what is the extent of the cyberbullying problem. (Hebert,
Cenat, Blais, Lavoie, & Guerrier, 2016) says that cyber bullying is an extension of traditional
bullying that is not related to school responsibilities as they generally involve only personal
computers and phones student cell. According to (Whelan, 2016) in his study found the
method of bullying the most frequently used is to use cruel words through order, upload
images and videos as a medium of bullying in the cyber world. It is also supported by the
study performed by (Sprugnoli, Stefano, Tonelli, Oncini, & Piras, 2018) which states that the
3
distribution of pictures and videos intermediate clips are often used for cyberbullying crime.
(Mesch, 2016) state that the evolution of the electronic field makes adolescents spending
some of their time in cyberspace. Cyberspace enables language modified and adapted to 'net-
speak', identities can be hidden and personalities can be changed, and teens have no limits to
interacting and playing the role of choice in the cyber world. Various mediums of social
networking are readily available and available in use now. Some are picture-oriented like
Instagram, posting simple messages such as Twitter, and social media (uploading photos,
instant message, post status, etc) like Facebook. Therefore it is important to clarify does
The phenomenon of cyberbullying has a very negative effect on the victim especially from
psychological angle. It affects the emotions of the victim and causes them to suffer
sadness, depression, fear and anger. This is evidenced by the research done by (Ashktorab &
Vitak, 2016) showing that anger recorded the highest percentage and was followed by
depression, sadness and fear. Victims with high levels of anger will push themselves to
change became more selfish, threatened and started spreading bad rumors. Here shows that
cyberbullying has a very negative effect on students’ and society with the intent and objective
of inciting others to harm season (Edwards, Kontostathis, & Fisher, 2016). This is in line with
the findings of (Fisher, 2015) who found that cyberbullying greatly affects the overall
emotion of the bullying victim mood, appetite, energy levels, sleep and affect the academic
performance of the victim. Meanwhile (P.Hamm, et al., 2015) also found that cyberbullying
had a negative effect on the victim's emotions leading to the victim being sad, depressed,
4
If this problem is not addressed and it is best resolved that it may cause the victim to take
action that doesn't sound like a suicide. This is reinforced by the research done by (Crosby,
2018) in which he finds that the victim cyberbullying is twice as likely to commit suicide as it
is teenagers who have never experienced cyberbullying. Thus it is important to clarify Does
subjective norm and perceived behaviour control influence Unisel students’ to cyberbullying
behaviour.
Most of them are involved seriously involved with cyberbullying an incident choosing to
commit suicide is among women. According to the study conducted by (Abbasi, Naseem,
Shamim, & Qureshi, 2018) found that 54 percent of women were most affected with mental
anxiety and suicide attempts compared to men. It clearly shows cyberbullying involvement
negatively affected adolescents with 61.3 percent compared to men's 38.7 percent (Martins,
Mares, & Nathanson, 2019). It is also supported by (Knopf, 2014) the study of who found 62
percent of women between the ages of 11 and the 18-year-old does not admit to being
involved as a bully or victim but they are tends to be involved in specific cyberbullying
activities. It shows that they tend to be involved in cyberbullying but do not define action
they are cyberbullying. In contrast, a study by (Limo, 2015) found that the percentage of men
higher was involved in cyber bullying of 58 percent, acting as a bully while the percentage of
cyberbullying victims is about the same between both sexes. Thus, to identify cyberbullying
crime phenomena that interfere with health society especially the involvement of young
people, a review of this phenomenon is necessary to clarify does students’ gender, age and
5
1.3 Research Objective
5. To identify does students gender, age and internet usage influence Unisel students’
cyberbullying behaviour.
6
Significance of study
1. “This study will give new awakening to the Malaysian researchers and public research
2. “The Private and government universities in Malaysia may use the results of this study as
a reference to taking immediate action in considers the issue of cyber bullying among
3. “This study will give an appropriate action as suggestions on how to enhance Unisel
4. “Academicians can use this study to explore further on the issue of factors affecting cyber
bullying among Malaysians university students and they can propose suggestion that
actually influence the student’s willingness to handle the cyber bullying issues.
5. “Besides that, all the researcher in Malaysia can take systematic steps in develop the
better knowledge in cyber bullying issues that can give greater impact among
adolescents.”
7
Scope and Limitations of Study
“This study was investigated on the factor that contributes to cyberbullying among student
in University Selangor in Malaysian context. On other hand this study also intent to clarify
the does UNISEL students’ attitude, subjective norm and perceive behaviour control
influence cyber bullying behaviour. The studies setting which will be conduct among
UNISEL students who study at Malaysians university were located in Shah Alam. The
results of this study are expected to identify the factor that contributes to cyber bullying
among UNISEL student in Malaysia. This issue is very important to be studied as it not
only has an interest in the cyber bullying aspects but it also involves 3 factors (attitude;
Subjective Norm and Perceive behaviour control) which influencing UNISEL Students to
“The limitation of this study is there are only one issue was examined in this study it was
factor that contribute to cyberbullying among student in University Selangor. Thus it was
advisable in future to explore further on the issue of what are the challenges that faced by
Malaysian university students. On other hand this study also intent to collect data using
questionnaire were the researcher only choose only one university (UNISEL) to collect
data. This phenomena reflect bias in data collection were the researcher only collect data
among the one particular location which is Shah Alam to explore the factor that contribute
important to conduct a research all niversity in overall Malaysia in order to explore further
8
a. Definition of Terms
Cyber bullying
“Cyber bullying is different from traditional bullying due to the anonymity of the
Attitude
Subjective Norm
Is the perceived social pressure to perform or not to perform the behaviour (Ajzen,
2015)
b. Organization of study
Chapter One– Chapter one consists of general information about what is the study to be
conducted all about. There are overviews of factor that contribute to cyber bullying in
Malaysia. It is also covered research problem, research question and research objectives.
9
Chapter Two– For chapter two inclusive of extensive discussion on literature reviewed to
support my research framework. In chapter two also delves discussions on factor that
contribute to cyber bullying, the motivations factor including intrinsic and extrinsic
motivations, cyber bullying. There are also a discussion on the underlying theories that been
Chapter Three- Chapter three presents the conceptual framework applied in this research
and also details the research methodology used to carry out the study. The methodology
applied includes discussion of the pilot study, sampling procedure, research instruments, and
Chapter Four- This chapter was explain the analysis of data and the outcomes obtained
through statistical analysis. The researcher was use Smart SPSS to analysis data and results of
the study. Results of this study will be presented in Chapter 4. The hypotheses developed
earlier will also be analysed, tested and discussed here. Chapter four discusses the analysis
Chapter Five- This chapter was be contain literature about discussion, conclusion, and
recommendation of this study. There also was the highlights and the implication from the
the study’s implications, limitations and suggestions for future research will also be provided.
Chapter five describes and explains the rationale behind the results and how it maps to the
hyphotheses and research objectives. In addition, the limitations, future and contributions
10
CHAPTER 2
LITURATURE REVIEW
2.1 Introduction
This chapter will thoroughly discuss the related literature to provide a comprehensive
picture of this study‘s topic. The current study intends to clarify the factor that contributes
Symptoms of cyber bullying have started since the development of ICT technologies such as
the use of computers and smartphones is considered one of the most important gadgets by
everyone (Bauman and Meter, 2019). The existence of a world without boundaries and
boundaries through the use of the Internet exacerbating cyber security in the cyber world
especially among teenagers were bullying will abuse gadgets like smartphones and computers
for bullying in the cyber world (Limo, 2015). One of the most important types of cyber
bullying is sending messages that have an element of harassment and threats to the victim
that makes the victim unwell comfortable and safe (Holt, Green, et al. 2017). Bullying also
often misuses or hacks passwords or the screen name of the other person as well as the other
person. It is intended for conceals the true identity of the bully and will surely bring it about
misunderstanding of the victim whose account was hacked (Wang, Yogeeswaran, et al.
2019). Also, bullying is a problem pornography is also common on social media. For
11
There are also bullies who upload their comments sensitive and pornographic images of
victims uploaded on social media. Sexting symptoms like sending pictures, messages or
sexually suggestive videos Mobile phone use is also rampant among teenagers (Safaria,.
Tentama, et al. 2016). Today, the symptoms of new forms of cyber bullying are through viral
video transmission or pictures on social media like Facebook, Twitter and so on humiliating
the victim. Most come with a supposedly funny theme and entertaining, yet we often
overlook the consequences and consequences for the victims (Force, 2016). Although no
physical injuries were left but studies show Cyber bullying can have more serious physical
than physical consequences and can lead to serious mental health problems to depression and
Based on a study conducted by the Ministry of Youth and Sports in 2017 in collaboration
with the Malaysian Institute of Youth Development Research shows that, 62.3% of their
respondents were victims of cyberbullying compared to 37.7% have never been victims of
cyberbullying. The statistics from the study prove almost a majority of youths have been
among youth in Malaysia. A total of 1382 youths aged 15 to 30 are respondents of 6 the
different zones are the North Zone, the East Zone, the Central Zone, the South Zone and
12
Figure 2.1 Percentage of Total Cyber bullying Case Based on Platform
Social media is often used as a platform for cybercrime. Various effects can occur if the
Development Research, percent The highest impact on cyber bullying victims is that victims
will be sensitive to the environment, experiencing emotional changes or emotional stress such
as anger or rumble. In addition, victims of bullying will also feel unsafe when surfing the
internet, it can even look messy when it comes to text messages or emails. From physically
towards the individual, the victim will experience a change in sleep or gets sleepy during
13
2.4 Theory Planned Behavior
“Ajzen (1988) developed the Theory of Planned Behaviour as an off-shoot of the Theory of
Reasoned Action. Ajzen’s (1991) Theory of Planned Behaviour uses attitudes, subjective
norms and perceived behavioural control to predict “intention” with relatively high accuracy.
The theory assumes that a person’s intention, when combined with perceived behavioural
control, will help predict behaviour with greater accuracy than previous models (Ajzen,
1991). Ajzen’s (1988) Theory of Planned Behaviour can be broken down into three
the Behaviour (AAct), Perceived Behavioural Control (PBC) and Subjective Norms (SN)
(Ajzen, 1991). Attitude toward the behaviour measures the degree to which a person has a
Behavioural Control refers to people’s perceptions of whether or not they can perform that
specific behaviour and how easy it is to perform. Subjective Norms refer to what individuals
believe other key people in their lives think about whether or not the individual should
14
CHAPTER 3
METHODOLOGY
1.1 Introduction
This chapter will discuss on the data collection method were the researcher will discuss on
the all the procedure will be used to collect the data among Unisel Students regarding
“The intention of this study is to examine the factor that contributes to cyber bullying in
Malaysia context. This study mainly used quantitative approach to collect evident,
whereby the data will gathered based on the answer from the respondent to the
questionnaire. The reason behind the structured questionnaire was using for collect data
from Unisel Students in Kuala Lumpur to assess the (Does Unisel Students attitude;
variables under investigation and to test the multiple hypotheses of this study. Sekaran
(2009) described that a research design is used to measure the relationships among
15
3.3 Measurement of Variables / Instrumentation
“Surveying is one of the sources that will be used to collecting data from respondents \ to
achieve the research goal. In supporting that Sekaran (2009) postulated that, survey
response and cheap and reliable method in terms of cost if compared to other data
collection method. The design of research instrument was described in table 3.1:””
Table 3.1
Content/ No of
Title/Variable Question
Gender
Section A Demographic details Age
Internet usage
Question
“Based on above table 3.1 the researcher was listed the summary of research instrument that
used to collect data. The researcher was using five point likert scale from section 1 till 5 to
measure the perception of the respondent. The questionnaire was adopted form various
studies and some modification was done to the item to applicable in this study. To measure
the listed variables from section two till seven the researcher as used the five point linkert
scales which anchored at “1” Strongly disagree “to Strongly disagree “5” will be used to
16
3.4 Population and Sample size
organization that are chose by the researcher. Moreover Sekaran (2013) postulated that
population of a study should contain entire group of people, events, or things of interest
to be used by researcher in the investigation. The population for this study is private
Unisel students. The total population were choose for this study was 300 and the sample
size was choose base on Krejcie and Morgan (1970) sample size diagram. The sampling
procedure that was adopted in this study for data collection was convenience sampling
method through questionnaire survey with a pre-planned sample size of 300. The
There are various statistical techniques that conducted by many researcher to draw
accurate conclusion about their research interest. However for this empirical study the data
“Reliability and validity are of vital importance in the measurement scales. Reliability
analysis is a measure of the internal consistency of indicators for a construct (Hair et.
al,1998). The purpose of reliability analysis is to determine how well a set of items taps
into some common sources of variance (Viswanathan, 2015), and is frequently measured
with Cronbach’s coefficient alpha. Cronbach’s coefficient alpha is “the ratio of the sum of
17
the covariance’s among the components of the linear combination (items), which estimates
true variance, to the sum of all elements in the variance-covariance matrix of measures,
which equals the observed variance” (Bernstein and Nunnally, 2014).Validity is the extent
to which a scale or set of measures accurately represents the concept of interest. Content
validity (Sireci, 1998) was established during preparation of the questionnaire by using
“All the traditional measures are based after previously validated steps (Hoeh, Venkatesh
and Morris, 2015), and their reliabilities were considered acceptable. Then, construct
validity test was performed which contains discriminant abilities and convergent validity.
Discriminant validity reflects the level to which two conceptually similar constructs are
specific, and the correlation here should be low. Connection analysis can be used to
determine this type of validity. If the relationship result indicated that the correlation
between variables were not higher than 0.8 (Bagozzi, 1994), this would conclude that the
“Convergent abilities refer to the level to which the steps of the same construct are
correlated, and the correlation here should be high. It can be accessed via confirmatory
factor analysis (CFA) the common accepted method for this test (Netemeyer et al., 2016).
CFA allows the researcher to verify the factor structure of a group of observed variables
based on the existing knowledge of the theory, empirical research, or both. If the
measurement items of each build have individual factor charge at least 0.50 and
everything measurement items are significant (level of. 01) for Bartlett's test of sphericity
18
(Sanzo et al., 2014) and index for Kaiser-Meyer-Olkin (KMO) is at least 0. 6 (Pallant,
each of the variables in order to reduce the large number of observed variables on a
small set of fundamental factors. In addition Emory and Cooper (1991) defines factor
addressing which variables is belonging to which variables seems to say the same thing.
In other hand (Hair, 1998) stated that factor analysis can often be conducted on rotated
or is not rotating basis. This is where if a factor analysis conducted on a rotating basis,
it is has various technique but one of the popular techniques that widely used in
research is varimax rotation technique that tend to be give a clear separation (Hair et
al.2015).”
“Kaiser Meyer-Olkin (KMO) will be used in this study in order to measure the adequacy
of sampling among proposed variables. According to Verbeke and Viaene (1999) (KMO)
value should be greater than 0.60, while the value of 0.90 or higher is considered to be
excellent. Meanwhile, Kinnear grey (1994) classifies the (KMO) value and its
acceptance level; If KMO value was greater than 0.50 it can be good factors.”
19
3.8 Measurement of Reliability
“Carmine Zeller (1979) defines reliability analysis as a measure of freedom from errors
and at the same time, producing consistent results, in which the degree of validity is
defined as structural measures are unbiased, consistent measurements across time and
across various items in the instrument. Sekaran (2009) pointed that if the reliability
analysis result for the proposed variable is less than 0.50 it considered as poor and if in
“In the regression process, R indicates the bivariate correlation between the detected values of
the dependent variable and expected values based on the regression equation, while, the (r) in
lower case, is indicating partial regression coefficient in the coefficient table that gives the
fit of the research model and the number of independent variables involved.
20
3.10 Research Framework
Attitude
Subjective norm
Gender,
Age
Frequency internet
usage
Based on figure 3.1 above we can found that there are three independent variables (ATT; SN;
PBC). It can be found that there is only one dependent variable it was Cyber bullying
21
22