Review
Abstract
Background: The growth of social networking has created a paradigm in which many forms of personal communication are being replaced by internet communication technologies, such as social media. This has led to social issues, such as cyberbullying. In response, researchers are investigating cyberbullying to determine its implications in various life sectors.
Objective: This manuscript reviews the methods, results, and limitations of the current cyberbullying research and discusses the physical and mental repercussions of cyberbullying and social exclusion as well as methods of predicting and counteracting these events. On the basis of the findings, we discuss future research directions.
Methods: Using ScienceDirect, ACM Digital Library, and PubMed, 34 research articles were used in this review. A review was conducted using the selected articles with the goal of understanding the current landscape of cyberbullying research.
Results: Studies have analyzed correlations between depressive and suicidal ideations in subjects as well as relationships in the social, educational, and financial status of the perpetrators. Studies have explored detection methods for monitoring cyberbullying. Automated detection has yet to become effective and accurate; however, several factors, such as personal background and physical appearance, have been identified to correlate with the likelihood that a person becomes a survivor or perpetrator of web-based cybervictimization. Social support is currently common in recovery efforts but may require diversification for specific applications in web-based incidents.
Conclusions: Relations between social status, age, gender, and behaviors have been discovered that offer new insights into the origins and likeliness of cyberbullying events. Rehabilitation from such events is possible; however, automatic detection is not yet a viable solution for prevention of cyberbullying incidents. Effects such as social exclusion and suicidal ideations are closely tied to incidents of cyberbullying and require further study across various social and demographical populations. New studies should be conducted to explore the experiences of survivors and perpetrators and identify causal links. The breadth of research includes demographics from China, Canada, Taiwan, Iran, the United States, and Namibia. Wider ranges of national populations should be considered in future studies for accurate assessments, given global internet communication technology activity. The studies emphasize the need for formal classification terminology. With formal classification, researchers will have a more definite scope, allowing specific research on a single definable topic rather than on general bullying events and symptoms. Of all the studies, 2 used a longitudinal design for their research methodology. The low number of longitudinal studies leaves gaps between causation and correlation, and further research is required to understand the effects of cyberbullying. Research addressing ongoing victimization is required for the various forms of cyberbullying; social support offers the most effective current standard for prevention.
doi:10.2196/30286
Keywords
Introduction
Background
Internet communication technologies (ICTs) include a wide variety of platforms, ranging from social media, instant messaging, and chat rooms to email [
]; all of these affect our normal modes of communication [ ]. The use of ICTs is increasing; meanwhile, negative consequences such as cybervictimization are being overlooked. Cybervictimization, colloquially cyberbullying, is a phenomenon proliferating through rising rates of interaction with social media [ ]. Cyberbullying can be best defined as “an aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly over time against a victim who cannot easily defend him or herself” [ ]. This could be a distressing message about a victim’s appearance, delivered by a perpetrator over several web-based interactions with the purpose of delivering emotional or mental harm. Cyberaggression is formally defined as the intentional harm delivered by the use of electronic means to a person or group of people irrespective of their age who perceive such as offensive, derogatory, harmful, or unwanted [ ]. One example is a mocking tweet regarding someone’s race or ethnicity, sent during a web-based interaction. Cyberaggression is inflicted on any individual and is a description of a singular incident as opposed to being repeated and targeted. Cyberbullying relates a cyberaggression event to a cybervictim, and correlates to a history of abuse where the opposing parties know each other on a personal level [ ]. This implication does not hold for general cyberaggression [ ]. As we are investigating cyberbullying and not cyberaggressions at large, it is important to recognize this distinction. Discourse surrounding cyberbullying is still new and has only seen consistent studies from 2007 to 2020 [ , , ]. Researchers from fields such as sociology and psychology, now studying the phenomenon, struggle to classify it concisely because of the various forms it can take and its relation to traditional bullying. Several cyberbullying studies disagree regarding the overlap of cyberbullying and traditional bullying and use separate definitions to discern them from one another [ ]. The tension stems from the assertion that cyberbullying is more soundly defined within the purview of cyberaggression [ ]. Cyberbullying narrows the classification of instances of cyber-based attacks to those done over length of time; however, many in the field believe this is detrimental to the identification of events that may happen only once or between strangers [ ]. In this review, we define cyberbullying and cyberaggression by their formal definitions and examine cyberbullying events on multiple occurrences.Cybervictimization has a wide reach given the interconnectivity of each user [
]. Youth (ie, aged 11-18 years) are especially susceptible to this form of victimization [ ] given the influence of peer interactions on social development in early life and conventional [ ] standards. Several cases of suicide and suicidality and the presence of suicidal ideations and behaviors [ ] have been found to have direct correlations to cyberbullying [ ]. There are correlations between cyberbullying and mental health consequences, including depressive symptoms, particularly among youth and student populations [ ]. Issues with mental health and social strain are also accumulating among college students and young adults, especially those in the age group of 18 to 24 years, who have screened 19% positivity for experiences of psychological distress because of cyberbullying incidents [ ].Social exclusion is a phenomenon that occurs when someone is forcibly or voluntarily separated from groups with whom they perform social interaction on a daily basis [
]. In clinical studies, social exclusion is associated with depressive symptoms and an increased risk of mortality [ ]. It is possible that there are relations between the domains of cyberbullying, internet communications, and social exclusion, given an attack on a cybervictim being received through their preferred avenue of social interaction [ ]. The likelihood of cyberbullying events among youth and adolescents suggests a considerable risk of social isolation to these populations [ ]. Correlations between social isolation and workplace bullying have been drawn in adult studies [ ]. These relations should be explored in school and in web-based environments so that a crisis among young people can be identified and prevented.Objectives
We review the current research in cyberbullying and mental health, its social outcomes, predictive factors, and novel approaches to management and suppression. We look to contribute a contextual understanding of cyberbullying unfound in the domain, make connections to social isolation and other sociological and psychological effects, and investigate methods to prevent the overall manifestation of these events. This analysis sheds light on current measures taken and future opportunities to combat the prevent the spread of cybervictimization.
Methods
Search Strategy
The primary electronic databases that were used in the review are Elsevier, ScienceDirect, PubMed, and ACM Digital Library. Each of these libraries is a globally recognized and reputable medical or scientific database, and they are ubiquitously used in medical and scientific research. Indexing terms for ScienceDirect and ACM Digital Library were used and were presented through the search as social isolation OR social exclusion OR social alienation AND cyberbullying AND social media. MeSH terms were used for PubMed and were presented through search as social isolation OR social exclusion OR social alienation AND cyberbullying AND social media. These searches were conducted in accordance with the 2009 Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines. These searches were completed on February 23, 2020.
Study Screening
This study’s scope covers cyberbullying factors in their relations to psychological and sociological disorders, social media, and intervening technologies. For these aims, a noted definition of cybervictimization sourced from an article by Smith et al [
] describes it as “an aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly over time against a victim who cannot easily defend him or herself.”The criteria for inclusion of the articles were defined by certain expectations. First, the articles were all original research studies that did not involve secondary reviews of underlying study categories. It was imperative that all studies involve primary data for accurate synthesis of the reviewed information. Second, all articles were required to include some form of cyberbullying factors and the effects they incur. Several articles only involved information about social exclusion or only information about social media and were excluded because they were unrelated to the primary topic. Conversely, it was imperative that all articles include social exclusion factors, given its relation to cyberbullying. Social exclusion factors relate specifically to the phenomena of social distance in reaction to a negative social event. The first screening required all articles to be nonreview, on the topic of bullying, and with factors relating to social exclusion. The articles were curated under these constraints and then screened further for 2 additional metrics. In the second screening, articles were excluded if they did not have significant social media factors, even if the included references to cyberbullying and social isolation, given that the research explicitly focuses on the sociological implications. Finally, the full-text screening involved a complete reading of the articles to determine the relevance of their findings. All records with insufficient information or data, such that they did not provide relevant or citable information, were excluded. The full screening is displayed in
.Results
Landscape of Cyberbullying Research
The research surveyed from 2011 to 2020 focuses on the psychological effects of the phenomenon, with 10 of the 34 articles focusing on factors such as suicidal ideations, social agency, and depression [
, , , , - ]. Automated detection studies are studies that dealt with automated identification of cyberbullying events; this takes place through processing of text from logged chat room conversations [ ]. A total of 3 articles dealt with methods of automated detection. Text filtering was a common strategy, using machine learning to perform sentiment analysis. Risk factor studies focus on characteristics that put someone at risk of cyberaggression [ ]. Furthermore, 5 articles dealt with risk factors, such as age, oversharing tendencies, financial disposition, educational background, social media activity, and social status [ , - ]. Predictive factors are behaviors that correlate with involvement in cyberbullying or cybervictimization, and 4 articles dealt with predictive factors of cybervictimization [ , , , ]. Predictive factors included parental status, access to goods, academic standings, and personal identity. Several articles focused on relationships between cyberbullying and traditional bullying, demographics, motivations, and information security. These articles provided information regarding the similarities and differences of web-based and in-person behavior and how they affect attitude and perception of events.The articles dealt with several different ICT platforms, including Facebook, Twitter, Instagram, Tumblr, and many others. Articles that used a direct social media source aimed to discover behaviors and trends that could be used to map potential victims and perpetrators to quantifiable decisions and habits. Facebook and Twitter were the most common platforms used by researchers [
].The research objectives are displayed in
. The widest range of articles were related to psychological effects. These effects are often the focal point of research in cyberbullying. Predictive factors, risk factors, and demographic factors also have a substantial presence in the body of research. There is a smaller emphasis on technological applications in security awareness and automation throughout the research.Research objective | Study |
Victimization risk factors | [ | , - ]
Perpetration predictive factors | [ | , , , ]
Psychological effects | [ | , , , , - ]
Security awareness | [ | , , ]
Automated detection | [ | , , ]
Cyberbullying demographics | [ | , , , , , - ]
Cyberbullying versus in-person bullying | [ | , ]
Forms of Cyberbullying
Limitations relating to the establishment of concrete definitions are an issue in cyberbullying research; however, a new body of research, which began in 2014, created new definitions for cybervictimization and differentiated it from traditional bullying [
]. Cyberbullying events can occur in many ways [ ]. The most prominent methods are flaming, when a person sends angry or vulgar messages; harassment, when there is a consistent stream of offensive messages; denigration, when damaging messages about the target are sent to other associates of the target; masquerading, when the victim’s identity is stolen to imitate harmful or damaging messages produced by another entity; trickery, when the victim is deceived into providing personal information; exclusion, when a victim is ostracized from a social group [ ]; stalking, when a person hacks or obtains personal information from a victim’s social media profile to determine their location and whereabouts; and blackmailing, when anonymous emails, telephone calls, and private messages are sent to a person to solicit money or actions from the victim [ ].Demographics
The demographics in this review included children, adults, both genders, and various social groups. People of any age or status can be the subject of a cyberbullying incident [
]. Incidents present threats in several circles of interpersonal relations. Employed adults experience work position as a risk factor; 40% of people cyberbullied in the workplace are in some supervisory position [ ]. Furthermore, 10% of working adults are survivors of cyberbullying [ ]; however, adolescents between the ages of 13 and 21 years are more vulnerable to peer victimization [ ]. Internet anonymity and the ability to interact with anyone anywhere pose severe risks [ ]. Adolescents are using technological resources at the record rates [ ]. Smartphones are the most common ICTs used by adolescents and can be accessed from any location with cellular service [ ]. Large percentages of females are exposed to threatening messages (50%), stalkers (32%), requests for sexual information (27%), requests for self-sexual images (20%), and cyberbullying (17%) [ ]. Adolescent males who had access to social media through ICTs became exposed to threatening messages (26%), requests for sexual information (15%), cyberbullying (14%), stalkers (14%), and requests for self-sexual images (10%) after use [ ]. The variability in risks, such as substance abuse, self-harm, cybervictimization, and depressive symptoms, caused by these forms of exposure on various age groups is still new in academic study [ ].Studies suggest adolescent females are victimized at the highest rates [
]. They are more at risk in their teenage years than males, facing cyberbullying rates of 18% at the age of 13, 15% at 14, 24% at 15, and 21% at 16 [ ]. Studies among college students showed that 44% of the female students reported experiencing some form of cybervictimization [ ]. Cyberbullying is experienced by both males and females, yet there are many differences in the frequency of victimization that requires investigation.University students reported that 50% of the cyberbullying they experienced was from classmates, 57% was from outside sources, and 43% was from unrelated individuals [
]. Cyberbullying has become a commonplace in higher education, with half of the college age students encountering it in some form. The investigated demographics are listed in .Age, gender, and social status provided the most contextual information in the research. These factors may imply trends in cyberbullying.
Investigated demographics | Study |
Gender | [ | , ]
Social status | [ | , ]
Age | [ | , , , , , ]
Causes
Predictive factors indicate where cyberbullying may occur. A factor may provide information about the perpetrator or the survivor. The literature identifies several factors that range from visual appearance to personal history. Studies have shown [
, , , - ] several initiators of cyberbullying. The leading factor among cyberbullying perpetrators is the presence of normative thinking, peer pressure, and involvement in normatively aggressive peer groups [ ]. The peer group is often the most influential group in a person’s social experience, especially among youth [ ]. Low self-control and difficulty discerning moral identity are factors that allow peer pressure to inform a person’s actions [ ]. When a social event is normalized in the peer group, the subject views the interaction as agreeable even when it contradicts pre-existing moral values [ ].An individual’s perspective on their performance affects their decisions, this is known as self-concept [
]. Self-concept is formally defined as “the relatively stable schemata of oneself that are generalized to the extent that they refer to an individual’s view of him- or herself across different situations” [ ]. Social success is a salient indicator of happiness and a driver of behaviors [ ]. In a study on psychological outcomes in social media interactions, a positive correlation was found between high self-concept and social success in peer groups [ ]. An individual’s view of themselves is affected by environmental factors, such as household income, parental marriage status, gender, and their access to social resources and community [ , , ]. In a study in Iran by Kabiri et al [ ], poor performance in school and growing up in a low-income household also had positive correlations with perpetration likelihoods [ ]. Another study of male boarding students corroborated the correlation of low-income students and cyberbullying [ ]. These students are more likely to be perpetrators and have a higher vulnerability to peer victimization [ ], given that early age interactions and social development may be limited when certain activities are prevented by a payment gap. Weak emotional bonds with parents and high discipline levels are common in perpetrators [ ]. Both genders present similar likelihoods of becoming cyberaggressors [ ].Trends in the studies show the social behaviors of participants who reported receiving negative remarks, unwanted sexual suggestions or images, negativity from peers, humiliating targeted posts or had their accounts hacked [
]. The first major identifier was the tendency to post indiscreet information and content on social platforms without security [ ]. This factor is positively associated with victimization likelihood and accounts for 18% variance in data [ ]. There is a correlation between security and victimization incidents. Often, those who are victimized lack security on their social media profiles or are not equipped with the skills to implement security on their own [ ]. A study by Saridakis et al [ ] demonstrated that higher awareness of security risks and an ability to control generated information actively creates safer and more user-friendly environments, critical in preventing the likelihood of victimizing events.Another contributing factor is facial features. A study on visual perception found that survivors of social ostracization (ie, exclusion by general consent from social acceptance of a group) are likely to be those whose faces are perceived as being incompetent and cold (unfriendly) [
].Causes of cybervictimization events include factors of the environment, individual behavior, and ideations of the self and the environment. Several initiators complicate prediction and may need to be addressed individually.
A detailed list of studies related to causes of perpetration and victimization is shown in
.Causes | Study |
Social pressures: peer grouping, social success | [ | , , ]
Web-based behavior: security awareness, social tendencies | [ | , ]
Self-concept: identity development, social status, educational status | [ | , ]
Public perception: perceived appearance, nonverbal interactions | [ | ]
Familial issues: marital status, home environment, parental relationships | [ | , , ]
Effects of Cyberbullying
Effects are a crucial portion of the research because they contain results related to suicide and depression. Survivors of cybervictimization present high psychological distress, depression, and substance abuse [
]. This phenomenon is distinct from traditional bullying in its psychological effects [ ]. Stress posting and oversharing are behaviors that often have a heavy correlation with cyberbullying [ ]. These behaviors also cause the individual to become more likely to be targeted by a cyberbully [ ] and suggest the possibility of cyclical processes. The scope of negative psychological outcomes of cyberbullying is summarized in .Negative psychological effects | Study |
Social exclusion | [ | , , , , ]
Self-harm | [ | , , ]
Depressive symptoms | [ | , , , , , ]
Substance abuse | [ | , , , , ]
Social isolation, the experience of a person who has been ostracized from a social group, is a common effect of cybervictimization, as exclusion is a main tactic used in web-based cyberbullying [
]. When a person is ostracized, it is common for them to lose a sense of agency because of removal from the group that facilitated their social mobility [ ]. Social agency is the feeling of control over one’s actions and the effects of those actions [ ]. In some cases, bullies may use others within a social circle to isolate a person without directly involving themselves [ ]. Facial features that fail to evoke feelings of empathy from viewers play a role in the likelihood of social exclusion [ ]. High amounts of supplementary web-based communication have been closely associated with feelings of social isolation [ ]. When a person has been socially ostracized, they find it harder to rally social support, as being isolated may corrode most of their social connections [ ]. Still, it is uncommon for cyberbullying to spill over into real-world interactions. A study by Pabian et al [ ] found cases often stay exclusively on the internet or offline.Disadvantaged adolescents are often involved with the misuse of ICTs and become tangentially exposed to self-harm, substance abuse, and suicidal ideations [
]. These youth tend to develop habits of misusing personal data and neglecting social relationships and schoolwork, leading to sexual abuse, blackmail, threats, and, in some cases, the incitation of violence [ ]. Events such as social exclusion, self-harm, substance abuse, and depressive symptoms were emphasized heavily in the literature.Methods of Prevention and Amelioration
There is limited research on approaches for deterring or recovering from cybervictimization. Social support is a generalized approach for social issues brought into the domain of cybervictimization. New research on technical prevention is scarce and have limited effectiveness. We found 3 studies that investigated potential methods for cyberbullying detection [
, , ]. A study on the social networking site ASKfm provides research on a machine learning support vector machine classifier that detects instances of aggressive communication [ ]. Experiments showed that 64% was the highest accuracy achieved by the algorithm [ ]. A study by Ptaszynski et al [ ] in 2016 found that natural language processing tested a 30% drop in performance over just a year of testing.Cybervictimization incidents are embarrassing events, which can cause repression of experiences and discourage social support requests [
]. Social support is the tangible and intangible assistance from friends, partners, family members, and others [ ]. Members in a community encourage and affirm an individual to stabilize their mental health and improve their self-concept [ ]. Social support can occur on the internet or in-person. Web-based intervention is useful in isolation as it benefits those without in-person social support systems [ ]. Assistance through social support occurs before or after an individual encounters cyberaggression [ ]. Social support has produced reliable results in ameliorating cybervictimization effects [ ]. Adolescents who perceived high levels of social support from family members were less likely to experience cyberbullying [ ]. Social support actively reduces the effects of ongoing cyberbullying [ ]. On average, males required more social support in these instances than females [ ]. Multiple intersections of gender in the literature may prove to be a salient factor for future research. There were articles on investigating methods of prevention [ , , ] and on investigating amelioration [ , , ].Research Methods of Current Studies
We identified 4 research methods: exploratory, experimental, longitudinal, and cross-sectional. For this review, exploratory design is defined as research conducted in domains with little or no previous study. These studies are often foundational for future research and promote familiarity with the scope of the research. Experimental design is defined as an approach where the researcher has control of all the variables being manipulated and observed. The focus of these studies is accurately predicting and modeling an outcome based on a hypothesis. Longitudinal design is defined as a study that takes place with a recurring sample over a fixed length of time. Longitudinal studies focus on changes and patterns that develop over long time frames. Cross-sectional design does not rely on time and focuses on existing differences between sample members for one-time data collection. Cross-sectional studies were the most common, given quick access to information through population surveys. The study designs are displayed in
.There are 2 types of data analysis in the studies: qualitative and quantitative analysesQualitative analysis is defined as descriptions of specific situations; for example, the use of interviews, observations, and documents to describe things. Quantitative analysis is defined as data that are represented in numerical form, such as frequencies and averages: these are measurements. In this study, quantitative analysis was the most prominent. The analysis types by article are listed in
.Design | Study |
Cross-sectional | [ | , , , , , , , - , , , , , , , , , ]
Experimental | [ | , , , , , ]
Longitudinal | [ | , ]
Exploratory | [ | , , , ]
Data type | Study |
Quantitative analysis | [ | , - , , - , - , , - , , , - , , ]
Qualitative analysis | [ | , , , , , ]
Throughout the review, important factors across the articles were determined.
[ , , - , , - , - ] summarizes salient information relating to the research processes used in each study. The author’s findings and limitations are summarized for reference. Methods for the deployment of individual studies were recorded as well as the target age demographics. Information relevant to the scope of the review discovered was recorded under social media factors.Discussion
Principal Findings
Our review examines current articles relating to cyberbullying and identifies trends in perpetration and victimization. This contributes to the discussion of cyberbullying prevention approaches given the lack of sufficient technologies to censor it from its victims, likely perpetrators and victims, and consequences of their occurrence. The results provide predictive information relating to age, social status, and gender as well as information on types of cyberbullying, where they occur, and their effects.
We found various forms of cyberbullying in the literature that carry specific psychological effects. Gaps in research design limit the understanding of these events. Cyberbullying incidents carry serious mental health effects for victims leading to psychological disorders and suicidal ideations. New studies have shown that cyberbullying leads to real-world decisions, such as self-harm, abuse, and substance abuse [
, , ]. Our review discerned information about the types of people and behaviors associated with cyberbullying victimization and perpetration. Most of those who are affected are adolescents and college students as well as children. Cyberbullying perpetration varies by age, social class, family life, and academic standing. The resources a person has in their community also affect the way someone can cope with being victimized. Cyberbullying is preventable and mitigatable. The most successful form of prevention of cyberbullying is robust social support systems, as technology cannot provide solid methods for counteraction in real time.There is a lack in information on cybervictimization perpetrators because of the self-report nature of most surveys [
]. First, many involved in cyberaggression and victimization refuse to participate in studies even when anonymity is ensured by the facilitators [ ]. Second, a wide margin of the survey-based studies used cross-sectional methods making it difficult to discern causation of the discovered effects [ , , , , , , , ]. It is not possible to make concrete causal links to behaviors without a long-term process [ ]. Of the studies that used longitudinal methods, causal links, such as the direct relation to victimization and substance abuse, were discovered [ ]. Third, given the emergent status of cybervictimization, there are various discoveries throughout the literature that reveal new factors not previously associated with cybervictimization that have value in its scope [ , ]. The impact of technologies on social relationships is likely an important factor relating to risk factors [ ]. Fourth, there are significant limitations on the basis of demographics surveyed in many of the cross-sectional studies [ , , ]. Cybervictimization is closely linked with social habits that may vary across different countries and in different social spheres [ , , , , , , ]. Most of the literature focuses on participants above the age of 17; however, there are several indications that it may become rampant in children and teenage social spheres [ , , , ]. Trends in access to technology allow vulnerable age groups to access ICTs [ ]. Research should focus on these phenomena using longitudinal design to interpret the unique issues in child cyberbullying. Finally, studies that included text monitoring systems did not experience acceptable success rates within their testing periods [ , , ]. High rates of accuracy are required for filtering methods to be efficient; among the studies, 65% accuracy was the highest rate produced given the limitations in syntactic nuance [ ]. Syntactic analysis of aggressive interactions is difficult to discern from healthy interactions given disparate standards of communication across web-based platforms [ ]. Research on language in insular internet communities should be investigated to expand understandings of web-based communication.Forms of Cyberbullying
Among the types of cyberbullying (flaming, harassment, denigration, masquerading, trickery, exclusion, stalking, and blackmailing), some give rise to dangerous effects, such as social isolation and suicidal ideations. Information on the frequency of the various types of cyberbullying events should be investigated to determine the implications of each form. Research should be driven on the forms that have the highest correlation to suicidality and depressive symptoms. Behaviors that lead to physical harm and death require the quickest responses.
Demographics
Recent reviews of cyberbullying literature lack detailed information on salient factors in predicting and preventing its occurrence in youth and adults. Given that cyberbullying is beginning to be seen in places such as elementary schools, with as high as 85% rates of web-based messaging use in preteen populations, research is crucial to assure the mental health of younger students. Adults are less vulnerable; yet, more research is required to fully understand the complex relations in the workplace surrounding cybervictimization [
]. Gender may play a role in the likelihood of victimization, as females see higher rates of exposure to cyberbullying [ , ]. Females receive more consistent support than males [ ]. Peer groups and setting plays a large role in determining if someone may cyberbully or be victimized. Developing children are exposed to fluctuations of these dimensions of their social experience before understanding the complexities of social interactions [ ]. Counseling resources are effective in handling distress in cyberbullying event. Those who are likely to be victimized share information at high frequencies on social media accounts, have high engagement levels with social media platforms, and have very little understanding of the importance of personal information security [ , , ]. This emphasizes the need for research on young children with access to ICTs.Negative Mental Health Outcomes
Cybervictimization can result in negative mental health outcomes, including depressive symptoms, suicidal ideations, and substance abuse, which are prevalent for young adults and adolescents between the ages of 15 and 23 [
]. These victimization events cause depression and can lead to the deterioration of self-concept and academic performance of students. Social exclusion, a process where individuals are excluded from their social circles, can cause them to lose their perceived agency and expediate other negative mental processes [ ]. This can result in unhappiness that drives victims to depend on web-based interactions for social experience [ ]. The dangers as well as mental abuse, sexual abuse, and drug use are even more of a threat to younger victims as they will have less utility to navigate social complexities than their older counterparts [ ]. This is problematic in a time when intentional studies prove that victimization events on occasion escalate to face-to-face interactions and altercations [ , ].Effective Cyberbullying Prevention
The effects of cyberbullying can be ameliorated by social support [
]. Web-based social support is effective for those who lack strong social connections [ ]. College students and working age adults who are away from family environments for work or school could benefit from these web-based systems. Children and adolescents whose families are present in day-to-day life benefit more from in-person social support intervention, where development of communication and support practices occur through pre-existing relationships. One challenge for social support outreach is that social ostracization can cause victims to lose their sense of agency and steer away from forms of social support [ ]. Negative feelings associated with cyberbullying can cause victims to feel incapable of expressing their experiences and suppress them [ ]. During these events outreach can only be initiated if the victim is willing to divulge information about the instance. Given the volatility of events after initiation and the tendency for victims to become isolated, preventive measures are key in protecting the mental stability of the victim [ ].The current methods of automatic detection [
, ] struggle with nuance in web-based communications. Ptaszynski et al [ ] extracted phrases and categorized them by harmfulness, based on seed words detected in specific phrases. This study used syntactic positioning of words to determine harmfulness within the messages [ ]. This approach achieved up to 90% accuracy but dropped in performance because of the limitations in further data extraction and issues categorizing nonharmful phrases [ ]. Future models should continue optimization and include nonharmful entries and neutral phrases. Van Hee et al [ ] used ASKfm training data sets for phrase annotation with the objective of classifying the role of the participants of the cyberbullying event and the type of cyberbullying that occurred. This approach achieved up to 64% accuracy but lacked context for concise classification of cyberbullying types and could not accurately determine participant roles [ ]. A new model that detects sentiments of the victim, rather than incitement from the perpetrator should be studied for more accurate determination of cyberaggression [ ]. The language of different social groups can take many forms in web-based discourse and can range a wide spectrum of literal and coded speech that is rarely clear cut for unexperienced readers. The model should identify speech patterns on the basis of a sizable history of interaction to make accurate predictions rather than simply classifying based on detected words and phrases.Early intervention is a potential approach for prevention. Research should be headed to investigate the effects of poverty, social stressors, parent marital status, and environment on internet behaviors and tendencies [
, ]. Cyberbullying can be combated by intervention, with different methods for web-based spaces. Given additional data, victim prevention and treatment can be improved. Research on how cyberbullying effects specific geographic regions, ethnic groups, and age ranges [ , , , ] should also be continued; these factors may often determine the psychological outcomes of the victim. New research should offer new perspectives for preventing the proliferation of cyberbullying and social isolation.There are many technologies that are in development today that could be beneficial if applied to the study and prevention of cyberbullying [
, , , ]. Natural language processing is widely studied today and can be the basis for understanding and preventing cyberbullying [ , ]. Methods of recovery are also being studied through social support programs [ ]. Recovery efforts are common for general depression and anxiety and should be improved to focus on issues specifically related to cyberbullying. An example of this is social support programs that promote emotional health [ ]. Similarly, a method of deployment of social support programs to isolated individuals using technology should be further investigated to provide for the event of social isolation caused by cyberbullyingLimitations
The review was limited to 3 specific databases, therefore information about surveys and other research studies on other major and minor databases is excluded from this review. This narrows the scope of information available for consideration in the review to the largest and most beneficial database but may omit potentially useful granular data. The search did not include any articles that lacked information specific to cyberbullying, this means that information pertaining to more general bullying studies that proved pertinent was included. Articles on young children were limited in data about social phenomena influencing behaviors relating to ICTs, making it more difficult to assess the relationship between young children and cyberbullying trends. More longitudinal studies would assist in the understanding of perpetrators and the relations of victim likelihood within adult and child populations [
]. In future research, longitudinal studies are required [ ] for tracking cyberbullying victims and perpetrators to support a comprehensive evaluation of their behaviors and outcomes.Conclusions
Cyberbullying is a newly emerging phenomenon that has proliferated through the global rise of ICTs that began to converge internationally between 2000 and 2008 [
]. Previous reviews have highlighted the severity of the phenomenon [ , , ], yet do not address solutions combating the rapid advance of cybervictimization in the social media era. To confront cybervictimization in the social media era, reevaluation of factors in the scope of the current research and longer-term longitudinal studies for causal links to be ascertained regarding suicidal or depressive symptoms is required. A larger emphasis on demographic groups should be taken to make clear determinations about how cyberbullying effects people of varying age, race, gender, and economic class. Ho et al [ ] noted a wide range of ICT activity across resource-limited and transitional countries; however, few countries have been explicitly studied. Future research should be carried out in more geographic locations, as it requires holistic representation of disparate racial and gender populations. Relations between cyberbullying and predictive factors, such as low socioeconomic status, gender, and the presence of divorce, were identified in addition to studies drawing associations between cybervictimization and mental health outcomes, such as depressive and suicidal ideations. Ideations have been shown to lead to lower academic performance, retaliatory action, and suicide. Detection is a relevant method of counteracting the effects of cyberbullying on youth and adult populations and needs consistent research to keep pace with the rate of ICT growth. Detecting instances of cyberaggression is a challenging process given the nuances of web-based communication and the self-report nature of events [ ]. Discovery of ongoing victimization incidents is necessary to reach current victims of cyberbullying, while predictive factors and preventive measures are required to halt future growth.Acknowledgments
The project was supported, in part, by funds provided by the University of North Carolina at Charlotte.
Conflicts of Interest
None declared.
Summary of individual studies.
DOCX File , 30 KBReferences
- Maoneke P, Shava F, Gamundani A, Bere-Chitauro M, Nhamu I. ICTs use and cyberspace risks faced by adolescents in Namibia. In: Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities. 2018 Presented at: AfriCHI '18: 2nd African Conference for Human Computer Interaction; Dec 3-7, 2018; Windhoek Namibia. [CrossRef]
- Doong SH, Ho S. The impact of ICT development on the global digital divide. Electron Commer Res Appl 2012;11(5):518-533. [CrossRef]
- Smith PK, Mahdavi J, Carvalho M, Fisher S, Russell S, Tippett N. Cyberbullying: its nature and impact in secondary school pupils. J Child Psychol Psychiatry 2008 Apr;49(4):376-385. [CrossRef] [Medline]
- Kabiri S, Shadmanfaat S, Choi J, Yun I. The impact of life domains on cyberbullying perpetration in Iran: a partial test of Agnew's general theory of crime. J Crim Justice 2020;66:101633. [CrossRef]
- Olweus D, Limber SP. Some problems with cyberbullying research. Curr Opin Psychol 2018 Feb;19:139-143. [CrossRef] [Medline]
- Bottino SM, Bottino CM, Regina CG, Correia AV, Ribeiro WS. Cyberbullying and adolescent mental health: systematic review. Cad Saude Publica 2015 Mar;31(3):463-475 [FREE Full text] [CrossRef] [Medline]
- Corcoran L, Guckin C, Prentice G. Cyberbullying or cyber aggression?: a review of existing definitions of cyber-based peer-to-peer aggression. Societies 2015 Mar 27;5(2):245-255. [CrossRef]
- Donegan R. Bullying and cyberbullying: history, statistics, law, prevention and analysis. Elon J Undergrad Res Commun 2012;3:33-42.
- Coley R, Spielvogel B, Kruzik C, Miller P, Betancur L, Votruba-Drzal E. Explaining income disparities in young children’s development: the role of community contexts and family processes✰. Early Child Res Q 2021;55:295-311. [CrossRef]
- Cénat JM, Smith K, Hébert M, Derivois D. Cybervictimization and suicidality among French undergraduate students: a mediation model. J Affect Disord 2019 Apr 15;249:90-95. [CrossRef] [Medline]
- Cole DA, Nick EA, Zelkowitz RL, Roeder KM, Spinelli T. Online social support for young people: does it recapitulate in-person social support; can it help? Comput Human Behav 2017 Mar;68:456-464 [FREE Full text] [CrossRef] [Medline]
- Williford A, Orsi R, DePaolis KJ, Debbie I. Cyber and traditional peer victimization: examining unique associations with children’s internalizing difficulties. Child Youth Serv Rev 2018 Oct;93:51-59. [CrossRef]
- Malik RA, Obhi SS. Social exclusion reduces the sense of agency: evidence from intentional binding. Conscious Cogn 2019 May;71:30-38. [CrossRef] [Medline]
- Cacioppo JT, Cacioppo S, Capitanio JP, Cole SW. The neuroendocrinology of social isolation. Annu Rev Psychol 2015 Jan 03;66:733-767 [FREE Full text] [CrossRef] [Medline]
- Einarsen S, Hoel H, Notelaers G. Measuring exposure to bullying and harassment at work: validity, factor structure and psychometric properties of the Negative Acts Questionnaire-Revised. Work Stress 2009 Jan;23(1):24-44. [CrossRef]
- Kim J, Shim H, Hay C. Unpacking the dynamics involved in the impact of bullying victimization on adolescent suicidal ideation: testing general strain theory in the Korean context. Child Youth Serv Rev 2020 Mar;110:104781. [CrossRef]
- Pantic I. Online social networking and mental health. Cyberpsychol Behav Soc Netw 2014 Oct;17(10):652-657 [FREE Full text] [CrossRef] [Medline]
- Wang C, Chang Y, Yang Y, Hu H, Yen C. Relationships between traditional and cyber harassment and self-identity confusion among Taiwanese gay and bisexual men in emerging adulthood. Compr Psychiatry 2019 Apr;90:14-20 [FREE Full text] [CrossRef] [Medline]
- Khan S, Gagné M, Yang L, Shapka J. Exploring the relationship between adolescents' self-concept and their offline and online social worlds. Comput Human Behav 2016 Feb;55:940-945. [CrossRef]
- Birk MV, Buttlar B, Bowey JT, Poeller S, Thomson SC, Baumann N, et al. The effects of social exclusion on play experience and hostile cognitions in digital games. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 2016 Presented at: CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems; May 7 - 12, 2016; San Jose California USA. [CrossRef]
- Cénat J, Blais M, Lavoie F, Caron P, Hébert M. Cyberbullying victimization and substance use among Quebec high schools students: the mediating role of psychological distress. Comput Human Behav 2018 Aug;89:207-212. [CrossRef]
- Van Hee C, Jacobs G, Emmery C, Desmet B, Lefever E, Verhoeven B, et al. Automatic detection of cyberbullying in social media text. PLoS One 2018 Oct 8;13(10):e0203794 [FREE Full text] [CrossRef] [Medline]
- Li J, Sidibe AM, Shen X, Hesketh T. Incidence, risk factors and psychosomatic symptoms for traditional bullying and cyberbullying in Chinese adolescents. Child Youth Serv Rev 2019 Dec;107:104511. [CrossRef]
- Shaheen AM, Hamdan KM, Albqoor M, Othman AK, Amre HM, Hazeem MN. Perceived social support from family and friends and bullying victimization among adolescents. Child Youth Serv Rev 2019 Dec;107:104503. [CrossRef]
- Lareki A, Martínez de Morentin JI, Altuna J, Amenabar N. Teenagers' perception of risk behaviors regarding digital technologies. Comput Human Behav 2017 Mar;68:395-402. [CrossRef]
- Livazović G, Ham E. Cyberbullying and emotional distress in adolescents: the importance of family, peers and school. Heliyon 2019 Jun;5(6):e01992 [FREE Full text] [CrossRef] [Medline]
- Young R, Len-Ríos M, Young H. Romantic motivations for social media use, social comparison, and online aggression among adolescents. Comput Human Behav 2017 Oct;75:385-395. [CrossRef]
- Kokkinos CM, Saripanidis I. A lifestyle exposure perspective of victimization through Facebook among university students. Do individual differences matter? Comput Human Behav 2017 Sep;74:235-245. [CrossRef]
- Laranjo L. Social media and health behavior change. In: Participatory Health Through Social Media. Cambridge: Academic Press; 2016:83-111.
- Saridakis G, Benson V, Ezingeard J, Tennakoon H. Individual information security, user behaviour and cyber victimisation: an empirical study of social networking users. Technol Forecast Soc Change 2016 Jan;102:320-330. [CrossRef]
- Ptaszynski M, Masui F, Nitta T, Hatakeyama S, Kimura Y, Rzepka R, et al. Sustainable cyberbullying detection with category-maximized relevance of harmful phrases and double-filtered automatic optimization. Int J Child Comput Interac 2016 May;8:15-30. [CrossRef]
- Sánchez-Medina AJ, Galván-Sánchez I, Fernández-Monroy M. Applying artificial intelligence to explore sexual cyberbullying behaviour. Heliyon 2020 Jan 25;6(1):e03218 [FREE Full text] [CrossRef] [Medline]
- Forssell R. Exploring cyberbullying and face-to-face bullying in working life – prevalence, targets and expressions. Comput Human Behav 2016 May;58:454-460. [CrossRef]
- Peled Y. Cyberbullying and its influence on academic, social, and emotional development of undergraduate students. Heliyon 2019 Mar 23;5(3):e01393 [FREE Full text] [CrossRef] [Medline]
- Selkie EM, Kota R, Moreno M. Cyberbullying behaviors among female college students: witnessing, perpetration, and victimization. Coll Stud J 2016;50(2):278-287 [FREE Full text] [Medline]
- Pabian S, Erreygers S, Vandebosch H, Van Royen K, Dare J, Costello L, et al. “Arguments online, but in school we always act normal”: the embeddedness of early adolescent negative peer interactions within the whole of their offline and online peer interactions. Child Youth Serv Rev 2018 Feb;86:1-13. [CrossRef]
- Ho SS, Chen L, Ng AP. Comparing cyberbullying perpetration on social media between primary and secondary school students. Comput Educ 2017 Jun;109:74-84. [CrossRef]
- Beckman L, Hagquist C, Hellström L. Discrepant gender patterns for cyberbullying and traditional bullying – an analysis of Swedish adolescent data. Comput Human Behav 2013 Sep;29(5):1896-1903. [CrossRef]
- Rudert S, Reutner L, Greifeneder R, Walker M. Faced with exclusion: perceived facial warmth and competence influence moral judgments of social exclusion. J Exper Soc Psychol 2017 Jan;68:101-112. [CrossRef]
- Landoll R, La Greca AM, Lai B, Chan S, Herge W. Cyber victimization by peers: prospective associations with adolescent social anxiety and depressive symptoms. J Adolesc 2015 Jul;42:77-86. [CrossRef] [Medline]
- Bunney P, Zink A, Holm A, Billington C, Kotz C. Orexin activation counteracts decreases in nonexercise activity thermogenesis (NEAT) caused by high-fat diet. Physiol Behav 2017 Jul 01;176:139-148 [FREE Full text] [CrossRef] [Medline]
- Blackwell L, Dimond J, Schoenebeck S, Lampe C. Classification and its consequences for online harassment: design insights from HeartMob. Proc ACM Hum Comput Interact 2017 Nov;1(CSCW):1-19. [CrossRef]
- Horner S, Asher Y, Fireman GD. The impact and response to electronic bullying and traditional bullying among adolescents. Comput Human Behav 2015 Aug;49:288-295. [CrossRef]
- Lev-On A. The third-person effect on Facebook: the significance of perceived proficiency. Telemat Inform 2017 Jul;34(4):252-260. [CrossRef]
- Camacho S, Hassanein K, Head M. Cyberbullying impacts on victims’ satisfaction with information and communication technologies: the role of Perceived Cyberbullying Severity. Inform Manag 2018 Jun;55(4):494-507. [CrossRef]
- Walker CM, Sockman BR, Koehn S. An exploratory study of cyberbullying with undergraduate university students. Tech Trends 2011 Mar;55(2):31-38. [CrossRef]
- Hutson E, Kelly S, Militello LK. Systematic review of cyberbullying interventions for youth and parents with implications for evidence-based practice. Worldviews Evid Based Nurs 2018 Feb;15(1):72-79 [FREE Full text] [CrossRef] [Medline]
- Zych I, Ortega-Ruiz R, Marín-López I. Cyberbullying: a systematic review of research, its prevalence and assessment issues in Spanish studies. Psicología Educativa 2016 Jun;22(1):5-18. [CrossRef]
Abbreviations
ICT: internet communication technology |
Edited by J Torous; submitted 10.05.21; peer-reviewed by F Shava, R Kowalski; comments to author 02.06.21; revised version received 25.07.21; accepted 27.08.21; published 04.01.22
Copyright©Adesoji Ademiluyi, Chuqin Li, Albert Park. Originally published in JMIR Formative Research (https://formative.jmir.org), 04.01.2022.
This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Formative Research, is properly cited. The complete bibliographic information, a link to the original publication on https://formative.jmir.org, as well as this copyright and license information must be included.