Main Article Content
The popularity of computer-mediated communication and cyber technology has created many new vices in society that obstruct the development of adolescents. One such vice is cyberbullying, which is an insidious and covert form of bullying. The present paper opts to scrutinise cyberbullying's psychological effects on the victim teenagers of minority communities of a cosmopolitan city. Confirmatory factor analysis, for testing the Psychological Effect of Cyberbullying Scale (PECS) comprising 24 direct item pool, was employed to unfold Mild Psychological Effect Scale (MPES) and Intense Psychological Effect Scale (IPES). Cross validating the initial factor structure was conducted with the help of developing standardised coefficient for the two factor model for PECS. Cronbach's alpha reliability coefficient values are above 0.09 for the items of both the Mild Psychological Effect Scale (MPES) and Intense Psychological Effect Scale (IPES). Based on purposive sampling, the study found that all the items taken for conducting the survey are highly co-related to the psychological impact of the victim teens of the minority community of the cosmopolitan city. So the PECS developed for measuring the effect has significance. Study results also indicate that the PECS can serve as a valuable tool for measuring the mental impact of cyberbullying among teenagers.
This work is licensed under a Creative Commons Attribution 4.0 International License.
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Aricak, T., Siyahhan, S., & Uzunhasanoglu, A. (2008). Cyberbullying among Turkish adolescents. CyberPsychology & Behaviour, 11(3), 253-261. https://doi.org/10.1089/cpb.2007.0016
Beran, T., & Li, Q. (2005). Cyber harassment: A study of a new method for an old behaviour. Journal of Education Computing Research, 32(3), 265-277. https://doi.org/10.2190/8YQM-B04H-PG4D-BLLH
Best, P., Manktelow, R., & Taylor, B. (2014). Online communication, social media and adolescent wellbeing: A systematic narrative review. Child and Youth Services Review, 41, 27-36. https://doi.org/10.1016/j.childyouth.2014.03.001
Biswas, M.Z.H. (2015). Socio Economic Conditions of Muslims of West Bengal: An Enquiry to Their Social Exclusion. International Journal of Humanities & Social Science Studies, 2 (2), 259-266. http://oaji.net/articles/2015/1115-1443862461.pdf
Boyd, N. (2000). The beast within: Why men are violent (1st ed.). Greystone Book.
Brown, K., Jackson, M., & Cassidy, W. (2006). Cyber-bullying: Developing policy to direct responses that are equitable and effective in addressing this special form of bullying. Canadian Journal of Educational Administration and Policy, 57, 1-36. http://www.umanitoba.ca/publications/cjeap/articles/brown_jackson_cassidy.html.
Canadian Journal of Educational Administration and Policy,57, 1–36. doi:
Bureau of Applied Statistics and Economics, Department of Statistics and Program Implementation, Government of West Bengal. District Statistical Handbook, Kolkata (2013). pp.18
Burton, S. (2014). Safegaurding children from online danger. In Burton, S., & Reid, J (Eds)., Safegaurding and protecting children in the early years (1st ed.), 131-146. Routledge.
Byrne, B.M. (2010). Structural equation modelling with AMOS basic concept, applications and programming. Taylor and Francis
Chaudhuri, S. (1990). Calcutta—The Living City, Volume II: The Present and Future, Calcutta. Oxford University Press.
Engfer, L. (2003). India in Pictures. Lerner Publishing Group.
George, D., & Mallery, P. (2001). SPSS for Windows: Step by step. Allyn & Bacon.
Greenfield, P.M., & Cocking, R.R. (2014). Independence and interdependence as developmental scripts: Implications for theory, research and practice. In Greenfield, P.M. & Cocking, R.R (Eds). Cross-culture roots of minority child development (pp. 1-41). New York: Psychology Press. https://doi.org/10.4324/9781315746555
Hair, J.R., Black, W.C., Babin, B.J., & Anderson, R. E. (2010). Multivariate data analysis (7th ed.). Macmillan Publishers.
High, B. (2007). Bullycide in America: Moms speak out about bullying/ suicide connection (1st ed.). Washington: JBS Publishing.
Hinduja, S. & Patchin, J.W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behaviour, 29 (2), 129–156. https://doi.org/10.1080/01639620701457816
Horowitz, M., & Bollinger, D.M. (2014). Cyberbullying in social media within educational institutions: Featuring students, employee and parent information (1st ed.). Rowman and Littlefield Publishers.
Kanwal, H.& Jami, H. (2019). Exploring odes, strategies, and psychosocial consequences of Cyberbullying Perpetration and Victimization Among University Students. Pakistan Journal of Psychological Research, 34 (4), 787-817.DOI: 10.33824/PJPR.2019.34.4.43.
Kowalski, R.M. & Limber, S.P. (2007). Electronic bullying among middle school students. Journal of Adolescent Health, 41(6 Suppl 1), S22–S30. DOI: 10.1016/j.jadohealth.2007.08.017
Lee, S.S., Bashnakova, D., & Goldblatt, J. (2017). The 21st century meeting and event technologies: Powerful tools for better planning, marketing and evaluation (1st ed.). Oakvilla, Canada: Apple Academic Press.
Lee, Y. & Wu, W. (2018). Factors in cyberbullying: The attitude- social influence- efficacy model. Anales de Psicologia, 34 (2), 324-331. http://scielo.isciii.es/pdf/ap/v34n2/0212-9728-ap-34-02-323.pdf
Marcum, C.D., & Higgins, G.E., & Ricketts, M.L. (2014). Juveniles and cyber stalking in United States: An analysis of theoretical predictors of patterns of online perpetration. International Journal of Cyber Criminology, 8 (1), 47-56. http://www.cybercrimejournal.com/marcumetalijcc2014vol8issue1.pdf
Marczak, M., & Coyne, I. (2015). A focus on online bullying. In Attrill, A (Ed), Cyberpsychology (pp. 147-156). Oxford University Press.
Martin-Dunlop, C., & Fraser, B.J. (2007). Learning environment and attitudes associated with an innovative science course designed for prospective elementary teachers. International Journal of Science and Mathematics Education, 6, 163-190. https://link.springer.com/article/10.1007/s10763-007-9070-2
National Crime Record Bureau, Ministry of Home Affairs, Government of India. Crime in India (2017). pp. 797
Price, M., & Dalgleisa, J. (2010). Cyberbullying: Experience, impacts and coping strategies as described by Australian young People. Young Studies Australia, 29(2), 51-59. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.469.2077&rep=rep1&type=pdf
Shariff, S., & Hoff, D.L. (2007). Clarifying legal boundaries for school supervision in cyber space. International Journal of Cyber Criminology, 1(1), 76-118. http://www.cybercrimejournal.com/shaheenhoff.pdf
Singh, G., & Kumar, M. (2014). Exploratory factor analysis of service quality dimensions for higher educational institutes: A students perspective. In Theodore. J. D. (Ed), Global Journal of Management and Business Research, 14(8), 38-48. https://globaljournals.org/GJMBR_Volume14/6-Exploratory-Factor-Analysis.pdf
Skoda, U., & Nielsen, K.B. (2014). Introduction: Navigating exclusion, engineering inclusion. In Skoda, U., Nielsen, K.B., & Fibiger, M. Q (Eds), Navigating social exclusion and inclusion in contemporary India and beyond: Structure, agents, practices (pp. 1-19). Anthem Press
Usher, A. (2010). Expose your hidden talents: Behind the mask (1st ed.). Xlibris Corporation.
Valkenburg, P.M. & Piotrowski, J.T. (2017). Plugged in: How media attract and affect youth. Yale University Press. https://yalebooks.yale.edu/sites/default/files/files/Media/9780300228090_UPDF.pdf
Wall, D.S. (2014). Policing identity crimes. In Wall, D.S., & William, M. (Eds), Policing cybercrime: Networked and social media technologies and challenges for policing (pp. 437-460). Routledge. DOI: 10.1080/10439463.2013.780222
Welsh Government, United Kingdom (2011). Respecting others: Cyberbullying, guidance Report of Welsh Government, Guidance Document Number: 057/2011. pp. 5-7
Ybarra, M., & Mitchell, K. (2004). Youth engaging in online harassment: Association with caregiver-child relationships, Internet use, and personal characteristics. Journal of Adolescence. 27 (3). 319-336. DOI: 10.1016/j.adolescence.2004.03.007