Exploring Modes, Strategies, and Psychosocial Consequences of Cyberbullying Perpetration and Victimization Among University Students

Pakistan Journal of Psychological Research(2020)

Cited 9|Views0
No score
Abstract
The purpose of the study was to explore modes, strategies, and consequences of cyberbullying perpetration and victimization among university students. In-depth interviews of 14 volunteer university students (8 male and 6 female) were conducted who volunteered to participate in the study in which 10 participants were “cybervictims” whereas 4 were “cyberbully-victim”. Interview guide was used for conducting unstructured interviews. Thematic analysis of the interviews revealed different experiences in cyberspace with respect to gender and role (cybervictim and cyberbully-victim) in experiencing cyberbullying and cyber-victimization. Three themes emerged that is psychological consequences (emotional, behavioral, and cognitive), social consequences (family and peers), and change in lifestyle (online, offline, and academic). Facebook was found to be the most prevalent mode of cyberbullying. The cyberbully-victim participants derived more happiness while bullying and had revengeful attitude; whereas, cybervictims experienced more depression, increased family surveillance, social isolation, and became aware of negative consequences of social networking sites, became more vigilant and conscious in cyberspace. Moreover, the consequences reported by cyberbully-victim were distrust on security settings, low academic achievement, and their peers learnt from their cyberspace experience. Perception of cyber-victimization was different across gender and its psychological impact was more pronounced for girls than boys. The results and implications were discussed in Pakistani context.
More
Translated text
Key words
cyberbullying perpetration,victimization,psychosocial consequences,university students
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined