Browse > Article
http://dx.doi.org/10.3745/JIPS.04.0033

Cyberbullying and a Mobile Game App? An Initial Perspective on an Alternative Solution  

Singh, Manmeet Mahinderjit (School of Computer Sciences, Universiti Sains Malaysia)
Ng, Ping Jie (School of Computer Sciences, Universiti Sains Malaysia)
Ya, Kar Ming (School of Computer Sciences, Universiti Sains Malaysia)
Husin, Mohd Heikal (School of Computer Sciences, Universiti Sains Malaysia)
Malim, Nurul Hashimah Ahamed Hassain (School of Computer Sciences, Universiti Sains Malaysia)
Publication Information
Journal of Information Processing Systems / v.13, no.3, 2017 , pp. 559-572 More about this Journal
Abstract
Cyberbullying has been an emerging issue in recent years where research has revealed that users generally spend an increasing amount of time in social networks and forums to keep connected with each other. However, issue arises when cyberbullies are able to reach their victims through these social media platforms. There are different types of cyberbullying and like traditional bullying; it causes victims to feel overly selfconscious, increases their tendency to self-harm and generally affects their mental state negatively. Such situations occur due to security issues such as user anonymity and the lack of content restrictions in some social networks or web forums. In this paper, we highlight the existing solutions, which are Intrusion Prevention System and Intrusion Detection System from a number of researchers. However, even with such solutions, cyberbullying acts still occurs at an alarming rate. As such, we proposed an alternative solution that aims to prevent cyberbullying activities at a younger age, e.g., young children. The application would provide an alternative method to preventing cyberbullying activities among the younger generations in the future.
Keywords
Cyberbullying; Digital Etiquette; Intrusion Detection System; Mobile Application; Social Network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. W. Patchin and S. Hinduja, Cyberbullying Prevention and Response: Expert Perspectives. New York, NY: Routledge, 2012.
2 M. Ribble, Digital Citizenship in Schools, 2nd ed. Eugene, OR: International Society for Technology in Education, 2011.
3 D. Murad, N. H. Rodzi, and T. Avineshwaran, "Angry woman driver becomes cyberbullying victim," 2014 [Online]. Available: http://www.thestar.com.my/News/Nation/2014/07/17/Road-rage-leads-to-outrage-Angry-woman-driver-becomes-cyber-bullying-victim/.
4 N. A. Rahman, N. S. Razali, S. A. Mohd Ali, N. H. Ahamed Hassain Malim, M. H. Husin, and M. M. Singh, "Digital etiquette: educating primary school children via mobile game application," in Proceedings of the 7th Knowledge Management International (KMICe2014), Langkawi, Malaysia, 2014.
5 R. Slonje, P. K. Smith, and A. Frisen, "The nature of cyberbullying, and strategies for prevention," Computers in Human Behavior, vol. 29, no. 1, pp. 26-32, 2013.   DOI
6 S. Hinduja and J. W. Patchin, "Sexting: a brief guide for educators and parents," 2010 [Online]. Available: http://cyberbullying.org/sexting-a-brief-guide-for-educators-and-parents-2.
7 M. H. Husin, G. Deegan, and N. Evans, "Social twins: Enterprise 2.0 and Government 2.0," European Journal of ePractice, vol. 2012, no. 17, pp. 51-67, 2012.
8 L. Griezel, R. G. Craven, A. S. Yeung, and L. R. Finger, "The development of a multi-dimensional measure of cyber bullying," in Proceedings of Australian Association for Research in Education, Brisbane, 2008.
9 C. Su and T. J. Holt, "Cyber bullying in Chinese Web Forums: an examination of nature and extent," International Journal of Cyber Criminology, vol. 4, no. 1-2, pp. 672-684, 2010.
10 T. Feinberg and N. Robey, "Cyberbullying: intervention and prevention strategies," National Association of School Psychologists: Communique, vol. 38, no. 4, pp. 22-24, 2009.
11 D. Siegle, "Cyberbullying and sexting: technology abuses of the 21st century," Gifted Child Today, vol. 33, no. 2, pp. 14-65, 2010.   DOI
12 P. Newton, "Canadian teen commits suicide after alleged rape, bullying," 2013 [Online]. Available: http://edition.cnn.com/2013/04/10/justice/canada-teen-suicide.
13 N. M. Aune, "Cyberbullying," 2009 [Online]. Available: http://www2.uwstout.edu/content/lib/thesis/2009/2009aunen.pdf.
14 L. Brooke, "Punched from the screen: workplace cyber bullying becoming more widespread," 2012 [Online]. Available: http://www.nottingham.ac.uk/news/pressreleases/2012/november/punched-from-the-screen---workplace-cyber-bullying.aspx.
15 M. Hutchinson, M. Vickers, D. Jackson, and L. Wilkes, "Workplace bullying in nursing: towards a more critical organisational perspective," Nursing Inquiry, vol. 13, no. 2, pp. 118-126, 2006.   DOI
16 M. S. Hershcovis, "Incivility, social undermining, bullying…oh my!: a call to reconcile constructs within workplace aggression research," Journal of Organizational Behavior, vol. 32, no. 3, pp. 499-519, 2011.   DOI
17 K. Krombholz, D. Merkl, and E. Weippl, "Fake identities in social media: a case study on the sustainability of the Facebook business model," Journal of Service Science Research, vol. 4, no. 2, pp. 175-212, 2012.   DOI
18 C. Privitera and M. A. Campbell, "Cyberbullying: the new face of workplace bullying?" CyberPsychology and Behavior, vol. 12, no. 4, pp. 395-400, 2009.   DOI
19 X. Zhang, C. Li, and W. Zheng, "Intrusion prevention system design," in Proceedings of the 4th International Conference on Computer and Information Technology, Wuhan, China, 2004, pp. 386-390.
20 R. M. Kowalski, G. W. Giumetti, A. N. Schroeder, and H. H. Reese, "Cyber bullying among college students: evidence from multiple domains of college life," in Misbehavior Online in Higher Education. Bingley: Emerald Publishing Group, 2012, pp. 293-321.
21 S. Zhang and D. Leidner, "Workplace cyberbullying: the antecedents and consequences," in Proceedings of 20th Americas Conference on Information Systems, Savannah, GA, 2014.
22 D. E. Denning, "An intrusion-detection model," IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222-232, 1987.   DOI
23 J. S. Sherif and T. G. Dearmond, "Intrusion detection: systems and models," in Proceedings of 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Pittsburgh, PA, 2002, pp. 115-133.
24 S. F. Page, "Innovative schools in Michigan," 2015 [Online]. Available: http://files.eric.ed.gov/fulltext/ED558046.pdf.
25 M. Ptaszynski, P. Dybala, T. Matsuba, F. Masui, R. Rzepka, and K. Araki, "Machine learning and affect analysis against cyber-bullying," in Proceedings of the Linguistic and Cognitive Approaches to Dialog Agents Symposium, Leicester, UK, 2010, pp. 7-16.
26 P. Norberg, "I don't care that people don't like what I do: business codes viewed as invisible or visible restrictions," Journal of Business Ethics, vol. 86, no. 2, pp. 211-225, 2009.   DOI
27 Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro, "Aiding the detection of fake accounts in large scale social online services," in Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, San Jose, CA, 2012.
28 G. Kontaxis, J. Polakis, S. Ioannidis, and E. P. Markatos, "Detecting social network profile cloning," in Proceedings of 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Seattle, WA, 2011, pp. 295-300.
29 Y. S. Kim, B. L. Leventhal, Y. J. Koh, A. Hubbard, and W. T. Boyce, "School bullying and youth violence: causes or consequences of psychopathologic behavior?" Archives of General Psychiatry, vol. 63, no. 9, pp. 1035-1041, 2006.   DOI
30 S. Einarsen, "The nature and causes of bullying at work," International Journal of Manpower, vol. 20, no. 1, pp. 16-27, 1999.   DOI
31 R. N. Bolton, A. Parasuraman, A. Hoefnagels, N. Migchels, S. Kabadayi, T. Gruber, Y. K. Loureiro, and D. Solnet, "Understanding Generation Y and their use of social media: a review and research agenda," Journal of Service Management, vol. 24, no. 3, pp. 245-267, 2013.   DOI
32 European Network and Information Security Agency, "Cyber-bullying and online grooming: helping to protect against the risks," 2011 [Online]. Available: https://www.enisa.europa.eu/publications/Cyber-Bullying%20and%20Online%20Grooming.
33 BrainPOP "Digital etiquette game," 2012 [Online]. Available: http://www.brainpop.com/technology/computersandinternet/digitaletiquette.
34 R. Dredge, J. Gleeson, and X. P. Garcia, "Cyberbullying in social networking sites: an adolescent victim's perspective," Computers in Human Behavior, vol. 36, pp. 13-20, 2014.   DOI
35 S. Park, E. Y. Na, and E. M. Kim, "The relationship between online activities, netiquette and cyberbullying," Children and Youth Services Review, vol. 42, pp. 74-81, 2014.   DOI
36 A. Anandarajah, "Cyber bully" 2004 [Online]. Available: http://www.cybersecurity.my/en/knowledge_bank/news/2004/main/detail/904/index.html.
37 Malaysian Communications and Multimedia Commission, "MCMC's 2011 Annual Report," 2012 [Online]. Available: https://www.mcmc.gov.my/skmmgovmy/media/General/pdf/SKMM_11eng.pdf.
38 C. Shih, "The new social norms," in The Facebook Era: Tapping Online Social Networks to Market, Sell, and Innovate, 2nd ed. Boston, MA: Pearson Education, 2011, pp. 31-44.
39 Carnegie Cyber Academy, "Betty's netiquette quiz," 2012 [Online]. Available: http://www.carnegiecyberacademy.com/funStuff/netiquette/netiquette.html.
40 C. Chou and H. Peng, "Promoting awareness of Internet safety in Taiwan in-service teacher education: a ten-year experience," The Internet and Higher Education, vol. 14, no. 1, pp. 44-53, 2011.   DOI
41 L. Abeysekera and P. Dawson, "Motivation and cognitive load in the flipped classroom: definition, rationale and a call for research," Higher Education Research & Development, vol. 34, no. 1, pp. 1-14, 2015.   DOI
42 R. Hanna, A. Rohm, and V. L. Crittenden, "We're all connected: the power of the social media ecosystem," Business Horizons, vol. 54, no. 3, pp. 265-273, 2011.   DOI
43 D. S. Wall, Cybercrime: The Transformation of Crime in the Information Age. Cambridge, MA: Polity Press, 2007.
44 S. Hinduja and J. W. Patchin, "Bullying, cyberbullying, and suicide," Archives of Suicide Research, vol. 14, no. 3, pp. 206-221, 2010.   DOI