Development of Indicators of Cyberbullying among Youths in Songkhla Province

Tudkuea, Tanyakorn; Laeheem, Kasetchai
July 2014
Asian Social Science;Jul2014, Vol. 10 Issue 14, p74
Academic Journal
The objectives of this study were to develop indicators and to test the goodness of fit of the structural relationship model of indicators of cyberbullying among youths in Songkhla Province. The study was conducted with 480 youths, and confirmatory factor analysis was performed. The results of the study revealed that the indicators of cyberbullying among youths in Songkhla Province consisted of five factors with twenty-four indicators. The factor with the highest weight was slandering (b=0.90) consisting of five indicators, followed by revealing other people’s personal secrets (b=0.89) consisting of five indicators; identity theft (b=0.88) consisting of five indicators; deleting or blocking others from the group (b=0.65) consisting of four indicators; and flaming (b=0.17) consisting of five indicators. The linear structural model of cyberbullying among youths was in statistically significant congruence with empirical data.


Related Articles

  • Cyber Warfare: The Growing Threat.  // Trends Magazine;Apr2009, Issue 72, p33 

    The article discusses the growing threat of cyber crimes to peoples' lives and businesses. It states that only few people appreciate the growing risks from cyber warfare, cyber espionage, and cyber terrorism. It explores the possible source of cyber threats, their manifestations, and their...

  • Derecho penal, cyberbullying y otras formas de acoso (no sexual) en el ciberespacio. Miró Llinares, Fernando // IDP: Revista de Internet, Derecho y Politica;jun2013, Issue 16, p44 

    Social networks, in particular, and the Internet, in general, now represent a new ambit for personal development, a new life space where people spend hours of their day communicating with others and forming relationships, and where, thus, there are attacks on individuals and their honour,...

  • Women Aren't Welcome Here. HESS, AMANDA // Pacific Standard;Jan/Feb2014, Vol. 7 Issue 1, p36 

    The article reports on the abuse women receive from using the Internet. A 2005 report by the Pew Research Center showed that women are more bullied online in the Internet than men. It is noted that there are federal laws that cover cyberstalking, one of which is the Violence Against Women Act...

  • 2012 CYBER BULLYING TACTICS. Nucciteill, Michael // Forensic Examiner;Fall2012, Vol. 21 Issue 3, p24 

    The article discusses several tactics in cyber bullying in 2012. It explains that one of the cyber bullying tactics is exclusion which is highly effective and executed through sending a provocative message indirectly to the target child that they are not included in social activities. Another is...

  • Cyber Stalking (Cyber Bullying) - Proof and Punishment. Anderson, Wayne L. // Insights to a Changing World Journal;Dec2010, Issue 4, p18 

    The article focuses on the issues and laws concerning cyber stalking and cyber bullying particularly in the U.S. It offers a brief history of cyber stalking and discusses the ways to prove that a person is a victim of such crime. It mentions that the penalty for cyber stalking is similar to the...

  • Cyberbullies R 4 Real. Hayes, Susan // Current Health 2;Apr/May2008, Vol. 34 Issue 8, p16 

    This article discusses online harassment or cyberbullying.

  • Stop, Block, & Tell.  // Junior Scholastic;9/3/2007, Vol. 110 Issue 1, p11 

    The article reports on the practice of cyberbullying, which includes sending mean e-mails, creating hurtful Web sites, and lying about or impersonating someone online.

  • take control!  // Seventeen;Dec2009/Jan2010, Vol. 69 Issue 1, p145 

    The article presents suggestions on how to deal with digital abuse.

  • Cyberbullying 411. Reece, Tamekia // Current Health Teens;Jan2012, Vol. 38 Issue 5, p7 

    The article presents information on the issues related to cyberbullying.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics