Ibrahimmmm Imrad
Ibrahimmmm Imrad
Ibrahimmmm Imrad
STUDENT
Gremel Alejo
Norodin Ibrahim
Morshed Landasan
Mohamad Sapal
Nur Jassan Timan
Mojahed Ulangkaya
ABSTRACT
The focal point of this study was to determine the significant relationship between cyber
bullying and psychological wellbeing among criminology students. This study employed
a descriptive correlational study design.. The respondents of the study were sixty (60)
criminology students of Central Mindanao Colleges in Kidapawan City and they were
selected by employing purposive sampling technique. The data collected were analyzed
and interpreted using Mean and Standard Deviation and Pearson Product Moment
Correlation. The results show that the level of cyberbullying of the criminology students
is. high while the level of psychological well-being of the criminology students is high.
On the other hand, the test of relationship between variables indicates a statistically
significant and positive relationship between cyberbullying and psychological well-being
of criminology students.
INTRODUCTION
FRAMEWORK
Figure 1 shows the conceptual model showing of the relationship of the two
variables. The independent variable is the cyber bullying and dependent variable is the
psychological well-being of criminology students in Kidapawan City.
METHOD
Research design
The researchers utilized correlational design. It is a quantitative method of study
in which you have two quantitative variables from the same set of participants and
you're attempting to figure out if there's a relationship between them (Creswell 2002).
The researcher also employed a descriptive correlational study design. The link
between the dependent variable and the independent variables was determined. To
define phenomena, a descriptive method is used. As a result, some researchers refer to
it as "fact-gathering" or "information gathering" that includes logical and deliberate
interpretations. The descriptive method entails much more than just data collection. Its
goal is to shed light on present challenges or problems through a data collection
approach that allows them to characterize the situation more fully than they could before
using this method. (W. Fox and M.S. Bayat) (2007). The researchers decided to use a
survey research strategy since it best answered the questions and served the study's
objective.
Research Respondents
The respondents of this study were the criminology students in the Kidapawan
City, particularly BS Criminology students of Central Mindanao Colleges. They were the
respondents of this study because they may have direct experiences of cyber bullying.
This study utilized purposive sampling. Purposive sampling is a non-probability
sampling technique in which "components chosen for the sample are picked based on
the researcher's judgment." Researchers frequently feel that by applying sound
judgment, they can produce a representative sample and save time and money (Black,
2010). Researchers choose these individuals according to specific traits or qualities. In
the selection of respondent’s only those Criminology students in Kidapawan City. There
were a total of 60 respondents Criminology students of the Kidapawan City that serve
as the respondents of this study.
Research Locale
This study was conducted in Kidapawan City. It is located at the foot of Mount
Apo, a popular tourist destination from late October to December and in the summer,
when thousands of visitors climb the country's highest mountain.
The City of Kidapawan is located at the southeastern portion of the province. It is
located almost midway between the cities of Davao and Cotabato at a distance of 110
and 120 kilometers, respectively. It is bounded on the north by the municipalities of
President Roxas and Magpet, on the south by Makilala, on the southwest by M’lang,
and on the northwest by Matalam.
Research Instrument
This study utilized two questionnaires for gathering data needed in determining
the connection of the variables in this study. The questionnaire for independent variable
(Cyber bullying) was adapted from the work of Tudkuea & Laeheem (2014) which
identifies the five indicators such as flaming, slandering, refer, secret, and deletion. On
the other hand, the dependent variable is patterned after the work of Ryff & Keyes
(1995) which identifies the six indicators such as autonomy, environmental mastery,
personal growth, positive relation, self-acceptance, and purpose in life.
Statistical Tools
The data collected were analyzed and interpreted using the following statistical
tools: Mean and Standard Deviation was used to determine the levels of cyberbullying
and psychological well-being of criminology students, and Pearson Product Moment
Correlation was utilized to determine the relationship between cyberbullying and
psychological well-being of criminology students.
Level of cyberbullying
The results show that the indicator autonomy garnered a category mean score of
4.24 or high, this suggests that the psychological well-being of criminology students in
terms of autonomy is oftentimes manifested. The indicator environmental mastery
acquired a category mean score of 3.89 or high, this implies that environmental mastery
is oftentimes manifested by the criminology students. The indicator personal growth
obtained a category mean score of 3.98 or high, this signifies that personal growth is
oftentimes manifested by the criminology students. Conversely, the indicator positive
relation gained a category mean score of 4.05 or high, this suggests that psychological
well-being in terms of positive relation is oftentimes manifested among criminology
students. Meanwhile, the indicator self-acceptance acquired a category mean score of
4.13 or high, this indicates that self-acceptance is oftentimes manifested by the
criminology students. The indicator Purpose in Life garnered a category mean score of
4.24 or high, this signifies that purpose in life is oftentimes manifested by criminology
students.
Cyber bullying
.272* .000 Significant
The result of this study conforms to the proposition of Mesch (2009) cyber bullying
emerges most commonly from relationship problems (break-ups, envy, intolerance, and
ganging up); victims experience powerfully negative effects (especially on their social
well-being); and the reactive behavior from schools and students is generally
inappropriate, absent, or ineffective (Hoff & Mitchell, 2009). There is a significant
correlation between becoming a cyber victim and loneliness among adolescents
according (Sahin, 2012).
Cyber bullying is a devastating type of bullying that haunts child relentlessly. Until
the level of awareness is raised and the stakeholders truly understand what is going on
in the privacy of their homes, within the walls of the schools, and in the community, the
war against the children will only intensify (Beringer, 2004).
CONCLUSION
The level of cyberbullying of the criminology students revealed a high mean score.
Second, the level of psychological well-being of the criminology students revealed a
high level. Third, the test of relationship between variables indicates a statistically
significant and positive relationship between cyberbullying and psychological well-being
of criminology students.
The result of this study conforms to the proposition of Mesch (2009) cyber bullying
emerges most commonly from relationship problems (break-ups, envy, intolerance, and
ganging up); victims experience powerfully negative effects (especially on their social
well-being); and the reactive behavior from schools and students is generally
inappropriate, absent, or ineffective (Hoff & Mitchell, 2009). There is a significant
correlation between becoming a cyber victim and loneliness among adolescents
according (Sahin, 2012). In addition, cyberbullying is a devastating type of bullying that
haunts child relentlessly. Until the level of awareness is raised and the stakeholders
truly understand what is going on in the privacy of their homes, within the walls of the
schools, and in the community, the war against the children will only intensify (Beringer,
2004).
REFERENCES
Adams, C. (2010). Cyber bullying: How to make it stop. Instructor. 120(2), 44-49. [2]
Beran, T. & Qing L. (2007). The relationship between cyber bullying and school
bullying. Journal of Student Wellbeing, 1(2), 15-33.
Bhat, C., Suniti, C., Shih-Hua, L., & Jamie A. (2010). Addressing cyber bullying as
media literacy. New Horizons in Education, 58(3), 34-43.
Boulton, M., Lloyd, J., Down, J., & Marx, H. (2012). Predicting undergraduates' self-
reported engagement in traditional and cyber bullying from attitudes.
Cyberpsychology, Behavior, and Social Networking, 15(3), 141-147.
Beale, A. V., & Hall, K. R. (2007). Cyber bullying: What school administrators (and
parents) can do. Clearing House, 81(1), 8-12. DOI: 10.3200/TCHS.81.1.8-12
Calvete, E.,Orue, I., Estévez, A., Villardón, L., & Padilla, P.(2010). Cyber bullying in
adolescents: Modalities and aggressors’ profile. Computers in Human Behavior,
26(5), 1128-1135. 8p. DOI: 10.1016/j.chb.2010.03.017.
Cowie, H., & Colliety, P. (2010). Cyber bullying: Sanctions or sensitivity? Pastoral Care
in Education, 28(4), 261-268. DOI: 10.1080/02643944.2010.528017.
Dehue, F., Bolman, C., & Völlink, T. (2008). Cyber bullying: Youngsters' experiences
and parental perception. CyberPsychology & Behavior, 11(2), 217-223.
Diamanduros, T., & Downs, E. (2011). Creating a safe school environment: How to
prevent cyber bullying at your school. Library Media Connection, 30(2), 36-38.
Didden, R., Scholte, R. H. J., Korzilius, H., de Moor, J. M. H., Vermeulen, A., O'Reilly,
M., Lang, R., & Lancioni, G. E. (2009). Cyber bullying among students with
intellectual and developmental disability in special education settings.
Developmental Neurorehabilitation. 12(3), 146-151. DOI:
10.1080/17518420902971356.
Durkin, K., & Patterson, D. (2011). Cyber bullying, cyber harassing, and cyber stalking.
In: The Routledge handbook of deviant behavior. Bryant, C. D. (Ed.); New York,
NY, US: Routledge/Taylor & Francis Group, 450-455. [Chapter]
Erdur-Baker, Ö. (2010). Cyber bullying and its correlation to traditional bullying, gender
and frequent and risky usage of internet-mediated communication tools. New
Media & Society, 12(1), 109-125. DOI: 10.1177/1461444809341260.
Akers, R. L., Krohn, M. D., Lanza-Kaduce, L., and Radosevich, M. 1995. "Social
Learning and Deviant Behavior: A Specific Test of a General Theory," in
Contemporary Masters in Criminology. Springer, pp. 187-214.
Allen, K. P. 2012. "Off the Radar and Ubiquitous: Text Messaging and Its Relationship
to Drama and Cyber bullying in an Affluent, Academically Rigorous Us High
School," Journal of Youth Studies (15:1), pp. 99-117.
Barlett, C. P. 2017. "From Theory to Practice: Cyber bullying Theory and Its Application
to Intervention," Computers in Human Behavior (72), pp. 269-275.
Barlett, C. P., Gentile, D. A., and Chew, C. 2016. "Predicting Cyber bullying from
Anonymity," Psychology of Popular Media Culture (5:2), p. 171.
Bauman, S., Toomey, R. B., and Walker, J. L. 2013. "Associations among Bullying,
Cyber bullying, and Suicide in High School Students," Journal of adolescence
(36:2), pp. 341-350.
Beale, A. V., and Hall, K. R. 2007. "Cyber bullying: What School Administrators (and
Parents) Can Do," The Clearing House: A Journal of Educational Strategies,
Issues and Ideas (81:1), pp. 8-12. Cyber bullying: A Review of the Literature 12
Beran, T., and Li, Q. 2008. "The Relationship between Cyber bullying and School
Bullying," The Journal of Student Wellbeing (1:2), pp. 16-33.
Bhat, C., and Ragan, M. 2013. "Cyber bullying in Asia,"). Bocij, P. 2004. Cyber stalking:
Harassment in the Internet Age and How to Protect Your Family. Greenwood
Publishing Group.
Estell, D. B., Farmer, T. W., Irvin, M. J., Crowther, A., Akos, P., & Boudah, D. J. (2009).
Students with exceptionalities and the peer group context of bullying and
victimization in late elementary school. Journal of Child & Family Studies, 18(2),
136-50.
Fredrick, K. (2010). Mean girls (and boys): Cyber bullying and what can be done about
it. School Library Media Activities Monthly, 25(8), 44-45.
Haber, J. D., & Daley, L. A. (2011). Cyber bullying Protection Plan. Camping Magazine,
84(2), 32-37.
Hinduja, S., & Patchin, J. W. (2008). Cyber bullying: An exploratory analysis of factors
related to offending and victimization. Deviant Behavior, 29(2), 129-156.
Hinduja, S., & Patchin, J. W. (2010). Cyber bullying: A review of the legal Issues facing
educators. Part of a special issue: Cyber bullying: Preventing School Failure,
55(2), 71-78.
Hinduja, S., & Patchin, J. W. (2011). High-tech cruelty. Educational Leadership, 68(5),
48-52.
Hoff, D. L., & Mitchell, S. N. (2009). Cyber bullying: Causes, effects, and remedies.
Journal of Educational Administration, 47(5), 652-665.
Holladay, J. (2011). Cyber bullying. Education Digest, 76(5), 4-9. [22] Humphrey, N., &
Symes, W. (2010). Responses to bullying and use of social support among pupils
with autism.
Bouchard, J., and Wong, J. S. 2018. "Examining the Effects of Intensive Supervision
and Aftercare Programs for at-Risk Youth: A Systematic Review and Meta-
Analysis," International journal of offender therapy and comparative criminology
(62:6), pp. 1509-1534.
Boulton, M., Lloyd, J., Down, J., and Marx, H. 2012. "Predicting Undergraduates' Self-
Reported Engagement in Traditional and Cyber bullying from Attitudes,"
Cyberpsychology, Behavior, and Social Networking (15:3), pp. 141-147. Bradley,
B. W. 2016. "Detection of Cyber bullying in Sms Messaging,").
Brewer, B., Cave, A., Massey, A., Vurdelja, A., and Freeman, J. 2012. "Cyber Bullying
among Female College Students: An Exploratory Study," Californian Journal of
Health Promotion (12:1), pp. 40-51.
Calvete, E., and Orue, I. 2010. "Cognitive Schemas and Aggressive Behavior in
Adolescents: The Mediating Role of Social Information Processing," The Spanish
Journal of Psychology (13:1), pp. 190-201.
Chapin, J. 2016. "Adolescents and Cyber Bullying: The Precaution Adoption Process
Model," Education and information technologies (21:4), pp. 719-728.
Crosby, S. 2018. "The Connection between Cyber bullying and Teenage Suicide: An
Honors Thesis,"). D'Ovidio, R., and Doyle, J. 2003. "A Study on Cyber stalking:
Understanding Investigative Hurdles," FBI L. Enforcement Bull. (72), p. 10