DOI QR코드

DOI QR Code

Cyberbullying and a Mobile Game App? An Initial Perspective on an Alternative Solution

  • Received : 2016.03.10
  • Accepted : 2017.02.10
  • Published : 2017.06.30

Abstract

Cyberbullying has been an emerging issue in recent years where research has revealed that users generally spend an increasing amount of time in social networks and forums to keep connected with each other. However, issue arises when cyberbullies are able to reach their victims through these social media platforms. There are different types of cyberbullying and like traditional bullying; it causes victims to feel overly selfconscious, increases their tendency to self-harm and generally affects their mental state negatively. Such situations occur due to security issues such as user anonymity and the lack of content restrictions in some social networks or web forums. In this paper, we highlight the existing solutions, which are Intrusion Prevention System and Intrusion Detection System from a number of researchers. However, even with such solutions, cyberbullying acts still occurs at an alarming rate. As such, we proposed an alternative solution that aims to prevent cyberbullying activities at a younger age, e.g., young children. The application would provide an alternative method to preventing cyberbullying activities among the younger generations in the future.

Keywords

References

  1. R. Hanna, A. Rohm, and V. L. Crittenden, "We're all connected: the power of the social media ecosystem," Business Horizons, vol. 54, no. 3, pp. 265-273, 2011. https://doi.org/10.1016/j.bushor.2011.01.007
  2. D. S. Wall, Cybercrime: The Transformation of Crime in the Information Age. Cambridge, MA: Polity Press, 2007.
  3. S. Hinduja and J. W. Patchin, "Bullying, cyberbullying, and suicide," Archives of Suicide Research, vol. 14, no. 3, pp. 206-221, 2010. https://doi.org/10.1080/13811118.2010.494133
  4. J. W. Patchin and S. Hinduja, Cyberbullying Prevention and Response: Expert Perspectives. New York, NY: Routledge, 2012.
  5. M. Ribble, Digital Citizenship in Schools, 2nd ed. Eugene, OR: International Society for Technology in Education, 2011.
  6. D. Murad, N. H. Rodzi, and T. Avineshwaran, "Angry woman driver becomes cyberbullying victim," 2014 [Online]. Available: http://www.thestar.com.my/News/Nation/2014/07/17/Road-rage-leads-to-outrage-Angry-woman-driver-becomes-cyber-bullying-victim/.
  7. N. A. Rahman, N. S. Razali, S. A. Mohd Ali, N. H. Ahamed Hassain Malim, M. H. Husin, and M. M. Singh, "Digital etiquette: educating primary school children via mobile game application," in Proceedings of the 7th Knowledge Management International (KMICe2014), Langkawi, Malaysia, 2014.
  8. R. Slonje, P. K. Smith, and A. Frisen, "The nature of cyberbullying, and strategies for prevention," Computers in Human Behavior, vol. 29, no. 1, pp. 26-32, 2013. https://doi.org/10.1016/j.chb.2012.05.024
  9. S. Hinduja and J. W. Patchin, "Sexting: a brief guide for educators and parents," 2010 [Online]. Available: http://cyberbullying.org/sexting-a-brief-guide-for-educators-and-parents-2.
  10. M. H. Husin, G. Deegan, and N. Evans, "Social twins: Enterprise 2.0 and Government 2.0," European Journal of ePractice, vol. 2012, no. 17, pp. 51-67, 2012.
  11. L. Griezel, R. G. Craven, A. S. Yeung, and L. R. Finger, "The development of a multi-dimensional measure of cyber bullying," in Proceedings of Australian Association for Research in Education, Brisbane, 2008.
  12. C. Su and T. J. Holt, "Cyber bullying in Chinese Web Forums: an examination of nature and extent," International Journal of Cyber Criminology, vol. 4, no. 1-2, pp. 672-684, 2010.
  13. T. Feinberg and N. Robey, "Cyberbullying: intervention and prevention strategies," National Association of School Psychologists: Communique, vol. 38, no. 4, pp. 22-24, 2009.
  14. D. Siegle, "Cyberbullying and sexting: technology abuses of the 21st century," Gifted Child Today, vol. 33, no. 2, pp. 14-65, 2010. https://doi.org/10.1177/107621751003300206
  15. P. Newton, "Canadian teen commits suicide after alleged rape, bullying," 2013 [Online]. Available: http://edition.cnn.com/2013/04/10/justice/canada-teen-suicide.
  16. N. M. Aune, "Cyberbullying," 2009 [Online]. Available: http://www2.uwstout.edu/content/lib/thesis/2009/2009aunen.pdf.
  17. L. Brooke, "Punched from the screen: workplace cyber bullying becoming more widespread," 2012 [Online]. Available: http://www.nottingham.ac.uk/news/pressreleases/2012/november/punched-from-the-screen---workplace-cyber-bullying.aspx.
  18. M. S. Hershcovis, "Incivility, social undermining, bullying…oh my!: a call to reconcile constructs within workplace aggression research," Journal of Organizational Behavior, vol. 32, no. 3, pp. 499-519, 2011. https://doi.org/10.1002/job.689
  19. K. Krombholz, D. Merkl, and E. Weippl, "Fake identities in social media: a case study on the sustainability of the Facebook business model," Journal of Service Science Research, vol. 4, no. 2, pp. 175-212, 2012. https://doi.org/10.1007/s12927-012-0008-z
  20. C. Privitera and M. A. Campbell, "Cyberbullying: the new face of workplace bullying?" CyberPsychology and Behavior, vol. 12, no. 4, pp. 395-400, 2009. https://doi.org/10.1089/cpb.2009.0025
  21. M. Hutchinson, M. Vickers, D. Jackson, and L. Wilkes, "Workplace bullying in nursing: towards a more critical organisational perspective," Nursing Inquiry, vol. 13, no. 2, pp. 118-126, 2006. https://doi.org/10.1111/j.1440-1800.2006.00314.x
  22. R. M. Kowalski, G. W. Giumetti, A. N. Schroeder, and H. H. Reese, "Cyber bullying among college students: evidence from multiple domains of college life," in Misbehavior Online in Higher Education. Bingley: Emerald Publishing Group, 2012, pp. 293-321.
  23. X. Zhang, C. Li, and W. Zheng, "Intrusion prevention system design," in Proceedings of the 4th International Conference on Computer and Information Technology, Wuhan, China, 2004, pp. 386-390.
  24. S. Zhang and D. Leidner, "Workplace cyberbullying: the antecedents and consequences," in Proceedings of 20th Americas Conference on Information Systems, Savannah, GA, 2014.
  25. D. E. Denning, "An intrusion-detection model," IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222-232, 1987. https://doi.org/10.1109/TSE.1987.232894
  26. J. S. Sherif and T. G. Dearmond, "Intrusion detection: systems and models," in Proceedings of 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Pittsburgh, PA, 2002, pp. 115-133.
  27. M. Ptaszynski, P. Dybala, T. Matsuba, F. Masui, R. Rzepka, and K. Araki, "Machine learning and affect analysis against cyber-bullying," in Proceedings of the Linguistic and Cognitive Approaches to Dialog Agents Symposium, Leicester, UK, 2010, pp. 7-16.
  28. P. Norberg, "I don't care that people don't like what I do: business codes viewed as invisible or visible restrictions," Journal of Business Ethics, vol. 86, no. 2, pp. 211-225, 2009. https://doi.org/10.1007/s10551-008-9844-7
  29. Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro, "Aiding the detection of fake accounts in large scale social online services," in Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, San Jose, CA, 2012.
  30. G. Kontaxis, J. Polakis, S. Ioannidis, and E. P. Markatos, "Detecting social network profile cloning," in Proceedings of 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Seattle, WA, 2011, pp. 295-300.
  31. Y. S. Kim, B. L. Leventhal, Y. J. Koh, A. Hubbard, and W. T. Boyce, "School bullying and youth violence: causes or consequences of psychopathologic behavior?" Archives of General Psychiatry, vol. 63, no. 9, pp. 1035-1041, 2006. https://doi.org/10.1001/archpsyc.63.9.1035
  32. S. F. Page, "Innovative schools in Michigan," 2015 [Online]. Available: http://files.eric.ed.gov/fulltext/ED558046.pdf.
  33. S. Einarsen, "The nature and causes of bullying at work," International Journal of Manpower, vol. 20, no. 1, pp. 16-27, 1999. https://doi.org/10.1108/01437729910268588
  34. R. N. Bolton, A. Parasuraman, A. Hoefnagels, N. Migchels, S. Kabadayi, T. Gruber, Y. K. Loureiro, and D. Solnet, "Understanding Generation Y and their use of social media: a review and research agenda," Journal of Service Management, vol. 24, no. 3, pp. 245-267, 2013. https://doi.org/10.1108/09564231311326987
  35. European Network and Information Security Agency, "Cyber-bullying and online grooming: helping to protect against the risks," 2011 [Online]. Available: https://www.enisa.europa.eu/publications/Cyber-Bullying%20and%20Online%20Grooming.
  36. R. Dredge, J. Gleeson, and X. P. Garcia, "Cyberbullying in social networking sites: an adolescent victim's perspective," Computers in Human Behavior, vol. 36, pp. 13-20, 2014. https://doi.org/10.1016/j.chb.2014.03.026
  37. S. Park, E. Y. Na, and E. M. Kim, "The relationship between online activities, netiquette and cyberbullying," Children and Youth Services Review, vol. 42, pp. 74-81, 2014. https://doi.org/10.1016/j.childyouth.2014.04.002
  38. A. Anandarajah, "Cyber bully" 2004 [Online]. Available: http://www.cybersecurity.my/en/knowledge_bank/news/2004/main/detail/904/index.html.
  39. Malaysian Communications and Multimedia Commission, "MCMC's 2011 Annual Report," 2012 [Online]. Available: https://www.mcmc.gov.my/skmmgovmy/media/General/pdf/SKMM_11eng.pdf.
  40. C. Shih, "The new social norms," in The Facebook Era: Tapping Online Social Networks to Market, Sell, and Innovate, 2nd ed. Boston, MA: Pearson Education, 2011, pp. 31-44.
  41. BrainPOP "Digital etiquette game," 2012 [Online]. Available: http://www.brainpop.com/technology/computersandinternet/digitaletiquette.
  42. Carnegie Cyber Academy, "Betty's netiquette quiz," 2012 [Online]. Available: http://www.carnegiecyberacademy.com/funStuff/netiquette/netiquette.html.
  43. C. Chou and H. Peng, "Promoting awareness of Internet safety in Taiwan in-service teacher education: a ten-year experience," The Internet and Higher Education, vol. 14, no. 1, pp. 44-53, 2011. https://doi.org/10.1016/j.iheduc.2010.03.006
  44. L. Abeysekera and P. Dawson, "Motivation and cognitive load in the flipped classroom: definition, rationale and a call for research," Higher Education Research & Development, vol. 34, no. 1, pp. 1-14, 2015. https://doi.org/10.1080/07294360.2014.934336